pax_global_header00006660000000000000000000000064135677406700014531gustar00rootroot0000000000000052 comment=dca7ce8195d241bf44eb4b158ef2e5d6e3b9963a selinux-python-3.0/000077500000000000000000000000001356774067000144015ustar00rootroot00000000000000selinux-python-3.0/COPYING000066400000000000000000000431311356774067000154360ustar00rootroot00000000000000 GNU GENERAL PUBLIC LICENSE Version 2, June 1991 Copyright (C) 1989, 1991 Free Software Foundation, Inc. 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed. Preamble The licenses for most software are designed to take away your freedom to share and change it. By contrast, the GNU General Public License is intended to guarantee your freedom to share and change free software--to make sure the software is free for all its users. This General Public License applies to most of the Free Software Foundation's software and to any other program whose authors commit to using it. (Some other Free Software Foundation software is covered by the GNU Library General Public License instead.) You can apply it to your programs, too. When we speak of free software, we are referring to freedom, not price. Our General Public Licenses are designed to make sure that you have the freedom to distribute copies of free software (and charge for this service if you wish), that you receive source code or can get it if you want it, that you can change the software or use pieces of it in new free programs; and that you know you can do these things. To protect your rights, we need to make restrictions that forbid anyone to deny you these rights or to ask you to surrender the rights. These restrictions translate to certain responsibilities for you if you distribute copies of the software, or if you modify it. For example, if you distribute copies of such a program, whether gratis or for a fee, you must give the recipients all the rights that you have. You must make sure that they, too, receive or can get the source code. And you must show them these terms so they know their rights. We protect your rights with two steps: (1) copyright the software, and (2) offer you this license which gives you legal permission to copy, distribute and/or modify the software. Also, for each author's protection and ours, we want to make certain that everyone understands that there is no warranty for this free software. If the software is modified by someone else and passed on, we want its recipients to know that what they have is not the original, so that any problems introduced by others will not reflect on the original authors' reputations. Finally, any free program is threatened constantly by software patents. We wish to avoid the danger that redistributors of a free program will individually obtain patent licenses, in effect making the program proprietary. To prevent this, we have made it clear that any patent must be licensed for everyone's free use or not licensed at all. The precise terms and conditions for copying, distribution and modification follow. GNU GENERAL PUBLIC LICENSE TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION 0. This License applies to any program or other work which contains a notice placed by the copyright holder saying it may be distributed under the terms of this General Public License. The "Program", below, refers to any such program or work, and a "work based on the Program" means either the Program or any derivative work under copyright law: that is to say, a work containing the Program or a portion of it, either verbatim or with modifications and/or translated into another language. (Hereinafter, translation is included without limitation in the term "modification".) Each licensee is addressed as "you". Activities other than copying, distribution and modification are not covered by this License; they are outside its scope. The act of running the Program is not restricted, and the output from the Program is covered only if its contents constitute a work based on the Program (independent of having been made by running the Program). Whether that is true depends on what the Program does. 1. You may copy and distribute verbatim copies of the Program's source code as you receive it, in any medium, provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice and disclaimer of warranty; keep intact all the notices that refer to this License and to the absence of any warranty; and give any other recipients of the Program a copy of this License along with the Program. You may charge a fee for the physical act of transferring a copy, and you may at your option offer warranty protection in exchange for a fee. 2. You may modify your copy or copies of the Program or any portion of it, thus forming a work based on the Program, and copy and distribute such modifications or work under the terms of Section 1 above, provided that you also meet all of these conditions: a) You must cause the modified files to carry prominent notices stating that you changed the files and the date of any change. b) You must cause any work that you distribute or publish, that in whole or in part contains or is derived from the Program or any part thereof, to be licensed as a whole at no charge to all third parties under the terms of this License. c) If the modified program normally reads commands interactively when run, you must cause it, when started running for such interactive use in the most ordinary way, to print or display an announcement including an appropriate copyright notice and a notice that there is no warranty (or else, saying that you provide a warranty) and that users may redistribute the program under these conditions, and telling the user how to view a copy of this License. (Exception: if the Program itself is interactive but does not normally print such an announcement, your work based on the Program is not required to print an announcement.) These requirements apply to the modified work as a whole. If identifiable sections of that work are not derived from the Program, and can be reasonably considered independent and separate works in themselves, then this License, and its terms, do not apply to those sections when you distribute them as separate works. But when you distribute the same sections as part of a whole which is a work based on the Program, the distribution of the whole must be on the terms of this License, whose permissions for other licensees extend to the entire whole, and thus to each and every part regardless of who wrote it. Thus, it is not the intent of this section to claim rights or contest your rights to work written entirely by you; rather, the intent is to exercise the right to control the distribution of derivative or collective works based on the Program. In addition, mere aggregation of another work not based on the Program with the Program (or with a work based on the Program) on a volume of a storage or distribution medium does not bring the other work under the scope of this License. 3. You may copy and distribute the Program (or a work based on it, under Section 2) in object code or executable form under the terms of Sections 1 and 2 above provided that you also do one of the following: a) Accompany it with the complete corresponding machine-readable source code, which must be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange; or, b) Accompany it with a written offer, valid for at least three years, to give any third party, for a charge no more than your cost of physically performing source distribution, a complete machine-readable copy of the corresponding source code, to be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange; or, c) Accompany it with the information you received as to the offer to distribute corresponding source code. (This alternative is allowed only for noncommercial distribution and only if you received the program in object code or executable form with such an offer, in accord with Subsection b above.) The source code for a work means the preferred form of the work for making modifications to it. For an executable work, complete source code means all the source code for all modules it contains, plus any associated interface definition files, plus the scripts used to control compilation and installation of the executable. However, as a special exception, the source code distributed need not include anything that is normally distributed (in either source or binary form) with the major components (compiler, kernel, and so on) of the operating system on which the executable runs, unless that component itself accompanies the executable. If distribution of executable or object code is made by offering access to copy from a designated place, then offering equivalent access to copy the source code from the same place counts as distribution of the source code, even though third parties are not compelled to copy the source along with the object code. 4. You may not copy, modify, sublicense, or distribute the Program except as expressly provided under this License. Any attempt otherwise to copy, modify, sublicense or distribute the Program is void, and will automatically terminate your rights under this License. However, parties who have received copies, or rights, from you under this License will not have their licenses terminated so long as such parties remain in full compliance. 5. You are not required to accept this License, since you have not signed it. However, nothing else grants you permission to modify or distribute the Program or its derivative works. These actions are prohibited by law if you do not accept this License. Therefore, by modifying or distributing the Program (or any work based on the Program), you indicate your acceptance of this License to do so, and all its terms and conditions for copying, distributing or modifying the Program or works based on it. 6. Each time you redistribute the Program (or any work based on the Program), the recipient automatically receives a license from the original licensor to copy, distribute or modify the Program subject to these terms and conditions. You may not impose any further restrictions on the recipients' exercise of the rights granted herein. You are not responsible for enforcing compliance by third parties to this License. 7. If, as a consequence of a court judgment or allegation of patent infringement or for any other reason (not limited to patent issues), conditions are imposed on you (whether by court order, agreement or otherwise) that contradict the conditions of this License, they do not excuse you from the conditions of this License. If you cannot distribute so as to satisfy simultaneously your obligations under this License and any other pertinent obligations, then as a consequence you may not distribute the Program at all. For example, if a patent license would not permit royalty-free redistribution of the Program by all those who receive copies directly or indirectly through you, then the only way you could satisfy both it and this License would be to refrain entirely from distribution of the Program. If any portion of this section is held invalid or unenforceable under any particular circumstance, the balance of the section is intended to apply and the section as a whole is intended to apply in other circumstances. It is not the purpose of this section to induce you to infringe any patents or other property right claims or to contest validity of any such claims; this section has the sole purpose of protecting the integrity of the free software distribution system, which is implemented by public license practices. Many people have made generous contributions to the wide range of software distributed through that system in reliance on consistent application of that system; it is up to the author/donor to decide if he or she is willing to distribute software through any other system and a licensee cannot impose that choice. This section is intended to make thoroughly clear what is believed to be a consequence of the rest of this License. 8. If the distribution and/or use of the Program is restricted in certain countries either by patents or by copyrighted interfaces, the original copyright holder who places the Program under this License may add an explicit geographical distribution limitation excluding those countries, so that distribution is permitted only in or among countries not thus excluded. In such case, this License incorporates the limitation as if written in the body of this License. 9. The Free Software Foundation may publish revised and/or new versions of the General Public License from time to time. Such new versions will be similar in spirit to the present version, but may differ in detail to address new problems or concerns. Each version is given a distinguishing version number. If the Program specifies a version number of this License which applies to it and "any later version", you have the option of following the terms and conditions either of that version or of any later version published by the Free Software Foundation. If the Program does not specify a version number of this License, you may choose any version ever published by the Free Software Foundation. 10. If you wish to incorporate parts of the Program into other free programs whose distribution conditions are different, write to the author to ask for permission. For software which is copyrighted by the Free Software Foundation, write to the Free Software Foundation; we sometimes make exceptions for this. Our decision will be guided by the two goals of preserving the free status of all derivatives of our free software and of promoting the sharing and reuse of software generally. NO WARRANTY 11. BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION. 12. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. END OF TERMS AND CONDITIONS How to Apply These Terms to Your New Programs If you develop a new program, and you want it to be of the greatest possible use to the public, the best way to achieve this is to make it free software which everyone can redistribute and change under these terms. To do so, attach the following notices to the program. It is safest to attach them to the start of each source file to most effectively convey the exclusion of warranty; and each file should have at least the "copyright" line and a pointer to where the full notice is found. Copyright (C) This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program; if not, write to the Free Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA Also add information on how to contact you by electronic and paper mail. If the program is interactive, make it output a short notice like this when it starts in an interactive mode: Gnomovision version 69, Copyright (C) year name of author Gnomovision comes with ABSOLUTELY NO WARRANTY; for details type `show w'. This is free software, and you are welcome to redistribute it under certain conditions; type `show c' for details. The hypothetical commands `show w' and `show c' should show the appropriate parts of the General Public License. Of course, the commands you use may be called something other than `show w' and `show c'; they could even be mouse-clicks or menu items--whatever suits your program. You should also get your employer (if you work as a programmer) or your school, if any, to sign a "copyright disclaimer" for the program, if necessary. Here is a sample; alter the names: Yoyodyne, Inc., hereby disclaims all copyright interest in the program `Gnomovision' (which makes passes at compilers) written by James Hacker. , 1 April 1989 Ty Coon, President of Vice This General Public License does not permit incorporating your program into proprietary programs. If your program is a subroutine library, you may consider it more useful to permit linking proprietary applications with the library. If this is what you want to do, use the GNU Library General Public License instead of this License. selinux-python-3.0/Makefile000066400000000000000000000002611356774067000160400ustar00rootroot00000000000000SUBDIRS = sepolicy audit2allow semanage sepolgen chcat all install relabel clean indent test: @for subdir in $(SUBDIRS); do \ (cd $$subdir && $(MAKE) $@) || exit 1; \ done selinux-python-3.0/VERSION000066400000000000000000000000041356774067000154430ustar00rootroot000000000000003.0 selinux-python-3.0/audit2allow/000077500000000000000000000000001356774067000166305ustar00rootroot00000000000000selinux-python-3.0/audit2allow/.gitignore000066400000000000000000000000551356774067000206200ustar00rootroot00000000000000sepolgen-ifgen-attr-helper test_dummy_policy selinux-python-3.0/audit2allow/Makefile000066400000000000000000000027611356774067000202760ustar00rootroot00000000000000PYTHON ?= python3 SECILC ?= secilc # Installation directories. LINGUAS ?= ru PREFIX ?= /usr BINDIR ?= $(PREFIX)/bin MANDIR ?= $(PREFIX)/share/man CFLAGS ?= -Werror -Wall -W # If no specific libsepol.a is specified, fall back on LDFLAGS search path # Otherwise, as $(LIBSEPOLA) already appears in the dependencies, there # is no need to define a value for LDLIBS_LIBSEPOLA ifeq ($(LIBSEPOLA),) LDLIBS_LIBSEPOLA := -l:libsepol.a endif all: audit2why sepolgen-ifgen-attr-helper sepolgen-ifgen-attr-helper: sepolgen-ifgen-attr-helper.o $(LIBSEPOLA) $(CC) $(LDFLAGS) -o $@ $^ $(LDLIBS_LIBSEPOLA) audit2why: ln -sf audit2allow audit2why test: all test_dummy_policy @$(PYTHON) test_audit2allow.py -v test_dummy_policy: test_dummy_policy.cil $(SECILC) -o $@ -f /dev/null $< install: all -mkdir -p $(DESTDIR)$(BINDIR) install -m 755 audit2allow $(DESTDIR)$(BINDIR) (cd $(DESTDIR)$(BINDIR); ln -sf audit2allow audit2why) install -m 755 sepolgen-ifgen-attr-helper $(DESTDIR)$(BINDIR) install -m 755 sepolgen-ifgen $(DESTDIR)$(BINDIR) -mkdir -p $(DESTDIR)$(MANDIR)/man1 install -m 644 audit2allow.1 $(DESTDIR)$(MANDIR)/man1/ install -m 644 audit2why.1 $(DESTDIR)$(MANDIR)/man1/ for lang in $(LINGUAS) ; do \ if [ -e $${lang} ] ; then \ mkdir -p $(DESTDIR)$(MANDIR)/$${lang}/man1 ; \ install -m 644 $${lang}/*.1 $(DESTDIR)$(MANDIR)/$${lang}/man1/ ; \ fi ; \ done clean: rm -f *~ *.o sepolgen-ifgen-attr-helper test_dummy_policy indent: ../../scripts/Lindent $(wildcard *.[ch]) relabel: ; selinux-python-3.0/audit2allow/audit2allow000066400000000000000000000355341356774067000210140ustar00rootroot00000000000000#!/usr/bin/python3 -Es # Authors: Karl MacMillan # Authors: Dan Walsh # # Copyright (C) 2006-2013 Red Hat # see file 'COPYING' for use and warranty information # # This program is free software; you can redistribute it and/or # modify it under the terms of the GNU General Public License as # published by the Free Software Foundation; version 2 only # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program; if not, write to the Free Software # Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA # import sys import os import sepolgen.audit as audit import sepolgen.policygen as policygen import sepolgen.interfaces as interfaces import sepolgen.output as output import sepolgen.objectmodel as objectmodel import sepolgen.defaults as defaults import sepolgen.module as module from sepolgen.sepolgeni18n import _ import selinux.audit2why as audit2why import locale try: locale.setlocale(locale.LC_ALL, '') except: pass class AuditToPolicy: VERSION = "%prog .1" SYSLOG = "/var/log/messages" def __init__(self): self.__options = None self.__parser = None self.__avs = None def __parse_options(self): from optparse import OptionParser parser = OptionParser(version=self.VERSION) parser.add_option("-b", "--boot", action="store_true", dest="boot", default=False, help="audit messages since last boot conflicts with -i") parser.add_option("-a", "--all", action="store_true", dest="audit", default=False, help="read input from audit log - conflicts with -i") parser.add_option("-p", "--policy", dest="policy", default=None, help="Policy file to use for analysis") parser.add_option("-d", "--dmesg", action="store_true", dest="dmesg", default=False, help="read input from dmesg - conflicts with --all and --input") parser.add_option("-i", "--input", dest="input", help="read input from - conflicts with -a") parser.add_option("-l", "--lastreload", action="store_true", dest="lastreload", default=False, help="read input only after the last reload") parser.add_option("-r", "--requires", action="store_true", dest="requires", default=False, help="generate require statements for rules") parser.add_option("-m", "--module", dest="module", help="set the module name - implies --requires") parser.add_option("-M", "--module-package", dest="module_package", help="generate a module package - conflicts with -o and -m") parser.add_option("-o", "--output", dest="output", help="append output to , conflicts with -M") parser.add_option("-D", "--dontaudit", action="store_true", dest="dontaudit", default=False, help="generate policy with dontaudit rules") parser.add_option("-R", "--reference", action="store_true", dest="refpolicy", default=True, help="generate refpolicy style output") parser.add_option("-N", "--noreference", action="store_false", dest="refpolicy", default=False, help="do not generate refpolicy style output") parser.add_option("-v", "--verbose", action="store_true", dest="verbose", default=False, help="explain generated output") parser.add_option("-e", "--explain", action="store_true", dest="explain_long", default=False, help="fully explain generated output") parser.add_option("-t", "--type", help="only process messages with a type that matches this regex", dest="type") parser.add_option("--perm-map", dest="perm_map", help="file name of perm map") parser.add_option("--interface-info", dest="interface_info", help="file name of interface information") parser.add_option("-x", "--xperms", action="store_true", dest="xperms", default=False, help="generate extended permission rules") parser.add_option("--debug", dest="debug", action="store_true", default=False, help="leave generated modules for -M") parser.add_option("-w", "--why", dest="audit2why", action="store_true", default=(os.path.basename(sys.argv[0]) == "audit2why"), help="Translates SELinux audit messages into a description of why the access was denied") options, args = parser.parse_args() # Make -d, -a, and -i conflict if options.audit is True or options.boot: if options.input is not None: sys.stderr.write("error: --all/--boot conflicts with --input\n") if options.dmesg is True: sys.stderr.write("error: --all/--boot conflicts with --dmesg\n") if options.input is not None and options.dmesg is True: sys.stderr.write("error: --input conflicts with --dmesg\n") # Turn on requires generation if a module name is given. Also verify # the module name. if options.module: name = options.module else: name = options.module_package if name: options.requires = True if not module.is_valid_name(name): sys.stderr.write('error: module names must begin with a letter, optionally followed by letters, numbers, "-", "_", "."\n') sys.exit(2) # Make -M and -o conflict if options.module_package: if options.output: sys.stderr.write("error: --module-package conflicts with --output\n") sys.exit(2) if options.module: sys.stderr.write("error: --module-package conflicts with --module\n") sys.exit(2) self.__options = options def __read_input(self): parser = audit.AuditParser(last_load_only=self.__options.lastreload) filename = None messages = None f = None # Figure out what input we want if self.__options.input is not None: filename = self.__options.input elif self.__options.dmesg: messages = audit.get_dmesg_msgs() elif self.__options.audit: try: messages = audit.get_audit_msgs() except OSError as e: sys.stderr.write('could not run ausearch - "%s"\n' % str(e)) sys.exit(1) elif self.__options.boot: try: messages = audit.get_audit_boot_msgs() except OSError as e: sys.stderr.write('could not run ausearch - "%s"\n' % str(e)) sys.exit(1) else: # This is the default if no input is specified f = sys.stdin # Get the input if filename is not None: try: f = open(filename) except IOError as e: sys.stderr.write('could not open file %s - "%s"\n' % (filename, str(e))) sys.exit(1) if f is not None: parser.parse_file(f) f.close() if messages is not None: parser.parse_string(messages) self.__parser = parser def __process_input(self): if self.__options.type: avcfilter = audit.AVCTypeFilter(self.__options.type) self.__avs = self.__parser.to_access(avcfilter) csfilter = audit.ComputeSidTypeFilter(self.__options.type) self.__role_types = self.__parser.to_role(csfilter) else: self.__avs = self.__parser.to_access() self.__role_types = self.__parser.to_role() def __load_interface_info(self): # Load interface info file if self.__options.interface_info: fn = self.__options.interface_info else: fn = defaults.interface_info() try: fd = open(fn) except: sys.stderr.write("could not open interface info [%s]\n" % fn) sys.exit(1) ifs = interfaces.InterfaceSet() ifs.from_file(fd) fd.close() # Also load perm maps if self.__options.perm_map: fn = self.__options.perm_map else: fn = defaults.perm_map() try: fd = open(fn) except: sys.stderr.write("could not open perm map [%s]\n" % fn) sys.exit(1) perm_maps = objectmodel.PermMappings() perm_maps.from_file(fd) return (ifs, perm_maps) def __output_modulepackage(self, writer, generator): generator.set_module_name(self.__options.module_package) filename = self.__options.module_package + ".te" packagename = self.__options.module_package + ".pp" try: fd = open(filename, "w") except IOError as e: sys.stderr.write("could not write output file: %s\n" % str(e)) sys.exit(1) writer.write(generator.get_module(), fd) fd.close() mc = module.ModuleCompiler() try: mc.create_module_package(filename, self.__options.refpolicy) except RuntimeError as e: print(e) sys.exit(1) sys.stdout.write(_("******************** IMPORTANT ***********************\n")) sys.stdout.write((_("To make this policy package active, execute:" + "\n\nsemodule -i %s\n\n") % packagename)) def __output_audit2why(self): import selinux try: import sepolicy except (ImportError, ValueError): sepolicy = None for i in self.__parser.avc_msgs: rc = i.type data = i.data if rc >= 0: print("%s\n\tWas caused by:" % i.message) if rc == audit2why.ALLOW: print("\t\tUnknown - would be allowed by active policy") print("\t\tPossible mismatch between this policy and the one under which the audit message was generated.\n") print("\t\tPossible mismatch between current in-memory boolean settings vs. permanent ones.\n") continue if rc == audit2why.DONTAUDIT: print("\t\tUnknown - should be dontaudit'd by active policy") print("\t\tPossible mismatch between this policy and the one under which the audit message was generated.\n") print("\t\tPossible mismatch between current in-memory boolean settings vs. permanent ones.\n") continue if rc == audit2why.BOOLEAN: if len(data) > 1: print("\tOne of the following booleans was set incorrectly.") for b in data: if sepolicy is not None: print("\tDescription:\n\t%s\n" % sepolicy.boolean_desc(b[0])) print("\tAllow access by executing:\n\t# setsebool -P %s %d" % (b[0], b[1])) else: print("\tThe boolean %s was set incorrectly. " % (data[0][0])) if sepolicy is not None: print("\tDescription:\n\t%s\n" % sepolicy.boolean_desc(data[0][0])) print("\tAllow access by executing:\n\t# setsebool -P %s %d" % (data[0][0], data[0][1])) continue if rc == audit2why.TERULE: print("\t\tMissing type enforcement (TE) allow rule.\n") print("\t\tYou can use audit2allow to generate a loadable module to allow this access.\n") continue if rc == audit2why.CONSTRAINT: print() # !!!! This avc is a constraint violation. You would need to modify the attributes of either the source or target types to allow this access.\n" print("#Constraint rule:") print("\n#\t" + data[0]) for reason in data[1:]: print("#\tPossible cause is the source %s and target %s are different.\n" % reason) if rc == audit2why.RBAC: print("\t\tMissing role allow rule.\n") print("\t\tAdd an allow rule for the role pair.\n") continue if rc == audit2why.BOUNDS: print("\t\tTypebounds violation.\n") print("\t\tAdd an allow rule for the parent type.\n") continue audit2why.finish() return def __output(self): if self.__options.audit2why: try: return self.__output_audit2why() except RuntimeError as e: print(e) sys.exit(1) g = policygen.PolicyGenerator() g.set_gen_dontaudit(self.__options.dontaudit) if self.__options.module: g.set_module_name(self.__options.module) # Interface generation if self.__options.refpolicy: ifs, perm_maps = self.__load_interface_info() g.set_gen_refpol(ifs, perm_maps) # Extended permissions if self.__options.xperms: g.set_gen_xperms(True) # Explanation if self.__options.verbose: g.set_gen_explain(policygen.SHORT_EXPLANATION) if self.__options.explain_long: g.set_gen_explain(policygen.LONG_EXPLANATION) # Requires if self.__options.requires: g.set_gen_requires(True) # Generate the policy g.add_access(self.__avs) g.add_role_types(self.__role_types) # Output writer = output.ModuleWriter() # Module package if self.__options.module_package: self.__output_modulepackage(writer, g) else: # File or stdout if self.__options.module: g.set_module_name(self.__options.module) if self.__options.output: fd = open(self.__options.output, "a") else: fd = sys.stdout writer.write(g.get_module(), fd) def main(self): try: self.__parse_options() if self.__options.policy: audit2why.init(self.__options.policy) else: audit2why.init() self.__read_input() self.__process_input() self.__output() except KeyboardInterrupt: sys.exit(0) except ValueError as e: print(e) sys.exit(1) except IOError as e: print(e) sys.exit(1) if __name__ == "__main__": app = AuditToPolicy() app.main() selinux-python-3.0/audit2allow/audit2allow.1000066400000000000000000000157451356774067000211550ustar00rootroot00000000000000.\" Hey, Emacs! This is an -*- nroff -*- source file. .\" Copyright (c) 2005 Manoj Srivastava .\" Copyright (c) 2010 Dan Walsh .\" .\" This is free documentation; you can redistribute it and/or .\" modify it under the terms of the GNU General Public License as .\" published by the Free Software Foundation; either version 2 of .\" the License, or (at your option) any later version. .\" .\" The GNU General Public License's references to "object code" .\" and "executables" are to be interpreted as the output of any .\" document formatting or typesetting system, including .\" intermediate and printed output. .\" .\" This manual is distributed in the hope that it will be useful, .\" but WITHOUT ANY WARRANTY; without even the implied warranty of .\" MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the .\" GNU General Public License for more details. .\" .\" You should have received a copy of the GNU General Public .\" License along with this manual; if not, write to the Free .\" Software Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, .\" USA. .\" .\" .TH AUDIT2ALLOW "1" "October 2010" "Security Enhanced Linux" NSA .SH NAME .BR audit2allow \- generate SELinux policy allow/dontaudit rules from logs of denied operations .BR audit2why \- translates SELinux audit messages into a description of why the access was denied (audit2allow \-w) .SH SYNOPSIS .B audit2allow .RI [ options "] " .SH OPTIONS .TP .B "\-a" | "\-\-all" Read input from audit and message log, conflicts with \-i .TP .B "\-b" | "\-\-boot" Read input from audit messages since last boot conflicts with \-i .TP .B "\-d" | "\-\-dmesg" Read input from output of .I /bin/dmesg. Note that all audit messages are not available via dmesg when auditd is running; use "ausearch \-m avc | audit2allow" or "\-a" instead. .TP .B "\-D" | "\-\-dontaudit" Generate dontaudit rules (Default: allow) .TP .B "\-h" | "\-\-help" Print a short usage message .TP .B "\-i " | "\-\-input " read input from .I .TP .B "\-l" | "\-\-lastreload" read input only after last policy reload .TP .B "\-m " | "\-\-module " Generate module/require output .TP .B "\-M " Generate loadable module package, conflicts with \-o .TP .B "\-p " | "\-\-policy " Policy file to use for analysis .TP .B "\-o " | "\-\-output " append output to .I .TP .B "\-r" | "\-\-requires" Generate require output syntax for loadable modules. .TP .B "\-N" | "\-\-noreference" Do not generate reference policy, traditional style allow rules. This is the default behavior. .TP .B "\-R" | "\-\-reference" Generate reference policy using installed macros. This attempts to match denials against interfaces and may be inaccurate. .TP .B "\-x" | "\-\-xperms" Generate extended permission access vector rules .TP .B "\-w" | "\-\-why" Translates SELinux audit messages into a description of why the access was denied .TP .B "\-v" | "\-\-verbose" Turn on verbose output .SH DESCRIPTION .PP This utility scans the logs for messages logged when the system denied permission for operations, and generates a snippet of policy rules which, if loaded into policy, might have allowed those operations to succeed. However, this utility only generates Type Enforcement (TE) allow rules. Certain permission denials may require other kinds of policy changes, e.g. adding an attribute to a type declaration to satisfy an existing constraint, adding a role allow rule, or modifying a constraint. The .BR audit2why (8) utility may be used to diagnose the reason when it is unclear. .PP Care must be exercised while acting on the output of this utility to ensure that the operations being permitted do not pose a security threat. Often it is better to define new domains and/or types, or make other structural changes to narrowly allow an optimal set of operations to succeed, as opposed to blindly implementing the sometimes broad changes recommended by this utility. Certain permission denials are not fatal to the application, in which case it may be preferable to simply suppress logging of the denial via a 'dontaudit' rule rather than an 'allow' rule. .PP .SH EXAMPLE .nf .B NOTE: These examples are for systems using the audit package. If you do .B not use the audit package, the AVC messages will be in /var/log/messages. .B Please substitute /var/log/messages for /var/log/audit/audit.log in the .B examples. .PP .B Using audit2allow to generate module policy $ cat /var/log/audit/audit.log | audit2allow \-m local > local.te $ cat local.te module local 1.0; require { class file { getattr open read }; type myapp_t; type etc_t; }; allow myapp_t etc_t:file { getattr open read }; .B Using audit2allow to generate module policy using reference policy $ cat /var/log/audit/audit.log | audit2allow \-R \-m local > local.te $ cat local.te policy_module(local, 1.0) gen_require(` type myapp_t; type etc_t; }; files_read_etc_files(myapp_t) .B Building module policy using Makefile # SELinux provides a policy devel environment under # /usr/share/selinux/devel including all of the shipped # interface files. # You can create a te file and compile it by executing $ make \-f /usr/share/selinux/devel/Makefile local.pp # This make command will compile a local.te file in the current # directory. If you did not specify a "pp" file, the make file # will compile all "te" files in the current directory. After # you compile your te file into a "pp" file, you need to install # it using the semodule command. $ semodule \-i local.pp .B Building module policy manually # Compile the module $ checkmodule \-M \-m \-o local.mod local.te # Create the package $ semodule_package \-o local.pp \-m local.mod # Load the module into the kernel $ semodule \-i local.pp .B Using audit2allow to generate and build module policy $ cat /var/log/audit/audit.log | audit2allow \-M local Generating type enforcement file: local.te Compiling policy: checkmodule \-M \-m \-o local.mod local.te Building package: semodule_package \-o local.pp \-m local.mod ******************** IMPORTANT *********************** In order to load this newly created policy package into the kernel, you are required to execute semodule \-i local.pp .B Using audit2allow to generate monolithic (non\-module) policy $ cd /etc/selinux/$SELINUXTYPE/src/policy $ cat /var/log/audit/audit.log | audit2allow >> domains/misc/local.te $ cat domains/misc/local.te allow cupsd_config_t unconfined_t:fifo_file { getattr ioctl }; $ make load .fi .PP .SH AUTHOR This manual page was written by .I Manoj Srivastava , for the Debian GNU/Linux system. It was updated by Dan Walsh .PP The .B audit2allow utility has contributions from several people, including .I Justin R. Smith and .I Yuichi Nakamura. and .I Dan Walsh selinux-python-3.0/audit2allow/audit2why000077700000000000000000000000001356774067000226402audit2allowustar00rootroot00000000000000selinux-python-3.0/audit2allow/audit2why.1000066400000000000000000000000271356774067000206310ustar00rootroot00000000000000.so man1/audit2allow.1 selinux-python-3.0/audit2allow/ru/000077500000000000000000000000001356774067000172565ustar00rootroot00000000000000selinux-python-3.0/audit2allow/ru/audit2allow.1000066400000000000000000000253741356774067000216020ustar00rootroot00000000000000.\" Hey, Emacs! This is an -*- nroff -*- source file. .\" Copyright (c) 2005 Manoj Srivastava .\" Copyright (c) 2010 Dan Walsh .\" .\" This is free documentation; you can redistribute it and/or .\" modify it under the terms of the GNU General Public License as .\" published by the Free Software Foundation; either version 2 of .\" the License, or (at your option) any later version. .\" .\" The GNU General Public License's references to "object code" .\" and "executables" are to be interpreted as the output of any .\" document formatting or typesetting system, including .\" intermediate and printed output. .\" .\" This manual is distributed in the hope that it will be useful, .\" but WITHOUT ANY WARRANTY; without even the implied warranty of .\" MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the .\" GNU General Public License for more details. .\" .\" You should have received a copy of the GNU General Public .\" License along with this manual; if not, write to the Free .\" Software Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, .\" USA. .\" .\" .TH AUDIT2ALLOW "1" "Октябрь 2010" "Security Enhanced Linux" NSA .SH ИМЯ .BR audit2allow \- создаёт правила политики SELinux allow/dontaudit из журналов отклонённых операций .BR audit2why \- преобразовывает сообщения аудита SELinux в описание причины отказа в доступе (audit2allow \-w) .SH ОБЗОР .B audit2allow .RI [ options "] " .SH ПАРАМЕТРЫ .TP .B "\-a" | "\-\-all" Прочитать ввод из журнала аудита и сообщений, конфликтует с \-i .TP .B "\-b" | "\-\-boot" Прочитать ввод из сообщений аудита с момента последней загрузки, конфликтует с \-i .TP .B "\-d" | "\-\-dmesg" Прочитать ввод из вывода .I /bin/dmesg. Обратите внимание, что с помощью dmesg будут доступны не все сообщения аудита, когда выполняется auditd; в этом случае используйте "ausearch \-m avc | audit2allow" или "\-a". .TP .B "\-D" | "\-\-dontaudit" Создать правила dontaudit (по умолчанию: allow) .TP .B "\-h" | "\-\-help" Вывести краткое сообщение об использовании .TP .B "\-i " | "\-\-input " Прочитать ввод из .I .TP .B "\-l" | "\-\-lastreload" Прочитать ввод только после последней перезагрузки политики .TP .B "\-m " | "\-\-module " Создать модуль / запросить вывод .TP .B "\-M " Создать загружаемый пакет модуля, конфликтует с \-o .TP .B "\-p " | "\-\-policy " Файл политики, который следует использовать для анализа .TP .B "\-o " | "\-\-output " Добавить вывод в конец .I .TP .B "\-r" | "\-\-requires" Создать вывод в синтаксисе загружаемого модуля .TP .B "\-N" | "\-\-noreference" Не создавать эталонную политику, традиционные разрешительные правила. Это поведение по умолчанию. .TP .B "\-R" | "\-\-reference" Создать эталонную политику с помощью установленных макросов. Будет предпринята попытка сопоставить отказы в доступе с интерфейсами, это сопоставление может быть неправильным. .TP .B "\-x" | "\-\-xperms" Создать расширенные правила вектора доступа для разрешения .TP .B "\-w" | "\-\-why" Преобразовать сообщения аудита SELinux в описание причин отказа в доступе .TP .B "\-v" | "\-\-verbose" Включить подробный вывод .SH ОПИСАНИЕ .PP Эта утилита ищет в журналах сообщения, которые появляются, когда система не даёт разрешения на операции, и создаёт фрагмент кода правил политики, который (если бы был загружен в политику) мог бы позволить этим операциям успешно завершиться. Однако эта утилита создаёт только разрешительные (allow) правила принудительного присвоения типов. При работе с некоторыми отказами в разрешениях может потребоваться изменить политику как-то иначе, например, добавить атрибут в объявление типа для удовлетворения существующему ограничению, добавить разрешительное правило для роли или изменить ограничение. Утилиту .BR audit2why (8) можно использовать для диагностики неясных причин отказов в разрешениях. .PP Использовать вывод этой утилиты необходимо с осторожностью; убедитесь, что разрешаемые операции не представляют угрозы безопасности. Часто лучше определить новые домены и/или типы или выполнить другие структурные изменения, чтобы разрешить успешное выполнение только оптимальному набору операций, а не вслепую применять иногда слишком обширные изменения, которые рекомендуются утилитой. Некоторые запреты на использование разрешений не вызывают критических ошибок в приложении; в этом случае предпочтительным может быть простое подавление журналирования отказов с помощью правила 'dontaudit', а не использование разрешительного правила 'allow'. .PP .SH ПРИМЕР .nf .B ПРИМЕЧАНИЕ: эти примеры относятся к системам, использующим пакет аудита. Если вы .B не используете пакет аудита, сообщения кэша вектора доступа (AVC) будут находиться в каталоге /var/log/messages. .B Замените в примерах /var/log/messages на /var/log/audit/audit.log .PP .B Использование audit2allow для создания модульной политики $ cat /var/log/audit/audit.log | audit2allow \-m local > local.te $ cat local.te module local 1.0; require { class file { getattr open read }; type myapp_t; type etc_t; }; allow myapp_t etc_t:file { getattr open read }; <просмотреть local.te и настроить требуемым образом> .B Использование audit2allow для создания модульной политики с помощью эталонной политики $ cat /var/log/audit/audit.log | audit2allow \-R \-m local > local.te $ cat local.te policy_module(local, 1.0) gen_require(` type myapp_t; type etc_t; }; files_read_etc_files(myapp_t) <просмотреть local.te и настроить требуемым образом> .B Сборка модульной политики с помощью Makefile # SELinux предоставляет среду разработки политики в # /usr/share/selinux/devel, включая все поставляемые # файлы интерфейса. # Можно создать файл .te и скомпилировать его, выполнив $ make \-f /usr/share/selinux/devel/Makefile local.pp # Эта команда make скомпилирует файл local.te в текущем # каталоге. Если не был указан файл "pp", будут скомпилированы # все файлы "te" в текущем каталоге. После компиляции файла # .te в файл "pp" его потребуется установить с помощью # команды semodule. $ semodule \-i local.pp .B Сборка модульной политики вручную # Скомпилировать модуль $ checkmodule \-M \-m \-o local.mod local.te # Создать пакет $ semodule_package \-o local.pp \-m local.mod # Загрузить модуль в ядро $ semodule \-i local.pp .B Использование audit2allow для создания и сборки модульной политики $ cat /var/log/audit/audit.log | audit2allow \-M local Создание файла принудительного присвоения типов: local.te Компиляция политики: checkmodule \-M \-m \-o local.mod local.te Сборка пакета: semodule_package \-o local.pp \-m local.mod ******************** ВАЖНО *********************** Чтобы загрузить созданный пакет политики в ядро, необходимо выполнить semodule \-i local.pp .B Использование audit2allow для создания монолитной (не модульной) политики $ cd /etc/selinux/$SELINUXTYPE/src/policy $ cat /var/log/audit/audit.log | audit2allow >> domains/misc/local.te $ cat domains/misc/local.te allow cupsd_config_t unconfined_t:fifo_file { getattr ioctl }; <просмотреть domains/misc/local.te и настроить требуемым образом> $ make load .fi .PP .SH АВТОРЫ Эта страница руководства была написана .I Manoj Srivastava для системы Debian GNU/Linux. Она была обновлена Dan Walsh . .PP В разработке утилиты .B audit2allow участвовало несколько человек, в том числе .I Justin R. Smith, .I Yuichi Nakamura и .I Dan Walsh. Перевод на русский язык выполнила .I Герасименко Олеся . selinux-python-3.0/audit2allow/ru/audit2why.1000066400000000000000000000000271356774067000212570ustar00rootroot00000000000000.so man1/audit2allow.1 selinux-python-3.0/audit2allow/sepolgen-ifgen000066400000000000000000000113151356774067000214560ustar00rootroot00000000000000#!/usr/bin/python3 -Es # # Authors: Karl MacMillan # # Copyright (C) 2006 Red Hat # see file 'COPYING' for use and warranty information # # This program is free software; you can redistribute it and/or # modify it under the terms of the GNU General Public License as # published by the Free Software Foundation; version 2 only # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program; if not, write to the Free Software # Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA # # Parse interfaces and output extracted information about them # suitable for policy generation. By default writes the output # to the default location (obtained from sepolgen.defaults), but # will output to another file provided as an argument: # sepolgen-ifgen [headers] [output-filename] import sys import os import tempfile import subprocess import selinux import sepolgen.refparser as refparser import sepolgen.defaults as defaults import sepolgen.interfaces as interfaces VERSION = "%prog .1" ATTR_HELPER = "/usr/bin/sepolgen-ifgen-attr-helper" def parse_options(): from optparse import OptionParser parser = OptionParser(version=VERSION) parser.add_option("-o", "--output", dest="output", default=defaults.interface_info(), help="filename to store output") parser.add_option("-i", "--interfaces", dest="headers", default=defaults.headers(), help="location of the interface header files") parser.add_option("-a", "--attribute_info", dest="attribute_info") parser.add_option("-p", "--policy", dest="policy_path") parser.add_option("-v", "--verbose", action="store_true", default=False, help="print debugging output") parser.add_option("-d", "--debug", action="store_true", default=False, help="extra debugging output") parser.add_option("--attr-helper", default=ATTR_HELPER, help="path to sepolgen-ifgen-attr-helper") parser.add_option("--no_attrs", action="store_true", default=False, help="do not retrieve attribute access from kernel policy") options, args = parser.parse_args() return options def get_policy(): p = selinux.selinux_current_policy_path() if p and os.path.exists(p): return p i = selinux.security_policyvers() p = selinux.selinux_binary_policy_path() + "." + str(i) while i > 0 and not os.path.exists(p): i = i - 1 p = selinux.selinux_binary_policy_path() + "." + str(i) if i > 0: return p return None def get_attrs(policy_path, attr_helper): try: if not policy_path: policy_path = get_policy() if not policy_path: sys.stderr.write("No installed policy to check\n") return None outfile = tempfile.NamedTemporaryFile() except IOError as e: sys.stderr.write("could not open attribute output file\n") return None except OSError: # SELinux Disabled Machine return None fd = open("/dev/null", "w") ret = subprocess.Popen([attr_helper, policy_path, outfile.name], stdout=fd).wait() fd.close() if ret != 0: sys.stderr.write("could not run attribute helper\n") return None attrs = interfaces.AttributeSet() try: attrs.from_file(outfile) except: print("error parsing attribute info") return None return attrs def main(): options = parse_options() # Open the output first to generate errors before parsing try: f = open(options.output, "w") except IOError as e: sys.stderr.write("could not open output file [%s]\n" % options.output) return 1 if options.verbose: log = sys.stdout else: log = None # Get the attributes from the binary attrs = None if not options.no_attrs: attrs = get_attrs(options.policy_path, options.attr_helper) if attrs is None: return 1 # Parse the headers try: headers = refparser.parse_headers(options.headers, output=log, debug=options.debug) except ValueError as e: sys.stderr.write("error parsing headers: %s\n" % e) return 1 if_set = interfaces.InterfaceSet(output=log) if_set.add_headers(headers, attributes=attrs) if_set.to_file(f) f.close() if refparser.success: return 0 else: return 1 if __name__ == "__main__": sys.exit(main()) selinux-python-3.0/audit2allow/sepolgen-ifgen-attr-helper.c000066400000000000000000000117301356774067000241250ustar00rootroot00000000000000/* Authors: Frank Mayer * and Karl MacMillan * * Copyright (C) 2003,2010 Tresys Technology, LLC * * This program is free software; you can redistribute it and/or * modify it under the terms of the GNU General Public License as * published by the Free Software Foundation, version 2. * * Adapted from dispol.c. * * This program is used by sepolgen-ifgen to get the access for all of * the attributes in the policy so that it can resolve the * typeattribute statements in the interfaces. * * It outputs the attribute access in a similar format to what sepolgen * uses to store interface vectors: * [Attribute sandbox_x_domain] * sandbox_x_domain,samba_var_t,file,ioctl,read,getattr,lock,open * sandbox_x_domain,samba_var_t,dir,getattr,search,open * sandbox_x_domain,initrc_var_run_t,file,ioctl,read,getattr,lock,open * */ #include #include #include #include #include #include #include #include #include struct val_to_name { unsigned int val; char *name; }; static int perm_name(hashtab_key_t key, hashtab_datum_t datum, void *data) { struct val_to_name *v = data; perm_datum_t *perdatum; perdatum = (perm_datum_t *) datum; if (v->val == perdatum->s.value) { v->name = key; return 1; } return 0; } int render_access_mask(uint32_t av, avtab_key_t *key, policydb_t *policydbp, FILE *fp) { struct val_to_name v; class_datum_t *cladatum; char *perm = NULL; unsigned int i; int rc; uint32_t tclass = key->target_class; cladatum = policydbp->class_val_to_struct[tclass - 1]; for (i = 0; i < cladatum->permissions.nprim; i++) { if (av & (1 << i)) { v.val = i + 1; rc = hashtab_map(cladatum->permissions.table, perm_name, &v); if (!rc && cladatum->comdatum) { rc = hashtab_map(cladatum->comdatum-> permissions.table, perm_name, &v); } if (rc) perm = v.name; if (perm) { fprintf(fp, ",%s", perm); } } } return 0; } static int render_key(avtab_key_t *key, policydb_t *p, FILE *fp) { char *stype, *ttype, *tclass; stype = p->p_type_val_to_name[key->source_type - 1]; ttype = p->p_type_val_to_name[key->target_type - 1]; tclass = p->p_class_val_to_name[key->target_class - 1]; if (stype && ttype) { fprintf(fp, "%s,%s,%s", stype, ttype, tclass); } else { fprintf(stderr, "error rendering key\n"); exit(1); } return 0; } struct callback_data { uint32_t attr; policydb_t *policy; FILE *fp; }; int output_avrule(avtab_key_t *key, avtab_datum_t *datum, void *args) { struct callback_data *cb_data = (struct callback_data *)args; if (key->source_type != cb_data->attr) return 0; if (!(key->specified & AVTAB_AV && key->specified & AVTAB_ALLOWED)) return 0; render_key(key, cb_data->policy, cb_data->fp); render_access_mask(datum->data, key, cb_data->policy, cb_data->fp); fprintf(cb_data->fp, "\n"); return 0; } static int attribute_callback(hashtab_key_t key, hashtab_datum_t datum, void *datap) { struct callback_data *cb_data = (struct callback_data *)datap; type_datum_t *t = (type_datum_t *)datum; if (t->flavor == TYPE_ATTRIB) { fprintf(cb_data->fp, "[Attribute %s]\n", key); cb_data->attr = t->s.value; if (avtab_map(&cb_data->policy->te_avtab, output_avrule, cb_data) < 0) return -1; if (avtab_map(&cb_data->policy->te_cond_avtab, output_avrule, cb_data) < 0) return -1; } return 0; } static policydb_t *load_policy(const char *filename) { policydb_t *policydb; struct policy_file pf; FILE *fp; int ret; fp = fopen(filename, "r"); if (fp == NULL) { fprintf(stderr, "Can't open '%s': %s\n", filename, strerror(errno)); return NULL; } policy_file_init(&pf); pf.type = PF_USE_STDIO; pf.fp = fp; policydb = malloc(sizeof(policydb_t)); if (policydb == NULL) { fprintf(stderr, "Out of memory!\n"); return NULL; } if (policydb_init(policydb)) { fprintf(stderr, "Out of memory!\n"); free(policydb); return NULL; } ret = policydb_read(policydb, &pf, 1); if (ret) { fprintf(stderr, "error(s) encountered while parsing configuration\n"); free(policydb); return NULL; } fclose(fp); return policydb; } void usage(char *progname) { printf("usage: %s policy_file out_file\n", progname); } int main(int argc, char **argv) { policydb_t *p; struct callback_data cb_data; FILE *fp; if (argc != 3) { usage(argv[0]); return -1; } /* Open the policy. */ p = load_policy(argv[1]); if (p == NULL) return -1; /* Open the output policy. */ fp = fopen(argv[2], "w"); if (fp == NULL) { fprintf(stderr, "error opening output file\n"); policydb_destroy(p); free(p); return -1; } /* Find all of the attributes and output their access. */ cb_data.policy = p; cb_data.fp = fp; if (hashtab_map(p->p_types.table, attribute_callback, &cb_data)) { printf("error finding attributes\n"); } policydb_destroy(p); free(p); fclose(fp); return 0; } selinux-python-3.0/audit2allow/test.log000066400000000000000000000236051356774067000203200ustar00rootroot00000000000000node=bill.example.com type=AVC_PATH msg=audit(1166045975.667:1128): path="/usr/lib/libGL.so.1.2" type=AVC msg=audit(1166045975.667:1129): avc: denied { write } for comm=local dev=dm-0 name=root.lock pid=10581 scontext=system_u:system_r:postfix_local_t:s0 tclass=file tcontext=system_u:object_r:mail_spool_t:s0 node=bob.example.com type=PATH msg=audit(1166111074.191:74): item=0 name="/etc/auto.net" inode=16483485 dev=fd:00 mode=0100755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:automount_lock_t:s0 type=CWD msg=audit(1166111074.191:74): cwd="/" node=bob.example.com type=SYSCALL msg=audit(1166111074.191:74): arch=40000003 syscall=33 success=no exit=-13 a0=92c5288 a1=1 a2=154d50 a3=92c5120 items=1 ppid=13935 pid=13944 auid=3267 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="automount" exe="/usr/sbin/automount" subj=system_u:system_r:automount_t:s0 key=(null) node=bob.example.com type=AVC msg=audit(1166111074.191:74): avc: denied { execute } for pid=13944 comm="automount" name="auto.net" dev=dm-0 ino=16483485 scontext=system_u:system_r:automount_t:s0 tcontext=system_u:object_r:automount_lock_t:s0 tclass=file node=james.example.com type=SYSCALL msg=audit(1165963069.244:851): arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf96a830 a2=b5b1e8 a3=9e58ac0 items=0 ppid=21133 pid=21134 auid=3267 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts10 comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:httpd_t:s0 key=(null) node=james.example.com type=AVC msg=audit(1165963069.244:851): avc: denied { name_bind } for pid=21134 comm="httpd" src=81 scontext=system_u:system_r:httpd_t:s0 tcontext=system_u:object_r:reserved_port_t:s0 tclass=tcp_socket node=tom.example.com type=SYSCALL msg=audit(1165963069.244:852): arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf96a830 a2=b5b1e8 a3=9e58ac0 items=0 ppid=21133 pid=21134 auid=3267 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts10 comm="smbd" exe="/usr/sbin/smbd" subj=system_u:system_r:smbd_t:s0 key=(null) node=tom.example.com type=AVC msg=audit(1165963069.244:852): avc: denied { name_connect } for pid=21134 comm="smbd" src=81 scontext=system_u:system_r:smbd_t:s0 tcontext=system_u:object_r:reserved_port_t:s0 tclass=tcp_socket node=mary.example.com type=SYSCALL msg=audit(1166023021.373:910): arch=40000003 syscall=12 success=no exit=-13 a0=8493cd8 a1=cc3 a2=3282ec a3=bf992a04 items=0 ppid=24423 pid=24427 auid=3267 uid=0 gid=0 euid=3267 suid=3267 fsuid=3267 egid=3267 sgid=3267 fsgid=3267 tty=(none) comm="vsftpd" exe="/usr/sbin/vsftpd" subj=system_u:system_r:ftpd_t:s0 key=(null) node=mary.example.com type=AVC msg=audit(1166023021.373:910): avc: denied { search } for pid=24427 comm="vsftpd" name="home" dev=dm-0 ino=9338881 scontext=system_u:system_r:ftpd_t:s0 tcontext=system_u:object_r:home_root_t:s0 tclass=dir node=tom.example.com type=SYSCALL msg=audit(1165963069.244:852): arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf96a830 a2=b5b1e8 a3=9e58ac0 items=0 ppid=21133 pid=21134 auid=3267 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts10 comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:httpd_t:s0 key=(null) node=tom.example.com type=AVC msg=audit(1165963069.244:852): avc: denied { name_connect } for pid=21134 comm="httpd" src=81 scontext=system_u:system_r:httpd_t:s0 tcontext=system_u:object_r:reserved_port_t:s0 tclass=tcp_socket node=dan.example.com type=AVC_PATH msg=audit(1166017682.366:877): path="/var/www/html/index.html" node=dan.example.com type=SYSCALL msg=audit(1166017682.366:877): arch=40000003 syscall=196 success=no exit=-13 a0=96226a8 a1=bf88b01c a2=31fff4 a3=2008171 items=0 ppid=23762 pid=23768 auid=3267 uid=48 gid=48 euid=48 suid=48 fsuid=48 egid=48 sgid=48 fsgid=48 tty=(none) comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:httpd_t:s0 key=(null) node=dan.example.com type=AVC msg=audit(1166017682.366:877): avc: denied { execute_no_trans } for pid=23768 comm="httpd" name="index.html" dev=dm-0 ino=7996439 scontext=system_u:system_r:httpd_t:s0 tcontext=system_u:object_r:var_t:s0 tclass=file node=judy.example.com type=SYSCALL msg=audit(1165963069.244:853): arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf96a830 a2=b5b1e8 a3=9e58ac0 items=0 ppid=21133 pid=21134 auid=3267 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts10 comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:httpd_t:s0 key=(null) node=judy.example.com type=AVC msg=audit(1165963069.244:853): avc: denied { name_connect } for pid=21134 comm="httpd" src=81 scontext=system_u:system_r:httpd_t:s0 tcontext=system_u:object_r:mysqld_port_t:s0 tclass=tcp_socket node=judy.example.com type=SYSCALL msg=audit(1165963069.244:853): arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf96a830 a2=b5b1e8 a3=9e58ac0 items=0 ppid=21133 pid=21134 auid=3267 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts10 comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:httpd_t:s0 key=(null) node=judy.example.com type=AVC msg=audit(1165963069.244:853): avc: denied { name_connect } for pid=21134 comm="httpd" src=81 scontext=system_u:system_r:httpd_t:s0 tcontext=system_u:object_r:reserved_port_t:s0 tclass=tcp_socket node=patty.example.com type=AVC_PATH msg=audit(1166036885.378:1097): path="/var/www/cgi-bin" node=patty.example.com type=SYSCALL msg=audit(1166036885.378:1097): arch=40000003 syscall=196 success=no exit=-13 a0=9624f38 a1=bf88b11c a2=31fff4 a3=2008171 items=0 ppid=23762 pid=23770 auid=3267 uid=48 gid=48 euid=48 suid=48 fsuid=48 egid=48 sgid=48 fsgid=48 tty=(none) comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:httpd_t:s0 key=(null) node=patty.example.com type=AVC msg=audit(1166036885.378:1097): avc: denied { execute } for pid=23770 comm="httpd" name="cgi-bin" dev=dm-0 ino=7995597 scontext=system_u:system_r:httpd_t:s0 tcontext=system_u:object_r:httpd_sys_script_exec_t:s0 tclass=file node=sam.example.com type=SYSCALL msg=audit(1166038880.318:1103): arch=40000003 syscall=5 success=no exit=-13 a0=bf96f068 a1=18800 a2=0 a3=bf973110 items=0 ppid=23765 pid=12387 auid=3267 uid=48 gid=48 euid=48 suid=48 fsuid=48 egid=48 sgid=48 fsgid=48 tty=(none) comm="sealert.cgi" exe="/usr/bin/perl" subj=system_u:system_r:httpd_sys_script_t:s0 key=(null) node=sam.example.com type=AVC msg=audit(1166038880.318:1103): avc: denied { write } for pid=12387 comm="sealert.cgi" name="sealert-upload" dev=dm-0 ino=8093724 scontext=system_u:system_r:httpd_t:s0 tcontext=system_u:object_r:httpd_sys_content_t:s0 tclass=file node=holycross.devel.redhat.com type=AVC_PATH msg=audit(1166027294.395:952): path="/home/devel/dwalsh/public_html" node=holycross.devel.redhat.com type=SYSCALL msg=audit(1166027294.395:952): arch=40000003 syscall=196 success=yes exit=0 a0=8495230 a1=849c830 a2=874ff4 a3=328d28 items=0 ppid=7234 pid=7236 auid=3267 uid=3267 gid=3267 euid=3267 suid=3267 fsuid=3267 egid=3267 sgid=3267 fsgid=3267 tty=(none) comm="vsftpd" exe="/usr/sbin/vsftpd" subj=system_u:system_r:ftpd_t:s0 key=(null) node=holycross.devel.redhat.com type=AVC msg=audit(1166027294.395:952): avc: denied { getattr } for pid=7236 comm="vsftpd" name="public_html" dev=dm-0 ino=9601649 scontext=system_u:system_r:ftpd_t:s0 tcontext=system_u:object_r:httpd_sys_content_t:s0 tclass=file host=dhcppc2 type=AVC msg=audit(1216729188.853:241): avc: denied { read } for pid=14066 comm="qemu-kvm" name="HelpdeskRHEL4-RHEL4.x86_64" dev=tmpfs ino=333 scontext=system_u:system_r:qemu_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file host=dhcppc2 type=SYSCALL msg=audit(1216729188.853:241): arch=c000003e syscall=2 success=no exit=-13 a0=7fff6f654680 a1=0 a2=1a4 a3=3342f67a70 items=0 ppid=2953 pid=14066 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="qemu-kvm" exe="/usr/bin/qemu-kvm" subj=system_u:system_r:qemu_t:s0 key=(null) node=mallorn.farre.nom type=AVC msg=audit(1228276291.360:466): avc: denied { execute } for pid=13015 comm="npviewer.bin" path="/opt/real/RealPlayer/mozilla/nphelix.so" dev=dm-0 ino=2850912 scontext=unconfined_u:unconfined_r:nsplugin_t:s0 tcontext=unconfined_u:object_r:usr_t:s0 tclass=file node=mallorn.farre.nom type=SYSCALL msg=audit(1228276291.360:466): arch=40000003 syscall=192 success=no exit=-13 a0=0 a1=9eec a2=5 a3=802 items=0 ppid=13014 pid=13015 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=63 comm="npviewer.bin" exe="/usr/lib/nspluginwrapper/npviewer.bin" subj=unconfined_u:unconfined_r:nsplugin_t:s0 key=(null) node=mary.example.com type=SYSCALL msg=audit(1166023021.373:910): arch=40000003 syscall=12 success=no exit=-13 a0=8493cd8 a1=cc3 a2=3282ec a3=bf992a04 items=0 ppid=24423 pid=24427 auid=3267 uid=0 gid=0 euid=3267 suid=3267 fsuid=3267 egid=3267 sgid=3267 fsgid=3267 tty=(none) comm="vssmbd" exe="/usr/sbin/vssmbd" subj=system_u:system_r:smbd_t:s0 key=(null) node=mary.example.com type=AVC msg=audit(1166023021.373:910): avc: denied { read } for pid=24427 comm="vssmbd" name="home" dev=dm-0 ino=9338881 scontext=system_u:system_r:smbd_t:s0 tcontext=system_u:object_r:ssh_home_t:s0 tclass=file node=lilly.example.com type=AVC_PATH msg=audit(1164783469.561:109): path="/linuxtest/LVT/lvt/log.current" node=lilly.example.com type=SYSCALL msg=audit(1164783469.561:109): arch=14 syscall=11 success=yes exit=0 a0=10120520 a1=10120a78 a2=10120970 a3=118 items=0 ppid=8310 pid=8311 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="smbd" exe="/usr/sbin/smbd" subj=root:system_r:smbd_t:s0 key=(null) node=lilly.example.com type=AVC msg=audit(1164783469.561:109): avc: denied { append } for pid=8311 comm="smbd" name="log.current" dev=dm-0 ino=130930 scontext=root:system_r:smbd_t:s0 tcontext=root:object_r:default_t:s0 tclass=dir node=lilly.example.com type=AVC msg=audit(1164783469.561:109): avc: denied { ioctl } for pid=8311 comm="smbd" name="log.current" ioctlcmd=0x2a scontext=root:system_r:smbd_t:s0 tcontext=root:object_r:default_t:s0 tclass=tcp_socket selinux-python-3.0/audit2allow/test_audit2allow.py000066400000000000000000000045741356774067000225020ustar00rootroot00000000000000import unittest import os import os.path import sys from tempfile import mkdtemp from subprocess import Popen, PIPE class Audit2allowTests(unittest.TestCase): def assertDenied(self, err): self.assertTrue('Permission denied' in err, '"Permission denied" not found in %r' % err) def assertNotFound(self, err): self.assertTrue('not found' in err, '"not found" not found in %r' % err) def assertFailure(self, status): self.assertTrue(status != 0, '"Succeeded when it should have failed') def assertSuccess(self, cmd, status, err): self.assertTrue(status == 0, '"%s should have succeeded for this test %r' % (cmd, err)) def test_sepolgen_ifgen(self): "Verify sepolgen-ifgen works" temp_directory = mkdtemp(suffix='audit2allow_test') output_file = os.path.join(temp_directory, 'interface_info') p = Popen([ sys.executable, './sepolgen-ifgen', '-p', 'test_dummy_policy', '-o', output_file, '--attr-helper', './sepolgen-ifgen-attr-helper' ], stdout=PIPE) out, err = p.communicate() if err: print(out, err) self.assertSuccess("sepolgen-ifgen", p.returncode, err) os.unlink(output_file) os.rmdir(temp_directory) def test_audit2allow(self): "Verify audit2allow works" p = Popen([sys.executable, './audit2allow', '-p', 'test_dummy_policy', '-i', 'test.log'], stdout=PIPE) out, err = p.communicate() if err: print(out, err) self.assertSuccess("audit2allow", p.returncode, err) def test_audit2why(self): "Verify audit2why works" p = Popen([sys.executable, './audit2why', '-p', 'test_dummy_policy', '-i', 'test.log'], stdout=PIPE) out, err = p.communicate() if err: print(out, err) self.assertSuccess("audit2why", p.returncode, err) def test_xperms(self): "Verify that xperms generation works" p = Popen([sys.executable, './audit2allow', '-x', '-p', 'test_dummy_policy', '-i', 'test.log'], stdout=PIPE) out, err = p.communicate() if err: print(out, err) self.assertTrue(b"allowxperm" in out) self.assertSuccess("xperms", p.returncode, err) if __name__ == "__main__": unittest.main() selinux-python-3.0/audit2allow/test_dummy_policy.cil000066400000000000000000000034351356774067000230770ustar00rootroot00000000000000; This is a dummy policy which main aim is to be compatible with test.log ; Define one category and one sensitivity in order to make things work (mls true) (category c0) (categoryorder (c0)) (sensitivity s0) (sensitivityorder (s0)) (sensitivitycategory s0 (c0)) ; Define some users and roles (user system_u) (user root) (user unconfined_u) (role system_r) (role unconfined_r) (userrole root system_r) (userrole system_u system_r) (userrole unconfined_u unconfined_r) (userlevel system_u (s0)) (userlevel root (s0)) (userlevel unconfined_u (s0)) (userrange system_u ((s0)(s0 (c0)))) (userrange root ((s0)(s0 (c0)))) (userrange unconfined_u ((s0)(s0 (c0)))) ; Define domain types (type automount_t) (type ftpd_t) (type httpd_t) (type kernel_t) (type nsplugin_t) (type postfix_local_t) (type qemu_t) (type smbd_t) (roletype system_r automount_t) (roletype system_r ftpd_t) (roletype system_r httpd_t) (roletype system_r kernel_t) (roletype system_r postfix_local_t) (roletype system_r qemu_t) (roletype system_r smbd_t) (roletype unconfined_r nsplugin_t) ; Define file types (type automount_lock_t) (type default_t) (type fixed_disk_device_t) (type home_root_t) (type httpd_sys_content_t) (type httpd_sys_script_exec_t) (type mail_spool_t) (type ssh_home_t) (type usr_t) (type var_t) ; Define port types (type mysqld_port_t) (type reserved_port_t) ; Define initial SID (sid kernel) (sidorder (kernel)) (sidcontext kernel (system_u system_r kernel_t ((s0) (s0)))) ; Define classes (class blk_file (getattr open read write)) (class dir (append open search)) (class file (execute execute_no_trans getattr open read write)) (class tcp_socket (ioctl name_bind name_connect)) (classorder (blk_file file dir tcp_socket)) ; The policy compiler requires at least one rule (allow kernel_t default_t (file (open read write))) selinux-python-3.0/chcat/000077500000000000000000000000001356774067000154635ustar00rootroot00000000000000selinux-python-3.0/chcat/Makefile000066400000000000000000000010321356774067000171170ustar00rootroot00000000000000# Installation directories. LINGUAS ?= ru PREFIX ?= /usr BINDIR ?= $(PREFIX)/bin MANDIR ?= $(PREFIX)/share/man .PHONY: all all: chcat install: all -mkdir -p $(DESTDIR)$(BINDIR) install -m 755 chcat $(DESTDIR)$(BINDIR) -mkdir -p $(DESTDIR)$(MANDIR)/man8 install -m 644 chcat.8 $(DESTDIR)$(MANDIR)/man8/ for lang in $(LINGUAS) ; do \ if [ -e $${lang} ] ; then \ mkdir -p $(DESTDIR)$(MANDIR)/$${lang}/man8 ; \ install -m 644 $${lang}/*.8 $(DESTDIR)$(MANDIR)/$${lang}/man8/ ; \ fi ; \ done clean: indent: relabel: test: selinux-python-3.0/chcat/chcat000077500000000000000000000330231356774067000164740ustar00rootroot00000000000000#!/usr/bin/python3 -Es # Copyright (C) 2005 Red Hat # see file 'COPYING' for use and warranty information # # chcat is a script that allows you modify the Security label on a file # # Author: Daniel Walsh # # This program is free software; you can redistribute it and/or # modify it under the terms of the GNU General Public License as # published by the Free Software Foundation; either version 2 of # the License, or (at your option) any later version. # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program; if not, write to the Free Software # Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA # 02111-1307 USA # # import subprocess import sys import os import pwd import getopt import selinux import seobject PROGNAME = "policycoreutils" try: import gettext kwargs = {} if sys.version_info < (3,): kwargs['unicode'] = True gettext.install(PROGNAME, localedir="/usr/share/locale", codeset='utf-8', **kwargs) except ImportError: try: import builtins builtins.__dict__['_'] = str except ImportError: import __builtin__ __builtin__.__dict__['_'] = unicode def errorExit(error): sys.stderr.write("%s: " % sys.argv[0]) sys.stderr.write("%s\n" % error) sys.stderr.flush() sys.exit(1) def verify_users(users): for u in users: try: pwd.getpwnam(u) except KeyError: error("User %s does not exist" % u) def chcat_user_add(newcat, users): errors = 0 logins = seobject.loginRecords() seusers = logins.get_all() add_ind = 0 verify_users(users) for u in users: if u in seusers.keys(): user = seusers[u] else: add_ind = 1 user = seusers["__default__"] serange = user[1].split("-") cats = [] top = ["s0"] if len(serange) > 1: top = serange[1].split(":") if len(top) > 1: cats = expandCats(top[1].split(',')) for i in newcat[1:]: if i not in cats: cats.append(i) if len(cats) > 0: new_serange = "%s-%s:%s" % (serange[0], top[0], ",".join(cats)) else: new_serange = "%s-%s" % (serange[0], top[0]) if add_ind: cmd = ["semanage", "login", "-a", "-r", new_serange, "-s", user[0], u] else: cmd = ["semanage", "login", "-m", "-r", new_serange, "-s", user[0], u] try: subprocess.check_call(cmd, stderr=subprocess.STDOUT, shell=False) except subprocess.CalledProcessError: errors += 1 return errors def chcat_add(orig, newcat, objects, login_ind): if len(newcat) == 1: raise ValueError(_("Requires at least one category")) if login_ind == 1: return chcat_user_add(newcat, objects) errors = 0 sensitivity = newcat[0] cat = newcat[1] for f in objects: (rc, c) = selinux.getfilecon(f) con = c.split(":")[3:] clist = translate(con) if sensitivity != clist[0]: print(_("Can not modify sensitivity levels using '+' on %s") % f) if len(clist) > 1: if cat in clist[1:]: print(_("%s is already in %s") % (f, orig)) continue clist.append(cat) cats = clist[1:] cats.sort() cat_string = cats[0] for c in cats[1:]: cat_string = "%s,%s" % (cat_string, c) else: cat_string = cat cmd = ["chcon", "-l", "%s:%s" % (sensitivity, cat_string), f] try: subprocess.check_call(cmd, stderr=subprocess.STDOUT, shell=False) except subprocess.CalledProcessError: errors += 1 return errors def chcat_user_remove(newcat, users): errors = 0 logins = seobject.loginRecords() seusers = logins.get_all() add_ind = 0 verify_users(users) for u in users: if u in seusers.keys(): user = seusers[u] else: add_ind = 1 user = seusers["__default__"] serange = user[1].split("-") cats = [] top = ["s0"] if len(serange) > 1: top = serange[1].split(":") if len(top) > 1: cats = expandCats(top[1].split(',')) for i in newcat[1:]: if i in cats: cats.remove(i) if len(cats) > 0: new_serange = "%s-%s:%s" % (serange[0], top[0], ",".join(cats)) else: new_serange = "%s-%s" % (serange[0], top[0]) if add_ind: cmd = ["semanage", "login", "-a", "-r", new_serange, "-s", user[0], u] else: cmd = ["semanage", "login", "-m", "-r", new_serange, "-s", user[0], u] try: subprocess.check_call(cmd, stderr=subprocess.STDOUT, shell=False) except subprocess.CalledProcessError: errors += 1 return errors def chcat_remove(orig, newcat, objects, login_ind): if len(newcat) == 1: raise ValueError(_("Requires at least one category")) if login_ind == 1: return chcat_user_remove(newcat, objects) errors = 0 sensitivity = newcat[0] cat = newcat[1] for f in objects: (rc, c) = selinux.getfilecon(f) con = c.split(":")[3:] clist = translate(con) if sensitivity != clist[0]: print(_("Can not modify sensitivity levels using '+' on %s") % f) continue if len(clist) > 1: if cat not in clist[1:]: print(_("%s is not in %s") % (f, orig)) continue clist.remove(cat) if len(clist) > 1: cat = clist[1] for c in clist[2:]: cat = "%s,%s" % (cat, c) else: cat = "" else: print(_("%s is not in %s") % (f, orig)) continue if len(cat) == 0: new_serange = sensitivity else: new_serange = '%s:%s' % (sensitivity, cat) cmd = ["chcon", "-l", new_serange, f] try: subprocess.check_call(cmd, stderr=subprocess.STDOUT, shell=False) except subprocess.CalledProcessError: errors += 1 return errors def chcat_user_replace(newcat, users): errors = 0 logins = seobject.loginRecords() seusers = logins.get_all() add_ind = 0 verify_users(users) for u in users: if u in seusers.keys(): user = seusers[u] else: add_ind = 1 user = seusers["__default__"] serange = user[1].split("-") new_serange = "%s-%s:%s" % (serange[0], newcat[0], ",".join(newcat[1:])) if new_serange[-1:] == ":": new_serange = new_serange[:-1] if add_ind: cmd = ["semanage", "login", "-a", "-r", new_serange, "-s", user[0], u] else: cmd = ["semanage", "login", "-m", "-r", new_serange, "-s", user[0], u] try: subprocess.check_call(cmd, stderr=subprocess.STDOUT, shell=False) except subprocess.CalledProcessError: errors += 1 return errors def chcat_replace(newcat, objects, login_ind): if login_ind == 1: return chcat_user_replace(newcat, objects) errors = 0 # newcat[0] is the sensitivity level, newcat[1:] are the categories if len(newcat) == 1: new_serange = newcat[0] else: new_serange = "%s:%s" % (newcat[0], newcat[1]) for cat in newcat[2:]: new_serange = '%s,%s' % (new_serange, cat) cmd = ["chcon", "-l", new_serange] + objects try: subprocess.check_call(cmd, stderr=subprocess.STDOUT, shell=False) except subprocess.CalledProcessError: errors += 1 return errors def check_replace(cats): plus_ind = 0 replace_ind = 0 for c in cats: if len(c) > 0 and (c[0] == "+" or c[0] == "-"): if replace_ind: raise ValueError(_("Can not combine +/- with other types of categories")) plus_ind = 1 else: replace_ind = 1 if plus_ind: raise ValueError(_("Can not combine +/- with other types of categories")) return replace_ind def isSensitivity(sensitivity): if sensitivity[0] == "s" and sensitivity[1:].isdigit() and int(sensitivity[1:]) in range(0, 16): return 1 else: return 0 def expandCats(cats): newcats = [] for c in cats: for i in c.split(","): if i.find(".") != -1: j = i.split(".") for k in range(int(j[0][1:]), int(j[1][1:]) + 1): x = ("c%d" % k) if x not in newcats: newcats.append(x) else: if i not in newcats: newcats.append(i) if len(newcats) > 25: return cats return newcats def translate(cats): newcat = [] if len(cats) == 0: newcat.append("s0") return newcat for c in cats: (rc, raw) = selinux.selinux_trans_to_raw_context("a:b:c:%s" % c) rlist = raw.split(":")[3:] tlist = [] if isSensitivity(rlist[0]) == 0: tlist.append("s0") for i in expandCats(rlist): tlist.append(i) else: tlist.append(rlist[0]) for i in expandCats(rlist[1:]): tlist.append(i) if len(newcat) == 0: newcat.append(tlist[0]) else: if newcat[0] != tlist[0]: raise ValueError(_("Can not have multiple sensitivities")) for i in tlist[1:]: newcat.append(i) return newcat def usage(): print(_("Usage %s CATEGORY File ...") % sys.argv[0]) print(_("Usage %s -l CATEGORY user ...") % sys.argv[0]) print(_("Usage %s [[+|-]CATEGORY],...] File ...") % sys.argv[0]) print(_("Usage %s -l [[+|-]CATEGORY],...] user ...") % sys.argv[0]) print(_("Usage %s -d File ...") % sys.argv[0]) print(_("Usage %s -l -d user ...") % sys.argv[0]) print(_("Usage %s -L") % sys.argv[0]) print(_("Usage %s -L -l user") % sys.argv[0]) print(_("Use -- to end option list. For example")) print(_("chcat -- -CompanyConfidential /docs/businessplan.odt")) print(_("chcat -l +CompanyConfidential juser")) sys.exit(1) def listcats(): fd = open(selinux.selinux_translations_path()) for l in fd.read().split("\n"): if l.startswith("#"): continue if l.find("=") != -1: rec = l.split("=") print("%-30s %s" % tuple(rec)) fd.close() return 0 def listusercats(users): if len(users) == 0: try: users.append(os.getlogin()) except OSError: users.append(pwd.getpwuid(os.getuid()).pw_name) verify_users(users) for u in users: cats = seobject.translate(selinux.getseuserbyname(u)[2]) cats = cats.split("-") if len(cats) > 1 and cats[1] != "s0": print("%s: %s" % (u, cats[1])) else: print("%s: %s" % (u, cats[0])) def error(msg): print("%s: %s" % (sys.argv[0], msg)) sys.exit(1) if __name__ == '__main__': if selinux.is_selinux_mls_enabled() != 1: error("Requires a mls enabled system") if selinux.is_selinux_enabled() != 1: error("Requires an SELinux enabled system") delete_ind = 0 list_ind = 0 login_ind = 0 try: gopts, cmds = getopt.getopt(sys.argv[1:], 'dhlL', ['list', 'login', 'help', 'delete']) for o, a in gopts: if o == "-h" or o == "--help": usage() if o == "-d" or o == "--delete": delete_ind = 1 if o == "-L" or o == "--list": list_ind = 1 if o == "-l" or o == "--login": login_ind = 1 if list_ind == 0 and len(cmds) < 1: usage() except getopt.error as error: errorExit(_("Options Error %s ") % error.msg) except ValueError: usage() if delete_ind: sys.exit(chcat_replace(["s0"], cmds, login_ind)) if list_ind: if login_ind: sys.exit(listusercats(cmds)) else: if len(cmds) > 0: usage() sys.exit(listcats()) if len(cmds) < 2: usage() set_ind = 0 cats = cmds[0].split(",") mod_ind = 0 errors = 0 objects = cmds[1:] try: if check_replace(cats): errors = chcat_replace(translate(cats), objects, login_ind) else: for c in cats: l = [] l.append(c[1:]) if len(c) > 0 and c[0] == "+": errors += chcat_add(c[1:], translate(l), objects, login_ind) continue if len(c) > 0 and c[0] == "-": errors += chcat_remove(c[1:], translate(l), objects, login_ind) continue except ValueError as e: error(e) except OSError as e: error(e) sys.exit(errors) selinux-python-3.0/chcat/chcat.8000066400000000000000000000022521356774067000166370ustar00rootroot00000000000000.TH CHCAT "8" "September 2005" "chcat" "User Commands" .SH NAME chcat \- change file SELinux security category .SH SYNOPSIS .B chcat \fIcategory file\fR... .br .B chcat -l \fIcategory user\fR... .br .B chcat \fI[[+|-]category...] file\fR... .br .B chcat -l \fI[[+|-]category...] user\fR... .br .B chcat [\fI-d\fR] \fIfile\fR... .br .B chcat -l [\fI-d\fR] \fIuser\fR... .br .B chcat \fI-L\fR [ \-l ] [ user ... ] .br .SH DESCRIPTION .PP Change/Remove the security \fIcategory\fR for each \fIfile\fR or \fIuser\fR. .PP Use +/- to add/remove categories from a \fIfile\fR or \fIuser\fR. .PP .B Note: When removing a category you must specify '\-\-' on the command line before using the \-Category syntax. This tells the command that you have finished entering options and are now specifying a category name instead. .TP \fB\-d\fR delete the category from each FILE/USER. .TP \fB\-L\fR list available categories. .TP \fB\-l\fR Tells chcat to operate on users instead of files. .SH "SEE ALSO" .TP chcon(1), selinux(8), semanage(8) .PP .br When operating on files this script wraps the chcon command. .SH "FILES" /etc/selinux/{SELINUXTYPE}/setrans.conf .br /etc/selinux/{SELINUXTYPE}/seusers selinux-python-3.0/chcat/ru/000077500000000000000000000000001356774067000161115ustar00rootroot00000000000000selinux-python-3.0/chcat/ru/chcat.8000066400000000000000000000036301356774067000172660ustar00rootroot00000000000000.TH CHCAT "8" "Сентябрь 2005" "chcat" "Команды пользователя" .SH ИМЯ chcat \- изменить SELinux-категорию безопасности файла .SH ОБЗОР .B chcat \fIcategory file\fR... .br .B chcat -l \fIcategory user\fR... .br .B chcat \fI[[+|-]category...] file\fR... .br .B chcat -l \fI[[+|-]category...] user\fR... .br .B chcat [\fI-d\fR] \fIfile\fR... .br .B chcat -l [\fI-d\fR] \fIuser\fR... .br .B chcat \fI-L\fR [ \-l ] [ user ... ] .br .SH ОПИСАНИЕ .PP Изменить/Удалить категорию безопасности \fIcategory\fR для каждого файла \fIfile\fR или пользователя \fIuser\fR. .PP Используйте +/- для добавления/удаления категорий из \fIfile\fR или \fIuser\fR. .PP .B Примечание: При удалении категории необходимо указать '\-\-' в командной строке перед использованием синтаксиса \-Category. Это сообщает команде, что вы закончили вводить параметры и теперь указываете имя категории. .TP \fB\-d\fR удалить категорию из каждого FILE/USER. .TP \fB\-L\fR вывести список доступных категорий. .TP \fB\-l\fR если используется, chcat будет работать с пользователями, а не с файлами. .SH "СМОТРИТЕ ТАКЖЕ" .TP chcon(1), selinux(8), semanage(8) .PP .br При работе с файлами этот сценарий вызывает команду chcon. .SH "FILES" /etc/selinux/{SELINUXTYPE}/setrans.conf .br /etc/selinux/{SELINUXTYPE}/seusers .SH "АВТОРЫ" Перевод на русский язык выполнила Герасименко Олеся selinux-python-3.0/semanage/000077500000000000000000000000001356774067000161615ustar00rootroot00000000000000selinux-python-3.0/semanage/Makefile000066400000000000000000000022421356774067000176210ustar00rootroot00000000000000PYTHON ?= python3 # Installation directories. LINGUAS ?= ru PREFIX ?= /usr SBINDIR ?= $(PREFIX)/sbin MANDIR = $(PREFIX)/share/man PYTHONLIBDIR ?= $(shell $(PYTHON) -c "from distutils.sysconfig import *; print(get_python_lib(prefix='$(PREFIX)'))") PACKAGEDIR ?= $(PYTHONLIBDIR) BASHCOMPLETIONDIR ?= $(PREFIX)/share/bash-completion/completions TARGETS=semanage BASHCOMPLETIONS=semanage-bash-completion.sh all: $(TARGETS) install: all [ -d $(DESTDIR)$(MANDIR)/man8 ] || mkdir -p $(DESTDIR)$(MANDIR)/man8 -mkdir -p $(DESTDIR)$(SBINDIR) install -m 755 semanage $(DESTDIR)$(SBINDIR) install -m 644 *.8 $(DESTDIR)$(MANDIR)/man8 for lang in $(LINGUAS) ; do \ if [ -e $${lang} ] ; then \ [ -d $(DESTDIR)$(MANDIR)/$${lang}/man8 ] || mkdir -p $(DESTDIR)$(MANDIR)/$${lang}/man8 ; \ install -m 644 $${lang}/*.8 $(DESTDIR)$(MANDIR)/$${lang}/man8/ ; \ fi ; \ done test -d $(DESTDIR)/$(PACKAGEDIR) || install -m 755 -d $(DESTDIR)/$(PACKAGEDIR) install -m 644 seobject.py $(DESTDIR)/$(PACKAGEDIR) -mkdir -p $(DESTDIR)$(BASHCOMPLETIONDIR) install -m 644 $(BASHCOMPLETIONS) $(DESTDIR)$(BASHCOMPLETIONDIR)/semanage test: @$(PYTHON) test-semanage.py -a clean: indent: relabel: selinux-python-3.0/semanage/ru/000077500000000000000000000000001356774067000166075ustar00rootroot00000000000000selinux-python-3.0/semanage/ru/semanage-boolean.8000066400000000000000000000057341356774067000221060ustar00rootroot00000000000000.TH "semanage-boolean" "8" "20130617" "" "" .SH "ИМЯ" semanage\-boolean \- утилита для управления политикой SELinux, основанная на использовании логических переключателей .SH "ОБЗОР" .B semanage boolean [\-h] [\-n] [\-N] [\-S STORE] [ \-\-extract | \-\-deleteall | \-\-list [\-C] | \-\-modify ( \-\-on | \-\-off ) boolean ] .SH "ОПИСАНИЕ" Команда semanage используется для настройки определённых элементов политики SELinux без необходимости изменения или перекомпиляции исходного текста политики. Команда semanage boolean управляет настройками логических переключателей в политике SELinux. Логические переключатели - это правила if\-then\-else, записанные в политике SELinux. Их можно использовать для настройки того, как правила политики SELinux влияют на ограниченный домен. .SH "ПАРАМЕТРЫ" .TP .I \-h, \-\-help показать это справочное сообщение и выйти .TP .I \-n, \-\-noheading не показывать заголовок при выводе указанного типа объекта .TP .I \-N, \-\-noreload не перезагружать политику после фиксации .TP .I \-S STORE, \-\-store STORE выбрать для управления альтернативное хранилище политики SELinux .TP .I \-C, \-\-locallist вывести список локальных настроек .TP .I \-m, \-\-modify изменить запись указанного типа объекта .TP .I \-l, \-\-list вывести список записей указанного типа объекта .TP .I \-E, \-\-extract извлечь настраиваемые команды для использования в транзакции .TP .I \-D, \-\-deleteall удалить все локальные настройки .TP .I \-1, \-\-on включить логический переключатель .TP .I \-0, \-\-off отключить логический переключатель .SH ПРИМЕР .nf Включить на apache логический переключатель can send mail # semanage boolean \-m \-\-on httpd_can_sendmail Вывести список настраиваемых логических переключателей # semanage boolean \-l \-C .SH "СМОТРИТЕ ТАКЖЕ" .BR selinux (8), .BR semanage (8), .BR setsebool (8), .BR getsebool (8) .SH "АВТОРЫ" Эта man-страница была написана Daniel Walsh . Перевод на русский язык выполнила Герасименко Олеся . selinux-python-3.0/semanage/ru/semanage-dontaudit.8000066400000000000000000000043061356774067000224540ustar00rootroot00000000000000.TH "semanage-dontaudit" "8" "20130617" "" "" .SH "ИМЯ" .B semanage\-dontaudit \- утилита dontaudit для управления политикой SELinux .SH "ОБЗОР" .B semanage dontaudit [\-h] [\-S STORE] [\-N] {on,off} .SH "ОПИСАНИЕ" semanage используется для настройки определённых элементов политики SELinux без необходимости изменения или перекомпиляции исходного текста политики. Команда semanage dontaudit определяет, будут ли правила dontaudit присутствовать в политике. Авторы политик применяют правила dontaudit для того, чтобы ограниченные приложения использовали альтернативные пути. При использовании правил dontaudit отказы в доступе выполняются, но не журналируются. Иногда использование правил dontaudit вызывает ошибки в приложениях (но авторы политик не знают о них, так как аудит кэша вектора доступа не выполняется). Отключите правила dontaudit с помощью этой команды, чтобы проверить, блокирует ли ядро доступ. .SH "ПАРАМЕТРЫ" .TP .I \-h, \-\-help Показать это справочное сообщение и выйти .TP .I \-S STORE, \-\-store STORE Выбрать для управления альтернативное хранилище политики SELinux .TP .I \-N, \-\-noreload Не перезагружать политику после фиксации .SH ПРИМЕР .nf Отключить правила dontaudit # semanage dontaudit off .SH "СМОТРИТЕ ТАКЖЕ" .BR selinux (8), .BR semanage (8) .SH "АВТОРЫ" Эта man-страница была написана Daniel Walsh . Перевод на русский язык выполнила Герасименко Олеся . selinux-python-3.0/semanage/ru/semanage-export.8000066400000000000000000000034701356774067000220030ustar00rootroot00000000000000.TH "semanage-export" "8" "20130617" "" "" .SH "ИМЯ" .B semanage\-export \- утилита импорта для управления политикой SELinux .SH "ОБЗОР" .B semanage export [\-h] [\-S STORE] [\-f OUTPUT_FILE] .SH "ОПИСАНИЕ" semanage используется для настройки определённых элементов политики SELinux без необходимости изменения или перекомпиляции исходного текста политики. Команды semanage import и semanage export можно использовать, чтобы извлечь изменения SELinux на одном компьютере и применить их к другому. В файл можно поместить целую группу команд semanage и применить их к компьютеру в одной транзакции. .SH "ПАРАМЕТРЫ" .TP .I \-h, \-\-help показать это справочное сообщение и выйти .TP .I \-S STORE, \-\-store STORE выбрать для управления альтернативное хранилище политики SELinux .TP .I \-f OUTPUT_FILE, \-\-output_file OUTPUT_FILE выходной файл .SH ПРИМЕР .nf Импортировать изменения semanage с другого компьютера # semanage export \-f semanage.mods # scp semanage.mod remotemachine: # ssh remotemachine # semanage import \-f semanage.mods .SH "СМОТРИТЕ ТАКЖЕ" .BR selinux (8), .BR semanage (8), .BR semanage-import (8) .SH "АВТОРЫ" Эта man-страница была написана Daniel Walsh . Перевод на русский язык выполнила Герасименко Олеся . selinux-python-3.0/semanage/ru/semanage-fcontext.8000066400000000000000000000130501356774067000223070ustar00rootroot00000000000000.TH "semanage-fcontext" "8" "20130617" "" "" .SH "ИМЯ" semanage\-fcontext \- утилита для управления политикой SELinux, предназначенная для работы с контекстами файлов .SH "ОБЗОР" .B semanage fcontext [\-h] [\-n] [\-N] [\-S STORE] [ \-\-add ( \-t TYPE \-f FTYPE \-r RANGE \-s SEUSER | \-e EQUAL ) FILE_SPEC ) | \-\-delete ( \-t TYPE \-f FTYPE | \-e EQUAL ) FILE_SPEC ) | \-\-deleteall | \-\-extract | \-\-list [\-C] | \-\-modify ( \-t TYPE \-f FTYPE \-r RANGE \-s SEUSER | \-e EQUAL ) FILE_SPEC ) ] .SH "ОПИСАНИЕ" semanage используется для настройки определённых элементов политики SELinux без необходимости изменения или перекомпиляции исходного текста политики. Команда semanage fcontext используется для управления проставлением меток по умолчанию в файловой системе в системе SELinux. Эта команда с помощью регулярных выражений сопоставляет пути файлов с метками SELinux. .SH "ПАРАМЕТРЫ" .TP .I \-h, \-\-help показать это справочное сообщение и выйти .TP .I \-n, \-\-noheading не показывать заголовок при выводе указанного типа объекта .TP .I \-N, \-\-noreload не перезагружать политику после фиксации .TP .I \-C, \-\-locallist вывести список локальных настроек .TP .I \-S STORE, \-\-store STORE выбрать для управления альтернативное хранилище политики SELinux .TP .I \-a, \-\-add добавить запись указанного типа объекта .TP .I \-d, \-\-delete удалить запись указанного типа объекта .TP .I \-m, \-\-modify изменить запись указанного типа объекта .TP .I \-l, \-\-list вывести список записей указанного типа объекта .TP .I \-E, \-\-extract извлечь настраиваемые команды для использования в транзакции .TP .I \-D, \-\-deleteall удалить все локальные настройки .TP .I \-e EQUAL, \-\-equal EQUAL Заменить путь к цели на путь к источнику при создании меток по умолчанию. Используется с fcontext. Необходимы аргументы путей к источнику и цели. Для целевого поддерева метки контекста будут проставляться тем же образом, который задан для источника. .TP .I \-f [{a,f,d,c,b,s,l,p}], \-\-ftype [{a,f,d,c,b,s,l,p}] Тип файла. Используется с fcontext. Требуется тип файла (показывается в поле режима по команде ls); например, используйте 'd' для соответствия только каталогам или 'f' для соответствия только обычным файлам. Могут передаваться следующие параметры типа файла: f (обычный файл), d (каталог), c (устройство символьного ввода-вывода), b (устройство блочного ввода-вывода), s (сокет), l (символическая ссылка), p (именованный канал). Если вы не укажете тип файла, по умолчанию будет установлен тип "all files" (все файлы). .TP .I \-s SEUSER, \-\-seuser SEUSER имя пользователя SELinux .TP .I \-t TYPE, \-\-type TYPE SELinux-тип для объекта .TP .I \-r RANGE, \-\-range RANGE диапазон безопасности MLS/MCS (только для систем с поддержкой MLS/MCS). По умолчанию SELinux-диапазон для сопоставления имени входа SELinux принимает значение диапазона записи пользователя SELinux. По умолчанию SELinux-диапазон для пользователя SELinux принимает значение s0. .SH ПРИМЕР .nf .I выполните restorecon после установки контекста файлов Добавьте контекст файлов для всего, что находится в /web # semanage fcontext \-a \-t httpd_sys_content_t "/web(/.*)?" # restorecon \-R \-v /web Замените /home1 на /home при установке контекста файлов # semanage fcontext \-a \-e /home /home1 # restorecon \-R \-v /home1 Выполните следующие команды для домашних каталогов, находящихся ниже каталога верхнего уровня, например /disk6/home # semanage fcontext \-a \-t home_root_t "/disk6" # semanage fcontext \-a \-e /home /disk6/home # restorecon \-R \-v /disk6 .SH "СМОТРИТЕ ТАКЖЕ" .BR selinux (8), .BR semanage (8) .SH "АВТОРЫ" Эта man-страница была написана Daniel Walsh . Перевод на русский язык выполнила Герасименко Олеся . selinux-python-3.0/semanage/ru/semanage-ibendport.8000066400000000000000000000066571356774067000224620ustar00rootroot00000000000000.TH "semanage-ibendport" "8" "20170508" "" "" .SH "ИМЯ" .B semanage\-ibendport \- утилита для управления политикой SELinux, предназначенная для сопоставления конечных портов infiniband .SH "ОБЗОР" .B semanage ibendport [\-h] [\-n] [\-N] [\-S STORE] [ \-\-add \-t TYPE \-z IBDEV_NAME \-r RANGE port | \-\-delete \-z IBDEV_NAME port | \-\-deleteall | \-\-extract | \-\-list [\-C] | \-\-modify \-t TYPE \-z IBDEV_NAME \-r RANGE port ] .SH "ОПИСАНИЕ" semanage используется для настройки определённых элементов политики SELinux без необходимости изменения или перекомпиляции исходного текста политики. semanage ibendport управляет определениями типов ibendport для номеров ibendport. .SH "ПАРАМЕТРЫ" .TP .I \-h, \-\-help показать это справочное сообщение и выйти .TP .I \-n, \-\-noheading не показывать заголовок при выводе указанного типа объекта .TP .I \-N, \-\-noreload не перезагружать политику после фиксации .TP .I \-S STORE, \-\-store STORE выбрать для управления альтернативное хранилище политики SELinux .TP .I \-C, \-\-locallist вывести список локальных настроек .TP .I \-a, \-\-add добавить запись указанного типа объекта .TP .I \-d, \-\-delete удалить запись указанного типа объекта .TP .I \-m, \-\-modify изменить запись указанного типа объекта .TP .I \-l, \-\-list вывести список записей указанного типа объекта .TP .I \-E, \-\-extract извлечь настраиваемые команды для использования в транзакции .TP .I \-D, \-\-deleteall удалить все локальные настройки .TP .I \-t TYPE, \-\-type TYPE SELinux-тип для объекта .TP .I \-r RANGE, \-\-range RANGE диапазон безопасности MLS/MCS (только для систем с поддержкой MLS/MCS). По умолчанию SELinux-диапазон для сопоставления имени входа SELinux принимает значение диапазона записи пользователя SELinux. По умолчанию SELinux-диапазон для пользователя SELinux принимает значение s0. .TP .I \-z IBDEV_NAME, \-\-ibdev_name IBDEV_NAME Имя устройства infiniband для порта, для которого следует проставить метку. (например, mlx5_0) .SH ПРИМЕР .nf Вывести список всех определений ibendport # semanage ibendport \-l Проставить метку 'устройство mlx4_0 порт 2' # semanage ibendport \-a \-t allowed_ibendport_t \-z mlx4_0 2 .SH "СМОТРИТЕ ТАКЖЕ" .BR selinux (8), .BR semanage (8) .SH "АВТОРЫ" Эта man-страница была написана Daniel Jurgens . Перевод на русский язык выполнила Герасименко Олеся . selinux-python-3.0/semanage/ru/semanage-ibpkey.8000066400000000000000000000070651356774067000217510ustar00rootroot00000000000000.TH "semanage-ibpkey" "8" "20170508" "" "" .SH "ИМЯ" .B semanage\-ibpkey \- утилита для управления политикой SELinux, предназначенная для сопоставления ключей разделов infiniband .SH "ОБЗОР" .B semanage ibpkey [\-h] [\-n] [\-N] [\-S STORE] [ \-\-add \-t TYPE \-x SUBNET_PREFIX \-r RANGE ibpkey_name | ibpkey_range | \-\-delete \-x SUBNET_PREFIX ibpkey_name | ibpkey_range | \-\-deleteall | \-\-extract | \-\-list [\-C] | \-\-modify \-t TYPE \-x SUBNET_PREFIX \-r RANGE ibpkey_name | ibpkey_range ] .SH "ОПИСАНИЕ" semanage используется для настройки определённых элементов политики SELinux без необходимости изменения или перекомпиляции исходного текста политики. Команда semanage ibpkey управляет определениями типов ibpkey для номеров ibpkey. .SH "ПАРАМЕТРЫ" .TP .I \-h, \-\-help показать это справочное сообщение и выйти .TP .I \-n, \-\-noheading не показывать заголовок при выводе указанного типа объекта .TP .I \-N, \-\-noreload не перезагружать политику после фиксации .TP .I \-S STORE, \-\-store STORE выбрать для управления альтернативное хранилище политики SELinux .TP .I \-C, \-\-locallist вывести список локальных настроек .TP .I \-a, \-\-add добавить запись указанного типа объекта .TP .I \-d, \-\-delete удалить запись указанного типа объекта .TP .I \-m, \-\-modify изменить запись указанного типа объекта .TP .I \-l, \-\-list вывести список записей указанного типа объекта .TP .I \-E, \-\-extract извлечь настраиваемые команды для использования в транзакции .TP .I \-D, \-\-deleteall удалить все локальные настройки .TP .I \-t TYPE, \-\-type TYPE SELinux-тип для объекта .TP .I \-r RANGE, \-\-range RANGE диапазон безопасности MLS/MCS (только для систем с поддержкой MLS/MCS). По умолчанию SELinux-диапазон для сопоставления имени входа SELinux принимает значение диапазона записи пользователя SELinux. По умолчанию SELinux-диапазон для пользователя SELinux принимает значение s0. .TP .I \-x SUBNET_PREFIX, \-\-subnet_prefix SUBNET_PREFIX Префикс подсети для указанного ключа раздела (pkey) или диапазона ключей раздела. .SH ПРИМЕР .nf Вывести список всех определений ibpkey # semanage ibpkey \-l Отметить pkey 0x8FFF (pkey ограниченного участия по умолчанию) как тип pkey по умолчанию # semanage ibpkey \-a \-t default_ibpkey_t \-x fe80:: 0x8FFF .SH "СМОТРИТЕ ТАКЖЕ" .BR selinux (8), .BR semanage (8) .SH "АВТОРЫ" Эта man-страница была написана Daniel Jurgens . Перевод на русский язык выполнила Герасименко Олеся . selinux-python-3.0/semanage/ru/semanage-import.8000066400000000000000000000035021356774067000217700ustar00rootroot00000000000000.TH "semanage-import" "8" "20130617" "" "" .SH "ИМЯ" .B semanage\-import \- утилита импорта для управления политикой SELinux .SH "ОБЗОР" .B semanage import [\-h] [\-N] [\-S STORE] [\-f INPUT_FILE] .SH "ОПИСАНИЕ" semanage используется для настройки определённых элементов политики SELinux без необходимости изменения или перекомпиляции исходного текста политики. Команды semanage import и semanage export можно использовать, чтобы извлечь изменения SELinux на одном компьютере и применить их к другому. В файл можно поместить целую группу команд semanage и применить их к компьютеру в одной транзакции. .SH "ПАРАМЕТРЫ" .TP .I \-h, \-\-help показать это справочное сообщение и выйти .TP .I \-N, \-\-noreload не перезагружать политику после фиксации .TP .I \-S STORE, \-\-store STORE выбрать для управления альтернативное хранилище политики SELinux .TP .I \-f INPUT_FILE, \-\-input_file INPUT_FILE входной файл .SH ПРИМЕР .nf Импортировать изменения semanage с другого компьютера # semanage import \-f semanage.mods .SH "СМОТРИТЕ ТАКЖЕ" .B selinux (8), .B semanage (8), .B semanage-export (8) .SH "АВТОРЫ" Эта man-страница была написана Daniel Walsh . Перевод на русский язык выполнила Герасименко Олеся . selinux-python-3.0/semanage/ru/semanage-interface.8000066400000000000000000000061001356774067000224130ustar00rootroot00000000000000.TH "semanage-interface" "8" "20130617" "" "" .SH "ИМЯ" .B semanage\-interface \- утилита для управления политикой SELinux, предназначенная для работы с сетевыми интерфейсами .SH "ОБЗОР" .B semanage interface [\-h] [\-n] [\-N] [\-S STORE] [ \-\-add \-t TYPE \-r RANGE interface | \-\-delete interface | \-\-deleteall | \-\-extract | \-\-list [\-C] | \-\-modify \-t TYPE \-r RANGE interface ] .SH "ОПИСАНИЕ" semanage используется для настройки определённых элементов политики SELinux без необходимости изменения или перекомпиляции исходного текста политики. Команда semanage interface управляет метками, которые назначаются сетевым интерфейсам. .SH "ПАРАМЕТРЫ" .TP .I \-h, \-\-help показать это справочное сообщение и выйти .TP .I \-n, \-\-noheading не показывать заголовок при выводе указанного типа объекта .TP .I \-N, \-\-noreload не перезагружать политику после фиксации .TP .I \-S STORE, \-\-store STORE выбрать для управления альтернативное хранилище политики SELinux .TP .I \-C, \-\-locallist вывести список локальных настроек .TP .I \-a, \-\-add добавить запись указанного типа объекта .TP .I \-d, \-\-delete удалить запись указанного типа объекта .TP .I \-m, \-\-modify изменить запись указанного типа объекта .TP .I \-l, \-\-list вывести список записей указанного типа объекта .TP .I \-E, \-\-extract извлечь настраиваемые команды для использования в транзакции .TP .I \-D, \-\-deleteall удалить все локальные настройки .TP .I \-t TYPE, \-\-type TYPE SELinux-тип для объекта .TP .I \-r RANGE, \-\-range RANGE диапазон безопасности MLS/MCS (только для систем с поддержкой MLS/MCS). По умолчанию SELinux-диапазон для сопоставления имени входа SELinux принимает значение диапазона записи пользователя SELinux. По умолчанию SELinux-диапазон для пользователя SELinux принимает значение s0. .SH ПРИМЕР .nf Вывести список всех определений интерфейсов # semanage interface \-l .SH "СМОТРИТЕ ТАКЖЕ" .BR selinux (8), .BR semanage (8) .SH "AUTHOR" Эта man-страница была написана Daniel Walsh . Перевод на русский язык выполнила Герасименко Олеся . selinux-python-3.0/semanage/ru/semanage-login.8000066400000000000000000000077751356774067000216060ustar00rootroot00000000000000.TH "semanage-login" "8" "20130617" "" "" .SH "ИМЯ" .B semanage\-login \- утилита для управления политикой SELinux, предназначенная для сопоставления пользователей Linux с пользователями SELinux .SH "ОБЗОР" .B semanage login [\-h] [\-n] [\-N] [\-S STORE] [ \-\-add \-s SEUSER \-r RANGE LOGIN | \-\-delete LOGIN | \-\-deleteall | \-\-extract | \-\-list [\-C] | \-\-modify \-s SEUSER \-r RANGE LOGIN ] .SH "ОПИСАНИЕ" semanage используется для настройки определённых элементов политики SELinux без необходимости изменения или перекомпиляции исходного текста политики. Команда semanage login управляет сопоставлением пользователей Linux с пользователями SELinux. Её можно использовать для включения ограниченных пользователей. Например, можно определить, что конкретный пользователь или группа пользователей будет входить в систему как пользователь user_u. Чтобы указать имя группы, поставьте перед ним знак '%'. .SH "ПАРАМЕТРЫ" .TP .I \-h, \-\-help показать это справочное сообщение и выйти .TP .I \-n, \-\-noheading не показывать заголовок при выводе указанного типа объекта .TP .I \-N, \-\-noreload не перезагружать политику после фиксации .TP .I \-C, \-\-locallist вывести список локальных настроек .TP .I \-S STORE, \-\-store STORE выбрать для управления альтернативное хранилище политики SELinux .TP .I \-a, \-\-add добавить запись указанного типа объекта .TP .I \-d, \-\-delete удалить запись указанного типа объекта .TP .I \-m, \-\-modify изменить запись указанного типа объекта .TP .I \-l, \-\-list вывести список записей указанного типа объекта .TP .I \-E, \-\-extract извлечь настраиваемые команды для использования в транзакции .TP .I \-D, \-\-deleteall удалить все локальные настройки .TP .I \-s SEUSER, \-\-seuser SEUSER имя пользователя SELinux .TP .I \-r RANGE, \-\-range RANGE диапазон безопасности MLS/MCS (только для систем с поддержкой MLS/MCS). По умолчанию SELinux-диапазон для сопоставления имени входа SELinux принимает значение диапазона записи пользователя SELinux. По умолчанию SELinux-диапазон для пользователя SELinux принимает значение s0. .SH ПРИМЕР .nf Изменить пользователя по умолчанию в системе на пользователя guest_u # semanage login \-m \-s guest_u __default__ Назначить пользователю gijoe на компьютере с поддержкой MLS диапазон и пользователя staff_u # semanage login \-a \-s staff_u \-rSystemLow-Secret gijoe Назначить всем пользователям в группе engineering пользователя staff_u # semanage login \-a \-s staff_u %engineering .SH "СМОТРИТЕ ТАКЖЕ" .BR selinux (8), .BR semanage (8), .BR semanage-user (8) .SH "АВТОРЫ" Эта man-страница была написана Daniel Walsh . Перевод на русский язык выполнила Герасименко Олеся . selinux-python-3.0/semanage/ru/semanage-module.8000066400000000000000000000051121356774067000217420ustar00rootroot00000000000000.TH "semanage-module" "8" "20130617" "" "" .SH "ИМЯ" .B semanage\-module \- утилита для управления политикой SELinux, предназначенная для сопоставления модулей .SH "ОБЗОР" .B semanage module [\-h] [\-n] [\-N] [\-S STORE] (\-a | \-r | \-e | \-d | \-\-extract | \-\-list [\-C] | \-\-deleteall) [module_name] .SH "ОПИСАНИЕ" semanage используется для настройки определённых элементов политики SELinux без необходимости изменения или перекомпиляции исходного текста политики. Команда semanage module позволяет устанавливать, удалять, отключать модули политики SELinux. .SH "ПАРАМЕТРЫ" .TP .I \-h, \-\-help показать это справочное сообщение и выйти .TP .I \-n, \-\-noheading не показывать заголовок при выводе указанного типа объекта .TP .I \-N, \-\-noreload не перезагружать политику после фиксации .TP .I \-S STORE, \-\-store STORE выбрать для управления альтернативное хранилище политики SELinux .TP .I \-a, \-\-add установить указанный модуль .TP .I \-r, \-\-remove удалить указанный модуль .TP .I \-d \-\-disable отключить указанный модуль .TP .I \-e \-\-enable включить указанный модуль .TP .I \-E, \-\-extract извлечь настраиваемые команды для использования в транзакции .TP .I \-l, \-\-list вывести список записей указанного типа объекта .TP .I \-C, \-\-locallist вывести список локальных настроек .SH ПРИМЕР .nf Вывести список всех модулей # semanage module \-l Отключить неограниченный модуль (unconfined) # semanage module \-\-disable unconfined Установить пользовательский модуль политики apache # semanage module \-a myapache .SH "СМОТРИТЕ ТАКЖЕ" .BR selinux (8), .BR semanage (8), .BR semodule (8) .SH "АВТОРЫ" Эта man-страница была написана Daniel Walsh . Перевод на русский язык выполнила Герасименко Олеся . selinux-python-3.0/semanage/ru/semanage-node.8000066400000000000000000000061061356774067000214060ustar00rootroot00000000000000.TH "semanage-node" "8" "20130617" "" "" .SH "ИМЯ" .B semanage\-node \- утилита для управления политикой SELinux, предназначенная для сопоставления узлов .SH "ОБЗОР" .B semanage node [\-h] [\-n] [\-N] [\-S STORE] [ \-\-add \-M NETMASK \-p PROTOCOL \-t TYPE \-r RANGE node | \-\-delete \-M NETMASK \-p PROTOCOL node | \-\-deleteall | \-\-extract | \-\-list [\-C] | \-\-modify \-M NETMASK \-p PROTOCOL \-t TYPE \-r RANGE node ] .SH "ОПИСАНИЕ" semanage используется для настройки определённых элементов политики SELinux без необходимости изменения или перекомпиляции исходного текста политики. Команда semanage node управляет определениями типов узлов для IP-адресов. .SH "ПАРАМЕТРЫ" .TP .I \-h, \-\-help показать это справочное сообщение и выйти .TP .I \-n, \-\-noheading не показывать заголовок при выводе указанного типа объекта .TP .I \-N, \-\-noreload не перезагружать политику после фиксации .TP .I \-S STORE, \-\-store STORE выбрать для управления альтернативное хранилище политики SELinux .TP .I \-C, \-\-locallist вывести список локальных настроек .TP .I \-a, \-\-add добавить запись указанного типа объекта .TP .I \-d, \-\-delete удалить запись указанного типа объекта .TP .I \-m, \-\-modify изменить запись указанного типа объекта .TP .I \-l, \-\-list вывести список записей указанного типа объекта .TP .I \-E, \-\-extract извлечь настраиваемые команды для использования в транзакции .TP .I \-D, \-\-deleteall удалить все локальные настройки .TP .I \-M NETMASK, \-\-netmask NETMASK маска сети .TP .I \-t TYPE, \-\-type TYPE SELinux-тип для объекта .TP .I \-r RANGE, \-\-range RANGE диапазон безопасности MLS/MCS (только для систем с поддержкой MLS/MCS). По умолчанию SELinux-диапазон для сопоставления имени входа SELinux принимает значение диапазона записи пользователя SELinux. По умолчанию SELinux-диапазон для пользователя SELinux принимает значение s0. .TP .I \-p PROTO, \-\-proto PROTO Протокол для указанного порта (tcp|udp) или версия протокола Интернета для указанного узла (ipv4|ipv6). .SH "АВТОРЫ" Перевод на русский язык выполнила Герасименко Олеся selinux-python-3.0/semanage/ru/semanage-permissive.8000066400000000000000000000041361356774067000226500ustar00rootroot00000000000000.TH "semanage-permissive" "8" "20130617" "" "" .SH "ИМЯ" .B semanage\-permissive \- утилита разрешительного сопоставления для управления политикой SELinux .SH "ОБЗОР" .B semanage permissive [\-h] (\-a | \-d | \-l) [\-n] [\-N] [\-S STORE] [type] .SH "ОПИСАНИЕ" semanage используется для настройки определённых элементов политики SELinux без необходимости изменения или перекомпиляции исходного текста политики. Утилита semanage permissive позволяет добавить или удалить разрешительный модуль политики SELinux. .SH "ПАРАМЕТРЫ" .TP .I \-h, \-\-help показать это справочное сообщение и выйти .TP .I \-a, \-\-add добавить запись указанного типа объекта .TP .I \-d, \-\-delete удалить запись указанного типа объекта .TP .I \-l, \-\-list вывести список записей указанного типа объекта .TP .I \-n, \-\-noheading не показывать заголовок при выводе указанного типа объекта .TP .I \-N, \-\-noreload не перезагружать политику после фиксации .TP .I \-S STORE, \-\-store STORE выбрать для управления альтернативное хранилище политики SELinux .TP .SH ПРИМЕР .nf Вывести список всех разрешительных модулей # semanage permissive \-l Сделать httpd_t (веб-сервер) разрешительным доменом # semanage permissive \-a httpd_t .SH "СМОТРИТЕ ТАКЖЕ" .BR selinux (8), .BR semanage (8) .SH "АВТОРЫ" Эта man-страница была написана Daniel Walsh . Перевод на русский язык выполнила Герасименко Олеся . selinux-python-3.0/semanage/ru/semanage-port.8000066400000000000000000000067711356774067000214550ustar00rootroot00000000000000.TH "semanage-port" "8" "20130617" "" "" .SH "ИМЯ" .B semanage\-port \- средство сопоставления портов для управления политикой SELinux .SH "ОБЗОР" .B semanage port [\-h] [\-n] [\-N] [\-S STORE] [ \-\-add \-t TYPE \-p PROTOCOL \-r RANGE port_name | port_range | \-\-delete \-p PROTOCOL port_name | port_range | \-\-deleteall | \-\-extract | \-\-list [\-C] | \-\-modify \-t TYPE \-p PROTOCOL \-r RANGE port_name | port_range ] .SH "ОПИСАНИЕ" semanage используется для настройки определённых элементов политики SELinux без необходимости изменения или перекомпиляции исходного текста политики. Команда semanage port управляет определениями типов портов для номеров портов. .SH "ПАРАМЕТРЫ" .TP .I \-h, \-\-help показать это справочное сообщение и выйти .TP .I \-n, \-\-noheading не показывать заголовок при выводе указанного типа объекта .TP .I \-N, \-\-noreload не перезагружать политику после фиксации .TP .I \-S STORE, \-\-store STORE выбрать для управления альтернативное хранилище политики SELinux .TP .I \-C, \-\-locallist вывести список локальных настроек .TP .I \-a, \-\-add добавить запись указанного типа объекта .TP .I \-d, \-\-delete удалить запись указанного типа объекта .TP .I \-m, \-\-modify изменить запись указанного типа объекта .TP .I \-l, \-\-list вывести список записей указанного типа объекта .TP .I \-E, \-\-extract извлечь настраиваемые команды для использования в транзакции .TP .I \-D, \-\-deleteall удалить все локальные настройки .TP .I \-t TYPE, \-\-type TYPE SELinux-тип для объекта .TP .I \-r RANGE, \-\-range RANGE диапазон безопасности MLS/MCS (только для систем с поддержкой MLS/MCS). По умолчанию SELinux-диапазон для сопоставления имени входа SELinux принимает значение диапазона записи пользователя SELinux. По умолчанию SELinux-диапазон для пользователя SELinux принимает значение s0. .TP .I \-p PROTO, \-\-proto PROTO Протокол для указанного порта (tcp|udp) или версия протокола Интернета для указанного узла (ipv4|ipv6). .SH ПРИМЕР .nf Вывести список всех определений портов # semanage port \-l Разрешить Apache прослушивать tcp-порт 81 # semanage port \-a \-t http_port_t \-p tcp 81 Разрешить sshd прослушивать tcp-порт 8991 # semanage port \-a \-t ssh_port_t \-p tcp 8991 .SH "СМОТРИТЕ ТАКЖЕ" .BR selinux (8), .BR semanage (8) .SH "АВТОРЫ" Эта man-страница была написана Daniel Walsh . Перевод на русский язык выполнила Герасименко Олеся . selinux-python-3.0/semanage/ru/semanage-user.8000066400000000000000000000074371356774067000214470ustar00rootroot00000000000000.TH "semanage-user" "8" "20130617" "" "" .SH "ИМЯ" .B semanage\-user \- утилита для управления политикой SELinux, предназначенная для сопоставления пользователей .SH "ОБЗОР" .B semanage user [\-h] [\-n] [\-N] [\-S STORE] [ \-\-add ( \-L LEVEL \-R ROLES \-r RANGE SEUSER) | \-\-delete SEUSER | \-\-deleteall | \-\-extract | \-\-list [\-C] | \-\-modify ( \-L LEVEL \-R ROLES \-r RANGE SEUSER ) ] .SH "ОПИСАНИЕ" semanage используется для настройки определённых элементов политики SELinux без необходимости изменения или перекомпиляции исходного текста политики. Команда semanage user управляет сопоставлением пользователей SELinux с ролями и уровнями MLS/MCS. .SH "ПАРАМЕТРЫ" .TP .I \-h, \-\-help показать это справочное сообщение и выйти .TP .I \-n, \-\-noheading не показывать заголовок при выводе указанного типа объекта .TP .I \-N, \-\-noreload не перезагружать политику после фиксации .TP .I \-S STORE, \-\-store STORE выбрать для управления альтернативное хранилище политики SELinux .TP .I \-C, \-\-locallist вывести список локальных настроек .TP .I \-a, \-\-add добавить запись указанного типа объекта .TP .I \-d, \-\-delete удалить запись указанного типа объекта .TP .I \-m, \-\-modify изменить запись указанного типа объекта .TP .I \-l, \-\-list вывести список записей указанного типа объекта .TP .I \-E, \-\-extract извлечь настраиваемые команды для использования в транзакции .TP .I \-D, \-\-deleteall удалить все локальные настройки .TP .I \-L LEVEL, \-\-level LEVEL уровень SELinux по умолчанию для пользователя SELinux, s0 (только для систем с поддержкой MLS/MCS) .TP .I \-r RANGE, \-\-range RANGE диапазон безопасности MLS/MCS (только для систем с поддержкой MLS/MCS). По умолчанию SELinux-диапазон для сопоставления имени входа SELinux принимает значение диапазона записи пользователя SELinux. По умолчанию SELinux-диапазон для пользователя SELinux принимает значение s0. .TP .I \-R [ROLES], \-\-roles [ROLES] роли SELinux. Если ролей несколько, их необходимо перечислить через пробелы и заключить этот перечень в кавычки. Или можно несколько раз указать \-R. .SH ПРИМЕР .nf Вывести список пользователей SELinux # semanage user \-l Изменить группы для пользователя staff_u # semanage user \-m \-R "system_r unconfined_r staff_r" staff_u Добавить уровень для пользователей TopSecret # semanage user \-a \-R "staff_r" \-rs0\-TopSecret topsecret_u .SH "СМОТРИТЕ ТАКЖЕ" .BR selinux (8), .BR semanage (8), .BR semanage\-login (8) .SH "АВТОРЫ" Эта man-страница была написана Daniel Walsh . Перевод на русский язык выполнила Герасименко Олеся . selinux-python-3.0/semanage/ru/semanage.8000066400000000000000000000112061356774067000204600ustar00rootroot00000000000000.TH "semanage" "8" "20100223" "" "" .SH "ИМЯ" semanage \- средство управления политикой SELinux .SH "ОБЗОР" .B semanage {import,export,login,user,port,interface,module,node,fcontext,boolean,permissive,dontaudit,ibpkey,ibendport} ... .B позиционные аргументы: .B import Импортировать локальные настройки .B export Экспортировать локальные настройки .B login Управлять сопоставлениями имён входа между пользователями Linux и ограниченными пользователями SELinux .B user Управлять ограниченными пользователями SELinux (роли и уровни для пользователя SELinux) .B port Управлять определениями типов сетевых портов .B interface Управлять определениями типов сетевых интерфейсов .B module Управлять модулями политики SELinux .B node Управлять определениями типов сетевых узлов .B fcontext Управлять определениями соответствий контекстов файлов .B boolean Управлять логическими переключателями для избирательного включения функциональности .B permissive Управлять режимом принудительного назначения типов процессов .B dontaudit Отключить/Включить правила dontaudit в политике .B ibpkey Управлять определениями типов ключей разделов infiniband .B ibendport Управлять определениями типов конечных портов infiniband .SH "ОПИСАНИЕ" semanage используется для настройки определённых элементов политики SELinux без необходимости изменения или перекомпиляции исходного текста политики. Это включает сопоставление имён пользователей Linux с пользователями SELinux (что управляет исходным контекстом безопасности, который присваивается пользователям Linux при их входе в систему, и ограничивает доступный им набор ролей). Также это включает сопоставление контекстов безопасности для различных видов объектов, таких как сетевые порты, интерфейсы, ключи разделов (pkeys) и конечные порты (endports) infiniband, сетевые узлы (хосты), а также сопоставление контекстов файлов. Обратите внимание, что при вызове команды semanage login пользователи Linux (logins) сопоставляются с пользователями SELinux, а при вызове команды semanage user пользователи SELinux сопоставляются с доступными наборами ролей. В большинстве случаев администратору требуется настроить только первый тип сопоставлений; второй тип сопоставлений определяется базовой политикой и обычно не требует изменения. .SH "ПАРАМЕТРЫ" .TP .I \-h, \-\-help Вывести справочную информацию .SH "СМОТРИТЕ ТАКЖЕ" .BR selinux (8), .BR semanage-boolean (8), .BR semanage-dontaudit (8), .BR semanage-export (8), .BR semanage-fcontext (8), .BR semanage-import (8), .BR semanage-interface (8), .BR semanage-login (8), .BR semanage-module (8), .BR semanage-node (8), .BR semanage-permissive (8), .BR semanage-port (8), .BR semanage-user (8) .BR semanage-ibkey (8), .BR semanage-ibendport (8), .SH "АВТОРЫ" Эта man-страница была написана Daniel Walsh .br и Russell Coker . .br Примеры подготовлены Thomas Bleher . usage: semanage [\-h] Перевод на русский язык выполнила Герасименко Олеся . selinux-python-3.0/semanage/semanage000066400000000000000000001202661356774067000176730ustar00rootroot00000000000000#!/usr/bin/python3 -Es # Copyright (C) 2012-2013 Red Hat # AUTHOR: Miroslav Grepl # AUTHOR: David Quigley # see file 'COPYING' for use and warranty information # # semanage is a tool for managing SELinux configuration files # # This program is free software; you can redistribute it and/or # modify it under the terms of the GNU General Public License as # published by the Free Software Foundation; either version 2 of # the License, or (at your option) any later version. # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program; if not, write to the Free Software # Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA # 02111-1307 USA # # import traceback import argparse import seobject import sys PROGNAME = "policycoreutils" try: import gettext kwargs = {} if sys.version_info < (3,): kwargs['unicode'] = True gettext.install(PROGNAME, localedir="/usr/share/locale", codeset='utf-8', **kwargs) except: try: import builtins builtins.__dict__['_'] = str except ImportError: import __builtin__ __builtin__.__dict__['_'] = unicode # define custom usages for selected main actions usage_login = "semanage login [-h] [-n] [-N] [-S STORE] [" usage_login_dict = {' --add': ('-s SEUSER', '-r RANGE', 'LOGIN',), ' --modify': ('-s SEUSER', '-r RANGE', 'LOGIN',), ' --delete': ('LOGIN',), ' --list': ('-C',), ' --extract': ('',), ' --deleteall': ('',)} usage_fcontext = "semanage fcontext [-h] [-n] [-N] [-S STORE] [" usage_fcontext_dict = {' --add': ('(', '-t TYPE', '-f FTYPE', '-r RANGE', '-s SEUSER', '|', '-e EQUAL', ')', 'FILE_SPEC',), ' --delete': ('(', '-t TYPE', '-f FTYPE', '|', '-e EQUAL', ')', 'FILE_SPEC',), ' --modify': ('(', '-t TYPE', '-f FTYPE', '-r RANGE', '-s SEUSER', '|', '-e EQUAL', ')', 'FILE_SPEC',), ' --list': ('[-C]',), ' --extract': ('',), ' --deleteall': ('',)} usage_user = "semanage user [-h] [-n] [-N] [-S STORE] [" usage_user_dict = {' --add': ('(', '-L LEVEL', '-R ROLES', '-r RANGE', 'SEUSER', ')'), ' --delete': ('SEUSER',), ' --modify': ('(', '-L LEVEL', '-R ROLES', '-r RANGE', '-s SEUSER', 'SEUSER', ')'), ' --list': ('-C',), ' --extract': ('',), ' --deleteall': ('',)} usage_port = "semanage port [-h] [-n] [-N] [-S STORE] [" usage_port_dict = {' --add': ('-t TYPE', '-p PROTOCOL', '-r RANGE', '(', 'port_name', '|', 'port_range', ')'), ' --modify': ('-t TYPE', '-p PROTOCOL', '-r RANGE', '(', 'port_name', '|', 'port_range', ')'), ' --delete': ('-p PROTOCOL', '(', 'port_name', '|', 'port_range', ')'), ' --list': ('-C',), ' --extract': ('',), ' --deleteall': ('',)} usage_ibpkey = "semanage ibpkey [-h] [-n] [-N] [-s STORE] [" usage_ibpkey_dict = {' --add': ('-t TYPE', '-x SUBNET_PREFIX', '-r RANGE', '(', 'ibpkey_name', '|', 'pkey_range', ')'), ' --modify': ('-t TYPE', '-x SUBNET_PREFIX', '-r RANGE', '(', 'ibpkey_name', '|', 'pkey_range', ')'), ' --delete': ('-x SUBNET_PREFIX', '(', 'ibpkey_name', '|', 'pkey_range', ')'), ' --list': ('-C',), ' --extract': ('',), ' --deleteall': ('',)} usage_ibendport = "semanage ibendport [-h] [-n] [-N] [-s STORE] [" usage_ibendport_dict = {' --add': ('-t TYPE', '-z IBDEV_NAME', '-r RANGE', '(', 'port', ')'), ' --modify': ('-t TYPE', '-z IBDEV_NAME', '-r RANGE', '(', 'port', ')'), ' --delete': ('-z IBDEV_NAME', '-r RANGE', '(', 'port', ')'), ' --list': ('-C',), ' --extract': ('',), ' --deleteall': ('',)} usage_node = "semanage node [-h] [-n] [-N] [-S STORE] [" usage_node_dict = {' --add': ('-M NETMASK', '-p PROTOCOL', '-t TYPE', '-r RANGE', 'node'), ' --modify': ('-M NETMASK', '-p PROTOCOL', '-t TYPE', '-r RANGE', 'node'), ' --delete': ('-M NETMASK', '-p PROTOCOL', 'node'), ' --list': ('-C',), ' --extract': ('',), ' --deleteall': ('',)} usage_interface = "semanage interface [-h] [-n] [-N] [-S STORE] [" usage_interface_dict = {' --add': ('-t TYPE', '-r RANGE', 'interface'), ' --modify': ('-t TYPE', '-r RANGE', 'interface'), ' --delete': ('interface',), ' --list': ('-C',), ' --extract': ('',), ' --deleteall': ('',)} usage_boolean = "semanage boolean [-h] [-n] [-N] [-S STORE] [" usage_boolean_dict = {' --modify': ('(', '--on', '|', '--off', ')', 'boolean'), ' --list': ('-C',), ' --extract': ('',), ' --deleteall': ('',)} class CheckRole(argparse.Action): def __call__(self, parser, namespace, value, option_string=None): newval = getattr(namespace, self.dest) if not newval: newval = [] try: # sepolicy tries to load the SELinux policy and raises ValueError if it fails. import sepolicy roles = sepolicy.get_all_roles() except ValueError: roles = [] for v in value.split(): if v not in roles: raise ValueError("%s must be an SELinux role:\nValid roles: %s" % (v, ", ".join(roles))) newval.append(v) setattr(namespace, self.dest, newval) class seParser(argparse.ArgumentParser): def error(self, message): if len(sys.argv) == 2: self.print_help() else: self.print_usage() self.exit(2, ('%s: error: %s\n') % (self.prog, message)) class SetExportFile(argparse.Action): def __call__(self, parser, namespace, values, option_string=None): if values: if values != "-": try: sys.stdout = open(values, 'w') except: sys.stderr.write(traceback.format_exc()) sys.exit(1) setattr(namespace, self.dest, values) class SetImportFile(argparse.Action): def __call__(self, parser, namespace, values, option_string=None): if values and values != "-": try: sys.stdin = open(values, 'r') except IOError as e: sys.stderr.write("%s: %s\n" % (e.__class__.__name__, str(e))) sys.exit(1) setattr(namespace, self.dest, values) # define dictonary for seobject OBEJCTS object_dict = { 'login': seobject.loginRecords, 'user': seobject.seluserRecords, 'port': seobject.portRecords, 'module': seobject.moduleRecords, 'interface': seobject.interfaceRecords, 'node': seobject.nodeRecords, 'fcontext': seobject.fcontextRecords, 'boolean': seobject.booleanRecords, 'permissive': seobject.permissiveRecords, 'dontaudit': seobject.dontauditClass, 'ibpkey': seobject.ibpkeyRecords, 'ibendport': seobject.ibendportRecords } def generate_custom_usage(usage_text, usage_dict): # generate custom usage from given text and dictonary sorted_keys = [] for i in usage_dict.keys(): sorted_keys.append(i) sorted_keys.sort() for k in sorted_keys: usage_text += "%s %s |" % (k, (" ".join(usage_dict[k]))) usage_text = usage_text[:-1] + "]" usage_text = _(usage_text) return usage_text def handle_opts(args, dict, target_key): # handle conflict and required options for given dictonary # {action:[conflict_opts,require_opts]} # first we need to catch conflicts for k in args.__dict__.keys(): try: if k in dict[target_key][0] and args.__dict__[k]: print("%s option can not be used with --%s" % (target_key, k)) sys.exit(2) except KeyError: continue for k in args.__dict__.keys(): try: if k in dict[target_key][1] and not args.__dict__[k]: print("%s option is needed for %s" % (k, target_key)) sys.exit(2) except KeyError: continue def handleLogin(args): # {action:[conflict_opts,require_opts]} login_args = {'list': [('login', 'seuser'), ('')], 'add': [('locallist'), ('seuser', 'login')], 'modify': [('locallist'), ('login')], 'delete': [('locallist'), ('login')], 'extract': [('locallist', 'login', 'seuser'), ('')], 'deleteall': [('locallist'), ('')]} handle_opts(args, login_args, args.action) OBJECT = object_dict['login'](args) if args.action == "add": OBJECT.add(args.login, args.seuser, args.range) if args.action == "modify": OBJECT.modify(args.login, args.seuser, args.range) if args.action == "delete": OBJECT.delete(args.login) if args.action == "list": OBJECT.list(args.noheading, args.locallist) if args.action == "deleteall": OBJECT.deleteall() if args.action == "extract": for i in OBJECT.customized(): print("login %s" % (str(i))) def parser_add_store(parser, name): parser.add_argument('-S', '--store', default='', help=_("Select an alternate SELinux Policy Store to manage")) def parser_add_priority(parser, name): parser.add_argument('-P', '--priority', type=int, default=400, help=_("Select a priority for module operations")) def parser_add_noheading(parser, name): parser.add_argument('-n', '--noheading', action='store_false', default=True, help=_("Do not print heading when listing %s object types") % name) def parser_add_noreload(parser, name): parser.add_argument('-N', '--noreload', action='store_true', default=False, help=_('Do not reload policy after commit')) def parser_add_locallist(parser, name): parser.add_argument('-C', '--locallist', action='store_true', default=False, help=_("List %s local customizations") % name) def parser_add_add(parser, name): parser.add_argument('-a', '--add', dest='action', action='store_const', const='add', help=_("Add a record of the %s object type") % name) def parser_add_type(parser, name): parser.add_argument('-t', '--type', help=_('SELinux Type for the object')) def parser_add_level(parser, name): parser.add_argument('-L', '--level', default='s0', help=_('Default SELinux Level for SELinux user, s0 Default. (MLS/MCS Systems only)')) def parser_add_range(parser, name): parser.add_argument('-r', '--range', default='', help=_(''' MLS/MCS Security Range (MLS/MCS Systems only) SELinux Range for SELinux login mapping defaults to the SELinux user record range. SELinux Range for SELinux user defaults to s0. ''')) def parser_add_proto(parser, name): parser.add_argument('-p', '--proto', help=_(''' Protocol for the specified port (tcp|udp|dccp|sctp) or internet protocol version for the specified node (ipv4|ipv6). ''')) def parser_add_subnet_prefix(parser, name): parser.add_argument('-x', '--subnet_prefix', help=_(''' Subnet prefix for the specified infiniband ibpkey. ''')) def parser_add_ibdev_name(parser, name): parser.add_argument('-z', '--ibdev_name', help=_(''' Name for the specified infiniband end port. ''')) def parser_add_modify(parser, name): parser.add_argument('-m', '--modify', dest='action', action='store_const', const='modify', help=_("Modify a record of the %s object type") % name) def parser_add_list(parser, name): parser.add_argument('-l', '--list', dest='action', action='store_const', const='list', help=_("List records of the %s object type") % name) def parser_add_delete(parser, name): parser.add_argument('-d', '--delete', dest='action', action='store_const', const='delete', help=_("Delete a record of the %s object type") % name) def parser_add_extract(parser, name): parser.add_argument('-E', '--extract', dest='action', action='store_const', const='extract', help=_("Extract customizable commands, for use within a transaction")) def parser_add_deleteall(parser, name): parser.add_argument('-D', '--deleteall', dest='action', action='store_const', const='deleteall', help=_('Remove all %s objects local customizations') % name) def parser_add_seuser(parser, name): parser.add_argument('-s', '--seuser', default="", help=_("SELinux user name")) def setupLoginParser(subparsers): generated_usage = generate_custom_usage(usage_login, usage_login_dict) loginParser = subparsers.add_parser('login', usage=generated_usage, help=_("Manage login mappings between linux users and SELinux confined users")) parser_add_locallist(loginParser, "login") parser_add_noheading(loginParser, "login") parser_add_noreload(loginParser, "login") parser_add_store(loginParser, "login") parser_add_range(loginParser, "login") login_action = loginParser.add_mutually_exclusive_group(required=True) parser_add_add(login_action, "login") parser_add_delete(login_action, "login") parser_add_modify(login_action, "login") parser_add_list(login_action, "login") parser_add_extract(login_action, "login") parser_add_deleteall(login_action, "login") parser_add_seuser(loginParser, "login") loginParser.add_argument('login', nargs='?', default=None, help=_("login_name | %%groupname")) loginParser.set_defaults(func=handleLogin) def handleFcontext(args): fcontext_args = {'list': [('equal', 'ftype', 'seuser', 'type'), ('')], 'add': [('locallist'), ('type', 'file_spec')], 'modify': [('locallist'), ('type', 'file_spec')], 'delete': [('locallist'), ('file_spec')], 'extract': [('locallist', 'equal', 'ftype', 'seuser', 'type'), ('')], 'deleteall': [('locallist'), ('')]} # we can not use mutually for equal because we can define some actions together with equal fcontext_equal_args = {'equal': [('list', 'locallist', 'type', 'ftype', 'seuser', 'deleteall', 'extract'), ()]} if args.action and args.equal: handle_opts(args, fcontext_equal_args, "equal") else: handle_opts(args, fcontext_args, args.action) OBJECT = object_dict['fcontext'](args) if args.action == "add": if args.equal: OBJECT.add_equal(args.file_spec, args.equal) else: OBJECT.add(args.file_spec, args.type, args.ftype, args.range, args.seuser) if args.action == "modify": if args.equal: OBJECT.add_equal(args.file_spec, args.equal) else: OBJECT.modify(args.file_spec, args.type, args.ftype, args.range, args.seuser) if args.action == "delete": if args.equal: OBJECT.delete(args.file_spec, args.equal) else: OBJECT.delete(args.file_spec, args.ftype) if args.action == "list": OBJECT.list(args.noheading, args.locallist) if args.action == "deleteall": OBJECT.deleteall() if args.action == "extract": for i in OBJECT.customized(): print("fcontext %s" % str(i)) def setupFcontextParser(subparsers): ftype_help = ''' File Type. This is used with fcontext. Requires a file type as shown in the mode field by ls, e.g. use d to match only directories or f to match only regular files. The following file type options can be passed: f (regular file),d (directory),c (character device), b (block device),s (socket),l (symbolic link),p (named pipe) If you do not specify a file type, the file type will default to "all files". ''' generate_usage = generate_custom_usage(usage_fcontext, usage_fcontext_dict) fcontextParser = subparsers.add_parser('fcontext', usage=generate_usage, help=_("Manage file context mapping definitions")) parser_add_locallist(fcontextParser, "fcontext") parser_add_noheading(fcontextParser, "fcontext") parser_add_noreload(fcontextParser, "fcontext") parser_add_store(fcontextParser, "fcontext") fcontext_action = fcontextParser.add_mutually_exclusive_group(required=True) parser_add_add(fcontext_action, "fcontext") parser_add_delete(fcontext_action, "fcontext") parser_add_modify(fcontext_action, "fcontext") parser_add_list(fcontext_action, "fcontext") parser_add_extract(fcontext_action, "fcontext") parser_add_deleteall(fcontext_action, "fcontext") fcontextParser.add_argument('-e', '--equal', help=_('''Substitute target path with sourcepath when generating default label. This is used with fcontext. Requires source and target path arguments. The context labeling for the target subtree is made equivalent to that defined for the source.''')) fcontextParser.add_argument('-f', '--ftype', default="", choices=["a", "f", "d", "c", "b", "s", "l", "p"], help=_(ftype_help)) parser_add_seuser(fcontextParser, "fcontext") parser_add_type(fcontextParser, "fcontext") parser_add_range(fcontextParser, "fcontext") fcontextParser.add_argument('file_spec', nargs='?', default=None, help=_('file_spec')) fcontextParser.set_defaults(func=handleFcontext) def handleUser(args): user_args = {'list': [('selinux_name', 'seuser', 'roles'), ('')], 'add': [('locallist'), ('roles', 'selinux_name')], 'modify': [('locallist'), ('selinux_name')], 'delete': [('locallist'), ('selinux_name')], 'extract': [('locallist', 'selinux_name', 'seuser', 'role'), ('')], 'deleteall': [('locallist'), ('')]} handle_opts(args, user_args, args.action) OBJECT = object_dict['user'](args) if args.action == "add": OBJECT.add(args.selinux_name, args.roles, args.level, args.range, args.prefix) if args.action == "modify": OBJECT.modify(args.selinux_name, args.roles, args.level, args.range, args.prefix) if args.action == "delete": OBJECT.delete(args.selinux_name) if args.action == "list": OBJECT.list(args.noheading, args.locallist) if args.action == "deleteall": OBJECT.deleteall() if args.action == "extract": for i in OBJECT.customized(): print("user %s" % str(i)) def setupUserParser(subparsers): generated_usage = generate_custom_usage(usage_user, usage_user_dict) userParser = subparsers.add_parser('user', usage=generated_usage, help=_('Manage SELinux confined users (Roles and levels for an SELinux user)')) parser_add_locallist(userParser, "user") parser_add_noheading(userParser, "user") parser_add_noreload(userParser, "user") parser_add_store(userParser, "user") user_action = userParser.add_mutually_exclusive_group(required=True) parser_add_add(user_action, "user") parser_add_delete(user_action, "user") parser_add_modify(user_action, "user") parser_add_list(user_action, "user") parser_add_extract(user_action, "user") parser_add_deleteall(user_action, "user") parser_add_level(userParser, "user") parser_add_range(userParser, "user") userParser.add_argument('-R', '--roles', default=[], action=CheckRole, help=_(''' SELinux Roles. You must enclose multiple roles within quotes, separate by spaces. Or specify -R multiple times. ''')) userParser.add_argument('-P', '--prefix', default="user", help=argparse.SUPPRESS) userParser.add_argument('selinux_name', nargs='?', default=None, help=_('selinux_name')) userParser.set_defaults(func=handleUser) def handlePort(args): port_args = {'list': [('port', 'type', 'proto'), ('')], 'add': [('locallist'), ('type', 'port', 'proto')], 'modify': [('localist'), ('port', 'proto')], 'delete': [('locallist'), ('port', 'proto')], 'extract': [('locallist', 'port', 'type', 'proto'), ('')], 'deleteall': [('locallist'), ('')]} handle_opts(args, port_args, args.action) OBJECT = object_dict['port'](args) if args.action == "add": OBJECT.add(args.port, args.proto, args.range, args.type) if args.action == "modify": OBJECT.modify(args.port, args.proto, args.range, args.type) if args.action == "delete": OBJECT.delete(args.port, args.proto) if args.action == "list": OBJECT.list(args.noheading, args.locallist) if args.action == "deleteall": OBJECT.deleteall() if args.action == "extract": for i in OBJECT.customized(): print("port %s" % str(i)) def setupPortParser(subparsers): generated_usage = generate_custom_usage(usage_port, usage_port_dict) portParser = subparsers.add_parser('port', usage=generated_usage, help=_('Manage network port type definitions')) parser_add_locallist(portParser, "port") parser_add_noheading(portParser, "port") parser_add_noreload(portParser, "port") parser_add_store(portParser, "port") port_action = portParser.add_mutually_exclusive_group(required=True) parser_add_add(port_action, "port") parser_add_delete(port_action, "port") parser_add_modify(port_action, "port") parser_add_list(port_action, "port") parser_add_extract(port_action, "port") parser_add_deleteall(port_action, "port") parser_add_type(portParser, "port") parser_add_range(portParser, "port") parser_add_proto(portParser, "port") portParser.add_argument('port', nargs='?', default=None, help=_('port | port_range')) portParser.set_defaults(func=handlePort) def handlePkey(args): ibpkey_args = {'list': [('ibpkey', 'type', 'subnet_prefix'), ('')], 'add': [('locallist'), ('type', 'ibpkey', 'subnet_prefix')], 'modify': [('localist'), ('ibpkey', 'subnet_prefix')], 'delete': [('locallist'), ('ibpkey', 'subnet_prefix')], 'extract': [('locallist', 'ibpkey', 'type', 'subnet prefix'), ('')], 'deleteall': [('locallist'), ('')]} handle_opts(args, ibpkey_args, args.action) OBJECT = object_dict['ibpkey'](args) if args.action == "add": OBJECT.add(args.ibpkey, args.subnet_prefix, args.range, args.type) if args.action == "modify": OBJECT.modify(args.ibpkey, args.subnet_prefix, args.range, args.type) if args.action == "delete": OBJECT.delete(args.ibpkey, args.subnet_prefix) if args.action == "list": OBJECT.list(args.noheading, args.locallist) if args.action == "deleteall": OBJECT.deleteall() if args.action == "extract": for i in OBJECT.customized(): print("ibpkey %s" % str(i)) def setupPkeyParser(subparsers): generated_usage = generate_custom_usage(usage_ibpkey, usage_ibpkey_dict) ibpkeyParser = subparsers.add_parser('ibpkey', usage=generated_usage, help=_('Manage infiniband ibpkey type definitions')) parser_add_locallist(ibpkeyParser, "ibpkey") parser_add_noheading(ibpkeyParser, "ibpkey") parser_add_noreload(ibpkeyParser, "ibpkey") parser_add_store(ibpkeyParser, "ibpkey") ibpkey_action = ibpkeyParser.add_mutually_exclusive_group(required=True) parser_add_add(ibpkey_action, "ibpkey") parser_add_delete(ibpkey_action, "ibpkey") parser_add_modify(ibpkey_action, "ibpkey") parser_add_list(ibpkey_action, "ibpkey") parser_add_extract(ibpkey_action, "ibpkey") parser_add_deleteall(ibpkey_action, "ibpkey") parser_add_type(ibpkeyParser, "ibpkey") parser_add_range(ibpkeyParser, "ibpkey") parser_add_subnet_prefix(ibpkeyParser, "ibpkey") ibpkeyParser.add_argument('ibpkey', nargs='?', default=None, help=_('pkey | pkey_range')) ibpkeyParser.set_defaults(func=handlePkey) def handleIbendport(args): ibendport_args = {'list': [('ibendport', 'type', 'ibdev_name'), ('')], 'add': [('locallist'), ('type', 'ibendport', 'ibdev_name'), ('')], 'modify': [('localist'), ('ibendport', 'ibdev_name')], 'delete': [('locallist'), ('ibendport', 'ibdev_name')], 'extract': [('locallist', 'ibendport', 'type', 'ibdev_name'), ('')], 'deleteall': [('locallist'), ('')]} handle_opts(args, ibendport_args, args.action) OBJECT = object_dict['ibendport'](args) if args.action == "add": OBJECT.add(args.ibendport, args.ibdev_name, args.range, args.type) if args.action == "modify": OBJECT.modify(args.ibendport, args.ibdev_name, args.range, args.type) if args.action == "delete": OBJECT.delete(args.ibendport, args.ibdev_name) if args.action == "list": OBJECT.list(args.noheading, args.locallist) if args.action == "deleteall": OBJECT.deleteall() if args.action == "extract": for i in OBJECT.customized(): print("ibendport %s" % str(i)) def setupIbendportParser(subparsers): generated_usage = generate_custom_usage(usage_ibendport, usage_ibendport_dict) ibendportParser = subparsers.add_parser('ibendport', usage=generated_usage, help=_('Manage infiniband end port type definitions')) parser_add_locallist(ibendportParser, "ibendport") parser_add_noheading(ibendportParser, "ibendport") parser_add_noreload(ibendportParser, "ibendport") parser_add_store(ibendportParser, "ibendport") ibendport_action = ibendportParser.add_mutually_exclusive_group(required=True) parser_add_add(ibendport_action, "ibendport") parser_add_delete(ibendport_action, "ibendport") parser_add_modify(ibendport_action, "ibendport") parser_add_list(ibendport_action, "ibendport") parser_add_extract(ibendport_action, "ibendport") parser_add_deleteall(ibendport_action, "ibendport") parser_add_type(ibendportParser, "ibendport") parser_add_range(ibendportParser, "ibendport") parser_add_ibdev_name(ibendportParser, "ibendport") ibendportParser.add_argument('ibendport', nargs='?', default=None, help=_('ibendport')) ibendportParser.set_defaults(func=handleIbendport) def handleInterface(args): interface_args = {'list': [('interface'), ('')], 'add': [('locallist'), ('type', 'interface')], 'modify': [('locallist'), ('type', 'interface')], 'delete': [('locallist'), ('interface')], 'extract': [('locallist', 'interface', 'type'), ('')], 'deleteall': [('locallist'), ('')]} handle_opts(args, interface_args, args.action) OBJECT = object_dict['interface'](args) if args.action == "add": OBJECT.add(args.interface, args.range, args.type) if args.action == "modify": OBJECT.modify(args.interface, args.range, args.type) if args.action == "delete": OBJECT.delete(args.interface) if args.action == "list": OBJECT.list(args.noheading, args.locallist) if args.action == "deleteall": OBJECT.deleteall() if args.action == "extract": for i in OBJECT.customized(): print("interface %s" % str(i)) def setupInterfaceParser(subparsers): generated_usage = generate_custom_usage(usage_interface, usage_interface_dict) interfaceParser = subparsers.add_parser('interface', usage=generated_usage, help=_('Manage network interface type definitions')) parser_add_locallist(interfaceParser, "interface") parser_add_noheading(interfaceParser, "interface") parser_add_noreload(interfaceParser, "interface") parser_add_store(interfaceParser, "interface") parser_add_type(interfaceParser, "interface") parser_add_range(interfaceParser, "interface") interface_action = interfaceParser.add_mutually_exclusive_group(required=True) parser_add_add(interface_action, "interface") parser_add_delete(interface_action, "interface") parser_add_modify(interface_action, "interface") parser_add_list(interface_action, "interface") parser_add_extract(interface_action, "interface") parser_add_deleteall(interface_action, "interface") interfaceParser.add_argument('interface', nargs='?', default=None, help=_('interface_spec')) interfaceParser.set_defaults(func=handleInterface) def handleModule(args): OBJECT = seobject.moduleRecords(args) if args.action_add: OBJECT.add(args.action_add[0], args.priority) if args.action_enable: OBJECT.set_enabled(" ".join(args.action_enable), True) if args.action_disable: OBJECT.set_enabled(" ".join(args.action_disable), False) if args.action_remove: OBJECT.delete(" ".join(args.action_remove), args.priority) if args.action == "deleteall": OBJECT.deleteall() if args.action == "list": OBJECT.list(args.noheading, args.locallist) if args.action == "extract": for i in OBJECT.customized(): print("module %s" % str(i)) def setupModuleParser(subparsers): moduleParser = subparsers.add_parser('module', help=_('Manage SELinux policy modules')) parser_add_noheading(moduleParser, "module") parser_add_noreload(moduleParser, "module") parser_add_store(moduleParser, "module") parser_add_locallist(moduleParser, "module") parser_add_priority(moduleParser, "module") mgroup = moduleParser.add_mutually_exclusive_group(required=True) parser_add_list(mgroup, "module") parser_add_extract(mgroup, "module") parser_add_deleteall(mgroup, "module") mgroup.add_argument('-a', '--add', dest='action_add', action='store', nargs=1, metavar='module_name', help=_("Add a module")) mgroup.add_argument('-r', '--remove', dest='action_remove', action='store', nargs='+', metavar='module_name', help=_("Remove a module")) mgroup.add_argument('-d', '--disable', dest='action_disable', action='store', nargs='+', metavar='module_name', help=_("Disable a module")) mgroup.add_argument('-e', '--enable', dest='action_enable', action='store', nargs='+', metavar='module_name', help=_("Enable a module")) moduleParser.set_defaults(func=handleModule) def handleNode(args): node_args = {'list': [('node', 'type', 'proto', 'netmask'), ('')], 'add': [('locallist'), ('type', 'node', 'proto', 'netmask')], 'modify': [('locallist'), ('node', 'netmask', 'proto')], 'delete': [('locallist'), ('node', 'netmask', 'prototype')], 'extract': [('locallist', 'node', 'type', 'proto', 'netmask'), ('')], 'deleteall': [('locallist'), ('')]} handle_opts(args, node_args, args.action) OBJECT = object_dict['node'](args) if args.action == "add": OBJECT.add(args.node, args.netmask, args.proto, args.range, args.type) if args.action == "modify": OBJECT.modify(args.node, args.netmask, args.proto, args.range, args.type) if args.action == "delete": OBJECT.delete(args.node, args.netmask, args.proto) if args.action == "list": OBJECT.list(args.noheading, args.locallist) if args.action == "deleteall": OBJECT.deleteall() if args.action == "extract": for i in OBJECT.customized(): print("node %s" % str(i)) def setupNodeParser(subparsers): generated_usage = generate_custom_usage(usage_node, usage_node_dict) nodeParser = subparsers.add_parser('node', usage=generated_usage, help=_('Manage network node type definitions')) parser_add_locallist(nodeParser, "node") parser_add_noheading(nodeParser, "node") parser_add_noreload(nodeParser, "node") parser_add_store(nodeParser, "node") node_action = nodeParser.add_mutually_exclusive_group(required=True) parser_add_add(node_action, "node") parser_add_delete(node_action, "node") parser_add_modify(node_action, "node") parser_add_list(node_action, "node") parser_add_extract(node_action, "node") parser_add_deleteall(node_action, "node") nodeParser.add_argument('-M', '--netmask', help=_('Network Mask')) parser_add_type(nodeParser, "node") parser_add_range(nodeParser, "node") parser_add_proto(nodeParser, "node") nodeParser.add_argument('node', nargs='?', default=None, help=_('node')) nodeParser.set_defaults(func=handleNode) def handleBoolean(args): boolean_args = {'list': [('state', 'boolean'), ('')], 'modify': [('localist'), ('boolean', 'state')], 'extract': [('locallist', 'state', 'boolean'), ('')], 'deleteall': [('locallist'), ('')], 'state': [('locallist', 'list', 'extract', 'deleteall'), ('modify')]} handle_opts(args, boolean_args, args.action) OBJECT = object_dict['boolean'](args) if args.action == "modify": if args.boolean: OBJECT.modify(args.boolean, args.state, False) if args.action == "list": OBJECT.list(args.noheading, args.locallist) if args.action == "deleteall": OBJECT.deleteall() if args.action == "extract": for i in OBJECT.customized(): print("boolean %s" % str(i)) def setupBooleanParser(subparsers): generated_usage = generate_custom_usage(usage_boolean, usage_boolean_dict) booleanParser = subparsers.add_parser('boolean', usage=generated_usage, help=_('Manage booleans to selectively enable functionality')) parser_add_locallist(booleanParser, "boolean") parser_add_noheading(booleanParser, "boolean") parser_add_noreload(booleanParser, "boolean") parser_add_store(booleanParser, "boolean") booleanParser.add_argument('boolean', nargs="?", default=None, help=_('boolean')) boolean_action = booleanParser.add_mutually_exclusive_group(required=True) #add_add(boolean_action) parser_add_modify(boolean_action, "boolean") parser_add_list(boolean_action, "boolean") parser_add_extract(boolean_action, "boolean") parser_add_deleteall(boolean_action, "boolean") booleanGroup = booleanParser.add_mutually_exclusive_group(required=False) booleanGroup.add_argument('-1', '--on', dest='state', action='store_const', const='on', help=_('Enable the boolean')) booleanGroup.add_argument('-0', '--off', dest='state', action='store_const', const='off', help=_('Disable the boolean')) booleanParser.set_defaults(func=handleBoolean) def handlePermissive(args): OBJECT = object_dict['permissive'](args) if args.action == "list": OBJECT.list(args.noheading) elif args.action == "deleteall": OBJECT.deleteall() elif args.action == "extract": for i in OBJECT.customized(): print("permissive %s" % str(i)) elif args.type is not None: if args.action == "add": OBJECT.add(args.type) if args.action == "delete": OBJECT.delete(args.type) else: args.parser.error(message=_('semanage permissive: error: the following argument is required: type\n')) def setupPermissiveParser(subparsers): permissiveParser = subparsers.add_parser('permissive', help=_('Manage process type enforcement mode')) pgroup = permissiveParser.add_mutually_exclusive_group(required=True) parser_add_add(pgroup, "permissive") parser_add_delete(pgroup, "permissive") parser_add_deleteall(pgroup, "permissive") parser_add_extract(pgroup, "permissive") parser_add_list(pgroup, "permissive") parser_add_noheading(permissiveParser, "permissive") parser_add_noreload(permissiveParser, "permissive") parser_add_store(permissiveParser, "permissive") permissiveParser.add_argument('type', nargs='?', default=None, help=_('type')) permissiveParser.set_defaults(func=handlePermissive) permissiveParser.set_defaults(parser=permissiveParser) def handleDontaudit(args): OBJECT = object_dict['dontaudit'](args) OBJECT.toggle(args.action) def setupDontauditParser(subparsers): dontauditParser = subparsers.add_parser('dontaudit', help=_('Disable/Enable dontaudit rules in policy')) parser_add_noreload(dontauditParser, "dontaudit") parser_add_store(dontauditParser, "dontaudit") dontauditParser.add_argument('action', choices=["on", "off"]) dontauditParser.set_defaults(func=handleDontaudit) def handleExport(args): manageditems = ["boolean", "login", "interface", "user", "port", "node", "fcontext", "module", "ibendport", "ibpkey", "permissive"] for i in manageditems: print("%s -D" % i) for i in manageditems: OBJECT = object_dict[i](args) for c in OBJECT.customized(): print("%s %s" % (i, str(c))) sys.exit(0) def setupExportParser(subparsers): exportParser = subparsers.add_parser('export', help=_('Output local customizations')) parser_add_store(exportParser, "export") exportParser.add_argument('-f', '--output_file', dest='output_file', action=SetExportFile, help=_('Output file')) exportParser.set_defaults(func=handleExport) import re def mkargv(line): dquote = "\"" squote = "\'" l = line.split() ret = [] i = 0 while i < len(l): cnt = len(re.findall(dquote, l[i])) if cnt > 1: ret.append(l[i].strip(dquote)) i = i + 1 continue if cnt == 1: quote = [l[i].strip(dquote)] i = i + 1 while i < len(l) and dquote not in l[i]: quote.append(l[i]) i = i + 1 quote.append(l[i].strip(dquote)) ret.append(" ".join(quote)) i = i + 1 continue cnt = len(re.findall(squote, l[i])) if cnt > 1: ret.append(l[i].strip(squote)) i = i + 1 continue if cnt == 1: quote = [l[i].strip(squote)] i = i + 1 while i < len(l) and squote not in l[i]: quote.append(l[i]) i = i + 1 quote.append(l[i].strip(squote)) ret.append(" ".join(quote)) i = i + 1 continue ret.append(l[i]) i = i + 1 return ret def handleImport(args): trans = seobject.semanageRecords(args) trans.start() for l in sys.stdin.readlines(): if len(l.strip()) == 0: continue try: commandParser = createCommandParser() args = commandParser.parse_args(mkargv(l)) args.func(args) except ValueError as e: sys.stderr.write("%s: %s\n" % (e.__class__.__name__, str(e))) sys.exit(1) except IOError as e: sys.stderr.write("%s: %s\n" % (e.__class__.__name__, str(e))) sys.exit(1) except KeyboardInterrupt: sys.exit(0) trans.finish() def setupImportParser(subparsers): importParser = subparsers.add_parser('import', help=_('Import local customizations')) parser_add_noreload(importParser, "import") parser_add_store(importParser, "import") importParser.add_argument('-f', '--input_file', dest='input_file', action=SetImportFile, help=_('Input file')) importParser.set_defaults(func=handleImport) def createCommandParser(): commandParser = seParser(prog='semanage', formatter_class=argparse.ArgumentDefaultsHelpFormatter, description='''semanage is used to configure certain elements of SELinux policy with-out requiring modification to or recompilation from policy source.''') #To add a new subcommand define the parser for it in a function above and call it here. subparsers = commandParser.add_subparsers(dest='subcommand') subparsers.required = True setupImportParser(subparsers) setupExportParser(subparsers) setupLoginParser(subparsers) setupUserParser(subparsers) setupPortParser(subparsers) setupPkeyParser(subparsers) setupIbendportParser(subparsers) setupInterfaceParser(subparsers) setupModuleParser(subparsers) setupNodeParser(subparsers) setupFcontextParser(subparsers) setupBooleanParser(subparsers) setupPermissiveParser(subparsers) setupDontauditParser(subparsers) return commandParser def make_io_args(args): # import/export backward compatibility args_origin = ["-S", "-o", "-i", "targeted", "minimum", "mls"] args_file = [] args_ie = [] args_subcommand = [] for i in args: if i == "-o": args_subcommand = ["export"] continue if i == "-i": args_subcommand = ["import"] continue if i not in args_origin: args_file = ["-f", i] continue args_ie.append(i) return args_subcommand + args_ie + args_file def make_args(sys_args): args = [] if "-o" in sys_args[1:] or "-i" in sys_args[1:]: args = make_io_args(sys_args[1:]) else: args = sys_args[1:] return args def do_parser(): try: commandParser = createCommandParser() args = commandParser.parse_args(make_args(sys.argv)) args.func(args) sys.exit(0) except IOError as e: sys.stderr.write("%s: %s\n" % (e.__class__.__name__, str(e))) sys.exit(1) except KeyboardInterrupt: sys.exit(0) except ValueError as e: sys.stderr.write("%s: %s\n" % (e.__class__.__name__, e.args[0])) sys.exit(1) except KeyError as e: sys.stderr.write("%s: %s\n" % (e.__class__.__name__, e.args[0])) sys.exit(1) except OSError as e: sys.stderr.write("%s: %s\n" % (e.__class__.__name__, e.args[1])) sys.exit(1) except RuntimeError as e: sys.stderr.write("%s: %s\n" % (e.__class__.__name__, e.args[0])) sys.exit(1) if __name__ == '__main__': do_parser() selinux-python-3.0/semanage/semanage-bash-completion.sh000066400000000000000000000146521356774067000233670ustar00rootroot00000000000000# This file is part of systemd. # # Copyright 2011-2013 Dan Walsh # # systemd is free software; you can redistribute it and/or modify it # under the terms of the GNU General Public License as published by # the Free Software Foundation; either version 2 of the License, or # (at your option) any later version. # # systemd is distributed in the hope that it will be useful, but # WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU # General Public License for more details. # # You should have received a copy of the GNU General Public License # along with systemd; If not, see . __contains_word () { local word=$1; shift for w in $*; do [[ $w = $word ]] && return 0; done return 1 } ALL_OPTS='-l --list -S -o -n --noheading -h --help' MANAGED_OPTS='-a --add -m --modify -d --delete -D --deleteall -C --locallist ' __get_all_stores () { dir -1 -F /etc/selinux/ | grep '/' | cut -d'/' -f 1 } __get_all_ftypes () { echo '-- -d -c -b -s -l -p' } __get_all_users () { seinfo -u 2> /dev/null | tail -n +3 } __get_all_types () { seinfo -t 2> /dev/null | tail -n +3 } __get_all_port_types () { seinfo -aport_type -x 2>/dev/null | tail -n +2 } __get_all_domains () { seinfo -adomain -x 2>/dev/null | tail -n +2 } __get_all_node_types () { seinfo -anode_type -x 2>/dev/null | tail -n +2 } __get_all_file_types () { seinfo -afile_type -x 2>/dev/null | tail -n +2 } __get_all_roles () { seinfo -r 2> /dev/null | tail -n +3 } __get_all_stores () { dir -1 -F /etc/selinux/ | grep '/' | cut -d'/' -f 1 } __get_import_opts () { echo '$ALL_OPTS --f --input_file' ; } __get_export_opts () { echo '$ALL_OPTS --f --output_file' ; } __get_boolean_opts () { echo '$ALL_OPTS --on -off -1 -0' ; } __get_user_opts () { echo '$ALL_OPTS $MANAGED_OPTS -L --level -r --range -R --role '; } __get_login_opts () { echo '$ALL_OPTS $MANAGED_OPTS -s --seuser -r --range'; } __get_port_opts () { echo '$ALL_OPTS $MANAGED_OPTS -t --type -r --range -p --proto'; } __get_interface_opts () { echo '$ALL_OPTS $MANAGED_OPTS -t --type '; } __get_node_opts () { echo '$ALL_OPTS $MANAGED_OPTS -t --type -M --mask -p --proto'; } __get_fcontext_opts () { echo '$ALL_OPTS $MANAGED_OPTS -t --type -e --equal -f --ftype '; } __get_module_opts () { echo '$ALL_OPTS $MANAGED_OPTS --enable --disable '; } __get_dontaudit_opts () { echo '-S on off' ; } __get_permissive_opts () { echo '$ALL_OPTS -a --add -d --delete' ; } _semanage () { local command=${COMP_WORDS[1]} local cur=${COMP_WORDS[COMP_CWORD]} prev=${COMP_WORDS[COMP_CWORD-1]} local verb comps local -A VERBS=( [BOOLEAN]='boolean' [DONTAUDIT]='dontaudit' [EXPORT]='export' [FCONTEXT]='fcontext' [IMPORT]='import' [INTERFACE]='interface' [LOGIN]='login' [MODULE]='module' [NODE]='node' [PERMISSIVE]='permissive' [PORT]='port' [USER]='user' ) if [ "$prev" = "-a" -a "$command" = "permissive" ]; then COMPREPLY=( $(compgen -W "$( __get_all_domains ) " -- "$cur") ) return 0 fi if [ "$verb" = "" -a "$prev" = "semanage" ]; then comps="${VERBS[*]}" elif [ "$verb" = "" -a "$prev" = "-S" -o "$prev" = "--store" ]; then COMPREPLY=( $(compgen -W "$( __get_all_stores ) " -- "$cur") ) return 0 elif [ "$verb" = "" -a "$prev" = "-p" -o "$prev" = "--proto" ]; then COMPREPLY=( $(compgen -W "tcp udp" -- "$cur") ) return 0 elif [ "$verb" = "" -a "$prev" = "-R" -o "$prev" = "-r" -o "$prev" = "--role" ]; then if [ "$command" != "user" -o "$prev" != "-r" ]; then COMPREPLY=( $(compgen -W "$( __get_all_roles ) " -- "$cur") ) return 0 else return 0 fi elif [ "$verb" = "" -a "$prev" = "-s" -o "$prev" = "--seuser" ]; then COMPREPLY=( $(compgen -W "$( __get_all_users ) " -- "$cur") ) return 0 elif [ "$verb" = "" -a "$prev" = "-f" -o "$prev" = "--ftype" ]; then COMPREPLY=( $(compgen -W "$( __get_all_ftypes ) " -- "$cur") ) return 0 elif [ "$verb" = "" -a "$prev" = "-t" -o "$prev" = "--types" ]; then if [ "$command" = "port" ]; then COMPREPLY=( $(compgen -W "$( __get_all_port_types ) " -- "$cur") ) return 0 fi if [ "$command" = "fcontext" ]; then COMPREPLY=( $(compgen -W "$( __get_all_file_types ) " -- "$cur") ) return 0 fi COMPREPLY=( $(compgen -W "$( __get_all_types ) " -- "$cur") ) return 0 elif __contains_word "$command" ${VERBS[LOGIN]} ; then COMPREPLY=( $(compgen -W "$( __get_login_opts ) " -- "$cur") ) return 0 elif __contains_word "$command" ${VERBS[USER]} ; then COMPREPLY=( $(compgen -W "$( __get_user_opts ) " -- "$cur") ) return 0 elif __contains_word "$command" ${VERBS[PORT]} ; then COMPREPLY=( $(compgen -W "$( __get_port_opts ) " -- "$cur") ) return 0 elif __contains_word "$command" ${VERBS[INTERFACE]} ; then COMPREPLY=( $(compgen -W "$( __get_interface_opts ) " -- "$cur") ) return 0 elif __contains_word "$command" ${VERBS[MODULE]} ; then COMPREPLY=( $(compgen -W "$( __get_module_opts ) " -- "$cur") ) return 0 elif __contains_word "$command" ${VERBS[NODE]} ; then COMPREPLY=( $(compgen -W "$( __get_node_opts ) " -- "$cur") ) return 0 elif __contains_word "$command" ${VERBS[FCONTEXT]} ; then COMPREPLY=( $(compgen -W "$( __get_fcontext_opts ) " -- "$cur") ) return 0 elif __contains_word "$command" ${VERBS[BOOLEAN]} ; then COMPREPLY=( $(compgen -W "$( __get_boolean_opts ) " -- "$cur") ) return 0 elif __contains_word "$command" ${VERBS[PERMISSIVE]} ; then COMPREPLY=( $(compgen -W "$( __get_permissive_opts ) " -- "$cur") ) return 0 elif __contains_word "$command" ${VERBS[DONTAUDIT]} ; then COMPREPLY=( $(compgen -W "$( __get_dontaudit_opts ) " -- "$cur") ) return 0 elif __contains_word "$command" ${VERBS[IMPORT]} ; then COMPREPLY=( $(compgen -W "$( __get_import_opts ) " -- "$cur") ) return 0 elif __contains_word "$command" ${VERBS[EXPORT]} ; then COMPREPLY=( $(compgen -W "$( __get_export_opts ) " -- "$cur") ) return 0 fi COMPREPLY=( $(compgen -W "$comps" -- "$cur") ) return 0 } complete -F _semanage semanage selinux-python-3.0/semanage/semanage-boolean.8000066400000000000000000000032411356774067000214470ustar00rootroot00000000000000.TH "semanage-boolean" "8" "20130617" "" "" .SH "NAME" semanage\-boolean \- SELinux Policy Management boolean tool .SH "SYNOPSIS" .B semanage boolean [\-h] [\-n] [\-N] [\-S STORE] [ \-\-extract | \-\-deleteall | \-\-list [\-C] | \-\-modify ( \-\-on | \-\-off ) boolean ] .SH "DESCRIPTION" semanage is used to configure certain elements of SELinux policy without requiring modification to or recompilation from policy sources. semanage boolean command controls the settings of booleans in SELinux policy. booleans are if\-then\-else rules written in SELinux Policy. They can be used to customize the way that SELinux Policy rules effect a confined domain. .SH "OPTIONS" .TP .I \-h, \-\-help show this help message and exit .TP .I \-n, \-\-noheading Do not print heading when listing the specified object type .TP .I \-N, \-\-noreload Do not reload policy after commit .TP .I \-S STORE, \-\-store STORE Select an alternate SELinux Policy Store to manage .TP .I \-C, \-\-locallist List local customizations .TP .I \-m, \-\-modify Modify a record of the specified object type .TP .I \-l, \-\-list List records of the specified object type .TP .I \-E, \-\-extract Extract customizable commands, for use within a transaction .TP .I \-D, \-\-deleteall Remove all local customizations .TP .I \-1, \-\-on Enable the boolean .TP .I \-0, \-\-off Disable the boolean .SH EXAMPLE .nf Turn on the apache can send mail boolean # semanage boolean \-m \-\-on httpd_can_sendmail List customized booleans # semanage boolean \-l \-C .SH "SEE ALSO" .BR selinux (8), .BR semanage (8), .BR setsebool (8), .BR getsebool (8) .SH "AUTHOR" This man page was written by Daniel Walsh selinux-python-3.0/semanage/semanage-dontaudit.8000066400000000000000000000023011356774067000220170ustar00rootroot00000000000000.TH "semanage-dontaudit" "8" "20130617" "" "" .SH "NAME" .B semanage\-dontaudit \- SELinux Policy Management dontaudit tool .SH "SYNOPSIS" .B semanage dontaudit [\-h] [\-S STORE] [\-N] {on,off} .SH "DESCRIPTION" semanage is used to configure certain elements of SELinux policy without requiring modification to or recompilation from policy sources. semanage dontaudit toggles whether or not dontaudit rules will be in the policy. Policy writers use dontaudit rules to cause confined applications to use alternative paths. Dontaudit rules are denied but not reported in the logs. Some times dontaudit rules can cause bugs in applications but policy writers will not realize it since the AVC is not audited. Turning off dontaudit rules with this command to see if the kernel is blocking an access. .SH "OPTIONS" .TP .I \-h, \-\-help show this help message and exit .TP .I \-S STORE, \-\-store STORE Select an alternate SELinux Policy Store to manage .TP .I \-N, \-\-noreload Do not reload the policy after commit .SH EXAMPLE .nf Turn off dontaudit rules # semanage dontaudit off .SH "SEE ALSO" .BR selinux (8), .BR semanage (8) .SH "AUTHOR" This man page was written by Daniel Walsh selinux-python-3.0/semanage/semanage-export.8000066400000000000000000000021671356774067000213570ustar00rootroot00000000000000.TH "semanage-export" "8" "20130617" "" "" .SH "NAME" .B semanage\-export \- SELinux Policy Management import tool .SH "SYNOPSIS" .B semanage export [\-h] [\-S STORE] [\-f OUTPUT_FILE] .SH "DESCRIPTION" semanage is used to configure certain elements of SELinux policy without requiring modification to or recompilation from policy sources. semanage import and export can be used to extract the SELinux modifications from one machine and apply them to another. You can put a whole group of semanage commands within a file and apply them to a machine in a single transaction. .SH "OPTIONS" .TP .I \-h, \-\-help show this help message and exit .TP .I \-S STORE, \-\-store STORE Select an alternate SELinux Policy Store to manage .TP .I \-f OUTPUT_FILE, \-\-output_file OUTPUT_FILE Output file .SH EXAMPLE .nf Import semanage modifications from another machine # semanage export \-f semanage.mods # scp semanage.mod remotemachine: # ssh remotemachine # semanage import \-f semanage.mods .SH "SEE ALSO" .BR selinux (8), .BR semanage (8), .BR semanage-import (8) .SH "AUTHOR" This man page was written by Daniel Walsh selinux-python-3.0/semanage/semanage-fcontext.8000066400000000000000000000063721356774067000216720ustar00rootroot00000000000000.TH "semanage-fcontext" "8" "20130617" "" "" .SH "NAME" semanage\-fcontext \- SELinux Policy Management file context tool .SH "SYNOPSIS" .B semanage fcontext [\-h] [\-n] [\-N] [\-S STORE] [ \-\-add ( \-t TYPE \-f FTYPE \-r RANGE \-s SEUSER | \-e EQUAL ) FILE_SPEC ) | \-\-delete ( \-t TYPE \-f FTYPE | \-e EQUAL ) FILE_SPEC ) | \-\-deleteall | \-\-extract | \-\-list [\-C] | \-\-modify ( \-t TYPE \-f FTYPE \-r RANGE \-s SEUSER | \-e EQUAL ) FILE_SPEC ) ] .SH "DESCRIPTION" semanage is used to configure certain elements of SELinux policy without requiring modification to or recompilation from policy sources. semanage fcontext is used to manage the default file system labeling on an SELinux system. This command maps file paths using regular expressions to SELinux labels. .SH "OPTIONS" .TP .I \-h, \-\-help show this help message and exit .TP .I \-n, \-\-noheading Do not print heading when listing the specified object type .TP .I \-N, \-\-noreload Do not reload policy after commit .TP .I \-C, \-\-locallist List local customizations .TP .I \-S STORE, \-\-store STORE Select an alternate SELinux Policy Store to manage .TP .I \-a, \-\-add Add a record of the specified object type .TP .I \-d, \-\-delete Delete a record of the specified object type .TP .I \-m, \-\-modify Modify a record of the specified object type .TP .I \-l, \-\-list List records of the specified object type .TP .I \-E, \-\-extract Extract customizable commands, for use within a transaction .TP .I \-D, \-\-deleteall Remove all local customizations .TP .I \-e EQUAL, \-\-equal EQUAL Substitute target path with sourcepath when generating default label. This is used with fcontext. Requires source and target path arguments. The context labeling for the target subtree is made equivalent to that defined for the source. .TP .I \-f [{a,f,d,c,b,s,l,p}], \-\-ftype [{a,f,d,c,b,s,l,p}] File Type. This is used with fcontext. Requires a file type as shown in the mode field by ls, e.g. use 'd' to match only directories or 'f' to match only regular files. The following file type options can be passed: f (regular file),d (directory),c (character device), b (block device),s (socket),l (symbolic link),p (named pipe). If you do not specify a file type, the file type will default to "all files". .TP .I \-s SEUSER, \-\-seuser SEUSER SELinux user name .TP .I \-t TYPE, \-\-type TYPE SELinux Type for the object .TP .I \-r RANGE, \-\-range RANGE MLS/MCS Security Range (MLS/MCS Systems only) SELinux Range for SELinux login mapping defaults to the SELinux user record range. SELinux Range for SELinux user defaults to s0. .SH EXAMPLE .nf .I remember to run restorecon after you set the file context Add file-context for everything under /web # semanage fcontext \-a \-t httpd_sys_content_t "/web(/.*)?" # restorecon \-R \-v /web Substitute /home1 with /home when setting file context # semanage fcontext \-a \-e /home /home1 # restorecon \-R \-v /home1 For home directories under top level directory, for example /disk6/home, execute the following commands. # semanage fcontext \-a \-t home_root_t "/disk6" # semanage fcontext \-a \-e /home /disk6/home # restorecon \-R \-v /disk6 .SH "SEE ALSO" .BR selinux (8), .BR semanage (8) .SH "AUTHOR" This man page was written by Daniel Walsh selinux-python-3.0/semanage/semanage-ibendport.8000066400000000000000000000040401356774067000220140ustar00rootroot00000000000000.TH "semanage-ibendport" "8" "20170508" "" "" .SH "NAME" .B semanage\-ibendport \- SELinux Policy Management ibendport mapping tool .SH "SYNOPSIS" .B semanage ibendport [\-h] [\-n] [\-N] [\-S STORE] [ \-\-add \-t TYPE \-z IBDEV_NAME \-r RANGE port | \-\-delete \-z IBDEV_NAME port | \-\-deleteall | \-\-extract | \-\-list [\-C] | \-\-modify \-t TYPE \-z IBDEV_NAME \-r RANGE port ] .SH "DESCRIPTION" semanage is used to configure certain elements of SELinux policy without requiring modification to or recompilation from policy sources. semanage ibendport controls the ibendport number to ibendport type definitions. .SH "OPTIONS" .TP .I \-h, \-\-help show this help message and exit .TP .I \-n, \-\-noheading Do not print heading when listing the specified object type .TP .I \-N, \-\-noreload Do not reload policy after commit .TP .I \-S STORE, \-\-store STORE Select an alternate SELinux Policy Store to manage .TP .I \-C, \-\-locallist List local customizations .TP .I \-a, \-\-add Add a record of the specified object type .TP .I \-d, \-\-delete Delete a record of the specified object type .TP .I \-m, \-\-modify Modify a record of the specified object type .TP .I \-l, \-\-list List records of the specified object type .TP .I \-E, \-\-extract Extract customizable commands, for use within a transaction .TP .I \-D, \-\-deleteall Remove all local customizations .TP .I \-t TYPE, \-\-type TYPE SELinux type for the object .TP .I \-r RANGE, \-\-range RANGE MLS/MCS Security Range (MLS/MCS Systems only) SELinux Range for SELinux login mapping defaults to the SELinux user record range. SELinux Range for SELinux user defaults to s0. .TP .I \-z IBDEV_NAME, \-\-ibdev_name IBDEV_NAME The name of the infiniband device for the port to be labeled. (ex. mlx5_0) .SH EXAMPLE .nf List all ibendport definitions # semanage ibendport \-l Label mlx4_0 port 2. # semanage ibendport \-a \-t allowed_ibendport_t \-z mlx4_0 2 .SH "SEE ALSO" .BR selinux (8), .BR semanage (8) .SH "AUTHOR" This man page was written by Daniel Jurgens selinux-python-3.0/semanage/semanage-ibpkey.8000066400000000000000000000041721356774067000213170ustar00rootroot00000000000000.TH "semanage-ibpkey" "8" "20170508" "" "" .SH "NAME" .B semanage\-ibpkey \- SELinux Policy Management ibpkey mapping tool .SH "SYNOPSIS" .B semanage ibpkey [\-h] [\-n] [\-N] [\-S STORE] [ \-\-add \-t TYPE \-x SUBNET_PREFIX \-r RANGE ibpkey_name | ibpkey_range | \-\-delete \-x SUBNET_PREFIX ibpkey_name | ibpkey_range | \-\-deleteall | \-\-extract | \-\-list [\-C] | \-\-modify \-t TYPE \-x SUBNET_PREFIX \-r RANGE ibpkey_name | ibpkey_range ] .SH "DESCRIPTION" semanage is used to configure certain elements of SELinux policy without requiring modification to or recompilation from policy sources. semanage ibpkey controls the ibpkey number to ibpkey type definitions. .SH "OPTIONS" .TP .I \-h, \-\-help show this help message and exit .TP .I \-n, \-\-noheading Do not print heading when listing the specified object type .TP .I \-N, \-\-noreload Do not reload policy after commit .TP .I \-S STORE, \-\-store STORE Select an alternate SELinux Policy Store to manage .TP .I \-C, \-\-locallist List local customizations .TP .I \-a, \-\-add Add a record of the specified object type .TP .I \-d, \-\-delete Delete a record of the specified object type .TP .I \-m, \-\-modify Modify a record of the specified object type .TP .I \-l, \-\-list List records of the specified object type .TP .I \-E, \-\-extract Extract customizable commands, for use within a transaction .TP .I \-D, \-\-deleteall Remove all local customizations .TP .I \-t TYPE, \-\-type TYPE SELinux type for the object .TP .I \-r RANGE, \-\-range RANGE MLS/MCS Security Range (MLS/MCS Systems only) SELinux Range for SELinux login mapping defaults to the SELinux user record range. SELinux Range for SELinux user defaults to s0. .TP .I \-x SUBNET_PREFIX, \-\-subnet_prefix SUBNET_PREFIX Subnet prefix for the specified pkey or range of pkeys. .SH EXAMPLE .nf List all ibpkey definitions # semanage ibpkey \-l Label pkey 0x8FFF (limited membership default pkey) as a default pkey type # semanage ibpkey \-a \-t default_ibpkey_t \-x fe80:: 0x8FFF .SH "SEE ALSO" .BR selinux (8), .BR semanage (8) .SH "AUTHOR" This man page was written by Daniel Jurgens selinux-python-3.0/semanage/semanage-import.8000066400000000000000000000021271356774067000213440ustar00rootroot00000000000000.TH "semanage-import" "8" "20130617" "" "" .SH "NAME" .B semanage\-import \- SELinux Policy Management import tool .SH "SYNOPSIS" .B semanage import [\-h] [\-N] [\-S STORE] [\-f INPUT_FILE] .SH "DESCRIPTION" semanage is used to configure certain elements of SELinux policy without requiring modification to or recompilation from policy sources. semanage import and export can be used to extract the SELinux modifications from one machine and apply them to another. You can put a whole group of semanage commands within a file and apply them to a machine in a single transaction. .SH "OPTIONS" .TP .I \-h, \-\-help show this help message and exit .TP .I \-N, \-\-noreload Do not reload policy after commit .TP .I \-S STORE, \-\-store STORE Select an alternate SELinux Policy Store to manage .TP .I \-f INPUT_FILE, \-\-input_file INPUT_FILE Input file .SH EXAMPLE .nf Import semanage modifications from another machine # semanage import \-f semanage.mods .SH "SEE ALSO" .B selinux (8), .B semanage (8), .B semanage-export (8) .SH "AUTHOR" This man page was written by Daniel Walsh selinux-python-3.0/semanage/semanage-interface.8000066400000000000000000000034261356774067000217750ustar00rootroot00000000000000.TH "semanage-interface" "8" "20130617" "" "" .SH "NAME" .B semanage\-interface \- SELinux Policy Management network interface tool .SH "SYNOPSIS" .B semanage interface [\-h] [\-n] [\-N] [\-S STORE] [ \-\-add \-t TYPE \-r RANGE interface | \-\-delete interface | \-\-deleteall | \-\-extract | \-\-list [\-C] | \-\-modify \-t TYPE \-r RANGE interface ] .SH "DESCRIPTION" semanage is used to configure certain elements of SELinux policy without requiring modification to or recompilation from policy sources. semanage interface controls the labels assigned to network interfaces. .SH "OPTIONS" .TP .I \-h, \-\-help show this help message and exit .TP .I \-n, \-\-noheading Do not print heading when listing the specified object type .TP .I \-N, \-\-noreload Do not reload policy after commit .TP .I \-S STORE, \-\-store STORE Select an alternate SELinux Policy Store to manage .TP .I \-C, \-\-locallist List local customizations .TP .I \-a, \-\-add Add a record of the specified object type .TP .I \-d, \-\-delete Delete a record of the specified object type .TP .I \-m, \-\-modify Modify a record of the specified object type .TP .I \-l, \-\-list List records of the specified object type .TP .I \-E, \-\-extract Extract customizable commands, for use within a transaction .TP .I \-D, \-\-deleteall Remove all local customizations .TP .I \-t TYPE, \-\-type TYPE SELinux type for the object .TP .I \-r RANGE, \-\-range RANGE MLS/MCS Security Range (MLS/MCS Systems only) SELinux Range for SELinux login mapping defaults to the SELinux user record range. SELinux Range for SELinux user defaults to s0. .SH EXAMPLE .nf list all interface definitions # semanage interface \-l .SH "SEE ALSO" .BR selinux (8), .BR semanage (8) .SH "AUTHOR" This man page was written by Daniel Walsh selinux-python-3.0/semanage/semanage-login.8000066400000000000000000000044511356774067000211440ustar00rootroot00000000000000.TH "semanage-login" "8" "20130617" "" "" .SH "NAME" .B semanage\-login \- SELinux Policy Management linux user to SELinux User mapping tool .SH "SYNOPSIS" .B semanage login [\-h] [\-n] [\-N] [\-S STORE] [ \-\-add \-s SEUSER \-r RANGE LOGIN | \-\-delete LOGIN | \-\-deleteall | \-\-extract | \-\-list [\-C] | \-\-modify \-s SEUSER \-r RANGE LOGIN ] .SH "DESCRIPTION" semanage is used to configure certain elements of SELinux policy without requiring modification to or recompilation from policy sources. semanage login controls the mapping between a Linux User and the SELinux User. It can be used to turn on confined users. For example you could define that a particular user or group of users will login to a system as the user_u user. Prefix the group name with a '%' sign to indicate a group name. .SH "OPTIONS" .TP .I \-h, \-\-help show this help message and exit .TP .I \-n, \-\-noheading Do not print heading when listing the specified object type .TP .I \-N, \-\-noreload Do not reload policy after commit .TP .I \-C, \-\-locallist List local customizations .TP .I \-S STORE, \-\-store STORE Select an alternate SELinux Policy Store to manage .TP .I \-a, \-\-add Add a record of the specified object type .TP .I \-d, \-\-delete Delete a record of the specified object type .TP .I \-m, \-\-modify Modify a record of the specified object type .TP .I \-l, \-\-list List records of the specified object type .TP .I \-E, \-\-extract Extract customizable commands, for use within a transaction .TP .I \-D, \-\-deleteall Remove all local customizations .TP .I \-s SEUSER, \-\-seuser SEUSER SELinux user name .TP .I \-r RANGE, \-\-range RANGE MLS/MCS Security Range (MLS/MCS Systems only) SELinux Range for SELinux login mapping defaults to the SELinux user record range. SELinux Range for SELinux user defaults to s0. .SH EXAMPLE .nf Modify the default user on the system to the guest_u user # semanage login \-m \-s guest_u __default__ Assign gijoe user on an MLS machine a range and to the staff_u user # semanage login \-a \-s staff_u \-rSystemLow-Secret gijoe Assign all users in the engineering group to the staff_u user # semanage login \-a \-s staff_u %engineering .SH "SEE ALSO" .BR selinux (8), .BR semanage (8), .BR semanage-user (8) .SH "AUTHOR" This man page was written by Daniel Walsh selinux-python-3.0/semanage/semanage-module.8000066400000000000000000000027771356774067000213320ustar00rootroot00000000000000.TH "semanage-module" "8" "20130617" "" "" .SH "NAME" .B semanage\-module \- SELinux Policy Management module mapping tool .SH "SYNOPSIS" .B semanage module [\-h] [\-n] [\-N] [\-S STORE] (\-a | \-r | \-e | \-d | \-\-extract | \-\-list [\-C] | \-\-deleteall) [module_name] .SH "DESCRIPTION" semanage is used to configure certain elements of SELinux policy without requiring modification to or recompilation from policy sources. semanage module installs, removes, disables SELinux Policy modules. .SH "OPTIONS" .TP .I \-h, \-\-help show this help message and exit .TP .I \-n, \-\-noheading Do not print heading when listing the specified object type .TP .I \-N, \-\-noreload Do not reload policy after commit .TP .I \-S STORE, \-\-store STORE Select an alternate SELinux Policy Store to manage .TP .I \-a, \-\-add Install specified module .TP .I \-r, \-\-remove Remove specified module .TP .I \-d \-\-disable Disable specified module .TP .I \-e \-\-enable Enable specified module .TP .I \-E, \-\-extract Extract customizable commands, for use within a transaction .TP .I \-l, \-\-list List records of the specified object type .TP .I \-C, \-\-locallist List local customizations .SH EXAMPLE .nf List all modules # semanage module \-l Disable unconfined module # semanage module \-\-disable unconfined Install custom apache policy module # semanage module \-a myapache .SH "SEE ALSO" .BR selinux (8), .BR semanage (8), .BR semodule (8) .SH "AUTHOR" This man page was written by Daniel Walsh selinux-python-3.0/semanage/semanage-node.8000066400000000000000000000034761356774067000207670ustar00rootroot00000000000000.TH "semanage-node" "8" "20130617" "" "" .SH "NAME" .B semanage\-node \- SELinux Policy Management node mapping tool .SH "SYNOPSIS" .B semanage node [\-h] [\-n] [\-N] [\-S STORE] [ \-\-add \-M NETMASK \-p PROTOCOL \-t TYPE \-r RANGE node | \-\-delete \-M NETMASK \-p PROTOCOL node | \-\-deleteall | \-\-extract | \-\-list [\-C] | \-\-modify \-M NETMASK \-p PROTOCOL \-t TYPE \-r RANGE node ] .SH "DESCRIPTION" semanage is used to configure certain elements of SELinux policy without requiring modification to or recompilation from policy sources. semanage controls the ipaddress to node type definitions. .SH "OPTIONS" .TP .I \-h, \-\-help show this help message and exit .TP .I \-n, \-\-noheading Do not print heading when listing the specified object type .TP .I \-N, \-\-noreload Do not reload policy after commit .TP .I \-S STORE, \-\-store STORE Select an alternate SELinux Policy Store to manage .TP .I \-C, \-\-locallist List local customizations .TP .I \-a, \-\-add Add a record of the specified object type .TP .I \-d, \-\-delete Delete a record of the specified object type .TP .I \-m, \-\-modify Modify a record of the specified object type .TP .I \-l, \-\-list List records of the specified object type .TP .I \-E, \-\-extract Extract customizable commands, for use within a transaction .TP .I \-D, \-\-deleteall Remove all local customizations .TP .I \-M NETMASK, \-\-netmask NETMASK Network Mask .TP .I \-t TYPE, \-\-type TYPE SELinux type for the object .TP .I \-r RANGE, \-\-range RANGE MLS/MCS Security Range (MLS/MCS Systems only) SELinux Range for SELinux login mapping defaults to the SELinux user record range. SELinux Range for SELinux user defaults to s0. .TP .I \-p PROTO, \-\-proto PROTO Protocol for the specified port (tcp|udp) or internet protocol version for the specified node (ipv4|ipv6). selinux-python-3.0/semanage/semanage-permissive.8000066400000000000000000000026631356774067000222250ustar00rootroot00000000000000.TH "semanage-permissive" "8" "20130617" "" "" .SH "NAME" .B semanage\-permissive \- SELinux Policy Management permissive mapping tool .SH "SYNOPSIS" .B semanage permissive [\-h] [\-n] [\-N] [\-S STORE] (\-\-add TYPE | \-\-delete TYPE | \-\-deleteall | \-\-extract | \-\-list) .SH "DESCRIPTION" semanage is used to configure certain elements of SELinux policy without requiring modification to or recompilation from policy sources. semanage permissive adds or removes a SELinux Policy permissive module. .SH "OPTIONS" .TP .I \-h, \-\-help show this help message and exit .TP .I \-a, \-\-add Add a record of the specified object type .TP .I \-d, \-\-delete Delete a record of the specified object type .TP .I \-D, \-\-deleteall Remove all local customizations of permissive domains .TP .I \-l, \-\-list List records of the specified object type .TP .I \-E, \-\-extract Extract customizable commands, for use within a transaction .TP .I \-n, \-\-noheading Do not print heading when listing the specified object type .TP .I \-N, \-\-noreload Do not reload the policy after commit .TP .I \-S STORE, \-\-store STORE Select an alternate SELinux Policy Store to manage .SH EXAMPLE .nf List all permissive modules # semanage permissive \-l Make httpd_t (Web Server) a permissive domain # semanage permissive \-a httpd_t .SH "SEE ALSO" .BR selinux (8), .BR semanage (8) .SH "AUTHOR" This man page was written by Daniel Walsh selinux-python-3.0/semanage/semanage-port.8000066400000000000000000000042221356774067000210140ustar00rootroot00000000000000.TH "semanage-port" "8" "20130617" "" "" .SH "NAME" .B semanage\-port \- SELinux Policy Management port mapping tool .SH "SYNOPSIS" .B semanage port [\-h] [\-n] [\-N] [\-S STORE] [ \-\-add \-t TYPE \-p PROTOCOL \-r RANGE port_name | port_range | \-\-delete \-p PROTOCOL port_name | port_range | \-\-deleteall | \-\-extract | \-\-list [\-C] | \-\-modify \-t TYPE \-p PROTOCOL \-r RANGE port_name | port_range ] .SH "DESCRIPTION" semanage is used to configure certain elements of SELinux policy without requiring modification to or recompilation from policy sources. semanage port controls the port number to port type definitions. .SH "OPTIONS" .TP .I \-h, \-\-help show this help message and exit .TP .I \-n, \-\-noheading Do not print heading when listing the specified object type .TP .I \-N, \-\-noreload Do not reload policy after commit .TP .I \-S STORE, \-\-store STORE Select an alternate SELinux Policy Store to manage .TP .I \-C, \-\-locallist List local customizations .TP .I \-a, \-\-add Add a record of the specified object type .TP .I \-d, \-\-delete Delete a record of the specified object type .TP .I \-m, \-\-modify Modify a record of the specified object type .TP .I \-l, \-\-list List records of the specified object type .TP .I \-E, \-\-extract Extract customizable commands, for use within a transaction .TP .I \-D, \-\-deleteall Remove all local customizations .TP .I \-t TYPE, \-\-type TYPE SELinux type for the object .TP .I \-r RANGE, \-\-range RANGE MLS/MCS Security Range (MLS/MCS Systems only) SELinux Range for SELinux login mapping defaults to the SELinux user record range. SELinux Range for SELinux user defaults to s0. .TP .I \-p PROTO, \-\-proto PROTO Protocol for the specified port (tcp|udp|dccp|sctp) or internet protocol version for the specified node (ipv4|ipv6). .SH EXAMPLE .nf List all port definitions # semanage port \-l Allow Apache to listen on tcp port 81 # semanage port \-a \-t http_port_t \-p tcp 81 Allow sshd to listen on tcp port 8991 # semanage port \-a \-t ssh_port_t \-p tcp 8991 .SH "SEE ALSO" .BR selinux (8), .BR semanage (8) .SH "AUTHOR" This man page was written by Daniel Walsh selinux-python-3.0/semanage/semanage-user.8000066400000000000000000000043231356774067000210100ustar00rootroot00000000000000.TH "semanage-user" "8" "20130617" "" "" .SH "NAME" .B semanage\-user \- SELinux Policy Management SELinux User mapping tool .SH "SYNOPSIS" .B semanage user [\-h] [\-n] [\-N] [\-S STORE] [ \-\-add ( \-L LEVEL \-R ROLES \-r RANGE SEUSER) | \-\-delete SEUSER | \-\-deleteall | \-\-extract | \-\-list [\-C] | \-\-modify ( \-L LEVEL \-R ROLES \-r RANGE SEUSER ) ] .SH "DESCRIPTION" semanage is used to configure certain elements of SELinux policy without requiring modification to or recompilation from policy sources. semanage user controls the mapping between an SELinux User and the roles and MLS/MCS levels. .SH "OPTIONS" .TP .I \-h, \-\-help show this help message and exit .TP .I \-n, \-\-noheading Do not print heading when listing the specified object type .TP .I \-N, \-\-noreload Do not reload policy after commit .TP .I \-S STORE, \-\-store STORE Select an alternate SELinux Policy Store to manage .TP .I \-C, \-\-locallist List local customizations .TP .I \-a, \-\-add Add a record of the specified object type .TP .I \-d, \-\-delete Delete a record of the specified object type .TP .I \-m, \-\-modify Modify a record of the specified object type .TP .I \-l, \-\-list List records of the specified object type .TP .I \-E, \-\-extract Extract customizable commands, for use within a transaction .TP .I \-D, \-\-deleteall Remove all local customizations .TP .I \-L LEVEL, \-\-level LEVEL Default SELinux Level for SELinux user, s0 Default. (MLS/MCS Systems only) .TP .I \-r RANGE, \-\-range RANGE MLS/MCS Security Range (MLS/MCS Systems only) SELinux Range for SELinux login mapping defaults to the SELinux user record range. SELinux Range for SELinux user defaults to s0. .TP .I \-R [ROLES], \-\-roles [ROLES] SELinux Roles. You must enclose multiple roles within quotes, separate by spaces. Or specify \-R multiple times. .SH EXAMPLE .nf List SELinux users # semanage user \-l Modify groups for staff_u user # semanage user \-m \-R "system_r unconfined_r staff_r" staff_u Add level for TopSecret Users # semanage user \-a \-R "staff_r" \-rs0\-TopSecret topsecret_u .SH "SEE ALSO" .BR selinux (8), .BR semanage (8), .BR semanage\-login (8) .SH "AUTHOR" This man page was written by Daniel Walsh selinux-python-3.0/semanage/semanage.8000066400000000000000000000052031356774067000200320ustar00rootroot00000000000000.TH "semanage" "8" "20100223" "" "" .SH "NAME" semanage \- SELinux Policy Management tool .SH "SYNOPSIS" .B semanage {import,export,login,user,port,interface,module,node,fcontext,boolean,permissive,dontaudit,ibpkey,ibendport} ... .B positional arguments: .B import Import local customizations .B export Output local customizations .B login Manage login mappings between linux users and SELinux confined users .B user Manage SELinux confined users (Roles and levels for an SELinux user) .B port Manage network port type definitions .B interface Manage network interface type definitions .B module Manage SELinux policy modules .B node Manage network node type definitions .B fcontext Manage file context mapping definitions .B boolean Manage booleans to selectively enable functionality .B permissive Manage process type enforcement mode .B dontaudit Disable/Enable dontaudit rules in policy .B ibpkey Manage infiniband pkey type definitions .B ibendport Manage infiniband end port type definitions .SH "DESCRIPTION" semanage is used to configure certain elements of SELinux policy without requiring modification to or recompilation from policy sources. This includes the mapping from Linux usernames to SELinux user identities (which controls the initial security context assigned to Linux users when they login and bounds their authorized role set) as well as security context mappings for various kinds of objects, such as network ports, interfaces, infiniband pkeys and endports, and nodes (hosts) as well as the file context mapping. Note that the semanage login command deals with the mapping from Linux usernames (logins) to SELinux user identities, while the semanage user command deals with the mapping from SELinux user identities to authorized role sets. In most cases, only the former mapping needs to be adjusted by the administrator; the latter is principally defined by the base policy and usually does not require modification. .SH "OPTIONS" .TP .I \-h, \-\-help List help information .SH "SEE ALSO" .BR selinux (8), .BR semanage-boolean (8), .BR semanage-dontaudit (8), .BR semanage-export (8), .BR semanage-fcontext (8), .BR semanage-import (8), .BR semanage-interface (8), .BR semanage-login (8), .BR semanage-module (8), .BR semanage-node (8), .BR semanage-permissive (8), .BR semanage-port (8), .BR semanage-user (8) .BR semanage-ibkey (8), .BR semanage-ibendport (8), .SH "AUTHOR" This man page was written by Daniel Walsh .br and Russell Coker . .br Examples by Thomas Bleher . usage: semanage [\-h] selinux-python-3.0/semanage/seobject.py000066400000000000000000003153231356774067000203400ustar00rootroot00000000000000# Copyright (C) 2005-2013 Red Hat # see file 'COPYING' for use and warranty information # # semanage is a tool for managing SELinux configuration files # # This program is free software; you can redistribute it and/or # modify it under the terms of the GNU General Public License as # published by the Free Software Foundation; either version 2 of # the License, or (at your option) any later version. # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program; if not, write to the Free Software # Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA # 02111-1307 USA # # import pwd import grp import selinux import os import re import sys import stat import socket from semanage import * PROGNAME = "policycoreutils" import sepolicy import setools from IPy import IP try: import gettext kwargs = {} if sys.version_info < (3,): kwargs['unicode'] = True gettext.install(PROGNAME, localedir="/usr/share/locale", codeset='utf-8', **kwargs) except: try: import builtins builtins.__dict__['_'] = str except ImportError: import __builtin__ __builtin__.__dict__['_'] = unicode import syslog file_types = {} file_types[""] = SEMANAGE_FCONTEXT_ALL file_types["all files"] = SEMANAGE_FCONTEXT_ALL file_types["a"] = SEMANAGE_FCONTEXT_ALL file_types["regular file"] = SEMANAGE_FCONTEXT_REG file_types["--"] = SEMANAGE_FCONTEXT_REG file_types["f"] = SEMANAGE_FCONTEXT_REG file_types["-d"] = SEMANAGE_FCONTEXT_DIR file_types["directory"] = SEMANAGE_FCONTEXT_DIR file_types["d"] = SEMANAGE_FCONTEXT_DIR file_types["-c"] = SEMANAGE_FCONTEXT_CHAR file_types["character device"] = SEMANAGE_FCONTEXT_CHAR file_types["c"] = SEMANAGE_FCONTEXT_CHAR file_types["-b"] = SEMANAGE_FCONTEXT_BLOCK file_types["block device"] = SEMANAGE_FCONTEXT_BLOCK file_types["b"] = SEMANAGE_FCONTEXT_BLOCK file_types["-s"] = SEMANAGE_FCONTEXT_SOCK file_types["socket"] = SEMANAGE_FCONTEXT_SOCK file_types["s"] = SEMANAGE_FCONTEXT_SOCK file_types["-l"] = SEMANAGE_FCONTEXT_LINK file_types["l"] = SEMANAGE_FCONTEXT_LINK file_types["symbolic link"] = SEMANAGE_FCONTEXT_LINK file_types["p"] = SEMANAGE_FCONTEXT_PIPE file_types["-p"] = SEMANAGE_FCONTEXT_PIPE file_types["named pipe"] = SEMANAGE_FCONTEXT_PIPE file_type_str_to_option = {"all files": "a", "regular file": "f", "directory": "d", "character device": "c", "block device": "b", "socket": "s", "symbolic link": "l", "named pipe": "p"} ftype_to_audit = {"": "any", "a" : "any", "b": "block", "c": "char", "d": "dir", "f": "file", "l": "symlink", "p": "pipe", "s": "socket"} try: import audit #test if audit module is enabled audit.audit_close(audit.audit_open()) class logger: def __init__(self): self.audit_fd = audit.audit_open() self.log_list = [] self.log_change_list = [] def log(self, msg, name="", sename="", serole="", serange="", oldsename="", oldserole="", oldserange=""): sep = "-" if sename != oldsename: msg += sep + "sename" sep = "," if serole != oldserole: msg += sep + "role" sep = "," if serange != oldserange: msg += sep + "range" sep = "," self.log_list.append([self.audit_fd, audit.AUDIT_ROLE_ASSIGN, sys.argv[0], str(msg), name, 0, sename, serole, serange, oldsename, oldserole, oldserange, "", "", ""]) def log_remove(self, msg, name="", sename="", serole="", serange="", oldsename="", oldserole="", oldserange=""): self.log_list.append([self.audit_fd, audit.AUDIT_ROLE_REMOVE, sys.argv[0], str(msg), name, 0, sename, serole, serange, oldsename, oldserole, oldserange, "", "", ""]) def log_change(self, msg): self.log_change_list.append([self.audit_fd, audit.AUDIT_USER_MAC_CONFIG_CHANGE, str(msg), "semanage", "", "", ""]) def commit(self, success): for l in self.log_list: audit.audit_log_semanage_message(*(l + [success])) for l in self.log_change_list: audit.audit_log_user_comm_message(*(l + [success])) self.log_list = [] self.log_change_list = [] except (OSError, ImportError): class logger: def __init__(self): self.log_list = [] def log(self, msg, name="", sename="", serole="", serange="", oldsename="", oldserole="", oldserange=""): message = " %s name=%s" % (msg, name) if sename != "": message += " sename=" + sename if oldsename != "": message += " oldsename=" + oldsename if serole != "": message += " role=" + serole if oldserole != "": message += " old_role=" + oldserole if serange != "" and serange is not None: message += " MLSRange=" + serange if oldserange != "" and oldserange is not None: message += " old_MLSRange=" + oldserange self.log_list.append(message) def log_remove(self, msg, name="", sename="", serole="", serange="", oldsename="", oldserole="", oldserange=""): self.log(msg, name, sename, serole, serange, oldsename, oldserole, oldserange) def log_change(self, msg): self.log_list.append(" %s" % msg) def commit(self, success): if success == 1: message = "Successful: " else: message = "Failed: " for l in self.log_list: syslog.syslog(syslog.LOG_INFO, message + l) class nulllogger: def log(self, msg, name="", sename="", serole="", serange="", oldsename="", oldserole="", oldserange=""): pass def log_remove(self, msg, name="", sename="", serole="", serange="", oldsename="", oldserole="", oldserange=""): pass def log_change(self, msg): pass def commit(self, success): pass def validate_level(raw): sensitivity = "s[0-9]*" category = "c[0-9]*" cat_range = category + r"(\." + category + ")?" categories = cat_range + r"(\," + cat_range + ")*" reg = sensitivity + "(-" + sensitivity + ")?" + "(:" + categories + ")?" return re.search("^" + reg + "$", raw) def translate(raw, prepend=1): filler = "a:b:c:" if prepend == 1: context = "%s%s" % (filler, raw) else: context = raw (rc, trans) = selinux.selinux_raw_to_trans_context(context) if rc != 0: return raw if prepend: trans = trans[len(filler):] if trans == "": return raw else: return trans def untranslate(trans, prepend=1): filler = "a:b:c:" if prepend == 1: context = "%s%s" % (filler, trans) else: context = trans (rc, raw) = selinux.selinux_trans_to_raw_context(context) if rc != 0: return trans if prepend: raw = raw[len(filler):] if raw == "": return trans else: return raw class semanageRecords: transaction = False handle = None store = None args = None def __init__(self, args = None): global handle if args: # legacy code - args was store originally if type(args) == str: self.store = args else: self.args = args self.noreload = getattr(args, "noreload", False) if not self.store: self.store = getattr(args, "store", "") self.sh = self.get_handle(self.store) rc, localstore = selinux.selinux_getpolicytype() if self.store == "" or self.store == localstore: self.mylog = logger() else: sepolicy.load_store_policy(self.store) selinux.selinux_set_policy_root("%s%s" % (selinux.selinux_path(), self.store)) self.mylog = nulllogger() def set_reload(self, load): self.noreload = not load def get_handle(self, store): global is_mls_enabled if semanageRecords.handle: return semanageRecords.handle handle = semanage_handle_create() if not handle: raise ValueError(_("Could not create semanage handle")) if not semanageRecords.transaction and store != "": semanage_select_store(handle, store, SEMANAGE_CON_DIRECT) semanageRecords.store = store if not semanage_is_managed(handle): semanage_handle_destroy(handle) raise ValueError(_("SELinux policy is not managed or store cannot be accessed.")) rc = semanage_access_check(handle) if rc < SEMANAGE_CAN_READ: semanage_handle_destroy(handle) raise ValueError(_("Cannot read policy store.")) rc = semanage_connect(handle) if rc < 0: semanage_handle_destroy(handle) raise ValueError(_("Could not establish semanage connection")) is_mls_enabled = semanage_mls_enabled(handle) if is_mls_enabled < 0: semanage_handle_destroy(handle) raise ValueError(_("Could not test MLS enabled status")) semanageRecords.handle = handle return semanageRecords.handle def deleteall(self): raise ValueError(_("Not yet implemented")) def start(self): if semanageRecords.transaction: raise ValueError(_("Semanage transaction already in progress")) self.begin() semanageRecords.transaction = True def begin(self): if semanageRecords.transaction: return rc = semanage_begin_transaction(self.sh) if rc < 0: raise ValueError(_("Could not start semanage transaction")) def customized(self): raise ValueError(_("Not yet implemented")) def commit(self): if semanageRecords.transaction: return if self.noreload: semanage_set_reload(self.sh, 0) rc = semanage_commit(self.sh) if rc < 0: self.mylog.commit(0) raise ValueError(_("Could not commit semanage transaction")) self.mylog.commit(1) def finish(self): if not semanageRecords.transaction: raise ValueError(_("Semanage transaction not in progress")) semanageRecords.transaction = False self.commit() class moduleRecords(semanageRecords): def __init__(self, args = None): semanageRecords.__init__(self, args) def get_all(self): l = [] (rc, mlist, number) = semanage_module_list_all(self.sh) if rc < 0: raise ValueError(_("Could not list SELinux modules")) for i in range(number): mod = semanage_module_list_nth(mlist, i) rc, name = semanage_module_info_get_name(self.sh, mod) if rc < 0: raise ValueError(_("Could not get module name")) rc, enabled = semanage_module_info_get_enabled(self.sh, mod) if rc < 0: raise ValueError(_("Could not get module enabled")) rc, priority = semanage_module_info_get_priority(self.sh, mod) if rc < 0: raise ValueError(_("Could not get module priority")) rc, lang_ext = semanage_module_info_get_lang_ext(self.sh, mod) if rc < 0: raise ValueError(_("Could not get module lang_ext")) l.append((name, enabled, priority, lang_ext)) # sort the list so they are in name order, but with higher priorities coming first l.sort(key=lambda t: t[3], reverse=True) l.sort(key=lambda t: t[0]) return l def customized(self): all = self.get_all() if len(all) == 0: return [] return ["-d %s" % x[0] for x in [t for t in all if t[1] == 0]] def list(self, heading=1, locallist=0): all = self.get_all() if len(all) == 0: return if heading: print("\n%-25s %-9s %s\n" % (_("Module Name"), _("Priority"), _("Language"))) for t in all: if t[1] == 0: disabled = _("Disabled") else: if locallist: continue disabled = "" print("%-25s %-9s %-5s %s" % (t[0], t[2], t[3], disabled)) def add(self, file, priority): if not os.path.exists(file): raise ValueError(_("Module does not exist: %s ") % file) rc = semanage_set_default_priority(self.sh, priority) if rc < 0: raise ValueError(_("Invalid priority %d (needs to be between 1 and 999)") % priority) rc = semanage_module_install_file(self.sh, file) if rc >= 0: self.commit() def set_enabled(self, module, enable): for m in module.split(): rc, key = semanage_module_key_create(self.sh) if rc < 0: raise ValueError(_("Could not create module key")) rc = semanage_module_key_set_name(self.sh, key, m) if rc < 0: raise ValueError(_("Could not set module key name")) rc = semanage_module_set_enabled(self.sh, key, enable) if rc < 0: if enable: raise ValueError(_("Could not enable module %s") % m) else: raise ValueError(_("Could not disable module %s") % m) self.commit() def delete(self, module, priority): rc = semanage_set_default_priority(self.sh, priority) if rc < 0: raise ValueError(_("Invalid priority %d (needs to be between 1 and 999)") % priority) for m in module.split(): rc = semanage_module_remove(self.sh, m) if rc < 0 and rc != -2: raise ValueError(_("Could not remove module %s (remove failed)") % m) self.commit() def deleteall(self): l = [x[0] for x in [t for t in self.get_all() if t[1] == 0]] for m in l: self.set_enabled(m, True) class dontauditClass(semanageRecords): def __init__(self, args = None): semanageRecords.__init__(self, args) def toggle(self, dontaudit): if dontaudit not in ["on", "off"]: raise ValueError(_("dontaudit requires either 'on' or 'off'")) self.begin() semanage_set_disable_dontaudit(self.sh, dontaudit == "off") self.commit() class permissiveRecords(semanageRecords): def __init__(self, args = None): semanageRecords.__init__(self, args) def get_all(self): l = [] (rc, mlist, number) = semanage_module_list(self.sh) if rc < 0: raise ValueError(_("Could not list SELinux modules")) for i in range(number): mod = semanage_module_list_nth(mlist, i) name = semanage_module_get_name(mod) if name and name.startswith("permissive_"): l.append(name.split("permissive_")[1]) return l def customized(self): return ["-a %s" % x for x in sorted(self.get_all())] def list(self, heading=1, locallist=0): all = [y["name"] for y in [x for x in sepolicy.info(sepolicy.TYPE) if x["permissive"]]] if len(all) == 0: return if heading: print("\n%-25s\n" % (_("Builtin Permissive Types"))) customized = self.get_all() for t in all: if t not in customized: print(t) if len(customized) == 0: return if heading: print("\n%-25s\n" % (_("Customized Permissive Types"))) for t in customized: print(t) def add(self, type): try: import sepolgen.module as module except ImportError: raise ValueError(_("The sepolgen python module is required to setup permissive domains.\nIn some distributions it is included in the policycoreutils-devel package.\n# yum install policycoreutils-devel\nOr similar for your distro.")) name = "permissive_%s" % type modtxt = "(typepermissive %s)" % type rc = semanage_module_install(self.sh, modtxt, len(modtxt), name, "cil") if rc >= 0: self.commit() if rc < 0: raise ValueError(_("Could not set permissive domain %s (module installation failed)") % name) def delete(self, name): for n in name.split(): rc = semanage_module_remove(self.sh, "permissive_%s" % n) if rc < 0: raise ValueError(_("Could not remove permissive domain %s (remove failed)") % name) self.commit() def deleteall(self): l = self.get_all() if len(l) > 0: all = " ".join(l) self.delete(all) class loginRecords(semanageRecords): def __init__(self, args = None): semanageRecords.__init__(self, args) self.oldsename = None self.oldserange = None self.sename = None self.serange = None def __add(self, name, sename, serange): rec, self.oldsename, self.oldserange = selinux.getseuserbyname(name) if sename == "": sename = "user_u" userrec = seluserRecords(self.args) range, (rc, oldserole) = userrec.get(self.oldsename) range, (rc, serole) = userrec.get(sename) if is_mls_enabled == 1: if serange != "": serange = untranslate(serange) else: serange = range (rc, k) = semanage_seuser_key_create(self.sh, name) if rc < 0: raise ValueError(_("Could not create a key for %s") % name) (rc, exists) = semanage_seuser_exists(self.sh, k) if rc < 0: raise ValueError(_("Could not check if login mapping for %s is defined") % name) if exists: raise ValueError(_("Login mapping for %s is already defined") % name) if name[0] == '%': try: grp.getgrnam(name[1:]) except: raise ValueError(_("Linux Group %s does not exist") % name[1:]) else: try: pwd.getpwnam(name) except: raise ValueError(_("Linux User %s does not exist") % name) (rc, u) = semanage_seuser_create(self.sh) if rc < 0: raise ValueError(_("Could not create login mapping for %s") % name) rc = semanage_seuser_set_name(self.sh, u, name) if rc < 0: raise ValueError(_("Could not set name for %s") % name) if (is_mls_enabled == 1) and (serange != ""): rc = semanage_seuser_set_mlsrange(self.sh, u, serange) if rc < 0: raise ValueError(_("Could not set MLS range for %s") % name) rc = semanage_seuser_set_sename(self.sh, u, sename) if rc < 0: raise ValueError(_("Could not set SELinux user for %s") % name) rc = semanage_seuser_modify_local(self.sh, k, u) if rc < 0: raise ValueError(_("Could not add login mapping for %s") % name) semanage_seuser_key_free(k) semanage_seuser_free(u) def add(self, name, sename, serange): try: self.begin() self.__add(name, sename, serange) self.commit() except ValueError as error: raise error def __modify(self, name, sename="", serange=""): rec, self.oldsename, self.oldserange = selinux.getseuserbyname(name) if sename == "" and serange == "": raise ValueError(_("Requires seuser or serange")) userrec = seluserRecords(self.args) range, (rc, oldserole) = userrec.get(self.oldsename) if sename != "": range, (rc, serole) = userrec.get(sename) else: serole = oldserole if serange != "": self.serange = serange else: self.serange = range (rc, k) = semanage_seuser_key_create(self.sh, name) if rc < 0: raise ValueError(_("Could not create a key for %s") % name) (rc, exists) = semanage_seuser_exists(self.sh, k) if rc < 0: raise ValueError(_("Could not check if login mapping for %s is defined") % name) if not exists: raise ValueError(_("Login mapping for %s is not defined") % name) (rc, u) = semanage_seuser_query(self.sh, k) if rc < 0: raise ValueError(_("Could not query seuser for %s") % name) self.oldserange = semanage_seuser_get_mlsrange(u) self.oldsename = semanage_seuser_get_sename(u) if (is_mls_enabled == 1) and (serange != ""): semanage_seuser_set_mlsrange(self.sh, u, untranslate(serange)) if sename != "": semanage_seuser_set_sename(self.sh, u, sename) self.sename = sename else: self.sename = self.oldsename rc = semanage_seuser_modify_local(self.sh, k, u) if rc < 0: raise ValueError(_("Could not modify login mapping for %s") % name) semanage_seuser_key_free(k) semanage_seuser_free(u) def modify(self, name, sename="", serange=""): try: self.begin() self.__modify(name, sename, serange) self.commit() except ValueError as error: raise error def __delete(self, name): rec, self.oldsename, self.oldserange = selinux.getseuserbyname(name) userrec = seluserRecords(self.args) range, (rc, oldserole) = userrec.get(self.oldsename) (rc, k) = semanage_seuser_key_create(self.sh, name) if rc < 0: raise ValueError(_("Could not create a key for %s") % name) (rc, exists) = semanage_seuser_exists(self.sh, k) if rc < 0: raise ValueError(_("Could not check if login mapping for %s is defined") % name) if not exists: raise ValueError(_("Login mapping for %s is not defined") % name) (rc, exists) = semanage_seuser_exists_local(self.sh, k) if rc < 0: raise ValueError(_("Could not check if login mapping for %s is defined") % name) if not exists: raise ValueError(_("Login mapping for %s is defined in policy, cannot be deleted") % name) rc = semanage_seuser_del_local(self.sh, k) if rc < 0: raise ValueError(_("Could not delete login mapping for %s") % name) semanage_seuser_key_free(k) rec, self.sename, self.serange = selinux.getseuserbyname("__default__") range, (rc, serole) = userrec.get(self.sename) def delete(self, name): try: self.begin() self.__delete(name) self.commit() except ValueError as error: raise error def deleteall(self): (rc, ulist) = semanage_seuser_list_local(self.sh) if rc < 0: raise ValueError(_("Could not list login mappings")) try: self.begin() for u in ulist: self.__delete(semanage_seuser_get_name(u)) self.commit() except ValueError as error: raise error def get_all_logins(self): ddict = {} self.logins_path = selinux.selinux_policy_root() + "/logins" for path, dirs, files in os.walk(self.logins_path): if path == self.logins_path: for name in files: try: fd = open(path + "/" + name) rec = fd.read().rstrip().split(":") fd.close() ddict[name] = (rec[1], rec[2], rec[0]) except IndexError: pass return ddict def get_all(self, locallist=0): ddict = {} if locallist: (rc, self.ulist) = semanage_seuser_list_local(self.sh) else: (rc, self.ulist) = semanage_seuser_list(self.sh) if rc < 0: raise ValueError(_("Could not list login mappings")) for u in self.ulist: name = semanage_seuser_get_name(u) ddict[name] = (semanage_seuser_get_sename(u), semanage_seuser_get_mlsrange(u), "*") return ddict def customized(self): l = [] ddict = self.get_all(True) for k in sorted(ddict.keys()): if ddict[k][1]: l.append("-a -s %s -r '%s' %s" % (ddict[k][0], ddict[k][1], k)) else: l.append("-a -s %s %s" % (ddict[k][0], k)) return l def list(self, heading=1, locallist=0): ddict = self.get_all(locallist) ldict = self.get_all_logins() lkeys = sorted(ldict.keys()) keys = sorted(ddict.keys()) if len(keys) == 0 and len(lkeys) == 0: return if is_mls_enabled == 1: if heading: print("\n%-20s %-20s %-20s %s\n" % (_("Login Name"), _("SELinux User"), _("MLS/MCS Range"), _("Service"))) for k in keys: u = ddict[k] print("%-20s %-20s %-20s %s" % (k, u[0], translate(u[1]), u[2])) if len(lkeys): print("\nLocal customization in %s" % self.logins_path) for k in lkeys: u = ldict[k] print("%-20s %-20s %-20s %s" % (k, u[0], translate(u[1]), u[2])) else: if heading: print("\n%-25s %-25s\n" % (_("Login Name"), _("SELinux User"))) for k in keys: print("%-25s %-25s" % (k, ddict[k][0])) class seluserRecords(semanageRecords): def __init__(self, args = None): semanageRecords.__init__(self, args) def get(self, name): (rc, k) = semanage_user_key_create(self.sh, name) if rc < 0: raise ValueError(_("Could not create a key for %s") % name) (rc, exists) = semanage_user_exists(self.sh, k) if rc < 0: raise ValueError(_("Could not check if SELinux user %s is defined") % name) (rc, u) = semanage_user_query(self.sh, k) if rc < 0: raise ValueError(_("Could not query user for %s") % name) serange = semanage_user_get_mlsrange(u) serole = semanage_user_get_roles(self.sh, u) semanage_user_key_free(k) semanage_user_free(u) return serange, serole def __add(self, name, roles, selevel, serange, prefix): if is_mls_enabled == 1: if serange == "": serange = "s0" else: serange = untranslate(serange) if selevel == "": selevel = "s0" else: selevel = untranslate(selevel) if len(roles) < 1: raise ValueError(_("You must add at least one role for %s") % name) (rc, k) = semanage_user_key_create(self.sh, name) if rc < 0: raise ValueError(_("Could not create a key for %s") % name) (rc, exists) = semanage_user_exists(self.sh, k) if rc < 0: raise ValueError(_("Could not check if SELinux user %s is defined") % name) if exists: raise ValueError(_("SELinux user %s is already defined") % name) (rc, u) = semanage_user_create(self.sh) if rc < 0: raise ValueError(_("Could not create SELinux user for %s") % name) rc = semanage_user_set_name(self.sh, u, name) if rc < 0: raise ValueError(_("Could not set name for %s") % name) for r in roles: rc = semanage_user_add_role(self.sh, u, r) if rc < 0: raise ValueError(_("Could not add role %s for %s") % (r, name)) if is_mls_enabled == 1: rc = semanage_user_set_mlsrange(self.sh, u, serange) if rc < 0: raise ValueError(_("Could not set MLS range for %s") % name) rc = semanage_user_set_mlslevel(self.sh, u, selevel) if rc < 0: raise ValueError(_("Could not set MLS level for %s") % name) rc = semanage_user_set_prefix(self.sh, u, prefix) if rc < 0: raise ValueError(_("Could not add prefix %s for %s") % (r, prefix)) (rc, key) = semanage_user_key_extract(self.sh, u) if rc < 0: raise ValueError(_("Could not extract key for %s") % name) rc = semanage_user_modify_local(self.sh, k, u) if rc < 0: raise ValueError(_("Could not add SELinux user %s") % name) semanage_user_key_free(k) semanage_user_free(u) self.mylog.log("seuser", sename=name, serole=",".join(roles), serange=serange) def add(self, name, roles, selevel, serange, prefix): try: self.begin() self.__add(name, roles, selevel, serange, prefix) self.commit() except ValueError as error: self.mylog.commit(0) raise error def __modify(self, name, roles=[], selevel="", serange="", prefix=""): oldserole = "" oldserange = "" newroles = " ".join(roles) if prefix == "" and len(roles) == 0 and serange == "" and selevel == "": if is_mls_enabled == 1: raise ValueError(_("Requires prefix, roles, level or range")) else: raise ValueError(_("Requires prefix or roles")) (rc, k) = semanage_user_key_create(self.sh, name) if rc < 0: raise ValueError(_("Could not create a key for %s") % name) (rc, exists) = semanage_user_exists(self.sh, k) if rc < 0: raise ValueError(_("Could not check if SELinux user %s is defined") % name) if not exists: raise ValueError(_("SELinux user %s is not defined") % name) (rc, u) = semanage_user_query(self.sh, k) if rc < 0: raise ValueError(_("Could not query user for %s") % name) oldserange = semanage_user_get_mlsrange(u) (rc, rlist) = semanage_user_get_roles(self.sh, u) if rc >= 0: oldserole = " ".join(rlist) if (is_mls_enabled == 1) and (serange != ""): semanage_user_set_mlsrange(self.sh, u, untranslate(serange)) if (is_mls_enabled == 1) and (selevel != ""): semanage_user_set_mlslevel(self.sh, u, untranslate(selevel)) if prefix != "": semanage_user_set_prefix(self.sh, u, prefix) if len(roles) != 0: for r in rlist: if r not in roles: semanage_user_del_role(u, r) for r in roles: if r not in rlist: semanage_user_add_role(self.sh, u, r) rc = semanage_user_modify_local(self.sh, k, u) if rc < 0: raise ValueError(_("Could not modify SELinux user %s") % name) semanage_user_key_free(k) semanage_user_free(u) role = ",".join(newroles.split()) oldserole = ",".join(oldserole.split()) self.mylog.log("seuser", sename=name, oldsename=name, serole=role, serange=serange, oldserole=oldserole, oldserange=oldserange) def modify(self, name, roles=[], selevel="", serange="", prefix=""): try: self.begin() self.__modify(name, roles, selevel, serange, prefix) self.commit() except ValueError as error: self.mylog.commit(0) raise error def __delete(self, name): (rc, k) = semanage_user_key_create(self.sh, name) if rc < 0: raise ValueError(_("Could not create a key for %s") % name) (rc, exists) = semanage_user_exists(self.sh, k) if rc < 0: raise ValueError(_("Could not check if SELinux user %s is defined") % name) if not exists: raise ValueError(_("SELinux user %s is not defined") % name) (rc, exists) = semanage_user_exists_local(self.sh, k) if rc < 0: raise ValueError(_("Could not check if SELinux user %s is defined") % name) if not exists: raise ValueError(_("SELinux user %s is defined in policy, cannot be deleted") % name) (rc, u) = semanage_user_query(self.sh, k) if rc < 0: raise ValueError(_("Could not query user for %s") % name) oldserange = semanage_user_get_mlsrange(u) (rc, rlist) = semanage_user_get_roles(self.sh, u) oldserole = ",".join(rlist) rc = semanage_user_del_local(self.sh, k) if rc < 0: raise ValueError(_("Could not delete SELinux user %s") % name) semanage_user_key_free(k) semanage_user_free(u) self.mylog.log_remove("seuser", oldsename=name, oldserange=oldserange, oldserole=oldserole) def delete(self, name): try: self.begin() self.__delete(name) self.commit() except ValueError as error: self.mylog.commit(0) raise error def deleteall(self): (rc, ulist) = semanage_user_list_local(self.sh) if rc < 0: raise ValueError(_("Could not list login mappings")) try: self.begin() for u in ulist: self.__delete(semanage_user_get_name(u)) self.commit() except ValueError as error: self.mylog.commit(0) raise error def get_all(self, locallist=0): ddict = {} if locallist: (rc, self.ulist) = semanage_user_list_local(self.sh) else: (rc, self.ulist) = semanage_user_list(self.sh) if rc < 0: raise ValueError(_("Could not list SELinux users")) for u in self.ulist: name = semanage_user_get_name(u) (rc, rlist) = semanage_user_get_roles(self.sh, u) if rc < 0: raise ValueError(_("Could not list roles for user %s") % name) roles = " ".join(rlist) ddict[semanage_user_get_name(u)] = (semanage_user_get_prefix(u), semanage_user_get_mlslevel(u), semanage_user_get_mlsrange(u), roles) return ddict def customized(self): l = [] ddict = self.get_all(True) for k in sorted(ddict.keys()): if ddict[k][1] or ddict[k][2]: l.append("-a -L %s -r %s -R '%s' %s" % (ddict[k][1], ddict[k][2], ddict[k][3], k)) else: l.append("-a -R '%s' %s" % (ddict[k][3], k)) return l def list(self, heading=1, locallist=0): ddict = self.get_all(locallist) if len(ddict) == 0: return keys = sorted(ddict.keys()) if is_mls_enabled == 1: if heading: print("\n%-15s %-10s %-10s %-30s" % ("", _("Labeling"), _("MLS/"), _("MLS/"))) print("%-15s %-10s %-10s %-30s %s\n" % (_("SELinux User"), _("Prefix"), _("MCS Level"), _("MCS Range"), _("SELinux Roles"))) for k in keys: print("%-15s %-10s %-10s %-30s %s" % (k, ddict[k][0], translate(ddict[k][1]), translate(ddict[k][2]), ddict[k][3])) else: if heading: print("%-15s %s\n" % (_("SELinux User"), _("SELinux Roles"))) for k in keys: print("%-15s %s" % (k, ddict[k][3])) class portRecords(semanageRecords): valid_types = [] def __init__(self, args = None): semanageRecords.__init__(self, args) try: self.valid_types = list(list(sepolicy.info(sepolicy.ATTRIBUTE, "port_type"))[0]["types"]) except RuntimeError: pass def __genkey(self, port, proto): protocols = {"tcp": SEMANAGE_PROTO_TCP, "udp": SEMANAGE_PROTO_UDP, "sctp": SEMANAGE_PROTO_SCTP, "dccp": SEMANAGE_PROTO_DCCP} if proto in protocols.keys(): proto_d = protocols[proto] else: raise ValueError(_("Protocol has to be one of udp, tcp, dccp or sctp")) if port == "": raise ValueError(_("Port is required")) ports = port.split("-") if len(ports) == 1: high = low = int(ports[0]) else: low = int(ports[0]) high = int(ports[1]) if high > 65535: raise ValueError(_("Invalid Port")) (rc, k) = semanage_port_key_create(self.sh, low, high, proto_d) if rc < 0: raise ValueError(_("Could not create a key for %s/%s") % (proto, port)) return (k, proto_d, low, high) def __add(self, port, proto, serange, type): if is_mls_enabled == 1: if serange == "": serange = "s0" else: serange = untranslate(serange) if type == "": raise ValueError(_("Type is required")) type = sepolicy.get_real_type_name(type) if type not in self.valid_types: raise ValueError(_("Type %s is invalid, must be a port type") % type) (k, proto_d, low, high) = self.__genkey(port, proto) (rc, exists) = semanage_port_exists(self.sh, k) if rc < 0: raise ValueError(_("Could not check if port %s/%s is defined") % (proto, port)) if exists: raise ValueError(_("Port %s/%s already defined") % (proto, port)) (rc, p) = semanage_port_create(self.sh) if rc < 0: raise ValueError(_("Could not create port for %s/%s") % (proto, port)) semanage_port_set_proto(p, proto_d) semanage_port_set_range(p, low, high) (rc, con) = semanage_context_create(self.sh) if rc < 0: raise ValueError(_("Could not create context for %s/%s") % (proto, port)) rc = semanage_context_set_user(self.sh, con, "system_u") if rc < 0: raise ValueError(_("Could not set user in port context for %s/%s") % (proto, port)) rc = semanage_context_set_role(self.sh, con, "object_r") if rc < 0: raise ValueError(_("Could not set role in port context for %s/%s") % (proto, port)) rc = semanage_context_set_type(self.sh, con, type) if rc < 0: raise ValueError(_("Could not set type in port context for %s/%s") % (proto, port)) if (is_mls_enabled == 1) and (serange != ""): rc = semanage_context_set_mls(self.sh, con, serange) if rc < 0: raise ValueError(_("Could not set mls fields in port context for %s/%s") % (proto, port)) rc = semanage_port_set_con(self.sh, p, con) if rc < 0: raise ValueError(_("Could not set port context for %s/%s") % (proto, port)) rc = semanage_port_modify_local(self.sh, k, p) if rc < 0: raise ValueError(_("Could not add port %s/%s") % (proto, port)) semanage_context_free(con) semanage_port_key_free(k) semanage_port_free(p) self.mylog.log_change("resrc=port op=add lport=%s proto=%s tcontext=%s:%s:%s:%s" % (port, socket.getprotobyname(proto), "system_u", "object_r", type, serange)) def add(self, port, proto, serange, type): self.begin() self.__add(port, proto, serange, type) self.commit() def __modify(self, port, proto, serange, setype): if serange == "" and setype == "": if is_mls_enabled == 1: raise ValueError(_("Requires setype or serange")) else: raise ValueError(_("Requires setype")) setype = sepolicy.get_real_type_name(setype) if setype and setype not in self.valid_types: raise ValueError(_("Type %s is invalid, must be a port type") % setype) (k, proto_d, low, high) = self.__genkey(port, proto) (rc, exists) = semanage_port_exists(self.sh, k) if rc < 0: raise ValueError(_("Could not check if port %s/%s is defined") % (proto, port)) if not exists: raise ValueError(_("Port %s/%s is not defined") % (proto, port)) (rc, p) = semanage_port_query(self.sh, k) if rc < 0: raise ValueError(_("Could not query port %s/%s") % (proto, port)) con = semanage_port_get_con(p) if is_mls_enabled == 1: if serange == "": serange = "s0" else: semanage_context_set_mls(self.sh, con, untranslate(serange)) if setype != "": semanage_context_set_type(self.sh, con, setype) rc = semanage_port_modify_local(self.sh, k, p) if rc < 0: raise ValueError(_("Could not modify port %s/%s") % (proto, port)) semanage_port_key_free(k) semanage_port_free(p) self.mylog.log_change("resrc=port op=modify lport=%s proto=%s tcontext=%s:%s:%s:%s" % (port, socket.getprotobyname(proto), "system_u", "object_r", setype, serange)) def modify(self, port, proto, serange, setype): self.begin() self.__modify(port, proto, serange, setype) self.commit() def deleteall(self): (rc, plist) = semanage_port_list_local(self.sh) if rc < 0: raise ValueError(_("Could not list the ports")) self.begin() for port in plist: proto = semanage_port_get_proto(port) proto_str = semanage_port_get_proto_str(proto) low = semanage_port_get_low(port) high = semanage_port_get_high(port) port_str = "%s-%s" % (low, high) (k, proto_d, low, high) = self.__genkey(port_str, proto_str) if rc < 0: raise ValueError(_("Could not create a key for %s") % port_str) rc = semanage_port_del_local(self.sh, k) if rc < 0: raise ValueError(_("Could not delete the port %s") % port_str) semanage_port_key_free(k) if low == high: port_str = low self.mylog.log_change("resrc=port op=delete lport=%s proto=%s" % (port_str, socket.getprotobyname(proto_str))) self.commit() def __delete(self, port, proto): (k, proto_d, low, high) = self.__genkey(port, proto) (rc, exists) = semanage_port_exists(self.sh, k) if rc < 0: raise ValueError(_("Could not check if port %s/%s is defined") % (proto, port)) if not exists: raise ValueError(_("Port %s/%s is not defined") % (proto, port)) (rc, exists) = semanage_port_exists_local(self.sh, k) if rc < 0: raise ValueError(_("Could not check if port %s/%s is defined") % (proto, port)) if not exists: raise ValueError(_("Port %s/%s is defined in policy, cannot be deleted") % (proto, port)) rc = semanage_port_del_local(self.sh, k) if rc < 0: raise ValueError(_("Could not delete port %s/%s") % (proto, port)) semanage_port_key_free(k) self.mylog.log_change("resrc=port op=delete lport=%s proto=%s" % (port, socket.getprotobyname(proto))) def delete(self, port, proto): self.begin() self.__delete(port, proto) self.commit() def get_all(self, locallist=0): ddict = {} if locallist: (rc, self.plist) = semanage_port_list_local(self.sh) else: (rc, self.plist) = semanage_port_list(self.sh) if rc < 0: raise ValueError(_("Could not list ports")) for port in self.plist: con = semanage_port_get_con(port) ctype = semanage_context_get_type(con) level = semanage_context_get_mls(con) proto = semanage_port_get_proto(port) proto_str = semanage_port_get_proto_str(proto) low = semanage_port_get_low(port) high = semanage_port_get_high(port) ddict[(low, high, proto_str)] = (ctype, level) return ddict def get_all_by_type(self, locallist=0): ddict = {} if locallist: (rc, self.plist) = semanage_port_list_local(self.sh) else: (rc, self.plist) = semanage_port_list(self.sh) if rc < 0: raise ValueError(_("Could not list ports")) for port in self.plist: con = semanage_port_get_con(port) ctype = semanage_context_get_type(con) proto = semanage_port_get_proto(port) proto_str = semanage_port_get_proto_str(proto) low = semanage_port_get_low(port) high = semanage_port_get_high(port) if (ctype, proto_str) not in ddict.keys(): ddict[(ctype, proto_str)] = [] if low == high: ddict[(ctype, proto_str)].append("%d" % low) else: ddict[(ctype, proto_str)].append("%d-%d" % (low, high)) return ddict def customized(self): l = [] ddict = self.get_all(True) for k in sorted(ddict.keys()): port = k[0] if k[0] == k[1] else "%s-%s" % (k[0], k[1]) if ddict[k][1]: l.append("-a -t %s -r '%s' -p %s %s" % (ddict[k][0], ddict[k][1], k[2], port)) else: l.append("-a -t %s -p %s %s" % (ddict[k][0], k[2], port)) return l def list(self, heading=1, locallist=0): ddict = self.get_all_by_type(locallist) if len(ddict) == 0: return keys = sorted(ddict.keys()) if heading: print("%-30s %-8s %s\n" % (_("SELinux Port Type"), _("Proto"), _("Port Number"))) for i in keys: rec = "%-30s %-8s " % i rec += "%s" % ddict[i][0] for p in ddict[i][1:]: rec += ", %s" % p print(rec) class ibpkeyRecords(semanageRecords): valid_types = [] def __init__(self, args = None): semanageRecords.__init__(self, args) try: q = setools.TypeQuery(setools.SELinuxPolicy(sepolicy.get_store_policy(self.store)), attrs=["ibpkey_type"]) self.valid_types = sorted(str(t) for t in q.results()) except: pass def __genkey(self, pkey, subnet_prefix): if subnet_prefix == "": raise ValueError(_("Subnet Prefix is required")) pkeys = pkey.split("-") if len(pkeys) == 1: high = low = int(pkeys[0], 0) else: low = int(pkeys[0], 0) high = int(pkeys[1], 0) if high > 65535: raise ValueError(_("Invalid Pkey")) (rc, k) = semanage_ibpkey_key_create(self.sh, subnet_prefix, low, high) if rc < 0: raise ValueError(_("Could not create a key for %s/%s") % (subnet_prefix, pkey)) return (k, subnet_prefix, low, high) def __add(self, pkey, subnet_prefix, serange, type): if is_mls_enabled == 1: if serange == "": serange = "s0" else: serange = untranslate(serange) if type == "": raise ValueError(_("Type is required")) type = sepolicy.get_real_type_name(type) if type not in self.valid_types: raise ValueError(_("Type %s is invalid, must be a ibpkey type") % type) (k, subnet_prefix, low, high) = self.__genkey(pkey, subnet_prefix) (rc, exists) = semanage_ibpkey_exists(self.sh, k) if rc < 0: raise ValueError(_("Could not check if ibpkey %s/%s is defined") % (subnet_prefix, pkey)) if exists: raise ValueError(_("ibpkey %s/%s already defined") % (subnet_prefix, pkey)) (rc, p) = semanage_ibpkey_create(self.sh) if rc < 0: raise ValueError(_("Could not create ibpkey for %s/%s") % (subnet_prefix, pkey)) semanage_ibpkey_set_subnet_prefix(self.sh, p, subnet_prefix) semanage_ibpkey_set_range(p, low, high) (rc, con) = semanage_context_create(self.sh) if rc < 0: raise ValueError(_("Could not create context for %s/%s") % (subnet_prefix, pkey)) rc = semanage_context_set_user(self.sh, con, "system_u") if rc < 0: raise ValueError(_("Could not set user in ibpkey context for %s/%s") % (subnet_prefix, pkey)) rc = semanage_context_set_role(self.sh, con, "object_r") if rc < 0: raise ValueError(_("Could not set role in ibpkey context for %s/%s") % (subnet_prefix, pkey)) rc = semanage_context_set_type(self.sh, con, type) if rc < 0: raise ValueError(_("Could not set type in ibpkey context for %s/%s") % (subnet_prefix, pkey)) if (is_mls_enabled == 1) and (serange != ""): rc = semanage_context_set_mls(self.sh, con, serange) if rc < 0: raise ValueError(_("Could not set mls fields in ibpkey context for %s/%s") % (subnet_prefix, pkey)) rc = semanage_ibpkey_set_con(self.sh, p, con) if rc < 0: raise ValueError(_("Could not set ibpkey context for %s/%s") % (subnet_prefix, pkey)) rc = semanage_ibpkey_modify_local(self.sh, k, p) if rc < 0: raise ValueError(_("Could not add ibpkey %s/%s") % (subnet_prefix, pkey)) semanage_context_free(con) semanage_ibpkey_key_free(k) semanage_ibpkey_free(p) def add(self, pkey, subnet_prefix, serange, type): self.begin() self.__add(pkey, subnet_prefix, serange, type) self.commit() def __modify(self, pkey, subnet_prefix, serange, setype): if serange == "" and setype == "": if is_mls_enabled == 1: raise ValueError(_("Requires setype or serange")) else: raise ValueError(_("Requires setype")) setype = sepolicy.get_real_type_name(setype) if setype and setype not in self.valid_types: raise ValueError(_("Type %s is invalid, must be a ibpkey type") % setype) (k, subnet_prefix, low, high) = self.__genkey(pkey, subnet_prefix) (rc, exists) = semanage_ibpkey_exists(self.sh, k) if rc < 0: raise ValueError(_("Could not check if ibpkey %s/%s is defined") % (subnet_prefix, pkey)) if not exists: raise ValueError(_("ibpkey %s/%s is not defined") % (subnet_prefix, pkey)) (rc, p) = semanage_ibpkey_query(self.sh, k) if rc < 0: raise ValueError(_("Could not query ibpkey %s/%s") % (subnet_prefix, pkey)) con = semanage_ibpkey_get_con(p) if (is_mls_enabled == 1) and (serange != ""): semanage_context_set_mls(self.sh, con, untranslate(serange)) if setype != "": semanage_context_set_type(self.sh, con, setype) rc = semanage_ibpkey_modify_local(self.sh, k, p) if rc < 0: raise ValueError(_("Could not modify ibpkey %s/%s") % (subnet_prefix, pkey)) semanage_ibpkey_key_free(k) semanage_ibpkey_free(p) def modify(self, pkey, subnet_prefix, serange, setype): self.begin() self.__modify(pkey, subnet_prefix, serange, setype) self.commit() def deleteall(self): (rc, plist) = semanage_ibpkey_list_local(self.sh) if rc < 0: raise ValueError(_("Could not list the ibpkeys")) self.begin() for ibpkey in plist: (rc, subnet_prefix) = semanage_ibpkey_get_subnet_prefix(self.sh, ibpkey) low = semanage_ibpkey_get_low(ibpkey) high = semanage_ibpkey_get_high(ibpkey) pkey_str = "%s-%s" % (low, high) (k, subnet_prefix, low, high) = self.__genkey(pkey_str, subnet_prefix) if rc < 0: raise ValueError(_("Could not create a key for %s") % pkey_str) rc = semanage_ibpkey_del_local(self.sh, k) if rc < 0: raise ValueError(_("Could not delete the ibpkey %s") % pkey_str) semanage_ibpkey_key_free(k) self.commit() def __delete(self, pkey, subnet_prefix): (k, subnet_prefix, low, high) = self.__genkey(pkey, subnet_prefix) (rc, exists) = semanage_ibpkey_exists(self.sh, k) if rc < 0: raise ValueError(_("Could not check if ibpkey %s/%s is defined") % (subnet_prefix, pkey)) if not exists: raise ValueError(_("ibpkey %s/%s is not defined") % (subnet_prefix, pkey)) (rc, exists) = semanage_ibpkey_exists_local(self.sh, k) if rc < 0: raise ValueError(_("Could not check if ibpkey %s/%s is defined") % (subnet_prefix, pkey)) if not exists: raise ValueError(_("ibpkey %s/%s is defined in policy, cannot be deleted") % (subnet_prefix, pkey)) rc = semanage_ibpkey_del_local(self.sh, k) if rc < 0: raise ValueError(_("Could not delete ibpkey %s/%s") % (subnet_prefix, pkey)) semanage_ibpkey_key_free(k) def delete(self, pkey, subnet_prefix): self.begin() self.__delete(pkey, subnet_prefix) self.commit() def get_all(self, locallist=0): ddict = {} if locallist: (rc, self.plist) = semanage_ibpkey_list_local(self.sh) else: (rc, self.plist) = semanage_ibpkey_list(self.sh) if rc < 0: raise ValueError(_("Could not list ibpkeys")) for ibpkey in self.plist: con = semanage_ibpkey_get_con(ibpkey) ctype = semanage_context_get_type(con) if ctype == "reserved_ibpkey_t": continue level = semanage_context_get_mls(con) (rc, subnet_prefix) = semanage_ibpkey_get_subnet_prefix(self.sh, ibpkey) low = semanage_ibpkey_get_low(ibpkey) high = semanage_ibpkey_get_high(ibpkey) ddict[(low, high, subnet_prefix)] = (ctype, level) return ddict def get_all_by_type(self, locallist=0): ddict = {} if locallist: (rc, self.plist) = semanage_ibpkey_list_local(self.sh) else: (rc, self.plist) = semanage_ibpkey_list(self.sh) if rc < 0: raise ValueError(_("Could not list ibpkeys")) for ibpkey in self.plist: con = semanage_ibpkey_get_con(ibpkey) ctype = semanage_context_get_type(con) (rc, subnet_prefix) = semanage_ibpkey_get_subnet_prefix(self.sh, ibpkey) low = semanage_ibpkey_get_low(ibpkey) high = semanage_ibpkey_get_high(ibpkey) if (ctype, subnet_prefix) not in ddict.keys(): ddict[(ctype, subnet_prefix)] = [] if low == high: ddict[(ctype, subnet_prefix)].append("0x%x" % low) else: ddict[(ctype, subnet_prefix)].append("0x%x-0x%x" % (low, high)) return ddict def customized(self): l = [] ddict = self.get_all(True) for k in sorted(ddict.keys()): port = k[0] if k[0] == k[1] else "%s-%s" % (k[0], k[1]) if ddict[k][1]: l.append("-a -t %s -r '%s' -x %s %s" % (ddict[k][0], ddict[k][1], k[2], port)) else: l.append("-a -t %s -x %s %s" % (ddict[k][0], k[2], port)) return l def list(self, heading=1, locallist=0): ddict = self.get_all_by_type(locallist) keys = ddict.keys() if len(keys) == 0: return if heading: print("%-30s %-18s %s\n" % (_("SELinux IB Pkey Type"), _("Subnet_Prefix"), _("Pkey Number"))) for i in sorted(keys): rec = "%-30s %-18s " % i rec += "%s" % ddict[i][0] for p in ddict[i][1:]: rec += ", %s" % p print(rec) class ibendportRecords(semanageRecords): valid_types = [] def __init__(self, args = None): semanageRecords.__init__(self, args) try: q = setools.TypeQuery(setools.SELinuxPolicy(sepolicy.get_store_policy(self.store)), attrs=["ibendport_type"]) self.valid_types = set(str(t) for t in q.results()) except: pass def __genkey(self, ibendport, ibdev_name): if ibdev_name == "": raise ValueError(_("IB device name is required")) port = int(ibendport) if port > 255 or port < 1: raise ValueError(_("Invalid Port Number")) (rc, k) = semanage_ibendport_key_create(self.sh, ibdev_name, port) if rc < 0: raise ValueError(_("Could not create a key for ibendport %s/%s") % (ibdev_name, ibendport)) return (k, ibdev_name, port) def __add(self, ibendport, ibdev_name, serange, type): if is_mls_enabled == 1: if serange == "": serange = "s0" else: serange = untranslate(serange) if type == "": raise ValueError(_("Type is required")) type = sepolicy.get_real_type_name(type) if type not in self.valid_types: raise ValueError(_("Type %s is invalid, must be an ibendport type") % type) (k, ibendport, port) = self.__genkey(ibendport, ibdev_name) (rc, exists) = semanage_ibendport_exists(self.sh, k) if rc < 0: raise ValueError(_("Could not check if ibendport %s/%s is defined") % (ibdev_name, port)) if exists: raise ValueError(_("ibendport %s/%s already defined") % (ibdev_name, port)) (rc, p) = semanage_ibendport_create(self.sh) if rc < 0: raise ValueError(_("Could not create ibendport for %s/%s") % (ibdev_name, port)) semanage_ibendport_set_ibdev_name(self.sh, p, ibdev_name) semanage_ibendport_set_port(p, port) (rc, con) = semanage_context_create(self.sh) if rc < 0: raise ValueError(_("Could not create context for %s/%s") % (ibdev_name, port)) rc = semanage_context_set_user(self.sh, con, "system_u") if rc < 0: raise ValueError(_("Could not set user in ibendport context for %s/%s") % (ibdev_name, port)) rc = semanage_context_set_role(self.sh, con, "object_r") if rc < 0: raise ValueError(_("Could not set role in ibendport context for %s/%s") % (ibdev_name, port)) rc = semanage_context_set_type(self.sh, con, type) if rc < 0: raise ValueError(_("Could not set type in ibendport context for %s/%s") % (ibdev_name, port)) if (is_mls_enabled == 1) and (serange != ""): rc = semanage_context_set_mls(self.sh, con, serange) if rc < 0: raise ValueError(_("Could not set mls fields in ibendport context for %s/%s") % (ibdev_name, port)) rc = semanage_ibendport_set_con(self.sh, p, con) if rc < 0: raise ValueError(_("Could not set ibendport context for %s/%s") % (ibdev_name, port)) rc = semanage_ibendport_modify_local(self.sh, k, p) if rc < 0: raise ValueError(_("Could not add ibendport %s/%s") % (ibdev_name, port)) semanage_context_free(con) semanage_ibendport_key_free(k) semanage_ibendport_free(p) def add(self, ibendport, ibdev_name, serange, type): self.begin() self.__add(ibendport, ibdev_name, serange, type) self.commit() def __modify(self, ibendport, ibdev_name, serange, setype): if serange == "" and setype == "": if is_mls_enabled == 1: raise ValueError(_("Requires setype or serange")) else: raise ValueError(_("Requires setype")) setype = sepolicy.get_real_type_name(setype) if setype and setype not in self.valid_types: raise ValueError(_("Type %s is invalid, must be an ibendport type") % setype) (k, ibdev_name, port) = self.__genkey(ibendport, ibdev_name) (rc, exists) = semanage_ibendport_exists(self.sh, k) if rc < 0: raise ValueError(_("Could not check if ibendport %s/%s is defined") % (ibdev_name, ibendport)) if not exists: raise ValueError(_("ibendport %s/%s is not defined") % (ibdev_name, ibendport)) (rc, p) = semanage_ibendport_query(self.sh, k) if rc < 0: raise ValueError(_("Could not query ibendport %s/%s") % (ibdev_name, ibendport)) con = semanage_ibendport_get_con(p) if (is_mls_enabled == 1) and (serange != ""): semanage_context_set_mls(self.sh, con, untranslate(serange)) if setype != "": semanage_context_set_type(self.sh, con, setype) rc = semanage_ibendport_modify_local(self.sh, k, p) if rc < 0: raise ValueError(_("Could not modify ibendport %s/%s") % (ibdev_name, ibendport)) semanage_ibendport_key_free(k) semanage_ibendport_free(p) def modify(self, ibendport, ibdev_name, serange, setype): self.begin() self.__modify(ibendport, ibdev_name, serange, setype) self.commit() def deleteall(self): (rc, plist) = semanage_ibendport_list_local(self.sh) if rc < 0: raise ValueError(_("Could not list the ibendports")) self.begin() for ibendport in plist: (rc, ibdev_name) = semanage_ibendport_get_ibdev_name(self.sh, ibendport) port = semanage_ibendport_get_port(ibendport) (k, ibdev_name, port) = self.__genkey(str(port), ibdev_name) if rc < 0: raise ValueError(_("Could not create a key for %s/%d") % (ibdevname, port)) rc = semanage_ibendport_del_local(self.sh, k) if rc < 0: raise ValueError(_("Could not delete the ibendport %s/%d") % (ibdev_name, port)) semanage_ibendport_key_free(k) self.commit() def __delete(self, ibendport, ibdev_name): (k, ibdev_name, port) = self.__genkey(ibendport, ibdev_name) (rc, exists) = semanage_ibendport_exists(self.sh, k) if rc < 0: raise ValueError(_("Could not check if ibendport %s/%s is defined") % (ibdev_name, ibendport)) if not exists: raise ValueError(_("ibendport %s/%s is not defined") % (ibdev_name, ibendport)) (rc, exists) = semanage_ibendport_exists_local(self.sh, k) if rc < 0: raise ValueError(_("Could not check if ibendport %s/%s is defined") % (ibdev_name, ibendport)) if not exists: raise ValueError(_("ibendport %s/%s is defined in policy, cannot be deleted") % (ibdev_name, ibendport)) rc = semanage_ibendport_del_local(self.sh, k) if rc < 0: raise ValueError(_("Could not delete ibendport %s/%s") % (ibdev_name, ibendport)) semanage_ibendport_key_free(k) def delete(self, ibendport, ibdev_name): self.begin() self.__delete(ibendport, ibdev_name) self.commit() def get_all(self, locallist=0): ddict = {} if locallist: (rc, self.plist) = semanage_ibendport_list_local(self.sh) else: (rc, self.plist) = semanage_ibendport_list(self.sh) if rc < 0: raise ValueError(_("Could not list ibendports")) for ibendport in self.plist: con = semanage_ibendport_get_con(ibendport) ctype = semanage_context_get_type(con) if ctype == "reserved_ibendport_t": continue level = semanage_context_get_mls(con) (rc, ibdev_name) = semanage_ibendport_get_ibdev_name(self.sh, ibendport) port = semanage_ibendport_get_port(ibendport) ddict[(port, ibdev_name)] = (ctype, level) return ddict def get_all_by_type(self, locallist=0): ddict = {} if locallist: (rc, self.plist) = semanage_ibendport_list_local(self.sh) else: (rc, self.plist) = semanage_ibendport_list(self.sh) if rc < 0: raise ValueError(_("Could not list ibendports")) for ibendport in self.plist: con = semanage_ibendport_get_con(ibendport) ctype = semanage_context_get_type(con) (rc, ibdev_name) = semanage_ibendport_get_ibdev_name(self.sh, ibendport) port = semanage_ibendport_get_port(ibendport) if (ctype, ibdev_name) not in ddict.keys(): ddict[(ctype, ibdev_name)] = [] ddict[(ctype, ibdev_name)].append("0x%x" % port) return ddict def customized(self): l = [] ddict = self.get_all(True) for k in sorted(ddict.keys()): if ddict[k][1]: l.append("-a -t %s -r '%s' -z %s %s" % (ddict[k][0], ddict[k][1], k[1], k[0])) else: l.append("-a -t %s -z %s %s" % (ddict[k][0], k[1], k[0])) return l def list(self, heading=1, locallist=0): ddict = self.get_all_by_type(locallist) keys = ddict.keys() if len(keys) == 0: return if heading: print("%-30s %-18s %s\n" % (_("SELinux IB End Port Type"), _("IB Device Name"), _("Port Number"))) for i in sorted(keys): rec = "%-30s %-18s " % i rec += "%s" % ddict[i][0] for p in ddict[i][1:]: rec += ", %s" % p print(rec) class nodeRecords(semanageRecords): valid_types = [] def __init__(self, args = None): semanageRecords.__init__(self, args) self.protocol = ["ipv4", "ipv6"] try: self.valid_types = list(list(sepolicy.info(sepolicy.ATTRIBUTE, "node_type"))[0]["types"]) except RuntimeError: pass def validate(self, addr, mask, protocol): newaddr = addr newmask = mask newprotocol = "" if addr == "": raise ValueError(_("Node Address is required")) # verify valid combination if len(mask) == 0 or mask[0] == "/": i = IP(addr + mask) newaddr = i.strNormal(0) newmask = str(i.netmask()) if newmask == "0.0.0.0" and i.version() == 6: newmask = "::" protocol = "ipv%d" % i.version() try: newprotocol = self.protocol.index(protocol) except: raise ValueError(_("Unknown or missing protocol")) return newaddr, newmask, newprotocol def __add(self, addr, mask, proto, serange, ctype): addr, mask, proto = self.validate(addr, mask, proto) if is_mls_enabled == 1: if serange == "": serange = "s0" else: serange = untranslate(serange) if ctype == "": raise ValueError(_("SELinux node type is required")) ctype = sepolicy.get_real_type_name(ctype) if ctype not in self.valid_types: raise ValueError(_("Type %s is invalid, must be a node type") % ctype) (rc, k) = semanage_node_key_create(self.sh, addr, mask, proto) if rc < 0: raise ValueError(_("Could not create key for %s") % addr) if rc < 0: raise ValueError(_("Could not check if addr %s is defined") % addr) (rc, exists) = semanage_node_exists(self.sh, k) if exists: raise ValueError(_("Addr %s already defined") % addr) (rc, node) = semanage_node_create(self.sh) if rc < 0: raise ValueError(_("Could not create addr for %s") % addr) semanage_node_set_proto(node, proto) rc = semanage_node_set_addr(self.sh, node, proto, addr) (rc, con) = semanage_context_create(self.sh) if rc < 0: raise ValueError(_("Could not create context for %s") % addr) rc = semanage_node_set_mask(self.sh, node, proto, mask) if rc < 0: raise ValueError(_("Could not set mask for %s") % addr) rc = semanage_context_set_user(self.sh, con, "system_u") if rc < 0: raise ValueError(_("Could not set user in addr context for %s") % addr) rc = semanage_context_set_role(self.sh, con, "object_r") if rc < 0: raise ValueError(_("Could not set role in addr context for %s") % addr) rc = semanage_context_set_type(self.sh, con, ctype) if rc < 0: raise ValueError(_("Could not set type in addr context for %s") % addr) if (is_mls_enabled == 1) and (serange != ""): rc = semanage_context_set_mls(self.sh, con, serange) if rc < 0: raise ValueError(_("Could not set mls fields in addr context for %s") % addr) rc = semanage_node_set_con(self.sh, node, con) if rc < 0: raise ValueError(_("Could not set addr context for %s") % addr) rc = semanage_node_modify_local(self.sh, k, node) if rc < 0: raise ValueError(_("Could not add addr %s") % addr) semanage_context_free(con) semanage_node_key_free(k) semanage_node_free(node) self.mylog.log_change("resrc=node op=add laddr=%s netmask=%s proto=%s tcontext=%s:%s:%s:%s" % (addr, mask, socket.getprotobyname(self.protocol[proto]), "system_u", "object_r", ctype, serange)) def add(self, addr, mask, proto, serange, ctype): self.begin() self.__add(addr, mask, proto, serange, ctype) self.commit() def __modify(self, addr, mask, proto, serange, setype): addr, mask, proto = self.validate(addr, mask, proto) if serange == "" and setype == "": raise ValueError(_("Requires setype or serange")) setype = sepolicy.get_real_type_name(setype) if setype and setype not in self.valid_types: raise ValueError(_("Type %s is invalid, must be a node type") % setype) (rc, k) = semanage_node_key_create(self.sh, addr, mask, proto) if rc < 0: raise ValueError(_("Could not create key for %s") % addr) (rc, exists) = semanage_node_exists(self.sh, k) if rc < 0: raise ValueError(_("Could not check if addr %s is defined") % addr) if not exists: raise ValueError(_("Addr %s is not defined") % addr) (rc, node) = semanage_node_query(self.sh, k) if rc < 0: raise ValueError(_("Could not query addr %s") % addr) con = semanage_node_get_con(node) if (is_mls_enabled == 1) and (serange != ""): semanage_context_set_mls(self.sh, con, untranslate(serange)) if setype != "": semanage_context_set_type(self.sh, con, setype) rc = semanage_node_modify_local(self.sh, k, node) if rc < 0: raise ValueError(_("Could not modify addr %s") % addr) semanage_node_key_free(k) semanage_node_free(node) self.mylog.log_change("resrc=node op=modify laddr=%s netmask=%s proto=%s tcontext=%s:%s:%s:%s" % (addr, mask, socket.getprotobyname(self.protocol[proto]), "system_u", "object_r", setype, serange)) def modify(self, addr, mask, proto, serange, setype): self.begin() self.__modify(addr, mask, proto, serange, setype) self.commit() def __delete(self, addr, mask, proto): addr, mask, proto = self.validate(addr, mask, proto) (rc, k) = semanage_node_key_create(self.sh, addr, mask, proto) if rc < 0: raise ValueError(_("Could not create key for %s") % addr) (rc, exists) = semanage_node_exists(self.sh, k) if rc < 0: raise ValueError(_("Could not check if addr %s is defined") % addr) if not exists: raise ValueError(_("Addr %s is not defined") % addr) (rc, exists) = semanage_node_exists_local(self.sh, k) if rc < 0: raise ValueError(_("Could not check if addr %s is defined") % addr) if not exists: raise ValueError(_("Addr %s is defined in policy, cannot be deleted") % addr) rc = semanage_node_del_local(self.sh, k) if rc < 0: raise ValueError(_("Could not delete addr %s") % addr) semanage_node_key_free(k) self.mylog.log_change("resrc=node op=delete laddr=%s netmask=%s proto=%s" % (addr, mask, socket.getprotobyname(self.protocol[proto]))) def delete(self, addr, mask, proto): self.begin() self.__delete(addr, mask, proto) self.commit() def deleteall(self): (rc, nlist) = semanage_node_list_local(self.sh) if rc < 0: raise ValueError(_("Could not deleteall node mappings")) self.begin() for node in nlist: self.__delete(semanage_node_get_addr(self.sh, node)[1], semanage_node_get_mask(self.sh, node)[1], self.protocol[semanage_node_get_proto(node)]) self.commit() def get_all(self, locallist=0): ddict = {} if locallist: (rc, self.ilist) = semanage_node_list_local(self.sh) else: (rc, self.ilist) = semanage_node_list(self.sh) if rc < 0: raise ValueError(_("Could not list addrs")) for node in self.ilist: con = semanage_node_get_con(node) addr = semanage_node_get_addr(self.sh, node) mask = semanage_node_get_mask(self.sh, node) proto = self.protocol[semanage_node_get_proto(node)] ddict[(addr[1], mask[1], proto)] = (semanage_context_get_user(con), semanage_context_get_role(con), semanage_context_get_type(con), semanage_context_get_mls(con)) return ddict def customized(self): l = [] ddict = self.get_all(True) for k in sorted(ddict.keys()): if ddict[k][3]: l.append("-a -M %s -p %s -t %s -r '%s' %s" % (k[1], k[2], ddict[k][2], ddict[k][3], k[0])) else: l.append("-a -M %s -p %s -t %s %s" % (k[1], k[2], ddict[k][2], k[0])) return l def list(self, heading=1, locallist=0): ddict = self.get_all(locallist) if len(ddict) == 0: return keys = sorted(ddict.keys()) if heading: print("%-18s %-18s %-5s %-5s\n" % ("IP Address", "Netmask", "Protocol", "Context")) if is_mls_enabled: for k in keys: val = '' for fields in k: val = val + '\t' + str(fields) print("%-18s %-18s %-5s %s:%s:%s:%s " % (k[0], k[1], k[2], ddict[k][0], ddict[k][1], ddict[k][2], translate(ddict[k][3], False))) else: for k in keys: print("%-18s %-18s %-5s %s:%s:%s " % (k[0], k[1], k[2], ddict[k][0], ddict[k][1], ddict[k][2])) class interfaceRecords(semanageRecords): def __init__(self, args = None): semanageRecords.__init__(self, args) def __add(self, interface, serange, ctype): if is_mls_enabled == 1: if serange == "": serange = "s0" else: serange = untranslate(serange) if ctype == "": raise ValueError(_("SELinux Type is required")) (rc, k) = semanage_iface_key_create(self.sh, interface) if rc < 0: raise ValueError(_("Could not create key for %s") % interface) (rc, exists) = semanage_iface_exists(self.sh, k) if rc < 0: raise ValueError(_("Could not check if interface %s is defined") % interface) if exists: raise ValueError(_("Interface %s already defined") % interface) (rc, iface) = semanage_iface_create(self.sh) if rc < 0: raise ValueError(_("Could not create interface for %s") % interface) rc = semanage_iface_set_name(self.sh, iface, interface) (rc, con) = semanage_context_create(self.sh) if rc < 0: raise ValueError(_("Could not create context for %s") % interface) rc = semanage_context_set_user(self.sh, con, "system_u") if rc < 0: raise ValueError(_("Could not set user in interface context for %s") % interface) rc = semanage_context_set_role(self.sh, con, "object_r") if rc < 0: raise ValueError(_("Could not set role in interface context for %s") % interface) rc = semanage_context_set_type(self.sh, con, ctype) if rc < 0: raise ValueError(_("Could not set type in interface context for %s") % interface) if (is_mls_enabled == 1) and (serange != ""): rc = semanage_context_set_mls(self.sh, con, serange) if rc < 0: raise ValueError(_("Could not set mls fields in interface context for %s") % interface) rc = semanage_iface_set_ifcon(self.sh, iface, con) if rc < 0: raise ValueError(_("Could not set interface context for %s") % interface) rc = semanage_iface_set_msgcon(self.sh, iface, con) if rc < 0: raise ValueError(_("Could not set message context for %s") % interface) rc = semanage_iface_modify_local(self.sh, k, iface) if rc < 0: raise ValueError(_("Could not add interface %s") % interface) semanage_context_free(con) semanage_iface_key_free(k) semanage_iface_free(iface) self.mylog.log_change("resrc=interface op=add netif=%s tcontext=%s:%s:%s:%s" % (interface, "system_u", "object_r", ctype, serange)) def add(self, interface, serange, ctype): self.begin() self.__add(interface, serange, ctype) self.commit() def __modify(self, interface, serange, setype): if serange == "" and setype == "": raise ValueError(_("Requires setype or serange")) (rc, k) = semanage_iface_key_create(self.sh, interface) if rc < 0: raise ValueError(_("Could not create key for %s") % interface) (rc, exists) = semanage_iface_exists(self.sh, k) if rc < 0: raise ValueError(_("Could not check if interface %s is defined") % interface) if not exists: raise ValueError(_("Interface %s is not defined") % interface) (rc, iface) = semanage_iface_query(self.sh, k) if rc < 0: raise ValueError(_("Could not query interface %s") % interface) con = semanage_iface_get_ifcon(iface) if (is_mls_enabled == 1) and (serange != ""): semanage_context_set_mls(self.sh, con, untranslate(serange)) if setype != "": semanage_context_set_type(self.sh, con, setype) rc = semanage_iface_modify_local(self.sh, k, iface) if rc < 0: raise ValueError(_("Could not modify interface %s") % interface) semanage_iface_key_free(k) semanage_iface_free(iface) self.mylog.log_change("resrc=interface op=modify netif=%s tcontext=%s:%s:%s:%s" % (interface, "system_u", "object_r", setype, serange)) def modify(self, interface, serange, setype): self.begin() self.__modify(interface, serange, setype) self.commit() def __delete(self, interface): (rc, k) = semanage_iface_key_create(self.sh, interface) if rc < 0: raise ValueError(_("Could not create key for %s") % interface) (rc, exists) = semanage_iface_exists(self.sh, k) if rc < 0: raise ValueError(_("Could not check if interface %s is defined") % interface) if not exists: raise ValueError(_("Interface %s is not defined") % interface) (rc, exists) = semanage_iface_exists_local(self.sh, k) if rc < 0: raise ValueError(_("Could not check if interface %s is defined") % interface) if not exists: raise ValueError(_("Interface %s is defined in policy, cannot be deleted") % interface) rc = semanage_iface_del_local(self.sh, k) if rc < 0: raise ValueError(_("Could not delete interface %s") % interface) semanage_iface_key_free(k) self.mylog.log_change("resrc=interface op=delete netif=%s" % interface) def delete(self, interface): self.begin() self.__delete(interface) self.commit() def deleteall(self): (rc, ulist) = semanage_iface_list_local(self.sh) if rc < 0: raise ValueError(_("Could not delete all interface mappings")) self.begin() for i in ulist: self.__delete(semanage_iface_get_name(i)) self.commit() def get_all(self, locallist=0): ddict = {} if locallist: (rc, self.ilist) = semanage_iface_list_local(self.sh) else: (rc, self.ilist) = semanage_iface_list(self.sh) if rc < 0: raise ValueError(_("Could not list interfaces")) for interface in self.ilist: con = semanage_iface_get_ifcon(interface) ddict[semanage_iface_get_name(interface)] = (semanage_context_get_user(con), semanage_context_get_role(con), semanage_context_get_type(con), semanage_context_get_mls(con)) return ddict def customized(self): l = [] ddict = self.get_all(True) for k in sorted(ddict.keys()): if ddict[k][3]: l.append("-a -t %s -r '%s' %s" % (ddict[k][2], ddict[k][3], k)) else: l.append("-a -t %s %s" % (ddict[k][2], k)) return l def list(self, heading=1, locallist=0): ddict = self.get_all(locallist) if len(ddict) == 0: return keys = sorted(ddict.keys()) if heading: print("%-30s %s\n" % (_("SELinux Interface"), _("Context"))) if is_mls_enabled: for k in keys: print("%-30s %s:%s:%s:%s " % (k, ddict[k][0], ddict[k][1], ddict[k][2], translate(ddict[k][3], False))) else: for k in keys: print("%-30s %s:%s:%s " % (k, ddict[k][0], ddict[k][1], ddict[k][2])) class fcontextRecords(semanageRecords): valid_types = [] def __init__(self, args = None): semanageRecords.__init__(self, args) try: self.valid_types = list(list(sepolicy.info(sepolicy.ATTRIBUTE, "file_type"))[0]["types"]) self.valid_types += list(list(sepolicy.info(sepolicy.ATTRIBUTE, "device_node"))[0]["types"]) except RuntimeError: pass self.equiv = {} self.equiv_dist = {} self.equal_ind = False try: fd = open(selinux.selinux_file_context_subs_path(), "r") for i in fd.readlines(): i = i.strip() if len(i) == 0: continue if i.startswith("#"): continue target, substitute = i.split() self.equiv[target] = substitute fd.close() except IOError: pass try: fd = open(selinux.selinux_file_context_subs_dist_path(), "r") for i in fd.readlines(): i = i.strip() if len(i) == 0: continue if i.startswith("#"): continue target, substitute = i.split() self.equiv_dist[target] = substitute fd.close() except IOError: pass def commit(self): if self.equal_ind: subs_file = selinux.selinux_file_context_subs_path() tmpfile = "%s.tmp" % subs_file fd = open(tmpfile, "w") for target in self.equiv.keys(): fd.write("%s %s\n" % (target, self.equiv[target])) fd.close() try: os.chmod(tmpfile, os.stat(subs_file)[stat.ST_MODE]) except: pass os.rename(tmpfile, subs_file) self.equal_ind = False semanageRecords.commit(self) def add_equal(self, target, substitute): self.begin() if target != "/" and target[-1] == "/": raise ValueError(_("Target %s is not valid. Target is not allowed to end with '/'") % target) if substitute != "/" and substitute[-1] == "/": raise ValueError(_("Substitute %s is not valid. Substitute is not allowed to end with '/'") % substitute) if target in self.equiv.keys(): raise ValueError(_("Equivalence class for %s already exists") % target) self.validate(target) for fdict in (self.equiv, self.equiv_dist): for i in fdict: if i.startswith(target + "/"): raise ValueError(_("File spec %s conflicts with equivalency rule '%s %s'") % (target, i, fdict[i])) self.mylog.log_change("resrc=fcontext op=add-equal %s %s" % (audit.audit_encode_nv_string("sglob", target, 0), audit.audit_encode_nv_string("tglob", substitute, 0))) self.equiv[target] = substitute self.equal_ind = True self.commit() def modify_equal(self, target, substitute): self.begin() if target not in self.equiv.keys(): raise ValueError(_("Equivalence class for %s does not exist") % target) self.equiv[target] = substitute self.equal_ind = True self.mylog.log_change("resrc=fcontext op=modify-equal %s %s" % (audit.audit_encode_nv_string("sglob", target, 0), audit.audit_encode_nv_string("tglob", substitute, 0))) self.commit() def createcon(self, target, seuser="system_u"): (rc, con) = semanage_context_create(self.sh) if rc < 0: raise ValueError(_("Could not create context for %s") % target) if seuser == "": seuser = "system_u" rc = semanage_context_set_user(self.sh, con, seuser) if rc < 0: raise ValueError(_("Could not set user in file context for %s") % target) rc = semanage_context_set_role(self.sh, con, "object_r") if rc < 0: raise ValueError(_("Could not set role in file context for %s") % target) if is_mls_enabled == 1: rc = semanage_context_set_mls(self.sh, con, "s0") if rc < 0: raise ValueError(_("Could not set mls fields in file context for %s") % target) return con def validate(self, target): if target == "" or target.find("\n") >= 0: raise ValueError(_("Invalid file specification")) if target.find(" ") != -1: raise ValueError(_("File specification can not include spaces")) for fdict in (self.equiv, self.equiv_dist): for i in fdict: if target.startswith(i + "/"): t = re.sub(i, fdict[i], target) raise ValueError(_("File spec %s conflicts with equivalency rule '%s %s'; Try adding '%s' instead") % (target, i, fdict[i], t)) def __add(self, target, type, ftype="", serange="", seuser="system_u"): self.validate(target) if is_mls_enabled == 1: serange = untranslate(serange) if type == "": raise ValueError(_("SELinux Type is required")) if type != "<>": type = sepolicy.get_real_type_name(type) if type not in self.valid_types: raise ValueError(_("Type %s is invalid, must be a file or device type") % type) (rc, k) = semanage_fcontext_key_create(self.sh, target, file_types[ftype]) if rc < 0: raise ValueError(_("Could not create key for %s") % target) (rc, exists) = semanage_fcontext_exists(self.sh, k) if rc < 0: raise ValueError(_("Could not check if file context for %s is defined") % target) if not exists: (rc, exists) = semanage_fcontext_exists_local(self.sh, k) if rc < 0: raise ValueError(_("Could not check if file context for %s is defined") % target) if exists: raise ValueError(_("File context for %s already defined") % target) (rc, fcontext) = semanage_fcontext_create(self.sh) if rc < 0: raise ValueError(_("Could not create file context for %s") % target) rc = semanage_fcontext_set_expr(self.sh, fcontext, target) if type != "<>": con = self.createcon(target, seuser) rc = semanage_context_set_type(self.sh, con, type) if rc < 0: raise ValueError(_("Could not set type in file context for %s") % target) if (is_mls_enabled == 1) and (serange != ""): rc = semanage_context_set_mls(self.sh, con, serange) if rc < 0: raise ValueError(_("Could not set mls fields in file context for %s") % target) rc = semanage_fcontext_set_con(self.sh, fcontext, con) if rc < 0: raise ValueError(_("Could not set file context for %s") % target) semanage_fcontext_set_type(fcontext, file_types[ftype]) rc = semanage_fcontext_modify_local(self.sh, k, fcontext) if rc < 0: raise ValueError(_("Could not add file context for %s") % target) if type != "<>": semanage_context_free(con) semanage_fcontext_key_free(k) semanage_fcontext_free(fcontext) if not seuser: seuser = "system_u" self.mylog.log_change("resrc=fcontext op=add %s ftype=%s tcontext=%s:%s:%s:%s" % (audit.audit_encode_nv_string("tglob", target, 0), ftype_to_audit[ftype], seuser, "object_r", type, serange)) def add(self, target, type, ftype="", serange="", seuser="system_u"): self.begin() self.__add(target, type, ftype, serange, seuser) self.commit() def __modify(self, target, setype, ftype, serange, seuser): if serange == "" and setype == "" and seuser == "": raise ValueError(_("Requires setype, serange or seuser")) if setype not in ["", "<>"]: setype = sepolicy.get_real_type_name(setype) if setype not in self.valid_types: raise ValueError(_("Type %s is invalid, must be a file or device type") % setype) self.validate(target) (rc, k) = semanage_fcontext_key_create(self.sh, target, file_types[ftype]) if rc < 0: raise ValueError(_("Could not create a key for %s") % target) (rc, exists) = semanage_fcontext_exists(self.sh, k) if rc < 0: raise ValueError(_("Could not check if file context for %s is defined") % target) if not exists: (rc, exists) = semanage_fcontext_exists_local(self.sh, k) if not exists: raise ValueError(_("File context for %s is not defined") % target) try: (rc, fcontext) = semanage_fcontext_query_local(self.sh, k) except OSError: try: (rc, fcontext) = semanage_fcontext_query(self.sh, k) except OSError: raise ValueError(_("Could not query file context for %s") % target) if setype != "<>": con = semanage_fcontext_get_con(fcontext) if con is None: con = self.createcon(target) if (is_mls_enabled == 1) and (serange != ""): semanage_context_set_mls(self.sh, con, untranslate(serange)) if seuser != "": semanage_context_set_user(self.sh, con, seuser) if setype != "": semanage_context_set_type(self.sh, con, setype) rc = semanage_fcontext_set_con(self.sh, fcontext, con) if rc < 0: raise ValueError(_("Could not set file context for %s") % target) else: rc = semanage_fcontext_set_con(self.sh, fcontext, None) if rc < 0: raise ValueError(_("Could not set file context for %s") % target) rc = semanage_fcontext_modify_local(self.sh, k, fcontext) if rc < 0: raise ValueError(_("Could not modify file context for %s") % target) semanage_fcontext_key_free(k) semanage_fcontext_free(fcontext) if not seuser: seuser = "system_u" self.mylog.log_change("resrc=fcontext op=modify %s ftype=%s tcontext=%s:%s:%s:%s" % (audit.audit_encode_nv_string("tglob", target, 0), ftype_to_audit[ftype], seuser, "object_r", setype, serange)) def modify(self, target, setype, ftype, serange, seuser): self.begin() self.__modify(target, setype, ftype, serange, seuser) self.commit() def deleteall(self): (rc, flist) = semanage_fcontext_list_local(self.sh) if rc < 0: raise ValueError(_("Could not list the file contexts")) self.begin() for fcontext in flist: target = semanage_fcontext_get_expr(fcontext) ftype = semanage_fcontext_get_type(fcontext) ftype_str = semanage_fcontext_get_type_str(ftype) (rc, k) = semanage_fcontext_key_create(self.sh, target, file_types[ftype_str]) if rc < 0: raise ValueError(_("Could not create a key for %s") % target) rc = semanage_fcontext_del_local(self.sh, k) if rc < 0: raise ValueError(_("Could not delete the file context %s") % target) semanage_fcontext_key_free(k) self.mylog.log_change("resrc=fcontext op=delete %s ftype=%s" % (audit.audit_encode_nv_string("tglob", target, 0), ftype_to_audit[file_type_str_to_option[ftype_str]])) self.equiv = {} self.equal_ind = True self.commit() def __delete(self, target, ftype): if target in self.equiv.keys(): self.equiv.pop(target) self.equal_ind = True self.mylog.log_change("resrc=fcontext op=delete-equal %s" % (audit.audit_encode_nv_string("tglob", target, 0))) return (rc, k) = semanage_fcontext_key_create(self.sh, target, file_types[ftype]) if rc < 0: raise ValueError(_("Could not create a key for %s") % target) (rc, exists) = semanage_fcontext_exists_local(self.sh, k) if rc < 0: raise ValueError(_("Could not check if file context for %s is defined") % target) if not exists: (rc, exists) = semanage_fcontext_exists(self.sh, k) if rc < 0: raise ValueError(_("Could not check if file context for %s is defined") % target) if exists: raise ValueError(_("File context for %s is defined in policy, cannot be deleted") % target) else: raise ValueError(_("File context for %s is not defined") % target) rc = semanage_fcontext_del_local(self.sh, k) if rc < 0: raise ValueError(_("Could not delete file context for %s") % target) semanage_fcontext_key_free(k) self.mylog.log_change("resrc=fcontext op=delete %s ftype=%s" % (audit.audit_encode_nv_string("tglob", target, 0), ftype_to_audit[ftype])) def delete(self, target, ftype): self.begin() self.__delete(target, ftype) self.commit() def get_all(self, locallist=0): if locallist: (rc, self.flist) = semanage_fcontext_list_local(self.sh) else: (rc, self.flist) = semanage_fcontext_list(self.sh) if rc < 0: raise ValueError(_("Could not list file contexts")) (rc, fchomedirs) = semanage_fcontext_list_homedirs(self.sh) if rc < 0: raise ValueError(_("Could not list file contexts for home directories")) (rc, fclocal) = semanage_fcontext_list_local(self.sh) if rc < 0: raise ValueError(_("Could not list local file contexts")) self.flist += fchomedirs self.flist += fclocal ddict = {} for fcontext in self.flist: expr = semanage_fcontext_get_expr(fcontext) ftype = semanage_fcontext_get_type(fcontext) ftype_str = semanage_fcontext_get_type_str(ftype) con = semanage_fcontext_get_con(fcontext) if con: ddict[(expr, ftype_str)] = (semanage_context_get_user(con), semanage_context_get_role(con), semanage_context_get_type(con), semanage_context_get_mls(con)) else: ddict[(expr, ftype_str)] = con return ddict def customized(self): l = [] fcon_dict = self.get_all(True) for k in sorted(fcon_dict.keys()): if fcon_dict[k]: if fcon_dict[k][3]: l.append("-a -f %s -t %s -r '%s' '%s'" % (file_type_str_to_option[k[1]], fcon_dict[k][2], fcon_dict[k][3], k[0])) else: l.append("-a -f %s -t %s '%s'" % (file_type_str_to_option[k[1]], fcon_dict[k][2], k[0])) if len(self.equiv): for target in self.equiv.keys(): l.append("-a -e %s %s" % (self.equiv[target], target)) return l def list(self, heading=1, locallist=0): fcon_dict = self.get_all(locallist) if len(fcon_dict) != 0: if heading: print("%-50s %-18s %s\n" % (_("SELinux fcontext"), _("type"), _("Context"))) for k in sorted(fcon_dict.keys()): if fcon_dict[k]: if is_mls_enabled: print("%-50s %-18s %s:%s:%s:%s " % (k[0], k[1], fcon_dict[k][0], fcon_dict[k][1], fcon_dict[k][2], translate(fcon_dict[k][3], False))) else: print("%-50s %-18s %s:%s:%s " % (k[0], k[1], fcon_dict[k][0], fcon_dict[k][1], fcon_dict[k][2])) else: print("%-50s %-18s <>" % (k[0], k[1])) if len(self.equiv_dist): if not locallist: if heading: print(_("\nSELinux Distribution fcontext Equivalence \n")) for target in self.equiv_dist.keys(): print("%s = %s" % (target, self.equiv_dist[target])) if len(self.equiv): if heading: print(_("\nSELinux Local fcontext Equivalence \n")) for target in self.equiv.keys(): print("%s = %s" % (target, self.equiv[target])) class booleanRecords(semanageRecords): def __init__(self, args = None): semanageRecords.__init__(self, args) self.dict = {} self.dict["TRUE"] = 1 self.dict["FALSE"] = 0 self.dict["ON"] = 1 self.dict["OFF"] = 0 self.dict["1"] = 1 self.dict["0"] = 0 try: rc, self.current_booleans = selinux.security_get_boolean_names() rc, ptype = selinux.selinux_getpolicytype() except: self.current_booleans = [] ptype = None if self.store == "" or self.store == ptype: self.modify_local = True else: self.modify_local = False def __mod(self, name, value): name = selinux.selinux_boolean_sub(name) (rc, k) = semanage_bool_key_create(self.sh, name) if rc < 0: raise ValueError(_("Could not create a key for %s") % name) (rc, exists) = semanage_bool_exists(self.sh, k) if rc < 0: raise ValueError(_("Could not check if boolean %s is defined") % name) if not exists: raise ValueError(_("Boolean %s is not defined") % name) (rc, b) = semanage_bool_query(self.sh, k) if rc < 0: raise ValueError(_("Could not query file context %s") % name) if value.upper() in self.dict: semanage_bool_set_value(b, self.dict[value.upper()]) else: raise ValueError(_("You must specify one of the following values: %s") % ", ".join(self.dict.keys())) if self.modify_local and name in self.current_booleans: rc = semanage_bool_set_active(self.sh, k, b) if rc < 0: raise ValueError(_("Could not set active value of boolean %s") % name) rc = semanage_bool_modify_local(self.sh, k, b) if rc < 0: raise ValueError(_("Could not modify boolean %s") % name) semanage_bool_key_free(k) semanage_bool_free(b) def modify(self, name, value=None, use_file=False): self.begin() if use_file: fd = open(name) for b in fd.read().split("\n"): b = b.strip() if len(b) == 0: continue try: boolname, val = b.split("=") except ValueError: raise ValueError(_("Bad format %s: Record %s" % (name, b))) self.__mod(boolname.strip(), val.strip()) fd.close() else: self.__mod(name, value) self.commit() def __delete(self, name): name = selinux.selinux_boolean_sub(name) (rc, k) = semanage_bool_key_create(self.sh, name) if rc < 0: raise ValueError(_("Could not create a key for %s") % name) (rc, exists) = semanage_bool_exists(self.sh, k) if rc < 0: raise ValueError(_("Could not check if boolean %s is defined") % name) if not exists: raise ValueError(_("Boolean %s is not defined") % name) (rc, exists) = semanage_bool_exists_local(self.sh, k) if rc < 0: raise ValueError(_("Could not check if boolean %s is defined") % name) if not exists: raise ValueError(_("Boolean %s is defined in policy, cannot be deleted") % name) rc = semanage_bool_del_local(self.sh, k) if rc < 0: raise ValueError(_("Could not delete boolean %s") % name) semanage_bool_key_free(k) def delete(self, name): self.begin() self.__delete(name) self.commit() def deleteall(self): (rc, self.blist) = semanage_bool_list_local(self.sh) if rc < 0: raise ValueError(_("Could not list booleans")) self.begin() for boolean in self.blist: name = semanage_bool_get_name(boolean) self.__delete(name) self.commit() def get_all(self, locallist=0): ddict = {} if locallist: (rc, self.blist) = semanage_bool_list_local(self.sh) else: (rc, self.blist) = semanage_bool_list(self.sh) if rc < 0: raise ValueError(_("Could not list booleans")) for boolean in self.blist: value = [] name = semanage_bool_get_name(boolean) value.append(semanage_bool_get_value(boolean)) if self.modify_local and name in self.current_booleans: value.append(selinux.security_get_boolean_pending(name)) value.append(selinux.security_get_boolean_active(name)) else: value.append(value[0]) value.append(value[0]) ddict[name] = value return ddict def get_desc(self, name): name = selinux.selinux_boolean_sub(name) return sepolicy.boolean_desc(name) def get_category(self, name): name = selinux.selinux_boolean_sub(name) return sepolicy.boolean_category(name) def customized(self): l = [] ddict = self.get_all(True) for k in sorted(ddict.keys()): if ddict[k]: l.append("-m -%s %s" % (ddict[k][2], k)) return l def list(self, heading=True, locallist=False, use_file=False): on_off = (_("off"), _("on")) if use_file: ddict = self.get_all(locallist) for k in sorted(ddict.keys()): if ddict[k]: print("%s=%s" % (k, ddict[k][2])) return ddict = self.get_all(locallist) if len(ddict) == 0: return if heading: print("%-30s %s %s %s\n" % (_("SELinux boolean"), _("State"), _("Default"), _("Description"))) for k in sorted(ddict.keys()): if ddict[k]: print("%-30s (%-5s,%5s) %s" % (k, on_off[ddict[k][2]], on_off[ddict[k][0]], self.get_desc(k))) selinux-python-3.0/semanage/test-semanage.py000066400000000000000000000303171356774067000212740ustar00rootroot00000000000000import unittest import sys from subprocess import Popen, PIPE import argparse object_list = ['login', 'user', 'port', 'module', 'interface', 'node', 'fcontext', 'boolean', 'permissive', "dontaudit"] class SemanageTests(unittest.TestCase): def assertDenied(self, err): self.assertTrue('Permission denied' in err, '"Permission denied" not found in %r' % err) def assertNotFound(self, err): self.assertTrue('not found' in err, '"not found" not found in %r' % err) def assertFailure(self, status): self.assertTrue(status != 0, '"semanage succeeded when it should have failed') def assertSuccess(self, status, err): self.assertTrue(status == 0, '"semanage should have succeeded for this test %r' % err) def test_extract(self): for object in object_list: if object in ["dontaudit", "module", "permissive"]: continue "Verify semanage %s -E" % object p = Popen(['semanage', object, '-E'], stdout=PIPE) out, err = p.communicate() self.assertSuccess(p.returncode, err) def test_input_output(self): print("Verify semanage export -f /tmp/out") p = Popen(['semanage', "export", '-f', '/tmp/out'], stdout=PIPE) out, err = p.communicate() self.assertSuccess(p.returncode, err) print("Verify semanage export -S targeted -f -") p = Popen(["semanage", "export", "-S", "targeted", "-f", "-"], stdout=PIPE) out, err = p.communicate() self.assertSuccess(p.returncode, err) print("Verify semanage -S targeted -o -") p = Popen(["semanage", "-S", "targeted", "-o", "-"], stdout=PIPE) out, err = p.communicate() self.assertSuccess(p.returncode, err) print("Verify semanage import -f /tmp/out") p = Popen(['semanage', "import", '-f', '/tmp/out'], stdout=PIPE) out, err = p.communicate() self.assertSuccess(p.returncode, err) print("Verify semanage import -S targeted -f /tmp/out") p = Popen(["semanage", "import", "-S", "targeted", "-f", "/tmp/out"], stdout=PIPE) out, err = p.communicate() self.assertSuccess(p.returncode, err) print("Verify semanage -S targeted -i /tmp/out") p = Popen(["semanage", "-S", "targeted", "-i", "/tmp/out"], stdout=PIPE) out, err = p.communicate() self.assertSuccess(p.returncode, err) def test_list(self): for object in object_list: if object in ["dontaudit"]: continue "Verify semanage %s -l" % object p = Popen(['semanage', object, '-l'], stdout=PIPE) out, err = p.communicate() self.assertSuccess(p.returncode, err) def test_list_c(self): for object in object_list: if object in ["module", "permissive", "dontaudit"]: continue print("Verify semanage %s -l" % object) p = Popen(['semanage', object, '-lC'], stdout=PIPE) out, err = p.communicate() self.assertSuccess(p.returncode, err) def test_fcontext(self): p = Popen(["semanage", "fcontext", "-d", "/ha-web(/.*)?"], stderr=PIPE) out, err = p.communicate() print("Verify semanage fcontext -a") p = Popen(["semanage", "fcontext", "-a", "-t", "httpd_sys_content_t", "/ha-web(/.*)?"], stdout=PIPE) out, err = p.communicate() self.assertSuccess(p.returncode, err) print("Verify semanage fcontext -m") p = Popen(["semanage", "fcontext", "-m", "-t", "default_t", "/ha-web(/.*)?"], stdout=PIPE) out, err = p.communicate() self.assertSuccess(p.returncode, err) print("Verify semanage fcontext -d") p = Popen(["semanage", "fcontext", "-d", "/ha-web(/.*)?"], stdout=PIPE) out, err = p.communicate() self.assertSuccess(p.returncode, err) def test_fcontext_e(self): p = Popen(["semanage", "fcontext", "-d", "/myhome"], stderr=PIPE) out, err = p.communicate() p = Popen(["semanage", "fcontext", "-d", "/myhome1"], stderr=PIPE) out, err = p.communicate() print("Verify semanage fcontext -a -e") p = Popen(["semanage", "fcontext", "-a", "-e", "/home", "/myhome"], stdout=PIPE) out, err = p.communicate() self.assertSuccess(p.returncode, err) print("Verify semanage fcontext -m -e") p = Popen(["semanage", "fcontext", "-a", "-e", "/home", "/myhome1"], stdout=PIPE) out, err = p.communicate() self.assertSuccess(p.returncode, err) print("Verify semanage fcontext -d -e") p = Popen(["semanage", "fcontext", "-d", "/myhome1"], stdout=PIPE) out, err = p.communicate() self.assertSuccess(p.returncode, err) def test_port(self): # Cleanup p = Popen(["semanage", "port", "-d", "-p", "tcp", "55"], stdout=PIPE, stderr=PIPE) out, err = p.communicate() # test print("Verify semanage port -a") p = Popen(["semanage", "port", "-a", "-t", "ssh_port_t", "-p", "tcp", "55"], stdout=PIPE) out, err = p.communicate() self.assertSuccess(p.returncode, err) print("Verify semanage port -m") p = Popen(["semanage", "port", "-m", "-t", "http_port_t", "-p", "tcp", "55"], stdout=PIPE) out, err = p.communicate() self.assertSuccess(p.returncode, err) print("Verify semanage port -d") p = Popen(["semanage", "port", "-d", "-p", "tcp", "55"], stdout=PIPE) out, err = p.communicate() self.assertSuccess(p.returncode, err) def test_login(self): # Cleanup p = Popen(["userdel", "-f", "-r", "testlogin"], stderr=PIPE, stdout=PIPE) out, err = p.communicate() p = Popen(["semanage", "user", "-d", "testuser_u"], stderr=PIPE, stdout=PIPE) out, err = p.communicate() p = Popen(["semanage", "login", "-d", "testlogin"], stderr=PIPE, stdout=PIPE) out, err = p.communicate() #test print("Verify semanage user -a") p = Popen(["semanage", "user", "-a", "-R", "staff_r", "-r", "s0-s0:c0.c1023", "testuser_u"], stdout=PIPE) out, err = p.communicate() self.assertSuccess(p.returncode, err) print("Verify useradd ") p = Popen(["useradd", "testlogin"], stdout=PIPE) out, err = p.communicate() self.assertSuccess(p.returncode, err) print("Verify semanage login -a") p = Popen(["semanage", "login", "-a", "-s", "testuser_u", "testlogin"], stdout=PIPE) out, err = p.communicate() self.assertSuccess(p.returncode, err) print("Verify semanage login -m -r") p = Popen(["semanage", "login", "-m", "-r", "s0-s0:c1", "testlogin"], stdout=PIPE) out, err = p.communicate() self.assertSuccess(p.returncode, err) print("Verify semanage login -m -s") p = Popen(["semanage", "login", "-m", "-s", "staff_u", "testlogin"], stdout=PIPE) out, err = p.communicate() self.assertSuccess(p.returncode, err) print("Verify semanage login -m -s -r") p = Popen(["semanage", "login", "-m", "-s", "testuser_u", "-r", "s0", "testlogin"], stdout=PIPE) out, err = p.communicate() self.assertSuccess(p.returncode, err) print("Verify semanage login -d") p = Popen(["semanage", "login", "-d", "testlogin"], stdout=PIPE) out, err = p.communicate() print("Verify userdel ") p = Popen(["userdel", "-f", "-r", "testlogin"], stderr=PIPE, stdout=PIPE) out, err = p.communicate() self.assertSuccess(p.returncode, err) print("Verify semanage user -d") p = Popen(["semanage", "user", "-d", "testuser_u"], stdout=PIPE) out, err = p.communicate() self.assertSuccess(p.returncode, err) def test_user(self): # Cleanup p = Popen(["semanage", "user", "-d", "testuser_u"], stderr=PIPE, stdout=PIPE) out, err = p.communicate() # test print("Verify semanage user -a") p = Popen(["semanage", "user", "-a", "-R", "staff_r", "-r", "s0-s0:c0.c1023", "testuser_u"], stdout=PIPE) out, err = p.communicate() self.assertSuccess(p.returncode, err) print("Verify semanage user -m -R") p = Popen(["semanage", "user", "-m", "-R", "sysadm_r unconfined_r", "testuser_u"], stdout=PIPE) out, err = p.communicate() self.assertSuccess(p.returncode, err) print("Verify semanage user -m -r") p = Popen(["semanage", "user", "-m", "-r", "s0-s0:c1", "testuser_u"], stdout=PIPE) out, err = p.communicate() self.assertSuccess(p.returncode, err) print("Verify semanage user -d") p = Popen(["semanage", "user", "-d", "testuser_u"], stdout=PIPE) out, err = p.communicate() self.assertSuccess(p.returncode, err) def test_boolean(self): import selinux boolean_status = {0: "--off", 1: "--on"} boolean_state = selinux.security_get_boolean_active("httpd_anon_write") # Test print("Verify semanage boolean -m %s httpd_anon_write" % boolean_status[not boolean_state]) p = Popen(["semanage", "boolean", "-m", boolean_status[(not boolean_state)], "httpd_anon_write"], stdout=PIPE) out, err = p.communicate() self.assertSuccess(p.returncode, err) print("Verify semanage boolean -m %s httpd_anon_write" % boolean_status[boolean_state]) p = Popen(["semanage", "boolean", "-m", boolean_status[boolean_state], "httpd_anon_write"], stdout=PIPE) out, err = p.communicate() self.assertSuccess(p.returncode, err) def semanage_suite(): semanage_suite = unittest.TestSuite() semanage_suite.addTest(unittest.makeSuite(SemanageTests)) return semanage_suite def semanage_custom_suite(test_list): suiteSemanage = unittest.TestSuite() for t in test_list: suiteSemanage.addTest(SemanageTests(t)) return suiteSemanage def semanage_run_test(suite): unittest.TextTestRunner(verbosity=2).run(suite) class CheckTest(argparse.Action): def __call__(self, parser, namespace, values, option_string=None): newval = getattr(namespace, self.dest) if not newval: newval = [] for v in values: if v not in semanage_test_list: raise ValueError("%s must be an unit test.\nValid tests: %s" % (v, ", ".join(semanage_test_list))) newval.append(v) setattr(namespace, self.dest, newval) def semanage_args(args): if args.list: print("You can run the following tests:") for i in semanage_test_list: print(i) if args.all: semanage_run_test(semanage_suite()) if args.test: semanage_run_test(semanage_custom_suite(args.test)) def gen_semanage_test_args(parser): group = parser.add_mutually_exclusive_group(required=True) group.add_argument('-a', "--all", dest="all", default=False, action="store_true", help=("Run all semanage unit tests")) group.add_argument('-l', "--list", dest="list", default=False, action="store_true", help=("List all semanage unit tests")) group.add_argument('-t', "--test", dest="test", default=[], action=CheckTest, nargs="*", help=("Run selected semanage unit test(s)")) group.set_defaults(func=semanage_args) if __name__ == "__main__": import selinux semanage_test_list = [x for x in dir(SemanageTests) if x.startswith("test_")] if selinux.is_selinux_enabled() and selinux.security_getenforce() == 1: parser = argparse.ArgumentParser(description='Semanage unit test script') gen_semanage_test_args(parser) try: args = parser.parse_args() args.func(args) sys.exit(0) except ValueError as e: sys.stderr.write("%s: %s\n" % (e.__class__.__name__, str(e))) sys.exit(1) except IOError as e: sys.stderr.write("%s: %s\n" % (e.__class__.__name__, str(e))) sys.exit(1) except KeyboardInterrupt: sys.exit(0) else: print("SELinux must be in enforcing mode for this test") selinux-python-3.0/sepolgen/000077500000000000000000000000001356774067000162155ustar00rootroot00000000000000selinux-python-3.0/sepolgen/COPYING000066400000000000000000000431311356774067000172520ustar00rootroot00000000000000 GNU GENERAL PUBLIC LICENSE Version 2, June 1991 Copyright (C) 1989, 1991 Free Software Foundation, Inc. 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed. Preamble The licenses for most software are designed to take away your freedom to share and change it. By contrast, the GNU General Public License is intended to guarantee your freedom to share and change free software--to make sure the software is free for all its users. This General Public License applies to most of the Free Software Foundation's software and to any other program whose authors commit to using it. (Some other Free Software Foundation software is covered by the GNU Library General Public License instead.) You can apply it to your programs, too. When we speak of free software, we are referring to freedom, not price. Our General Public Licenses are designed to make sure that you have the freedom to distribute copies of free software (and charge for this service if you wish), that you receive source code or can get it if you want it, that you can change the software or use pieces of it in new free programs; and that you know you can do these things. To protect your rights, we need to make restrictions that forbid anyone to deny you these rights or to ask you to surrender the rights. These restrictions translate to certain responsibilities for you if you distribute copies of the software, or if you modify it. For example, if you distribute copies of such a program, whether gratis or for a fee, you must give the recipients all the rights that you have. You must make sure that they, too, receive or can get the source code. And you must show them these terms so they know their rights. We protect your rights with two steps: (1) copyright the software, and (2) offer you this license which gives you legal permission to copy, distribute and/or modify the software. Also, for each author's protection and ours, we want to make certain that everyone understands that there is no warranty for this free software. If the software is modified by someone else and passed on, we want its recipients to know that what they have is not the original, so that any problems introduced by others will not reflect on the original authors' reputations. Finally, any free program is threatened constantly by software patents. We wish to avoid the danger that redistributors of a free program will individually obtain patent licenses, in effect making the program proprietary. To prevent this, we have made it clear that any patent must be licensed for everyone's free use or not licensed at all. The precise terms and conditions for copying, distribution and modification follow. GNU GENERAL PUBLIC LICENSE TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION 0. This License applies to any program or other work which contains a notice placed by the copyright holder saying it may be distributed under the terms of this General Public License. The "Program", below, refers to any such program or work, and a "work based on the Program" means either the Program or any derivative work under copyright law: that is to say, a work containing the Program or a portion of it, either verbatim or with modifications and/or translated into another language. (Hereinafter, translation is included without limitation in the term "modification".) Each licensee is addressed as "you". Activities other than copying, distribution and modification are not covered by this License; they are outside its scope. The act of running the Program is not restricted, and the output from the Program is covered only if its contents constitute a work based on the Program (independent of having been made by running the Program). Whether that is true depends on what the Program does. 1. You may copy and distribute verbatim copies of the Program's source code as you receive it, in any medium, provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice and disclaimer of warranty; keep intact all the notices that refer to this License and to the absence of any warranty; and give any other recipients of the Program a copy of this License along with the Program. You may charge a fee for the physical act of transferring a copy, and you may at your option offer warranty protection in exchange for a fee. 2. You may modify your copy or copies of the Program or any portion of it, thus forming a work based on the Program, and copy and distribute such modifications or work under the terms of Section 1 above, provided that you also meet all of these conditions: a) You must cause the modified files to carry prominent notices stating that you changed the files and the date of any change. b) You must cause any work that you distribute or publish, that in whole or in part contains or is derived from the Program or any part thereof, to be licensed as a whole at no charge to all third parties under the terms of this License. c) If the modified program normally reads commands interactively when run, you must cause it, when started running for such interactive use in the most ordinary way, to print or display an announcement including an appropriate copyright notice and a notice that there is no warranty (or else, saying that you provide a warranty) and that users may redistribute the program under these conditions, and telling the user how to view a copy of this License. (Exception: if the Program itself is interactive but does not normally print such an announcement, your work based on the Program is not required to print an announcement.) These requirements apply to the modified work as a whole. If identifiable sections of that work are not derived from the Program, and can be reasonably considered independent and separate works in themselves, then this License, and its terms, do not apply to those sections when you distribute them as separate works. But when you distribute the same sections as part of a whole which is a work based on the Program, the distribution of the whole must be on the terms of this License, whose permissions for other licensees extend to the entire whole, and thus to each and every part regardless of who wrote it. Thus, it is not the intent of this section to claim rights or contest your rights to work written entirely by you; rather, the intent is to exercise the right to control the distribution of derivative or collective works based on the Program. In addition, mere aggregation of another work not based on the Program with the Program (or with a work based on the Program) on a volume of a storage or distribution medium does not bring the other work under the scope of this License. 3. You may copy and distribute the Program (or a work based on it, under Section 2) in object code or executable form under the terms of Sections 1 and 2 above provided that you also do one of the following: a) Accompany it with the complete corresponding machine-readable source code, which must be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange; or, b) Accompany it with a written offer, valid for at least three years, to give any third party, for a charge no more than your cost of physically performing source distribution, a complete machine-readable copy of the corresponding source code, to be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange; or, c) Accompany it with the information you received as to the offer to distribute corresponding source code. (This alternative is allowed only for noncommercial distribution and only if you received the program in object code or executable form with such an offer, in accord with Subsection b above.) The source code for a work means the preferred form of the work for making modifications to it. For an executable work, complete source code means all the source code for all modules it contains, plus any associated interface definition files, plus the scripts used to control compilation and installation of the executable. However, as a special exception, the source code distributed need not include anything that is normally distributed (in either source or binary form) with the major components (compiler, kernel, and so on) of the operating system on which the executable runs, unless that component itself accompanies the executable. If distribution of executable or object code is made by offering access to copy from a designated place, then offering equivalent access to copy the source code from the same place counts as distribution of the source code, even though third parties are not compelled to copy the source along with the object code. 4. You may not copy, modify, sublicense, or distribute the Program except as expressly provided under this License. Any attempt otherwise to copy, modify, sublicense or distribute the Program is void, and will automatically terminate your rights under this License. However, parties who have received copies, or rights, from you under this License will not have their licenses terminated so long as such parties remain in full compliance. 5. You are not required to accept this License, since you have not signed it. However, nothing else grants you permission to modify or distribute the Program or its derivative works. These actions are prohibited by law if you do not accept this License. Therefore, by modifying or distributing the Program (or any work based on the Program), you indicate your acceptance of this License to do so, and all its terms and conditions for copying, distributing or modifying the Program or works based on it. 6. Each time you redistribute the Program (or any work based on the Program), the recipient automatically receives a license from the original licensor to copy, distribute or modify the Program subject to these terms and conditions. You may not impose any further restrictions on the recipients' exercise of the rights granted herein. You are not responsible for enforcing compliance by third parties to this License. 7. If, as a consequence of a court judgment or allegation of patent infringement or for any other reason (not limited to patent issues), conditions are imposed on you (whether by court order, agreement or otherwise) that contradict the conditions of this License, they do not excuse you from the conditions of this License. If you cannot distribute so as to satisfy simultaneously your obligations under this License and any other pertinent obligations, then as a consequence you may not distribute the Program at all. For example, if a patent license would not permit royalty-free redistribution of the Program by all those who receive copies directly or indirectly through you, then the only way you could satisfy both it and this License would be to refrain entirely from distribution of the Program. If any portion of this section is held invalid or unenforceable under any particular circumstance, the balance of the section is intended to apply and the section as a whole is intended to apply in other circumstances. It is not the purpose of this section to induce you to infringe any patents or other property right claims or to contest validity of any such claims; this section has the sole purpose of protecting the integrity of the free software distribution system, which is implemented by public license practices. Many people have made generous contributions to the wide range of software distributed through that system in reliance on consistent application of that system; it is up to the author/donor to decide if he or she is willing to distribute software through any other system and a licensee cannot impose that choice. This section is intended to make thoroughly clear what is believed to be a consequence of the rest of this License. 8. If the distribution and/or use of the Program is restricted in certain countries either by patents or by copyrighted interfaces, the original copyright holder who places the Program under this License may add an explicit geographical distribution limitation excluding those countries, so that distribution is permitted only in or among countries not thus excluded. In such case, this License incorporates the limitation as if written in the body of this License. 9. The Free Software Foundation may publish revised and/or new versions of the General Public License from time to time. Such new versions will be similar in spirit to the present version, but may differ in detail to address new problems or concerns. Each version is given a distinguishing version number. If the Program specifies a version number of this License which applies to it and "any later version", you have the option of following the terms and conditions either of that version or of any later version published by the Free Software Foundation. If the Program does not specify a version number of this License, you may choose any version ever published by the Free Software Foundation. 10. If you wish to incorporate parts of the Program into other free programs whose distribution conditions are different, write to the author to ask for permission. For software which is copyrighted by the Free Software Foundation, write to the Free Software Foundation; we sometimes make exceptions for this. Our decision will be guided by the two goals of preserving the free status of all derivatives of our free software and of promoting the sharing and reuse of software generally. NO WARRANTY 11. BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION. 12. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. END OF TERMS AND CONDITIONS How to Apply These Terms to Your New Programs If you develop a new program, and you want it to be of the greatest possible use to the public, the best way to achieve this is to make it free software which everyone can redistribute and change under these terms. To do so, attach the following notices to the program. It is safest to attach them to the start of each source file to most effectively convey the exclusion of warranty; and each file should have at least the "copyright" line and a pointer to where the full notice is found. Copyright (C) This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program; if not, write to the Free Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA Also add information on how to contact you by electronic and paper mail. If the program is interactive, make it output a short notice like this when it starts in an interactive mode: Gnomovision version 69, Copyright (C) year name of author Gnomovision comes with ABSOLUTELY NO WARRANTY; for details type `show w'. This is free software, and you are welcome to redistribute it under certain conditions; type `show c' for details. The hypothetical commands `show w' and `show c' should show the appropriate parts of the General Public License. Of course, the commands you use may be called something other than `show w' and `show c'; they could even be mouse-clicks or menu items--whatever suits your program. You should also get your employer (if you work as a programmer) or your school, if any, to sign a "copyright disclaimer" for the program, if necessary. Here is a sample; alter the names: Yoyodyne, Inc., hereby disclaims all copyright interest in the program `Gnomovision' (which makes passes at compilers) written by James Hacker. , 1 April 1989 Ty Coon, President of Vice This General Public License does not permit incorporating your program into proprietary programs. If your program is a subroutine library, you may consider it more useful to permit linking proprietary applications with the library. If this is what you want to do, use the GNU Library General Public License instead of this License. selinux-python-3.0/sepolgen/HACKING000066400000000000000000000063631356774067000172140ustar00rootroot00000000000000Code Overview ============= The source for Sepolgen is divided into the python library (sepolgen) and tools (e.g., audit2allow). The library is structured to give flexibility to the application using it - it avoids assumptions and close coupling of components where possible. The audit2allow application demonstrates how to hook the components together. There is a test suite in the test subdirectory. The run-tests.py script will run all of the tests. The library is is divided into several functional areas: Reference Policy Representation (sepolgen.refpolicy) ------------------------------------------------------------- Objects for representing policies and the reference policy interfaces. Includes basic components (security contexts, allow rules, etc.) and reference policy specific components (interfaces, modules, etc.). This representation can be used as output from the parser to represent the reference policy interfaces. It can also be used to generate policy by building up the relevant data structures and then outputting them. See sepolgen.policygen and sepolgen.output for information on how this can be done. Access (sepolgen.access, sepolgen.interfaces, sepolgen.matching) ------------------------------------------------------------- Objects and algorithms for representing access and sets of access in an abstract way and searching that access. The basic concept is that of an access vector (source type, target type, object class, and permissions). These can be grouped into sets without overlapping access. Access vectors and access vector sets can be matched against other access vectors - this forms the backbone of how we turn audit messages into interface calls. The highest-level form of access represented in interfaces - which includes algorithms to turn the raw output of the parser into access vector sets representing the access allowed by each interface. Parsing (sepolgen.refparser) ------------------------------------------------------------- Parser for reference policy "headers" - i.e., /usr/share/selinux/devel/include. This uses the LGPL parsing library [PLY](http://www.dabeaz.com/ply/) which is included in the source distribution in the files lex.py and yacc.py. It may be necessary to switch to a more powerful parsing library in the future, but for now this is fast and easy. Audit Messages (sepolgen.audit) ------------------------------------------------------------- Infrastructure for parsing SELinux related messages as produced by the audit system. This is not a general purpose audit parsing library - it is only meant to capture SELinux messages - primarily access vector cache (AVC) messages and policy load messages. Policy Generation (sepolgen.policygen and sepolgen.output) ------------------------------------------------------------- Infrastructure for generating policy based on required access. This deliberately only loosely coupled to the audit parsing to allow required accesses to be feed in from anywhere. Object Model (sepolgen.objectmodel) ------------------------------------------------------------- Information about the SELinux object classes. This is semantic information about the object classes - including information flow. It is separated to keep the core from being concerned about the details of the object classes. selinux-python-3.0/sepolgen/Makefile000066400000000000000000000002701356774067000176540ustar00rootroot00000000000000all: ; install: $(MAKE) -C src $@ relabel: ; clean: $(MAKE) -C src $@ $(MAKE) -C tests $@ rm -f *~ *.pyc rm -f parser.out parsetab.py indent: ; test: $(MAKE) -C tests $@ selinux-python-3.0/sepolgen/VERSION000066400000000000000000000000041356774067000172570ustar00rootroot000000000000003.0 selinux-python-3.0/sepolgen/src/000077500000000000000000000000001356774067000170045ustar00rootroot00000000000000selinux-python-3.0/sepolgen/src/Makefile000066400000000000000000000003051356774067000204420ustar00rootroot00000000000000all: ; install: $(MAKE) -C sepolgen $@ $(MAKE) -C share $@ relabel: ; clean: $(MAKE) -C sepolgen $@ $(MAKE) -C share $@ rm -f *~ *.pyc rm -f parser.out parsetab.py indent: ; test: ; selinux-python-3.0/sepolgen/src/sepolgen/000077500000000000000000000000001356774067000206205ustar00rootroot00000000000000selinux-python-3.0/sepolgen/src/sepolgen/Makefile000066400000000000000000000005541356774067000222640ustar00rootroot00000000000000PREFIX ?= /usr PYTHON ?= python3 PYTHONLIBDIR ?= $(shell $(PYTHON) -c "from distutils.sysconfig import *; print(get_python_lib(prefix='$(PREFIX)'))") PACKAGEDIR ?= /$(PYTHONLIBDIR)/sepolgen all: install: all -mkdir -p $(DESTDIR)$(PACKAGEDIR) install -m 644 *.py $(DESTDIR)$(PACKAGEDIR) clean: rm -f parser.out parsetab.py rm -f *~ *.pyc rm -rf __pycache__ selinux-python-3.0/sepolgen/src/sepolgen/__init__.py000066400000000000000000000000001356774067000227170ustar00rootroot00000000000000selinux-python-3.0/sepolgen/src/sepolgen/access.py000066400000000000000000000273121356774067000224400ustar00rootroot00000000000000# Authors: Karl MacMillan # # Copyright (C) 2006 Red Hat # see file 'COPYING' for use and warranty information # # This program is free software; you can redistribute it and/or # modify it under the terms of the GNU General Public License as # published by the Free Software Foundation; version 2 only # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program; if not, write to the Free Software # Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA # """ Classes representing basic access. SELinux - at the most basic level - represents access as the 4-tuple subject (type or context), target (type or context), object class, permission. The policy language elaborates this basic access to facilitate more concise rules (e.g., allow rules can have multiple source or target types - see refpolicy for more information). This module has objects for representing the most basic access (AccessVector) and sets of that access (AccessVectorSet). These objects are used in Madison in a variety of ways, but they are the fundamental representation of access. """ from . import refpolicy from . import util from selinux import audit2why def is_idparam(id): """Determine if an id is a parameter in the form $N, where N is an integer. Returns: True if the id is a parameter False if the id is not a parameter """ if len(id) > 1 and id[0] == '$': try: int(id[1:]) except ValueError: return False return True else: return False class AccessVector(util.Comparison): """ An access vector is the basic unit of access in SELinux. Access vectors are the most basic representation of access within SELinux. It represents the access a source type has to a target type in terms of an object class and a set of permissions. Access vectors are distinct from AVRules in that they can only store a single source type, target type, and object class. The simplicity of AccessVectors makes them useful for storing access in a form that is easy to search and compare. The source, target, and object are stored as string. No checking done to verify that the strings are valid SELinux identifiers. Identifiers in the form $N (where N is an integer) are reserved as interface parameters and are treated as wild cards in many circumstances. Properties: .src_type - The source type allowed access. [String or None] .tgt_type - The target type to which access is allowed. [String or None] .obj_class - The object class to which access is allowed. [String or None] .perms - The permissions allowed to the object class. [IdSet] .audit_msgs - The audit messages that generated this access vector [List of strings] .xperms - Extended permissions attached to the AV. [Dictionary {operation: xperm set}] """ def __init__(self, init_list=None): if init_list: self.from_list(init_list) else: self.src_type = None self.tgt_type = None self.obj_class = None self.perms = refpolicy.IdSet() self.audit_msgs = [] self.type = audit2why.TERULE self.data = [] self.xperms = {} # when implementing __eq__ also __hash__ is needed on py2 # if object is muttable __hash__ should be None self.__hash__ = None # The direction of the information flow represented by this # access vector - used for matching self.info_flow_dir = None def from_list(self, list): """Initialize an access vector from a list. Initialize an access vector from a list treating the list as positional arguments - i.e., 0 = src_type, 1 = tgt_type, etc. All of the list elements 3 and greater are treated as perms. For example, the list ['foo_t', 'bar_t', 'file', 'read', 'write'] would create an access vector list with the source type 'foo_t', target type 'bar_t', object class 'file', and permissions 'read' and 'write'. This format is useful for very simple storage to strings or disc (see to_list) and for initializing access vectors. """ if len(list) < 4: raise ValueError("List must contain at least four elements %s" % str(list)) self.src_type = list[0] self.tgt_type = list[1] self.obj_class = list[2] self.perms = refpolicy.IdSet(list[3:]) def to_list(self): """ Convert an access vector to a list. Convert an access vector to a list treating the list as positional values. See from_list for more information on how an access vector is represented in a list. """ l = [self.src_type, self.tgt_type, self.obj_class] l.extend(sorted(self.perms)) return l def merge(self, av): """Add permissions and extended permissions from AV""" self.perms.update(av.perms) for op in av.xperms: if op not in self.xperms: self.xperms[op] = refpolicy.XpermSet() self.xperms[op].extend(av.xperms[op]) def __str__(self): return self.to_string() def to_string(self): return "allow %s %s:%s %s;" % (self.src_type, self.tgt_type, self.obj_class, self.perms.to_space_str()) def _compare(self, other, method): try: x = list(self.perms) a = (self.src_type, self.tgt_type, self.obj_class, x) y = list(other.perms) x.sort() y.sort() b = (other.src_type, other.tgt_type, other.obj_class, y) return method(a, b) except (AttributeError, TypeError): # trying to compare to foreign type return NotImplemented def avrule_to_access_vectors(avrule): """Convert an avrule into a list of access vectors. AccessVectors and AVRules are similarly, but differ in that an AVRule can more than one source type, target type, and object class. This function expands a single avrule into a list of one or more AccessVectors representing the access defined in the AVRule. """ if isinstance(avrule, AccessVector): return [avrule] a = [] for src_type in avrule.src_types: for tgt_type in avrule.tgt_types: for obj_class in avrule.obj_classes: access = AccessVector() access.src_type = src_type access.tgt_type = tgt_type access.obj_class = obj_class access.perms = avrule.perms.copy() a.append(access) return a class AccessVectorSet: """A non-overlapping set of access vectors. An AccessVectorSet is designed to store one or more access vectors that are non-overlapping. Access can be added to the set incrementally and access vectors will be added or merged as necessary. For example, adding the following access vectors using add_av: allow $1 etc_t : read; allow $1 etc_t : write; allow $1 var_log_t : read; Would result in an access vector set with the access vectors: allow $1 etc_t : { read write}; allow $1 var_log_t : read; """ def __init__(self): """Initialize an access vector set. """ self.src = {} # The information flow direction of this access vector # set - see objectmodel.py for more information. This # stored here to speed up searching - see matching.py. self.info_dir = None def __iter__(self): """Iterate over all of the unique access vectors in the set.""" for tgts in self.src.values(): for objs in tgts.values(): for av in objs.values(): yield av def __len__(self): """Return the number of unique access vectors in the set. Because of the internal representation of the access vector set, __len__ is not a constant time operation. Worst case is O(N) where N is the number of unique access vectors, but the common case is probably better. """ l = 0 for tgts in self.src.values(): for objs in tgts.values(): l += len(objs) return l def to_list(self): """Return the unique access vectors in the set as a list. The format of the returned list is a set of nested lists, each access vector represented by a list. This format is designed to be simply serializable to a file. For example, consider an access vector set with the following access vectors: allow $1 user_t : file read; allow $1 etc_t : file { read write}; to_list would return the following: [[$1, user_t, file, read] [$1, etc_t, file, read, write]] See AccessVector.to_list for more information. """ l = [] for av in self: l.append(av.to_list()) return l def from_list(self, l): """Add access vectors stored in a list. See to list for more information on the list format that this method accepts. This will add all of the access from the list. Any existing access vectors in the set will be retained. """ for av in l: self.add_av(AccessVector(av)) def add(self, src_type, tgt_type, obj_class, perms, audit_msg=None, avc_type=audit2why.TERULE, data=[]): """Add an access vector to the set. """ av = AccessVector() av.src_type = src_type av.tgt_type = tgt_type av.obj_class = obj_class av.perms = perms av.data = data av.type = avc_type self.add_av(av, audit_msg) def add_av(self, av, audit_msg=None): """Add an access vector to the set.""" tgt = self.src.setdefault(av.src_type, { }) cls = tgt.setdefault(av.tgt_type, { }) if (av.obj_class, av.type) in cls: cls[av.obj_class, av.type].merge(av) else: cls[av.obj_class, av.type] = av if audit_msg: cls[av.obj_class, av.type].audit_msgs.append(audit_msg) def avs_extract_types(avs): types = refpolicy.IdSet() for av in avs: types.add(av.src_type) types.add(av.tgt_type) return types def avs_extract_obj_perms(avs): perms = { } for av in avs: if av.obj_class in perms: s = perms[av.obj_class] else: s = refpolicy.IdSet() perms[av.obj_class] = s s.update(av.perms) return perms class RoleTypeSet: """A non-overlapping set of role type statements. This class allows the incremental addition of role type statements and maintains a non-overlapping list of statements. """ def __init__(self): """Initialize an access vector set.""" self.role_types = {} def __iter__(self): """Iterate over all of the unique role allows statements in the set.""" for role_type in self.role_types.values(): yield role_type def __len__(self): """Return the unique number of role allow statements.""" return len(self.role_types.keys()) def add(self, role, type): if role in self.role_types: role_type = self.role_types[role] else: role_type = refpolicy.RoleType() role_type.role = role self.role_types[role] = role_type role_type.types.add(type) selinux-python-3.0/sepolgen/src/sepolgen/audit.py000066400000000000000000000527341356774067000223130ustar00rootroot00000000000000# Authors: Karl MacMillan # # Copyright (C) 2006 Red Hat # see file 'COPYING' for use and warranty information # # This program is free software; you can redistribute it and/or # modify it under the terms of the GNU General Public License as # published by the Free Software Foundation; version 2 only # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program; if not, write to the Free Software # Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA # import re import sys from . import refpolicy from . import access from . import util # Convenience functions def get_audit_boot_msgs(): """Obtain all of the avc and policy load messages from the audit log. This function uses ausearch and requires that the current process have sufficient rights to run ausearch. Returns: string contain all of the audit messages returned by ausearch. """ import subprocess import time fd=open("/proc/uptime", "r") off=float(fd.read().split()[0]) fd.close s = time.localtime(time.time() - off) bootdate = time.strftime("%x", s) boottime = time.strftime("%X", s) output = subprocess.Popen(["/sbin/ausearch", "-m", "AVC,USER_AVC,MAC_POLICY_LOAD,DAEMON_START,SELINUX_ERR", "-ts", bootdate, boottime], stdout=subprocess.PIPE).communicate()[0] if util.PY3: output = util.decode_input(output) return output def get_audit_msgs(): """Obtain all of the avc and policy load messages from the audit log. This function uses ausearch and requires that the current process have sufficient rights to run ausearch. Returns: string contain all of the audit messages returned by ausearch. """ import subprocess output = subprocess.Popen(["/sbin/ausearch", "-m", "AVC,USER_AVC,MAC_POLICY_LOAD,DAEMON_START,SELINUX_ERR"], stdout=subprocess.PIPE).communicate()[0] if util.PY3: output = util.decode_input(output) return output def get_dmesg_msgs(): """Obtain all of the avc and policy load messages from /bin/dmesg. Returns: string contain all of the audit messages returned by dmesg. """ import subprocess output = subprocess.Popen(["/bin/dmesg"], stdout=subprocess.PIPE).communicate()[0] if util.PY3: output = util.decode_input(output) return output # Classes representing audit messages class AuditMessage: """Base class for all objects representing audit messages. AuditMessage is a base class for all audit messages and only provides storage for the raw message (as a string) and a parsing function that does nothing. """ def __init__(self, message): self.message = message self.header = "" def from_split_string(self, recs): """Parse a string that has been split into records by space into an audit message. This method should be overridden by subclasses. Error reporting should be done by raise ValueError exceptions. """ for msg in recs: fields = msg.split("=") if len(fields) != 2: if msg[:6] == "audit(": self.header = msg return else: continue if fields[0] == "msg": self.header = fields[1] return class InvalidMessage(AuditMessage): """Class representing invalid audit messages. This is used to differentiate between audit messages that aren't recognized (that should return None from the audit message parser) and a message that is recognized but is malformed in some way. """ def __init__(self, message): AuditMessage.__init__(self, message) class PathMessage(AuditMessage): """Class representing a path message""" def __init__(self, message): AuditMessage.__init__(self, message) self.path = "" def from_split_string(self, recs): AuditMessage.from_split_string(self, recs) for msg in recs: fields = msg.split("=") if len(fields) != 2: continue if fields[0] == "path": self.path = fields[1][1:-1] return import selinux.audit2why as audit2why avcdict = {} class AVCMessage(AuditMessage): """AVC message representing an access denial or granted message. This is a very basic class and does not represent all possible fields in an avc message. Currently the fields are: scontext - context for the source (process) that generated the message tcontext - context for the target tclass - object class for the target (only one) comm - the process name exe - the on-disc binary path - the path of the target access - list of accesses that were allowed or denied denial - boolean indicating whether this was a denial (True) or granted (False) message. ioctlcmd - ioctl 'request' parameter An example audit message generated from the audit daemon looks like (line breaks added): 'type=AVC msg=audit(1155568085.407:10877): avc: denied { search } for pid=677 comm="python" name="modules" dev=dm-0 ino=13716388 scontext=user_u:system_r:setroubleshootd_t:s0 tcontext=system_u:object_r:modules_object_t:s0 tclass=dir' An example audit message stored in syslog (not processed by the audit daemon - line breaks added): 'Sep 12 08:26:43 dhcp83-5 kernel: audit(1158064002.046:4): avc: denied { read } for pid=2 496 comm="bluez-pin" name=".gdm1K3IFT" dev=dm-0 ino=3601333 scontext=user_u:system_r:bluetooth_helper_t:s0-s0:c0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file """ def __init__(self, message): AuditMessage.__init__(self, message) self.scontext = refpolicy.SecurityContext() self.tcontext = refpolicy.SecurityContext() self.tclass = "" self.comm = "" self.exe = "" self.path = "" self.name = "" self.accesses = [] self.denial = True self.ioctlcmd = None self.type = audit2why.TERULE def __parse_access(self, recs, start): # This is kind of sucky - the access that is in a space separated # list like '{ read write }'. This doesn't fit particularly well with splitting # the string on spaces. This function takes the list of recs and a starting # position one beyond the open brace. It then adds the accesses until it finds # the close brace or the end of the list (which is an error if reached without # seeing a close brace). found_close = False i = start if i == (len(recs) - 1): raise ValueError("AVC message in invalid format [%s]\n" % self.message) while i < len(recs): if recs[i] == "}": found_close = True break self.accesses.append(recs[i]) i = i + 1 if not found_close: raise ValueError("AVC message in invalid format [%s]\n" % self.message) return i + 1 def from_split_string(self, recs): AuditMessage.from_split_string(self, recs) # FUTURE - fully parse avc messages and store all possible fields # Required fields found_src = False found_tgt = False found_class = False found_access = False for i in range(len(recs)): if recs[i] == "{": i = self.__parse_access(recs, i + 1) found_access = True continue elif recs[i] == "granted": self.denial = False fields = recs[i].split("=") if len(fields) != 2: continue if fields[0] == "scontext": self.scontext = refpolicy.SecurityContext(fields[1]) found_src = True elif fields[0] == "tcontext": self.tcontext = refpolicy.SecurityContext(fields[1]) found_tgt = True elif fields[0] == "tclass": self.tclass = fields[1] found_class = True elif fields[0] == "comm": self.comm = fields[1][1:-1] elif fields[0] == "exe": self.exe = fields[1][1:-1] elif fields[0] == "name": self.name = fields[1][1:-1] elif fields[0] == "ioctlcmd": try: self.ioctlcmd = int(fields[1], 16) except ValueError: pass if not found_src or not found_tgt or not found_class or not found_access: raise ValueError("AVC message in invalid format [%s]\n" % self.message) self.analyze() def analyze(self): tcontext = self.tcontext.to_string() scontext = self.scontext.to_string() access_tuple = tuple( self.accesses) self.data = [] if (scontext, tcontext, self.tclass, access_tuple) in avcdict.keys(): self.type, self.data = avcdict[(scontext, tcontext, self.tclass, access_tuple)] else: self.type, self.data = audit2why.analyze(scontext, tcontext, self.tclass, self.accesses) if self.type == audit2why.NOPOLICY: self.type = audit2why.TERULE if self.type == audit2why.BADTCON: raise ValueError("Invalid Target Context %s\n" % tcontext) if self.type == audit2why.BADSCON: raise ValueError("Invalid Source Context %s\n" % scontext) if self.type == audit2why.BADSCON: raise ValueError("Invalid Type Class %s\n" % self.tclass) if self.type == audit2why.BADPERM: raise ValueError("Invalid permission %s\n" % " ".join(self.accesses)) if self.type == audit2why.BADCOMPUTE: raise ValueError("Error during access vector computation") if self.type == audit2why.CONSTRAINT: self.data = [ self.data ] if self.scontext.user != self.tcontext.user: self.data.append(("user (%s)" % self.scontext.user, 'user (%s)' % self.tcontext.user)) if self.scontext.role != self.tcontext.role and self.tcontext.role != "object_r": self.data.append(("role (%s)" % self.scontext.role, 'role (%s)' % self.tcontext.role)) if self.scontext.level != self.tcontext.level: self.data.append(("level (%s)" % self.scontext.level, 'level (%s)' % self.tcontext.level)) avcdict[(scontext, tcontext, self.tclass, access_tuple)] = (self.type, self.data) class PolicyLoadMessage(AuditMessage): """Audit message indicating that the policy was reloaded.""" def __init__(self, message): AuditMessage.__init__(self, message) class DaemonStartMessage(AuditMessage): """Audit message indicating that a daemon was started.""" def __init__(self, message): AuditMessage.__init__(self, message) self.auditd = False def from_split_string(self, recs): AuditMessage.from_split_string(self, recs) if "auditd" in recs: self.auditd = True class ComputeSidMessage(AuditMessage): """Audit message indicating that a sid was not valid. Compute sid messages are generated on attempting to create a security context that is not valid. Security contexts are invalid if the role is not authorized for the user or the type is not authorized for the role. This class does not store all of the fields from the compute sid message - just the type and role. """ def __init__(self, message): AuditMessage.__init__(self, message) self.invalid_context = refpolicy.SecurityContext() self.scontext = refpolicy.SecurityContext() self.tcontext = refpolicy.SecurityContext() self.tclass = "" def from_split_string(self, recs): AuditMessage.from_split_string(self, recs) if len(recs) < 10: raise ValueError("Split string does not represent a valid compute sid message") try: self.invalid_context = refpolicy.SecurityContext(recs[5]) self.scontext = refpolicy.SecurityContext(recs[7].split("=")[1]) self.tcontext = refpolicy.SecurityContext(recs[8].split("=")[1]) self.tclass = recs[9].split("=")[1] except: raise ValueError("Split string does not represent a valid compute sid message") def output(self): return "role %s types %s;\n" % (self.role, self.type) # Parser for audit messages class AuditParser: """Parser for audit messages. This class parses audit messages and stores them according to their message type. This is not a general purpose audit message parser - it only extracts selinux related messages. Each audit messages are stored in one of four lists: avc_msgs - avc denial or granted messages. Messages are stored in AVCMessage objects. comput_sid_messages - invalid sid messages. Messages are stored in ComputSidMessage objects. invalid_msgs - selinux related messages that are not valid. Messages are stored in InvalidMessageObjects. policy_load_messages - policy load messages. Messages are stored in PolicyLoadMessage objects. These lists will be reset when a policy load message is seen if AuditParser.last_load_only is set to true. It is assumed that messages are fed to the parser in chronological order - time stamps are not parsed. """ def __init__(self, last_load_only=False): self.__initialize() self.last_load_only = last_load_only def __initialize(self): self.avc_msgs = [] self.compute_sid_msgs = [] self.invalid_msgs = [] self.policy_load_msgs = [] self.path_msgs = [] self.by_header = { } self.check_input_file = False # Low-level parsing function - tries to determine if this audit # message is an SELinux related message and then parses it into # the appropriate AuditMessage subclass. This function deliberately # does not impose policy (e.g., on policy load message) or store # messages to make as simple and reusable as possible. # # Return values: # None - no recognized audit message found in this line # # InvalidMessage - a recognized but invalid message was found. # # AuditMessage (or subclass) - object representing a parsed # and valid audit message. def __parse_line(self, line): # strip("\x1c\x1d\x1e\x85") is only needed for python2 # since str.split() in python3 already does this rec = [x.strip("\x1c\x1d\x1e\x85") for x in line.split()] for i in rec: found = False if i == "avc:" or i == "message=avc:" or i == "msg='avc:": msg = AVCMessage(line) found = True elif i == "security_compute_sid:": msg = ComputeSidMessage(line) found = True elif i == "type=MAC_POLICY_LOAD" or i == "type=1403": msg = PolicyLoadMessage(line) found = True elif i == "type=AVC_PATH": msg = PathMessage(line) found = True elif i == "type=DAEMON_START": msg = DaemonStartMessage(list) found = True if found: self.check_input_file = True try: msg.from_split_string(rec) except ValueError: msg = InvalidMessage(line) return msg return None # Higher-level parse function - take a line, parse it into an # AuditMessage object, and store it in the appropriate list. # This function will optionally reset all of the lists when # it sees a load policy message depending on the value of # self.last_load_only. def __parse(self, line): msg = self.__parse_line(line) if msg is None: return # Append to the correct list if isinstance(msg, PolicyLoadMessage): if self.last_load_only: self.__initialize() elif isinstance(msg, DaemonStartMessage): # We initialize every time the auditd is started. This # is less than ideal, but unfortunately it is the only # way to catch reboots since the initial policy load # by init is not stored in the audit log. if msg.auditd and self.last_load_only: self.__initialize() self.policy_load_msgs.append(msg) elif isinstance(msg, AVCMessage): self.avc_msgs.append(msg) elif isinstance(msg, ComputeSidMessage): self.compute_sid_msgs.append(msg) elif isinstance(msg, InvalidMessage): self.invalid_msgs.append(msg) elif isinstance(msg, PathMessage): self.path_msgs.append(msg) # Group by audit header if msg.header != "": if msg.header in self.by_header: self.by_header[msg.header].append(msg) else: self.by_header[msg.header] = [msg] # Post processing will add additional information from AVC messages # from related messages - only works on messages generated by # the audit system. def __post_process(self): for value in self.by_header.values(): avc = [] path = None for msg in value: if isinstance(msg, PathMessage): path = msg elif isinstance(msg, AVCMessage): avc.append(msg) if len(avc) > 0 and path: for a in avc: a.path = path.path def parse_file(self, input): """Parse the contents of a file object. This method can be called multiple times (along with parse_string).""" line = input.readline() while line: self.__parse(line) line = input.readline() if not self.check_input_file: sys.stderr.write("Nothing to do\n") sys.exit(0) self.__post_process() def parse_string(self, input): """Parse a string containing audit messages - messages should be separated by new lines. This method can be called multiple times (along with parse_file).""" lines = input.split('\n') for l in lines: self.__parse(l) self.__post_process() def to_role(self, role_filter=None): """Return RoleAllowSet statements matching the specified filter Filter out types that match the filer, or all roles Params: role_filter - [optional] Filter object used to filter the output. Returns: Access vector set representing the denied access in the audit logs parsed by this object. """ role_types = access.RoleTypeSet() for cs in self.compute_sid_msgs: if not role_filter or role_filter.filter(cs): role_types.add(cs.invalid_context.role, cs.invalid_context.type) return role_types def to_access(self, avc_filter=None, only_denials=True): """Convert the audit logs access into a an access vector set. Convert the audit logs into an access vector set, optionally filtering the restults with the passed in filter object. Filter objects are object instances with a .filter method that takes and access vector and returns True if the message should be included in the final output and False otherwise. Params: avc_filter - [optional] Filter object used to filter the output. Returns: Access vector set representing the denied access in the audit logs parsed by this object. """ av_set = access.AccessVectorSet() for avc in self.avc_msgs: if avc.denial != True and only_denials: continue if not avc_filter or avc_filter.filter(avc): av = access.AccessVector([avc.scontext.type, avc.tcontext.type, avc.tclass] + avc.accesses) av.data = avc.data av.type = avc.type if avc.ioctlcmd: xperm_set = refpolicy.XpermSet() xperm_set.add(avc.ioctlcmd) av.xperms["ioctl"] = xperm_set av_set.add_av(av, audit_msg=avc) return av_set class AVCTypeFilter: def __init__(self, regex): self.regex = re.compile(regex) def filter(self, avc): if self.regex.match(avc.scontext.type): return True if self.regex.match(avc.tcontext.type): return True return False class ComputeSidTypeFilter: def __init__(self, regex): self.regex = re.compile(regex) def filter(self, avc): if self.regex.match(avc.invalid_context.type): return True if self.regex.match(avc.scontext.type): return True if self.regex.match(avc.tcontext.type): return True return False selinux-python-3.0/sepolgen/src/sepolgen/classperms.py000066400000000000000000000054021356774067000233470ustar00rootroot00000000000000# Authors: Karl MacMillan # # Copyright (C) 2006 Red Hat # see file 'COPYING' for use and warranty information # # This program is free software; you can redistribute it and/or # modify it under the terms of the GNU General Public License as # published by the Free Software Foundation; version 2 only # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program; if not, write to the Free Software # Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA # import sys tokens = ('DEFINE', 'NAME', 'TICK', 'SQUOTE', 'OBRACE', 'CBRACE', 'SEMI', 'OPAREN', 'CPAREN', 'COMMA') reserved = { 'define' : 'DEFINE' } t_TICK = r'\`' t_SQUOTE = r'\'' t_OBRACE = r'\{' t_CBRACE = r'\}' t_SEMI = r'\;' t_OPAREN = r'\(' t_CPAREN = r'\)' t_COMMA = r'\,' t_ignore = " \t\n" def t_NAME(t): r'[a-zA-Z_][a-zA-Z0-9_]*' t.type = reserved.get(t.value,'NAME') return t def t_error(t): print("Illegal character '%s'" % t.value[0]) t.skip(1) from . import lex lex.lex() def p_statements(p): '''statements : define_stmt | define_stmt statements ''' if len(p) == 2: p[0] = [p[1]] else: p[0] = [p[1]] + [p[2]] def p_define_stmt(p): # This sucks - corresponds to 'define(`foo',`{ read write }') '''define_stmt : DEFINE OPAREN TICK NAME SQUOTE COMMA TICK list SQUOTE CPAREN ''' p[0] = [p[4], p[8]] def p_list(p): '''list : NAME | OBRACE names CBRACE ''' if p[1] == "{": p[0] = p[2] else: p[0] = [p[1]] def p_names(p): '''names : NAME | NAME names ''' if len(p) == 2: p[0] = [p[1]] else: p[0] = [p[1]] + p[2] def p_error(p): print("Syntax error on line %d %s [type=%s]" % (p.lineno, p.value, p.type)) from . import yacc yacc.yacc() f = open("all_perms.spt") txt = f.read() f.close() #lex.input(txt) #while 1: # tok = lex.token() # if not tok: # break # print tok test = "define(`foo',`{ read write append }')" test2 = """define(`all_filesystem_perms',`{ mount remount unmount getattr relabelfrom relabelto transition associate quotamod quotaget }') define(`all_security_perms',`{ compute_av compute_create compute_member check_context load_policy compute_relabel compute_user setenforce setbool setsecparam setcheckreqprot }') """ result = yacc.parse(txt) print(result) selinux-python-3.0/sepolgen/src/sepolgen/defaults.py000066400000000000000000000055251356774067000230100ustar00rootroot00000000000000# Authors: Karl MacMillan # # Copyright (C) 2006 Red Hat # see file 'COPYING' for use and warranty information # # This program is free software; you can redistribute it and/or # modify it under the terms of the GNU General Public License as # published by the Free Software Foundation; version 2 only # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program; if not, write to the Free Software # Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA # import os import re # Select the correct location for the development files based on a # path variable (optionally read from a configuration file) class PathChooser(object): def __init__(self, pathname): self.config = dict() if not os.path.exists(pathname): self.config_pathname = "(defaults)" self.config["SELINUX_DEVEL_PATH"] = "/usr/share/selinux/default:/usr/share/selinux/mls:/usr/share/selinux/devel" return self.config_pathname = pathname ignore = re.compile(r"^\s*(?:#.+)?$") consider = re.compile(r"^\s*(\w+)\s*=\s*(.+?)\s*$") with open(pathname, "r") as fd: for lineno, line in enumerate(fd): if ignore.match(line): continue mo = consider.match(line) if not mo: raise ValueError("%s:%d: line is not in key = value format" % (pathname, lineno+1)) self.config[mo.group(1)] = mo.group(2) # We're only exporting one useful function, so why not be a function def __call__(self, testfilename, pathset="SELINUX_DEVEL_PATH"): paths = self.config.get(pathset, None) if paths is None: raise ValueError("%s was not in %s" % (pathset, self.config_pathname)) paths = paths.split(":") for p in paths: target = os.path.join(p, testfilename) if os.path.exists(target): return target return os.path.join(paths[0], testfilename) """ Various default settings, including file and directory locations. """ def data_dir(): return "/var/lib/sepolgen" def perm_map(): return data_dir() + "/perm_map" def interface_info(): return data_dir() + "/interface_info" def attribute_info(): return data_dir() + "/attribute_info" def refpolicy_makefile(): chooser = PathChooser("/etc/selinux/sepolgen.conf") result = chooser("Makefile") if not os.path.exists(result): result = chooser("include/Makefile") return result def headers(): chooser = PathChooser("/etc/selinux/sepolgen.conf") return chooser("include") selinux-python-3.0/sepolgen/src/sepolgen/interfaces.py000066400000000000000000000401201356774067000233120ustar00rootroot00000000000000# Authors: Karl MacMillan # # Copyright (C) 2006 Red Hat # see file 'COPYING' for use and warranty information # # This program is free software; you can redistribute it and/or # modify it under the terms of the GNU General Public License as # published by the Free Software Foundation; version 2 only # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program; if not, write to the Free Software # Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA # """ Classes for representing and manipulating interfaces. """ import copy import itertools from . import access from . import refpolicy from . import objectmodel from . import matching from .sepolgeni18n import _ class Param: """ Object representing a parameter for an interface. """ def __init__(self): self.__name = "" self.type = refpolicy.SRC_TYPE self.obj_classes = refpolicy.IdSet() self.required = True def set_name(self, name): if not access.is_idparam(name): raise ValueError("Name [%s] is not a param" % name) self.__name = name def get_name(self): return self.__name name = property(get_name, set_name) num = property(fget=lambda self: int(self.name[1:])) def __repr__(self): return "" % \ (self.name, refpolicy.field_to_str[self.type], " ".join(self.obj_classes)) # Helper for extract perms def __param_insert(name, type, av, params): ret = 0 if name in params: p = params[name] # The entries are identical - we're done if type == p.type: return # Handle implicitly typed objects (like process) if (type == refpolicy.SRC_TYPE or type == refpolicy.TGT_TYPE) and \ (p.type == refpolicy.TGT_TYPE or p.type == refpolicy.SRC_TYPE): #print name, refpolicy.field_to_str[p.type] # If the object is not implicitly typed, tell the # caller there is a likely conflict. ret = 1 if av: avobjs = [av.obj_class] else: avobjs = [] for obj in itertools.chain(p.obj_classes, avobjs): if obj in objectmodel.implicitly_typed_objects: ret = 0 break # "Promote" to a SRC_TYPE as this is the likely usage. # We do this even if the above test fails on purpose # as there is really no sane way to resolve the conflict # here. The caller can take other actions if needed. p.type = refpolicy.SRC_TYPE else: # There is some conflict - no way to resolve it really # so we just leave the first entry and tell the caller # there was a conflict. ret = 1 else: p = Param() p.name = name p.type = type params[p.name] = p if av: p.obj_classes.add(av.obj_class) return ret def av_extract_params(av, params): """Extract the parameters from an access vector. Extract the parameters (in the form $N) from an access vector, storing them as Param objects in a dictionary. Some attempt is made at resolving conflicts with other entries in the dict, but if an unresolvable conflict is found it is reported to the caller. The goal here is to figure out how interface parameters are actually used in the interface - e.g., that $1 is a domain used as a SRC_TYPE. In general an interface will look like this: interface(`foo', ` allow $1 foo : file read; ') This is simple to figure out - $1 is a SRC_TYPE. A few interfaces are more complex, for example: interface(`foo_trans',` domain_auto_trans($1,fingerd_exec_t,fingerd_t) allow $1 fingerd_t:fd use; allow fingerd_t $1:fd use; allow fingerd_t $1:fifo_file rw_file_perms; allow fingerd_t $1:process sigchld; ') Here the usage seems ambiguous, but it is not. $1 is still domain and therefore should be returned as a SRC_TYPE. Returns: 0 - success 1 - conflict found """ ret = 0 found_src = False if access.is_idparam(av.src_type): if __param_insert(av.src_type, refpolicy.SRC_TYPE, av, params) == 1: ret = 1 if access.is_idparam(av.tgt_type): if __param_insert(av.tgt_type, refpolicy.TGT_TYPE, av, params) == 1: ret = 1 if access.is_idparam(av.obj_class): if __param_insert(av.obj_class, refpolicy.OBJ_CLASS, av, params) == 1: ret = 1 return ret def role_extract_params(role, params): if access.is_idparam(role.role): return __param_insert(role.role, refpolicy.ROLE, None, params) def type_rule_extract_params(rule, params): def extract_from_set(set, type): ret = 0 for x in set: if access.is_idparam(x): if __param_insert(x, type, None, params): ret = 1 return ret ret = 0 if extract_from_set(rule.src_types, refpolicy.SRC_TYPE): ret = 1 if extract_from_set(rule.tgt_types, refpolicy.TGT_TYPE): ret = 1 if extract_from_set(rule.obj_classes, refpolicy.OBJ_CLASS): ret = 1 if access.is_idparam(rule.dest_type): if __param_insert(rule.dest_type, refpolicy.DEST_TYPE, None, params): ret = 1 return ret def ifcall_extract_params(ifcall, params): ret = 0 for arg in ifcall.args: if access.is_idparam(arg): # Assume interface arguments are source types. Fairly safe # assumption for most interfaces if __param_insert(arg, refpolicy.SRC_TYPE, None, params): ret = 1 return ret class AttributeVector: def __init__(self): self.name = "" self.access = access.AccessVectorSet() def add_av(self, av): self.access.add_av(av) class AttributeSet: def __init__(self): self.attributes = { } def add_attr(self, attr): self.attributes[attr.name] = attr def from_file(self, fd): def parse_attr(line): fields = line[1:-1].split() if len(fields) != 2 or fields[0] != "Attribute": raise SyntaxError("Syntax error Attribute statement %s" % line) a = AttributeVector() a.name = fields[1] return a a = None for line in fd: line = line[:-1] if line[0] == "[": if a: self.add_attr(a) a = parse_attr(line) elif a: l = line.split(",") av = access.AccessVector(l) a.add_av(av) if a: self.add_attr(a) class InterfaceVector: def __init__(self, interface=None, attributes={}): # Enabled is a loose concept currently - we are essentially # not enabling interfaces that we can't handle currently. # See InterfaceVector.add_ifv for more information. self.enabled = True self.name = "" # The access that is enabled by this interface - eventually # this will include indirect access from typeattribute # statements. self.access = access.AccessVectorSet() # Parameters are stored in a dictionary (key: param name # value: Param object). self.params = { } if interface: self.from_interface(interface, attributes) self.expanded = False def from_interface(self, interface, attributes={}): self.name = interface.name # Add allow rules for avrule in interface.avrules(): if avrule.rule_type != refpolicy.AVRule.ALLOW: continue # Handle some policy bugs if "dontaudit" in interface.name: #print "allow rule in interface: %s" % interface continue avs = access.avrule_to_access_vectors(avrule) for av in avs: self.add_av(av) # Add typeattribute access if attributes: for typeattribute in interface.typeattributes(): for attr in typeattribute.attributes: if attr not in attributes.attributes: # print "missing attribute " + attr continue attr_vec = attributes.attributes[attr] for a in attr_vec.access: av = copy.copy(a) if av.src_type == attr_vec.name: av.src_type = typeattribute.type if av.tgt_type == attr_vec.name: av.tgt_type = typeattribute.type self.add_av(av) # Extract parameters from roles for role in interface.roles(): if role_extract_params(role, self.params): pass #print "found conflicting role param %s for interface %s" % \ # (role.name, interface.name) # Extract parameters from type rules for rule in interface.typerules(): if type_rule_extract_params(rule, self.params): pass #print "found conflicting params in rule %s in interface %s" % \ # (str(rule), interface.name) for ifcall in interface.interface_calls(): if ifcall_extract_params(ifcall, self.params): pass #print "found conflicting params in ifcall %s in interface %s" % \ # (str(ifcall), interface.name) def add_av(self, av): if av_extract_params(av, self.params) == 1: pass #print "found conflicting perms [%s]" % str(av) self.access.add_av(av) def to_string(self): s = [] s.append("[InterfaceVector %s]" % self.name) for av in self.access: s.append(str(av)) return "\n".join(s) def __str__(self): return self.__repr__() def __repr__(self): return "" % (self.name, self.enabled) class InterfaceSet: def __init__(self, output=None): self.interfaces = { } self.tgt_type_map = { } self.tgt_type_all = [] self.output = output def o(self, str): if self.output: self.output.write(str + "\n") def to_file(self, fd): for iv in sorted(self.interfaces.values(), key=lambda x: x.name): fd.write("[InterfaceVector %s " % iv.name) for param in sorted(iv.params.values(), key=lambda x: x.name): fd.write("%s:%s " % (param.name, refpolicy.field_to_str[param.type])) fd.write("]\n") avl = sorted(iv.access.to_list()) for av in avl: fd.write(",".join(av)) fd.write("\n") def from_file(self, fd): def parse_ifv(line): fields = line[1:-1].split() if len(fields) < 2 or fields[0] != "InterfaceVector": raise SyntaxError("Syntax error InterfaceVector statement %s" % line) ifv = InterfaceVector() ifv.name = fields[1] if len(fields) == 2: return for field in fields[2:]: p = field.split(":") if len(p) != 2: raise SyntaxError("Invalid param in InterfaceVector statement %s" % line) param = Param() param.name = p[0] param.type = refpolicy.str_to_field[p[1]] ifv.params[param.name] = param return ifv ifv = None for line in fd: line = line[:-1] if line[0] == "[": if ifv: self.add_ifv(ifv) ifv = parse_ifv(line) elif ifv: l = line.split(",") av = access.AccessVector(l) ifv.add_av(av) if ifv: self.add_ifv(ifv) self.index() def add_ifv(self, ifv): self.interfaces[ifv.name] = ifv def index(self): for ifv in self.interfaces.values(): tgt_types = set() for av in ifv.access: if access.is_idparam(av.tgt_type): self.tgt_type_all.append(ifv) tgt_types = set() break tgt_types.add(av.tgt_type) for type in tgt_types: l = self.tgt_type_map.setdefault(type, []) l.append(ifv) def add(self, interface, attributes={}): ifv = InterfaceVector(interface, attributes) self.add_ifv(ifv) def add_headers(self, headers, output=None, attributes={}): for i in itertools.chain(headers.interfaces(), headers.templates()): self.add(i, attributes) self.expand_ifcalls(headers) self.index() def map_param(self, id, ifcall): if access.is_idparam(id): num = int(id[1:]) if num > len(ifcall.args): # Tell caller to drop this because it must have # been generated from an optional param. return None else: arg = ifcall.args[num - 1] if isinstance(arg, list): return arg else: return [arg] else: return [id] def map_add_av(self, ifv, av, ifcall): src_types = self.map_param(av.src_type, ifcall) if src_types is None: return tgt_types = self.map_param(av.tgt_type, ifcall) if tgt_types is None: return obj_classes = self.map_param(av.obj_class, ifcall) if obj_classes is None: return new_perms = refpolicy.IdSet() for perm in av.perms: p = self.map_param(perm, ifcall) if p is None: continue else: new_perms.update(p) if len(new_perms) == 0: return for src_type in src_types: for tgt_type in tgt_types: for obj_class in obj_classes: ifv.access.add(src_type, tgt_type, obj_class, new_perms) def do_expand_ifcalls(self, interface, if_by_name): # Descend an interface call tree adding the access # from each interface. This is a depth first walk # of the tree. stack = [(interface, None)] ifv = self.interfaces[interface.name] ifv.expanded = True while len(stack) > 0: cur, cur_ifcall = stack.pop(-1) cur_ifv = self.interfaces[cur.name] if cur != interface: for av in cur_ifv.access: self.map_add_av(ifv, av, cur_ifcall) # If we have already fully expanded this interface # there is no reason to descend further. if cur_ifv.expanded: continue for ifcall in cur.interface_calls(): if ifcall.ifname == interface.name: self.o(_("Found circular interface class")) return try: newif = if_by_name[ifcall.ifname] except KeyError: self.o(_("Missing interface definition for %s" % ifcall.ifname)) continue stack.append((newif, ifcall)) def expand_ifcalls(self, headers): # Create a map of interface names to interfaces - # this mirrors the interface vector map we already # have. if_by_name = { } for i in itertools.chain(headers.interfaces(), headers.templates()): if_by_name[i.name] = i for interface in itertools.chain(headers.interfaces(), headers.templates()): self.do_expand_ifcalls(interface, if_by_name) selinux-python-3.0/sepolgen/src/sepolgen/lex.py000066400000000000000000001236311356774067000217700ustar00rootroot00000000000000# ----------------------------------------------------------------------------- # ply: lex.py # # Copyright (C) 2001-2018 # David M. Beazley (Dabeaz LLC) # All rights reserved. # # Redistribution and use in source and binary forms, with or without # modification, are permitted provided that the following conditions are # met: # # * Redistributions of source code must retain the above copyright notice, # this list of conditions and the following disclaimer. # * Redistributions in binary form must reproduce the above copyright notice, # this list of conditions and the following disclaimer in the documentation # and/or other materials provided with the distribution. # * Neither the name of the David Beazley or Dabeaz LLC may be used to # endorse or promote products derived from this software without # specific prior written permission. # # THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS # "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT # LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR # A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT # OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, # SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT # LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, # DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY # THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT # (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE # OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. # ----------------------------------------------------------------------------- __version__ = '3.11' __tabversion__ = '3.10' import re import sys import types import copy import os import inspect # This tuple contains known string types try: # Python 2.6 StringTypes = (types.StringType, types.UnicodeType) except AttributeError: # Python 3.0 StringTypes = (str, bytes) # This regular expression is used to match valid token names _is_identifier = re.compile(r'^[a-zA-Z0-9_]+$') # Exception thrown when invalid token encountered and no default error # handler is defined. class LexError(Exception): def __init__(self, message, s): self.args = (message,) self.text = s # Token class. This class is used to represent the tokens produced. class LexToken(object): def __str__(self): return 'LexToken(%s,%r,%d,%d)' % (self.type, self.value, self.lineno, self.lexpos) def __repr__(self): return str(self) # This object is a stand-in for a logging object created by the # logging module. class PlyLogger(object): def __init__(self, f): self.f = f def critical(self, msg, *args, **kwargs): self.f.write((msg % args) + '\n') def warning(self, msg, *args, **kwargs): self.f.write('WARNING: ' + (msg % args) + '\n') def error(self, msg, *args, **kwargs): self.f.write('ERROR: ' + (msg % args) + '\n') info = critical debug = critical # Null logger is used when no output is generated. Does nothing. class NullLogger(object): def __getattribute__(self, name): return self def __call__(self, *args, **kwargs): return self # ----------------------------------------------------------------------------- # === Lexing Engine === # # The following Lexer class implements the lexer runtime. There are only # a few public methods and attributes: # # input() - Store a new string in the lexer # token() - Get the next token # clone() - Clone the lexer # # lineno - Current line number # lexpos - Current position in the input string # ----------------------------------------------------------------------------- class Lexer: def __init__(self): self.lexre = None # Master regular expression. This is a list of # tuples (re, findex) where re is a compiled # regular expression and findex is a list # mapping regex group numbers to rules self.lexretext = None # Current regular expression strings self.lexstatere = {} # Dictionary mapping lexer states to master regexs self.lexstateretext = {} # Dictionary mapping lexer states to regex strings self.lexstaterenames = {} # Dictionary mapping lexer states to symbol names self.lexstate = 'INITIAL' # Current lexer state self.lexstatestack = [] # Stack of lexer states self.lexstateinfo = None # State information self.lexstateignore = {} # Dictionary of ignored characters for each state self.lexstateerrorf = {} # Dictionary of error functions for each state self.lexstateeoff = {} # Dictionary of eof functions for each state self.lexreflags = 0 # Optional re compile flags self.lexdata = None # Actual input data (as a string) self.lexpos = 0 # Current position in input text self.lexlen = 0 # Length of the input text self.lexerrorf = None # Error rule (if any) self.lexeoff = None # EOF rule (if any) self.lextokens = None # List of valid tokens self.lexignore = '' # Ignored characters self.lexliterals = '' # Literal characters that can be passed through self.lexmodule = None # Module self.lineno = 1 # Current line number self.lexoptimize = False # Optimized mode def clone(self, object=None): c = copy.copy(self) # If the object parameter has been supplied, it means we are attaching the # lexer to a new object. In this case, we have to rebind all methods in # the lexstatere and lexstateerrorf tables. if object: newtab = {} for key, ritem in self.lexstatere.items(): newre = [] for cre, findex in ritem: newfindex = [] for f in findex: if not f or not f[0]: newfindex.append(f) continue newfindex.append((getattr(object, f[0].__name__), f[1])) newre.append((cre, newfindex)) newtab[key] = newre c.lexstatere = newtab c.lexstateerrorf = {} for key, ef in self.lexstateerrorf.items(): c.lexstateerrorf[key] = getattr(object, ef.__name__) c.lexmodule = object return c # ------------------------------------------------------------ # writetab() - Write lexer information to a table file # ------------------------------------------------------------ def writetab(self, lextab, outputdir=''): if isinstance(lextab, types.ModuleType): raise IOError("Won't overwrite existing lextab module") basetabmodule = lextab.split('.')[-1] filename = os.path.join(outputdir, basetabmodule) + '.py' with open(filename, 'w') as tf: tf.write('# %s.py. This file automatically created by PLY (version %s). Don\'t edit!\n' % (basetabmodule, __version__)) tf.write('_tabversion = %s\n' % repr(__tabversion__)) tf.write('_lextokens = set(%s)\n' % repr(tuple(sorted(self.lextokens)))) tf.write('_lexreflags = %s\n' % repr(int(self.lexreflags))) tf.write('_lexliterals = %s\n' % repr(self.lexliterals)) tf.write('_lexstateinfo = %s\n' % repr(self.lexstateinfo)) # Rewrite the lexstatere table, replacing function objects with function names tabre = {} for statename, lre in self.lexstatere.items(): titem = [] for (pat, func), retext, renames in zip(lre, self.lexstateretext[statename], self.lexstaterenames[statename]): titem.append((retext, _funcs_to_names(func, renames))) tabre[statename] = titem tf.write('_lexstatere = %s\n' % repr(tabre)) tf.write('_lexstateignore = %s\n' % repr(self.lexstateignore)) taberr = {} for statename, ef in self.lexstateerrorf.items(): taberr[statename] = ef.__name__ if ef else None tf.write('_lexstateerrorf = %s\n' % repr(taberr)) tabeof = {} for statename, ef in self.lexstateeoff.items(): tabeof[statename] = ef.__name__ if ef else None tf.write('_lexstateeoff = %s\n' % repr(tabeof)) # ------------------------------------------------------------ # readtab() - Read lexer information from a tab file # ------------------------------------------------------------ def readtab(self, tabfile, fdict): if isinstance(tabfile, types.ModuleType): lextab = tabfile else: exec('import %s' % tabfile) lextab = sys.modules[tabfile] if getattr(lextab, '_tabversion', '0.0') != __tabversion__: raise ImportError('Inconsistent PLY version') self.lextokens = lextab._lextokens self.lexreflags = lextab._lexreflags self.lexliterals = lextab._lexliterals self.lextokens_all = self.lextokens | set(self.lexliterals) self.lexstateinfo = lextab._lexstateinfo self.lexstateignore = lextab._lexstateignore self.lexstatere = {} self.lexstateretext = {} for statename, lre in lextab._lexstatere.items(): titem = [] txtitem = [] for pat, func_name in lre: titem.append((re.compile(pat, lextab._lexreflags), _names_to_funcs(func_name, fdict))) self.lexstatere[statename] = titem self.lexstateretext[statename] = txtitem self.lexstateerrorf = {} for statename, ef in lextab._lexstateerrorf.items(): self.lexstateerrorf[statename] = fdict[ef] self.lexstateeoff = {} for statename, ef in lextab._lexstateeoff.items(): self.lexstateeoff[statename] = fdict[ef] self.begin('INITIAL') # ------------------------------------------------------------ # input() - Push a new string into the lexer # ------------------------------------------------------------ def input(self, s): # Pull off the first character to see if s looks like a string c = s[:1] if not isinstance(c, StringTypes): raise ValueError('Expected a string') self.lexdata = s self.lexpos = 0 self.lexlen = len(s) # ------------------------------------------------------------ # begin() - Changes the lexing state # ------------------------------------------------------------ def begin(self, state): if state not in self.lexstatere: raise ValueError('Undefined state') self.lexre = self.lexstatere[state] self.lexretext = self.lexstateretext[state] self.lexignore = self.lexstateignore.get(state, '') self.lexerrorf = self.lexstateerrorf.get(state, None) self.lexeoff = self.lexstateeoff.get(state, None) self.lexstate = state # ------------------------------------------------------------ # push_state() - Changes the lexing state and saves old on stack # ------------------------------------------------------------ def push_state(self, state): self.lexstatestack.append(self.lexstate) self.begin(state) # ------------------------------------------------------------ # pop_state() - Restores the previous state # ------------------------------------------------------------ def pop_state(self): self.begin(self.lexstatestack.pop()) # ------------------------------------------------------------ # current_state() - Returns the current lexing state # ------------------------------------------------------------ def current_state(self): return self.lexstate # ------------------------------------------------------------ # skip() - Skip ahead n characters # ------------------------------------------------------------ def skip(self, n): self.lexpos += n # ------------------------------------------------------------ # opttoken() - Return the next token from the Lexer # # Note: This function has been carefully implemented to be as fast # as possible. Don't make changes unless you really know what # you are doing # ------------------------------------------------------------ def token(self): # Make local copies of frequently referenced attributes lexpos = self.lexpos lexlen = self.lexlen lexignore = self.lexignore lexdata = self.lexdata while lexpos < lexlen: # This code provides some short-circuit code for whitespace, tabs, and other ignored characters if lexdata[lexpos] in lexignore: lexpos += 1 continue # Look for a regular expression match for lexre, lexindexfunc in self.lexre: m = lexre.match(lexdata, lexpos) if not m: continue # Create a token for return tok = LexToken() tok.value = m.group() tok.lineno = self.lineno tok.lexpos = lexpos i = m.lastindex func, tok.type = lexindexfunc[i] if not func: # If no token type was set, it's an ignored token if tok.type: self.lexpos = m.end() return tok else: lexpos = m.end() break lexpos = m.end() # If token is processed by a function, call it tok.lexer = self # Set additional attributes useful in token rules self.lexmatch = m self.lexpos = lexpos newtok = func(tok) # Every function must return a token, if nothing, we just move to next token if not newtok: lexpos = self.lexpos # This is here in case user has updated lexpos. lexignore = self.lexignore # This is here in case there was a state change break # Verify type of the token. If not in the token map, raise an error if not self.lexoptimize: if newtok.type not in self.lextokens_all: raise LexError("%s:%d: Rule '%s' returned an unknown token type '%s'" % ( func.__code__.co_filename, func.__code__.co_firstlineno, func.__name__, newtok.type), lexdata[lexpos:]) return newtok else: # No match, see if in literals if lexdata[lexpos] in self.lexliterals: tok = LexToken() tok.value = lexdata[lexpos] tok.lineno = self.lineno tok.type = tok.value tok.lexpos = lexpos self.lexpos = lexpos + 1 return tok # No match. Call t_error() if defined. if self.lexerrorf: tok = LexToken() tok.value = self.lexdata[lexpos:] tok.lineno = self.lineno tok.type = 'error' tok.lexer = self tok.lexpos = lexpos self.lexpos = lexpos newtok = self.lexerrorf(tok) if lexpos == self.lexpos: # Error method didn't change text position at all. This is an error. raise LexError("Scanning error. Illegal character '%s'" % (lexdata[lexpos]), lexdata[lexpos:]) lexpos = self.lexpos if not newtok: continue return newtok self.lexpos = lexpos raise LexError("Illegal character '%s' at index %d" % (lexdata[lexpos], lexpos), lexdata[lexpos:]) if self.lexeoff: tok = LexToken() tok.type = 'eof' tok.value = '' tok.lineno = self.lineno tok.lexpos = lexpos tok.lexer = self self.lexpos = lexpos newtok = self.lexeoff(tok) return newtok self.lexpos = lexpos + 1 if self.lexdata is None: raise RuntimeError('No input string given with input()') return None # Iterator interface def __iter__(self): return self def next(self): t = self.token() if t is None: raise StopIteration return t __next__ = next # ----------------------------------------------------------------------------- # ==== Lex Builder === # # The functions and classes below are used to collect lexing information # and build a Lexer object from it. # ----------------------------------------------------------------------------- # ----------------------------------------------------------------------------- # _get_regex(func) # # Returns the regular expression assigned to a function either as a doc string # or as a .regex attribute attached by the @TOKEN decorator. # ----------------------------------------------------------------------------- def _get_regex(func): return getattr(func, 'regex', func.__doc__) # ----------------------------------------------------------------------------- # get_caller_module_dict() # # This function returns a dictionary containing all of the symbols defined within # a caller further down the call stack. This is used to get the environment # associated with the yacc() call if none was provided. # ----------------------------------------------------------------------------- def get_caller_module_dict(levels): f = sys._getframe(levels) ldict = f.f_globals.copy() if f.f_globals != f.f_locals: ldict.update(f.f_locals) return ldict # ----------------------------------------------------------------------------- # _funcs_to_names() # # Given a list of regular expression functions, this converts it to a list # suitable for output to a table file # ----------------------------------------------------------------------------- def _funcs_to_names(funclist, namelist): result = [] for f, name in zip(funclist, namelist): if f and f[0]: result.append((name, f[1])) else: result.append(f) return result # ----------------------------------------------------------------------------- # _names_to_funcs() # # Given a list of regular expression function names, this converts it back to # functions. # ----------------------------------------------------------------------------- def _names_to_funcs(namelist, fdict): result = [] for n in namelist: if n and n[0]: result.append((fdict[n[0]], n[1])) else: result.append(n) return result # ----------------------------------------------------------------------------- # _form_master_re() # # This function takes a list of all of the regex components and attempts to # form the master regular expression. Given limitations in the Python re # module, it may be necessary to break the master regex into separate expressions. # ----------------------------------------------------------------------------- def _form_master_re(relist, reflags, ldict, toknames): if not relist: return [] regex = '|'.join(relist) try: lexre = re.compile(regex, reflags) # Build the index to function map for the matching engine lexindexfunc = [None] * (max(lexre.groupindex.values()) + 1) lexindexnames = lexindexfunc[:] for f, i in lexre.groupindex.items(): handle = ldict.get(f, None) if type(handle) in (types.FunctionType, types.MethodType): lexindexfunc[i] = (handle, toknames[f]) lexindexnames[i] = f elif handle is not None: lexindexnames[i] = f if f.find('ignore_') > 0: lexindexfunc[i] = (None, None) else: lexindexfunc[i] = (None, toknames[f]) return [(lexre, lexindexfunc)], [regex], [lexindexnames] except Exception: m = int(len(relist)/2) if m == 0: m = 1 llist, lre, lnames = _form_master_re(relist[:m], reflags, ldict, toknames) rlist, rre, rnames = _form_master_re(relist[m:], reflags, ldict, toknames) return (llist+rlist), (lre+rre), (lnames+rnames) # ----------------------------------------------------------------------------- # def _statetoken(s,names) # # Given a declaration name s of the form "t_" and a dictionary whose keys are # state names, this function returns a tuple (states,tokenname) where states # is a tuple of state names and tokenname is the name of the token. For example, # calling this with s = "t_foo_bar_SPAM" might return (('foo','bar'),'SPAM') # ----------------------------------------------------------------------------- def _statetoken(s, names): parts = s.split('_') for i, part in enumerate(parts[1:], 1): if part not in names and part != 'ANY': break if i > 1: states = tuple(parts[1:i]) else: states = ('INITIAL',) if 'ANY' in states: states = tuple(names) tokenname = '_'.join(parts[i:]) return (states, tokenname) # ----------------------------------------------------------------------------- # LexerReflect() # # This class represents information needed to build a lexer as extracted from a # user's input file. # ----------------------------------------------------------------------------- class LexerReflect(object): def __init__(self, ldict, log=None, reflags=0): self.ldict = ldict self.error_func = None self.tokens = [] self.reflags = reflags self.stateinfo = {'INITIAL': 'inclusive'} self.modules = set() self.error = False self.log = PlyLogger(sys.stderr) if log is None else log # Get all of the basic information def get_all(self): self.get_tokens() self.get_literals() self.get_states() self.get_rules() # Validate all of the information def validate_all(self): self.validate_tokens() self.validate_literals() self.validate_rules() return self.error # Get the tokens map def get_tokens(self): tokens = self.ldict.get('tokens', None) if not tokens: self.log.error('No token list is defined') self.error = True return if not isinstance(tokens, (list, tuple)): self.log.error('tokens must be a list or tuple') self.error = True return if not tokens: self.log.error('tokens is empty') self.error = True return self.tokens = tokens # Validate the tokens def validate_tokens(self): terminals = {} for n in self.tokens: if not _is_identifier.match(n): self.log.error("Bad token name '%s'", n) self.error = True if n in terminals: self.log.warning("Token '%s' multiply defined", n) terminals[n] = 1 # Get the literals specifier def get_literals(self): self.literals = self.ldict.get('literals', '') if not self.literals: self.literals = '' # Validate literals def validate_literals(self): try: for c in self.literals: if not isinstance(c, StringTypes) or len(c) > 1: self.log.error('Invalid literal %s. Must be a single character', repr(c)) self.error = True except TypeError: self.log.error('Invalid literals specification. literals must be a sequence of characters') self.error = True def get_states(self): self.states = self.ldict.get('states', None) # Build statemap if self.states: if not isinstance(self.states, (tuple, list)): self.log.error('states must be defined as a tuple or list') self.error = True else: for s in self.states: if not isinstance(s, tuple) or len(s) != 2: self.log.error("Invalid state specifier %s. Must be a tuple (statename,'exclusive|inclusive')", repr(s)) self.error = True continue name, statetype = s if not isinstance(name, StringTypes): self.log.error('State name %s must be a string', repr(name)) self.error = True continue if not (statetype == 'inclusive' or statetype == 'exclusive'): self.log.error("State type for state %s must be 'inclusive' or 'exclusive'", name) self.error = True continue if name in self.stateinfo: self.log.error("State '%s' already defined", name) self.error = True continue self.stateinfo[name] = statetype # Get all of the symbols with a t_ prefix and sort them into various # categories (functions, strings, error functions, and ignore characters) def get_rules(self): tsymbols = [f for f in self.ldict if f[:2] == 't_'] # Now build up a list of functions and a list of strings self.toknames = {} # Mapping of symbols to token names self.funcsym = {} # Symbols defined as functions self.strsym = {} # Symbols defined as strings self.ignore = {} # Ignore strings by state self.errorf = {} # Error functions by state self.eoff = {} # EOF functions by state for s in self.stateinfo: self.funcsym[s] = [] self.strsym[s] = [] if len(tsymbols) == 0: self.log.error('No rules of the form t_rulename are defined') self.error = True return for f in tsymbols: t = self.ldict[f] states, tokname = _statetoken(f, self.stateinfo) self.toknames[f] = tokname if hasattr(t, '__call__'): if tokname == 'error': for s in states: self.errorf[s] = t elif tokname == 'eof': for s in states: self.eoff[s] = t elif tokname == 'ignore': line = t.__code__.co_firstlineno file = t.__code__.co_filename self.log.error("%s:%d: Rule '%s' must be defined as a string", file, line, t.__name__) self.error = True else: for s in states: self.funcsym[s].append((f, t)) elif isinstance(t, StringTypes): if tokname == 'ignore': for s in states: self.ignore[s] = t if '\\' in t: self.log.warning("%s contains a literal backslash '\\'", f) elif tokname == 'error': self.log.error("Rule '%s' must be defined as a function", f) self.error = True else: for s in states: self.strsym[s].append((f, t)) else: self.log.error('%s not defined as a function or string', f) self.error = True # Sort the functions by line number for f in self.funcsym.values(): f.sort(key=lambda x: x[1].__code__.co_firstlineno) # Sort the strings by regular expression length for s in self.strsym.values(): s.sort(key=lambda x: len(x[1]), reverse=True) # Validate all of the t_rules collected def validate_rules(self): for state in self.stateinfo: # Validate all rules defined by functions for fname, f in self.funcsym[state]: line = f.__code__.co_firstlineno file = f.__code__.co_filename module = inspect.getmodule(f) self.modules.add(module) tokname = self.toknames[fname] if isinstance(f, types.MethodType): reqargs = 2 else: reqargs = 1 nargs = f.__code__.co_argcount if nargs > reqargs: self.log.error("%s:%d: Rule '%s' has too many arguments", file, line, f.__name__) self.error = True continue if nargs < reqargs: self.log.error("%s:%d: Rule '%s' requires an argument", file, line, f.__name__) self.error = True continue if not _get_regex(f): self.log.error("%s:%d: No regular expression defined for rule '%s'", file, line, f.__name__) self.error = True continue try: c = re.compile('(?P<%s>%s)' % (fname, _get_regex(f)), self.reflags) if c.match(''): self.log.error("%s:%d: Regular expression for rule '%s' matches empty string", file, line, f.__name__) self.error = True except re.error as e: self.log.error("%s:%d: Invalid regular expression for rule '%s'. %s", file, line, f.__name__, e) if '#' in _get_regex(f): self.log.error("%s:%d. Make sure '#' in rule '%s' is escaped with '\\#'", file, line, f.__name__) self.error = True # Validate all rules defined by strings for name, r in self.strsym[state]: tokname = self.toknames[name] if tokname == 'error': self.log.error("Rule '%s' must be defined as a function", name) self.error = True continue if tokname not in self.tokens and tokname.find('ignore_') < 0: self.log.error("Rule '%s' defined for an unspecified token %s", name, tokname) self.error = True continue try: c = re.compile('(?P<%s>%s)' % (name, r), self.reflags) if (c.match('')): self.log.error("Regular expression for rule '%s' matches empty string", name) self.error = True except re.error as e: self.log.error("Invalid regular expression for rule '%s'. %s", name, e) if '#' in r: self.log.error("Make sure '#' in rule '%s' is escaped with '\\#'", name) self.error = True if not self.funcsym[state] and not self.strsym[state]: self.log.error("No rules defined for state '%s'", state) self.error = True # Validate the error function efunc = self.errorf.get(state, None) if efunc: f = efunc line = f.__code__.co_firstlineno file = f.__code__.co_filename module = inspect.getmodule(f) self.modules.add(module) if isinstance(f, types.MethodType): reqargs = 2 else: reqargs = 1 nargs = f.__code__.co_argcount if nargs > reqargs: self.log.error("%s:%d: Rule '%s' has too many arguments", file, line, f.__name__) self.error = True if nargs < reqargs: self.log.error("%s:%d: Rule '%s' requires an argument", file, line, f.__name__) self.error = True for module in self.modules: self.validate_module(module) # ----------------------------------------------------------------------------- # validate_module() # # This checks to see if there are duplicated t_rulename() functions or strings # in the parser input file. This is done using a simple regular expression # match on each line in the source code of the given module. # ----------------------------------------------------------------------------- def validate_module(self, module): try: lines, linen = inspect.getsourcelines(module) except IOError: return fre = re.compile(r'\s*def\s+(t_[a-zA-Z_0-9]*)\(') sre = re.compile(r'\s*(t_[a-zA-Z_0-9]*)\s*=') counthash = {} linen += 1 for line in lines: m = fre.match(line) if not m: m = sre.match(line) if m: name = m.group(1) prev = counthash.get(name) if not prev: counthash[name] = linen else: filename = inspect.getsourcefile(module) self.log.error('%s:%d: Rule %s redefined. Previously defined on line %d', filename, linen, name, prev) self.error = True linen += 1 # ----------------------------------------------------------------------------- # lex(module) # # Build all of the regular expression rules from definitions in the supplied module # ----------------------------------------------------------------------------- def lex(module=None, object=None, debug=False, optimize=False, lextab='lextab', reflags=int(re.VERBOSE), nowarn=False, outputdir=None, debuglog=None, errorlog=None): if lextab is None: lextab = 'lextab' global lexer ldict = None stateinfo = {'INITIAL': 'inclusive'} lexobj = Lexer() lexobj.lexoptimize = optimize global token, input if errorlog is None: errorlog = PlyLogger(sys.stderr) if debug: if debuglog is None: debuglog = PlyLogger(sys.stderr) # Get the module dictionary used for the lexer if object: module = object # Get the module dictionary used for the parser if module: _items = [(k, getattr(module, k)) for k in dir(module)] ldict = dict(_items) # If no __file__ attribute is available, try to obtain it from the __module__ instead if '__file__' not in ldict: ldict['__file__'] = sys.modules[ldict['__module__']].__file__ else: ldict = get_caller_module_dict(2) # Determine if the module is package of a package or not. # If so, fix the tabmodule setting so that tables load correctly pkg = ldict.get('__package__') if pkg and isinstance(lextab, str): if '.' not in lextab: lextab = pkg + '.' + lextab # Collect parser information from the dictionary linfo = LexerReflect(ldict, log=errorlog, reflags=reflags) linfo.get_all() if not optimize: if linfo.validate_all(): raise SyntaxError("Can't build lexer") if optimize and lextab: try: lexobj.readtab(lextab, ldict) token = lexobj.token input = lexobj.input lexer = lexobj return lexobj except ImportError: pass # Dump some basic debugging information if debug: debuglog.info('lex: tokens = %r', linfo.tokens) debuglog.info('lex: literals = %r', linfo.literals) debuglog.info('lex: states = %r', linfo.stateinfo) # Build a dictionary of valid token names lexobj.lextokens = set() for n in linfo.tokens: lexobj.lextokens.add(n) # Get literals specification if isinstance(linfo.literals, (list, tuple)): lexobj.lexliterals = type(linfo.literals[0])().join(linfo.literals) else: lexobj.lexliterals = linfo.literals lexobj.lextokens_all = lexobj.lextokens | set(lexobj.lexliterals) # Get the stateinfo dictionary stateinfo = linfo.stateinfo regexs = {} # Build the master regular expressions for state in stateinfo: regex_list = [] # Add rules defined by functions first for fname, f in linfo.funcsym[state]: regex_list.append('(?P<%s>%s)' % (fname, _get_regex(f))) if debug: debuglog.info("lex: Adding rule %s -> '%s' (state '%s')", fname, _get_regex(f), state) # Now add all of the simple rules for name, r in linfo.strsym[state]: regex_list.append('(?P<%s>%s)' % (name, r)) if debug: debuglog.info("lex: Adding rule %s -> '%s' (state '%s')", name, r, state) regexs[state] = regex_list # Build the master regular expressions if debug: debuglog.info('lex: ==== MASTER REGEXS FOLLOW ====') for state in regexs: lexre, re_text, re_names = _form_master_re(regexs[state], reflags, ldict, linfo.toknames) lexobj.lexstatere[state] = lexre lexobj.lexstateretext[state] = re_text lexobj.lexstaterenames[state] = re_names if debug: for i, text in enumerate(re_text): debuglog.info("lex: state '%s' : regex[%d] = '%s'", state, i, text) # For inclusive states, we need to add the regular expressions from the INITIAL state for state, stype in stateinfo.items(): if state != 'INITIAL' and stype == 'inclusive': lexobj.lexstatere[state].extend(lexobj.lexstatere['INITIAL']) lexobj.lexstateretext[state].extend(lexobj.lexstateretext['INITIAL']) lexobj.lexstaterenames[state].extend(lexobj.lexstaterenames['INITIAL']) lexobj.lexstateinfo = stateinfo lexobj.lexre = lexobj.lexstatere['INITIAL'] lexobj.lexretext = lexobj.lexstateretext['INITIAL'] lexobj.lexreflags = reflags # Set up ignore variables lexobj.lexstateignore = linfo.ignore lexobj.lexignore = lexobj.lexstateignore.get('INITIAL', '') # Set up error functions lexobj.lexstateerrorf = linfo.errorf lexobj.lexerrorf = linfo.errorf.get('INITIAL', None) if not lexobj.lexerrorf: errorlog.warning('No t_error rule is defined') # Set up eof functions lexobj.lexstateeoff = linfo.eoff lexobj.lexeoff = linfo.eoff.get('INITIAL', None) # Check state information for ignore and error rules for s, stype in stateinfo.items(): if stype == 'exclusive': if s not in linfo.errorf: errorlog.warning("No error rule is defined for exclusive state '%s'", s) if s not in linfo.ignore and lexobj.lexignore: errorlog.warning("No ignore rule is defined for exclusive state '%s'", s) elif stype == 'inclusive': if s not in linfo.errorf: linfo.errorf[s] = linfo.errorf.get('INITIAL', None) if s not in linfo.ignore: linfo.ignore[s] = linfo.ignore.get('INITIAL', '') # Create global versions of the token() and input() functions token = lexobj.token input = lexobj.input lexer = lexobj # If in optimize mode, we write the lextab if lextab and optimize: if outputdir is None: # If no output directory is set, the location of the output files # is determined according to the following rules: # - If lextab specifies a package, files go into that package directory # - Otherwise, files go in the same directory as the specifying module if isinstance(lextab, types.ModuleType): srcfile = lextab.__file__ else: if '.' not in lextab: srcfile = ldict['__file__'] else: parts = lextab.split('.') pkgname = '.'.join(parts[:-1]) exec('import %s' % pkgname) srcfile = getattr(sys.modules[pkgname], '__file__', '') outputdir = os.path.dirname(srcfile) try: lexobj.writetab(lextab, outputdir) if lextab in sys.modules: del sys.modules[lextab] except IOError as e: errorlog.warning("Couldn't write lextab module %r. %s" % (lextab, e)) return lexobj # ----------------------------------------------------------------------------- # runmain() # # This runs the lexer as a main program # ----------------------------------------------------------------------------- def runmain(lexer=None, data=None): if not data: try: filename = sys.argv[1] f = open(filename) data = f.read() f.close() except IndexError: sys.stdout.write('Reading from standard input (type EOF to end):\n') data = sys.stdin.read() if lexer: _input = lexer.input else: _input = input _input(data) if lexer: _token = lexer.token else: _token = token while True: tok = _token() if not tok: break sys.stdout.write('(%s,%r,%d,%d)\n' % (tok.type, tok.value, tok.lineno, tok.lexpos)) # ----------------------------------------------------------------------------- # @TOKEN(regex) # # This decorator function can be used to set the regex expression on a function # when its docstring might need to be set in an alternative way # ----------------------------------------------------------------------------- def TOKEN(r): def set_regex(f): if hasattr(r, '__call__'): f.regex = _get_regex(r) else: f.regex = r return f return set_regex # Alternative spelling of the TOKEN decorator Token = TOKEN selinux-python-3.0/sepolgen/src/sepolgen/matching.py000066400000000000000000000207211356774067000227660ustar00rootroot00000000000000# Authors: Karl MacMillan # # Copyright (C) 2006 Red Hat # see file 'COPYING' for use and warranty information # # This program is free software; you can redistribute it and/or # modify it under the terms of the GNU General Public License as # published by the Free Software Foundation; version 2 only # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program; if not, write to the Free Software # Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA # """ Classes and algorithms for matching requested access to access vectors. """ import itertools from . import access from . import objectmodel from . import util class Match(util.Comparison): def __init__(self, interface=None, dist=0): self.interface = interface self.dist = dist self.info_dir_change = False # when implementing __eq__ also __hash__ is needed on py2 # if object is muttable __hash__ should be None self.__hash__ = None def _compare(self, other, method): try: a = (self.dist, self.info_dir_change) b = (other.dist, other.info_dir_change) return method(a, b) except (AttributeError, TypeError): # trying to compare to foreign type return NotImplemented class MatchList: DEFAULT_THRESHOLD = 150 def __init__(self): # Match objects that pass the threshold self.children = [] # Match objects over the threshold self.bastards = [] self.threshold = self.DEFAULT_THRESHOLD self.allow_info_dir_change = False self.av = None def best(self): if len(self.children): return self.children[0] if len(self.bastards): return self.bastards[0] return None def __len__(self): # Only return the length of the matches so # that this can be used to test if there is # a match. return len(self.children) + len(self.bastards) def __iter__(self): return iter(self.children) def all(self): return itertools.chain(self.children, self.bastards) def append(self, match): if match.dist <= self.threshold: if not match.info_dir_change or self.allow_info_dir_change: self.children.append(match) else: self.bastards.append(match) else: self.bastards.append(match) def sort(self): self.children.sort() self.bastards.sort() class AccessMatcher: def __init__(self, perm_maps=None): self.type_penalty = 10 self.obj_penalty = 10 if perm_maps: self.perm_maps = perm_maps else: self.perm_maps = objectmodel.PermMappings() # We want a change in the information flow direction # to be a strong penalty - stronger than access to # a few unrelated types. self.info_dir_penalty = 100 def type_distance(self, a, b): if a == b or access.is_idparam(b): return 0 else: return -self.type_penalty def perm_distance(self, av_req, av_prov): # First check that we have enough perms diff = av_req.perms.difference(av_prov.perms) if len(diff) != 0: total = self.perm_maps.getdefault_distance(av_req.obj_class, diff) return -total else: diff = av_prov.perms.difference(av_req.perms) return self.perm_maps.getdefault_distance(av_req.obj_class, diff) def av_distance(self, req, prov): """Determine the 'distance' between 2 access vectors. This function is used to find an access vector that matches a 'required' access. To do this we comput a signed numeric value that indicates how close the req access is to the 'provided' access vector. The closer the value is to 0 the closer the match, with 0 being an exact match. A value over 0 indicates that the prov access vector provides more access than the req (in practice, this means that the source type, target type, and object class is the same and the perms in prov is a superset of those in req. A value under 0 indicates that the prov access less - or unrelated - access to the req access. A different type or object class will result in a very low value. The values other than 0 should only be interpreted relative to one another - they have no exact meaning and are likely to change. Params: req - [AccessVector] The access that is required. This is the access being matched. prov - [AccessVector] The access provided. This is the potential match that is being evaluated for req. Returns: 0 : Exact match between the access vectors. < 0 : The prov av does not provide all of the access in req. A smaller value indicates that the access is further. > 0 : The prov av provides more access than req. The larger the value the more access over req. """ # FUTURE - this is _very_ expensive and probably needs some # thorough performance work. This version is meant to give # meaningful results relatively simply. dist = 0 # Get the difference between the types. The addition is safe # here because type_distance only returns 0 or negative. dist += self.type_distance(req.src_type, prov.src_type) dist += self.type_distance(req.tgt_type, prov.tgt_type) # Object class distance if req.obj_class != prov.obj_class and not access.is_idparam(prov.obj_class): dist -= self.obj_penalty # Permission distance # If this av doesn't have a matching source type, target type, and object class # count all of the permissions against it. Otherwise determine the perm # distance and dir. if dist < 0: pdist = self.perm_maps.getdefault_distance(prov.obj_class, prov.perms) else: pdist = self.perm_distance(req, prov) # Combine the perm and other distance if dist < 0: if pdist < 0: return dist + pdist else: return dist - pdist elif dist >= 0: if pdist < 0: return pdist - dist else: return dist + pdist def av_set_match(self, av_set, av): """ """ dist = None # Get the distance for each access vector for x in av_set: tmp = self.av_distance(av, x) if dist is None: dist = tmp elif tmp >= 0: if dist >= 0: dist += tmp else: dist = tmp + -dist else: if dist < 0: dist += tmp else: dist -= tmp # Penalize for information flow - we want to prevent the # addition of a write if the requested is read none. We are # much less concerned about the reverse. av_dir = self.perm_maps.getdefault_direction(av.obj_class, av.perms) if av_set.info_dir is None: av_set.info_dir = objectmodel.FLOW_NONE for x in av_set: av_set.info_dir = av_set.info_dir | \ self.perm_maps.getdefault_direction(x.obj_class, x.perms) if (av_dir & objectmodel.FLOW_WRITE == 0) and (av_set.info_dir & objectmodel.FLOW_WRITE): if dist < 0: dist -= self.info_dir_penalty else: dist += self.info_dir_penalty return dist def search_ifs(self, ifset, av, match_list): match_list.av = av for iv in itertools.chain(ifset.tgt_type_all, ifset.tgt_type_map.get(av.tgt_type, [])): if not iv.enabled: #print "iv %s not enabled" % iv.name continue dist = self.av_set_match(iv.access, av) if dist >= 0: m = Match(iv, dist) match_list.append(m) match_list.sort() selinux-python-3.0/sepolgen/src/sepolgen/module.py000066400000000000000000000161661356774067000224710ustar00rootroot00000000000000# Authors: Karl MacMillan # # Copyright (C) 2006 Red Hat # see file 'COPYING' for use and warranty information # # This program is free software; you can redistribute it and/or # modify it under the terms of the GNU General Public License as # published by the Free Software Foundation; version 2 only # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program; if not, write to the Free Software # Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA # """ Utilities for dealing with the compilation of modules and creation of module tress. """ import re import tempfile try: from subprocess import getstatusoutput except ImportError: from commands import getstatusoutput import os import os.path import shutil import selinux from . import defaults def is_valid_name(modname): """Check that a module name is valid. """ m = re.findall(r"[^a-zA-Z0-9_\-\.]", modname) if len(m) == 0 and modname[0].isalpha(): return True else: return False class ModuleTree: def __init__(self, modname): self.modname = modname self.dirname = None def dir_name(self): return self.dirname def te_name(self): return self.dirname + "/" + self.modname + ".te" def fc_name(self): return self.dirname + "/" + self.modname + ".fc" def if_name(self): return self.dirname + "/" + self.modname + ".if" def package_name(self): return self.dirname + "/" + self.modname + ".pp" def makefile_name(self): return self.dirname + "/Makefile" def create(self, parent_dirname, makefile_include=None): self.dirname = parent_dirname + "/" + self.modname os.mkdir(self.dirname) fd = open(self.makefile_name(), "w") if makefile_include: fd.write("include " + makefile_include) else: fd.write("include " + defaults.refpolicy_makefile()) fd.close() # Create empty files for the standard refpolicy # module files open(self.te_name(), "w").close() open(self.fc_name(), "w").close() open(self.if_name(), "w").close() def modname_from_sourcename(sourcename): return os.path.splitext(os.path.split(sourcename)[1])[0] class ModuleCompiler: """ModuleCompiler eases running of the module compiler. The ModuleCompiler class encapsulates running the commandline module compiler (checkmodule) and module packager (semodule_package). You are likely interested in the create_module_package method. Several options are controlled via parameters (only effects the non-refpol builds): .mls [boolean] Generate an MLS module (by passed -M to checkmodule). True to generate an MLS module, false otherwise. .module [boolean] Generate a module instead of a base module. True to generate a module, false to generate a base. .checkmodule [string] Fully qualified path to the module compiler. Default is /usr/bin/checkmodule. .semodule_package [string] Fully qualified path to the module packager. Defaults to /usr/bin/semodule_package. .output [file object] File object used to write verbose output of the compililation and packaging process. """ def __init__(self, output=None): """Create a ModuleCompiler instance, optionally with an output file object for verbose output of the compilation process. """ self.mls = selinux.is_selinux_mls_enabled() self.module = True self.checkmodule = "/usr/bin/checkmodule" self.semodule_package = "/usr/bin/semodule_package" self.output = output self.last_output = "" self.refpol_makefile = defaults.refpolicy_makefile() self.make = "/usr/bin/make" def o(self, str): if self.output: self.output.write(str + "\n") self.last_output = str def run(self, command): self.o(command) rc, output = getstatusoutput(command) self.o(output) return rc def gen_filenames(self, sourcename): """Generate the module and policy package filenames from a source file name. The source file must be in the form of "foo.te". This will generate "foo.mod" and "foo.pp". Returns a tuple with (modname, policypackage). """ splitname = sourcename.split(".") if len(splitname) < 2: raise RuntimeError("invalid sourcefile name %s (must end in .te)", sourcename) # Handle other periods in the filename correctly basename = ".".join(splitname[0:-1]) modname = basename + ".mod" packagename = basename + ".pp" return (modname, packagename) def create_module_package(self, sourcename, refpolicy=True): """Create a module package saved in a packagename from a sourcename. The create_module_package creates a module package saved in a file named sourcename (.pp is the standard extension) from a source file (.te is the standard extension). The source file should contain SELinux policy statements appropriate for a base or non-base module (depending on the setting of .module). Only file names are accepted, not open file objects or descriptors because the command line SELinux tools are used. On error a RuntimeError will be raised with a descriptive error message. """ if refpolicy: self.refpol_build(sourcename) else: modname, packagename = self.gen_filenames(sourcename) self.compile(sourcename, modname) self.package(modname, packagename) os.unlink(modname) def refpol_build(self, sourcename): # Compile command = self.make + " -f " + self.refpol_makefile rc = self.run(command) # Raise an error if the process failed if rc != 0: raise RuntimeError("compilation failed:\n%s" % self.last_output) def compile(self, sourcename, modname): s = [self.checkmodule] if self.mls: s.append("-M") if self.module: s.append("-m") s.append("-o") s.append(modname) s.append(sourcename) rc = self.run(" ".join(s)) if rc != 0: raise RuntimeError("compilation failed:\n%s" % self.last_output) def package(self, modname, packagename): s = [self.semodule_package] s.append("-o") s.append(packagename) s.append("-m") s.append(modname) rc = self.run(" ".join(s)) if rc != 0: raise RuntimeError("packaging failed [%s]" % self.last_output) selinux-python-3.0/sepolgen/src/sepolgen/objectmodel.py000066400000000000000000000145671356774067000234760ustar00rootroot00000000000000# Authors: Karl MacMillan # # Copyright (C) 2006 Red Hat # see file 'COPYING' for use and warranty information # # This program is free software; you can redistribute it and/or # modify it under the terms of the GNU General Public License as # published by the Free Software Foundation; version 2 only # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program; if not, write to the Free Software # Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA # """ This module provides knowledge object classes and permissions. It should be used to keep this knowledge from leaking into the more generic parts of the policy generation. """ # Objects that can be implicitly typed - these objects do # not _have_ to be implicitly typed (e.g., sockets can be # explicitly labeled), but they often are. # # File is in this list for /proc/self # # This list is useful when dealing with rules that have a # type (or param) used as both a subject and object. For # example: # # allow httpd_t httpd_t : socket read; # # This rule makes sense because the socket was (presumably) created # by a process with the type httpd_t. implicitly_typed_objects = ["socket", "fd", "process", "file", "lnk_file", "fifo_file", "dbus", "capability", "unix_stream_socket"] #:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: # #Information Flow # # All of the permissions in SELinux can be described in terms of # information flow. For example, a read of a file is a flow of # information from that file to the process reading. Viewing # permissions in these terms can be used to model a variety of # security properties. # # Here we have some infrastructure for understanding permissions # in terms of information flow # #:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: # Information flow deals with information either flowing from a subject # to and object ("write") or to a subject from an object ("read"). Read # or write is described from the subject point-of-view. It is also possible # for a permission to represent both a read and write (though the flow is # typical asymettric in terms of bandwidth). It is also possible for # permission to not flow information (meaning that the result is pure # side-effect). # # The following constants are for representing the directionality # of information flow. FLOW_NONE = 0 FLOW_READ = 1 FLOW_WRITE = 2 FLOW_BOTH = FLOW_READ | FLOW_WRITE # These are used by the parser and for nice display of the directions str_to_dir = { "n" : FLOW_NONE, "r" : FLOW_READ, "w" : FLOW_WRITE, "b" : FLOW_BOTH } dir_to_str = { FLOW_NONE : "n", FLOW_READ : "r", FLOW_WRITE : "w", FLOW_BOTH : "b" } class PermMap: """A mapping between a permission and its information flow properties. PermMap represents the information flow properties of a single permission including the direction (read, write, etc.) and an abstract representation of the bandwidth of the flow (weight). """ def __init__(self, perm, dir, weight): self.perm = perm self.dir = dir self.weight = weight def __repr__(self): return "" % (self.perm, dir_to_str[self.dir], self.weight) class PermMappings: """The information flow properties of a set of object classes and permissions. PermMappings maps one or more classes and permissions to their PermMap objects describing their information flow charecteristics. """ def __init__(self): self.classes = { } self.default_weight = 5 self.default_dir = FLOW_BOTH def from_file(self, fd): """Read the permission mappings from a file. This reads the format used by Apol in the setools suite. """ # This parsing is deliberately picky and bails at the least error. It # is assumed that the permission map file will be shipped as part # of sepolgen and not user modified, so this is a reasonable design # choice. If user supplied permission mappings are needed the parser # should be made a little more robust and give better error messages. cur = None for line in fd: fields = line.split() if len(fields) == 0 or len(fields) == 1 or fields[0] == "#": continue if fields[0] == "class": c = fields[1] if c in self.classes: raise ValueError("duplicate class in perm map") self.classes[c] = { } cur = self.classes[c] else: if len(fields) != 3: raise ValueError("error in object class permissions") if cur is None: raise ValueError("permission outside of class") pm = PermMap(fields[0], str_to_dir[fields[1]], int(fields[2])) cur[pm.perm] = pm def get(self, obj, perm): """Get the permission map for the object permission. Returns: PermMap representing the permission Raises: KeyError if the object or permission is not defined """ return self.classes[obj][perm] def getdefault(self, obj, perm): """Get the permission map for the object permission or a default. getdefault is the same as get except that a default PermMap is returned if the object class or permission is not defined. The default is FLOW_BOTH with a weight of 5. """ try: pm = self.classes[obj][perm] except KeyError: return PermMap(perm, self.default_dir, self.default_weight) return pm def getdefault_direction(self, obj, perms): dir = FLOW_NONE for perm in perms: pm = self.getdefault(obj, perm) dir = dir | pm.dir return dir def getdefault_distance(self, obj, perms): total = 0 for perm in perms: pm = self.getdefault(obj, perm) total += pm.weight return total selinux-python-3.0/sepolgen/src/sepolgen/output.py000066400000000000000000000117741356774067000225440ustar00rootroot00000000000000# Authors: Karl MacMillan # # Copyright (C) 2006 Red Hat # see file 'COPYING' for use and warranty information # # This program is free software; you can redistribute it and/or # modify it under the terms of the GNU General Public License as # published by the Free Software Foundation; version 2 only # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program; if not, write to the Free Software # Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA # """ Classes and functions for the output of reference policy modules. This module takes a refpolicy.Module object and formats it for output using the ModuleWriter object. By separating the output in this way the other parts of Madison can focus solely on generating policy. This keeps the semantic / syntactic issues cleanly separated from the formatting issues. """ from . import refpolicy from . import util if util.PY3: from .util import cmp class ModuleWriter: def __init__(self): self.fd = None self.module = None self.sort = True self.requires = True def write(self, module, fd): self.module = module if self.sort: sort_filter(self.module) # FIXME - make this handle nesting for node, depth in refpolicy.walktree(self.module, showdepth=True): fd.write("%s\n" % str(node)) # Helper functions for sort_filter - this is all done old school # C style rather than with polymorphic methods because this sorting # is specific to output. It is not necessarily the comparison you # want generally. # Compare two IdSets - we could probably do something clever # with different here, but this works. def id_set_cmp(x, y): xl = util.set_to_list(x) xl.sort() yl = util.set_to_list(y) yl.sort() if len(xl) != len(yl): return cmp(xl[0], yl[0]) for v in zip(xl, yl): if v[0] != v[1]: return cmp(v[0], v[1]) return 0 # Compare two avrules def avrule_cmp(a, b): ret = id_set_cmp(a.src_types, b.src_types) if ret != 0: return ret ret = id_set_cmp(a.tgt_types, b.tgt_types) if ret != 0: return ret ret = id_set_cmp(a.obj_classes, b.obj_classes) if ret != 0: return ret # At this point, who cares - just return something return cmp(len(a.perms), len(b.perms)) # Compare two interface calls def ifcall_cmp(a, b): if a.args[0] != b.args[0]: return cmp(a.args[0], b.args[0]) return cmp(a.ifname, b.ifname) # Compare an two avrules or interface calls def rule_cmp(a, b): if isinstance(a, refpolicy.InterfaceCall): if isinstance(b, refpolicy.InterfaceCall): return ifcall_cmp(a, b) else: return id_set_cmp([a.args[0]], b.src_types) else: if isinstance(b, refpolicy.AVRule): return avrule_cmp(a,b) else: return id_set_cmp(a.src_types, [b.args[0]]) def role_type_cmp(a, b): return cmp(a.role, b.role) def sort_filter(module): """Sort and group the output for readability. """ def sort_node(node): c = [] # Module statement for mod in node.module_declarations(): c.append(mod) c.append(refpolicy.Comment()) # Requires for require in node.requires(): c.append(require) c.append(refpolicy.Comment()) # Rules # # We are going to group output by source type (which # we assume is the first argument for interfaces). rules = [] rules.extend(node.avrules()) rules.extend(node.interface_calls()) rules.sort(key=util.cmp_to_key(rule_cmp)) cur = None sep_rules = [] for rule in rules: if isinstance(rule, refpolicy.InterfaceCall): x = rule.args[0] else: x = util.first(rule.src_types) if cur != x: if cur: sep_rules.append(refpolicy.Comment()) cur = x comment = refpolicy.Comment() comment.lines.append("============= %s ==============" % cur) sep_rules.append(comment) sep_rules.append(rule) c.extend(sep_rules) ras = [] ras.extend(node.role_types()) ras.sort(key=util.cmp_to_key(role_type_cmp)) if len(ras): comment = refpolicy.Comment() comment.lines.append("============= ROLES ==============") c.append(comment) c.extend(ras) # Everything else for child in node.children: if child not in c: c.append(child) node.children = c for node in module.nodes(): sort_node(node) selinux-python-3.0/sepolgen/src/sepolgen/policygen.py000066400000000000000000000357711356774067000232000ustar00rootroot00000000000000# Authors: Karl MacMillan # # Copyright (C) 2006 Red Hat # see file 'COPYING' for use and warranty information # # This program is free software; you can redistribute it and/or # modify it under the terms of the GNU General Public License as # published by the Free Software Foundation; version 2 only # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program; if not, write to the Free Software # Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA # """ classes and algorithms for the generation of SELinux policy. """ import itertools import textwrap import selinux.audit2why as audit2why try: from setools import * except: pass from . import refpolicy from . import objectmodel from . import access from . import interfaces from . import matching from . import util # Constants for the level of explanation from the generation # routines NO_EXPLANATION = 0 SHORT_EXPLANATION = 1 LONG_EXPLANATION = 2 class PolicyGenerator: """Generate a reference policy module from access vectors. PolicyGenerator generates a new reference policy module or updates an existing module based on requested access in the form of access vectors. It generates allow rules and optionally module require statements, reference policy interfaces, and extended permission access vector rules. By default only allow rules are generated. The methods .set_gen_refpol, .set_gen_requires and .set_gen_xperms turns on interface generation, requires generation, and xperms rules generation respectively. PolicyGenerator can also optionally add comments explaining why a particular access was allowed based on the audit messages that generated the access. The access vectors passed in must have the .audit_msgs field set correctly and .explain set to SHORT|LONG_EXPLANATION to enable this feature. The module created by PolicyGenerator can be passed to output.ModuleWriter to output a text representation. """ def __init__(self, module=None): """Initialize a PolicyGenerator with an optional existing module. If the module parameter is not None then access will be added to the passed in module. Otherwise a new reference policy module will be created. """ self.ifgen = None self.explain = NO_EXPLANATION self.gen_requires = False if module: self.module = module else: self.module = refpolicy.Module() self.dontaudit = False self.xperms = False self.domains = None def set_gen_refpol(self, if_set=None, perm_maps=None): """Set whether reference policy interfaces are generated. To turn on interface generation pass in an interface set to use for interface generation. To turn off interface generation pass in None. If interface generation is enabled requires generation will also be enabled. """ if if_set: self.ifgen = InterfaceGenerator(if_set, perm_maps) self.gen_requires = True else: self.ifgen = None self.__set_module_style() def set_gen_requires(self, status=True): """Set whether module requires are generated. Passing in true will turn on requires generation and False will disable generation. If requires generation is disabled interface generation will also be disabled and can only be re-enabled via .set_gen_refpol. """ self.gen_requires = status def set_gen_explain(self, explain=SHORT_EXPLANATION): """Set whether access is explained. """ self.explain = explain def set_gen_dontaudit(self, dontaudit): self.dontaudit = dontaudit def set_gen_xperms(self, xperms): """Set whether extended permission access vector rules are generated. """ self.xperms = xperms def __set_module_style(self): if self.ifgen: refpolicy = True else: refpolicy = False for mod in self.module.module_declarations(): mod.refpolicy = refpolicy def set_module_name(self, name, version="1.0"): """Set the name of the module and optionally the version. """ # find an existing module declaration m = None for mod in self.module.module_declarations(): m = mod if not m: m = refpolicy.ModuleDeclaration() self.module.children.insert(0, m) m.name = name m.version = version if self.ifgen: m.refpolicy = True else: m.refpolicy = False def get_module(self): # Generate the requires if self.gen_requires: gen_requires(self.module) """Return the generated module""" return self.module def __add_av_rule(self, av): """Add access vector rule. """ rule = refpolicy.AVRule(av) if self.dontaudit: rule.rule_type = rule.DONTAUDIT rule.comment = "" if self.explain: rule.comment = str(refpolicy.Comment(explain_access(av, verbosity=self.explain))) if av.type == audit2why.ALLOW: rule.comment += "\n#!!!! This avc is allowed in the current policy" if av.xperms: rule.comment += "\n#!!!! This av rule may have been overridden by an extended permission av rule" if av.type == audit2why.DONTAUDIT: rule.comment += "\n#!!!! This avc has a dontaudit rule in the current policy" if av.type == audit2why.BOOLEAN: if len(av.data) > 1: rule.comment += "\n#!!!! This avc can be allowed using one of the these booleans:\n# %s" % ", ".join([x[0] for x in av.data]) else: rule.comment += "\n#!!!! This avc can be allowed using the boolean '%s'" % av.data[0][0] if av.type == audit2why.CONSTRAINT: rule.comment += "\n#!!!! This avc is a constraint violation. You would need to modify the attributes of either the source or target types to allow this access." rule.comment += "\n#Constraint rule: " rule.comment += "\n#\t" + av.data[0] for reason in av.data[1:]: rule.comment += "\n#\tPossible cause is the source %s and target %s are different." % reason try: if ( av.type == audit2why.TERULE and "write" in av.perms and ( "dir" in av.obj_class or "open" in av.perms )): if not self.domains: self.domains = seinfo(ATTRIBUTE, name="domain")[0]["types"] types=[] for i in [x[TCONTEXT] for x in sesearch([ALLOW], {SCONTEXT: av.src_type, CLASS: av.obj_class, PERMS: av.perms})]: if i not in self.domains: types.append(i) if len(types) == 1: rule.comment += "\n#!!!! The source type '%s' can write to a '%s' of the following type:\n# %s\n" % ( av.src_type, av.obj_class, ", ".join(types)) elif len(types) >= 1: rule.comment += "\n#!!!! The source type '%s' can write to a '%s' of the following types:\n# %s\n" % ( av.src_type, av.obj_class, ", ".join(types)) except: pass self.module.children.append(rule) def __add_ext_av_rules(self, av): """Add extended permission access vector rules. """ for op in av.xperms.keys(): extrule = refpolicy.AVExtRule(av, op) if self.dontaudit: extrule.rule_type = extrule.DONTAUDITXPERM self.module.children.append(extrule) def add_access(self, av_set): """Add the access from the access vector set to this module. """ # Use the interface generator to split the access # into raw allow rules and interfaces. After this # a will contain a list of access that should be # used as raw allow rules and the interfaces will # be added to the module. if self.ifgen: raw_allow, ifcalls = self.ifgen.gen(av_set, self.explain) self.module.children.extend(ifcalls) else: raw_allow = av_set # Generate the raw allow rules from the filtered list for av in raw_allow: self.__add_av_rule(av) if self.xperms and av.xperms: self.__add_ext_av_rules(av) def add_role_types(self, role_type_set): for role_type in role_type_set: self.module.children.append(role_type) def explain_access(av, ml=None, verbosity=SHORT_EXPLANATION): """Explain why a policy statement was generated. Return a string containing a text explanation of why a policy statement was generated. The string is commented and wrapped and can be directly inserted into a policy. Params: av - access vector representing the access. Should have .audit_msgs set appropriately. verbosity - the amount of explanation provided. Should be set to NO_EXPLANATION, SHORT_EXPLANATION, or LONG_EXPLANATION. Returns: list of strings - strings explaining the access or an empty string if verbosity=NO_EXPLANATION or there is not sufficient information to provide an explanation. """ s = [] def explain_interfaces(): if not ml: return s.append(" Interface options:") for match in ml.all(): ifcall = call_interface(match.interface, ml.av) s.append(' %s # [%d]' % (ifcall.to_string(), match.dist)) # Format the raw audit data to explain why the # access was requested - either long or short. if verbosity == LONG_EXPLANATION: for msg in av.audit_msgs: s.append(' %s' % msg.header) s.append(' scontext="%s" tcontext="%s"' % (str(msg.scontext), str(msg.tcontext))) s.append(' class="%s" perms="%s"' % (msg.tclass, refpolicy.list_to_space_str(msg.accesses))) s.append(' comm="%s" exe="%s" path="%s"' % (msg.comm, msg.exe, msg.path)) s.extend(textwrap.wrap('message="' + msg.message + '"', 80, initial_indent=" ", subsequent_indent=" ")) explain_interfaces() elif verbosity: s.append(' src="%s" tgt="%s" class="%s", perms="%s"' % (av.src_type, av.tgt_type, av.obj_class, av.perms.to_space_str())) # For the short display we are only going to use the additional information # from the first audit message. For the vast majority of cases this info # will always be the same anyway. if len(av.audit_msgs) > 0: msg = av.audit_msgs[0] s.append(' comm="%s" exe="%s" path="%s"' % (msg.comm, msg.exe, msg.path)) explain_interfaces() return s def call_interface(interface, av): params = [] args = [] params.extend(interface.params.values()) params.sort(key=lambda param: param.num, reverse=True) ifcall = refpolicy.InterfaceCall() ifcall.ifname = interface.name for i in range(len(params)): if params[i].type == refpolicy.SRC_TYPE: ifcall.args.append(av.src_type) elif params[i].type == refpolicy.TGT_TYPE: ifcall.args.append(av.tgt_type) elif params[i].type == refpolicy.OBJ_CLASS: ifcall.args.append(av.obj_class) else: print(params[i].type) assert(0) assert(len(ifcall.args) > 0) return ifcall class InterfaceGenerator: def __init__(self, ifs, perm_maps=None): self.ifs = ifs self.hack_check_ifs(ifs) self.matcher = matching.AccessMatcher(perm_maps) self.calls = [] def hack_check_ifs(self, ifs): # FIXME: Disable interfaces we can't call - this is a hack. # Because we don't handle roles, multiple parameters, etc., # etc., we must make certain we can actually use a returned # interface. for x in ifs.interfaces.values(): params = [] params.extend(x.params.values()) params.sort(key=lambda param: param.num, reverse=True) for i in range(len(params)): # Check that the parameter position matches # the number (e.g., $1 is the first arg). This # will fail if the parser missed something. if (i + 1) != params[i].num: x.enabled = False break # Check that we can handle the param type (currently excludes # roles. if params[i].type not in [refpolicy.SRC_TYPE, refpolicy.TGT_TYPE, refpolicy.OBJ_CLASS]: x.enabled = False break def gen(self, avs, verbosity): raw_av = self.match(avs) ifcalls = [] for ml in self.calls: ifcall = call_interface(ml.best().interface, ml.av) if verbosity: ifcall.comment = refpolicy.Comment(explain_access(ml.av, ml, verbosity)) ifcalls.append((ifcall, ml)) d = [] for ifcall, ifs in ifcalls: found = False for o_ifcall in d: if o_ifcall.matches(ifcall): if o_ifcall.comment and ifcall.comment: o_ifcall.comment.merge(ifcall.comment) found = True if not found: d.append(ifcall) return (raw_av, d) def match(self, avs): raw_av = [] for av in avs: ans = matching.MatchList() self.matcher.search_ifs(self.ifs, av, ans) if len(ans): self.calls.append(ans) else: raw_av.append(av) return raw_av def gen_requires(module): """Add require statements to the module. """ def collect_requires(node): r = refpolicy.Require() for avrule in node.avrules(): r.types.update(avrule.src_types) r.types.update(avrule.tgt_types) for obj in avrule.obj_classes: r.add_obj_class(obj, avrule.perms) for ifcall in node.interface_calls(): for arg in ifcall.args: # FIXME - handle non-type arguments when we # can actually figure those out. r.types.add(arg) for role_type in node.role_types(): r.roles.add(role_type.role) r.types.update(role_type.types) r.types.discard("self") node.children.insert(0, r) # FUTURE - this is untested on modules with any sort of # nesting for node in module.nodes(): collect_requires(node) selinux-python-3.0/sepolgen/src/sepolgen/refparser.py000066400000000000000000000743271356774067000232000ustar00rootroot00000000000000# Authors: Karl MacMillan # # Copyright (C) 2006-2007 Red Hat # see file 'COPYING' for use and warranty information # # This program is free software; you can redistribute it and/or # modify it under the terms of the GNU General Public License as # published by the Free Software Foundation; version 2 only # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program; if not, write to the Free Software # Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA # # OVERVIEW # # # This is a parser for the refpolicy policy "language" - i.e., the # normal SELinux policy language plus the refpolicy style M4 macro # constructs on top of that base language. This parser is primarily # aimed at parsing the policy headers in order to create an abstract # policy representation suitable for generating policy. # # Both the lexer and parser are included in this file. The are implemented # using the Ply library (included with sepolgen). import sys import os import re import traceback from . import access from . import defaults from . import lex from . import refpolicy from . import yacc # ::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: # # lexer # # ::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: tokens = ( # basic tokens, punctuation 'TICK', 'SQUOTE', 'OBRACE', 'CBRACE', 'SEMI', 'COLON', 'OPAREN', 'CPAREN', 'COMMA', 'MINUS', 'TILDE', 'ASTERISK', 'AMP', 'BAR', 'EXPL', 'EQUAL', 'FILENAME', 'IDENTIFIER', 'NUMBER', 'PATH', 'IPV6_ADDR', # reserved words # module 'MODULE', 'POLICY_MODULE', 'REQUIRE', # flask 'SID', 'GENFSCON', 'FS_USE_XATTR', 'FS_USE_TRANS', 'FS_USE_TASK', 'PORTCON', 'NODECON', 'NETIFCON', 'PIRQCON', 'IOMEMCON', 'IOPORTCON', 'PCIDEVICECON', 'DEVICETREECON', # object classes 'CLASS', # types and attributes 'TYPEATTRIBUTE', 'ROLEATTRIBUTE', 'TYPE', 'ATTRIBUTE', 'ATTRIBUTE_ROLE', 'ALIAS', 'TYPEALIAS', # conditional policy 'BOOL', 'TRUE', 'FALSE', 'IF', 'ELSE', # users and roles 'ROLE', 'TYPES', # rules 'ALLOW', 'DONTAUDIT', 'AUDITALLOW', 'NEVERALLOW', 'PERMISSIVE', 'TYPEBOUNDS', 'TYPE_TRANSITION', 'TYPE_CHANGE', 'TYPE_MEMBER', 'RANGE_TRANSITION', 'ROLE_TRANSITION', # refpolicy keywords 'OPT_POLICY', 'INTERFACE', 'TUNABLE_POLICY', 'GEN_REQ', 'TEMPLATE', 'GEN_CONTEXT', # m4 'IFELSE', 'IFDEF', 'IFNDEF', 'DEFINE' ) # All reserved keywords - see t_IDENTIFIER for how these are matched in # the lexer. reserved = { # module 'module' : 'MODULE', 'policy_module' : 'POLICY_MODULE', 'require' : 'REQUIRE', # flask 'sid' : 'SID', 'genfscon' : 'GENFSCON', 'fs_use_xattr' : 'FS_USE_XATTR', 'fs_use_trans' : 'FS_USE_TRANS', 'fs_use_task' : 'FS_USE_TASK', 'portcon' : 'PORTCON', 'nodecon' : 'NODECON', 'netifcon' : 'NETIFCON', 'pirqcon' : 'PIRQCON', 'iomemcon' : 'IOMEMCON', 'ioportcon' : 'IOPORTCON', 'pcidevicecon' : 'PCIDEVICECON', 'devicetreecon' : 'DEVICETREECON', # object classes 'class' : 'CLASS', # types and attributes 'typeattribute' : 'TYPEATTRIBUTE', 'roleattribute' : 'ROLEATTRIBUTE', 'type' : 'TYPE', 'attribute' : 'ATTRIBUTE', 'attribute_role' : 'ATTRIBUTE_ROLE', 'alias' : 'ALIAS', 'typealias' : 'TYPEALIAS', # conditional policy 'bool' : 'BOOL', 'true' : 'TRUE', 'false' : 'FALSE', 'if' : 'IF', 'else' : 'ELSE', # users and roles 'role' : 'ROLE', 'types' : 'TYPES', # rules 'allow' : 'ALLOW', 'dontaudit' : 'DONTAUDIT', 'auditallow' : 'AUDITALLOW', 'neverallow' : 'NEVERALLOW', 'permissive' : 'PERMISSIVE', 'typebounds' : 'TYPEBOUNDS', 'type_transition' : 'TYPE_TRANSITION', 'type_change' : 'TYPE_CHANGE', 'type_member' : 'TYPE_MEMBER', 'range_transition' : 'RANGE_TRANSITION', 'role_transition' : 'ROLE_TRANSITION', # refpolicy keywords 'optional_policy' : 'OPT_POLICY', 'interface' : 'INTERFACE', 'tunable_policy' : 'TUNABLE_POLICY', 'gen_require' : 'GEN_REQ', 'template' : 'TEMPLATE', 'gen_context' : 'GEN_CONTEXT', # M4 'ifelse' : 'IFELSE', 'ifndef' : 'IFNDEF', 'ifdef' : 'IFDEF', 'define' : 'DEFINE' } # The ply lexer allows definition of tokens in 2 ways: regular expressions # or functions. # Simple regex tokens t_TICK = r'\`' t_SQUOTE = r'\'' t_OBRACE = r'\{' t_CBRACE = r'\}' # This will handle spurious extra ';' via the + t_SEMI = r'\;+' t_COLON = r'\:' t_OPAREN = r'\(' t_CPAREN = r'\)' t_COMMA = r'\,' t_MINUS = r'\-' t_TILDE = r'\~' t_ASTERISK = r'\*' t_AMP = r'\&' t_BAR = r'\|' t_EXPL = r'\!' t_EQUAL = r'\=' t_NUMBER = r'[0-9\.]+' t_PATH = r'/[a-zA-Z0-9)_\.\*/\$]*' #t_IPV6_ADDR = r'[a-fA-F0-9]{0,4}:[a-fA-F0-9]{0,4}:([a-fA-F0-9]{0,4}:)*' # Ignore whitespace - this is a special token for ply that more efficiently # ignores uninteresting tokens. t_ignore = " \t" # More complex tokens def t_IPV6_ADDR(t): r'[a-fA-F0-9]{0,4}:[a-fA-F0-9]{0,4}:([a-fA-F0-9]|:)*' # This is a function simply to force it sooner into # the regex list return t def t_m4comment(t): r'dnl.*\n' # Ignore all comments t.lexer.lineno += 1 def t_refpolicywarn1(t): r'define.*refpolicywarn\(.*\n' # Ignore refpolicywarn statements - they sometimes # contain text that we can't parse. t.skip(1) def t_refpolicywarn(t): r'refpolicywarn\(.*\n' # Ignore refpolicywarn statements - they sometimes # contain text that we can't parse. t.lexer.lineno += 1 def t_IDENTIFIER(t): r'[a-zA-Z_\$][a-zA-Z0-9_\-\+\.\$\*~]*' # Handle any keywords t.type = reserved.get(t.value,'IDENTIFIER') return t def t_FILENAME(t): r'\"[a-zA-Z0-9_\-\+\.\$\*~ :]+\"' # Handle any keywords t.type = reserved.get(t.value,'FILENAME') return t def t_comment(t): r'\#.*\n' # Ignore all comments t.lexer.lineno += 1 def t_error(t): print("Illegal character '%s'" % t.value[0]) t.skip(1) def t_newline(t): r'\n+' t.lexer.lineno += len(t.value) # ::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: # # Parser # # ::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: # Global data used during parsing - making it global is easier than # passing the state through the parsing functions. # m is the top-level data structure (stands for modules). m = None # error is either None (indicating no error) or a string error message. error = None parse_file = "" # spt is the support macros (e.g., obj/perm sets) - it is an instance of # refpolicy.SupportMacros and should always be present during parsing # though it may not contain any macros. spt = None success = True # utilities def collect(stmts, parent, val=None): if stmts is None: return for s in stmts: if s is None: continue s.parent = parent if val is not None: parent.children.insert(0, (val, s)) else: parent.children.insert(0, s) def expand(ids, s): for id in ids: if spt.has_key(id): # noqa s.update(spt.by_name(id)) else: s.add(id) # Top-level non-terminal def p_statements(p): '''statements : statement | statements statement | empty ''' if len(p) == 2 and p[1]: m.children.append(p[1]) elif len(p) > 2 and p[2]: m.children.append(p[2]) def p_statement(p): '''statement : interface | template | obj_perm_set | policy | policy_module_stmt | module_stmt ''' p[0] = p[1] def p_empty(p): 'empty :' pass # # Reference policy language constructs # # This is for the policy module statement (e.g., policy_module(foo,1.2.0)). # We have a separate terminal for either the basic language module statement # and interface calls to make it easier to identifier. def p_policy_module_stmt(p): 'policy_module_stmt : POLICY_MODULE OPAREN IDENTIFIER COMMA NUMBER CPAREN' m = refpolicy.ModuleDeclaration() m.name = p[3] m.version = p[5] m.refpolicy = True p[0] = m def p_interface(p): '''interface : INTERFACE OPAREN TICK IDENTIFIER SQUOTE COMMA TICK interface_stmts SQUOTE CPAREN ''' x = refpolicy.Interface(p[4]) collect(p[8], x) p[0] = x def p_template(p): '''template : TEMPLATE OPAREN TICK IDENTIFIER SQUOTE COMMA TICK interface_stmts SQUOTE CPAREN | DEFINE OPAREN TICK IDENTIFIER SQUOTE COMMA TICK interface_stmts SQUOTE CPAREN ''' x = refpolicy.Template(p[4]) collect(p[8], x) p[0] = x def p_define(p): '''define : DEFINE OPAREN TICK IDENTIFIER SQUOTE CPAREN''' # This is for defining single M4 values (to be used later in ifdef statements). # Example: define(`sulogin_no_pam'). We don't currently do anything with these # but we should in the future when we correctly resolve ifdef statements. p[0] = None def p_interface_stmts(p): '''interface_stmts : policy | interface_stmts policy | empty ''' if len(p) == 2 and p[1]: p[0] = p[1] elif len(p) > 2: if not p[1]: if p[2]: p[0] = p[2] elif not p[2]: p[0] = p[1] else: p[0] = p[1] + p[2] def p_optional_policy(p): '''optional_policy : OPT_POLICY OPAREN TICK interface_stmts SQUOTE CPAREN | OPT_POLICY OPAREN TICK interface_stmts SQUOTE COMMA TICK interface_stmts SQUOTE CPAREN ''' o = refpolicy.OptionalPolicy() collect(p[4], o, val=True) if len(p) > 7: collect(p[8], o, val=False) p[0] = [o] def p_tunable_policy(p): '''tunable_policy : TUNABLE_POLICY OPAREN TICK cond_expr SQUOTE COMMA TICK interface_stmts SQUOTE CPAREN | TUNABLE_POLICY OPAREN TICK cond_expr SQUOTE COMMA TICK interface_stmts SQUOTE COMMA TICK interface_stmts SQUOTE CPAREN ''' x = refpolicy.TunablePolicy() x.cond_expr = p[4] collect(p[8], x, val=True) if len(p) > 11: collect(p[12], x, val=False) p[0] = [x] def p_ifelse(p): '''ifelse : IFELSE OPAREN TICK IDENTIFIER SQUOTE COMMA COMMA TICK IDENTIFIER SQUOTE COMMA TICK interface_stmts SQUOTE CPAREN optional_semi | IFELSE OPAREN TICK IDENTIFIER SQUOTE COMMA TICK IDENTIFIER SQUOTE COMMA TICK interface_stmts SQUOTE COMMA TICK interface_stmts SQUOTE CPAREN optional_semi | IFELSE OPAREN TICK IDENTIFIER SQUOTE COMMA TICK SQUOTE COMMA TICK interface_stmts SQUOTE COMMA TICK interface_stmts SQUOTE CPAREN optional_semi ''' # x = refpolicy.IfDef(p[4]) # v = True # collect(p[8], x, val=v) # if len(p) > 12: # collect(p[12], x, val=False) # p[0] = [x] pass def p_ifdef(p): '''ifdef : IFDEF OPAREN TICK IDENTIFIER SQUOTE COMMA TICK interface_stmts SQUOTE CPAREN optional_semi | IFNDEF OPAREN TICK IDENTIFIER SQUOTE COMMA TICK interface_stmts SQUOTE CPAREN optional_semi | IFDEF OPAREN TICK IDENTIFIER SQUOTE COMMA TICK interface_stmts SQUOTE COMMA TICK interface_stmts SQUOTE CPAREN optional_semi ''' x = refpolicy.IfDef(p[4]) if p[1] == 'ifdef': v = True else: v = False collect(p[8], x, val=v) if len(p) > 12: collect(p[12], x, val=False) p[0] = [x] def p_interface_call(p): '''interface_call : IDENTIFIER OPAREN interface_call_param_list CPAREN | IDENTIFIER OPAREN CPAREN | IDENTIFIER OPAREN interface_call_param_list CPAREN SEMI''' # Allow spurious semi-colons at the end of interface calls i = refpolicy.InterfaceCall(ifname=p[1]) if len(p) > 4: i.args.extend(p[3]) p[0] = i def p_interface_call_param(p): '''interface_call_param : IDENTIFIER | IDENTIFIER MINUS IDENTIFIER | nested_id_set | TRUE | FALSE | FILENAME ''' # Intentionally let single identifiers pass through # List means set, non-list identifier if len(p) == 2: p[0] = p[1] else: p[0] = [p[1], "-" + p[3]] def p_interface_call_param_list(p): '''interface_call_param_list : interface_call_param | interface_call_param_list COMMA interface_call_param ''' if len(p) == 2: p[0] = [p[1]] else: p[0] = p[1] + [p[3]] def p_obj_perm_set(p): 'obj_perm_set : DEFINE OPAREN TICK IDENTIFIER SQUOTE COMMA TICK names SQUOTE CPAREN' s = refpolicy.ObjPermSet(p[4]) s.perms = p[8] p[0] = s # # Basic SELinux policy language # def p_policy(p): '''policy : policy_stmt | optional_policy | tunable_policy | ifdef | ifelse | conditional ''' p[0] = p[1] def p_policy_stmt(p): '''policy_stmt : gen_require | avrule_def | typerule_def | typebound_def | typeattribute_def | roleattribute_def | interface_call | role_def | role_allow | permissive | type_def | typealias_def | attribute_def | attribute_role_def | range_transition_def | role_transition_def | bool | define | initial_sid | genfscon | fs_use | portcon | nodecon | netifcon | pirqcon | iomemcon | ioportcon | pcidevicecon | devicetreecon ''' if p[1]: p[0] = [p[1]] def p_module_stmt(p): 'module_stmt : MODULE IDENTIFIER NUMBER SEMI' m = refpolicy.ModuleDeclaration() m.name = p[2] m.version = p[3] m.refpolicy = False p[0] = m def p_gen_require(p): '''gen_require : GEN_REQ OPAREN TICK requires SQUOTE CPAREN | REQUIRE OBRACE requires CBRACE''' # We ignore the require statements - they are redundant data from our point-of-view. # Checkmodule will verify them later anyway so we just assume that they match what # is in the rest of the interface. pass def p_requires(p): '''requires : require | requires require | ifdef | requires ifdef ''' pass def p_require(p): '''require : TYPE comma_list SEMI | ROLE comma_list SEMI | ATTRIBUTE comma_list SEMI | ATTRIBUTE_ROLE comma_list SEMI | CLASS comma_list SEMI | BOOL comma_list SEMI ''' pass def p_security_context(p): '''security_context : IDENTIFIER COLON IDENTIFIER COLON IDENTIFIER | IDENTIFIER COLON IDENTIFIER COLON IDENTIFIER COLON mls_range_def''' # This will likely need some updates to handle complex levels s = refpolicy.SecurityContext() s.user = p[1] s.role = p[3] s.type = p[5] if len(p) > 6: s.level = p[7] p[0] = s def p_gen_context(p): '''gen_context : GEN_CONTEXT OPAREN security_context COMMA mls_range_def CPAREN ''' # We actually store gen_context statements in a SecurityContext # object - it knows how to output either a bare context or a # gen_context statement. s = p[3] s.level = p[5] p[0] = s def p_context(p): '''context : security_context | gen_context ''' p[0] = p[1] def p_initial_sid(p): '''initial_sid : SID IDENTIFIER context''' s = refpolicy.InitialSid() s.name = p[2] s.context = p[3] p[0] = s def p_genfscon(p): '''genfscon : GENFSCON IDENTIFIER PATH context''' g = refpolicy.GenfsCon() g.filesystem = p[2] g.path = p[3] g.context = p[4] p[0] = g def p_fs_use(p): '''fs_use : FS_USE_XATTR IDENTIFIER context SEMI | FS_USE_TASK IDENTIFIER context SEMI | FS_USE_TRANS IDENTIFIER context SEMI ''' f = refpolicy.FilesystemUse() if p[1] == "fs_use_xattr": f.type = refpolicy.FilesystemUse.XATTR elif p[1] == "fs_use_task": f.type = refpolicy.FilesystemUse.TASK elif p[1] == "fs_use_trans": f.type = refpolicy.FilesystemUse.TRANS f.filesystem = p[2] f.context = p[3] p[0] = f def p_portcon(p): '''portcon : PORTCON IDENTIFIER NUMBER context | PORTCON IDENTIFIER NUMBER MINUS NUMBER context''' c = refpolicy.PortCon() c.port_type = p[2] if len(p) == 5: c.port_number = p[3] c.context = p[4] else: c.port_number = p[3] + "-" + p[4] c.context = p[5] p[0] = c def p_nodecon(p): '''nodecon : NODECON NUMBER NUMBER context | NODECON IPV6_ADDR IPV6_ADDR context ''' n = refpolicy.NodeCon() n.start = p[2] n.end = p[3] n.context = p[4] p[0] = n def p_netifcon(p): 'netifcon : NETIFCON IDENTIFIER context context' n = refpolicy.NetifCon() n.interface = p[2] n.interface_context = p[3] n.packet_context = p[4] p[0] = n def p_pirqcon(p): 'pirqcon : PIRQCON NUMBER context' c = refpolicy.PirqCon() c.pirq_number = p[2] c.context = p[3] p[0] = c def p_iomemcon(p): '''iomemcon : IOMEMCON NUMBER context | IOMEMCON NUMBER MINUS NUMBER context''' c = refpolicy.IomemCon() if len(p) == 4: c.device_mem = p[2] c.context = p[3] else: c.device_mem = p[2] + "-" + p[3] c.context = p[4] p[0] = c def p_ioportcon(p): '''ioportcon : IOPORTCON NUMBER context | IOPORTCON NUMBER MINUS NUMBER context''' c = refpolicy.IoportCon() if len(p) == 4: c.ioport = p[2] c.context = p[3] else: c.ioport = p[2] + "-" + p[3] c.context = p[4] p[0] = c def p_pcidevicecon(p): 'pcidevicecon : PCIDEVICECON NUMBER context' c = refpolicy.PciDeviceCon() c.device = p[2] c.context = p[3] p[0] = c def p_devicetreecon(p): 'devicetreecon : DEVICETREECON NUMBER context' c = refpolicy.DevicetTeeCon() c.path = p[2] c.context = p[3] p[0] = c def p_mls_range_def(p): '''mls_range_def : mls_level_def MINUS mls_level_def | mls_level_def ''' p[0] = p[1] if len(p) > 2: p[0] = p[0] + "-" + p[3] def p_mls_level_def(p): '''mls_level_def : IDENTIFIER COLON comma_list | IDENTIFIER ''' p[0] = p[1] if len(p) > 2: p[0] = p[0] + ":" + ",".join(p[3]) def p_type_def(p): '''type_def : TYPE IDENTIFIER COMMA comma_list SEMI | TYPE IDENTIFIER SEMI | TYPE IDENTIFIER ALIAS names SEMI | TYPE IDENTIFIER ALIAS names COMMA comma_list SEMI ''' t = refpolicy.Type(p[2]) if len(p) == 6: if p[3] == ',': t.attributes.update(p[4]) else: t.aliases = p[4] elif len(p) > 4: t.aliases = p[4] if len(p) == 8: t.attributes.update(p[6]) p[0] = t def p_attribute_def(p): 'attribute_def : ATTRIBUTE IDENTIFIER SEMI' a = refpolicy.Attribute(p[2]) p[0] = a def p_attribute_role_def(p): 'attribute_role_def : ATTRIBUTE_ROLE IDENTIFIER SEMI' a = refpolicy.Attribute_Role(p[2]) p[0] = a def p_typealias_def(p): 'typealias_def : TYPEALIAS IDENTIFIER ALIAS names SEMI' t = refpolicy.TypeAlias() t.type = p[2] t.aliases = p[4] p[0] = t def p_role_def(p): '''role_def : ROLE IDENTIFIER TYPES comma_list SEMI | ROLE IDENTIFIER SEMI''' r = refpolicy.Role() r.role = p[2] if len(p) > 4: r.types.update(p[4]) p[0] = r def p_role_allow(p): 'role_allow : ALLOW names names SEMI' r = refpolicy.RoleAllow() r.src_roles = p[2] r.tgt_roles = p[3] p[0] = r def p_permissive(p): 'permissive : PERMISSIVE names SEMI' pass def p_avrule_def(p): '''avrule_def : ALLOW names names COLON names names SEMI | DONTAUDIT names names COLON names names SEMI | AUDITALLOW names names COLON names names SEMI | NEVERALLOW names names COLON names names SEMI ''' a = refpolicy.AVRule() if p[1] == 'dontaudit': a.rule_type = refpolicy.AVRule.DONTAUDIT elif p[1] == 'auditallow': a.rule_type = refpolicy.AVRule.AUDITALLOW elif p[1] == 'neverallow': a.rule_type = refpolicy.AVRule.NEVERALLOW a.src_types = p[2] a.tgt_types = p[3] a.obj_classes = p[5] a.perms = p[6] p[0] = a def p_typerule_def(p): '''typerule_def : TYPE_TRANSITION names names COLON names IDENTIFIER SEMI | TYPE_TRANSITION names names COLON names IDENTIFIER FILENAME SEMI | TYPE_TRANSITION names names COLON names IDENTIFIER IDENTIFIER SEMI | TYPE_CHANGE names names COLON names IDENTIFIER SEMI | TYPE_MEMBER names names COLON names IDENTIFIER SEMI ''' t = refpolicy.TypeRule() if p[1] == 'type_change': t.rule_type = refpolicy.TypeRule.TYPE_CHANGE elif p[1] == 'type_member': t.rule_type = refpolicy.TypeRule.TYPE_MEMBER t.src_types = p[2] t.tgt_types = p[3] t.obj_classes = p[5] t.dest_type = p[6] t.file_name = p[7] p[0] = t def p_typebound_def(p): '''typebound_def : TYPEBOUNDS IDENTIFIER comma_list SEMI''' t = refpolicy.TypeBound() t.type = p[2] t.tgt_types.update(p[3]) p[0] = t def p_bool(p): '''bool : BOOL IDENTIFIER TRUE SEMI | BOOL IDENTIFIER FALSE SEMI''' b = refpolicy.Bool() b.name = p[2] if p[3] == "true": b.state = True else: b.state = False p[0] = b def p_conditional(p): ''' conditional : IF OPAREN cond_expr CPAREN OBRACE interface_stmts CBRACE | IF OPAREN cond_expr CPAREN OBRACE interface_stmts CBRACE ELSE OBRACE interface_stmts CBRACE ''' c = refpolicy.Conditional() c.cond_expr = p[3] collect(p[6], c, val=True) if len(p) > 8: collect(p[10], c, val=False) p[0] = [c] def p_typeattribute_def(p): '''typeattribute_def : TYPEATTRIBUTE IDENTIFIER comma_list SEMI''' t = refpolicy.TypeAttribute() t.type = p[2] t.attributes.update(p[3]) p[0] = t def p_roleattribute_def(p): '''roleattribute_def : ROLEATTRIBUTE IDENTIFIER comma_list SEMI''' t = refpolicy.RoleAttribute() t.role = p[2] t.roleattributes.update(p[3]) p[0] = t def p_range_transition_def(p): '''range_transition_def : RANGE_TRANSITION names names COLON names mls_range_def SEMI | RANGE_TRANSITION names names names SEMI''' pass def p_role_transition_def(p): '''role_transition_def : ROLE_TRANSITION names names names SEMI''' pass def p_cond_expr(p): '''cond_expr : IDENTIFIER | EXPL cond_expr | cond_expr AMP AMP cond_expr | cond_expr BAR BAR cond_expr | cond_expr EQUAL EQUAL cond_expr | cond_expr EXPL EQUAL cond_expr ''' l = len(p) if l == 2: p[0] = [p[1]] elif l == 3: p[0] = [p[1]] + p[2] else: p[0] = p[1] + [p[2] + p[3]] + p[4] # # Basic terminals # # Identifiers and lists of identifiers. These must # be handled somewhat gracefully. Names returns an IdSet and care must # be taken that this is _assigned_ to an object to correctly update # all of the flags (as opposed to using update). The other terminals # return list - this is to preserve ordering if it is important for # parsing (for example, interface_call must retain the ordering). Other # times the list should be used to update an IdSet. def p_names(p): '''names : identifier | nested_id_set | asterisk | TILDE identifier | TILDE nested_id_set | IDENTIFIER MINUS IDENTIFIER ''' s = refpolicy.IdSet() if len(p) < 3: expand(p[1], s) elif len(p) == 3: expand(p[2], s) s.compliment = True else: expand([p[1]]) s.add("-" + p[3]) p[0] = s def p_identifier(p): 'identifier : IDENTIFIER' p[0] = [p[1]] def p_asterisk(p): 'asterisk : ASTERISK' p[0] = [p[1]] def p_nested_id_set(p): '''nested_id_set : OBRACE nested_id_list CBRACE ''' p[0] = p[2] def p_nested_id_list(p): '''nested_id_list : nested_id_element | nested_id_list nested_id_element ''' if len(p) == 2: p[0] = p[1] else: p[0] = p[1] + p[2] def p_nested_id_element(p): '''nested_id_element : identifier | MINUS IDENTIFIER | nested_id_set ''' if len(p) == 2: p[0] = p[1] else: # For now just leave the '-' str = "-" + p[2] p[0] = [str] def p_comma_list(p): '''comma_list : nested_id_list | comma_list COMMA nested_id_list ''' if len(p) > 2: p[1] = p[1] + p[3] p[0] = p[1] def p_optional_semi(p): '''optional_semi : SEMI | empty''' pass # # Interface to the parser # def p_error(tok): global error, parse_file, success, parser error = "%s: Syntax error on line %d %s [type=%s]" % (parse_file, tok.lineno, tok.value, tok.type) print(error) success = False def prep_spt(spt): if not spt: return { } map = {} for x in spt: map[x.name] = x parser = None lexer = None def create_globals(module, support, debug): global parser, lexer, m, spt if not parser: lexer = lex.lex() parser = yacc.yacc(method="LALR", debug=debug, write_tables=0) if module is not None: m = module else: m = refpolicy.Module() if not support: spt = refpolicy.SupportMacros() else: spt = support def parse(text, module=None, support=None, debug=False): create_globals(module, support, debug) global error, parser, lexer, success lexer.lineno = 1 success = True try: parser.parse(text, debug=debug, lexer=lexer) except Exception as e: parser = None lexer = None error = "internal parser error: %s" % str(e) + "\n" + traceback.format_exc() if not success: # force the parser and lexer to be rebuilt - we have some problems otherwise parser = None msg = 'could not parse text: "%s"' % error raise ValueError(msg) return m def list_headers(root): modules = [] support_macros = None for dirpath, dirnames, filenames in os.walk(root): for name in filenames: modname = os.path.splitext(name) filename = os.path.join(dirpath, name) if modname[1] == '.spt': if name == "obj_perm_sets.spt": support_macros = filename elif len(re.findall("patterns", modname[0])): modules.append((modname[0], filename)) elif modname[1] == '.if': modules.append((modname[0], filename)) return (modules, support_macros) def parse_headers(root, output=None, expand=True, debug=False): from . import util headers = refpolicy.Headers() modules = [] support_macros = None if os.path.isfile(root): name = os.path.split(root)[1] if name == '': raise ValueError("Invalid file name %s" % root) modname = os.path.splitext(name) modules.append((modname[0], root)) all_modules, support_macros = list_headers(defaults.headers()) else: modules, support_macros = list_headers(root) if expand and not support_macros: raise ValueError("could not find support macros (obj_perm_sets.spt)") def o(msg): if output: output.write(msg) def parse_file(f, module, spt=None): global parse_file if debug: o("parsing file %s\n" % f) try: fd = open(f) txt = fd.read() fd.close() parse_file = f parse(txt, module, spt, debug) except IOError as e: return except ValueError as e: raise ValueError("error parsing file %s: %s" % (f, str(e))) spt = None if support_macros: o("Parsing support macros (%s): " % support_macros) spt = refpolicy.SupportMacros() parse_file(support_macros, spt) headers.children.append(spt) # FIXME: Total hack - add in can_exec rather than parse the insanity # of misc_macros. We are just going to pretend that this is an interface # to make the expansion work correctly. can_exec = refpolicy.Interface("can_exec") av = access.AccessVector(["$1","$2","file","execute_no_trans","open", "read", "getattr","lock","execute","ioctl"]) can_exec.children.append(refpolicy.AVRule(av)) headers.children.append(can_exec) o("done.\n") if output and not debug: status = util.ConsoleProgressBar(sys.stdout, steps=len(modules)) status.start("Parsing interface files") failures = [] for x in modules: m = refpolicy.Module() m.name = x[0] try: if expand: parse_file(x[1], m, spt) else: parse_file(x[1], m) except ValueError as e: o(str(e) + "\n") failures.append(x[1]) continue headers.children.append(m) if output and not debug: status.step() if len(failures): o("failed to parse some headers: %s" % ", ".join(failures)) return headers selinux-python-3.0/sepolgen/src/sepolgen/refpolicy.py000066400000000000000000000766431356774067000232060ustar00rootroot00000000000000# Authors: Karl MacMillan # # Copyright (C) 2006 Red Hat # see file 'COPYING' for use and warranty information # # This program is free software; you can redistribute it and/or # modify it under the terms of the GNU General Public License as # published by the Free Software Foundation; version 2 only # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program; if not, write to the Free Software # Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA # import string import selinux # OVERVIEW # # This file contains objects and functions used to represent the reference # policy (including the headers, M4 macros, and policy language statements). # # This representation is very different from the semantic representation # used in libsepol. Instead, it is a more typical abstract representation # used by the first stage of compilers. It is basically a parse tree. # # This choice is intentional as it allows us to handle the unprocessed # M4 statements - including the $1 style arguments - and to more easily generate # the data structures that we need for policy generation. # # Constans for referring to fields SRC_TYPE = 0 TGT_TYPE = 1 OBJ_CLASS = 2 PERMS = 3 ROLE = 4 DEST_TYPE = 5 # String represenations of the above constants field_to_str = ["source", "target", "object", "permission", "role", "destination" ] str_to_field = { "source" : SRC_TYPE, "target" : TGT_TYPE, "object" : OBJ_CLASS, "permission" : PERMS, "role" : ROLE, "destination" : DEST_TYPE } # Base Classes class PolicyBase: def __init__(self, parent=None): self.parent = None self.comment = None class Node(PolicyBase): """Base class objects produced from parsing the reference policy. The Node class is used as the base class for any non-leaf object produced by parsing the reference policy. This object should contain a reference to its parent (or None for a top-level object) and 0 or more children. The general idea here is to have a very simple tree structure. Children are not separated out by type. Instead the tree structure represents fairly closely the real structure of the policy statements. The object should be iterable - by default over all children but subclasses are free to provide additional iterators over a subset of their childre (see Interface for example). """ def __init__(self, parent=None): PolicyBase.__init__(self, parent) self.children = [] def __iter__(self): return iter(self.children) # Not all of the iterators will return something on all Nodes, but # they won't explode either. Putting them here is just easier. # Top level nodes def nodes(self): return filter(lambda x: isinstance(x, Node), walktree(self)) def modules(self): return filter(lambda x: isinstance(x, Module), walktree(self)) def interfaces(self): return filter(lambda x: isinstance(x, Interface), walktree(self)) def templates(self): return filter(lambda x: isinstance(x, Template), walktree(self)) def support_macros(self): return filter(lambda x: isinstance(x, SupportMacros), walktree(self)) # Common policy statements def module_declarations(self): return filter(lambda x: isinstance(x, ModuleDeclaration), walktree(self)) def interface_calls(self): return filter(lambda x: isinstance(x, InterfaceCall), walktree(self)) def avrules(self): return filter(lambda x: isinstance(x, AVRule), walktree(self)) def avextrules(self): return filter(lambda x: isinstance(x, AVExtRule), walktree(self)) def typerules(self): return filter(lambda x: isinstance(x, TypeRule), walktree(self)) def typebounds(self): return filter(lambda x: isinstance(x, TypeBound), walktree(self)) def typeattributes(self): """Iterate over all of the TypeAttribute children of this Interface.""" return filter(lambda x: isinstance(x, TypeAttribute), walktree(self)) def roleattributes(self): """Iterate over all of the RoleAttribute children of this Interface.""" return filter(lambda x: isinstance(x, RoleAttribute), walktree(self)) def requires(self): return filter(lambda x: isinstance(x, Require), walktree(self)) def roles(self): return filter(lambda x: isinstance(x, Role), walktree(self)) def role_allows(self): return filter(lambda x: isinstance(x, RoleAllow), walktree(self)) def role_types(self): return filter(lambda x: isinstance(x, RoleType), walktree(self)) def __str__(self): if self.comment: return str(self.comment) + "\n" + self.to_string() else: return self.to_string() def __repr__(self): return "<%s(%s)>" % (self.__class__.__name__, self.to_string()) def to_string(self): return "" class Leaf(PolicyBase): def __init__(self, parent=None): PolicyBase.__init__(self, parent) def __str__(self): if self.comment: return str(self.comment) + "\n" + self.to_string() else: return self.to_string() def __repr__(self): return "<%s(%s)>" % (self.__class__.__name__, self.to_string()) def to_string(self): return "" # Utility functions def walktree(node, depthfirst=True, showdepth=False, type=None): """Iterate over a Node and its Children. The walktree function iterates over a tree containing Nodes and leaf objects. The iteration can perform a depth first or a breadth first traversal of the tree (controlled by the depthfirst parameter. The passed in node will be returned. This function will only work correctly for trees - arbitrary graphs will likely cause infinite looping. """ # We control depth first / versus breadth first by # how we pop items off of the node stack. if depthfirst: index = -1 else: index = 0 stack = [(node, 0)] while len(stack) > 0: cur, depth = stack.pop(index) if showdepth: yield cur, depth else: yield cur # If the node is not a Node instance it must # be a leaf - so no need to add it to the stack if isinstance(cur, Node): items = [] i = len(cur.children) - 1 while i >= 0: if type is None or isinstance(cur.children[i], type): items.append((cur.children[i], depth + 1)) i -= 1 stack.extend(items) def walknode(node, type=None): """Iterate over the direct children of a Node. The walktree function iterates over the children of a Node. Unlike walktree it does note return the passed in node or the children of any Node objects (that is, it does not go beyond the current level in the tree). """ for x in node: if type is None or isinstance(x, type): yield x def list_to_space_str(s, cont=('{', '}')): """Convert a set (or any sequence type) into a string representation formatted to match SELinux space separated list conventions. For example the list ['read', 'write'] would be converted into: '{ read write }' """ l = len(s) str = "" if l < 1: raise ValueError("cannot convert 0 len set to string") str = " ".join(s) if l == 1: return str else: return cont[0] + " " + str + " " + cont[1] def list_to_comma_str(s): l = len(s) if l < 1: raise ValueError("cannot convert 0 len set to comma string") return ", ".join(s) # Basic SELinux types class IdSet(set): def __init__(self, list=None): if list: set.__init__(self, list) else: set.__init__(self) self.compliment = False def to_space_str(self): return list_to_space_str(sorted(self)) def to_comma_str(self): return list_to_comma_str(sorted(self)) class SecurityContext(Leaf): """An SELinux security context with optional MCS / MLS fields.""" def __init__(self, context=None, parent=None): """Create a SecurityContext object, optionally from a string. Parameters: [context] - string representing a security context. Same format as a string passed to the from_string method. """ Leaf.__init__(self, parent) self.user = "" self.role = "" self.type = "" self.level = None if context is not None: self.from_string(context) def from_string(self, context): """Parse a string representing a context into a SecurityContext. The string should be in the standard format - e.g., 'user:role:type:level'. Raises ValueError if the string is not parsable as a security context. """ # try to translate the context string to raw form raw = selinux.selinux_trans_to_raw_context(context) if raw[0] == 0: context = raw[1] fields = context.split(":") if len(fields) < 3: raise ValueError("context string [%s] not in a valid format" % context) self.user = fields[0] self.role = fields[1] self.type = fields[2] if len(fields) > 3: # FUTURE - normalize level fields to allow more comparisons to succeed. self.level = ':'.join(fields[3:]) else: self.level = None def __eq__(self, other): """Compare two SecurityContext objects - all fields must be exactly the the same for the comparison to work. It is possible for the level fields to be semantically the same yet syntactically different - in this case this function will return false. """ return self.user == other.user and \ self.role == other.role and \ self.type == other.type and \ self.level == other.level def to_string(self, default_level=None): """Return a string representing this security context. By default, the string will contiain a MCS / MLS level potentially from the default which is passed in if none was set. Arguments: default_level - the default level to use if self.level is an empty string. Returns: A string represening the security context in the form 'user:role:type:level'. """ fields = [self.user, self.role, self.type] if self.level is None: if default_level is None: if selinux.is_selinux_mls_enabled() == 1: fields.append("s0") else: fields.append(default_level) else: fields.append(self.level) return ":".join(fields) class ObjectClass(Leaf): """SELinux object class and permissions. This class is a basic representation of an SELinux object class - it does not represent separate common permissions - just the union of the common and class specific permissions. It is meant to be convenient for policy generation. """ def __init__(self, name="", parent=None): Leaf.__init__(self, parent) self.name = name self.perms = IdSet() class XpermSet(): """Extended permission set. This class represents one or more extended permissions represented by numeric values or ranges of values. The .complement attribute is used to specify all permission except those specified. Two xperm set can be merged using the .extend() method. """ def __init__(self, complement=False): self.complement = complement self.ranges = [] def __normalize_ranges(self): """Ensure that ranges are not overlapping. """ self.ranges.sort() i = 0 while i < len(self.ranges): while i + 1 < len(self.ranges): if self.ranges[i + 1][0] <= self.ranges[i][1] + 1: self.ranges[i] = (self.ranges[i][0], max(self.ranges[i][1], self.ranges[i + 1][1])) del self.ranges[i + 1] else: break i += 1 def extend(self, s): """Add ranges from an xperm set """ self.ranges.extend(s.ranges) self.__normalize_ranges() def add(self, minimum, maximum=None): """Add value of range of values to the xperm set. """ if maximum is None: maximum = minimum self.ranges.append((minimum, maximum)) self.__normalize_ranges() def to_string(self): if not self.ranges: return "" compl = "~ " if self.complement else "" # print single value without braces if len(self.ranges) == 1 and self.ranges[0][0] == self.ranges[0][1]: return compl + str(self.ranges[0][0]) vals = map(lambda x: str(x[0]) if x[0] == x[1] else "%s-%s" % x, self.ranges) return "%s{ %s }" % (compl, " ".join(vals)) # Basic statements class TypeAttribute(Leaf): """SElinux typeattribute statement. This class represents a typeattribute statement. """ def __init__(self, parent=None): Leaf.__init__(self, parent) self.type = "" self.attributes = IdSet() def to_string(self): return "typeattribute %s %s;" % (self.type, self.attributes.to_comma_str()) class RoleAttribute(Leaf): """SElinux roleattribute statement. This class represents a roleattribute statement. """ def __init__(self, parent=None): Leaf.__init__(self, parent) self.role = "" self.roleattributes = IdSet() def to_string(self): return "roleattribute %s %s;" % (self.role, self.roleattributes.to_comma_str()) class Role(Leaf): def __init__(self, parent=None): Leaf.__init__(self, parent) self.role = "" self.types = IdSet() def to_string(self): s = "" for t in self.types: s += "role %s types %s;\n" % (self.role, t) return s class Type(Leaf): def __init__(self, name="", parent=None): Leaf.__init__(self, parent) self.name = name self.attributes = IdSet() self.aliases = IdSet() def to_string(self): s = "type %s" % self.name if len(self.aliases) > 0: s = s + "alias %s" % self.aliases.to_space_str() if len(self.attributes) > 0: s = s + ", %s" % self.attributes.to_comma_str() return s + ";" class TypeAlias(Leaf): def __init__(self, parent=None): Leaf.__init__(self, parent) self.type = "" self.aliases = IdSet() def to_string(self): return "typealias %s alias %s;" % (self.type, self.aliases.to_space_str()) class Attribute(Leaf): def __init__(self, name="", parent=None): Leaf.__init__(self, parent) self.name = name def to_string(self): return "attribute %s;" % self.name class Attribute_Role(Leaf): def __init__(self, name="", parent=None): Leaf.__init__(self, parent) self.name = name def to_string(self): return "attribute_role %s;" % self.name # Classes representing rules class AVRule(Leaf): """SELinux access vector (AV) rule. The AVRule class represents all varieties of AV rules including allow, dontaudit, and auditallow (indicated by the flags self.ALLOW, self.DONTAUDIT, and self.AUDITALLOW respectively). The source and target types, object classes, and perms are all represented by sets containing strings. Sets are used to make it simple to add strings repeatedly while avoiding duplicates. No checking is done to make certain that the symbols are valid or consistent (e.g., perms that don't match the object classes). It is even possible to put invalid types like '$1' into the rules to allow storage of the reference policy interfaces. """ ALLOW = 0 DONTAUDIT = 1 AUDITALLOW = 2 NEVERALLOW = 3 def __init__(self, av=None, parent=None): Leaf.__init__(self, parent) self.src_types = IdSet() self.tgt_types = IdSet() self.obj_classes = IdSet() self.perms = IdSet() self.rule_type = self.ALLOW if av: self.from_av(av) def __rule_type_str(self): if self.rule_type == self.ALLOW: return "allow" elif self.rule_type == self.DONTAUDIT: return "dontaudit" elif self.rule_type == self.AUDITALLOW: return "auditallow" elif self.rule_type == self.NEVERALLOW: return "neverallow" def from_av(self, av): """Add the access from an access vector to this allow rule. """ self.src_types.add(av.src_type) if av.src_type == av.tgt_type: self.tgt_types.add("self") else: self.tgt_types.add(av.tgt_type) self.obj_classes.add(av.obj_class) self.perms.update(av.perms) def to_string(self): """Return a string representation of the rule that is a valid policy language representation (assuming that the types, object class, etc. are valie). """ return "%s %s %s:%s %s;" % (self.__rule_type_str(), self.src_types.to_space_str(), self.tgt_types.to_space_str(), self.obj_classes.to_space_str(), self.perms.to_space_str()) class AVExtRule(Leaf): """Extended permission access vector rule. The AVExtRule class represents allowxperm, dontauditxperm, auditallowxperm, and neverallowxperm rules. The source and target types, and object classes are represented by sets containing strings. The operation is a single string, e.g. 'ioctl'. Extended permissions are represented by an XpermSet. """ ALLOWXPERM = 0 DONTAUDITXPERM = 1 AUDITALLOWXPERM = 2 NEVERALLOWXPERM = 3 def __init__(self, av=None, op=None, parent=None): Leaf.__init__(self, parent) self.src_types = IdSet() self.tgt_types = IdSet() self.obj_classes = IdSet() self.rule_type = self.ALLOWXPERM self.xperms = XpermSet() self.operation = op if av: self.from_av(av, op) def __rule_type_str(self): if self.rule_type == self.ALLOWXPERM: return "allowxperm" elif self.rule_type == self.DONTAUDITXPERM: return "dontauditxperm" elif self.rule_type == self.AUDITALLOWXPERM: return "auditallowxperm" elif self.rule_type == self.NEVERALLOWXPERM: return "neverallowxperm" def from_av(self, av, op): self.src_types.add(av.src_type) if av.src_type == av.tgt_type: self.tgt_types.add("self") else: self.tgt_types.add(av.tgt_type) self.obj_classes.add(av.obj_class) self.operation = op self.xperms = av.xperms[op] def to_string(self): """Return a string representation of the rule that is a valid policy language representation (assuming that the types, object class, etc. are valid). """ return "%s %s %s:%s %s %s;" % (self.__rule_type_str(), self.src_types.to_space_str(), self.tgt_types.to_space_str(), self.obj_classes.to_space_str(), self.operation, self.xperms.to_string()) class TypeRule(Leaf): """SELinux type rules. This class is very similar to the AVRule class, but is for representing the type rules (type_trans, type_change, and type_member). The major difference is the lack of perms and only and sing destination type. """ TYPE_TRANSITION = 0 TYPE_CHANGE = 1 TYPE_MEMBER = 2 def __init__(self, parent=None): Leaf.__init__(self, parent) self.src_types = IdSet() self.tgt_types = IdSet() self.obj_classes = IdSet() self.dest_type = "" self.rule_type = self.TYPE_TRANSITION def __rule_type_str(self): if self.rule_type == self.TYPE_TRANSITION: return "type_transition" elif self.rule_type == self.TYPE_CHANGE: return "type_change" else: return "type_member" def to_string(self): return "%s %s %s:%s %s;" % (self.__rule_type_str(), self.src_types.to_space_str(), self.tgt_types.to_space_str(), self.obj_classes.to_space_str(), self.dest_type) class TypeBound(Leaf): """SElinux typebound statement. This class represents a typebound statement. """ def __init__(self, parent=None): Leaf.__init__(self, parent) self.type = "" self.tgt_types = IdSet() def to_string(self): return "typebounds %s %s;" % (self.type, self.tgt_types.to_comma_str()) class RoleAllow(Leaf): def __init__(self, parent=None): Leaf.__init__(self, parent) self.src_roles = IdSet() self.tgt_roles = IdSet() def to_string(self): return "allow %s %s;" % (self.src_roles.to_comma_str(), self.tgt_roles.to_comma_str()) class RoleType(Leaf): def __init__(self, parent=None): Leaf.__init__(self, parent) self.role = "" self.types = IdSet() def to_string(self): s = "" for t in self.types: s += "role %s types %s;\n" % (self.role, t) return s class ModuleDeclaration(Leaf): def __init__(self, parent=None): Leaf.__init__(self, parent) self.name = "" self.version = "" self.refpolicy = False def to_string(self): if self.refpolicy: return "policy_module(%s, %s)" % (self.name, self.version) else: return "module %s %s;" % (self.name, self.version) class Conditional(Node): def __init__(self, parent=None): Node.__init__(self, parent) self.cond_expr = [] def to_string(self): return "[If %s]" % list_to_space_str(self.cond_expr, cont=("", "")) class Bool(Leaf): def __init__(self, parent=None): Leaf.__init__(self, parent) self.name = "" self.state = False def to_string(self): s = "bool %s " % self.name if s.state: return s + "true" else: return s + "false" class InitialSid(Leaf): def __init(self, parent=None): Leaf.__init__(self, parent) self.name = "" self.context = None def to_string(self): return "sid %s %s" % (self.name, str(self.context)) class GenfsCon(Leaf): def __init__(self, parent=None): Leaf.__init__(self, parent) self.filesystem = "" self.path = "" self.context = None def to_string(self): return "genfscon %s %s %s" % (self.filesystem, self.path, str(self.context)) class FilesystemUse(Leaf): XATTR = 1 TRANS = 2 TASK = 3 def __init__(self, parent=None): Leaf.__init__(self, parent) self.type = self.XATTR self.filesystem = "" self.context = None def to_string(self): s = "" if self.type == self.XATTR: s = "fs_use_xattr " elif self.type == self.TRANS: s = "fs_use_trans " elif self.type == self.TASK: s = "fs_use_task " return "%s %s %s;" % (s, self.filesystem, str(self.context)) class PortCon(Leaf): def __init__(self, parent=None): Leaf.__init__(self, parent) self.port_type = "" self.port_number = "" self.context = None def to_string(self): return "portcon %s %s %s" % (self.port_type, self.port_number, str(self.context)) class NodeCon(Leaf): def __init__(self, parent=None): Leaf.__init__(self, parent) self.start = "" self.end = "" self.context = None def to_string(self): return "nodecon %s %s %s" % (self.start, self.end, str(self.context)) class NetifCon(Leaf): def __init__(self, parent=None): Leaf.__init__(self, parent) self.interface = "" self.interface_context = None self.packet_context = None def to_string(self): return "netifcon %s %s %s" % (self.interface, str(self.interface_context), str(self.packet_context)) class PirqCon(Leaf): def __init__(self, parent=None): Leaf.__init__(self, parent) self.pirq_number = "" self.context = None def to_string(self): return "pirqcon %s %s" % (self.pirq_number, str(self.context)) class IomemCon(Leaf): def __init__(self, parent=None): Leaf.__init__(self, parent) self.device_mem = "" self.context = None def to_string(self): return "iomemcon %s %s" % (self.device_mem, str(self.context)) class IoportCon(Leaf): def __init__(self, parent=None): Leaf.__init__(self, parent) self.ioport = "" self.context = None def to_string(self): return "ioportcon %s %s" % (self.ioport, str(self.context)) class PciDeviceCon(Leaf): def __init__(self, parent=None): Leaf.__init__(self, parent) self.device = "" self.context = None def to_string(self): return "pcidevicecon %s %s" % (self.device, str(self.context)) class DeviceTreeCon(Leaf): def __init__(self, parent=None): Leaf.__init__(self, parent) self.path = "" self.context = None def to_string(self): return "devicetreecon %s %s" % (self.path, str(self.context)) # Reference policy specific types def print_tree(head): for node, depth in walktree(head, showdepth=True): s = "" for i in range(depth): s = s + "\t" print(s + str(node)) class Headers(Node): def __init__(self, parent=None): Node.__init__(self, parent) def to_string(self): return "[Headers]" class Module(Node): def __init__(self, parent=None): Node.__init__(self, parent) def to_string(self): return "" class Interface(Node): """A reference policy interface definition. This class represents a reference policy interface definition. """ def __init__(self, name="", parent=None): Node.__init__(self, parent) self.name = name def to_string(self): return "[Interface name: %s]" % self.name class TunablePolicy(Node): def __init__(self, parent=None): Node.__init__(self, parent) self.cond_expr = [] def to_string(self): return "[Tunable Policy %s]" % list_to_space_str(self.cond_expr, cont=("", "")) class Template(Node): def __init__(self, name="", parent=None): Node.__init__(self, parent) self.name = name def to_string(self): return "[Template name: %s]" % self.name class IfDef(Node): def __init__(self, name="", parent=None): Node.__init__(self, parent) self.name = name def to_string(self): return "[Ifdef name: %s]" % self.name class InterfaceCall(Leaf): def __init__(self, ifname="", parent=None): Leaf.__init__(self, parent) self.ifname = ifname self.args = [] self.comments = [] def matches(self, other): if self.ifname != other.ifname: return False if len(self.args) != len(other.args): return False for a,b in zip(self.args, other.args): if a != b: return False return True def to_string(self): s = "%s(" % self.ifname i = 0 for a in self.args: if isinstance(a, list): str = list_to_space_str(a) else: str = a if i != 0: s = s + ", %s" % str else: s = s + str i += 1 return s + ")" class OptionalPolicy(Node): def __init__(self, parent=None): Node.__init__(self, parent) def to_string(self): return "[Optional Policy]" class SupportMacros(Node): def __init__(self, parent=None): Node.__init__(self, parent) self.map = None def to_string(self): return "[Support Macros]" def __expand_perm(self, perm): # Recursive expansion - the assumption is that these # are ordered correctly so that no macro is used before # it is defined s = set() if perm in self.map: for p in self.by_name(perm): s.update(self.__expand_perm(p)) else: s.add(perm) return s def __gen_map(self): self.map = {} for x in self: exp_perms = set() for perm in x.perms: exp_perms.update(self.__expand_perm(perm)) self.map[x.name] = exp_perms def by_name(self, name): if not self.map: self.__gen_map() return self.map[name] def has_key(self, name): if not self.map: self.__gen_map() return name in self.map class Require(Leaf): def __init__(self, parent=None): Leaf.__init__(self, parent) self.types = IdSet() self.obj_classes = { } self.roles = IdSet() self.data = IdSet() self.users = IdSet() def add_obj_class(self, obj_class, perms): p = self.obj_classes.setdefault(obj_class, IdSet()) p.update(perms) def to_string(self): s = [] s.append("require {") for type in self.types: s.append("\ttype %s;" % type) for obj_class, perms in self.obj_classes.items(): s.append("\tclass %s %s;" % (obj_class, perms.to_space_str())) for role in self.roles: s.append("\trole %s;" % role) for bool in self.data: s.append("\tbool %s;" % bool) for user in self.users: s.append("\tuser %s;" % user) s.append("}") # Handle empty requires if len(s) == 2: return "" return "\n".join(s) class ObjPermSet: def __init__(self, name): self.name = name self.perms = set() def to_string(self): return "define(`%s', `%s')" % (self.name, self.perms.to_space_str()) class ClassMap: def __init__(self, obj_class, perms): self.obj_class = obj_class self.perms = perms def to_string(self): return self.obj_class + ": " + self.perms class Comment: def __init__(self, l=None): if l: self.lines = l else: self.lines = [] def to_string(self): # If there are no lines, treat this as a spacer between # policy statements and return a new line. if len(self.lines) == 0: return "" else: out = [] for line in self.lines: out.append("#" + line) return "\n".join(out) def merge(self, other): if len(other.lines): for line in other.lines: if line != "": self.lines.append(line) def __str__(self): return self.to_string() selinux-python-3.0/sepolgen/src/sepolgen/sepolgeni18n.py000066400000000000000000000016201356774067000235050ustar00rootroot00000000000000# Authors: Karl MacMillan # # Copyright (C) 2006 Red Hat # see file 'COPYING' for use and warranty information # # This program is free software; you can redistribute it and/or # modify it under the terms of the GNU General Public License as # published by the Free Software Foundation; version 2 only # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program; if not, write to the Free Software # Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA # try: import gettext t = gettext.translation( 'yumex' ) _ = t.gettext except: def _(str): return str selinux-python-3.0/sepolgen/src/sepolgen/util.py000066400000000000000000000125521356774067000221540ustar00rootroot00000000000000# Authors: Karl MacMillan # # Copyright (C) 2006 Red Hat # see file 'COPYING' for use and warranty information # # This program is free software; you can redistribute it and/or # modify it under the terms of the GNU General Public License as # published by the Free Software Foundation; version 2 only # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program; if not, write to the Free Software # Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA # import locale import sys PY3 = sys.version_info[0] == 3 if PY3: bytes_type=bytes string_type=str else: bytes_type=str string_type=unicode class ConsoleProgressBar: def __init__(self, out, steps=100, indicator='#'): self.blocks = 0 self.current = 0 self.steps = steps self.indicator = indicator self.out = out self.done = False def start(self, message=None): self.done = False if message: self.out.write('\n%s:\n' % message) self.out.write('%--10---20---30---40---50---60---70---80---90--100\n') def step(self, n=1): self.current += n old = self.blocks self.blocks = int(round(self.current / float(self.steps) * 100) / 2) if self.blocks > 50: self.blocks = 50 new = self.blocks - old self.out.write(self.indicator * new) self.out.flush() if self.blocks == 50 and not self.done: self.done = True self.out.write("\n") def set_to_list(s): l = [] l.extend(s) return l def first(s, sorted=False): """ Return the first element of a set. It sometimes useful to return the first element from a set but, because sets are not indexable, this is rather hard. This function will return the first element from a set. If sorted is True, then the set will first be sorted (making this an expensive operation). Otherwise a random element will be returned (as sets are not ordered). """ if not len(s): raise IndexError("empty container") if sorted: l = set_to_list(s) l.sort() return l[0] else: for x in s: return x def encode_input(text): """Encode given text via preferred system encoding""" # locale will often find out the correct encoding encoding = locale.getpreferredencoding() try: encoded_text = text.encode(encoding) except UnicodeError: # if it fails to find correct encoding then ascii is used # which may lead to UnicodeError if `text` contains non ascii signs # utf-8 is our guess to fix the situation encoded_text = text.encode('utf-8') return encoded_text def decode_input(text): """Decode given text via preferred system encoding""" # locale will often find out the correct encoding encoding = locale.getpreferredencoding() try: decoded_text = text.decode(encoding) except UnicodeError: # if it fails to find correct encoding then ascii is used # which may lead to UnicodeError if `text` contains non ascii signs # utf-8 is our guess to fix the situation decoded_text = text.decode('utf-8') return decoded_text class Comparison(): """Class used when implementing rich comparison. Inherit from this class if you want to have a rich comparison within the class, afterwards implement _compare function within your class.""" def _compare(self, other, method): return NotImplemented def __eq__(self, other): return self._compare(other, lambda a, b: a == b) def __lt__(self, other): return self._compare(other, lambda a, b: a < b) def __le__(self, other): return self._compare(other, lambda a, b: a <= b) def __ge__(self, other): return self._compare(other, lambda a, b: a >= b) def __gt__(self, other): return self._compare(other, lambda a, b: a > b) def __ne__(self, other): return self._compare(other, lambda a, b: a != b) if sys.version_info < (2,7): # cmp_to_key function is missing in python2.6 def cmp_to_key(mycmp): 'Convert a cmp= function into a key= function' class K: def __init__(self, obj, *args): self.obj = obj def __lt__(self, other): return mycmp(self.obj, other.obj) < 0 def __gt__(self, other): return mycmp(self.obj, other.obj) > 0 def __eq__(self, other): return mycmp(self.obj, other.obj) == 0 def __le__(self, other): return mycmp(self.obj, other.obj) <= 0 def __ge__(self, other): return mycmp(self.obj, other.obj) >= 0 def __ne__(self, other): return mycmp(self.obj, other.obj) != 0 return K else: from functools import cmp_to_key def cmp(first, second): return (first > second) - (second > first) if __name__ == "__main__": import time p = ConsoleProgressBar(sys.stdout, steps=999) p.start("computing pi") for i in range(999): p.step() time.sleep(0.001) selinux-python-3.0/sepolgen/src/sepolgen/yacc.py000066400000000000000000004141441356774067000221210ustar00rootroot00000000000000# ----------------------------------------------------------------------------- # ply: yacc.py # # Copyright (C) 2001-2018 # David M. Beazley (Dabeaz LLC) # All rights reserved. # # Redistribution and use in source and binary forms, with or without # modification, are permitted provided that the following conditions are # met: # # * Redistributions of source code must retain the above copyright notice, # this list of conditions and the following disclaimer. # * Redistributions in binary form must reproduce the above copyright notice, # this list of conditions and the following disclaimer in the documentation # and/or other materials provided with the distribution. # * Neither the name of the David Beazley or Dabeaz LLC may be used to # endorse or promote products derived from this software without # specific prior written permission. # # THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS # "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT # LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR # A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT # OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, # SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT # LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, # DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY # THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT # (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE # OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. # ----------------------------------------------------------------------------- # # This implements an LR parser that is constructed from grammar rules defined # as Python functions. The grammar is specified by supplying the BNF inside # Python documentation strings. The inspiration for this technique was borrowed # from John Aycock's Spark parsing system. PLY might be viewed as cross between # Spark and the GNU bison utility. # # The current implementation is only somewhat object-oriented. The # LR parser itself is defined in terms of an object (which allows multiple # parsers to co-exist). However, most of the variables used during table # construction are defined in terms of global variables. Users shouldn't # notice unless they are trying to define multiple parsers at the same # time using threads (in which case they should have their head examined). # # This implementation supports both SLR and LALR(1) parsing. LALR(1) # support was originally implemented by Elias Ioup (ezioup@alumni.uchicago.edu), # using the algorithm found in Aho, Sethi, and Ullman "Compilers: Principles, # Techniques, and Tools" (The Dragon Book). LALR(1) has since been replaced # by the more efficient DeRemer and Pennello algorithm. # # :::::::: WARNING ::::::: # # Construction of LR parsing tables is fairly complicated and expensive. # To make this module run fast, a *LOT* of work has been put into # optimization---often at the expensive of readability and what might # consider to be good Python "coding style." Modify the code at your # own risk! # ---------------------------------------------------------------------------- import re import types import sys import os.path import inspect import warnings __version__ = '3.11' __tabversion__ = '3.10' #----------------------------------------------------------------------------- # === User configurable parameters === # # Change these to modify the default behavior of yacc (if you wish) #----------------------------------------------------------------------------- yaccdebug = True # Debugging mode. If set, yacc generates a # a 'parser.out' file in the current directory debug_file = 'parser.out' # Default name of the debugging file tab_module = 'parsetab' # Default name of the table module default_lr = 'LALR' # Default LR table generation method error_count = 3 # Number of symbols that must be shifted to leave recovery mode yaccdevel = False # Set to True if developing yacc. This turns off optimized # implementations of certain functions. resultlimit = 40 # Size limit of results when running in debug mode. pickle_protocol = 0 # Protocol to use when writing pickle files # String type-checking compatibility if sys.version_info[0] < 3: string_types = basestring else: string_types = str MAXINT = sys.maxsize # This object is a stand-in for a logging object created by the # logging module. PLY will use this by default to create things # such as the parser.out file. If a user wants more detailed # information, they can create their own logging object and pass # it into PLY. class PlyLogger(object): def __init__(self, f): self.f = f def debug(self, msg, *args, **kwargs): self.f.write((msg % args) + '\n') info = debug def warning(self, msg, *args, **kwargs): self.f.write('WARNING: ' + (msg % args) + '\n') def error(self, msg, *args, **kwargs): self.f.write('ERROR: ' + (msg % args) + '\n') critical = debug # Null logger is used when no output is generated. Does nothing. class NullLogger(object): def __getattribute__(self, name): return self def __call__(self, *args, **kwargs): return self # Exception raised for yacc-related errors class YaccError(Exception): pass # Format the result message that the parser produces when running in debug mode. def format_result(r): repr_str = repr(r) if '\n' in repr_str: repr_str = repr(repr_str) if len(repr_str) > resultlimit: repr_str = repr_str[:resultlimit] + ' ...' result = '<%s @ 0x%x> (%s)' % (type(r).__name__, id(r), repr_str) return result # Format stack entries when the parser is running in debug mode def format_stack_entry(r): repr_str = repr(r) if '\n' in repr_str: repr_str = repr(repr_str) if len(repr_str) < 16: return repr_str else: return '<%s @ 0x%x>' % (type(r).__name__, id(r)) # Panic mode error recovery support. This feature is being reworked--much of the # code here is to offer a deprecation/backwards compatible transition _errok = None _token = None _restart = None _warnmsg = '''PLY: Don't use global functions errok(), token(), and restart() in p_error(). Instead, invoke the methods on the associated parser instance: def p_error(p): ... # Use parser.errok(), parser.token(), parser.restart() ... parser = yacc.yacc() ''' def errok(): warnings.warn(_warnmsg) return _errok() def restart(): warnings.warn(_warnmsg) return _restart() def token(): warnings.warn(_warnmsg) return _token() # Utility function to call the p_error() function with some deprecation hacks def call_errorfunc(errorfunc, token, parser): global _errok, _token, _restart _errok = parser.errok _token = parser.token _restart = parser.restart r = errorfunc(token) try: del _errok, _token, _restart except NameError: pass return r #----------------------------------------------------------------------------- # === LR Parsing Engine === # # The following classes are used for the LR parser itself. These are not # used during table construction and are independent of the actual LR # table generation algorithm #----------------------------------------------------------------------------- # This class is used to hold non-terminal grammar symbols during parsing. # It normally has the following attributes set: # .type = Grammar symbol type # .value = Symbol value # .lineno = Starting line number # .endlineno = Ending line number (optional, set automatically) # .lexpos = Starting lex position # .endlexpos = Ending lex position (optional, set automatically) class YaccSymbol: def __str__(self): return self.type def __repr__(self): return str(self) # This class is a wrapper around the objects actually passed to each # grammar rule. Index lookup and assignment actually assign the # .value attribute of the underlying YaccSymbol object. # The lineno() method returns the line number of a given # item (or 0 if not defined). The linespan() method returns # a tuple of (startline,endline) representing the range of lines # for a symbol. The lexspan() method returns a tuple (lexpos,endlexpos) # representing the range of positional information for a symbol. class YaccProduction: def __init__(self, s, stack=None): self.slice = s self.stack = stack self.lexer = None self.parser = None def __getitem__(self, n): if isinstance(n, slice): return [s.value for s in self.slice[n]] elif n >= 0: return self.slice[n].value else: return self.stack[n].value def __setitem__(self, n, v): self.slice[n].value = v def __getslice__(self, i, j): return [s.value for s in self.slice[i:j]] def __len__(self): return len(self.slice) def lineno(self, n): return getattr(self.slice[n], 'lineno', 0) def set_lineno(self, n, lineno): self.slice[n].lineno = lineno def linespan(self, n): startline = getattr(self.slice[n], 'lineno', 0) endline = getattr(self.slice[n], 'endlineno', startline) return startline, endline def lexpos(self, n): return getattr(self.slice[n], 'lexpos', 0) def set_lexpos(self, n, lexpos): self.slice[n].lexpos = lexpos def lexspan(self, n): startpos = getattr(self.slice[n], 'lexpos', 0) endpos = getattr(self.slice[n], 'endlexpos', startpos) return startpos, endpos def error(self): raise SyntaxError # ----------------------------------------------------------------------------- # == LRParser == # # The LR Parsing engine. # ----------------------------------------------------------------------------- class LRParser: def __init__(self, lrtab, errorf): self.productions = lrtab.lr_productions self.action = lrtab.lr_action self.goto = lrtab.lr_goto self.errorfunc = errorf self.set_defaulted_states() self.errorok = True def errok(self): self.errorok = True def restart(self): del self.statestack[:] del self.symstack[:] sym = YaccSymbol() sym.type = '$end' self.symstack.append(sym) self.statestack.append(0) # Defaulted state support. # This method identifies parser states where there is only one possible reduction action. # For such states, the parser can make a choose to make a rule reduction without consuming # the next look-ahead token. This delayed invocation of the tokenizer can be useful in # certain kinds of advanced parsing situations where the lexer and parser interact with # each other or change states (i.e., manipulation of scope, lexer states, etc.). # # See: http://www.gnu.org/software/bison/manual/html_node/Default-Reductions.html#Default-Reductions def set_defaulted_states(self): self.defaulted_states = {} for state, actions in self.action.items(): rules = list(actions.values()) if len(rules) == 1 and rules[0] < 0: self.defaulted_states[state] = rules[0] def disable_defaulted_states(self): self.defaulted_states = {} def parse(self, input=None, lexer=None, debug=False, tracking=False, tokenfunc=None): if debug or yaccdevel: if isinstance(debug, int): debug = PlyLogger(sys.stderr) return self.parsedebug(input, lexer, debug, tracking, tokenfunc) elif tracking: return self.parseopt(input, lexer, debug, tracking, tokenfunc) else: return self.parseopt_notrack(input, lexer, debug, tracking, tokenfunc) # !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! # parsedebug(). # # This is the debugging enabled version of parse(). All changes made to the # parsing engine should be made here. Optimized versions of this function # are automatically created by the ply/ygen.py script. This script cuts out # sections enclosed in markers such as this: # # #--! DEBUG # statements # #--! DEBUG # # !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! def parsedebug(self, input=None, lexer=None, debug=False, tracking=False, tokenfunc=None): #--! parsedebug-start lookahead = None # Current lookahead symbol lookaheadstack = [] # Stack of lookahead symbols actions = self.action # Local reference to action table (to avoid lookup on self.) goto = self.goto # Local reference to goto table (to avoid lookup on self.) prod = self.productions # Local reference to production list (to avoid lookup on self.) defaulted_states = self.defaulted_states # Local reference to defaulted states pslice = YaccProduction(None) # Production object passed to grammar rules errorcount = 0 # Used during error recovery #--! DEBUG debug.info('PLY: PARSE DEBUG START') #--! DEBUG # If no lexer was given, we will try to use the lex module if not lexer: from . import lex lexer = lex.lexer # Set up the lexer and parser objects on pslice pslice.lexer = lexer pslice.parser = self # If input was supplied, pass to lexer if input is not None: lexer.input(input) if tokenfunc is None: # Tokenize function get_token = lexer.token else: get_token = tokenfunc # Set the parser() token method (sometimes used in error recovery) self.token = get_token # Set up the state and symbol stacks statestack = [] # Stack of parsing states self.statestack = statestack symstack = [] # Stack of grammar symbols self.symstack = symstack pslice.stack = symstack # Put in the production errtoken = None # Err token # The start state is assumed to be (0,$end) statestack.append(0) sym = YaccSymbol() sym.type = '$end' symstack.append(sym) state = 0 while True: # Get the next symbol on the input. If a lookahead symbol # is already set, we just use that. Otherwise, we'll pull # the next token off of the lookaheadstack or from the lexer #--! DEBUG debug.debug('') debug.debug('State : %s', state) #--! DEBUG if state not in defaulted_states: if not lookahead: if not lookaheadstack: lookahead = get_token() # Get the next token else: lookahead = lookaheadstack.pop() if not lookahead: lookahead = YaccSymbol() lookahead.type = '$end' # Check the action table ltype = lookahead.type t = actions[state].get(ltype) else: t = defaulted_states[state] #--! DEBUG debug.debug('Defaulted state %s: Reduce using %d', state, -t) #--! DEBUG #--! DEBUG debug.debug('Stack : %s', ('%s . %s' % (' '.join([xx.type for xx in symstack][1:]), str(lookahead))).lstrip()) #--! DEBUG if t is not None: if t > 0: # shift a symbol on the stack statestack.append(t) state = t #--! DEBUG debug.debug('Action : Shift and goto state %s', t) #--! DEBUG symstack.append(lookahead) lookahead = None # Decrease error count on successful shift if errorcount: errorcount -= 1 continue if t < 0: # reduce a symbol on the stack, emit a production p = prod[-t] pname = p.name plen = p.len # Get production function sym = YaccSymbol() sym.type = pname # Production name sym.value = None #--! DEBUG if plen: debug.info('Action : Reduce rule [%s] with %s and goto state %d', p.str, '['+','.join([format_stack_entry(_v.value) for _v in symstack[-plen:]])+']', goto[statestack[-1-plen]][pname]) else: debug.info('Action : Reduce rule [%s] with %s and goto state %d', p.str, [], goto[statestack[-1]][pname]) #--! DEBUG if plen: targ = symstack[-plen-1:] targ[0] = sym #--! TRACKING if tracking: t1 = targ[1] sym.lineno = t1.lineno sym.lexpos = t1.lexpos t1 = targ[-1] sym.endlineno = getattr(t1, 'endlineno', t1.lineno) sym.endlexpos = getattr(t1, 'endlexpos', t1.lexpos) #--! TRACKING # !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! # The code enclosed in this section is duplicated # below as a performance optimization. Make sure # changes get made in both locations. pslice.slice = targ try: # Call the grammar rule with our special slice object del symstack[-plen:] self.state = state p.callable(pslice) del statestack[-plen:] #--! DEBUG debug.info('Result : %s', format_result(pslice[0])) #--! DEBUG symstack.append(sym) state = goto[statestack[-1]][pname] statestack.append(state) except SyntaxError: # If an error was set. Enter error recovery state lookaheadstack.append(lookahead) # Save the current lookahead token symstack.extend(targ[1:-1]) # Put the production slice back on the stack statestack.pop() # Pop back one state (before the reduce) state = statestack[-1] sym.type = 'error' sym.value = 'error' lookahead = sym errorcount = error_count self.errorok = False continue # !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! else: #--! TRACKING if tracking: sym.lineno = lexer.lineno sym.lexpos = lexer.lexpos #--! TRACKING targ = [sym] # !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! # The code enclosed in this section is duplicated # above as a performance optimization. Make sure # changes get made in both locations. pslice.slice = targ try: # Call the grammar rule with our special slice object self.state = state p.callable(pslice) #--! DEBUG debug.info('Result : %s', format_result(pslice[0])) #--! DEBUG symstack.append(sym) state = goto[statestack[-1]][pname] statestack.append(state) except SyntaxError: # If an error was set. Enter error recovery state lookaheadstack.append(lookahead) # Save the current lookahead token statestack.pop() # Pop back one state (before the reduce) state = statestack[-1] sym.type = 'error' sym.value = 'error' lookahead = sym errorcount = error_count self.errorok = False continue # !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! if t == 0: n = symstack[-1] result = getattr(n, 'value', None) #--! DEBUG debug.info('Done : Returning %s', format_result(result)) debug.info('PLY: PARSE DEBUG END') #--! DEBUG return result if t is None: #--! DEBUG debug.error('Error : %s', ('%s . %s' % (' '.join([xx.type for xx in symstack][1:]), str(lookahead))).lstrip()) #--! DEBUG # We have some kind of parsing error here. To handle # this, we are going to push the current token onto # the tokenstack and replace it with an 'error' token. # If there are any synchronization rules, they may # catch it. # # In addition to pushing the error token, we call call # the user defined p_error() function if this is the # first syntax error. This function is only called if # errorcount == 0. if errorcount == 0 or self.errorok: errorcount = error_count self.errorok = False errtoken = lookahead if errtoken.type == '$end': errtoken = None # End of file! if self.errorfunc: if errtoken and not hasattr(errtoken, 'lexer'): errtoken.lexer = lexer self.state = state tok = call_errorfunc(self.errorfunc, errtoken, self) if self.errorok: # User must have done some kind of panic # mode recovery on their own. The # returned token is the next lookahead lookahead = tok errtoken = None continue else: if errtoken: if hasattr(errtoken, 'lineno'): lineno = lookahead.lineno else: lineno = 0 if lineno: sys.stderr.write('yacc: Syntax error at line %d, token=%s\n' % (lineno, errtoken.type)) else: sys.stderr.write('yacc: Syntax error, token=%s' % errtoken.type) else: sys.stderr.write('yacc: Parse error in input. EOF\n') return else: errorcount = error_count # case 1: the statestack only has 1 entry on it. If we're in this state, the # entire parse has been rolled back and we're completely hosed. The token is # discarded and we just keep going. if len(statestack) <= 1 and lookahead.type != '$end': lookahead = None errtoken = None state = 0 # Nuke the pushback stack del lookaheadstack[:] continue # case 2: the statestack has a couple of entries on it, but we're # at the end of the file. nuke the top entry and generate an error token # Start nuking entries on the stack if lookahead.type == '$end': # Whoa. We're really hosed here. Bail out return if lookahead.type != 'error': sym = symstack[-1] if sym.type == 'error': # Hmmm. Error is on top of stack, we'll just nuke input # symbol and continue #--! TRACKING if tracking: sym.endlineno = getattr(lookahead, 'lineno', sym.lineno) sym.endlexpos = getattr(lookahead, 'lexpos', sym.lexpos) #--! TRACKING lookahead = None continue # Create the error symbol for the first time and make it the new lookahead symbol t = YaccSymbol() t.type = 'error' if hasattr(lookahead, 'lineno'): t.lineno = t.endlineno = lookahead.lineno if hasattr(lookahead, 'lexpos'): t.lexpos = t.endlexpos = lookahead.lexpos t.value = lookahead lookaheadstack.append(lookahead) lookahead = t else: sym = symstack.pop() #--! TRACKING if tracking: lookahead.lineno = sym.lineno lookahead.lexpos = sym.lexpos #--! TRACKING statestack.pop() state = statestack[-1] continue # Call an error function here raise RuntimeError('yacc: internal parser error!!!\n') #--! parsedebug-end # !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! # parseopt(). # # Optimized version of parse() method. DO NOT EDIT THIS CODE DIRECTLY! # This code is automatically generated by the ply/ygen.py script. Make # changes to the parsedebug() method instead. # !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! def parseopt(self, input=None, lexer=None, debug=False, tracking=False, tokenfunc=None): #--! parseopt-start lookahead = None # Current lookahead symbol lookaheadstack = [] # Stack of lookahead symbols actions = self.action # Local reference to action table (to avoid lookup on self.) goto = self.goto # Local reference to goto table (to avoid lookup on self.) prod = self.productions # Local reference to production list (to avoid lookup on self.) defaulted_states = self.defaulted_states # Local reference to defaulted states pslice = YaccProduction(None) # Production object passed to grammar rules errorcount = 0 # Used during error recovery # If no lexer was given, we will try to use the lex module if not lexer: from . import lex lexer = lex.lexer # Set up the lexer and parser objects on pslice pslice.lexer = lexer pslice.parser = self # If input was supplied, pass to lexer if input is not None: lexer.input(input) if tokenfunc is None: # Tokenize function get_token = lexer.token else: get_token = tokenfunc # Set the parser() token method (sometimes used in error recovery) self.token = get_token # Set up the state and symbol stacks statestack = [] # Stack of parsing states self.statestack = statestack symstack = [] # Stack of grammar symbols self.symstack = symstack pslice.stack = symstack # Put in the production errtoken = None # Err token # The start state is assumed to be (0,$end) statestack.append(0) sym = YaccSymbol() sym.type = '$end' symstack.append(sym) state = 0 while True: # Get the next symbol on the input. If a lookahead symbol # is already set, we just use that. Otherwise, we'll pull # the next token off of the lookaheadstack or from the lexer if state not in defaulted_states: if not lookahead: if not lookaheadstack: lookahead = get_token() # Get the next token else: lookahead = lookaheadstack.pop() if not lookahead: lookahead = YaccSymbol() lookahead.type = '$end' # Check the action table ltype = lookahead.type t = actions[state].get(ltype) else: t = defaulted_states[state] if t is not None: if t > 0: # shift a symbol on the stack statestack.append(t) state = t symstack.append(lookahead) lookahead = None # Decrease error count on successful shift if errorcount: errorcount -= 1 continue if t < 0: # reduce a symbol on the stack, emit a production p = prod[-t] pname = p.name plen = p.len # Get production function sym = YaccSymbol() sym.type = pname # Production name sym.value = None if plen: targ = symstack[-plen-1:] targ[0] = sym #--! TRACKING if tracking: t1 = targ[1] sym.lineno = t1.lineno sym.lexpos = t1.lexpos t1 = targ[-1] sym.endlineno = getattr(t1, 'endlineno', t1.lineno) sym.endlexpos = getattr(t1, 'endlexpos', t1.lexpos) #--! TRACKING # !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! # The code enclosed in this section is duplicated # below as a performance optimization. Make sure # changes get made in both locations. pslice.slice = targ try: # Call the grammar rule with our special slice object del symstack[-plen:] self.state = state p.callable(pslice) del statestack[-plen:] symstack.append(sym) state = goto[statestack[-1]][pname] statestack.append(state) except SyntaxError: # If an error was set. Enter error recovery state lookaheadstack.append(lookahead) # Save the current lookahead token symstack.extend(targ[1:-1]) # Put the production slice back on the stack statestack.pop() # Pop back one state (before the reduce) state = statestack[-1] sym.type = 'error' sym.value = 'error' lookahead = sym errorcount = error_count self.errorok = False continue # !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! else: #--! TRACKING if tracking: sym.lineno = lexer.lineno sym.lexpos = lexer.lexpos #--! TRACKING targ = [sym] # !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! # The code enclosed in this section is duplicated # above as a performance optimization. Make sure # changes get made in both locations. pslice.slice = targ try: # Call the grammar rule with our special slice object self.state = state p.callable(pslice) symstack.append(sym) state = goto[statestack[-1]][pname] statestack.append(state) except SyntaxError: # If an error was set. Enter error recovery state lookaheadstack.append(lookahead) # Save the current lookahead token statestack.pop() # Pop back one state (before the reduce) state = statestack[-1] sym.type = 'error' sym.value = 'error' lookahead = sym errorcount = error_count self.errorok = False continue # !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! if t == 0: n = symstack[-1] result = getattr(n, 'value', None) return result if t is None: # We have some kind of parsing error here. To handle # this, we are going to push the current token onto # the tokenstack and replace it with an 'error' token. # If there are any synchronization rules, they may # catch it. # # In addition to pushing the error token, we call call # the user defined p_error() function if this is the # first syntax error. This function is only called if # errorcount == 0. if errorcount == 0 or self.errorok: errorcount = error_count self.errorok = False errtoken = lookahead if errtoken.type == '$end': errtoken = None # End of file! if self.errorfunc: if errtoken and not hasattr(errtoken, 'lexer'): errtoken.lexer = lexer self.state = state tok = call_errorfunc(self.errorfunc, errtoken, self) if self.errorok: # User must have done some kind of panic # mode recovery on their own. The # returned token is the next lookahead lookahead = tok errtoken = None continue else: if errtoken: if hasattr(errtoken, 'lineno'): lineno = lookahead.lineno else: lineno = 0 if lineno: sys.stderr.write('yacc: Syntax error at line %d, token=%s\n' % (lineno, errtoken.type)) else: sys.stderr.write('yacc: Syntax error, token=%s' % errtoken.type) else: sys.stderr.write('yacc: Parse error in input. EOF\n') return else: errorcount = error_count # case 1: the statestack only has 1 entry on it. If we're in this state, the # entire parse has been rolled back and we're completely hosed. The token is # discarded and we just keep going. if len(statestack) <= 1 and lookahead.type != '$end': lookahead = None errtoken = None state = 0 # Nuke the pushback stack del lookaheadstack[:] continue # case 2: the statestack has a couple of entries on it, but we're # at the end of the file. nuke the top entry and generate an error token # Start nuking entries on the stack if lookahead.type == '$end': # Whoa. We're really hosed here. Bail out return if lookahead.type != 'error': sym = symstack[-1] if sym.type == 'error': # Hmmm. Error is on top of stack, we'll just nuke input # symbol and continue #--! TRACKING if tracking: sym.endlineno = getattr(lookahead, 'lineno', sym.lineno) sym.endlexpos = getattr(lookahead, 'lexpos', sym.lexpos) #--! TRACKING lookahead = None continue # Create the error symbol for the first time and make it the new lookahead symbol t = YaccSymbol() t.type = 'error' if hasattr(lookahead, 'lineno'): t.lineno = t.endlineno = lookahead.lineno if hasattr(lookahead, 'lexpos'): t.lexpos = t.endlexpos = lookahead.lexpos t.value = lookahead lookaheadstack.append(lookahead) lookahead = t else: sym = symstack.pop() #--! TRACKING if tracking: lookahead.lineno = sym.lineno lookahead.lexpos = sym.lexpos #--! TRACKING statestack.pop() state = statestack[-1] continue # Call an error function here raise RuntimeError('yacc: internal parser error!!!\n') #--! parseopt-end # !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! # parseopt_notrack(). # # Optimized version of parseopt() with line number tracking removed. # DO NOT EDIT THIS CODE DIRECTLY. This code is automatically generated # by the ply/ygen.py script. Make changes to the parsedebug() method instead. # !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! def parseopt_notrack(self, input=None, lexer=None, debug=False, tracking=False, tokenfunc=None): #--! parseopt-notrack-start lookahead = None # Current lookahead symbol lookaheadstack = [] # Stack of lookahead symbols actions = self.action # Local reference to action table (to avoid lookup on self.) goto = self.goto # Local reference to goto table (to avoid lookup on self.) prod = self.productions # Local reference to production list (to avoid lookup on self.) defaulted_states = self.defaulted_states # Local reference to defaulted states pslice = YaccProduction(None) # Production object passed to grammar rules errorcount = 0 # Used during error recovery # If no lexer was given, we will try to use the lex module if not lexer: from . import lex lexer = lex.lexer # Set up the lexer and parser objects on pslice pslice.lexer = lexer pslice.parser = self # If input was supplied, pass to lexer if input is not None: lexer.input(input) if tokenfunc is None: # Tokenize function get_token = lexer.token else: get_token = tokenfunc # Set the parser() token method (sometimes used in error recovery) self.token = get_token # Set up the state and symbol stacks statestack = [] # Stack of parsing states self.statestack = statestack symstack = [] # Stack of grammar symbols self.symstack = symstack pslice.stack = symstack # Put in the production errtoken = None # Err token # The start state is assumed to be (0,$end) statestack.append(0) sym = YaccSymbol() sym.type = '$end' symstack.append(sym) state = 0 while True: # Get the next symbol on the input. If a lookahead symbol # is already set, we just use that. Otherwise, we'll pull # the next token off of the lookaheadstack or from the lexer if state not in defaulted_states: if not lookahead: if not lookaheadstack: lookahead = get_token() # Get the next token else: lookahead = lookaheadstack.pop() if not lookahead: lookahead = YaccSymbol() lookahead.type = '$end' # Check the action table ltype = lookahead.type t = actions[state].get(ltype) else: t = defaulted_states[state] if t is not None: if t > 0: # shift a symbol on the stack statestack.append(t) state = t symstack.append(lookahead) lookahead = None # Decrease error count on successful shift if errorcount: errorcount -= 1 continue if t < 0: # reduce a symbol on the stack, emit a production p = prod[-t] pname = p.name plen = p.len # Get production function sym = YaccSymbol() sym.type = pname # Production name sym.value = None if plen: targ = symstack[-plen-1:] targ[0] = sym # !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! # The code enclosed in this section is duplicated # below as a performance optimization. Make sure # changes get made in both locations. pslice.slice = targ try: # Call the grammar rule with our special slice object del symstack[-plen:] self.state = state p.callable(pslice) del statestack[-plen:] symstack.append(sym) state = goto[statestack[-1]][pname] statestack.append(state) except SyntaxError: # If an error was set. Enter error recovery state lookaheadstack.append(lookahead) # Save the current lookahead token symstack.extend(targ[1:-1]) # Put the production slice back on the stack statestack.pop() # Pop back one state (before the reduce) state = statestack[-1] sym.type = 'error' sym.value = 'error' lookahead = sym errorcount = error_count self.errorok = False continue # !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! else: targ = [sym] # !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! # The code enclosed in this section is duplicated # above as a performance optimization. Make sure # changes get made in both locations. pslice.slice = targ try: # Call the grammar rule with our special slice object self.state = state p.callable(pslice) symstack.append(sym) state = goto[statestack[-1]][pname] statestack.append(state) except SyntaxError: # If an error was set. Enter error recovery state lookaheadstack.append(lookahead) # Save the current lookahead token statestack.pop() # Pop back one state (before the reduce) state = statestack[-1] sym.type = 'error' sym.value = 'error' lookahead = sym errorcount = error_count self.errorok = False continue # !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! if t == 0: n = symstack[-1] result = getattr(n, 'value', None) return result if t is None: # We have some kind of parsing error here. To handle # this, we are going to push the current token onto # the tokenstack and replace it with an 'error' token. # If there are any synchronization rules, they may # catch it. # # In addition to pushing the error token, we call call # the user defined p_error() function if this is the # first syntax error. This function is only called if # errorcount == 0. if errorcount == 0 or self.errorok: errorcount = error_count self.errorok = False errtoken = lookahead if errtoken.type == '$end': errtoken = None # End of file! if self.errorfunc: if errtoken and not hasattr(errtoken, 'lexer'): errtoken.lexer = lexer self.state = state tok = call_errorfunc(self.errorfunc, errtoken, self) if self.errorok: # User must have done some kind of panic # mode recovery on their own. The # returned token is the next lookahead lookahead = tok errtoken = None continue else: if errtoken: if hasattr(errtoken, 'lineno'): lineno = lookahead.lineno else: lineno = 0 if lineno: sys.stderr.write('yacc: Syntax error at line %d, token=%s\n' % (lineno, errtoken.type)) else: sys.stderr.write('yacc: Syntax error, token=%s' % errtoken.type) else: sys.stderr.write('yacc: Parse error in input. EOF\n') return else: errorcount = error_count # case 1: the statestack only has 1 entry on it. If we're in this state, the # entire parse has been rolled back and we're completely hosed. The token is # discarded and we just keep going. if len(statestack) <= 1 and lookahead.type != '$end': lookahead = None errtoken = None state = 0 # Nuke the pushback stack del lookaheadstack[:] continue # case 2: the statestack has a couple of entries on it, but we're # at the end of the file. nuke the top entry and generate an error token # Start nuking entries on the stack if lookahead.type == '$end': # Whoa. We're really hosed here. Bail out return if lookahead.type != 'error': sym = symstack[-1] if sym.type == 'error': # Hmmm. Error is on top of stack, we'll just nuke input # symbol and continue lookahead = None continue # Create the error symbol for the first time and make it the new lookahead symbol t = YaccSymbol() t.type = 'error' if hasattr(lookahead, 'lineno'): t.lineno = t.endlineno = lookahead.lineno if hasattr(lookahead, 'lexpos'): t.lexpos = t.endlexpos = lookahead.lexpos t.value = lookahead lookaheadstack.append(lookahead) lookahead = t else: sym = symstack.pop() statestack.pop() state = statestack[-1] continue # Call an error function here raise RuntimeError('yacc: internal parser error!!!\n') #--! parseopt-notrack-end # ----------------------------------------------------------------------------- # === Grammar Representation === # # The following functions, classes, and variables are used to represent and # manipulate the rules that make up a grammar. # ----------------------------------------------------------------------------- # regex matching identifiers _is_identifier = re.compile(r'^[a-zA-Z0-9_-]+$') # ----------------------------------------------------------------------------- # class Production: # # This class stores the raw information about a single production or grammar rule. # A grammar rule refers to a specification such as this: # # expr : expr PLUS term # # Here are the basic attributes defined on all productions # # name - Name of the production. For example 'expr' # prod - A list of symbols on the right side ['expr','PLUS','term'] # prec - Production precedence level # number - Production number. # func - Function that executes on reduce # file - File where production function is defined # lineno - Line number where production function is defined # # The following attributes are defined or optional. # # len - Length of the production (number of symbols on right hand side) # usyms - Set of unique symbols found in the production # ----------------------------------------------------------------------------- class Production(object): reduced = 0 def __init__(self, number, name, prod, precedence=('right', 0), func=None, file='', line=0): self.name = name self.prod = tuple(prod) self.number = number self.func = func self.callable = None self.file = file self.line = line self.prec = precedence # Internal settings used during table construction self.len = len(self.prod) # Length of the production # Create a list of unique production symbols used in the production self.usyms = [] for s in self.prod: if s not in self.usyms: self.usyms.append(s) # List of all LR items for the production self.lr_items = [] self.lr_next = None # Create a string representation if self.prod: self.str = '%s -> %s' % (self.name, ' '.join(self.prod)) else: self.str = '%s -> ' % self.name def __str__(self): return self.str def __repr__(self): return 'Production(' + str(self) + ')' def __len__(self): return len(self.prod) def __nonzero__(self): return 1 def __getitem__(self, index): return self.prod[index] # Return the nth lr_item from the production (or None if at the end) def lr_item(self, n): if n > len(self.prod): return None p = LRItem(self, n) # Precompute the list of productions immediately following. try: p.lr_after = self.Prodnames[p.prod[n+1]] except (IndexError, KeyError): p.lr_after = [] try: p.lr_before = p.prod[n-1] except IndexError: p.lr_before = None return p # Bind the production function name to a callable def bind(self, pdict): if self.func: self.callable = pdict[self.func] # This class serves as a minimal standin for Production objects when # reading table data from files. It only contains information # actually used by the LR parsing engine, plus some additional # debugging information. class MiniProduction(object): def __init__(self, str, name, len, func, file, line): self.name = name self.len = len self.func = func self.callable = None self.file = file self.line = line self.str = str def __str__(self): return self.str def __repr__(self): return 'MiniProduction(%s)' % self.str # Bind the production function name to a callable def bind(self, pdict): if self.func: self.callable = pdict[self.func] # ----------------------------------------------------------------------------- # class LRItem # # This class represents a specific stage of parsing a production rule. For # example: # # expr : expr . PLUS term # # In the above, the "." represents the current location of the parse. Here # basic attributes: # # name - Name of the production. For example 'expr' # prod - A list of symbols on the right side ['expr','.', 'PLUS','term'] # number - Production number. # # lr_next Next LR item. Example, if we are ' expr -> expr . PLUS term' # then lr_next refers to 'expr -> expr PLUS . term' # lr_index - LR item index (location of the ".") in the prod list. # lookaheads - LALR lookahead symbols for this item # len - Length of the production (number of symbols on right hand side) # lr_after - List of all productions that immediately follow # lr_before - Grammar symbol immediately before # ----------------------------------------------------------------------------- class LRItem(object): def __init__(self, p, n): self.name = p.name self.prod = list(p.prod) self.number = p.number self.lr_index = n self.lookaheads = {} self.prod.insert(n, '.') self.prod = tuple(self.prod) self.len = len(self.prod) self.usyms = p.usyms def __str__(self): if self.prod: s = '%s -> %s' % (self.name, ' '.join(self.prod)) else: s = '%s -> ' % self.name return s def __repr__(self): return 'LRItem(' + str(self) + ')' # ----------------------------------------------------------------------------- # rightmost_terminal() # # Return the rightmost terminal from a list of symbols. Used in add_production() # ----------------------------------------------------------------------------- def rightmost_terminal(symbols, terminals): i = len(symbols) - 1 while i >= 0: if symbols[i] in terminals: return symbols[i] i -= 1 return None # ----------------------------------------------------------------------------- # === GRAMMAR CLASS === # # The following class represents the contents of the specified grammar along # with various computed properties such as first sets, follow sets, LR items, etc. # This data is used for critical parts of the table generation process later. # ----------------------------------------------------------------------------- class GrammarError(YaccError): pass class Grammar(object): def __init__(self, terminals): self.Productions = [None] # A list of all of the productions. The first # entry is always reserved for the purpose of # building an augmented grammar self.Prodnames = {} # A dictionary mapping the names of nonterminals to a list of all # productions of that nonterminal. self.Prodmap = {} # A dictionary that is only used to detect duplicate # productions. self.Terminals = {} # A dictionary mapping the names of terminal symbols to a # list of the rules where they are used. for term in terminals: self.Terminals[term] = [] self.Terminals['error'] = [] self.Nonterminals = {} # A dictionary mapping names of nonterminals to a list # of rule numbers where they are used. self.First = {} # A dictionary of precomputed FIRST(x) symbols self.Follow = {} # A dictionary of precomputed FOLLOW(x) symbols self.Precedence = {} # Precedence rules for each terminal. Contains tuples of the # form ('right',level) or ('nonassoc', level) or ('left',level) self.UsedPrecedence = set() # Precedence rules that were actually used by the grammer. # This is only used to provide error checking and to generate # a warning about unused precedence rules. self.Start = None # Starting symbol for the grammar def __len__(self): return len(self.Productions) def __getitem__(self, index): return self.Productions[index] # ----------------------------------------------------------------------------- # set_precedence() # # Sets the precedence for a given terminal. assoc is the associativity such as # 'left','right', or 'nonassoc'. level is a numeric level. # # ----------------------------------------------------------------------------- def set_precedence(self, term, assoc, level): assert self.Productions == [None], 'Must call set_precedence() before add_production()' if term in self.Precedence: raise GrammarError('Precedence already specified for terminal %r' % term) if assoc not in ['left', 'right', 'nonassoc']: raise GrammarError("Associativity must be one of 'left','right', or 'nonassoc'") self.Precedence[term] = (assoc, level) # ----------------------------------------------------------------------------- # add_production() # # Given an action function, this function assembles a production rule and # computes its precedence level. # # The production rule is supplied as a list of symbols. For example, # a rule such as 'expr : expr PLUS term' has a production name of 'expr' and # symbols ['expr','PLUS','term']. # # Precedence is determined by the precedence of the right-most non-terminal # or the precedence of a terminal specified by %prec. # # A variety of error checks are performed to make sure production symbols # are valid and that %prec is used correctly. # ----------------------------------------------------------------------------- def add_production(self, prodname, syms, func=None, file='', line=0): if prodname in self.Terminals: raise GrammarError('%s:%d: Illegal rule name %r. Already defined as a token' % (file, line, prodname)) if prodname == 'error': raise GrammarError('%s:%d: Illegal rule name %r. error is a reserved word' % (file, line, prodname)) if not _is_identifier.match(prodname): raise GrammarError('%s:%d: Illegal rule name %r' % (file, line, prodname)) # Look for literal tokens for n, s in enumerate(syms): if s[0] in "'\"": try: c = eval(s) if (len(c) > 1): raise GrammarError('%s:%d: Literal token %s in rule %r may only be a single character' % (file, line, s, prodname)) if c not in self.Terminals: self.Terminals[c] = [] syms[n] = c continue except SyntaxError: pass if not _is_identifier.match(s) and s != '%prec': raise GrammarError('%s:%d: Illegal name %r in rule %r' % (file, line, s, prodname)) # Determine the precedence level if '%prec' in syms: if syms[-1] == '%prec': raise GrammarError('%s:%d: Syntax error. Nothing follows %%prec' % (file, line)) if syms[-2] != '%prec': raise GrammarError('%s:%d: Syntax error. %%prec can only appear at the end of a grammar rule' % (file, line)) precname = syms[-1] prodprec = self.Precedence.get(precname) if not prodprec: raise GrammarError('%s:%d: Nothing known about the precedence of %r' % (file, line, precname)) else: self.UsedPrecedence.add(precname) del syms[-2:] # Drop %prec from the rule else: # If no %prec, precedence is determined by the rightmost terminal symbol precname = rightmost_terminal(syms, self.Terminals) prodprec = self.Precedence.get(precname, ('right', 0)) # See if the rule is already in the rulemap map = '%s -> %s' % (prodname, syms) if map in self.Prodmap: m = self.Prodmap[map] raise GrammarError('%s:%d: Duplicate rule %s. ' % (file, line, m) + 'Previous definition at %s:%d' % (m.file, m.line)) # From this point on, everything is valid. Create a new Production instance pnumber = len(self.Productions) if prodname not in self.Nonterminals: self.Nonterminals[prodname] = [] # Add the production number to Terminals and Nonterminals for t in syms: if t in self.Terminals: self.Terminals[t].append(pnumber) else: if t not in self.Nonterminals: self.Nonterminals[t] = [] self.Nonterminals[t].append(pnumber) # Create a production and add it to the list of productions p = Production(pnumber, prodname, syms, prodprec, func, file, line) self.Productions.append(p) self.Prodmap[map] = p # Add to the global productions list try: self.Prodnames[prodname].append(p) except KeyError: self.Prodnames[prodname] = [p] # ----------------------------------------------------------------------------- # set_start() # # Sets the starting symbol and creates the augmented grammar. Production # rule 0 is S' -> start where start is the start symbol. # ----------------------------------------------------------------------------- def set_start(self, start=None): if not start: start = self.Productions[1].name if start not in self.Nonterminals: raise GrammarError('start symbol %s undefined' % start) self.Productions[0] = Production(0, "S'", [start]) self.Nonterminals[start].append(0) self.Start = start # ----------------------------------------------------------------------------- # find_unreachable() # # Find all of the nonterminal symbols that can't be reached from the starting # symbol. Returns a list of nonterminals that can't be reached. # ----------------------------------------------------------------------------- def find_unreachable(self): # Mark all symbols that are reachable from a symbol s def mark_reachable_from(s): if s in reachable: return reachable.add(s) for p in self.Prodnames.get(s, []): for r in p.prod: mark_reachable_from(r) reachable = set() mark_reachable_from(self.Productions[0].prod[0]) return [s for s in self.Nonterminals if s not in reachable] # ----------------------------------------------------------------------------- # infinite_cycles() # # This function looks at the various parsing rules and tries to detect # infinite recursion cycles (grammar rules where there is no possible way # to derive a string of only terminals). # ----------------------------------------------------------------------------- def infinite_cycles(self): terminates = {} # Terminals: for t in self.Terminals: terminates[t] = True terminates['$end'] = True # Nonterminals: # Initialize to false: for n in self.Nonterminals: terminates[n] = False # Then propagate termination until no change: while True: some_change = False for (n, pl) in self.Prodnames.items(): # Nonterminal n terminates iff any of its productions terminates. for p in pl: # Production p terminates iff all of its rhs symbols terminate. for s in p.prod: if not terminates[s]: # The symbol s does not terminate, # so production p does not terminate. p_terminates = False break else: # didn't break from the loop, # so every symbol s terminates # so production p terminates. p_terminates = True if p_terminates: # symbol n terminates! if not terminates[n]: terminates[n] = True some_change = True # Don't need to consider any more productions for this n. break if not some_change: break infinite = [] for (s, term) in terminates.items(): if not term: if s not in self.Prodnames and s not in self.Terminals and s != 'error': # s is used-but-not-defined, and we've already warned of that, # so it would be overkill to say that it's also non-terminating. pass else: infinite.append(s) return infinite # ----------------------------------------------------------------------------- # undefined_symbols() # # Find all symbols that were used the grammar, but not defined as tokens or # grammar rules. Returns a list of tuples (sym, prod) where sym in the symbol # and prod is the production where the symbol was used. # ----------------------------------------------------------------------------- def undefined_symbols(self): result = [] for p in self.Productions: if not p: continue for s in p.prod: if s not in self.Prodnames and s not in self.Terminals and s != 'error': result.append((s, p)) return result # ----------------------------------------------------------------------------- # unused_terminals() # # Find all terminals that were defined, but not used by the grammar. Returns # a list of all symbols. # ----------------------------------------------------------------------------- def unused_terminals(self): unused_tok = [] for s, v in self.Terminals.items(): if s != 'error' and not v: unused_tok.append(s) return unused_tok # ------------------------------------------------------------------------------ # unused_rules() # # Find all grammar rules that were defined, but not used (maybe not reachable) # Returns a list of productions. # ------------------------------------------------------------------------------ def unused_rules(self): unused_prod = [] for s, v in self.Nonterminals.items(): if not v: p = self.Prodnames[s][0] unused_prod.append(p) return unused_prod # ----------------------------------------------------------------------------- # unused_precedence() # # Returns a list of tuples (term,precedence) corresponding to precedence # rules that were never used by the grammar. term is the name of the terminal # on which precedence was applied and precedence is a string such as 'left' or # 'right' corresponding to the type of precedence. # ----------------------------------------------------------------------------- def unused_precedence(self): unused = [] for termname in self.Precedence: if not (termname in self.Terminals or termname in self.UsedPrecedence): unused.append((termname, self.Precedence[termname][0])) return unused # ------------------------------------------------------------------------- # _first() # # Compute the value of FIRST1(beta) where beta is a tuple of symbols. # # During execution of compute_first1, the result may be incomplete. # Afterward (e.g., when called from compute_follow()), it will be complete. # ------------------------------------------------------------------------- def _first(self, beta): # We are computing First(x1,x2,x3,...,xn) result = [] for x in beta: x_produces_empty = False # Add all the non- symbols of First[x] to the result. for f in self.First[x]: if f == '': x_produces_empty = True else: if f not in result: result.append(f) if x_produces_empty: # We have to consider the next x in beta, # i.e. stay in the loop. pass else: # We don't have to consider any further symbols in beta. break else: # There was no 'break' from the loop, # so x_produces_empty was true for all x in beta, # so beta produces empty as well. result.append('') return result # ------------------------------------------------------------------------- # compute_first() # # Compute the value of FIRST1(X) for all symbols # ------------------------------------------------------------------------- def compute_first(self): if self.First: return self.First # Terminals: for t in self.Terminals: self.First[t] = [t] self.First['$end'] = ['$end'] # Nonterminals: # Initialize to the empty set: for n in self.Nonterminals: self.First[n] = [] # Then propagate symbols until no change: while True: some_change = False for n in self.Nonterminals: for p in self.Prodnames[n]: for f in self._first(p.prod): if f not in self.First[n]: self.First[n].append(f) some_change = True if not some_change: break return self.First # --------------------------------------------------------------------- # compute_follow() # # Computes all of the follow sets for every non-terminal symbol. The # follow set is the set of all symbols that might follow a given # non-terminal. See the Dragon book, 2nd Ed. p. 189. # --------------------------------------------------------------------- def compute_follow(self, start=None): # If already computed, return the result if self.Follow: return self.Follow # If first sets not computed yet, do that first. if not self.First: self.compute_first() # Add '$end' to the follow list of the start symbol for k in self.Nonterminals: self.Follow[k] = [] if not start: start = self.Productions[1].name self.Follow[start] = ['$end'] while True: didadd = False for p in self.Productions[1:]: # Here is the production set for i, B in enumerate(p.prod): if B in self.Nonterminals: # Okay. We got a non-terminal in a production fst = self._first(p.prod[i+1:]) hasempty = False for f in fst: if f != '' and f not in self.Follow[B]: self.Follow[B].append(f) didadd = True if f == '': hasempty = True if hasempty or i == (len(p.prod)-1): # Add elements of follow(a) to follow(b) for f in self.Follow[p.name]: if f not in self.Follow[B]: self.Follow[B].append(f) didadd = True if not didadd: break return self.Follow # ----------------------------------------------------------------------------- # build_lritems() # # This function walks the list of productions and builds a complete set of the # LR items. The LR items are stored in two ways: First, they are uniquely # numbered and placed in the list _lritems. Second, a linked list of LR items # is built for each production. For example: # # E -> E PLUS E # # Creates the list # # [E -> . E PLUS E, E -> E . PLUS E, E -> E PLUS . E, E -> E PLUS E . ] # ----------------------------------------------------------------------------- def build_lritems(self): for p in self.Productions: lastlri = p i = 0 lr_items = [] while True: if i > len(p): lri = None else: lri = LRItem(p, i) # Precompute the list of productions immediately following try: lri.lr_after = self.Prodnames[lri.prod[i+1]] except (IndexError, KeyError): lri.lr_after = [] try: lri.lr_before = lri.prod[i-1] except IndexError: lri.lr_before = None lastlri.lr_next = lri if not lri: break lr_items.append(lri) lastlri = lri i += 1 p.lr_items = lr_items # ----------------------------------------------------------------------------- # == Class LRTable == # # This basic class represents a basic table of LR parsing information. # Methods for generating the tables are not defined here. They are defined # in the derived class LRGeneratedTable. # ----------------------------------------------------------------------------- class VersionError(YaccError): pass class LRTable(object): def __init__(self): self.lr_action = None self.lr_goto = None self.lr_productions = None self.lr_method = None def read_table(self, module): if isinstance(module, types.ModuleType): parsetab = module else: exec('import %s' % module) parsetab = sys.modules[module] if parsetab._tabversion != __tabversion__: raise VersionError('yacc table file version is out of date') self.lr_action = parsetab._lr_action self.lr_goto = parsetab._lr_goto self.lr_productions = [] for p in parsetab._lr_productions: self.lr_productions.append(MiniProduction(*p)) self.lr_method = parsetab._lr_method return parsetab._lr_signature def read_pickle(self, filename): try: import cPickle as pickle except ImportError: import pickle if not os.path.exists(filename): raise ImportError in_f = open(filename, 'rb') tabversion = pickle.load(in_f) if tabversion != __tabversion__: raise VersionError('yacc table file version is out of date') self.lr_method = pickle.load(in_f) signature = pickle.load(in_f) self.lr_action = pickle.load(in_f) self.lr_goto = pickle.load(in_f) productions = pickle.load(in_f) self.lr_productions = [] for p in productions: self.lr_productions.append(MiniProduction(*p)) in_f.close() return signature # Bind all production function names to callable objects in pdict def bind_callables(self, pdict): for p in self.lr_productions: p.bind(pdict) # ----------------------------------------------------------------------------- # === LR Generator === # # The following classes and functions are used to generate LR parsing tables on # a grammar. # ----------------------------------------------------------------------------- # ----------------------------------------------------------------------------- # digraph() # traverse() # # The following two functions are used to compute set valued functions # of the form: # # F(x) = F'(x) U U{F(y) | x R y} # # This is used to compute the values of Read() sets as well as FOLLOW sets # in LALR(1) generation. # # Inputs: X - An input set # R - A relation # FP - Set-valued function # ------------------------------------------------------------------------------ def digraph(X, R, FP): N = {} for x in X: N[x] = 0 stack = [] F = {} for x in X: if N[x] == 0: traverse(x, N, stack, F, X, R, FP) return F def traverse(x, N, stack, F, X, R, FP): stack.append(x) d = len(stack) N[x] = d F[x] = FP(x) # F(X) <- F'(x) rel = R(x) # Get y's related to x for y in rel: if N[y] == 0: traverse(y, N, stack, F, X, R, FP) N[x] = min(N[x], N[y]) for a in F.get(y, []): if a not in F[x]: F[x].append(a) if N[x] == d: N[stack[-1]] = MAXINT F[stack[-1]] = F[x] element = stack.pop() while element != x: N[stack[-1]] = MAXINT F[stack[-1]] = F[x] element = stack.pop() class LALRError(YaccError): pass # ----------------------------------------------------------------------------- # == LRGeneratedTable == # # This class implements the LR table generation algorithm. There are no # public methods except for write() # ----------------------------------------------------------------------------- class LRGeneratedTable(LRTable): def __init__(self, grammar, method='LALR', log=None): if method not in ['SLR', 'LALR']: raise LALRError('Unsupported method %s' % method) self.grammar = grammar self.lr_method = method # Set up the logger if not log: log = NullLogger() self.log = log # Internal attributes self.lr_action = {} # Action table self.lr_goto = {} # Goto table self.lr_productions = grammar.Productions # Copy of grammar Production array self.lr_goto_cache = {} # Cache of computed gotos self.lr0_cidhash = {} # Cache of closures self._add_count = 0 # Internal counter used to detect cycles # Diagonistic information filled in by the table generator self.sr_conflict = 0 self.rr_conflict = 0 self.conflicts = [] # List of conflicts self.sr_conflicts = [] self.rr_conflicts = [] # Build the tables self.grammar.build_lritems() self.grammar.compute_first() self.grammar.compute_follow() self.lr_parse_table() # Compute the LR(0) closure operation on I, where I is a set of LR(0) items. def lr0_closure(self, I): self._add_count += 1 # Add everything in I to J J = I[:] didadd = True while didadd: didadd = False for j in J: for x in j.lr_after: if getattr(x, 'lr0_added', 0) == self._add_count: continue # Add B --> .G to J J.append(x.lr_next) x.lr0_added = self._add_count didadd = True return J # Compute the LR(0) goto function goto(I,X) where I is a set # of LR(0) items and X is a grammar symbol. This function is written # in a way that guarantees uniqueness of the generated goto sets # (i.e. the same goto set will never be returned as two different Python # objects). With uniqueness, we can later do fast set comparisons using # id(obj) instead of element-wise comparison. def lr0_goto(self, I, x): # First we look for a previously cached entry g = self.lr_goto_cache.get((id(I), x)) if g: return g # Now we generate the goto set in a way that guarantees uniqueness # of the result s = self.lr_goto_cache.get(x) if not s: s = {} self.lr_goto_cache[x] = s gs = [] for p in I: n = p.lr_next if n and n.lr_before == x: s1 = s.get(id(n)) if not s1: s1 = {} s[id(n)] = s1 gs.append(n) s = s1 g = s.get('$end') if not g: if gs: g = self.lr0_closure(gs) s['$end'] = g else: s['$end'] = gs self.lr_goto_cache[(id(I), x)] = g return g # Compute the LR(0) sets of item function def lr0_items(self): C = [self.lr0_closure([self.grammar.Productions[0].lr_next])] i = 0 for I in C: self.lr0_cidhash[id(I)] = i i += 1 # Loop over the items in C and each grammar symbols i = 0 while i < len(C): I = C[i] i += 1 # Collect all of the symbols that could possibly be in the goto(I,X) sets asyms = {} for ii in I: for s in ii.usyms: asyms[s] = None for x in asyms: g = self.lr0_goto(I, x) if not g or id(g) in self.lr0_cidhash: continue self.lr0_cidhash[id(g)] = len(C) C.append(g) return C # ----------------------------------------------------------------------------- # ==== LALR(1) Parsing ==== # # LALR(1) parsing is almost exactly the same as SLR except that instead of # relying upon Follow() sets when performing reductions, a more selective # lookahead set that incorporates the state of the LR(0) machine is utilized. # Thus, we mainly just have to focus on calculating the lookahead sets. # # The method used here is due to DeRemer and Pennelo (1982). # # DeRemer, F. L., and T. J. Pennelo: "Efficient Computation of LALR(1) # Lookahead Sets", ACM Transactions on Programming Languages and Systems, # Vol. 4, No. 4, Oct. 1982, pp. 615-649 # # Further details can also be found in: # # J. Tremblay and P. Sorenson, "The Theory and Practice of Compiler Writing", # McGraw-Hill Book Company, (1985). # # ----------------------------------------------------------------------------- # ----------------------------------------------------------------------------- # compute_nullable_nonterminals() # # Creates a dictionary containing all of the non-terminals that might produce # an empty production. # ----------------------------------------------------------------------------- def compute_nullable_nonterminals(self): nullable = set() num_nullable = 0 while True: for p in self.grammar.Productions[1:]: if p.len == 0: nullable.add(p.name) continue for t in p.prod: if t not in nullable: break else: nullable.add(p.name) if len(nullable) == num_nullable: break num_nullable = len(nullable) return nullable # ----------------------------------------------------------------------------- # find_nonterminal_trans(C) # # Given a set of LR(0) items, this functions finds all of the non-terminal # transitions. These are transitions in which a dot appears immediately before # a non-terminal. Returns a list of tuples of the form (state,N) where state # is the state number and N is the nonterminal symbol. # # The input C is the set of LR(0) items. # ----------------------------------------------------------------------------- def find_nonterminal_transitions(self, C): trans = [] for stateno, state in enumerate(C): for p in state: if p.lr_index < p.len - 1: t = (stateno, p.prod[p.lr_index+1]) if t[1] in self.grammar.Nonterminals: if t not in trans: trans.append(t) return trans # ----------------------------------------------------------------------------- # dr_relation() # # Computes the DR(p,A) relationships for non-terminal transitions. The input # is a tuple (state,N) where state is a number and N is a nonterminal symbol. # # Returns a list of terminals. # ----------------------------------------------------------------------------- def dr_relation(self, C, trans, nullable): state, N = trans terms = [] g = self.lr0_goto(C[state], N) for p in g: if p.lr_index < p.len - 1: a = p.prod[p.lr_index+1] if a in self.grammar.Terminals: if a not in terms: terms.append(a) # This extra bit is to handle the start state if state == 0 and N == self.grammar.Productions[0].prod[0]: terms.append('$end') return terms # ----------------------------------------------------------------------------- # reads_relation() # # Computes the READS() relation (p,A) READS (t,C). # ----------------------------------------------------------------------------- def reads_relation(self, C, trans, empty): # Look for empty transitions rel = [] state, N = trans g = self.lr0_goto(C[state], N) j = self.lr0_cidhash.get(id(g), -1) for p in g: if p.lr_index < p.len - 1: a = p.prod[p.lr_index + 1] if a in empty: rel.append((j, a)) return rel # ----------------------------------------------------------------------------- # compute_lookback_includes() # # Determines the lookback and includes relations # # LOOKBACK: # # This relation is determined by running the LR(0) state machine forward. # For example, starting with a production "N : . A B C", we run it forward # to obtain "N : A B C ." We then build a relationship between this final # state and the starting state. These relationships are stored in a dictionary # lookdict. # # INCLUDES: # # Computes the INCLUDE() relation (p,A) INCLUDES (p',B). # # This relation is used to determine non-terminal transitions that occur # inside of other non-terminal transition states. (p,A) INCLUDES (p', B) # if the following holds: # # B -> LAT, where T -> epsilon and p' -L-> p # # L is essentially a prefix (which may be empty), T is a suffix that must be # able to derive an empty string. State p' must lead to state p with the string L. # # ----------------------------------------------------------------------------- def compute_lookback_includes(self, C, trans, nullable): lookdict = {} # Dictionary of lookback relations includedict = {} # Dictionary of include relations # Make a dictionary of non-terminal transitions dtrans = {} for t in trans: dtrans[t] = 1 # Loop over all transitions and compute lookbacks and includes for state, N in trans: lookb = [] includes = [] for p in C[state]: if p.name != N: continue # Okay, we have a name match. We now follow the production all the way # through the state machine until we get the . on the right hand side lr_index = p.lr_index j = state while lr_index < p.len - 1: lr_index = lr_index + 1 t = p.prod[lr_index] # Check to see if this symbol and state are a non-terminal transition if (j, t) in dtrans: # Yes. Okay, there is some chance that this is an includes relation # the only way to know for certain is whether the rest of the # production derives empty li = lr_index + 1 while li < p.len: if p.prod[li] in self.grammar.Terminals: break # No forget it if p.prod[li] not in nullable: break li = li + 1 else: # Appears to be a relation between (j,t) and (state,N) includes.append((j, t)) g = self.lr0_goto(C[j], t) # Go to next set j = self.lr0_cidhash.get(id(g), -1) # Go to next state # When we get here, j is the final state, now we have to locate the production for r in C[j]: if r.name != p.name: continue if r.len != p.len: continue i = 0 # This look is comparing a production ". A B C" with "A B C ." while i < r.lr_index: if r.prod[i] != p.prod[i+1]: break i = i + 1 else: lookb.append((j, r)) for i in includes: if i not in includedict: includedict[i] = [] includedict[i].append((state, N)) lookdict[(state, N)] = lookb return lookdict, includedict # ----------------------------------------------------------------------------- # compute_read_sets() # # Given a set of LR(0) items, this function computes the read sets. # # Inputs: C = Set of LR(0) items # ntrans = Set of nonterminal transitions # nullable = Set of empty transitions # # Returns a set containing the read sets # ----------------------------------------------------------------------------- def compute_read_sets(self, C, ntrans, nullable): FP = lambda x: self.dr_relation(C, x, nullable) R = lambda x: self.reads_relation(C, x, nullable) F = digraph(ntrans, R, FP) return F # ----------------------------------------------------------------------------- # compute_follow_sets() # # Given a set of LR(0) items, a set of non-terminal transitions, a readset, # and an include set, this function computes the follow sets # # Follow(p,A) = Read(p,A) U U {Follow(p',B) | (p,A) INCLUDES (p',B)} # # Inputs: # ntrans = Set of nonterminal transitions # readsets = Readset (previously computed) # inclsets = Include sets (previously computed) # # Returns a set containing the follow sets # ----------------------------------------------------------------------------- def compute_follow_sets(self, ntrans, readsets, inclsets): FP = lambda x: readsets[x] R = lambda x: inclsets.get(x, []) F = digraph(ntrans, R, FP) return F # ----------------------------------------------------------------------------- # add_lookaheads() # # Attaches the lookahead symbols to grammar rules. # # Inputs: lookbacks - Set of lookback relations # followset - Computed follow set # # This function directly attaches the lookaheads to productions contained # in the lookbacks set # ----------------------------------------------------------------------------- def add_lookaheads(self, lookbacks, followset): for trans, lb in lookbacks.items(): # Loop over productions in lookback for state, p in lb: if state not in p.lookaheads: p.lookaheads[state] = [] f = followset.get(trans, []) for a in f: if a not in p.lookaheads[state]: p.lookaheads[state].append(a) # ----------------------------------------------------------------------------- # add_lalr_lookaheads() # # This function does all of the work of adding lookahead information for use # with LALR parsing # ----------------------------------------------------------------------------- def add_lalr_lookaheads(self, C): # Determine all of the nullable nonterminals nullable = self.compute_nullable_nonterminals() # Find all non-terminal transitions trans = self.find_nonterminal_transitions(C) # Compute read sets readsets = self.compute_read_sets(C, trans, nullable) # Compute lookback/includes relations lookd, included = self.compute_lookback_includes(C, trans, nullable) # Compute LALR FOLLOW sets followsets = self.compute_follow_sets(trans, readsets, included) # Add all of the lookaheads self.add_lookaheads(lookd, followsets) # ----------------------------------------------------------------------------- # lr_parse_table() # # This function constructs the parse tables for SLR or LALR # ----------------------------------------------------------------------------- def lr_parse_table(self): Productions = self.grammar.Productions Precedence = self.grammar.Precedence goto = self.lr_goto # Goto array action = self.lr_action # Action array log = self.log # Logger for output actionp = {} # Action production array (temporary) log.info('Parsing method: %s', self.lr_method) # Step 1: Construct C = { I0, I1, ... IN}, collection of LR(0) items # This determines the number of states C = self.lr0_items() if self.lr_method == 'LALR': self.add_lalr_lookaheads(C) # Build the parser table, state by state st = 0 for I in C: # Loop over each production in I actlist = [] # List of actions st_action = {} st_actionp = {} st_goto = {} log.info('') log.info('state %d', st) log.info('') for p in I: log.info(' (%d) %s', p.number, p) log.info('') for p in I: if p.len == p.lr_index + 1: if p.name == "S'": # Start symbol. Accept! st_action['$end'] = 0 st_actionp['$end'] = p else: # We are at the end of a production. Reduce! if self.lr_method == 'LALR': laheads = p.lookaheads[st] else: laheads = self.grammar.Follow[p.name] for a in laheads: actlist.append((a, p, 'reduce using rule %d (%s)' % (p.number, p))) r = st_action.get(a) if r is not None: # Whoa. Have a shift/reduce or reduce/reduce conflict if r > 0: # Need to decide on shift or reduce here # By default we favor shifting. Need to add # some precedence rules here. # Shift precedence comes from the token sprec, slevel = Precedence.get(a, ('right', 0)) # Reduce precedence comes from rule being reduced (p) rprec, rlevel = Productions[p.number].prec if (slevel < rlevel) or ((slevel == rlevel) and (rprec == 'left')): # We really need to reduce here. st_action[a] = -p.number st_actionp[a] = p if not slevel and not rlevel: log.info(' ! shift/reduce conflict for %s resolved as reduce', a) self.sr_conflicts.append((st, a, 'reduce')) Productions[p.number].reduced += 1 elif (slevel == rlevel) and (rprec == 'nonassoc'): st_action[a] = None else: # Hmmm. Guess we'll keep the shift if not rlevel: log.info(' ! shift/reduce conflict for %s resolved as shift', a) self.sr_conflicts.append((st, a, 'shift')) elif r < 0: # Reduce/reduce conflict. In this case, we favor the rule # that was defined first in the grammar file oldp = Productions[-r] pp = Productions[p.number] if oldp.line > pp.line: st_action[a] = -p.number st_actionp[a] = p chosenp, rejectp = pp, oldp Productions[p.number].reduced += 1 Productions[oldp.number].reduced -= 1 else: chosenp, rejectp = oldp, pp self.rr_conflicts.append((st, chosenp, rejectp)) log.info(' ! reduce/reduce conflict for %s resolved using rule %d (%s)', a, st_actionp[a].number, st_actionp[a]) else: raise LALRError('Unknown conflict in state %d' % st) else: st_action[a] = -p.number st_actionp[a] = p Productions[p.number].reduced += 1 else: i = p.lr_index a = p.prod[i+1] # Get symbol right after the "." if a in self.grammar.Terminals: g = self.lr0_goto(I, a) j = self.lr0_cidhash.get(id(g), -1) if j >= 0: # We are in a shift state actlist.append((a, p, 'shift and go to state %d' % j)) r = st_action.get(a) if r is not None: # Whoa have a shift/reduce or shift/shift conflict if r > 0: if r != j: raise LALRError('Shift/shift conflict in state %d' % st) elif r < 0: # Do a precedence check. # - if precedence of reduce rule is higher, we reduce. # - if precedence of reduce is same and left assoc, we reduce. # - otherwise we shift # Shift precedence comes from the token sprec, slevel = Precedence.get(a, ('right', 0)) # Reduce precedence comes from the rule that could have been reduced rprec, rlevel = Productions[st_actionp[a].number].prec if (slevel > rlevel) or ((slevel == rlevel) and (rprec == 'right')): # We decide to shift here... highest precedence to shift Productions[st_actionp[a].number].reduced -= 1 st_action[a] = j st_actionp[a] = p if not rlevel: log.info(' ! shift/reduce conflict for %s resolved as shift', a) self.sr_conflicts.append((st, a, 'shift')) elif (slevel == rlevel) and (rprec == 'nonassoc'): st_action[a] = None else: # Hmmm. Guess we'll keep the reduce if not slevel and not rlevel: log.info(' ! shift/reduce conflict for %s resolved as reduce', a) self.sr_conflicts.append((st, a, 'reduce')) else: raise LALRError('Unknown conflict in state %d' % st) else: st_action[a] = j st_actionp[a] = p # Print the actions associated with each terminal _actprint = {} for a, p, m in actlist: if a in st_action: if p is st_actionp[a]: log.info(' %-15s %s', a, m) _actprint[(a, m)] = 1 log.info('') # Print the actions that were not used. (debugging) not_used = 0 for a, p, m in actlist: if a in st_action: if p is not st_actionp[a]: if not (a, m) in _actprint: log.debug(' ! %-15s [ %s ]', a, m) not_used = 1 _actprint[(a, m)] = 1 if not_used: log.debug('') # Construct the goto table for this state nkeys = {} for ii in I: for s in ii.usyms: if s in self.grammar.Nonterminals: nkeys[s] = None for n in nkeys: g = self.lr0_goto(I, n) j = self.lr0_cidhash.get(id(g), -1) if j >= 0: st_goto[n] = j log.info(' %-30s shift and go to state %d', n, j) action[st] = st_action actionp[st] = st_actionp goto[st] = st_goto st += 1 # ----------------------------------------------------------------------------- # write() # # This function writes the LR parsing tables to a file # ----------------------------------------------------------------------------- def write_table(self, tabmodule, outputdir='', signature=''): if isinstance(tabmodule, types.ModuleType): raise IOError("Won't overwrite existing tabmodule") basemodulename = tabmodule.split('.')[-1] filename = os.path.join(outputdir, basemodulename) + '.py' try: f = open(filename, 'w') f.write(''' # %s # This file is automatically generated. Do not edit. # pylint: disable=W,C,R _tabversion = %r _lr_method = %r _lr_signature = %r ''' % (os.path.basename(filename), __tabversion__, self.lr_method, signature)) # Change smaller to 0 to go back to original tables smaller = 1 # Factor out names to try and make smaller if smaller: items = {} for s, nd in self.lr_action.items(): for name, v in nd.items(): i = items.get(name) if not i: i = ([], []) items[name] = i i[0].append(s) i[1].append(v) f.write('\n_lr_action_items = {') for k, v in items.items(): f.write('%r:([' % k) for i in v[0]: f.write('%r,' % i) f.write('],[') for i in v[1]: f.write('%r,' % i) f.write(']),') f.write('}\n') f.write(''' _lr_action = {} for _k, _v in _lr_action_items.items(): for _x,_y in zip(_v[0],_v[1]): if not _x in _lr_action: _lr_action[_x] = {} _lr_action[_x][_k] = _y del _lr_action_items ''') else: f.write('\n_lr_action = { ') for k, v in self.lr_action.items(): f.write('(%r,%r):%r,' % (k[0], k[1], v)) f.write('}\n') if smaller: # Factor out names to try and make smaller items = {} for s, nd in self.lr_goto.items(): for name, v in nd.items(): i = items.get(name) if not i: i = ([], []) items[name] = i i[0].append(s) i[1].append(v) f.write('\n_lr_goto_items = {') for k, v in items.items(): f.write('%r:([' % k) for i in v[0]: f.write('%r,' % i) f.write('],[') for i in v[1]: f.write('%r,' % i) f.write(']),') f.write('}\n') f.write(''' _lr_goto = {} for _k, _v in _lr_goto_items.items(): for _x, _y in zip(_v[0], _v[1]): if not _x in _lr_goto: _lr_goto[_x] = {} _lr_goto[_x][_k] = _y del _lr_goto_items ''') else: f.write('\n_lr_goto = { ') for k, v in self.lr_goto.items(): f.write('(%r,%r):%r,' % (k[0], k[1], v)) f.write('}\n') # Write production table f.write('_lr_productions = [\n') for p in self.lr_productions: if p.func: f.write(' (%r,%r,%d,%r,%r,%d),\n' % (p.str, p.name, p.len, p.func, os.path.basename(p.file), p.line)) else: f.write(' (%r,%r,%d,None,None,None),\n' % (str(p), p.name, p.len)) f.write(']\n') f.close() except IOError as e: raise # ----------------------------------------------------------------------------- # pickle_table() # # This function pickles the LR parsing tables to a supplied file object # ----------------------------------------------------------------------------- def pickle_table(self, filename, signature=''): try: import cPickle as pickle except ImportError: import pickle with open(filename, 'wb') as outf: pickle.dump(__tabversion__, outf, pickle_protocol) pickle.dump(self.lr_method, outf, pickle_protocol) pickle.dump(signature, outf, pickle_protocol) pickle.dump(self.lr_action, outf, pickle_protocol) pickle.dump(self.lr_goto, outf, pickle_protocol) outp = [] for p in self.lr_productions: if p.func: outp.append((p.str, p.name, p.len, p.func, os.path.basename(p.file), p.line)) else: outp.append((str(p), p.name, p.len, None, None, None)) pickle.dump(outp, outf, pickle_protocol) # ----------------------------------------------------------------------------- # === INTROSPECTION === # # The following functions and classes are used to implement the PLY # introspection features followed by the yacc() function itself. # ----------------------------------------------------------------------------- # ----------------------------------------------------------------------------- # get_caller_module_dict() # # This function returns a dictionary containing all of the symbols defined within # a caller further down the call stack. This is used to get the environment # associated with the yacc() call if none was provided. # ----------------------------------------------------------------------------- def get_caller_module_dict(levels): f = sys._getframe(levels) ldict = f.f_globals.copy() if f.f_globals != f.f_locals: ldict.update(f.f_locals) return ldict # ----------------------------------------------------------------------------- # parse_grammar() # # This takes a raw grammar rule string and parses it into production data # ----------------------------------------------------------------------------- def parse_grammar(doc, file, line): grammar = [] # Split the doc string into lines pstrings = doc.splitlines() lastp = None dline = line for ps in pstrings: dline += 1 p = ps.split() if not p: continue try: if p[0] == '|': # This is a continuation of a previous rule if not lastp: raise SyntaxError("%s:%d: Misplaced '|'" % (file, dline)) prodname = lastp syms = p[1:] else: prodname = p[0] lastp = prodname syms = p[2:] assign = p[1] if assign != ':' and assign != '::=': raise SyntaxError("%s:%d: Syntax error. Expected ':'" % (file, dline)) grammar.append((file, dline, prodname, syms)) except SyntaxError: raise except Exception: raise SyntaxError('%s:%d: Syntax error in rule %r' % (file, dline, ps.strip())) return grammar # ----------------------------------------------------------------------------- # ParserReflect() # # This class represents information extracted for building a parser including # start symbol, error function, tokens, precedence list, action functions, # etc. # ----------------------------------------------------------------------------- class ParserReflect(object): def __init__(self, pdict, log=None): self.pdict = pdict self.start = None self.error_func = None self.tokens = None self.modules = set() self.grammar = [] self.error = False if log is None: self.log = PlyLogger(sys.stderr) else: self.log = log # Get all of the basic information def get_all(self): self.get_start() self.get_error_func() self.get_tokens() self.get_precedence() self.get_pfunctions() # Validate all of the information def validate_all(self): self.validate_start() self.validate_error_func() self.validate_tokens() self.validate_precedence() self.validate_pfunctions() self.validate_modules() return self.error # Compute a signature over the grammar def signature(self): parts = [] try: if self.start: parts.append(self.start) if self.prec: parts.append(''.join([''.join(p) for p in self.prec])) if self.tokens: parts.append(' '.join(self.tokens)) for f in self.pfuncs: if f[3]: parts.append(f[3]) except (TypeError, ValueError): pass return ''.join(parts) # ----------------------------------------------------------------------------- # validate_modules() # # This method checks to see if there are duplicated p_rulename() functions # in the parser module file. Without this function, it is really easy for # users to make mistakes by cutting and pasting code fragments (and it's a real # bugger to try and figure out why the resulting parser doesn't work). Therefore, # we just do a little regular expression pattern matching of def statements # to try and detect duplicates. # ----------------------------------------------------------------------------- def validate_modules(self): # Match def p_funcname( fre = re.compile(r'\s*def\s+(p_[a-zA-Z_0-9]*)\(') for module in self.modules: try: lines, linen = inspect.getsourcelines(module) except IOError: continue counthash = {} for linen, line in enumerate(lines): linen += 1 m = fre.match(line) if m: name = m.group(1) prev = counthash.get(name) if not prev: counthash[name] = linen else: filename = inspect.getsourcefile(module) self.log.warning('%s:%d: Function %s redefined. Previously defined on line %d', filename, linen, name, prev) # Get the start symbol def get_start(self): self.start = self.pdict.get('start') # Validate the start symbol def validate_start(self): if self.start is not None: if not isinstance(self.start, string_types): self.log.error("'start' must be a string") # Look for error handler def get_error_func(self): self.error_func = self.pdict.get('p_error') # Validate the error function def validate_error_func(self): if self.error_func: if isinstance(self.error_func, types.FunctionType): ismethod = 0 elif isinstance(self.error_func, types.MethodType): ismethod = 1 else: self.log.error("'p_error' defined, but is not a function or method") self.error = True return eline = self.error_func.__code__.co_firstlineno efile = self.error_func.__code__.co_filename module = inspect.getmodule(self.error_func) self.modules.add(module) argcount = self.error_func.__code__.co_argcount - ismethod if argcount != 1: self.log.error('%s:%d: p_error() requires 1 argument', efile, eline) self.error = True # Get the tokens map def get_tokens(self): tokens = self.pdict.get('tokens') if not tokens: self.log.error('No token list is defined') self.error = True return if not isinstance(tokens, (list, tuple)): self.log.error('tokens must be a list or tuple') self.error = True return if not tokens: self.log.error('tokens is empty') self.error = True return self.tokens = sorted(tokens) # Validate the tokens def validate_tokens(self): # Validate the tokens. if 'error' in self.tokens: self.log.error("Illegal token name 'error'. Is a reserved word") self.error = True return terminals = set() for n in self.tokens: if n in terminals: self.log.warning('Token %r multiply defined', n) terminals.add(n) # Get the precedence map (if any) def get_precedence(self): self.prec = self.pdict.get('precedence') # Validate and parse the precedence map def validate_precedence(self): preclist = [] if self.prec: if not isinstance(self.prec, (list, tuple)): self.log.error('precedence must be a list or tuple') self.error = True return for level, p in enumerate(self.prec): if not isinstance(p, (list, tuple)): self.log.error('Bad precedence table') self.error = True return if len(p) < 2: self.log.error('Malformed precedence entry %s. Must be (assoc, term, ..., term)', p) self.error = True return assoc = p[0] if not isinstance(assoc, string_types): self.log.error('precedence associativity must be a string') self.error = True return for term in p[1:]: if not isinstance(term, string_types): self.log.error('precedence items must be strings') self.error = True return preclist.append((term, assoc, level+1)) self.preclist = preclist # Get all p_functions from the grammar def get_pfunctions(self): p_functions = [] for name, item in self.pdict.items(): if not name.startswith('p_') or name == 'p_error': continue if isinstance(item, (types.FunctionType, types.MethodType)): line = getattr(item, 'co_firstlineno', item.__code__.co_firstlineno) module = inspect.getmodule(item) p_functions.append((line, module, name, item.__doc__)) # Sort all of the actions by line number; make sure to stringify # modules to make them sortable, since `line` may not uniquely sort all # p functions p_functions.sort(key=lambda p_function: ( p_function[0], str(p_function[1]), p_function[2], p_function[3])) self.pfuncs = p_functions # Validate all of the p_functions def validate_pfunctions(self): grammar = [] # Check for non-empty symbols if len(self.pfuncs) == 0: self.log.error('no rules of the form p_rulename are defined') self.error = True return for line, module, name, doc in self.pfuncs: file = inspect.getsourcefile(module) func = self.pdict[name] if isinstance(func, types.MethodType): reqargs = 2 else: reqargs = 1 if func.__code__.co_argcount > reqargs: self.log.error('%s:%d: Rule %r has too many arguments', file, line, func.__name__) self.error = True elif func.__code__.co_argcount < reqargs: self.log.error('%s:%d: Rule %r requires an argument', file, line, func.__name__) self.error = True elif not func.__doc__: self.log.warning('%s:%d: No documentation string specified in function %r (ignored)', file, line, func.__name__) else: try: parsed_g = parse_grammar(doc, file, line) for g in parsed_g: grammar.append((name, g)) except SyntaxError as e: self.log.error(str(e)) self.error = True # Looks like a valid grammar rule # Mark the file in which defined. self.modules.add(module) # Secondary validation step that looks for p_ definitions that are not functions # or functions that look like they might be grammar rules. for n, v in self.pdict.items(): if n.startswith('p_') and isinstance(v, (types.FunctionType, types.MethodType)): continue if n.startswith('t_'): continue if n.startswith('p_') and n != 'p_error': self.log.warning('%r not defined as a function', n) if ((isinstance(v, types.FunctionType) and v.__code__.co_argcount == 1) or (isinstance(v, types.MethodType) and v.__func__.__code__.co_argcount == 2)): if v.__doc__: try: doc = v.__doc__.split(' ') if doc[1] == ':': self.log.warning('%s:%d: Possible grammar rule %r defined without p_ prefix', v.__code__.co_filename, v.__code__.co_firstlineno, n) except IndexError: pass self.grammar = grammar # ----------------------------------------------------------------------------- # yacc(module) # # Build a parser # ----------------------------------------------------------------------------- def yacc(method='LALR', debug=yaccdebug, module=None, tabmodule=tab_module, start=None, check_recursion=True, optimize=False, write_tables=True, debugfile=debug_file, outputdir=None, debuglog=None, errorlog=None, picklefile=None): if tabmodule is None: tabmodule = tab_module # Reference to the parsing method of the last built parser global parse # If pickling is enabled, table files are not created if picklefile: write_tables = 0 if errorlog is None: errorlog = PlyLogger(sys.stderr) # Get the module dictionary used for the parser if module: _items = [(k, getattr(module, k)) for k in dir(module)] pdict = dict(_items) # If no __file__ or __package__ attributes are available, try to obtain them # from the __module__ instead if '__file__' not in pdict: pdict['__file__'] = sys.modules[pdict['__module__']].__file__ if '__package__' not in pdict and '__module__' in pdict: if hasattr(sys.modules[pdict['__module__']], '__package__'): pdict['__package__'] = sys.modules[pdict['__module__']].__package__ else: pdict = get_caller_module_dict(2) if outputdir is None: # If no output directory is set, the location of the output files # is determined according to the following rules: # - If tabmodule specifies a package, files go into that package directory # - Otherwise, files go in the same directory as the specifying module if isinstance(tabmodule, types.ModuleType): srcfile = tabmodule.__file__ else: if '.' not in tabmodule: srcfile = pdict['__file__'] else: parts = tabmodule.split('.') pkgname = '.'.join(parts[:-1]) exec('import %s' % pkgname) srcfile = getattr(sys.modules[pkgname], '__file__', '') outputdir = os.path.dirname(srcfile) # Determine if the module is package of a package or not. # If so, fix the tabmodule setting so that tables load correctly pkg = pdict.get('__package__') if pkg and isinstance(tabmodule, str): if '.' not in tabmodule: tabmodule = pkg + '.' + tabmodule # Set start symbol if it's specified directly using an argument if start is not None: pdict['start'] = start # Collect parser information from the dictionary pinfo = ParserReflect(pdict, log=errorlog) pinfo.get_all() if pinfo.error: raise YaccError('Unable to build parser') # Check signature against table files (if any) signature = pinfo.signature() # Read the tables try: lr = LRTable() if picklefile: read_signature = lr.read_pickle(picklefile) else: read_signature = lr.read_table(tabmodule) if optimize or (read_signature == signature): try: lr.bind_callables(pinfo.pdict) parser = LRParser(lr, pinfo.error_func) parse = parser.parse return parser except Exception as e: errorlog.warning('There was a problem loading the table file: %r', e) except VersionError as e: errorlog.warning(str(e)) except ImportError: pass if debuglog is None: if debug: try: debuglog = PlyLogger(open(os.path.join(outputdir, debugfile), 'w')) except IOError as e: errorlog.warning("Couldn't open %r. %s" % (debugfile, e)) debuglog = NullLogger() else: debuglog = NullLogger() debuglog.info('Created by PLY version %s (http://www.dabeaz.com/ply)', __version__) errors = False # Validate the parser information if pinfo.validate_all(): raise YaccError('Unable to build parser') if not pinfo.error_func: errorlog.warning('no p_error() function is defined') # Create a grammar object grammar = Grammar(pinfo.tokens) # Set precedence level for terminals for term, assoc, level in pinfo.preclist: try: grammar.set_precedence(term, assoc, level) except GrammarError as e: errorlog.warning('%s', e) # Add productions to the grammar for funcname, gram in pinfo.grammar: file, line, prodname, syms = gram try: grammar.add_production(prodname, syms, funcname, file, line) except GrammarError as e: errorlog.error('%s', e) errors = True # Set the grammar start symbols try: if start is None: grammar.set_start(pinfo.start) else: grammar.set_start(start) except GrammarError as e: errorlog.error(str(e)) errors = True if errors: raise YaccError('Unable to build parser') # Verify the grammar structure undefined_symbols = grammar.undefined_symbols() for sym, prod in undefined_symbols: errorlog.error('%s:%d: Symbol %r used, but not defined as a token or a rule', prod.file, prod.line, sym) errors = True unused_terminals = grammar.unused_terminals() if unused_terminals: debuglog.info('') debuglog.info('Unused terminals:') debuglog.info('') for term in unused_terminals: errorlog.warning('Token %r defined, but not used', term) debuglog.info(' %s', term) # Print out all productions to the debug log if debug: debuglog.info('') debuglog.info('Grammar') debuglog.info('') for n, p in enumerate(grammar.Productions): debuglog.info('Rule %-5d %s', n, p) # Find unused non-terminals unused_rules = grammar.unused_rules() for prod in unused_rules: errorlog.warning('%s:%d: Rule %r defined, but not used', prod.file, prod.line, prod.name) if len(unused_terminals) == 1: errorlog.warning('There is 1 unused token') if len(unused_terminals) > 1: errorlog.warning('There are %d unused tokens', len(unused_terminals)) if len(unused_rules) == 1: errorlog.warning('There is 1 unused rule') if len(unused_rules) > 1: errorlog.warning('There are %d unused rules', len(unused_rules)) if debug: debuglog.info('') debuglog.info('Terminals, with rules where they appear') debuglog.info('') terms = list(grammar.Terminals) terms.sort() for term in terms: debuglog.info('%-20s : %s', term, ' '.join([str(s) for s in grammar.Terminals[term]])) debuglog.info('') debuglog.info('Nonterminals, with rules where they appear') debuglog.info('') nonterms = list(grammar.Nonterminals) nonterms.sort() for nonterm in nonterms: debuglog.info('%-20s : %s', nonterm, ' '.join([str(s) for s in grammar.Nonterminals[nonterm]])) debuglog.info('') if check_recursion: unreachable = grammar.find_unreachable() for u in unreachable: errorlog.warning('Symbol %r is unreachable', u) infinite = grammar.infinite_cycles() for inf in infinite: errorlog.error('Infinite recursion detected for symbol %r', inf) errors = True unused_prec = grammar.unused_precedence() for term, assoc in unused_prec: errorlog.error('Precedence rule %r defined for unknown symbol %r', assoc, term) errors = True if errors: raise YaccError('Unable to build parser') # Run the LRGeneratedTable on the grammar if debug: errorlog.debug('Generating %s tables', method) lr = LRGeneratedTable(grammar, method, debuglog) if debug: num_sr = len(lr.sr_conflicts) # Report shift/reduce and reduce/reduce conflicts if num_sr == 1: errorlog.warning('1 shift/reduce conflict') elif num_sr > 1: errorlog.warning('%d shift/reduce conflicts', num_sr) num_rr = len(lr.rr_conflicts) if num_rr == 1: errorlog.warning('1 reduce/reduce conflict') elif num_rr > 1: errorlog.warning('%d reduce/reduce conflicts', num_rr) # Write out conflicts to the output file if debug and (lr.sr_conflicts or lr.rr_conflicts): debuglog.warning('') debuglog.warning('Conflicts:') debuglog.warning('') for state, tok, resolution in lr.sr_conflicts: debuglog.warning('shift/reduce conflict for %s in state %d resolved as %s', tok, state, resolution) already_reported = set() for state, rule, rejected in lr.rr_conflicts: if (state, id(rule), id(rejected)) in already_reported: continue debuglog.warning('reduce/reduce conflict in state %d resolved using rule (%s)', state, rule) debuglog.warning('rejected rule (%s) in state %d', rejected, state) errorlog.warning('reduce/reduce conflict in state %d resolved using rule (%s)', state, rule) errorlog.warning('rejected rule (%s) in state %d', rejected, state) already_reported.add((state, id(rule), id(rejected))) warned_never = [] for state, rule, rejected in lr.rr_conflicts: if not rejected.reduced and (rejected not in warned_never): debuglog.warning('Rule (%s) is never reduced', rejected) errorlog.warning('Rule (%s) is never reduced', rejected) warned_never.append(rejected) # Write the table file if requested if write_tables: try: lr.write_table(tabmodule, outputdir, signature) if tabmodule in sys.modules: del sys.modules[tabmodule] except IOError as e: errorlog.warning("Couldn't create %r. %s" % (tabmodule, e)) # Write a pickled version of the tables if picklefile: try: lr.pickle_table(picklefile, signature) except IOError as e: errorlog.warning("Couldn't create %r. %s" % (picklefile, e)) # Build the parser lr.bind_callables(pinfo.pdict) parser = LRParser(lr, pinfo.error_func) parse = parser.parse return parser selinux-python-3.0/sepolgen/src/share/000077500000000000000000000000001356774067000201065ustar00rootroot00000000000000selinux-python-3.0/sepolgen/src/share/Makefile000066400000000000000000000002241356774067000215440ustar00rootroot00000000000000SHAREDIR ?= /var/lib/sepolgen all: install: all -mkdir -p $(DESTDIR)$(SHAREDIR) install -m 644 perm_map $(DESTDIR)$(SHAREDIR) clean: rm -f *~ selinux-python-3.0/sepolgen/src/share/perm_map000066400000000000000000001020131356774067000216260ustar00rootroot00000000000000# This is a permission map file for use in policy analysis. This # file maps object permissions (read, getattr, setattr, ..., etc.) # for an object class, to exactly one of the following: read, write, # both, or none. This file may be edited as long as the specific # syntax rules are obeyed. # # For each object class, there is a set of object permissions that are # individually mapped to read, write, both, or none. If a new object # class is added, make sure that the current number of object classes # is increased. # # The syntax for an object class definition is: # class # # This is followed by each permission and its individual mapping to one # of the following: # # r = Read # w = Write # n = None # b = Both # # Additionally, you can choose to follow the mapping with an optional # permission weight value from 1 (less importance) to 10 (higher importance). # 10 is the default weight value if one is not provided. # # Look to the examples below for further clarification. # # Number of object classes. 58 class security 11 compute_av n 1 compute_create n 1 compute_member n 1 check_context n 1 load_policy n 1 compute_relabel n 1 compute_user n 1 setenforce n 1 setbool n 1 setsecparam n 1 setcheckreqprot n 1 class process 29 fork n 1 transition w 5 sigchld w 1 sigkill w 1 sigstop w 1 signull n 1 signal w 5 ptrace b 10 getsched r 1 setsched w 1 getsession r 1 getpgid r 1 setpgid w 5 getcap r 3 setcap w 1 share b 1 getattr r 1 setexec w 1 setfscreate w 1 noatsecure n 1 siginh n 1 setrlimit n 1 rlimitinh n 1 dyntransition w 10 setcurrent w 1 execmem n 1 execstack n 1 execheap n 1 setkeycreate w 1 class system 4 ipc_info n 1 syslog_read n 1 syslog_mod n 1 syslog_console n 1 class capability 31 chown n 3 dac_override n 1 dac_read_search n 1 fowner n 1 fsetid n 1 kill n 1 setgid n 3 setuid n 1 setpcap n 3 linux_immutable n 1 net_bind_service n 1 net_broadcast n 1 net_admin n 1 net_raw n 1 ipc_lock n 1 ipc_owner n 1 sys_module n 1 sys_rawio n 1 sys_chroot n 1 sys_ptrace n 1 sys_pacct n 1 sys_admin n 3 sys_boot n 1 sys_nice n 1 sys_resource n 1 sys_time n 1 sys_tty_config n 1 mknod n 1 lease n 1 audit_write n 3 audit_control n 1 class filesystem 10 mount w 1 remount w 1 unmount w 1 getattr r 1 relabelfrom r 10 relabelto w 10 transition w 1 associate n 1 quotamod w 1 quotaget r 1 class file 21 execute_no_trans r 1 entrypoint r 1 execmod n 1 ioctl n 1 read r 10 write w 10 create w 1 getattr r 7 setattr w 7 lock n 1 relabelfrom r 10 relabelto w 10 append w 10 unlink w 1 link w 1 rename w 5 execute r 10 swapon b 1 quotaon b 1 mounton b 1 open r 1 class dir 23 add_name w 1 remove_name w 1 reparent w 1 search r 1 rmdir b 1 ioctl n 1 read r 1 write w 1 create w 1 getattr r 1 setattr w 1 lock n 1 relabelfrom r 1 relabelto w 1 append w 1 unlink w 1 link w 1 rename w 1 execute r 1 swapon b 1 quotaon b 1 mounton b 1 open r 1 class fd 1 use b 1 class lnk_file 18 ioctl n 1 read r 1 write w 1 create w 1 getattr r 1 setattr w 1 lock n 1 relabelfrom r 1 relabelto w 1 append w 1 unlink w 1 link w 1 rename w 1 execute r 1 swapon b 1 quotaon b 1 mounton b 1 open r 1 class chr_file 21 execute_no_trans r 1 entrypoint r 1 execmod n 1 ioctl n 1 read r 10 write w 10 create w 1 getattr r 7 setattr w 7 lock n 1 relabelfrom r 10 relabelto w 10 append w 1 unlink w 1 link w 1 rename w 5 execute r 1 swapon b 1 quotaon b 1 mounton b 1 open r 1 class blk_file 18 ioctl n 1 read r 10 write w 10 create w 1 getattr r 7 setattr w 7 lock n 1 relabelfrom r 10 relabelto w 10 append w 1 unlink w 1 link w 1 rename w 5 execute r 1 swapon b 1 quotaon b 1 mounton b 1 open r 1 class sock_file 18 ioctl n 1 read r 10 write w 10 create w 1 getattr r 7 setattr w 7 lock n 1 relabelfrom r 10 relabelto w 10 append w 1 unlink w 1 link w 1 rename w 1 execute r 1 swapon b 1 quotaon b 1 mounton b 1 open r 1 class fifo_file 18 ioctl n 1 read r 10 write w 10 create w 1 getattr r 7 setattr w 7 lock n 1 relabelfrom r 10 relabelto w 10 append w 1 unlink w 1 link w 1 rename w 5 execute r 1 swapon b 1 quotaon b 1 mounton b 1 open r 1 class socket 22 ioctl n 1 read r 10 write w 10 create w 1 getattr r 7 setattr w 7 lock n 1 relabelfrom r 10 relabelto w 10 append w 1 bind w 1 connect w 1 listen r 1 accept r 1 getopt r 1 setopt w 1 shutdown w 1 recvfrom r 10 sendto w 10 recv_msg r 10 send_msg w 10 name_bind n 1 class tcp_socket 27 connectto w 1 newconn w 1 acceptfrom r 1 node_bind n 1 ioctl n 1 read r 10 write w 10 create w 1 getattr r 7 setattr w 7 lock n 1 relabelfrom r 10 relabelto w 10 append w 1 bind w 1 connect w 1 listen r 1 accept r 1 getopt r 1 setopt w 1 shutdown w 1 recvfrom r 10 sendto w 10 recv_msg r 10 send_msg w 10 name_bind n 1 name_connect w 1 class udp_socket 23 node_bind n 1 ioctl n 1 read r 10 write w 10 create w 1 getattr r 7 setattr w 7 lock n 1 relabelfrom r 10 relabelto w 10 append w 1 bind w 1 connect w 1 listen r 1 accept r 1 getopt r 1 setopt w 1 shutdown w 1 recvfrom r 10 sendto w 10 recv_msg r 10 send_msg w 10 name_bind n 1 class rawip_socket 23 node_bind n 1 ioctl n 1 read r 10 write w 10 create w 1 getattr r 1 setattr w 1 lock n 1 relabelfrom r 10 relabelto w 10 append w 1 bind w 1 connect w 1 listen r 1 accept r 1 getopt r 1 setopt w 1 shutdown w 1 recvfrom r 10 sendto w 10 recv_msg r 10 send_msg w 10 name_bind n 1 class node 7 tcp_recv r 10 tcp_send w 10 udp_recv r 10 udp_send w 10 rawip_recv r 10 rawip_send w 10 enforce_dest n 1 class netif 6 tcp_recv r 10 tcp_send w 10 udp_recv r 10 udp_send w 10 rawip_recv r 10 rawip_send w 10 class netlink_socket 22 ioctl n 1 read r 10 write w 10 create w 1 getattr r 7 setattr w 7 lock n 1 relabelfrom r 10 relabelto w 10 append w 1 bind w 1 connect w 1 listen r 1 accept r 1 getopt r 1 setopt w 1 shutdown w 1 recvfrom r 10 sendto w 10 recv_msg r 10 send_msg w 10 name_bind n 1 class packet_socket 22 ioctl n 1 read r 10 write w 10 create w 1 getattr r 7 setattr w 7 lock n 1 relabelfrom r 10 relabelto w 10 append w 1 bind w 1 connect w 1 listen r 1 accept r 1 getopt r 1 setopt w 1 shutdown w 1 recvfrom r 10 sendto w 10 recv_msg r 10 send_msg w 10 name_bind n 1 class key_socket 22 ioctl n 1 read r 10 write w 10 create w 1 getattr r 7 setattr w 7 lock n 1 relabelfrom r 10 relabelto w 10 append w 1 bind w 1 connect w 1 listen r 1 accept r 1 getopt r 1 setopt w 1 shutdown w 1 recvfrom r 10 sendto w 10 recv_msg r 10 send_msg w 10 name_bind n 1 class unix_stream_socket 25 connectto w 1 newconn w 1 acceptfrom r 1 ioctl n 1 read r 10 write w 10 create w 1 getattr r 7 setattr w 7 lock n 1 relabelfrom r 10 relabelto w 10 append w 1 bind w 1 connect w 1 listen r 1 accept r 1 getopt r 1 setopt w 1 shutdown w 1 recvfrom r 10 sendto w 10 recv_msg r 10 send_msg w 10 name_bind n 1 class unix_dgram_socket 22 ioctl n 1 read r 10 write w 10 create w 1 getattr r 7 setattr w 7 lock n 1 relabelfrom r 10 relabelto w 10 append w 1 bind w 1 connect w 1 listen r 1 accept r 1 getopt r 1 setopt w 1 shutdown w 1 recvfrom r 10 sendto w 10 recv_msg r 10 send_msg w 10 name_bind n 1 class sem 9 create w 1 destroy w 1 getattr r 1 setattr w 1 read r 10 write w 10 associate n 1 unix_read r 3 unix_write w 3 class msg 2 send w 10 receive r 10 class msgq 10 enqueue w 1 create w 1 destroy w 1 getattr r 1 setattr w 1 read r 10 write w 10 associate n 1 unix_read r 3 unix_write w 3 class shm 10 lock w 1 create w 1 destroy w 1 getattr r 1 setattr w 1 read r 10 write w 10 associate n 1 unix_read r 3 unix_write w 3 class ipc 9 create w 1 destroy w 1 getattr r 1 setattr w 1 read r 10 write w 10 associate n 1 unix_read r 3 unix_write w 3 class passwd 5 passwd w 1 chfn w 5 chsh w 5 rootok n 1 crontab w 5 class drawable 5 create w 1 destroy w 1 draw w 10 copy r 10 getattr r 7 class window 26 addchild w 1 create w 1 destroy w 1 map w 1 unmap w 1 chstack w 10 chproplist w 7 chprop w 10 listprop r 5 getattr r 5 setattr w 5 setfocus w 1 move w 10 chselection w 10 chparent w 5 ctrllife w 5 enumerate w 1 transparent w 1 mousemotion w 10 clientcomevent w 5 inputevent w 5 drawevent w 5 windowchangeevent w 5 windowchangerequest w 5 serverchangeevent w 5 extensionevent w 5 class gc 4 create w 1 free w 1 getattr r 5 setattr w 5 class font 4 load r 1 free w 1 getattr r 5 use r 1 class colormap 9 create w 1 free w 1 install w 10 uninstall w 1 list r 5 read r 10 store w 10 getattr r 5 setattr w 5 class property 4 create w 1 free w 1 read r 10 write w 10 class cursor 5 create w 1 createglyph w 10 free w 1 assign w 10 setattr w 5 class xclient 1 kill w 1 class xinput 11 lookup r 10 getattr r 5 setattr w 5 setfocus w 10 warppointer w 10 activegrab w 1 passivegrab w 1 ungrab w 1 bell w 3 mousemotion w 10 relabelinput b 3 class xserver 8 screensaver w 10 gethostlist r 7 sethostlist w 7 getfontpath r 7 setfontpath w 7 getattr r 7 grab w 10 ungrab w 1 class xextension 2 query r 10 use b 1 class pax 6 pageexec n 1 emutramp n 1 mprotect n 1 randmmap n 1 randexec n 1 segmexec n 1 class netlink_route_socket 24 nlmsg_read r 10 nlmsg_write w 10 ioctl n 1 read r 10 write w 10 create w 1 getattr r 7 setattr w 7 lock n 1 relabelfrom r 10 relabelto w 10 append w 1 bind w 1 connect w 1 listen r 1 accept r 1 getopt r 1 setopt w 1 shutdown w 1 recvfrom r 10 sendto r 10 recv_msg r 10 send_msg w 10 name_bind n 1 class netlink_firewall_socket 24 nlmsg_read r 10 nlmsg_write w 10 ioctl n 1 read r 10 write w 10 create w 1 getattr r 7 setattr w 7 lock n 1 relabelfrom r 10 relabelto w 10 append w 1 bind w 1 connect w 1 listen r 1 accept r 1 getopt r 1 setopt w 1 shutdown w 1 recvfrom r 10 sendto r 10 recv_msg r 10 send_msg w 10 name_bind n 1 class netlink_tcpdiag_socket 24 nlmsg_read r 10 nlmsg_write w 10 ioctl n 1 read r 10 write w 10 create w 1 getattr r 7 setattr w 7 lock n 1 relabelfrom r 10 relabelto w 10 append w 1 bind w 1 connect w 1 listen r 1 accept r 1 getopt r 1 setopt w 1 shutdown w 1 recvfrom r 10 sendto r 10 recv_msg r 10 send_msg w 10 name_bind n 1 class netlink_nflog_socket 22 ioctl n 1 read r 10 write w 10 create w 1 getattr r 7 setattr w 7 lock n 1 relabelfrom r 10 relabelto w 10 append w 1 bind w 1 connect w 1 listen r 1 accept r 1 getopt r 1 setopt w 1 shutdown w 1 recvfrom r 10 sendto r 10 recv_msg r 10 send_msg w 10 name_bind n 1 class netlink_xfrm_socket 24 nlmsg_read r 10 nlmsg_write w 10 ioctl n 1 read r 10 write w 10 create w 1 getattr r 7 setattr w 7 lock n 1 relabelfrom r 10 relabelto w 10 append w 1 bind w 1 connect w 1 listen r 1 accept r 1 getopt r 1 setopt w 1 shutdown w 1 recvfrom r 10 sendto r 10 recv_msg r 10 send_msg w 10 name_bind n 1 class netlink_selinux_socket 22 ioctl n 1 read r 10 write w 10 create w 1 getattr r 7 setattr w 7 lock n 1 relabelfrom r 10 relabelto w 10 append w 1 bind w 1 connect w 1 listen r 1 accept r 1 getopt r 1 setopt w 1 shutdown w 1 recvfrom r 10 sendto r 10 recv_msg r 10 send_msg w 10 name_bind n 1 class netlink_audit_socket 26 nlmsg_read r 10 nlmsg_write w 10 ioctl n 1 read r 10 write w 10 create w 1 getattr r 7 setattr w 7 lock n 1 relabelfrom r 10 relabelto w 10 append w 1 bind w 1 connect w 1 listen r 1 accept r 1 getopt r 1 setopt w 1 shutdown w 1 recvfrom r 10 sendto r 10 recv_msg r 10 send_msg w 10 name_bind n 1 nlmsg_relay w 10 nlmsg_readpriv r 10 class netlink_ip6fw_socket 24 nlmsg_read r 10 nlmsg_write w 10 ioctl n 1 read r 10 write w 10 create w 1 getattr r 7 setattr w 7 lock n 1 relabelfrom r 10 relabelto w 10 append w 1 bind w 1 connect w 1 listen r 1 accept r 1 getopt r 1 setopt w 1 shutdown w 1 recvfrom r 10 sendto r 10 recv_msg r 10 send_msg w 10 name_bind n 1 class netlink_dnrt_socket 22 ioctl n 1 read r 10 write w 10 create w 1 getattr r 7 setattr w 7 lock n 1 relabelfrom r 10 relabelto w 10 append w 1 bind w 1 connect w 1 listen r 1 accept r 1 getopt r 1 setopt w 1 shutdown w 1 recvfrom r 10 sendto r 10 recv_msg r 10 send_msg w 10 name_bind n 1 class netlink_kobject_uevent_socket 22 ioctl n 1 read r 10 write w 10 create w 1 getattr r 7 setattr w 7 lock n 1 relabelfrom r 10 relabelto w 10 append w 1 bind w 1 connect w 1 listen r 1 accept r 1 getopt r 1 setopt w 1 shutdown w 1 recvfrom r 10 sendto w 10 recv_msg r 10 send_msg w 10 name_bind n 1 class dbus 2 acquire_svc b 1 send_msg w 10 class nscd 8 getpwd r 7 getgrp r 7 gethost r 7 getstat r 7 admin w 5 shmempwd r 7 shmemgrp r 7 shmemhost r 7 class association 4 sendto w 10 recvfrom r 10 setcontext w 3 polmatch r 1 class appletalk_socket 22 ioctl n 1 read r 10 write w 10 create w 1 getattr r 1 setattr w 1 lock n 1 relabelfrom r 10 relabelto w 10 append w 1 bind w 1 connect w 1 listen r 1 accept r 1 getopt r 1 setopt w 1 shutdown w 1 recvfrom r 10 sendto w 10 recv_msg r 10 send_msg w 10 name_bind n 1 class key 7 view r 7 read r 10 write w 10 search r 5 link w 7 setattr w 7 create w 10 class packet 3 send w 10 recv r 10 relabelto w 3 selinux-python-3.0/sepolgen/tests/000077500000000000000000000000001356774067000173575ustar00rootroot00000000000000selinux-python-3.0/sepolgen/tests/.gitignore000066400000000000000000000000721356774067000213460ustar00rootroot00000000000000module_compile_test.fc module_compile_test.if output tmp/ selinux-python-3.0/sepolgen/tests/Makefile000066400000000000000000000003661356774067000210240ustar00rootroot00000000000000PYTHON ?= python3 clean: rm -f *~ *.pyc rm -f parser.out parsetab.py rm -f out.txt rm -f module_compile_test.fc rm -f module_compile_test.if rm -f module_compile_test.pp rm -f output rm -rf __pycache__ tmp test: $(PYTHON) run-tests.py selinux-python-3.0/sepolgen/tests/audit.txt000066400000000000000000001217251356774067000212360ustar00rootroot00000000000000type=AVC msg=audit(1158584779.745:708): avc: denied { dac_read_search } for pid=8132 comm="sh" capability=2 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability type=SYSCALL msg=audit(1158584779.745:708): arch=40000003 syscall=195 success=no exit=-13 a0=80d2437 a1=bf9132f8 a2=4c56cff4 a3=0 items=0 ppid=8131 pid=8132 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sh" exe="/bin/bash" subj=user_u:system_r:vpnc_t:s0 key=(null) type=AVC msg=audit(1158584779.753:709): avc: denied { dac_override } for pid=8133 comm="vpnc-script" capability=1 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability type=AVC msg=audit(1158584779.753:709): avc: denied { dac_read_search } for pid=8133 comm="vpnc-script" capability=2 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability type=SYSCALL msg=audit(1158584779.753:709): arch=40000003 syscall=195 success=no exit=-13 a0=80d2437 a1=bf910a48 a2=4c56cff4 a3=0 items=0 ppid=8132 pid=8133 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vpnc-script" exe="/bin/bash" subj=user_u:system_r:vpnc_t:s0 key=(null) type=AVC msg=audit(1158584779.825:710): avc: denied { dac_override } for pid=8134 comm="vpnc-script" capability=1 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability type=AVC msg=audit(1158584779.825:710): avc: denied { dac_read_search } for pid=8134 comm="vpnc-script" capability=2 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability type=SYSCALL msg=audit(1158584779.825:710): arch=40000003 syscall=195 success=no exit=-13 a0=80d2437 a1=bf910a48 a2=4c56cff4 a3=0 items=0 ppid=8132 pid=8134 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vpnc-script" exe="/bin/bash" subj=user_u:system_r:vpnc_t:s0 key=(null) type=AVC msg=audit(1158584780.793:711): avc: denied { dac_override } for pid=8144 comm="sh" capability=1 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability type=AVC msg=audit(1158584780.793:711): avc: denied { dac_read_search } for pid=8144 comm="sh" capability=2 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability type=SYSCALL msg=audit(1158584780.793:711): arch=40000003 syscall=195 success=no exit=-13 a0=80d2437 a1=bfc0ba38 a2=4c56cff4 a3=0 items=0 ppid=8131 pid=8144 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sh" exe="/bin/bash" subj=user_u:system_r:vpnc_t:s0 key=(null) type=AVC msg=audit(1158584780.797:712): avc: denied { dac_override } for pid=8145 comm="vpnc-script" capability=1 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability type=AVC msg=audit(1158584780.797:712): avc: denied { dac_read_search } for pid=8145 comm="vpnc-script" capability=2 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability type=SYSCALL msg=audit(1158584780.797:712): arch=40000003 syscall=195 success=no exit=-13 a0=80d2437 a1=bfc0b188 a2=4c56cff4 a3=0 items=0 ppid=8144 pid=8145 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vpnc-script" exe="/bin/bash" subj=user_u:system_r:vpnc_t:s0 key=(null) type=AVC msg=audit(1158584780.801:713): avc: denied { dac_override } for pid=8146 comm="vpnc-script" capability=1 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability type=AVC msg=audit(1158584780.801:713): avc: denied { dac_read_search } for pid=8146 comm="vpnc-script" capability=2 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability type=SYSCALL msg=audit(1158584780.801:713): arch=40000003 syscall=195 success=no exit=-13 a0=80d2437 a1=bfc0b188 a2=4c56cff4 a3=0 items=0 ppid=8144 pid=8146 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vpnc-script" exe="/bin/bash" subj=user_u:system_r:vpnc_t:s0 key=(null) type=AVC msg=audit(1158584780.805:714): avc: denied { dac_override } for pid=8144 comm="vpnc-script" capability=1 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability type=AVC msg=audit(1158584780.805:714): avc: denied { dac_read_search } for pid=8144 comm="vpnc-script" capability=2 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability type=SYSCALL msg=audit(1158584780.805:714): arch=40000003 syscall=195 success=no exit=-13 a0=80d2437 a1=bfc0a6c8 a2=4c56cff4 a3=0 items=0 ppid=8131 pid=8144 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vpnc-script" exe="/bin/bash" subj=user_u:system_r:vpnc_t:s0 key=(null) type=AVC msg=audit(1158584780.849:715): avc: denied { dac_override } for pid=8152 comm="vpnc-script" capability=1 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability type=AVC msg=audit(1158584780.849:715): avc: denied { dac_read_search } for pid=8152 comm="vpnc-script" capability=2 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability type=SYSCALL msg=audit(1158584780.849:715): arch=40000003 syscall=195 success=no exit=-13 a0=80d2437 a1=bfc0a0b8 a2=4c56cff4 a3=0 items=0 ppid=8151 pid=8152 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vpnc-script" exe="/bin/bash" subj=user_u:system_r:vpnc_t:s0 key=(null) type=AVC msg=audit(1158584780.853:716): avc: denied { dac_override } for pid=8153 comm="vpnc-script" capability=1 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability type=AVC msg=audit(1158584780.853:716): avc: denied { dac_read_search } for pid=8153 comm="vpnc-script" capability=2 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability type=SYSCALL msg=audit(1158584780.853:716): arch=40000003 syscall=195 success=no exit=-13 a0=80d2437 a1=bfc09c78 a2=4c56cff4 a3=0 items=0 ppid=8151 pid=8153 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vpnc-script" exe="/bin/bash" subj=user_u:system_r:vpnc_t:s0 key=(null) type=AVC msg=audit(1158584780.945:717): avc: denied { dac_override } for pid=8144 comm="vpnc-script" capability=1 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability type=AVC msg=audit(1158584780.945:717): avc: denied { dac_read_search } for pid=8144 comm="vpnc-script" capability=2 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability type=SYSCALL msg=audit(1158584780.945:717): arch=40000003 syscall=195 success=no exit=-13 a0=80d2437 a1=bfc09be8 a2=4c56cff4 a3=0 items=0 ppid=8131 pid=8144 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vpnc-script" exe="/bin/bash" subj=user_u:system_r:vpnc_t:s0 key=(null) type=AVC msg=audit(1158584780.957:718): avc: denied { dac_override } for pid=8144 comm="vpnc-script" capability=1 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability type=AVC msg=audit(1158584780.957:718): avc: denied { dac_read_search } for pid=8144 comm="vpnc-script" capability=2 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability type=SYSCALL msg=audit(1158584780.957:718): arch=40000003 syscall=195 success=no exit=-13 a0=80d2437 a1=bfc09be8 a2=4c56cff4 a3=0 items=0 ppid=8131 pid=8144 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vpnc-script" exe="/bin/bash" subj=user_u:system_r:vpnc_t:s0 key=(null) type=CRED_ACQ msg=audit(1158584988.203:719): user pid=8264 uid=0 auid=500 subj=user_u:system_r:unconfined_t:s0 msg='PAM: setcred acct=root : exe="/usr/bin/sudo" (hostname=?, addr=?, terminal=? res=success)' type=USER_START msg=audit(1158584988.203:720): user pid=8264 uid=0 auid=500 subj=user_u:system_r:unconfined_t:s0 msg='PAM: session open acct=root : exe="/usr/bin/sudo" (hostname=?, addr=?, terminal=? res=success)' type=USER_END msg=audit(1158584988.203:721): user pid=8264 uid=0 auid=500 subj=user_u:system_r:unconfined_t:s0 msg='PAM: session close acct=root : exe="/usr/bin/sudo" (hostname=?, addr=?, terminal=? res=success)' type=USER_ACCT msg=audit(1158585001.341:722): user pid=8294 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1158585001.341:723): login pid=8294 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1158585001.341:724): user pid=8294 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1158585001.345:725): user pid=8294 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1158585001.397:726): user pid=8294 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1158585001.397:727): user pid=8294 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1158585033.003:728): user pid=8331 uid=0 auid=500 subj=user_u:system_r:unconfined_t:s0 msg='PAM: setcred acct=root : exe="/usr/bin/sudo" (hostname=?, addr=?, terminal=? res=success)' type=USER_START msg=audit(1158585033.003:729): user pid=8331 uid=0 auid=500 subj=user_u:system_r:unconfined_t:s0 msg='PAM: session open acct=root : exe="/usr/bin/sudo" (hostname=?, addr=?, terminal=? res=success)' type=USER_END msg=audit(1158585033.003:730): user pid=8331 uid=0 auid=500 subj=user_u:system_r:unconfined_t:s0 msg='PAM: session close acct=root : exe="/usr/bin/sudo" (hostname=?, addr=?, terminal=? res=success)' type=USER_ACCT msg=audit(1158585601.463:731): user pid=8495 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1158585601.463:732): login pid=8495 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1158585601.463:733): user pid=8495 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1158585601.463:734): user pid=8495 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1158585601.483:735): user pid=8495 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1158585601.483:736): user pid=8495 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1158586201.552:737): user pid=8538 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1158586201.552:738): login pid=8538 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1158586201.552:739): user pid=8538 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1158586201.556:740): user pid=8538 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1158586201.576:741): user pid=8538 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1158586201.576:742): user pid=8538 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1158586801.646:743): user pid=8563 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1158586801.650:744): login pid=8563 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1158586801.650:745): user pid=8563 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1158586801.650:746): user pid=8563 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1158586801.670:747): user pid=8563 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1158586801.670:748): user pid=8563 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1158587401.735:749): user pid=8628 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1158587401.735:750): login pid=8628 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1158587401.739:751): user pid=8628 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1158587401.739:752): user pid=8628 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1158587401.759:753): user pid=8628 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1158587401.759:754): user pid=8628 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1158588001.825:755): user pid=8779 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1158588001.825:756): login pid=8779 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1158588001.825:757): user pid=8779 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1158588001.825:758): user pid=8779 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1158588001.885:759): user pid=8779 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1158588001.885:760): user pid=8779 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1158588061.896:761): user pid=8787 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1158588061.900:762): login pid=8787 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1158588061.900:763): user pid=8787 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1158588061.900:764): user pid=8787 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1158588061.920:765): user pid=8787 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1158588061.920:766): user pid=8787 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_AUTH msg=audit(1158588251.786:767): user pid=8857 uid=0 auid=4294967295 subj=system_u:system_r:unconfined_t:s0-s0:c0.c255 msg='PAM: authentication acct=kmacmill : exe="/usr/sbin/sshd" (hostname=192.168.1.102, addr=2.0.0.0, terminal=ssh res=success)' type=USER_ACCT msg=audit(1158588251.786:768): user pid=8857 uid=0 auid=4294967295 subj=system_u:system_r:unconfined_t:s0-s0:c0.c255 msg='PAM: accounting acct=kmacmill : exe="/usr/sbin/sshd" (hostname=192.168.1.102, addr=2.0.0.0, terminal=ssh res=success)' type=LOGIN msg=audit(1158588251.790:769): login pid=8859 uid=0 old auid=4294967295 new auid=500 type=USER_START msg=audit(1158588251.790:770): user pid=8859 uid=0 auid=500 subj=system_u:system_r:unconfined_t:s0-s0:c0.c255 msg='PAM: session open acct=kmacmill : exe="/usr/sbin/sshd" (hostname=192.168.1.102, addr=2.0.0.0, terminal=ssh res=success)' type=CRED_REFR msg=audit(1158588251.790:771): user pid=8859 uid=0 auid=500 subj=system_u:system_r:unconfined_t:s0-s0:c0.c255 msg='PAM: setcred acct=kmacmill : exe="/usr/sbin/sshd" (hostname=192.168.1.102, addr=2.0.0.0, terminal=ssh res=success)' type=USER_AUTH msg=audit(1158588258.499:772): user pid=8877 uid=0 auid=4294967295 subj=system_u:system_r:unconfined_t:s0-s0:c0.c255 msg='PAM: authentication acct=kmacmill : exe="/usr/sbin/sshd" (hostname=192.168.1.102, addr=2.0.0.0, terminal=ssh res=success)' type=USER_ACCT msg=audit(1158588258.499:773): user pid=8877 uid=0 auid=4294967295 subj=system_u:system_r:unconfined_t:s0-s0:c0.c255 msg='PAM: accounting acct=kmacmill : exe="/usr/sbin/sshd" (hostname=192.168.1.102, addr=2.0.0.0, terminal=ssh res=success)' type=LOGIN msg=audit(1158588258.503:774): login pid=8879 uid=0 old auid=4294967295 new auid=500 type=USER_START msg=audit(1158588258.503:775): user pid=8879 uid=0 auid=500 subj=system_u:system_r:unconfined_t:s0-s0:c0.c255 msg='PAM: session open acct=kmacmill : exe="/usr/sbin/sshd" (hostname=192.168.1.102, addr=2.0.0.0, terminal=ssh res=success)' type=CRED_REFR msg=audit(1158588258.503:776): user pid=8879 uid=0 auid=500 subj=system_u:system_r:unconfined_t:s0-s0:c0.c255 msg='PAM: setcred acct=kmacmill : exe="/usr/sbin/sshd" (hostname=192.168.1.102, addr=2.0.0.0, terminal=ssh res=success)' type=USER_ACCT msg=audit(1158588601.986:777): user pid=8933 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1158588601.986:778): login pid=8933 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1158588601.986:779): user pid=8933 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1158588601.990:780): user pid=8933 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1158588602.010:781): user pid=8933 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1158588602.010:782): user pid=8933 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1158589201.084:783): user pid=8966 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1158589201.084:784): login pid=8966 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1158589201.084:785): user pid=8966 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1158589201.084:786): user pid=8966 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1158589201.104:787): user pid=8966 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1158589201.104:788): user pid=8966 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1158589801.165:789): user pid=9001 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1158589801.165:790): login pid=9001 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1158589801.169:791): user pid=9001 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1158589801.169:792): user pid=9001 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1158589801.189:793): user pid=9001 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1158589801.189:794): user pid=9001 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1158590401.255:795): user pid=9040 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1158590401.255:796): login pid=9040 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1158590401.255:797): user pid=9040 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1158590401.255:798): user pid=9040 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1158590401.279:799): user pid=9040 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1158590401.279:800): user pid=9040 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1158591001.345:801): user pid=9074 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1158591001.345:802): login pid=9074 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1158591001.349:803): user pid=9074 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1158591001.349:804): user pid=9074 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1158591001.365:805): user pid=9074 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1158591001.365:806): user pid=9074 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1158591601.438:807): user pid=9094 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1158591601.438:808): login pid=9094 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1158591601.438:809): user pid=9094 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1158591601.438:810): user pid=9094 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1158591601.458:811): user pid=9094 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1158591601.458:812): user pid=9094 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1158591661.469:813): user pid=9184 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1158591661.469:814): login pid=9184 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1158591661.469:815): user pid=9184 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1158591661.469:816): user pid=9184 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1158591661.509:817): user pid=9184 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1158591661.513:818): user pid=9184 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1158592201.576:819): user pid=9289 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1158592201.576:820): login pid=9289 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1158592201.580:821): user pid=9289 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1158592201.580:822): user pid=9289 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1158592201.604:823): user pid=9289 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1158592201.604:824): user pid=9289 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1158592801.674:825): user pid=9341 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1158592801.674:826): login pid=9341 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1158592801.674:827): user pid=9341 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1158592801.674:828): user pid=9341 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1158592801.694:829): user pid=9341 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1158592801.694:830): user pid=9341 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1158593401.759:831): user pid=9374 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1158593401.759:832): login pid=9374 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1158593401.759:833): user pid=9374 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1158593401.759:834): user pid=9374 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1158593401.775:835): user pid=9374 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1158593401.775:836): user pid=9374 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1158594001.885:837): user pid=9432 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1158594001.885:838): login pid=9432 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1158594001.889:839): user pid=9432 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1158594001.889:840): user pid=9432 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1158594001.909:841): user pid=9432 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1158594001.909:842): user pid=9432 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1158594601.982:843): user pid=9466 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1158594601.982:844): login pid=9466 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1158594601.982:845): user pid=9466 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1158594601.982:846): user pid=9466 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1158594601.998:847): user pid=9466 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1158594602.002:848): user pid=9466 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1158595201.064:849): user pid=9502 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1158595201.064:850): login pid=9502 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1158595201.068:851): user pid=9502 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1158595201.068:852): user pid=9502 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1158595201.084:853): user pid=9502 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1158595201.084:854): user pid=9502 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1158595261.095:855): user pid=9507 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1158595261.095:856): login pid=9507 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1158595261.095:857): user pid=9507 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1158595261.095:858): user pid=9507 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1158595261.119:859): user pid=9507 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1158595261.119:860): user pid=9507 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_AUTH msg=audit(1158595693.694:861): user pid=9561 uid=500 auid=500 subj=user_u:system_r:unconfined_t:s0 msg='PAM: authentication acct=root : exe="/bin/su" (hostname=?, addr=?, terminal=pts/3 res=success)' type=USER_ACCT msg=audit(1158595693.694:862): user pid=9561 uid=500 auid=500 subj=user_u:system_r:unconfined_t:s0 msg='PAM: accounting acct=root : exe="/bin/su" (hostname=?, addr=?, terminal=pts/3 res=success)' type=USER_START msg=audit(1158595693.734:863): user pid=9561 uid=500 auid=500 subj=user_u:system_r:unconfined_t:s0 msg='PAM: session open acct=root : exe="/bin/su" (hostname=?, addr=?, terminal=pts/3 res=success)' type=CRED_ACQ msg=audit(1158595693.758:864): user pid=9561 uid=500 auid=500 subj=user_u:system_r:unconfined_t:s0 msg='PAM: setcred acct=root : exe="/bin/su" (hostname=?, addr=?, terminal=pts/3 res=success)' type=USER_AUTH msg=audit(1158595701.599:865): user pid=9582 uid=0 auid=500 subj=user_u:system_r:unconfined_t:s0 msg='PAM: authentication acct=root : exe="/bin/su" (hostname=?, addr=?, terminal=pts/3 res=success)' type=USER_ACCT msg=audit(1158595701.599:866): user pid=9582 uid=0 auid=500 subj=user_u:system_r:unconfined_t:s0 msg='PAM: accounting acct=root : exe="/bin/su" (hostname=?, addr=?, terminal=pts/3 res=success)' type=USER_START msg=audit(1158595701.627:867): user pid=9582 uid=0 auid=500 subj=user_u:system_r:unconfined_t:s0 msg='PAM: session open acct=root : exe="/bin/su" (hostname=?, addr=?, terminal=pts/3 res=success)' type=CRED_ACQ msg=audit(1158595701.627:868): user pid=9582 uid=0 auid=500 subj=user_u:system_r:unconfined_t:s0 msg='PAM: setcred acct=root : exe="/bin/su" (hostname=?, addr=?, terminal=pts/3 res=success)' type=USER_ACCT msg=audit(1158595801.182:869): user pid=9617 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1158595801.182:870): login pid=9617 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1158595801.182:871): user pid=9617 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1158595801.182:872): user pid=9617 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1158595801.202:873): user pid=9617 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1158595801.202:874): user pid=9617 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1158596401.275:875): user pid=9645 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1158596401.279:876): login pid=9645 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1158596401.279:877): user pid=9645 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1158596401.279:878): user pid=9645 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1158596401.295:879): user pid=9645 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1158596401.295:880): user pid=9645 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1158597001.361:881): user pid=9692 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1158597001.361:882): login pid=9692 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1158597001.361:883): user pid=9692 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1158597001.361:884): user pid=9692 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1158597001.381:885): user pid=9692 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1158597001.381:886): user pid=9692 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' selinux-python-3.0/sepolgen/tests/module_compile_test.te000066400000000000000000000001771356774067000237520ustar00rootroot00000000000000module module_compile_test 1.0; require { type foo, bar; class file { read write }; } allow foo bar : file { read write }; selinux-python-3.0/sepolgen/tests/perm_map000066400000000000000000001015541356774067000211100ustar00rootroot00000000000000# This is a permission map file for use in policy analysis. This # file maps object permissions (read, getattr, setattr, ..., etc.) # for an object class, to exactly one of the following: read, write, # both, or none. This file may be edited as long as the specific # syntax rules are obeyed. # # For each object class, there is a set of object permissions that are # individually mapped to read, write, both, or none. If a new object # class is added, make sure that the current number of object classes # is increased. # # The syntax for an object class definition is: # class # # This is followed by each permission and its individual mapping to one # of the following: # # r = Read # w = Write # n = None # b = Both # # Additionally, you can choose to follow the mapping with an optional # permission weight value from 1 (less importance) to 10 (higher importance). # 10 is the default weight value if one is not provided. # # Look to the examples below for further clarification. # # Number of object classes. 58 class security 11 compute_av n 1 compute_create n 1 compute_member n 1 check_context n 1 load_policy n 1 compute_relabel n 1 compute_user n 1 setenforce n 1 setbool n 1 setsecparam n 1 setcheckreqprot n 1 class process 29 fork n 1 transition w 5 sigchld w 1 sigkill w 1 sigstop w 1 signull n 1 signal w 5 ptrace b 10 getsched r 1 setsched w 1 getsession r 1 getpgid r 1 setpgid w 5 getcap r 3 setcap w 1 share b 1 getattr r 1 setexec w 1 setfscreate w 1 noatsecure n 1 siginh n 1 setrlimit n 1 rlimitinh n 1 dyntransition w 10 setcurrent w 1 execmem n 1 execstack n 1 execheap n 1 setkeycreate w 1 class system 4 ipc_info n 1 syslog_read n 1 syslog_mod n 1 syslog_console n 1 class capability 31 chown n 3 dac_override n 1 dac_read_search n 1 fowner n 1 fsetid n 1 kill n 1 setgid n 3 setuid n 1 setpcap n 3 linux_immutable n 1 net_bind_service n 1 net_broadcast n 1 net_admin n 1 net_raw n 1 ipc_lock n 1 ipc_owner n 1 sys_module n 1 sys_rawio n 1 sys_chroot n 1 sys_ptrace n 1 sys_pacct n 1 sys_admin n 3 sys_boot n 1 sys_nice n 1 sys_resource n 1 sys_time n 1 sys_tty_config n 1 mknod n 1 lease n 1 audit_write n 3 audit_control n 1 class filesystem 10 mount w 1 remount w 1 unmount w 1 getattr r 1 relabelfrom r 10 relabelto w 10 transition w 1 associate n 1 quotamod w 1 quotaget r 1 class file 20 execute_no_trans r 1 entrypoint r 1 execmod n 1 ioctl n 1 read r 10 write w 10 create w 1 getattr r 7 setattr w 7 lock n 1 relabelfrom r 10 relabelto w 10 append w 1 unlink w 1 link w 1 rename w 5 execute r 1 swapon b 1 quotaon b 1 mounton b 1 class dir 22 add_name w 5 remove_name w 1 reparent w 1 search r 1 rmdir b 1 ioctl n 1 read r 10 write w 10 create w 1 getattr r 7 setattr w 7 lock n 1 relabelfrom r 10 relabelto w 10 append w 1 unlink w 1 link w 1 rename w 5 execute r 1 swapon b 1 quotaon b 1 mounton b 1 class fd 1 use b 1 class lnk_file 17 ioctl n 1 read r 10 write w 10 create w 1 getattr r 7 setattr w 7 lock n 1 relabelfrom r 10 relabelto w 10 append w 1 unlink w 1 link w 1 rename w 1 execute r 1 swapon b 1 quotaon b 1 mounton b 1 class chr_file 20 execute_no_trans r 1 entrypoint r 1 execmod n 1 ioctl n 1 read r 10 write w 10 create w 1 getattr r 7 setattr w 7 lock n 1 relabelfrom r 10 relabelto w 10 append w 1 unlink w 1 link w 1 rename w 5 execute r 1 swapon b 1 quotaon b 1 mounton b 1 class blk_file 17 ioctl n 1 read r 10 write w 10 create w 1 getattr r 7 setattr w 7 lock n 1 relabelfrom r 10 relabelto w 10 append w 1 unlink w 1 link w 1 rename w 5 execute r 1 swapon b 1 quotaon b 1 mounton b 1 class sock_file 17 ioctl n 1 read r 10 write w 10 create w 1 getattr r 7 setattr w 7 lock n 1 relabelfrom r 10 relabelto w 10 append w 1 unlink w 1 link w 1 rename w 1 execute r 1 swapon b 1 quotaon b 1 mounton b 1 class fifo_file 17 ioctl n 1 read r 10 write w 10 create w 1 getattr r 7 setattr w 7 lock n 1 relabelfrom r 10 relabelto w 10 append w 1 unlink w 1 link w 1 rename w 5 execute r 1 swapon b 1 quotaon b 1 mounton b 1 class socket 22 ioctl n 1 read r 10 write w 10 create w 1 getattr r 7 setattr w 7 lock n 1 relabelfrom r 10 relabelto w 10 append w 1 bind w 1 connect w 1 listen r 1 accept r 1 getopt r 1 setopt w 1 shutdown w 1 recvfrom r 10 sendto w 10 recv_msg r 10 send_msg w 10 name_bind n 1 class tcp_socket 27 connectto w 1 newconn w 1 acceptfrom r 1 node_bind n 1 ioctl n 1 read r 10 write w 10 create w 1 getattr r 7 setattr w 7 lock n 1 relabelfrom r 10 relabelto w 10 append w 1 bind w 1 connect w 1 listen r 1 accept r 1 getopt r 1 setopt w 1 shutdown w 1 recvfrom r 10 sendto w 10 recv_msg r 10 send_msg w 10 name_bind n 1 name_connect w 1 class udp_socket 23 node_bind n 1 ioctl n 1 read r 10 write w 10 create w 1 getattr r 7 setattr w 7 lock n 1 relabelfrom r 10 relabelto w 10 append w 1 bind w 1 connect w 1 listen r 1 accept r 1 getopt r 1 setopt w 1 shutdown w 1 recvfrom r 10 sendto w 10 recv_msg r 10 send_msg w 10 name_bind n 1 class rawip_socket 23 node_bind n 1 ioctl n 1 read r 10 write w 10 create w 1 getattr r 1 setattr w 1 lock n 1 relabelfrom r 10 relabelto w 10 append w 1 bind w 1 connect w 1 listen r 1 accept r 1 getopt r 1 setopt w 1 shutdown w 1 recvfrom r 10 sendto w 10 recv_msg r 10 send_msg w 10 name_bind n 1 class node 7 tcp_recv r 10 tcp_send w 10 udp_recv r 10 udp_send w 10 rawip_recv r 10 rawip_send w 10 enforce_dest n 1 class netif 6 tcp_recv r 10 tcp_send w 10 udp_recv r 10 udp_send w 10 rawip_recv r 10 rawip_send w 10 class netlink_socket 22 ioctl n 1 read r 10 write w 10 create w 1 getattr r 7 setattr w 7 lock n 1 relabelfrom r 10 relabelto w 10 append w 1 bind w 1 connect w 1 listen r 1 accept r 1 getopt r 1 setopt w 1 shutdown w 1 recvfrom r 10 sendto w 10 recv_msg r 10 send_msg w 10 name_bind n 1 class packet_socket 22 ioctl n 1 read r 10 write w 10 create w 1 getattr r 7 setattr w 7 lock n 1 relabelfrom r 10 relabelto w 10 append w 1 bind w 1 connect w 1 listen r 1 accept r 1 getopt r 1 setopt w 1 shutdown w 1 recvfrom r 10 sendto w 10 recv_msg r 10 send_msg w 10 name_bind n 1 class key_socket 22 ioctl n 1 read r 10 write w 10 create w 1 getattr r 7 setattr w 7 lock n 1 relabelfrom r 10 relabelto w 10 append w 1 bind w 1 connect w 1 listen r 1 accept r 1 getopt r 1 setopt w 1 shutdown w 1 recvfrom r 10 sendto w 10 recv_msg r 10 send_msg w 10 name_bind n 1 class unix_stream_socket 25 connectto w 1 newconn w 1 acceptfrom r 1 ioctl n 1 read r 10 write w 10 create w 1 getattr r 7 setattr w 7 lock n 1 relabelfrom r 10 relabelto w 10 append w 1 bind w 1 connect w 1 listen r 1 accept r 1 getopt r 1 setopt w 1 shutdown w 1 recvfrom r 10 sendto w 10 recv_msg r 10 send_msg w 10 name_bind n 1 class unix_dgram_socket 22 ioctl n 1 read r 10 write w 10 create w 1 getattr r 7 setattr w 7 lock n 1 relabelfrom r 10 relabelto w 10 append w 1 bind w 1 connect w 1 listen r 1 accept r 1 getopt r 1 setopt w 1 shutdown w 1 recvfrom r 10 sendto w 10 recv_msg r 10 send_msg w 10 name_bind n 1 class sem 9 create w 1 destroy w 1 getattr r 1 setattr w 1 read r 10 write w 10 associate n 1 unix_read r 3 unix_write w 3 class msg 2 send w 10 receive r 10 class msgq 10 enqueue w 1 create w 1 destroy w 1 getattr r 1 setattr w 1 read r 10 write w 10 associate n 1 unix_read r 3 unix_write w 3 class shm 10 lock w 1 create w 1 destroy w 1 getattr r 1 setattr w 1 read r 10 write w 10 associate n 1 unix_read r 3 unix_write w 3 class ipc 9 create w 1 destroy w 1 getattr r 1 setattr w 1 read r 10 write w 10 associate n 1 unix_read r 3 unix_write w 3 class passwd 5 passwd w 1 chfn w 5 chsh w 5 rootok n 1 crontab w 5 class drawable 5 create w 1 destroy w 1 draw w 10 copy r 10 getattr r 7 class window 26 addchild w 1 create w 1 destroy w 1 map w 1 unmap w 1 chstack w 10 chproplist w 7 chprop w 10 listprop r 5 getattr r 5 setattr w 5 setfocus w 1 move w 10 chselection w 10 chparent w 5 ctrllife w 5 enumerate w 1 transparent w 1 mousemotion w 10 clientcomevent w 5 inputevent w 5 drawevent w 5 windowchangeevent w 5 windowchangerequest w 5 serverchangeevent w 5 extensionevent w 5 class gc 4 create w 1 free w 1 getattr r 5 setattr w 5 class font 4 load r 1 free w 1 getattr r 5 use r 1 class colormap 9 create w 1 free w 1 install w 10 uninstall w 1 list r 5 read r 10 store w 10 getattr r 5 setattr w 5 class property 4 create w 1 free w 1 read r 10 write w 10 class cursor 5 create w 1 createglyph w 10 free w 1 assign w 10 setattr w 5 class xclient 1 kill w 1 class xinput 11 lookup r 10 getattr r 5 setattr w 5 setfocus w 10 warppointer w 10 activegrab w 1 passivegrab w 1 ungrab w 1 bell w 3 mousemotion w 10 relabelinput b 3 class xserver 8 screensaver w 10 gethostlist r 7 sethostlist w 7 getfontpath r 7 setfontpath w 7 getattr r 7 grab w 10 ungrab w 1 class xextension 2 query r 10 use b 1 class pax 6 pageexec n 1 emutramp n 1 mprotect n 1 randmmap n 1 randexec n 1 segmexec n 1 class netlink_route_socket 24 nlmsg_read r 10 nlmsg_write w 10 ioctl n 1 read r 10 write w 10 create w 1 getattr r 7 setattr w 7 lock n 1 relabelfrom r 10 relabelto w 10 append w 1 bind w 1 connect w 1 listen r 1 accept r 1 getopt r 1 setopt w 1 shutdown w 1 recvfrom r 10 sendto r 10 recv_msg r 10 send_msg w 10 name_bind n 1 class netlink_firewall_socket 24 nlmsg_read r 10 nlmsg_write w 10 ioctl n 1 read r 10 write w 10 create w 1 getattr r 7 setattr w 7 lock n 1 relabelfrom r 10 relabelto w 10 append w 1 bind w 1 connect w 1 listen r 1 accept r 1 getopt r 1 setopt w 1 shutdown w 1 recvfrom r 10 sendto r 10 recv_msg r 10 send_msg w 10 name_bind n 1 class netlink_tcpdiag_socket 24 nlmsg_read r 10 nlmsg_write w 10 ioctl n 1 read r 10 write w 10 create w 1 getattr r 7 setattr w 7 lock n 1 relabelfrom r 10 relabelto w 10 append w 1 bind w 1 connect w 1 listen r 1 accept r 1 getopt r 1 setopt w 1 shutdown w 1 recvfrom r 10 sendto r 10 recv_msg r 10 send_msg w 10 name_bind n 1 class netlink_nflog_socket 22 ioctl n 1 read r 10 write w 10 create w 1 getattr r 7 setattr w 7 lock n 1 relabelfrom r 10 relabelto w 10 append w 1 bind w 1 connect w 1 listen r 1 accept r 1 getopt r 1 setopt w 1 shutdown w 1 recvfrom r 10 sendto r 10 recv_msg r 10 send_msg w 10 name_bind n 1 class netlink_xfrm_socket 24 nlmsg_read r 10 nlmsg_write w 10 ioctl n 1 read r 10 write w 10 create w 1 getattr r 7 setattr w 7 lock n 1 relabelfrom r 10 relabelto w 10 append w 1 bind w 1 connect w 1 listen r 1 accept r 1 getopt r 1 setopt w 1 shutdown w 1 recvfrom r 10 sendto r 10 recv_msg r 10 send_msg w 10 name_bind n 1 class netlink_selinux_socket 22 ioctl n 1 read r 10 write w 10 create w 1 getattr r 7 setattr w 7 lock n 1 relabelfrom r 10 relabelto w 10 append w 1 bind w 1 connect w 1 listen r 1 accept r 1 getopt r 1 setopt w 1 shutdown w 1 recvfrom r 10 sendto r 10 recv_msg r 10 send_msg w 10 name_bind n 1 class netlink_audit_socket 26 nlmsg_read r 10 nlmsg_write w 10 ioctl n 1 read r 10 write w 10 create w 1 getattr r 7 setattr w 7 lock n 1 relabelfrom r 10 relabelto w 10 append w 1 bind w 1 connect w 1 listen r 1 accept r 1 getopt r 1 setopt w 1 shutdown w 1 recvfrom r 10 sendto r 10 recv_msg r 10 send_msg w 10 name_bind n 1 nlmsg_relay w 10 nlmsg_readpriv r 10 class netlink_ip6fw_socket 24 nlmsg_read r 10 nlmsg_write w 10 ioctl n 1 read r 10 write w 10 create w 1 getattr r 7 setattr w 7 lock n 1 relabelfrom r 10 relabelto w 10 append w 1 bind w 1 connect w 1 listen r 1 accept r 1 getopt r 1 setopt w 1 shutdown w 1 recvfrom r 10 sendto r 10 recv_msg r 10 send_msg w 10 name_bind n 1 class netlink_dnrt_socket 22 ioctl n 1 read r 10 write w 10 create w 1 getattr r 7 setattr w 7 lock n 1 relabelfrom r 10 relabelto w 10 append w 1 bind w 1 connect w 1 listen r 1 accept r 1 getopt r 1 setopt w 1 shutdown w 1 recvfrom r 10 sendto r 10 recv_msg r 10 send_msg w 10 name_bind n 1 class netlink_kobject_uevent_socket 22 ioctl n 1 read r 10 write w 10 create w 1 getattr r 7 setattr w 7 lock n 1 relabelfrom r 10 relabelto w 10 append w 1 bind w 1 connect w 1 listen r 1 accept r 1 getopt r 1 setopt w 1 shutdown w 1 recvfrom r 10 sendto w 10 recv_msg r 10 send_msg w 10 name_bind n 1 class dbus 2 acquire_svc b 1 send_msg w 10 class nscd 8 getpwd r 7 getgrp r 7 gethost r 7 getstat r 7 admin w 5 shmempwd r 7 shmemgrp r 7 shmemhost r 7 class association 4 sendto w 10 recvfrom r 10 setcontext w 3 polmatch r 1 class appletalk_socket 22 ioctl n 1 read r 10 write w 10 create w 1 getattr r 1 setattr w 1 lock n 1 relabelfrom r 10 relabelto w 10 append w 1 bind w 1 connect w 1 listen r 1 accept r 1 getopt r 1 setopt w 1 shutdown w 1 recvfrom r 10 sendto w 10 recv_msg r 10 send_msg w 10 name_bind n 1 class key 7 view r 7 read r 10 write w 10 search r 5 link w 7 setattr w 7 create w 10 class packet 3 send w 10 recv r 10 relabelto w 3 selinux-python-3.0/sepolgen/tests/run-tests.py000066400000000000000000000005501356774067000216750ustar00rootroot00000000000000import unittest import sys sys.path.insert(0, "../src/.") from test_access import * from test_audit import * from test_refpolicy import * from test_refparser import * from test_policygen import * from test_matching import * from test_interfaces import * from test_objectmodel import * from test_module import * if __name__ == "__main__": unittest.main() selinux-python-3.0/sepolgen/tests/test_access.py000066400000000000000000000322201356774067000222300ustar00rootroot00000000000000# Authors: Karl MacMillan # # Copyright (C) 2006 Red Hat # see file 'COPYING' for use and warranty information # # This program is free software; you can redistribute it and/or # modify it under the terms of the GNU General Public License as # published by the Free Software Foundation; version 2 only # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program; if not, write to the Free Software # Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA # import unittest import sepolgen.refpolicy as refpolicy import sepolgen.refparser as refparser import sepolgen.policygen as policygen import sepolgen.access as access class TestAccessVector(unittest.TestCase): def test_init(self): # Default construction a = access.AccessVector() self.assertEqual(a.src_type, None) self.assertEqual(a.tgt_type, None) self.assertEqual(a.obj_class, None) self.assertTrue(isinstance(a.perms, refpolicy.IdSet)) self.assertTrue(isinstance(a.audit_msgs, type([]))) self.assertTrue(isinstance(a.xperms, type({}))) self.assertEqual(len(a.audit_msgs), 0) # Construction from a list a = access.AccessVector() a.src_type = "foo" a.tgt_type = "bar" a.obj_class = "file" a.perms.update(["read", "write"]) l = access.AccessVector(['foo', 'bar', 'file', 'read', 'write']) self.assertEqual(a.src_type, l.src_type) self.assertEqual(a.tgt_type, l.tgt_type) self.assertEqual(a.obj_class, l.obj_class) self.assertEqual(a.perms, l.perms) def test_from_list(self): a = access.AccessVector() a.src_type = "foo" a.tgt_type = "bar" a.obj_class = "file" a.perms.update(["read", "write"]) l = access.AccessVector() l.from_list(['foo', 'bar', 'file', 'read', 'write']) self.assertEqual(a.src_type, l.src_type) self.assertEqual(a.tgt_type, l.tgt_type) self.assertEqual(a.obj_class, l.obj_class) self.assertEqual(a.perms, l.perms) l2 = access.AccessVector() with self.assertRaises(ValueError): l2.from_list(['foo', 'bar', 'file']) def test_to_list(self): a = access.AccessVector() a.src_type = "foo" a.tgt_type = "bar" a.obj_class = "file" a.perms.update(["read", "write"]) l = a.to_list() self.assertEqual(l[0], "foo") self.assertEqual(l[1], "bar") self.assertEqual(l[2], "file") perms = l[3:] perms.sort() self.assertEqual(perms[0], "read") self.assertEqual(perms[1], "write") def test_to_string(self): a = access.AccessVector() a.src_type = "foo" a.tgt_type = "bar" a.obj_class = "file" a.perms.update(["read", "write"]) first, second = str(a).split(':') self.assertEqual(first, "allow foo bar") second = second.split(' ') second.sort() expected = "file { read write };".split(' ') expected.sort() self.assertEqual(second, expected) first, second = a.to_string().split(':') self.assertEqual(first, "allow foo bar") second = second.split(' ') second.sort() expected = "file { read write };".split(' ') expected.sort() self.assertEqual(second, expected) def test_cmp(self): a = access.AccessVector() a.src_type = "foo" a.tgt_type = "bar" a.obj_class = "file" a.perms.update(["read", "write"]) b = access.AccessVector() b.src_type = "foo" b.tgt_type = "bar" b.obj_class = "file" b.perms.update(["read", "write"]) self.assertEqual(a, b) # Source Type b.src_type = "baz" self.assertNotEqual(a, b) self.assertTrue(a > b) b.src_type = "gaz" self.assertNotEqual(a, b) self.assertTrue(a < b) # Target Type b.src_type = "foo" b.tgt_type = "aar" self.assertNotEqual(a, b) self.assertTrue(a > b) b.tgt_type = "gaz" self.assertNotEqual(a, b) self.assertTrue(a < b) # Perms b.tgt_type = "bar" b.perms = refpolicy.IdSet(["read"]) self.assertNotEqual(a, b) self.assertTrue(a > b) b.perms = refpolicy.IdSet(["read", "write", "append"]) self.assertNotEqual(a, b) b.perms = refpolicy.IdSet(["read", "append"]) self.assertNotEqual(a, b) def test_merge_noxperm(self): """Test merging two AVs without xperms""" a = access.AccessVector(["foo", "bar", "file", "read", "write"]) b = access.AccessVector(["foo", "bar", "file", "append"]) a.merge(b) self.assertEqual(sorted(list(a.perms)), ["append", "read", "write"]) def text_merge_xperm1(self): """Test merging AV that contains xperms with AV that does not""" a = access.AccessVector(["foo", "bar", "file", "read"]) b = access.AccessVector(["foo", "bar", "file", "read"]) xp = refpolicy.XpermSet() xp.add(42) xp.add(12345) b.xperms = {"ioctl": xp} a.merge(b) self.assertEqual(sorted(list(a.perms)), ["append", "read", "write"]) self.assertEqual(list(a.xperms.keys()), ["ioctl"]) self.assertEqual(a.xperms["ioctl"].to_string(), "{ 42 12345 }") def text_merge_xperm2(self): """Test merging AV that does not contain xperms with AV that does""" a = access.AccessVector(["foo", "bar", "file", "read"]) xp = refpolicy.XpermSet() xp.add(42) xp.add(12345) a.xperms = {"ioctl": xp} b = access.AccessVector(["foo", "bar", "file", "read"]) a.merge(b) self.assertEqual(sorted(list(a.perms)), ["append", "read", "write"]) self.assertEqual(list(a.xperms.keys()), ["ioctl"]) self.assertEqual(a.xperms["ioctl"].to_string(), "{ 42 12345 }") def test_merge_xperm_diff_op(self): """Test merging two AVs that contain xperms with different operation""" a = access.AccessVector(["foo", "bar", "file", "read"]) xp1 = refpolicy.XpermSet() xp1.add(23) a.xperms = {"asdf": xp1} b = access.AccessVector(["foo", "bar", "file", "read"]) xp2 = refpolicy.XpermSet() xp2.add(42) xp2.add(12345) b.xperms = {"ioctl": xp2} a.merge(b) self.assertEqual(list(a.perms), ["read"]) self.assertEqual(sorted(list(a.xperms.keys())), ["asdf", "ioctl"]) self.assertEqual(a.xperms["asdf"].to_string(), "23") self.assertEqual(a.xperms["ioctl"].to_string(), "{ 42 12345 }") def test_merge_xperm_same_op(self): """Test merging two AVs that contain xperms with same operation""" a = access.AccessVector(["foo", "bar", "file", "read"]) xp1 = refpolicy.XpermSet() xp1.add(23) a.xperms = {"ioctl": xp1} b = access.AccessVector(["foo", "bar", "file", "read"]) xp2 = refpolicy.XpermSet() xp2.add(42) xp2.add(12345) b.xperms = {"ioctl": xp2} a.merge(b) self.assertEqual(list(a.perms), ["read"]) self.assertEqual(list(a.xperms.keys()), ["ioctl"]) self.assertEqual(a.xperms["ioctl"].to_string(), "{ 23 42 12345 }") class TestUtilFunctions(unittest.TestCase): def test_is_idparam(self): self.assertTrue(access.is_idparam("$1")) self.assertTrue(access.is_idparam("$2")) self.assertTrue(access.is_idparam("$123")) self.assertFalse(access.is_idparam("$123.23")) self.assertFalse(access.is_idparam("$A")) def test_avrule_to_access_vectors(self): rule = refpolicy.AVRule() rule.src_types.add("foo") rule.src_types.add("baz") rule.tgt_types.add("bar") rule.tgt_types.add("what") rule.obj_classes.add("file") rule.obj_classes.add("dir") rule.perms.add("read") rule.perms.add("write") avs = access.avrule_to_access_vectors(rule) self.assertEqual(len(avs), 8) comps = [("foo", "what", "dir"), ("foo", "what", "file"), ("foo", "bar", "dir"), ("foo", "bar", "file"), ("baz", "what", "dir"), ("baz", "what", "file"), ("baz", "bar", "dir"), ("baz", "bar", "file")] status = [False] * 8 for av in access.avrule_to_access_vectors(rule): self.assertEqual(av.perms, refpolicy.IdSet(["read", "write"])) for i in range(len(comps)): if comps[i][0] == av.src_type and \ comps[i][1] == av.tgt_type and \ comps[i][2] == av.obj_class: status[i] = True for s in status: self.assertEqual(s, True) class TestAccessVectorSet(unittest.TestCase): def setUp(self): rule = refpolicy.AVRule() rule.src_types.add("foo") rule.src_types.add("baz") rule.tgt_types.add("bar") rule.tgt_types.add("what") rule.obj_classes.add("file") rule.obj_classes.add("dir") rule.perms.add("read") rule.perms.add("write") s = access.AccessVectorSet() avs = access.avrule_to_access_vectors(rule) for av in avs: s.add_av(av) self.s = s def test_init(self): a = access.AccessVectorSet() def test_iter(self): comps = [("foo", "what", "dir"), ("foo", "what", "file"), ("foo", "bar", "dir"), ("foo", "bar", "file"), ("baz", "what", "dir"), ("baz", "what", "file"), ("baz", "bar", "dir"), ("baz", "bar", "file")] status = [False] * 8 for av in self.s: self.assertEqual(av.perms, refpolicy.IdSet(["read", "write"])) for i in range(len(comps)): if comps[i][0] == av.src_type and \ comps[i][1] == av.tgt_type and \ comps[i][2] == av.obj_class: status[i] = True for s in status: self.assertEqual(s, True) def test_len(self): self.assertEqual(len(self.s), 8) def test_list(self): a = access.AccessVectorSet() a.add("$1", "foo", "file", refpolicy.IdSet(["read", "write"])) a.add("$1", "bar", "file", refpolicy.IdSet(["read", "write"])) a.add("what", "bar", "file", refpolicy.IdSet(["read", "write"])) avl = a.to_list() avl.sort() test_l = [['what','bar','file','read','write'], ['$1','foo','file','read','write'], ['$1','bar','file','read','write']] test_l.sort() for a,b in zip(test_l, avl): self.assertEqual(len(a), len(b)) for x,y in list(zip(a,b))[:3]: self.assertEqual(x, y) perms1 = a[3:] perms2 = b[3:] perms1.sort() perms2.sort() self.assertEqual(perms1, perms2) b = access.AccessVectorSet() b.from_list(avl) self.assertEqual(len(b), 3) def test_add_av_first(self): """Test adding first AV to the AV set""" avs = access.AccessVectorSet() av = access.AccessVector(['foo', 'bar', 'file', 'read']) avs.add_av(av) self.assertEqual(avs.to_list(), [['foo', 'bar', 'file', 'read']]) def test_add_av_second(self): """Test adding second AV to the AV set with same source and target context and class""" avs = access.AccessVectorSet() av1 = access.AccessVector(['foo', 'bar', 'file', 'read']) av2 = access.AccessVector(['foo', 'bar', 'file', 'write']) avs.add_av(av1) avs.add_av(av2) self.assertEqual(avs.to_list(), [['foo', 'bar', 'file', 'read', 'write']]) def test_add_av_with_msg(self): """Test adding audit message""" avs = access.AccessVectorSet() av = access.AccessVector(['foo', 'bar', 'file', 'read']) avs.add_av(av, 'test message') self.assertEqual(avs.src['foo']['bar']['file', av.type].audit_msgs, ['test message']) def test_add(self): """Test adding AV to the set""" s = access.AccessVectorSet() def test_add_av(av, audit_msg=None): self.assertEqual(av.src_type, 'foo') self.assertEqual(av.tgt_type, 'bar') self.assertEqual(av.obj_class, 'file') self.assertEqual(list(av.perms), ['read']) self.assertEqual(av.data, 'test data') self.assertEqual(av.type, 42) self.assertEqual(audit_msg, 'test message') s.add_av = test_add_av s.add("foo", "bar", "file", refpolicy.IdSet(["read"]), audit_msg='test message', avc_type=42, data='test data') selinux-python-3.0/sepolgen/tests/test_audit.py000066400000000000000000000342031356774067000221000ustar00rootroot00000000000000# Authors: Karl MacMillan # # Copyright (C) 2006 Red Hat # see file 'COPYING' for use and warranty information # # This program is free software; you can redistribute it and/or # modify it under the terms of the GNU General Public License as # published by the Free Software Foundation; version 2 only # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program; if not, write to the Free Software # Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA # import unittest import sepolgen.audit import sepolgen.refpolicy # syslog message audit1 = """Sep 12 08:26:43 dhcp83-5 kernel: audit(1158064002.046:4): avc: denied { read } for pid=2 496 comm="bluez-pin" name=".gdm1K3IFT" dev=dm-0 ino=3601333 scontext=user_u:system_r:bluetooth_helper_t:s0-s0:c0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file""" # audit daemon messages audit2 = """type=AVC msg=audit(1158584779.745:708): avc: denied { dac_read_search } for pid=8132 comm="sh" capability=2 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability""" log1 = """type=AVC msg=audit(1158584779.745:708): avc: denied { dac_read_search } for pid=8132 comm="sh" capability=2 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability type=SYSCALL msg=audit(1158584779.745:708): arch=40000003 syscall=195 success=no exit=-13 a0=80d2437 a1=bf9132f8 a2=4c56cff4 a3=0 items=0 ppid=8131 pid=8132 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sh" exe="/bin/bash" subj=user_u:system_r:vpnc_t:s0 key=(null) type=AVC msg=audit(1158584779.753:709): avc: denied { dac_override } for pid=8133 comm="vpnc-script" capability=1 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability type=AVC msg=audit(1158584779.753:709): avc: denied { dac_read_search } for pid=8133 comm="vpnc-script" capability=2 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability type=SYSCALL msg=audit(1158584779.753:709): arch=40000003 syscall=195 success=no exit=-13 a0=80d2437 a1=bf910a48 a2=4c56cff4 a3=0 items=0 ppid=8132 pid=8133 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vpnc-script" exe="/bin/bash" subj=user_u:system_r:vpnc_t:s0 key=(null) type=AVC msg=audit(1158584779.825:710): avc: denied { dac_override } for pid=8134 comm="vpnc-script" capability=1 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability type=AVC msg=audit(1158584779.825:710): avc: denied { dac_read_search } for pid=8134 comm="vpnc-script" capability=2 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability type=SYSCALL msg=audit(1158584779.825:710): arch=40000003 syscall=195 success=no exit=-13 a0=80d2437 a1=bf910a48 a2=4c56cff4 a3=0 items=0 ppid=8132 pid=8134 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vpnc-script" exe="/bin/bash" subj=user_u:system_r:vpnc_t:s0 key=(null) type=AVC msg=audit(1158584780.793:711): avc: denied { dac_override } for pid=8144 comm="sh" capability=1 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability type=AVC msg=audit(1158584780.793:711): avc: denied { dac_read_search } for pid=8144 comm="sh" capability=2 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability type=SYSCALL msg=audit(1158584780.793:711): arch=40000003 syscall=195 success=no exit=-13 a0=80d2437 a1=bfc0ba38 a2=4c56cff4 a3=0 items=0 ppid=8131 pid=8144 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sh" exe="/bin/bash" subj=user_u:system_r:vpnc_t:s0 key=(null) type=AVC msg=audit(1158584780.797:712): avc: denied { dac_override } for pid=8145 comm="vpnc-script" capability=1 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability type=AVC msg=audit(1158584780.797:712): avc: denied { dac_read_search } for pid=8145 comm="vpnc-script" capability=2 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability type=SYSCALL msg=audit(1158584780.797:712): arch=40000003 syscall=195 success=no exit=-13 a0=80d2437 a1=bfc0b188 a2=4c56cff4 a3=0 items=0 ppid=8144 pid=8145 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vpnc-script" exe="/bin/bash" subj=user_u:system_r:vpnc_t:s0 key=(null) type=AVC msg=audit(1158584780.801:713): avc: denied { dac_override } for pid=8146 comm="vpnc-script" capability=1 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability type=AVC msg=audit(1158584780.801:713): avc: denied { dac_read_search } for pid=8146 comm="vpnc-script" capability=2 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability type=AVC_PATH msg=audit(1162850461.778:1113): path="/etc/rc.d/init.d/innd" """ granted1 = """type=AVC msg=audit(1188833848.190:34): avc: granted { getattr } for pid=4310 comm="ls" name="foo.pp" dev=sda5 ino=295171 scontext=user_u:system_r:unconfined_t:s0 tcontext=user_u:object_r:user_home_t:s0 tclass=file""" path1 = """type=AVC_PATH msg=audit(1162852201.019:1225): path="/usr/lib/sa/sa1" """ log2 = """type=AVC_PATH msg=audit(1162852201.019:1225): path="/usr/lib/sa/sa1" type=SYSCALL msg=audit(1162852201.019:1225): arch=40000003 syscall=11 success=yes exit=0 a0=87271b0 a1=8727358 a2=8727290 a3=8727008 items=0 ppid=6973 pid=6974 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sa1" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162852201.019:1225): avc: denied { execute_no_trans } for pid=6974 comm="sh" name="sa1" dev=dm-0 ino=13061698 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:lib_t:s0 tclass=file type=AVC msg=audit(1162852201.019:1225): avc: denied { execute } for pid=6974 comm="sh" name="sa1" dev=dm-0 ino=13061698 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:lib_t:s0 tclass=file""" xperms1 = """type=AVC msg=audit(1516626657.910:4461): avc: denied { ioctl } for pid=4310 comm="test" path="/root/test" ino=8619937 ioctlcmd=0x42 scontext=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:test_file_t:s0 tclass=file permissive=0 """ xperms2 = """type=AVC msg=audit(1516626657.910:4461): avc: denied { ioctl } for pid=4310 comm="test" path="/root/test" ino=8619937 ioctlcmd=0x42 scontext=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:test_file_t:s0 tclass=file permissive=0 type=AVC msg=audit(1516626657.910:4461): avc: denied { ioctl } for pid=4310 comm="test" path="/root/test" ino=8619937 ioctlcmd=0x1234 scontext=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:test_file_t:s0 tclass=file permissive=0 type=AVC msg=audit(1516626657.910:4461): avc: denied { ioctl } for pid=4310 comm="test" path="/root/test" ino=8619937 ioctlcmd=0xdead scontext=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:test_file_t:s0 tclass=file permissive=0 type=AVC msg=audit(1516626657.910:4461): avc: denied { getattr } for pid=4310 comm="test" path="/root/test" ino=8619937 scontext=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:test_file_t:s0 tclass=dir permissive=0 """ xperms_invalid = """type=AVC msg=audit(1516626657.910:4461): avc: denied { ioctl } for pid=4310 comm="test" path="/root/test" ino=8619937 ioctlcmd=asdf scontext=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:test_file_t:s0 tclass=file permissive=0 """ xperms_without = """type=AVC msg=audit(1516626657.910:4461): avc: denied { ioctl } for pid=4310 comm="test" path="/root/test" ino=8619937 scontext=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:test_file_t:s0 tclass=file permissive=0 """ class TestAVCMessage(unittest.TestCase): def test_defs(self): avc = sepolgen.audit.AVCMessage(audit1) sc = sepolgen.refpolicy.SecurityContext() self.assertEqual(avc.scontext, sc) self.assertEqual(avc.tcontext, sc) self.assertEqual(avc.tclass, "") self.assertEqual(avc.accesses, []) self.assertEqual(avc.ioctlcmd, None) def test_granted(self): avc = sepolgen.audit.AVCMessage(granted1) avc.from_split_string(granted1.split()) self.assertEqual(avc.scontext.user, "user_u") self.assertEqual(avc.scontext.role, "system_r") self.assertEqual(avc.scontext.type, "unconfined_t") self.assertEqual(avc.scontext.level, "s0") self.assertEqual(avc.tcontext.user, "user_u") self.assertEqual(avc.tcontext.role, "object_r") self.assertEqual(avc.tcontext.type, "user_home_t") self.assertEqual(avc.tcontext.level, "s0") self.assertEqual(avc.tclass, "file") self.assertEqual(avc.accesses, ["getattr"]) self.assertEqual(avc.denial, False) def test_xperms(self): """Test that the ioctlcmd field is parsed""" avc = sepolgen.audit.AVCMessage(xperms1) recs = xperms1.split() avc.from_split_string(recs) self.assertEqual(avc.ioctlcmd, 66) def test_xperms_invalid(self): """Test message with invalid value in the ioctlcmd field""" avc = sepolgen.audit.AVCMessage(xperms_invalid) recs = xperms_invalid.split() avc.from_split_string(recs) self.assertIsNone(avc.ioctlcmd) def test_xperms_without(self): """Test message without the ioctlcmd field""" avc = sepolgen.audit.AVCMessage(xperms_without) recs = xperms_without.split() avc.from_split_string(recs) self.assertIsNone(avc.ioctlcmd) def test_from_split_string(self): # syslog message avc = sepolgen.audit.AVCMessage(audit1) recs = audit1.split() avc.from_split_string(recs) self.assertEqual(avc.header, "audit(1158064002.046:4):") self.assertEqual(avc.scontext.user, "user_u") self.assertEqual(avc.scontext.role, "system_r") self.assertEqual(avc.scontext.type, "bluetooth_helper_t") self.assertEqual(avc.scontext.level, "s0-s0:c0") self.assertEqual(avc.tcontext.user, "system_u") self.assertEqual(avc.tcontext.role, "object_r") self.assertEqual(avc.tcontext.type, "xdm_tmp_t") self.assertEqual(avc.tcontext.level, "s0") self.assertEqual(avc.tclass, "file") self.assertEqual(avc.accesses, ["read"]) self.assertEqual(avc.comm, "bluez-pin") self.assertEqual(avc.denial, True) # audit daemon message avc = sepolgen.audit.AVCMessage(audit2) recs = audit2.split() avc.from_split_string(recs) self.assertEqual(avc.header, "audit(1158584779.745:708):") self.assertEqual(avc.scontext.user, "user_u") self.assertEqual(avc.scontext.role, "system_r") self.assertEqual(avc.scontext.type, "vpnc_t") self.assertEqual(avc.scontext.level, "s0") self.assertEqual(avc.tcontext.user, "user_u") self.assertEqual(avc.tcontext.role, "system_r") self.assertEqual(avc.tcontext.type, "vpnc_t") self.assertEqual(avc.tcontext.level, "s0") self.assertEqual(avc.tclass, "capability") self.assertEqual(avc.accesses, ["dac_read_search"]) self.assertEqual(avc.comm, "sh") self.assertEqual(avc.denial, True) class TestPathMessage(unittest.TestCase): def test_from_split_string(self): path = sepolgen.audit.PathMessage(path1) recs = path1.split() path.from_split_string(recs) self.assertEqual(path.path, "/usr/lib/sa/sa1") # TODO - add tests for the other message types # TODO - these tests need a lot of expansion and more examples of # different types of log files class TestAuditParser(unittest.TestCase): def test_parse_string(self): a = sepolgen.audit.AuditParser() a.parse_string(log1) self.assertEqual(len(a.avc_msgs), 11) self.assertEqual(len(a.compute_sid_msgs), 0) self.assertEqual(len(a.invalid_msgs), 0) self.assertEqual(len(a.policy_load_msgs), 0) self.assertEqual(len(a.path_msgs), 1) def test_post_process(self): a = sepolgen.audit.AuditParser() a.parse_string(log2) self.assertEqual(len(a.avc_msgs), 2) self.assertEqual(a.avc_msgs[0].path, "/usr/lib/sa/sa1") self.assertEqual(a.avc_msgs[1].path, "/usr/lib/sa/sa1") def test_parse_file(self): f = open("audit.txt") a = sepolgen.audit.AuditParser() a.parse_file(f) f.close() self.assertEqual(len(a.avc_msgs), 21) self.assertEqual(len(a.compute_sid_msgs), 0) self.assertEqual(len(a.invalid_msgs), 0) self.assertEqual(len(a.policy_load_msgs), 0) def test_parse_xperms(self): """ Test that correct access vectors are generated from a set of AVC denial messages. """ a = sepolgen.audit.AuditParser() a.parse_string(xperms2) av_set = a.to_access() self.assertEqual(len(av_set), 2) av_list = list(sorted(av_set)) self.assertEqual(av_list[0].xperms, {}) self.assertEqual(list(av_list[1].xperms), ["ioctl"]) self.assertEqual(av_list[1].xperms["ioctl"].ranges, [(66,66), (4660,4660), (57005,57005)]) class TestGeneration(unittest.TestCase): def test_generation(self): parser = sepolgen.audit.AuditParser() parser.parse_string(log1) avs = parser.to_access() self.assertEqual(len(avs), 1) def test_genaration_granted(self): parser = sepolgen.audit.AuditParser() parser.parse_string(granted1) avs = parser.to_access() self.assertEqual(len(avs), 0) avs = parser.to_access(only_denials=False) self.assertEqual(len(avs), 1) selinux-python-3.0/sepolgen/tests/test_data/000077500000000000000000000000001356774067000213275ustar00rootroot00000000000000selinux-python-3.0/sepolgen/tests/test_data/audit.log000066400000000000000000045007101356774067000231470ustar00rootroot00000000000000type=AVC msg=audit(1162850331.422:978): avc: denied { ioctl } for pid=6314 comm="pam_timestamp_c" name="[96391]" dev=pipefs ino=96391 scontext=staff_u:staff_r:pam_t:s0 tcontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tclass=fifo_file type=SYSCALL msg=audit(1162850331.422:978): arch=40000003 syscall=54 success=no exit=-22 a0=2 a1=5401 a2=bfb6479c a3=bfb647dc items=0 ppid=6311 pid=6314 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=(none) comm="pam_timestamp_c" exe="/sbin/pam_timestamp_check" subj=staff_u:staff_r:pam_t:s0 key=(null) type=AVC_PATH msg=audit(1162850331.422:978): path="pipe:[96391]" type=AVC msg=audit(1162850332.318:979): avc: denied { read } for pid=6306 comm="beagled" name=".gdmDOM7HT" dev=dm-0 ino=14469552 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162850332.318:979): arch=40000003 syscall=33 success=yes exit=0 a0=bfdb2fde a1=4 a2=4db18a64 a3=bfdb2fde items=0 ppid=1 pid=6306 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="beagled" exe="/usr/bin/mono" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162850333.186:980): avc: denied { read } for pid=6306 comm="beagled" name="max_user_instances" dev=proc ino=-268435218 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=file type=SYSCALL msg=audit(1162850333.186:980): arch=40000003 syscall=5 success=yes exit=24 a0=11833c a1=0 a2=1 a3=8aeffb8 items=0 ppid=1 pid=6306 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="beagled" exe="/usr/bin/mono" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162850335.022:981): avc: denied { read write } for pid=6336 comm="clock-applet" name="bonobo-activation-register.lock" dev=dm-0 ino=5434689 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:user_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162850335.022:981): arch=40000003 syscall=5 success=yes exit=13 a0=9c0e840 a1=42 a2=1c0 a3=9c0e840 items=0 ppid=1 pid=6336 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="clock-applet" exe="/usr/libexec/clock-applet" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162850335.022:982): avc: denied { lock } for pid=6336 comm="clock-applet" name="bonobo-activation-register.lock" dev=dm-0 ino=5434689 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:user_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162850335.022:982): arch=40000003 syscall=221 success=yes exit=0 a0=d a1=7 a2=bf991e3c a3=bf991e3c items=0 ppid=1 pid=6336 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="clock-applet" exe="/usr/libexec/clock-applet" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1162850335.022:982): path="/tmp/orbit-kmacmill/bonobo-activation-register.lock" type=USER_AUTH msg=audit(1162850343.419:983): user pid=6377 uid=500 auid=500 subj=staff_u:staff_r:staff_su_t:s0 msg='PAM: authentication acct=root : exe="/bin/su" (hostname=?, addr=?, terminal=pts/1 res=success)' type=USER_ACCT msg=audit(1162850343.419:984): user pid=6377 uid=500 auid=500 subj=staff_u:staff_r:staff_su_t:s0 msg='PAM: accounting acct=root : exe="/bin/su" (hostname=?, addr=?, terminal=pts/1 res=success)' type=AVC msg=audit(1162850343.419:985): avc: denied { search } for pid=6377 comm="su" name="root" dev=dm-0 ino=13127137 scontext=staff_u:staff_r:staff_su_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=SYSCALL msg=audit(1162850343.419:985): arch=40000003 syscall=5 success=no exit=-2 a0=bf95cd98 a1=8000 a2=1b6 a3=8e1f9a8 items=0 ppid=6356 pid=6377 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=pts1 comm="su" exe="/bin/su" subj=staff_u:staff_r:staff_su_t:s0 key=(null) type=AVC msg=audit(1162850343.427:986): avc: denied { write } for pid=6378 comm="xauth" name=".gdmDOM7HT" dev=dm-0 ino=14469552 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162850343.427:986): arch=40000003 syscall=33 success=yes exit=0 a0=bfa1f935 a1=2 a2=bfa1e1e0 a3=0 items=0 ppid=6377 pid=6378 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts1 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC msg=audit(1162850343.427:987): avc: denied { read } for pid=6378 comm="xauth" name=".gdmDOM7HT" dev=dm-0 ino=14469552 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162850343.427:987): arch=40000003 syscall=5 success=yes exit=2 a0=bfa1f935 a1=0 a2=1b6 a3=85b5008 items=0 ppid=6377 pid=6378 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts1 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC msg=audit(1162850343.427:988): avc: denied { getattr } for pid=6378 comm="xauth" name=".gdmDOM7HT" dev=dm-0 ino=14469552 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162850343.427:988): arch=40000003 syscall=197 success=yes exit=0 a0=2 a1=bfa1df2c a2=ce8ff4 a3=85b5008 items=0 ppid=6377 pid=6378 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts1 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC_PATH msg=audit(1162850343.427:988): path="/tmp/.gdmDOM7HT" type=AVC msg=audit(1162850343.427:989): avc: denied { write } for pid=6377 comm="su" name="root" dev=dm-0 ino=13127137 scontext=staff_u:staff_r:staff_su_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1162850343.427:989): avc: denied { add_name } for pid=6377 comm="su" name=".xauthqtQAcS" scontext=staff_u:staff_r:staff_su_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1162850343.427:989): avc: denied { create } for pid=6377 comm="su" name=".xauthqtQAcS" scontext=staff_u:staff_r:staff_su_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1162850343.427:989): arch=40000003 syscall=5 success=yes exit=4 a0=8e1facb a1=80c2 a2=180 a3=80c2 items=0 ppid=6356 pid=6377 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=pts1 comm="su" exe="/bin/su" subj=staff_u:staff_r:staff_su_t:s0 key=(null) type=AVC msg=audit(1162850343.427:990): avc: denied { setattr } for pid=6377 comm="su" name=".xauthqtQAcS" dev=dm-0 ino=13127376 scontext=staff_u:staff_r:staff_su_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1162850343.427:990): arch=40000003 syscall=207 success=yes exit=0 a0=4 a1=0 a2=0 a3=16d69f items=0 ppid=6356 pid=6377 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=pts1 comm="su" exe="/bin/su" subj=staff_u:staff_r:staff_su_t:s0 key=(null) type=AVC msg=audit(1162850343.427:991): avc: denied { search } for pid=6379 comm="xauth" name="root" dev=dm-0 ino=13127137 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=SYSCALL msg=audit(1162850343.427:991): arch=40000003 syscall=195 success=no exit=-2 a0=bffc4257 a1=bffc3d70 a2=ad6ff4 a3=3 items=0 ppid=6377 pid=6379 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC msg=audit(1162850343.427:992): avc: denied { write } for pid=6379 comm="xauth" name="root" dev=dm-0 ino=13127137 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1162850343.427:992): avc: denied { add_name } for pid=6379 comm="xauth" name=".xauthqtQAcS-c" scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1162850343.427:992): avc: denied { create } for pid=6379 comm="xauth" name=".xauthqtQAcS-c" scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1162850343.427:992): arch=40000003 syscall=5 success=yes exit=2 a0=bffc4257 a1=c1 a2=180 a3=ffffffff items=0 ppid=6377 pid=6379 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC msg=audit(1162850343.427:993): avc: denied { link } for pid=6379 comm="xauth" name=".xauthqtQAcS-c" dev=dm-0 ino=13127377 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1162850343.427:993): arch=40000003 syscall=9 success=yes exit=0 a0=bffc4257 a1=bffc3e56 a2=4db18a64 a3=2 items=0 ppid=6377 pid=6379 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC msg=audit(1162850343.427:994): avc: denied { write } for pid=6379 comm="xauth" name=".xauthqtQAcS" dev=dm-0 ino=13127376 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1162850343.427:994): arch=40000003 syscall=33 success=yes exit=0 a0=bffc5931 a1=2 a2=bffc4780 a3=0 items=0 ppid=6377 pid=6379 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC msg=audit(1162850343.427:995): avc: denied { read } for pid=6379 comm="xauth" name=".xauthqtQAcS" dev=dm-0 ino=13127376 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1162850343.427:995): arch=40000003 syscall=5 success=yes exit=2 a0=bffc5931 a1=0 a2=1b6 a3=8a85008 items=0 ppid=6377 pid=6379 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC msg=audit(1162850343.427:996): avc: denied { getattr } for pid=6379 comm="xauth" name=".xauthqtQAcS" dev=dm-0 ino=13127376 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1162850343.427:996): arch=40000003 syscall=197 success=yes exit=0 a0=2 a1=bffc44cc a2=ad6ff4 a3=8a85008 items=0 ppid=6377 pid=6379 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC_PATH msg=audit(1162850343.427:996): path="/root/.xauthqtQAcS" type=AVC msg=audit(1162850343.427:997): avc: denied { remove_name } for pid=6379 comm="xauth" name=".xauthqtQAcS" dev=dm-0 ino=13127376 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1162850343.427:997): avc: denied { unlink } for pid=6379 comm="xauth" name=".xauthqtQAcS" dev=dm-0 ino=13127376 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1162850343.427:997): arch=40000003 syscall=10 success=yes exit=0 a0=8a85008 a1=1000 a2=0 a3=8a8508a items=0 ppid=6377 pid=6379 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=USER_START msg=audit(1162850343.431:998): user pid=6377 uid=500 auid=500 subj=staff_u:staff_r:staff_su_t:s0 msg='PAM: session open acct=root : exe="/bin/su" (hostname=?, addr=?, terminal=pts/1 res=success)' type=CRED_ACQ msg=audit(1162850343.431:999): user pid=6377 uid=500 auid=500 subj=staff_u:staff_r:staff_su_t:s0 msg='PAM: setcred acct=root : exe="/bin/su" (hostname=?, addr=?, terminal=pts/1 res=success)' type=AVC msg=audit(1162850343.455:1000): avc: denied { dac_override } for pid=6380 comm="bash" capability=1 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=capability type=SYSCALL msg=audit(1162850343.455:1000): arch=40000003 syscall=195 success=yes exit=0 a0=80d2437 a1=bfdd2a90 a2=566ff4 a3=bfdd2af0 items=0 ppid=6377 pid=6380 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162850343.455:1001): avc: denied { read } for pid=6380 comm="bash" name=".bashrc" dev=dm-0 ino=13127142 scontext=staff_u:staff_r:staff_t:s0 tcontext=root:object_r:user_home_t:s0 tclass=file type=SYSCALL msg=audit(1162850343.455:1001): arch=40000003 syscall=5 success=yes exit=3 a0=83cdb10 a1=8000 a2=0 a3=8000 items=0 ppid=6377 pid=6380 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162850343.495:1002): avc: denied { read } for pid=6380 comm="bash" name=".bash_history" dev=dm-0 ino=13127151 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:user_home_t:s0 tclass=file type=SYSCALL msg=audit(1162850343.495:1002): arch=40000003 syscall=5 success=yes exit=3 a0=83cdcf0 a1=8000 a2=0 a3=8000 items=0 ppid=6377 pid=6380 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162850348.747:1003): avc: denied { write } for pid=6145 comm="gconfd-2" name="linc-12e8-0-2a09eb386cb5" dev=dm-0 ino=14469619 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:user_tmp_t:s0 tclass=sock_file type=SYSCALL msg=audit(1162850348.747:1003): arch=40000003 syscall=102 success=no exit=-111 a0=3 a1=bf8754a0 a2=4e570f80 a3=0 items=0 ppid=1 pid=6145 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=staff_u:staff_r:staff_t:s0 key=(null) type=USER_AUTH msg=audit(1162850353.595:1004): user pid=6400 uid=0 auid=500 subj=staff_u:staff_r:newrole_t:s0 msg='PAM: authentication acct=kmacmill : exe="/usr/bin/newrole" (hostname=?, addr=?, terminal=pts/1 res=success)' type=USER_ACCT msg=audit(1162850353.595:1005): user pid=6400 uid=0 auid=500 subj=staff_u:staff_r:newrole_t:s0 msg='PAM: accounting acct=kmacmill : exe="/usr/bin/newrole" (hostname=?, addr=?, terminal=pts/1 res=success)' type=USER_ROLE_CHANGE msg=audit(1162850353.599:1006): user pid=6401 uid=0 auid=500 subj=staff_u:staff_r:newrole_t:s0 msg='newrole: old-context=staff_u:staff_r:staff_t new-context=staff_u:sysadm_r:sysadm_t: exe="/usr/bin/newrole" (hostname=?, addr=?, terminal=/dev/pts/1 res=success)' type=AVC msg=audit(1162850355.108:1007): avc: denied { create } for pid=6431 comm="gnome-screensav" name="linc-191f-0-64d0738e1c346" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:user_tmp_t:s0 tclass=sock_file type=SYSCALL msg=audit(1162850355.108:1007): arch=40000003 syscall=102 success=yes exit=0 a0=2 a1=bfafe8a0 a2=4e570f80 a3=b7fa968c items=0 ppid=1 pid=6431 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-screensav" exe="/usr/bin/gnome-screensaver" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162850368.976:1008): avc: denied { execute } for pid=6401 comm="bash" name="audit2policy" dev=dm-0 ino=6618077 scontext=staff_u:sysadm_r:sysadm_t:s0 tcontext=staff_u:object_r:staff_home_t:s0 tclass=file type=SYSCALL msg=audit(1162850368.976:1008): arch=40000003 syscall=33 success=yes exit=0 a0=9abfcc0 a1=1 a2=11 a3=9abfcc0 items=0 ppid=6400 pid=6401 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="bash" exe="/bin/bash" subj=staff_u:sysadm_r:sysadm_t:s0 key=(null) type=AVC msg=audit(1162850370.221:1009): avc: denied { execute_no_trans } for pid=6434 comm="bash" name="audit2policy" dev=dm-0 ino=6618077 scontext=staff_u:sysadm_r:sysadm_t:s0 tcontext=staff_u:object_r:staff_home_t:s0 tclass=file type=SYSCALL msg=audit(1162850370.221:1009): arch=40000003 syscall=11 success=yes exit=0 a0=9ab8fc8 a1=9abaed8 a2=9abc6f8 a3=9acc6d8 items=0 ppid=6401 pid=6434 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="audit2policy" exe="/usr/bin/python" subj=staff_u:sysadm_r:sysadm_t:s0 key=(null) type=AVC_PATH msg=audit(1162850370.221:1009): path="/home/kmacmill/projects/selinux/madison/audit2policy" type=AVC msg=audit(1162850382.557:1010): avc: denied { connectto } for pid=6436 comm="xterm" name="6179" scontext=staff_u:sysadm_r:sysadm_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=unix_stream_socket type=SYSCALL msg=audit(1162850382.557:1010): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=bfed9e20 a2=4dc5d770 a3=15 items=0 ppid=6401 pid=6436 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="xterm" exe="/usr/bin/xterm" subj=staff_u:sysadm_r:sysadm_t:s0 key=(null) type=AVC_PATH msg=audit(1162850382.557:1010): path="/tmp/.ICE-unix/6179" type=AVC msg=audit(1162850382.717:1011): avc: denied { read } for pid=6449 comm="consoletype" name="Compose" dev=dm-0 ino=10378015 scontext=staff_u:sysadm_r:consoletype_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=file type=SYSCALL msg=audit(1162850382.717:1011): arch=40000003 syscall=11 success=yes exit=0 a0=9d12630 a1=9d12048 a2=9d0cd08 a3=9d120e0 items=0 ppid=6448 pid=6449 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="consoletype" exe="/sbin/consoletype" subj=staff_u:sysadm_r:consoletype_t:s0 key=(null) type=AVC_PATH msg=audit(1162850382.717:1011): path="/usr/share/X11/locale/en_US.UTF-8/Compose" type=AVC msg=audit(1162850395.230:1012): avc: denied { execheap } for pid=6462 comm="beagled" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=process type=AVC msg=audit(1162850395.230:1012): avc: denied { execmem } for pid=6462 comm="beagled" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=process type=SYSCALL msg=audit(1162850395.230:1012): arch=40000003 syscall=125 success=yes exit=0 a0=8bf8000 a1=1000 a2=7 a3=1 items=0 ppid=1 pid=6462 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="beagled" exe="/usr/bin/mono" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162850395.986:1013): avc: denied { ptrace } for pid=3896 comm="dbus-daemon" scontext=staff_u:staff_r:staff_dbusd_t:s0 tcontext=staff_u:staff_r:staff_dbusd_t:s0 tclass=process type=MAC_POLICY_LOAD msg=audit(1162850395.870:1014): policy loaded auid=500 type=SYSCALL msg=audit(1162850395.986:1013): arch=40000003 syscall=85 success=yes exit=16 a0=4d8cbfce a1=b7f49b58 a2=fff a3=b7f4ceba items=0 ppid=1 pid=3896 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="dbus-daemon" exe="/bin/dbus-daemon" subj=staff_u:staff_r:staff_dbusd_t:s0 key=(null) type=SYSCALL msg=audit(1162850395.870:1014): arch=40000003 syscall=4 success=yes exit=2097911 a0=4 a1=b7b16000 a2=2002f7 a3=bfc9e918 items=0 ppid=6401 pid=6470 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="load_policy" exe="/usr/sbin/load_policy" subj=staff_u:sysadm_r:load_policy_t:s0 key=(null) type=AVC msg=audit(1162850395.986:1015): avc: denied { getattr } for pid=3895 comm="dbus-daemon" name="/" dev=dm-0 ino=2 scontext=staff_u:staff_r:staff_dbusd_t:s0 tcontext=system_u:object_r:fs_t:s0 tclass=filesystem type=SYSCALL msg=audit(1162850395.986:1015): arch=40000003 syscall=100 success=yes exit=0 a0=a a1=bf95fbdc a2=cf6ff4 a3=ffffffb8 items=0 ppid=1 pid=3895 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="dbus-daemon" exe="/bin/dbus-daemon" subj=staff_u:staff_r:staff_dbusd_t:s0 key=(null) type=AVC msg=audit(1162850395.990:1016): avc: denied { search } for pid=3895 comm="dbus-daemon" name="kmacmill" dev=dm-0 ino=6547202 scontext=staff_u:staff_r:staff_dbusd_t:s0 tcontext=staff_u:object_r:staff_home_dir_t:s0 tclass=dir type=AVC msg=audit(1162850395.990:1016): avc: denied { search } for pid=3895 comm="dbus-daemon" name=".local" dev=dm-0 ino=6815703 scontext=staff_u:staff_r:staff_dbusd_t:s0 tcontext=staff_u:object_r:staff_home_t:s0 tclass=dir type=SYSCALL msg=audit(1162850395.990:1016): arch=40000003 syscall=5 success=no exit=-2 a0=8170658 a1=18800 a2=0 a3=bf95fd18 items=0 ppid=1 pid=3895 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="dbus-daemon" exe="/bin/dbus-daemon" subj=staff_u:staff_r:staff_dbusd_t:s0 key=(null) type=AVC msg=audit(1162850398.546:1017): avc: denied { execute } for pid=6472 comm="beagled-index-h" name="mono" dev=dm-0 ino=10323612 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:mono_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162850398.546:1017): arch=40000003 syscall=33 success=yes exit=0 a0=8db9868 a1=1 a2=11 a3=8db9868 items=0 ppid=1 pid=6472 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="beagled-index-h" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162850398.546:1018): avc: denied { read } for pid=6472 comm="beagled-index-h" name="mono" dev=dm-0 ino=10323612 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:mono_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162850398.546:1018): arch=40000003 syscall=33 success=yes exit=0 a0=8db9868 a1=4 a2=ffffffff a3=8db9868 items=0 ppid=1 pid=6472 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="beagled-index-h" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162850398.546:1019): avc: denied { execute_no_trans } for pid=6472 comm="beagled-index-h" name="mono" dev=dm-0 ino=10323612 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:mono_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162850398.546:1019): arch=40000003 syscall=11 success=yes exit=0 a0=8db9b80 a1=8db9808 a2=8dba5f0 a3=8db9808 items=0 ppid=1 pid=6472 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="mono" exe="/usr/bin/mono" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1162850398.546:1019): path="/usr/bin/mono" type=AVC msg=audit(1162850398.546:1020): avc: denied { execheap } for pid=6472 comm="mono" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=process type=AVC msg=audit(1162850398.546:1020): avc: denied { execmem } for pid=6472 comm="mono" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=process type=SYSCALL msg=audit(1162850398.546:1020): arch=40000003 syscall=125 success=yes exit=0 a0=9aec000 a1=1000 a2=7 a3=1 items=0 ppid=1 pid=6472 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="mono" exe="/usr/bin/mono" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162850398.674:1021): avc: denied { read } for pid=6472 comm="beagled-helper" name=".gdmDOM7HT" dev=dm-0 ino=14469552 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162850398.674:1021): arch=40000003 syscall=33 success=yes exit=0 a0=bfeb1fde a1=4 a2=4db18a64 a3=bfeb1fde items=0 ppid=1 pid=6472 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="beagled-helper" exe="/usr/bin/mono" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162850399.226:1022): avc: denied { write } for pid=6253 comm="gnome-power-man" name="orbit-kmacmill" dev=dm-0 ino=14469563 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:user_tmp_t:s0 tclass=dir type=AVC msg=audit(1162850399.226:1022): avc: denied { remove_name } for pid=6253 comm="gnome-power-man" name="linc-1868-0-3840e8f2aa88e" dev=dm-0 ino=5434685 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:user_tmp_t:s0 tclass=dir type=AVC msg=audit(1162850399.226:1022): avc: denied { unlink } for pid=6253 comm="gnome-power-man" name="linc-1868-0-3840e8f2aa88e" dev=dm-0 ino=5434685 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:user_tmp_t:s0 tclass=sock_file type=SYSCALL msg=audit(1162850399.226:1022): arch=40000003 syscall=10 success=yes exit=0 a0=9997538 a1=996db90 a2=4df37708 a3=b items=0 ppid=1 pid=6253 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-power-man" exe="/usr/bin/gnome-power-manager" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162850399.246:1023): avc: denied { write } for pid=6273 comm="gnome-panel" name="linc-18c0-0-55b6afc2586c" dev=dm-0 ino=14469575 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:user_tmp_t:s0 tclass=sock_file type=SYSCALL msg=audit(1162850399.246:1023): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=bfff15f0 a2=4e570f80 a3=0 items=0 ppid=1 pid=6273 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-panel" exe="/usr/bin/gnome-panel" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162850399.322:1024): avc: denied { write } for pid=6380 comm="bash" name="1" dev=devpts ino=3 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:sysadm_devpts_t:s0 tclass=chr_file type=SYSCALL msg=audit(1162850399.322:1024): arch=40000003 syscall=4 success=no exit=-5 a0=2 a1=b7f2b000 a2=2e a3=2e items=0 ppid=6377 pid=6380 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1162850399.322:1024): path=2F6465762F7074732F31202864656C6574656429 type=AVC msg=audit(1162850399.322:1025): avc: denied { read } for pid=6380 comm="bash" name="1" dev=devpts ino=3 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:sysadm_devpts_t:s0 tclass=chr_file type=SYSCALL msg=audit(1162850399.322:1025): arch=40000003 syscall=3 success=yes exit=0 a0=0 a1=bfdd204b a2=1 a3=567420 items=0 ppid=6377 pid=6380 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1162850399.322:1025): path=2F6465762F7074732F31202864656C6574656429 type=AVC msg=audit(1162850399.322:1026): avc: denied { append } for pid=6380 comm="bash" name=".bash_history" dev=dm-0 ino=13127151 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:user_home_t:s0 tclass=file type=SYSCALL msg=audit(1162850399.322:1026): arch=40000003 syscall=5 success=yes exit=3 a0=83cdcf0 a1=8401 a2=0 a3=8401 items=0 ppid=6377 pid=6380 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162850399.326:1027): avc: denied { read } for pid=6380 comm="bash" name=".bash_history" dev=dm-0 ino=13127151 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:user_home_t:s0 tclass=file type=SYSCALL msg=audit(1162850399.326:1027): arch=40000003 syscall=5 success=yes exit=3 a0=83cdcf0 a1=8000 a2=0 a3=8000 items=0 ppid=6377 pid=6380 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162850399.326:1028): avc: denied { write } for pid=6380 comm="bash" name=".bash_history" dev=dm-0 ino=13127151 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:user_home_t:s0 tclass=file type=SYSCALL msg=audit(1162850399.326:1028): arch=40000003 syscall=5 success=yes exit=3 a0=83cdcf0 a1=8201 a2=0 a3=8201 items=0 ppid=6377 pid=6380 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=CRED_DISP msg=audit(1162850399.338:1029): user pid=6377 uid=500 auid=500 subj=staff_u:staff_r:staff_su_t:s0 msg='PAM: setcred acct=root : exe="/bin/su" (hostname=?, addr=?, terminal=pts/1 res=success)' type=AVC msg=audit(1162850399.338:1030): avc: denied { search } for pid=6377 comm="su" name="root" dev=dm-0 ino=13127137 scontext=staff_u:staff_r:staff_su_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1162850399.338:1030): avc: denied { write } for pid=6377 comm="su" name="root" dev=dm-0 ino=13127137 scontext=staff_u:staff_r:staff_su_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1162850399.338:1030): avc: denied { remove_name } for pid=6377 comm="su" name=".xauthqtQAcS" dev=dm-0 ino=13127378 scontext=staff_u:staff_r:staff_su_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1162850399.338:1030): avc: denied { unlink } for pid=6377 comm="su" name=".xauthqtQAcS" dev=dm-0 ino=13127378 scontext=staff_u:staff_r:staff_su_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1162850399.338:1030): arch=40000003 syscall=10 success=yes exit=0 a0=8e1f9a8 a1=8e1fa86 a2=16ebc8 a3=8e1c008 items=0 ppid=1 pid=6377 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=(none) comm="su" exe="/bin/su" subj=staff_u:staff_r:staff_su_t:s0 key=(null) type=USER_END msg=audit(1162850399.338:1031): user pid=6377 uid=500 auid=500 subj=staff_u:staff_r:staff_su_t:s0 msg='PAM: session close acct=root : exe="/bin/su" (hostname=?, addr=?, terminal=pts/1 res=success)' type=AVC msg=audit(1162850399.422:1032): avc: denied { setattr } for pid=6485 comm="metacity" name="orbit-kmacmill" dev=dm-0 ino=14469563 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:user_tmp_t:s0 tclass=dir type=SYSCALL msg=audit(1162850399.422:1032): arch=40000003 syscall=30 success=yes exit=0 a0=8ca7af0 a1=bf8d0a64 a2=4e570f80 a3=1f4 items=0 ppid=1 pid=6485 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="metacity" exe="/usr/bin/metacity" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162850399.426:1033): avc: denied { add_name } for pid=6485 comm="metacity" name="linc-1955-0-51d5b0be68eb4" scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:user_tmp_t:s0 tclass=dir type=AVC msg=audit(1162850399.426:1033): avc: denied { create } for pid=6485 comm="metacity" name="linc-1955-0-51d5b0be68eb4" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:user_tmp_t:s0 tclass=sock_file type=SYSCALL msg=audit(1162850399.426:1033): arch=40000003 syscall=102 success=yes exit=0 a0=2 a1=bf8d11f0 a2=4e570f80 a3=b7f03a1c items=0 ppid=1 pid=6485 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="metacity" exe="/usr/bin/metacity" subj=staff_u:staff_r:staff_t:s0 key=(null) type=USER_END msg=audit(1162850399.534:1034): user pid=4697 uid=0 auid=500 subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 msg='PAM: session close acct=kmacmill : exe="/usr/sbin/gdm-binary" (hostname=?, addr=?, terminal=:0 res=success)' type=CRED_DISP msg=audit(1162850399.534:1035): user pid=4697 uid=0 auid=500 subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 msg='PAM: setcred acct=kmacmill : exe="/usr/sbin/gdm-binary" (hostname=?, addr=?, terminal=:0 res=success)' type=USER_ACCT msg=audit(1162850401.602:1036): user pid=6513 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162850401.606:1037): login pid=6513 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162850401.606:1038): user pid=6513 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162850401.606:1039): user pid=6513 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162850401.610:1040): avc: denied { execute } for pid=6514 comm="sh" name="sa1" dev=dm-0 ino=13061698 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:lib_t:s0 tclass=file type=AVC msg=audit(1162850401.610:1040): avc: denied { execute_no_trans } for pid=6514 comm="sh" name="sa1" dev=dm-0 ino=13061698 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1162850401.610:1040): arch=40000003 syscall=11 success=yes exit=0 a0=9d241b0 a1=9d24358 a2=9d24290 a3=9d24008 items=0 ppid=6513 pid=6514 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sa1" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162850401.610:1040): path="/usr/lib/sa/sa1" type=AVC msg=audit(1162850401.614:1041): avc: denied { execute } for pid=6514 comm="sa1" name="sadc" dev=dm-0 ino=11981386 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=AVC msg=audit(1162850401.614:1041): avc: denied { execute_no_trans } for pid=6514 comm="sa1" name="sadc" dev=dm-0 ino=11981386 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=AVC msg=audit(1162850401.614:1041): avc: denied { read } for pid=6514 comm="sa1" name="sadc" dev=dm-0 ino=11981386 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162850401.614:1041): arch=40000003 syscall=11 success=yes exit=0 a0=8841d48 a1=8841740 a2=8841d60 a3=8841740 items=0 ppid=6513 pid=6514 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162850401.614:1041): path="/usr/lib/sa/sadc" type=AVC_PATH msg=audit(1162850401.614:1041): path="/usr/lib/sa/sadc" type=AVC msg=audit(1162850401.618:1042): avc: denied { search } for pid=6514 comm="sadc" name="net" dev=proc ino=-268435432 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=dir type=AVC msg=audit(1162850401.618:1042): avc: denied { read } for pid=6514 comm="sadc" name="dev" dev=proc ino=-268435159 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=file type=SYSCALL msg=audit(1162850401.618:1042): arch=40000003 syscall=5 success=yes exit=3 a0=8050371 a1=0 a2=1b6 a3=9d7f800 items=0 ppid=6513 pid=6514 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162850401.618:1043): avc: denied { getattr } for pid=6514 comm="sadc" name="dev" dev=proc ino=-268435159 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=file type=SYSCALL msg=audit(1162850401.618:1043): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bfc5ed88 a2=b45ff4 a3=9d7f800 items=0 ppid=6513 pid=6514 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162850401.618:1043): path="/proc/net/dev" type=AVC msg=audit(1162850401.618:1044): avc: denied { search } for pid=6514 comm="sadc" name="sa" dev=dm-0 ino=14607631 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=dir type=SYSCALL msg=audit(1162850401.618:1044): arch=40000003 syscall=33 success=yes exit=0 a0=bfc5f134 a1=0 a2=bfc5f028 a3=bfc5f030 items=0 ppid=6513 pid=6514 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162850401.618:1045): avc: denied { read append } for pid=6514 comm="sadc" name="sa06" dev=dm-0 ino=14600291 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=file type=SYSCALL msg=audit(1162850401.618:1045): arch=40000003 syscall=5 success=yes exit=3 a0=bfc5f134 a1=402 a2=bfc5f2f8 a3=bfc5f030 items=0 ppid=6513 pid=6514 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162850401.622:1046): avc: denied { search } for pid=6514 comm="sadc" name="fs" dev=proc ino=-268435428 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=dir type=AVC msg=audit(1162850401.622:1046): avc: denied { read } for pid=6514 comm="sadc" name="dentry-state" dev=proc ino=-268435227 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=file type=SYSCALL msg=audit(1162850401.622:1046): arch=40000003 syscall=5 success=yes exit=4 a0=805037f a1=0 a2=1b6 a3=9d7fdf0 items=0 ppid=6513 pid=6514 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162850401.622:1047): avc: denied { getattr } for pid=6514 comm="sadc" name="dentry-state" dev=proc ino=-268435227 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=file type=SYSCALL msg=audit(1162850401.622:1047): arch=40000003 syscall=197 success=yes exit=0 a0=4 a1=bfc5ebe4 a2=b45ff4 a3=9d7fdf0 items=0 ppid=6513 pid=6514 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162850401.622:1047): path="/proc/sys/fs/dentry-state" type=AVC msg=audit(1162850401.622:1048): avc: denied { search } for pid=6514 comm="sadc" name="rpc" dev=proc ino=-268434552 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_rpc_t:s0 tclass=dir type=SYSCALL msg=audit(1162850401.622:1048): arch=40000003 syscall=5 success=no exit=-2 a0=80502a5 a1=0 a2=1b6 a3=9d7fdf0 items=0 ppid=6513 pid=6514 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162850401.622:1049): avc: denied { lock } for pid=6514 comm="sadc" name="sa06" dev=dm-0 ino=14600291 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=file type=SYSCALL msg=audit(1162850401.622:1049): arch=40000003 syscall=143 success=yes exit=0 a0=3 a1=6 a2=bfc5f030 a3=3 items=0 ppid=6513 pid=6514 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162850401.622:1049): path="/var/log/sa/sa06" type=CRED_DISP msg=audit(1162850401.630:1050): user pid=6513 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162850401.630:1051): user pid=6513 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162850416.415:1052): user pid=3839 uid=0 auid=0 subj=system_u:system_r:local_login_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/bin/login" (hostname=?, addr=?, terminal=tty1 res=success)' type=USER_END msg=audit(1162850416.415:1053): user pid=3839 uid=0 auid=0 subj=system_u:system_r:local_login_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/bin/login" (hostname=?, addr=?, terminal=tty1 res=success)' type=USER_AUTH msg=audit(1162850424.220:1054): user pid=4697 uid=0 auid=500 subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 msg='PAM: authentication acct=kmacmill : exe="/usr/sbin/gdm-binary" (hostname=?, addr=?, terminal=:0 res=success)' type=USER_ACCT msg=audit(1162850424.220:1055): user pid=4697 uid=0 auid=500 subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 msg='PAM: accounting acct=kmacmill : exe="/usr/sbin/gdm-binary" (hostname=?, addr=?, terminal=:0 res=success)' type=CRED_ACQ msg=audit(1162850424.224:1056): user pid=4697 uid=0 auid=500 subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 msg='PAM: setcred acct=kmacmill : exe="/usr/sbin/gdm-binary" (hostname=?, addr=?, terminal=:0 res=success)' type=LOGIN msg=audit(1162850424.248:1057): login pid=4697 uid=0 old auid=500 new auid=500 type=USER_START msg=audit(1162850424.260:1058): user pid=4697 uid=0 auid=500 subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 msg='PAM: session open acct=kmacmill : exe="/usr/sbin/gdm-binary" (hostname=?, addr=?, terminal=:0 res=success)' type=USER_LOGIN msg=audit(1162850424.260:1059): user pid=4697 uid=0 auid=500 subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 msg='uid=500: exe="/usr/sbin/gdm-binary" (hostname=localhost.localdomain, addr=127.0.0.1, terminal=:0 res=success)' type=AVC msg=audit(1162850424.292:1060): avc: denied { read } for pid=6531 comm="gdm-binary" name=".ICEauthority" dev=dm-0 ino=6570930 scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=staff_u:object_r:staff_iceauth_home_t:s0 tclass=file type=SYSCALL msg=audit(1162850424.292:1060): arch=40000003 syscall=5 success=yes exit=12 a0=80865d5 a1=0 a2=1 a3=d items=0 ppid=4697 pid=6531 auid=500 uid=0 gid=500 euid=0 suid=0 fsuid=0 egid=0 sgid=500 fsgid=0 tty=(none) comm="gdm-binary" exe="/usr/sbin/gdm-binary" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162850424.292:1061): avc: denied { getattr } for pid=6531 comm="gdm-binary" name=".ICEauthority" dev=dm-0 ino=6570930 scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=staff_u:object_r:staff_iceauth_home_t:s0 tclass=file type=SYSCALL msg=audit(1162850424.292:1061): arch=40000003 syscall=196 success=yes exit=0 a0=80865d5 a1=bffa43e0 a2=958ff4 a3=3 items=0 ppid=4697 pid=6531 auid=500 uid=0 gid=500 euid=0 suid=0 fsuid=0 egid=0 sgid=500 fsgid=0 tty=(none) comm="gdm-binary" exe="/usr/sbin/gdm-binary" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162850424.292:1061): path="/home/kmacmill/.ICEauthority" type=AVC msg=audit(1162850424.308:1062): avc: denied { read } for pid=6544 comm="xrdb" name=".gdmAHKGIT" dev=dm-0 ino=14469334 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162850424.308:1062): arch=40000003 syscall=33 success=yes exit=0 a0=bf81cfce a1=4 a2=4db18a64 a3=bf81cfce items=0 ppid=6531 pid=6544 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="xrdb" exe="/usr/bin/xrdb" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162850424.412:1063): avc: denied { getattr } for pid=6585 comm="dbus-daemon" name="/" dev=dm-0 ino=2 scontext=staff_u:staff_r:staff_dbusd_t:s0 tcontext=system_u:object_r:fs_t:s0 tclass=filesystem type=SYSCALL msg=audit(1162850424.412:1063): arch=40000003 syscall=100 success=yes exit=0 a0=5 a1=bfcb232c a2=248ff4 a3=ffffffb8 items=0 ppid=6584 pid=6585 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="dbus-daemon" exe="/bin/dbus-daemon" subj=staff_u:staff_r:staff_dbusd_t:s0 key=(null) type=AVC msg=audit(1162850424.412:1064): avc: denied { search } for pid=6585 comm="dbus-daemon" name="kmacmill" dev=dm-0 ino=6547202 scontext=staff_u:staff_r:staff_dbusd_t:s0 tcontext=staff_u:object_r:staff_home_dir_t:s0 tclass=dir type=SYSCALL msg=audit(1162850424.412:1064): arch=40000003 syscall=5 success=no exit=-2 a0=8e56b98 a1=18800 a2=11525c a3=bfcb2468 items=0 ppid=6584 pid=6585 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="dbus-daemon" exe="/bin/dbus-daemon" subj=staff_u:staff_r:staff_dbusd_t:s0 key=(null) type=AVC msg=audit(1162850424.796:1065): avc: denied { write } for pid=6531 comm="gnome-session" name=".ICE-unix" dev=dm-0 ino=14469315 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:ice_tmp_t:s0 tclass=dir type=AVC msg=audit(1162850424.796:1065): avc: denied { add_name } for pid=6531 comm="gnome-session" name="6531" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:ice_tmp_t:s0 tclass=dir type=AVC msg=audit(1162850424.796:1065): avc: denied { create } for pid=6531 comm="gnome-session" name="6531" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:ice_tmp_t:s0 tclass=sock_file type=SYSCALL msg=audit(1162850424.796:1065): arch=40000003 syscall=102 success=yes exit=0 a0=2 a1=bfa77710 a2=4dc5d770 a3=0 items=0 ppid=4697 pid=6531 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-session" exe="/usr/bin/gnome-session" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162850424.808:1066): avc: denied { read write } for pid=6595 comm="gnome-settings-" name="[98613]" dev=sockfs ino=98613 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_dbusd_t:s0 tclass=netlink_selinux_socket type=SYSCALL msg=audit(1162850424.808:1066): arch=40000003 syscall=11 success=yes exit=0 a0=8e5d9b0 a1=8e5ccd8 a2=8e5db70 a3=b items=0 ppid=6594 pid=6595 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-settings-" exe="/usr/libexec/gnome-settings-daemon" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1162850424.808:1066): path="socket:[98613]" type=AVC msg=audit(1162850424.940:1067): avc: denied { read } for pid=6595 comm="gnome-settings-" name="resolv.conf" dev=dm-0 ino=9330746 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:net_conf_t:s0 tclass=file type=SYSCALL msg=audit(1162850424.940:1067): arch=40000003 syscall=5 success=yes exit=21 a0=5b1d13 a1=0 a2=1b6 a3=8230208 items=0 ppid=6594 pid=6595 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-settings-" exe="/usr/libexec/gnome-settings-daemon" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162850424.948:1068): avc: denied { read } for pid=6603 comm="esd" name="default.conf" dev=dm-0 ino=9330152 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:alsa_etc_rw_t:s0 tclass=file type=SYSCALL msg=audit(1162850424.948:1068): arch=40000003 syscall=5 success=yes exit=14 a0=8206258 a1=0 a2=1b6 a3=8206278 items=0 ppid=1 pid=6603 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="esd" exe="/usr/bin/esd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162850425.140:1069): avc: denied { write } for pid=6620 comm="metacity" name="6531" dev=dm-0 ino=14469454 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:ice_tmp_t:s0 tclass=sock_file type=SYSCALL msg=audit(1162850425.140:1069): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=bf9dcf80 a2=4dc5d770 a3=15 items=0 ppid=1 pid=6620 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="metacity" exe="/usr/bin/metacity" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162850425.384:1070): avc: denied { execheap } for pid=6639 comm="mono" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=process type=AVC msg=audit(1162850425.384:1070): avc: denied { execmem } for pid=6639 comm="mono" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=process type=SYSCALL msg=audit(1162850425.384:1070): arch=40000003 syscall=125 success=yes exit=0 a0=9a4f000 a1=1000 a2=7 a3=1 items=0 ppid=1 pid=6639 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="mono" exe="/usr/bin/mono" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162850425.596:1071): avc: denied { sigchld } for pid=6655 comm="dbus-daemon" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_dbusd_t:s0 tclass=process type=SYSCALL msg=audit(1162850425.596:1071): arch=40000003 syscall=7 success=yes exit=0 a0=1a00 a1=bfcb1eb8 a2=1 a3=1a00 items=0 ppid=6587 pid=6655 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="dbus-daemon" exe="/bin/dbus-daemon" subj=staff_u:staff_r:staff_dbusd_t:s0 key=(null) type=AVC msg=audit(1162850426.060:1072): avc: denied { ioctl } for pid=6686 comm="pam_timestamp_c" name="[98476]" dev=pipefs ino=98476 scontext=staff_u:staff_r:pam_t:s0 tcontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tclass=fifo_file type=SYSCALL msg=audit(1162850426.060:1072): arch=40000003 syscall=54 success=no exit=-22 a0=2 a1=5401 a2=bfaea71c a3=bfaea75c items=0 ppid=6664 pid=6686 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=(none) comm="pam_timestamp_c" exe="/sbin/pam_timestamp_check" subj=staff_u:staff_r:pam_t:s0 key=(null) type=AVC_PATH msg=audit(1162850426.060:1072): path="pipe:[98476]" type=AVC msg=audit(1162850426.816:1073): avc: denied { read } for pid=6666 comm="beagled" name="max_user_instances" dev=proc ino=-268435218 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=file type=SYSCALL msg=audit(1162850426.816:1073): arch=40000003 syscall=5 success=yes exit=24 a0=11833c a1=0 a2=1 a3=9178500 items=0 ppid=1 pid=6666 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="beagled" exe="/usr/bin/mono" subj=staff_u:staff_r:staff_t:s0 key=(null) type=USER_AUTH msg=audit(1162850432.292:1074): user pid=6720 uid=500 auid=500 subj=staff_u:staff_r:staff_su_t:s0 msg='PAM: authentication acct=root : exe="/bin/su" (hostname=?, addr=?, terminal=pts/1 res=success)' type=USER_ACCT msg=audit(1162850432.292:1075): user pid=6720 uid=500 auid=500 subj=staff_u:staff_r:staff_su_t:s0 msg='PAM: accounting acct=root : exe="/bin/su" (hostname=?, addr=?, terminal=pts/1 res=success)' type=AVC msg=audit(1162850432.292:1076): avc: denied { search } for pid=6720 comm="su" name="root" dev=dm-0 ino=13127137 scontext=staff_u:staff_r:staff_su_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=SYSCALL msg=audit(1162850432.292:1076): arch=40000003 syscall=5 success=no exit=-2 a0=bfd04948 a1=8000 a2=1b6 a3=93769a8 items=0 ppid=6699 pid=6720 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=pts1 comm="su" exe="/bin/su" subj=staff_u:staff_r:staff_su_t:s0 key=(null) type=AVC msg=audit(1162850432.296:1077): avc: denied { write } for pid=6721 comm="xauth" name=".gdmAHKGIT" dev=dm-0 ino=14469334 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162850432.296:1077): arch=40000003 syscall=33 success=yes exit=0 a0=bfccb935 a1=2 a2=bfccb490 a3=0 items=0 ppid=6720 pid=6721 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts1 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC msg=audit(1162850432.296:1078): avc: denied { read } for pid=6721 comm="xauth" name=".gdmAHKGIT" dev=dm-0 ino=14469334 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162850432.296:1078): arch=40000003 syscall=5 success=yes exit=2 a0=bfccb935 a1=0 a2=1b6 a3=9ab6008 items=0 ppid=6720 pid=6721 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts1 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC msg=audit(1162850432.296:1079): avc: denied { getattr } for pid=6721 comm="xauth" name=".gdmAHKGIT" dev=dm-0 ino=14469334 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162850432.296:1079): arch=40000003 syscall=197 success=yes exit=0 a0=2 a1=bfccb1dc a2=ccdff4 a3=9ab6008 items=0 ppid=6720 pid=6721 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts1 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC_PATH msg=audit(1162850432.296:1079): path="/tmp/.gdmAHKGIT" type=AVC msg=audit(1162850432.296:1080): avc: denied { write } for pid=6720 comm="su" name="root" dev=dm-0 ino=13127137 scontext=staff_u:staff_r:staff_su_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1162850432.296:1080): avc: denied { add_name } for pid=6720 comm="su" name=".xauthyeka65" scontext=staff_u:staff_r:staff_su_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1162850432.296:1080): avc: denied { create } for pid=6720 comm="su" name=".xauthyeka65" scontext=staff_u:staff_r:staff_su_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1162850432.296:1080): arch=40000003 syscall=5 success=yes exit=4 a0=9376acb a1=80c2 a2=180 a3=80c2 items=0 ppid=6699 pid=6720 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=pts1 comm="su" exe="/bin/su" subj=staff_u:staff_r:staff_su_t:s0 key=(null) type=AVC msg=audit(1162850432.296:1081): avc: denied { setattr } for pid=6720 comm="su" name=".xauthyeka65" dev=dm-0 ino=13127376 scontext=staff_u:staff_r:staff_su_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1162850432.296:1081): arch=40000003 syscall=207 success=yes exit=0 a0=4 a1=0 a2=0 a3=13f69f items=0 ppid=6699 pid=6720 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=pts1 comm="su" exe="/bin/su" subj=staff_u:staff_r:staff_su_t:s0 key=(null) type=AVC msg=audit(1162850432.300:1082): avc: denied { search } for pid=6722 comm="xauth" name="root" dev=dm-0 ino=13127137 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=SYSCALL msg=audit(1162850432.300:1082): arch=40000003 syscall=195 success=no exit=-2 a0=bf8b6b47 a1=bf8b6660 a2=ac4ff4 a3=3 items=0 ppid=6720 pid=6722 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC msg=audit(1162850432.300:1083): avc: denied { write } for pid=6722 comm="xauth" name="root" dev=dm-0 ino=13127137 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1162850432.300:1083): avc: denied { add_name } for pid=6722 comm="xauth" name=".xauthyeka65-c" scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1162850432.300:1083): avc: denied { create } for pid=6722 comm="xauth" name=".xauthyeka65-c" scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1162850432.300:1083): arch=40000003 syscall=5 success=yes exit=2 a0=bf8b6b47 a1=c1 a2=180 a3=ffffffff items=0 ppid=6720 pid=6722 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC msg=audit(1162850432.300:1084): avc: denied { link } for pid=6722 comm="xauth" name=".xauthyeka65-c" dev=dm-0 ino=13127377 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1162850432.300:1084): arch=40000003 syscall=9 success=yes exit=0 a0=bf8b6b47 a1=bf8b6746 a2=4db18a64 a3=2 items=0 ppid=6720 pid=6722 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC msg=audit(1162850432.300:1085): avc: denied { write } for pid=6722 comm="xauth" name=".xauthyeka65" dev=dm-0 ino=13127376 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1162850432.300:1085): arch=40000003 syscall=33 success=yes exit=0 a0=bf8b7931 a1=2 a2=bf8b7070 a3=0 items=0 ppid=6720 pid=6722 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC msg=audit(1162850432.300:1086): avc: denied { read } for pid=6722 comm="xauth" name=".xauthyeka65" dev=dm-0 ino=13127376 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1162850432.300:1086): arch=40000003 syscall=5 success=yes exit=2 a0=bf8b7931 a1=0 a2=1b6 a3=8a8e008 items=0 ppid=6720 pid=6722 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC msg=audit(1162850432.300:1087): avc: denied { getattr } for pid=6722 comm="xauth" name=".xauthyeka65" dev=dm-0 ino=13127376 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1162850432.300:1087): arch=40000003 syscall=197 success=yes exit=0 a0=2 a1=bf8b6dbc a2=ac4ff4 a3=8a8e008 items=0 ppid=6720 pid=6722 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC_PATH msg=audit(1162850432.300:1087): path="/root/.xauthyeka65" type=AVC msg=audit(1162850432.300:1088): avc: denied { remove_name } for pid=6722 comm="xauth" name=".xauthyeka65" dev=dm-0 ino=13127376 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1162850432.300:1088): avc: denied { unlink } for pid=6722 comm="xauth" name=".xauthyeka65" dev=dm-0 ino=13127376 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1162850432.300:1088): arch=40000003 syscall=10 success=yes exit=0 a0=8a8e008 a1=1000 a2=0 a3=8a8e08a items=0 ppid=6720 pid=6722 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=USER_START msg=audit(1162850432.300:1089): user pid=6720 uid=500 auid=500 subj=staff_u:staff_r:staff_su_t:s0 msg='PAM: session open acct=root : exe="/bin/su" (hostname=?, addr=?, terminal=pts/1 res=success)' type=CRED_ACQ msg=audit(1162850432.300:1090): user pid=6720 uid=500 auid=500 subj=staff_u:staff_r:staff_su_t:s0 msg='PAM: setcred acct=root : exe="/bin/su" (hostname=?, addr=?, terminal=pts/1 res=success)' type=AVC msg=audit(1162850432.304:1091): avc: denied { dac_override } for pid=6723 comm="bash" capability=1 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=capability type=SYSCALL msg=audit(1162850432.304:1091): arch=40000003 syscall=195 success=yes exit=0 a0=80d2437 a1=bf866d20 a2=248ff4 a3=bf866d80 items=0 ppid=6720 pid=6723 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162850432.304:1092): avc: denied { read } for pid=6723 comm="bash" name=".bashrc" dev=dm-0 ino=13127142 scontext=staff_u:staff_r:staff_t:s0 tcontext=root:object_r:user_home_t:s0 tclass=file type=SYSCALL msg=audit(1162850432.304:1092): arch=40000003 syscall=5 success=yes exit=3 a0=8250b10 a1=8000 a2=0 a3=8000 items=0 ppid=6720 pid=6723 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162850432.348:1093): avc: denied { read } for pid=6723 comm="bash" name=".bash_history" dev=dm-0 ino=13127151 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:user_home_t:s0 tclass=file type=SYSCALL msg=audit(1162850432.348:1093): arch=40000003 syscall=5 success=yes exit=3 a0=8250cf0 a1=8000 a2=0 a3=8000 items=0 ppid=6720 pid=6723 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=USER_AUTH msg=audit(1162850439.333:1094): user pid=6743 uid=0 auid=500 subj=staff_u:staff_r:newrole_t:s0 msg='PAM: authentication acct=kmacmill : exe="/usr/bin/newrole" (hostname=?, addr=?, terminal=pts/1 res=success)' type=USER_ACCT msg=audit(1162850439.333:1095): user pid=6743 uid=0 auid=500 subj=staff_u:staff_r:newrole_t:s0 msg='PAM: accounting acct=kmacmill : exe="/usr/bin/newrole" (hostname=?, addr=?, terminal=pts/1 res=success)' type=USER_ROLE_CHANGE msg=audit(1162850439.333:1096): user pid=6744 uid=0 auid=500 subj=staff_u:staff_r:newrole_t:s0 msg='newrole: old-context=staff_u:staff_r:staff_t new-context=staff_u:sysadm_r:sysadm_t: exe="/usr/bin/newrole" (hostname=?, addr=?, terminal=/dev/pts/1 res=success)' type=AVC msg=audit(1162850449.753:1097): avc: denied { execute } for pid=6744 comm="bash" name="audit2policy" dev=dm-0 ino=6618077 scontext=staff_u:sysadm_r:sysadm_t:s0 tcontext=staff_u:object_r:staff_home_t:s0 tclass=file type=SYSCALL msg=audit(1162850449.753:1097): arch=40000003 syscall=33 success=yes exit=0 a0=85adb38 a1=1 a2=11 a3=85adb38 items=0 ppid=6743 pid=6744 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="bash" exe="/bin/bash" subj=staff_u:sysadm_r:sysadm_t:s0 key=(null) type=AVC msg=audit(1162850449.985:1098): avc: denied { read } for pid=6774 comm="gnome-screensav" name=".gdmAHKGIT" dev=dm-0 ino=14469334 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162850449.985:1098): arch=40000003 syscall=33 success=yes exit=0 a0=bfb0ae9e a1=4 a2=4db18a64 a3=bfb0ae9e items=0 ppid=1 pid=6774 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-screensav" exe="/usr/bin/gnome-screensaver" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162850451.210:1099): avc: denied { execute_no_trans } for pid=6776 comm="bash" name="audit2policy" dev=dm-0 ino=6618077 scontext=staff_u:sysadm_r:sysadm_t:s0 tcontext=staff_u:object_r:staff_home_t:s0 tclass=file type=SYSCALL msg=audit(1162850451.210:1099): arch=40000003 syscall=11 success=yes exit=0 a0=85ad0a0 a1=85add38 a2=85ab188 a3=85bba58 items=0 ppid=6744 pid=6776 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="audit2policy" exe="/usr/bin/python" subj=staff_u:sysadm_r:sysadm_t:s0 key=(null) type=AVC_PATH msg=audit(1162850451.210:1099): path="/home/kmacmill/projects/selinux/madison/audit2policy" type=USER_ACCT msg=audit(1162850461.642:1100): user pid=6778 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162850461.642:1101): login pid=6778 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162850461.646:1102): user pid=6778 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162850461.646:1103): user pid=6778 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162850461.646:1104): avc: denied { getattr } for pid=6779 comm="bash" name="run-parts" dev=dm-0 ino=10331890 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1162850461.646:1104): arch=40000003 syscall=195 success=yes exit=0 a0=9ebe120 a1=bfdaae60 a2=248ff4 a3=9ebe120 items=0 ppid=6778 pid=6779 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="bash" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162850461.646:1104): path="/usr/bin/run-parts" type=AVC msg=audit(1162850461.678:1105): avc: denied { execute } for pid=6779 comm="bash" name="run-parts" dev=dm-0 ino=10331890 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1162850461.678:1105): arch=40000003 syscall=33 success=yes exit=0 a0=9ebe120 a1=1 a2=11 a3=9ebe120 items=0 ppid=6778 pid=6779 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="bash" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162850461.678:1106): avc: denied { read } for pid=6779 comm="bash" name="run-parts" dev=dm-0 ino=10331890 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1162850461.678:1106): arch=40000003 syscall=33 success=yes exit=0 a0=9ebe120 a1=4 a2=ffffffff a3=9ebe120 items=0 ppid=6778 pid=6779 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="bash" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162850461.678:1107): avc: denied { execute_no_trans } for pid=6779 comm="bash" name="run-parts" dev=dm-0 ino=10331890 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1162850461.678:1107): arch=40000003 syscall=11 success=yes exit=0 a0=9ebe120 a1=9ebe3d8 a2=9ebe2f8 a3=9ebdf98 items=0 ppid=6778 pid=6779 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="run-parts" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162850461.678:1107): path="/usr/bin/run-parts" type=AVC msg=audit(1162850461.682:1108): avc: denied { ioctl } for pid=6779 comm="run-parts" name="run-parts" dev=dm-0 ino=10331890 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1162850461.682:1108): arch=40000003 syscall=54 success=no exit=-25 a0=3 a1=5401 a2=bfd9c878 a3=bfd9c8b8 items=0 ppid=6778 pid=6779 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="run-parts" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162850461.682:1108): path="/usr/bin/run-parts" type=AVC msg=audit(1162850461.698:1109): avc: denied { execute } for pid=6779 comm="run-parts" name="inn-cron-nntpsend" dev=dm-0 ino=9331477 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1162850461.698:1109): arch=40000003 syscall=33 success=yes exit=0 a0=9a07990 a1=1 a2=1 a3=9a07c98 items=0 ppid=6778 pid=6779 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="run-parts" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162850461.698:1110): avc: denied { execute_no_trans } for pid=6780 comm="run-parts" name="inn-cron-nntpsend" dev=dm-0 ino=9331477 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1162850461.698:1110): arch=40000003 syscall=11 success=yes exit=0 a0=9a07a10 a1=9a07ad8 a2=9a07ae8 a3=9a07758 items=0 ppid=6779 pid=6780 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="inn-cron-nntpse" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162850461.698:1110): path="/etc/cron.hourly/inn-cron-nntpsend" type=AVC msg=audit(1162850461.714:1111): avc: denied { execute } for pid=6782 comm="inn-cron-nntpse" name="chkconfig" dev=dm-0 ino=2848378 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sbin_t:s0 tclass=file type=AVC msg=audit(1162850461.714:1111): avc: denied { execute_no_trans } for pid=6782 comm="inn-cron-nntpse" name="chkconfig" dev=dm-0 ino=2848378 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sbin_t:s0 tclass=file type=AVC msg=audit(1162850461.714:1111): avc: denied { read } for pid=6782 comm="inn-cron-nntpse" name="chkconfig" dev=dm-0 ino=2848378 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sbin_t:s0 tclass=file type=SYSCALL msg=audit(1162850461.714:1111): arch=40000003 syscall=11 success=yes exit=0 a0=8b4d678 a1=8b4d808 a2=8b4d720 a3=8b4d508 items=0 ppid=6780 pid=6782 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="chkconfig" exe="/sbin/chkconfig" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162850461.714:1111): path="/sbin/chkconfig" type=AVC_PATH msg=audit(1162850461.714:1111): path="/sbin/chkconfig" type=AVC msg=audit(1162850461.778:1112): avc: denied { read } for pid=6782 comm="chkconfig" name="innd" dev=dm-0 ino=9331492 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162850461.778:1112): arch=40000003 syscall=5 success=yes exit=3 a0=bfe8d950 a1=0 a2=ffffffff a3=9f27038 items=0 ppid=6780 pid=6782 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="chkconfig" exe="/sbin/chkconfig" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162850461.778:1113): avc: denied { getattr } for pid=6782 comm="chkconfig" name="innd" dev=dm-0 ino=9331492 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162850461.778:1113): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bfe8d8c0 a2=f70ff4 a3=3 items=0 ppid=6780 pid=6782 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="chkconfig" exe="/sbin/chkconfig" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162850461.778:1113): path="/etc/rc.d/init.d/innd" type=CRED_DISP msg=audit(1162850461.790:1114): user pid=6778 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162850461.790:1115): user pid=6778 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162850490.680:1116): avc: denied { execute } for pid=6807 comm="beagled-index-h" name="mono" dev=dm-0 ino=10323612 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:mono_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162850490.680:1116): arch=40000003 syscall=33 success=yes exit=0 a0=882a868 a1=1 a2=11 a3=882a868 items=0 ppid=1 pid=6807 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="beagled-index-h" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162850490.680:1117): avc: denied { read } for pid=6807 comm="beagled-index-h" name="mono" dev=dm-0 ino=10323612 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:mono_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162850490.680:1117): arch=40000003 syscall=33 success=yes exit=0 a0=882a868 a1=4 a2=ffffffff a3=882a868 items=0 ppid=1 pid=6807 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="beagled-index-h" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162850490.680:1118): avc: denied { execute_no_trans } for pid=6807 comm="beagled-index-h" name="mono" dev=dm-0 ino=10323612 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:mono_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162850490.680:1118): arch=40000003 syscall=11 success=yes exit=0 a0=882ab80 a1=882a808 a2=882b5f0 a3=882a808 items=0 ppid=1 pid=6807 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="mono" exe="/usr/bin/mono" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1162850490.680:1118): path="/usr/bin/mono" type=USER_ACCT msg=audit(1162851001.852:1119): user pid=6858 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162851001.852:1120): login pid=6858 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162851001.852:1121): user pid=6858 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162851001.852:1122): user pid=6858 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162851001.856:1123): avc: denied { execute } for pid=6859 comm="sh" name="sa1" dev=dm-0 ino=13061698 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:lib_t:s0 tclass=file type=AVC msg=audit(1162851001.856:1123): avc: denied { execute_no_trans } for pid=6859 comm="sh" name="sa1" dev=dm-0 ino=13061698 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1162851001.856:1123): arch=40000003 syscall=11 success=yes exit=0 a0=87b01b0 a1=87b0358 a2=87b0290 a3=87b0008 items=0 ppid=6858 pid=6859 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sa1" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162851001.856:1123): path="/usr/lib/sa/sa1" type=AVC msg=audit(1162851001.856:1124): avc: denied { execute } for pid=6859 comm="sa1" name="sadc" dev=dm-0 ino=11981386 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=AVC msg=audit(1162851001.856:1124): avc: denied { execute_no_trans } for pid=6859 comm="sa1" name="sadc" dev=dm-0 ino=11981386 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=AVC msg=audit(1162851001.856:1124): avc: denied { read } for pid=6859 comm="sa1" name="sadc" dev=dm-0 ino=11981386 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162851001.856:1124): arch=40000003 syscall=11 success=yes exit=0 a0=894cd48 a1=894c740 a2=894cd60 a3=894c740 items=0 ppid=6858 pid=6859 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162851001.856:1124): path="/usr/lib/sa/sadc" type=AVC_PATH msg=audit(1162851001.856:1124): path="/usr/lib/sa/sadc" type=AVC msg=audit(1162851001.860:1125): avc: denied { search } for pid=6859 comm="sadc" name="net" dev=proc ino=-268435432 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=dir type=AVC msg=audit(1162851001.860:1125): avc: denied { read } for pid=6859 comm="sadc" name="dev" dev=proc ino=-268435159 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=file type=SYSCALL msg=audit(1162851001.860:1125): arch=40000003 syscall=5 success=yes exit=3 a0=8050371 a1=0 a2=1b6 a3=88a7800 items=0 ppid=6858 pid=6859 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162851001.860:1126): avc: denied { getattr } for pid=6859 comm="sadc" name="dev" dev=proc ino=-268435159 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=file type=SYSCALL msg=audit(1162851001.860:1126): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bfce6e18 a2=dc5ff4 a3=88a7800 items=0 ppid=6858 pid=6859 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162851001.860:1126): path="/proc/net/dev" type=AVC msg=audit(1162851001.860:1127): avc: denied { search } for pid=6859 comm="sadc" name="sa" dev=dm-0 ino=14607631 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=dir type=SYSCALL msg=audit(1162851001.860:1127): arch=40000003 syscall=33 success=yes exit=0 a0=bfce71c4 a1=0 a2=bfce70b8 a3=bfce70c0 items=0 ppid=6858 pid=6859 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162851001.860:1128): avc: denied { read append } for pid=6859 comm="sadc" name="sa06" dev=dm-0 ino=14600291 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=file type=SYSCALL msg=audit(1162851001.860:1128): arch=40000003 syscall=5 success=yes exit=3 a0=bfce71c4 a1=402 a2=bfce7388 a3=bfce70c0 items=0 ppid=6858 pid=6859 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162851001.860:1129): avc: denied { search } for pid=6859 comm="sadc" name="fs" dev=proc ino=-268435428 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=dir type=AVC msg=audit(1162851001.860:1129): avc: denied { read } for pid=6859 comm="sadc" name="dentry-state" dev=proc ino=-268435227 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=file type=SYSCALL msg=audit(1162851001.860:1129): arch=40000003 syscall=5 success=yes exit=4 a0=805037f a1=0 a2=1b6 a3=88a7df0 items=0 ppid=6858 pid=6859 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162851001.860:1130): avc: denied { getattr } for pid=6859 comm="sadc" name="dentry-state" dev=proc ino=-268435227 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=file type=SYSCALL msg=audit(1162851001.860:1130): arch=40000003 syscall=197 success=yes exit=0 a0=4 a1=bfce6c74 a2=dc5ff4 a3=88a7df0 items=0 ppid=6858 pid=6859 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162851001.860:1130): path="/proc/sys/fs/dentry-state" type=AVC msg=audit(1162851001.860:1131): avc: denied { search } for pid=6859 comm="sadc" name="rpc" dev=proc ino=-268434552 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_rpc_t:s0 tclass=dir type=SYSCALL msg=audit(1162851001.860:1131): arch=40000003 syscall=5 success=no exit=-2 a0=80502a5 a1=0 a2=1b6 a3=88a7df0 items=0 ppid=6858 pid=6859 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162851001.860:1132): avc: denied { lock } for pid=6859 comm="sadc" name="sa06" dev=dm-0 ino=14600291 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=file type=SYSCALL msg=audit(1162851001.860:1132): arch=40000003 syscall=143 success=yes exit=0 a0=3 a1=6 a2=bfce70c0 a3=3 items=0 ppid=6858 pid=6859 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162851001.860:1132): path="/var/log/sa/sa06" type=CRED_DISP msg=audit(1162851001.872:1133): user pid=6858 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162851001.872:1134): user pid=6858 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162851238.587:1135): avc: denied { search } for pid=6868 comm="evolution" name="nscd" dev=dm-0 ino=14436932 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=system_u:object_r:nscd_var_run_t:s0 tclass=dir type=SYSCALL msg=audit(1162851238.587:1135): arch=40000003 syscall=102 success=no exit=-2 a0=3 a1=bfcceb18 a2=aa0ff4 a3=3 items=0 ppid=1 pid=6868 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC msg=audit(1162851238.591:1136): avc: denied { read } for pid=6868 comm="evolution" name=".gdmAHKGIT" dev=dm-0 ino=14469334 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162851238.591:1136): arch=40000003 syscall=33 success=yes exit=0 a0=bfcd0dff a1=4 a2=4db18a64 a3=bfcd0dff items=0 ppid=1 pid=6868 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC msg=audit(1162851238.591:1137): avc: denied { getattr } for pid=6868 comm="evolution" name=".gdmAHKGIT" dev=dm-0 ino=14469334 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162851238.591:1137): arch=40000003 syscall=197 success=yes exit=0 a0=4 a1=bfccea4c a2=aa0ff4 a3=8c90730 items=0 ppid=1 pid=6868 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC_PATH msg=audit(1162851238.591:1137): path="/tmp/.gdmAHKGIT" type=AVC msg=audit(1162851238.603:1138): avc: denied { search } for pid=6868 comm="evolution" name=".ICE-unix" dev=dm-0 ino=14469315 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=system_u:object_r:ice_tmp_t:s0 tclass=dir type=AVC msg=audit(1162851238.603:1138): avc: denied { write } for pid=6868 comm="evolution" name="6531" dev=dm-0 ino=14469454 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=staff_u:object_r:ice_tmp_t:s0 tclass=sock_file type=SYSCALL msg=audit(1162851238.603:1138): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=bfcceb50 a2=4dc5d770 a3=15 items=0 ppid=1 pid=6868 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC msg=audit(1162851238.603:1139): avc: denied { read } for pid=6868 comm="evolution" name=".ICEauthority" dev=dm-0 ino=6570930 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=staff_u:object_r:staff_iceauth_home_t:s0 tclass=file type=SYSCALL msg=audit(1162851238.603:1139): arch=40000003 syscall=33 success=yes exit=0 a0=8ca6218 a1=4 a2=4dc5d770 a3=8ca6218 items=0 ppid=1 pid=6868 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC msg=audit(1162851238.603:1140): avc: denied { getattr } for pid=6868 comm="evolution" name=".ICEauthority" dev=dm-0 ino=6570930 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=staff_u:object_r:staff_iceauth_home_t:s0 tclass=file type=SYSCALL msg=audit(1162851238.603:1140): arch=40000003 syscall=197 success=yes exit=0 a0=b a1=bfccebec a2=aa0ff4 a3=8ca6af8 items=0 ppid=1 pid=6868 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC_PATH msg=audit(1162851238.603:1140): path="/home/kmacmill/.ICEauthority" type=AVC msg=audit(1162851238.827:1141): avc: denied { write } for pid=6871 comm="evolution-data-" name="[100190]" dev=pipefs ino=100190 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=fifo_file type=SYSCALL msg=audit(1162851238.827:1141): arch=40000003 syscall=11 success=yes exit=0 a0=8112db0 a1=8112d58 a2=8106478 a3=0 items=0 ppid=1 pid=6871 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC_PATH msg=audit(1162851238.827:1141): path="pipe:[100190]" type=AVC msg=audit(1162851238.839:1142): avc: denied { read } for pid=6871 comm="evolution-data-" name="gconv-modules.cache" dev=dm-0 ino=10387675 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=user_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1162851238.839:1142): arch=40000003 syscall=5 success=yes exit=3 a0=2589dc a1=0 a2=0 a3=0 items=0 ppid=1 pid=6871 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC msg=audit(1162851238.839:1143): avc: denied { getattr } for pid=6871 comm="evolution-data-" name="gconv-modules.cache" dev=dm-0 ino=10387675 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=user_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1162851238.839:1143): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bfd5cbcc a2=26fff4 a3=3 items=0 ppid=1 pid=6871 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC_PATH msg=audit(1162851238.839:1143): path="/usr/lib/gconv/gconv-modules.cache" type=AVC msg=audit(1162851238.839:1144): avc: denied { getsched } for pid=6871 comm="evolution-data-" scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:staff_r:staff_evolution_server_t:s0 tclass=process type=SYSCALL msg=audit(1162851238.839:1144): arch=40000003 syscall=155 success=yes exit=0 a0=1ad7 a1=b7f328dc a2=4fbff4 a3=b7f326d0 items=0 ppid=1 pid=6871 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC msg=audit(1162851238.839:1145): avc: denied { search } for pid=6871 comm="evolution-data-" name="locale" dev=dm-0 ino=10311905 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=dir type=AVC msg=audit(1162851238.839:1145): avc: denied { read } for pid=6871 comm="evolution-data-" name="locale.alias" dev=dm-0 ino=10314350 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1162851238.839:1145): arch=40000003 syscall=5 success=yes exit=3 a0=4df2984c a1=8000 a2=1b6 a3=86fa480 items=0 ppid=1 pid=6871 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC msg=audit(1162851238.839:1146): avc: denied { getattr } for pid=6871 comm="evolution-data-" name="locale.alias" dev=dm-0 ino=10314350 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1162851238.839:1146): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bfd5d0f8 a2=26fff4 a3=86fa480 items=0 ppid=1 pid=6871 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC_PATH msg=audit(1162851238.839:1146): path="/usr/share/locale/locale.alias" type=AVC msg=audit(1162851238.843:1147): avc: denied { read } for pid=6871 comm="evolution-data-" name="locale-archive" dev=dm-0 ino=10328905 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=user_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1162851238.843:1147): arch=40000003 syscall=5 success=yes exit=3 a0=258a00 a1=8000 a2=1 a3=bfd5d0c0 items=0 ppid=1 pid=6871 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC msg=audit(1162851238.843:1148): avc: denied { getattr } for pid=6871 comm="evolution-data-" name="locale-archive" dev=dm-0 ino=10328905 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=user_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1162851238.843:1148): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=270aa0 a2=26fff4 a3=bfd5d0c0 items=0 ppid=1 pid=6871 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC_PATH msg=audit(1162851238.843:1148): path="/usr/lib/locale/locale-archive" type=AVC msg=audit(1162851238.843:1149): avc: denied { read } for pid=6871 comm="evolution-data-" name="tmp" dev=dm-0 ino=14469313 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=system_u:object_r:tmp_t:s0 tclass=dir type=SYSCALL msg=audit(1162851238.843:1149): arch=40000003 syscall=5 success=yes exit=9 a0=86fc5a8 a1=18800 a2=60dfc0 a3=86fc5a8 items=0 ppid=1 pid=6871 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC msg=audit(1162851238.843:1150): avc: denied { getattr } for pid=6871 comm="evolution-data-" name="tmp" dev=dm-0 ino=14469313 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=system_u:object_r:tmp_t:s0 tclass=dir type=SYSCALL msg=audit(1162851238.843:1150): arch=40000003 syscall=197 success=yes exit=0 a0=9 a1=bfd5d1dc a2=26fff4 a3=9 items=0 ppid=1 pid=6871 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC_PATH msg=audit(1162851238.843:1150): path="/tmp" type=AVC msg=audit(1162851238.843:1151): avc: denied { search } for pid=6871 comm="evolution-data-" name="tmp" dev=dm-0 ino=14469313 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=system_u:object_r:tmp_t:s0 tclass=dir type=AVC msg=audit(1162851238.843:1151): avc: denied { getattr } for pid=6871 comm="evolution-data-" name="orbit-kmacmill" dev=dm-0 ino=15648177 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=dir type=SYSCALL msg=audit(1162851238.843:1151): arch=40000003 syscall=195 success=yes exit=0 a0=86fca68 a1=bfd5d220 a2=26fff4 a3=3 items=0 ppid=1 pid=6871 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC_PATH msg=audit(1162851238.843:1151): path="/tmp/orbit-kmacmill" type=AVC msg=audit(1162851238.843:1152): avc: denied { setattr } for pid=6871 comm="evolution-data-" name="orbit-kmacmill" dev=dm-0 ino=15648177 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=dir type=SYSCALL msg=audit(1162851238.843:1152): arch=40000003 syscall=30 success=yes exit=0 a0=86fca90 a1=bfd5d274 a2=4e570f80 a3=1f4 items=0 ppid=1 pid=6871 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC msg=audit(1162851238.843:1153): avc: denied { read } for pid=6871 comm="evolution-data-" name="urandom" dev=tmpfs ino=2055 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=system_u:object_r:urandom_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1162851238.843:1153): arch=40000003 syscall=5 success=yes exit=9 a0=4def9880 a1=8000 a2=1b6 a3=86fd800 items=0 ppid=1 pid=6871 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC msg=audit(1162851238.843:1154): avc: denied { getattr } for pid=6871 comm="evolution-data-" name="urandom" dev=tmpfs ino=2055 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=system_u:object_r:urandom_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1162851238.843:1154): arch=40000003 syscall=197 success=yes exit=0 a0=9 a1=bfd5d1fc a2=26fff4 a3=86fd800 items=0 ppid=1 pid=6871 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC_PATH msg=audit(1162851238.843:1154): path="/dev/urandom" type=AVC msg=audit(1162851238.843:1155): avc: denied { ioctl } for pid=6871 comm="evolution-data-" name="urandom" dev=tmpfs ino=2055 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=system_u:object_r:urandom_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1162851238.843:1155): arch=40000003 syscall=54 success=no exit=-22 a0=9 a1=5401 a2=bfd5d15c a3=bfd5d19c items=0 ppid=1 pid=6871 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC_PATH msg=audit(1162851238.843:1155): path="/dev/urandom" type=AVC msg=audit(1162851238.847:1156): avc: denied { search } for pid=6871 comm="evolution-data-" name="gconfd-kmacmill" dev=dm-0 ino=15648282 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=dir type=AVC msg=audit(1162851238.847:1156): avc: denied { read } for pid=6871 comm="evolution-data-" name="ior" dev=dm-0 ino=15648303 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162851238.847:1156): arch=40000003 syscall=5 success=yes exit=9 a0=86fee38 a1=0 a2=1b6 a3=86fee60 items=0 ppid=1 pid=6871 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC msg=audit(1162851238.847:1157): avc: denied { getattr } for pid=6871 comm="evolution-data-" name="ior" dev=dm-0 ino=15648303 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162851238.847:1157): arch=40000003 syscall=197 success=yes exit=0 a0=9 a1=bfd5c888 a2=26fff4 a3=86fee60 items=0 ppid=1 pid=6871 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC_PATH msg=audit(1162851238.847:1157): path="/tmp/gconfd-kmacmill/lock/ior" type=AVC msg=audit(1162851238.847:1158): avc: denied { write } for pid=6871 comm="evolution-data-" name="linc-19be-0-41f49a5b6e22f" dev=dm-0 ino=15648248 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=sock_file type=AVC msg=audit(1162851238.847:1158): avc: denied { connectto } for pid=6871 comm="evolution-data-" name="linc-19be-0-41f49a5b6e22f" scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=unix_stream_socket type=SYSCALL msg=audit(1162851238.847:1158): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=bfd5cfa0 a2=4e570f80 a3=0 items=0 ppid=1 pid=6871 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC_PATH msg=audit(1162851238.847:1158): path="/tmp/orbit-kmacmill/linc-19be-0-41f49a5b6e22f" type=AVC msg=audit(1162851238.847:1159): avc: denied { write } for pid=6871 comm="evolution-data-" name="orbit-kmacmill" dev=dm-0 ino=15648177 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=dir type=AVC msg=audit(1162851238.847:1159): avc: denied { add_name } for pid=6871 comm="evolution-data-" name="linc-1ad7-0-5a56670ecf53d" scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=dir type=AVC msg=audit(1162851238.847:1159): avc: denied { create } for pid=6871 comm="evolution-data-" name="linc-1ad7-0-5a56670ecf53d" scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=sock_file type=SYSCALL msg=audit(1162851238.847:1159): arch=40000003 syscall=102 success=yes exit=0 a0=2 a1=bfd5cfe0 a2=4e570f80 a3=b7f3269c items=0 ppid=1 pid=6871 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC msg=audit(1162851238.847:1160): avc: denied { connectto } for pid=6590 comm="gconfd-2" name="linc-1ad7-0-5a56670ecf53d" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_evolution_server_t:s0 tclass=unix_stream_socket type=SYSCALL msg=audit(1162851238.847:1160): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=bfe86020 a2=4e570f80 a3=0 items=0 ppid=1 pid=6590 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1162851238.847:1160): path="/tmp/orbit-kmacmill/linc-1ad7-0-5a56670ecf53d" type=AVC msg=audit(1162851238.867:1161): avc: denied { write } for pid=6871 comm="evolution-data-" name="bonobo-activation-register.lock" dev=dm-0 ino=15648339 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162851238.867:1161): arch=40000003 syscall=5 success=yes exit=16 a0=87058b8 a1=42 a2=1c0 a3=87058b8 items=0 ppid=1 pid=6871 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC msg=audit(1162851238.867:1162): avc: denied { lock } for pid=6871 comm="evolution-data-" name="bonobo-activation-register.lock" dev=dm-0 ino=15648339 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162851238.867:1162): arch=40000003 syscall=221 success=yes exit=0 a0=10 a1=7 a2=bfd5d23c a3=bfd5d23c items=0 ppid=1 pid=6871 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC_PATH msg=audit(1162851238.867:1162): path="/tmp/orbit-kmacmill/bonobo-activation-register.lock" type=AVC msg=audit(1162851238.871:1163): avc: denied { getattr } for pid=6871 comm="evolution-data-" name="[100190]" dev=pipefs ino=100190 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=fifo_file type=SYSCALL msg=audit(1162851238.871:1163): arch=40000003 syscall=197 success=yes exit=0 a0=1e a1=bfd5d274 a2=26fff4 a3=8712c88 items=0 ppid=1 pid=6871 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC_PATH msg=audit(1162851238.871:1163): path="pipe:[100190]" type=USER_AVC msg=audit(1162851239.127:1164): user pid=2350 uid=81 auid=4294967295 subj=system_u:system_r:system_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager member=state dest=org.freedesktop.NetworkManager spid=6868 tpid=2797 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=system_u:system_r:NetworkManager_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1162851239.131:1165): user pid=2350 uid=81 auid=4294967295 subj=system_u:system_r:system_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.50 spid=2797 tpid=6868 scontext=system_u:system_r:NetworkManager_t:s0 tcontext=staff_u:staff_r:staff_evolution_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=AVC msg=audit(1162851239.179:1166): avc: denied { create } for pid=6882 comm="evolution" scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=staff_u:staff_r:staff_evolution_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1162851239.179:1166): arch=40000003 syscall=102 success=yes exit=35 a0=1 a1=b0cfd274 a2=aa0ff4 a3=727d7f items=0 ppid=1 pid=6882 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC msg=audit(1162851239.179:1167): avc: denied { bind } for pid=6882 comm="evolution" scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=staff_u:staff_r:staff_evolution_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1162851239.179:1167): arch=40000003 syscall=102 success=yes exit=0 a0=2 a1=b0cfd274 a2=aa0ff4 a3=23 items=0 ppid=1 pid=6882 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC msg=audit(1162851239.179:1168): avc: denied { getattr } for pid=6882 comm="evolution" scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=staff_u:staff_r:staff_evolution_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1162851239.179:1168): arch=40000003 syscall=102 success=yes exit=0 a0=6 a1=b0cfd274 a2=aa0ff4 a3=23 items=0 ppid=1 pid=6882 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC msg=audit(1162851239.179:1169): avc: denied { write } for pid=6882 comm="evolution" scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=staff_u:staff_r:staff_evolution_t:s0 tclass=netlink_route_socket type=AVC msg=audit(1162851239.179:1169): avc: denied { nlmsg_read } for pid=6882 comm="evolution" scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=staff_u:staff_r:staff_evolution_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1162851239.179:1169): arch=40000003 syscall=102 success=yes exit=20 a0=b a1=b0cfc1b4 a2=aa0ff4 a3=0 items=0 ppid=1 pid=6882 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC msg=audit(1162851239.179:1170): avc: denied { read } for pid=6882 comm="evolution" scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=staff_u:staff_r:staff_evolution_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1162851239.179:1170): arch=40000003 syscall=102 success=yes exit=188 a0=11 a1=b0cfc1b4 a2=aa0ff4 a3=0 items=0 ppid=1 pid=6882 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC msg=audit(1162851239.747:1171): avc: denied { read } for pid=6885 comm="xchat" name="resolv.conf" dev=dm-0 ino=9330746 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:net_conf_t:s0 tclass=file type=SYSCALL msg=audit(1162851239.747:1171): arch=40000003 syscall=5 success=yes exit=9 a0=230d13 a1=0 a2=1b6 a3=8948c28 items=0 ppid=6884 pid=6885 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="xchat" exe="/usr/bin/xchat" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162851240.015:1172): avc: denied { write } for pid=6892 comm="evolution-alarm" name="[100287]" dev=pipefs ino=100287 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=fifo_file type=SYSCALL msg=audit(1162851240.015:1172): arch=40000003 syscall=11 success=yes exit=0 a0=80fc700 a1=8105200 a2=81179b0 a3=0 items=0 ppid=1 pid=6892 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC_PATH msg=audit(1162851240.015:1172): path="pipe:[100287]" type=AVC msg=audit(1162851240.015:1173): avc: denied { read } for pid=6892 comm="evolution-alarm" name="libeutil.so.0.0.0" dev=dm-0 ino=14174689 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=system_u:object_r:shlib_t:s0 tclass=file type=SYSCALL msg=audit(1162851240.015:1173): arch=40000003 syscall=5 success=yes exit=3 a0=bff64ed0 a1=0 a2=0 a3=bff64ed0 items=0 ppid=1 pid=6892 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC msg=audit(1162851240.015:1174): avc: denied { getattr } for pid=6892 comm="evolution-alarm" name="libeutil.so.0.0.0" dev=dm-0 ino=14174689 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=system_u:object_r:shlib_t:s0 tclass=file type=SYSCALL msg=audit(1162851240.015:1174): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bff64f24 a2=322fc0 a3=4 items=0 ppid=1 pid=6892 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC_PATH msg=audit(1162851240.015:1174): path="/usr/lib/evolution/2.10/libeutil.so.0.0.0" type=AVC msg=audit(1162851240.015:1175): avc: denied { execute } for pid=6892 comm="evolution-alarm" name="libeutil.so.0.0.0" dev=dm-0 ino=14174689 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=system_u:object_r:shlib_t:s0 tclass=file type=SYSCALL msg=audit(1162851240.015:1175): arch=40000003 syscall=192 success=yes exit=1297682432 a0=4d591000 a1=33cd0 a2=5 a3=802 items=0 ppid=1 pid=6892 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC_PATH msg=audit(1162851240.015:1175): path="/usr/lib/evolution/2.10/libeutil.so.0.0.0" type=AVC msg=audit(1162851240.015:1176): avc: denied { read } for pid=6892 comm="evolution-alarm" name="ld.so.cache" dev=dm-0 ino=9330239 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=user_u:object_r:ld_so_cache_t:s0 tclass=file type=SYSCALL msg=audit(1162851240.015:1176): arch=40000003 syscall=5 success=yes exit=3 a0=320037 a1=0 a2=323650 a3=ffffffff items=0 ppid=1 pid=6892 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC msg=audit(1162851240.015:1177): avc: denied { getattr } for pid=6892 comm="evolution-alarm" name="ld.so.cache" dev=dm-0 ino=9330239 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=user_u:object_r:ld_so_cache_t:s0 tclass=file type=SYSCALL msg=audit(1162851240.015:1177): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bff64e18 a2=322fc0 a3=ffffffff items=0 ppid=1 pid=6892 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC_PATH msg=audit(1162851240.015:1177): path="/etc/ld.so.cache" type=AVC msg=audit(1162851240.051:1178): avc: denied { read } for pid=6892 comm="evolution-alarm" name="ld-2.5.90.so" dev=dm-0 ino=13716563 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=system_u:object_r:ld_so_t:s0 tclass=file type=SYSCALL msg=audit(1162851240.051:1178): arch=40000003 syscall=125 success=yes exit=0 a0=322000 a1=1000 a2=1 a3=380 items=0 ppid=1 pid=6892 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC_PATH msg=audit(1162851240.051:1178): path="/lib/ld-2.5.90.so" type=AVC msg=audit(1162851240.055:1179): avc: denied { getsched } for pid=6892 comm="evolution-alarm" scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tclass=process type=SYSCALL msg=audit(1162851240.055:1179): arch=40000003 syscall=155 success=yes exit=0 a0=1aec a1=b7f3eaec a2=baaff4 a3=b7f3e8e0 items=0 ppid=1 pid=6892 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC msg=audit(1162851240.099:1180): avc: denied { read } for pid=6892 comm="evolution-alarm" name="nsswitch.conf" dev=dm-0 ino=9330856 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1162851240.099:1180): arch=40000003 syscall=5 success=yes exit=3 a0=797e3d a1=0 a2=1b6 a3=9302a00 items=0 ppid=1 pid=6892 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC msg=audit(1162851240.099:1181): avc: denied { getattr } for pid=6892 comm="evolution-alarm" name="nsswitch.conf" dev=dm-0 ino=9330856 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1162851240.099:1181): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bff65008 a2=7afff4 a3=9302a00 items=0 ppid=1 pid=6892 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC_PATH msg=audit(1162851240.099:1181): path="/etc/nsswitch.conf" type=AVC msg=audit(1162851240.103:1182): avc: denied { read } for pid=6892 comm="evolution-alarm" name="locale.alias" dev=dm-0 ino=10379454 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=file type=SYSCALL msg=audit(1162851240.103:1182): arch=40000003 syscall=5 success=yes exit=3 a0=bff60fa8 a1=0 a2=1b6 a3=930a280 items=0 ppid=1 pid=6892 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC msg=audit(1162851240.103:1183): avc: denied { getattr } for pid=6892 comm="evolution-alarm" name="locale.alias" dev=dm-0 ino=10379454 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=file type=SYSCALL msg=audit(1162851240.103:1183): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bff60bc8 a2=7afff4 a3=930a280 items=0 ppid=1 pid=6892 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC_PATH msg=audit(1162851240.103:1183): path="/usr/share/X11/locale/locale.alias" type=AVC msg=audit(1162851240.107:1184): avc: denied { read } for pid=6892 comm="evolution-alarm" name=".gdmAHKGIT" dev=dm-0 ino=14469334 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162851240.107:1184): arch=40000003 syscall=33 success=yes exit=0 a0=bff65b68 a1=4 a2=4db18a64 a3=bff65b68 items=0 ppid=1 pid=6892 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC msg=audit(1162851240.107:1185): avc: denied { getattr } for pid=6892 comm="evolution-alarm" name=".gdmAHKGIT" dev=dm-0 ino=14469334 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162851240.107:1185): arch=40000003 syscall=197 success=yes exit=0 a0=4 a1=bff64e5c a2=7afff4 a3=930d6c0 items=0 ppid=1 pid=6892 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC_PATH msg=audit(1162851240.107:1185): path="/tmp/.gdmAHKGIT" type=AVC msg=audit(1162851240.255:1186): avc: denied { read } for pid=6892 comm="evolution-alarm" name="tmp" dev=dm-0 ino=14469313 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=system_u:object_r:tmp_t:s0 tclass=dir type=SYSCALL msg=audit(1162851240.255:1186): arch=40000003 syscall=5 success=yes exit=10 a0=9302700 a1=18800 a2=322fc0 a3=9302700 items=0 ppid=1 pid=6892 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC msg=audit(1162851240.255:1187): avc: denied { getattr } for pid=6892 comm="evolution-alarm" name="orbit-kmacmill" dev=dm-0 ino=15648177 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=dir type=SYSCALL msg=audit(1162851240.255:1187): arch=40000003 syscall=195 success=yes exit=0 a0=931f210 a1=bff654c0 a2=7afff4 a3=3 items=0 ppid=1 pid=6892 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC_PATH msg=audit(1162851240.255:1187): path="/tmp/orbit-kmacmill" type=AVC msg=audit(1162851240.255:1188): avc: denied { setattr } for pid=6892 comm="evolution-alarm" name="orbit-kmacmill" dev=dm-0 ino=15648177 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=dir type=SYSCALL msg=audit(1162851240.255:1188): arch=40000003 syscall=30 success=yes exit=0 a0=931f238 a1=bff65514 a2=4e570f80 a3=1f4 items=0 ppid=1 pid=6892 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC msg=audit(1162851240.255:1189): avc: denied { read } for pid=6892 comm="evolution-alarm" name="urandom" dev=tmpfs ino=2055 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=system_u:object_r:urandom_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1162851240.255:1189): arch=40000003 syscall=5 success=yes exit=10 a0=4def9880 a1=8000 a2=1b6 a3=931f2e0 items=0 ppid=1 pid=6892 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC msg=audit(1162851240.255:1190): avc: denied { getattr } for pid=6892 comm="evolution-alarm" name="urandom" dev=tmpfs ino=2055 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=system_u:object_r:urandom_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1162851240.255:1190): arch=40000003 syscall=197 success=yes exit=0 a0=a a1=bff6549c a2=7afff4 a3=931f2e0 items=0 ppid=1 pid=6892 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC_PATH msg=audit(1162851240.255:1190): path="/dev/urandom" type=AVC msg=audit(1162851240.255:1191): avc: denied { ioctl } for pid=6892 comm="evolution-alarm" name="urandom" dev=tmpfs ino=2055 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=system_u:object_r:urandom_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1162851240.255:1191): arch=40000003 syscall=54 success=no exit=-22 a0=a a1=5401 a2=bff653fc a3=bff6543c items=0 ppid=1 pid=6892 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC_PATH msg=audit(1162851240.255:1191): path="/dev/urandom" type=AVC msg=audit(1162851240.259:1192): avc: denied { read } for pid=6892 comm="evolution-alarm" name="modules" dev=dm-0 ino=9331073 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=dir type=SYSCALL msg=audit(1162851240.259:1192): arch=40000003 syscall=5 success=yes exit=10 a0=9320610 a1=18800 a2=4dea3d07 a3=9320610 items=0 ppid=1 pid=6892 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC msg=audit(1162851240.259:1193): avc: denied { search } for pid=6892 comm="evolution-alarm" name=".ICE-unix" dev=dm-0 ino=14469315 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=system_u:object_r:ice_tmp_t:s0 tclass=dir type=AVC msg=audit(1162851240.259:1193): avc: denied { write } for pid=6892 comm="evolution-alarm" name="6531" dev=dm-0 ino=14469454 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=staff_u:object_r:ice_tmp_t:s0 tclass=sock_file type=AVC msg=audit(1162851240.259:1193): avc: denied { connectto } for pid=6892 comm="evolution-alarm" name="6531" scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=unix_stream_socket type=SYSCALL msg=audit(1162851240.259:1193): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=bff64f10 a2=4dc5d770 a3=15 items=0 ppid=1 pid=6892 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC_PATH msg=audit(1162851240.259:1193): path="/tmp/.ICE-unix/6531" type=AVC msg=audit(1162851240.259:1194): avc: denied { read } for pid=6892 comm="evolution-alarm" name=".ICEauthority" dev=dm-0 ino=6570930 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=staff_u:object_r:staff_iceauth_home_t:s0 tclass=file type=SYSCALL msg=audit(1162851240.259:1194): arch=40000003 syscall=33 success=yes exit=0 a0=9322f90 a1=4 a2=4dc5d770 a3=9322f90 items=0 ppid=1 pid=6892 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC msg=audit(1162851240.259:1195): avc: denied { getattr } for pid=6892 comm="evolution-alarm" name=".ICEauthority" dev=dm-0 ino=6570930 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=staff_u:object_r:staff_iceauth_home_t:s0 tclass=file type=SYSCALL msg=audit(1162851240.259:1195): arch=40000003 syscall=197 success=yes exit=0 a0=b a1=bff64fac a2=7afff4 a3=9323870 items=0 ppid=1 pid=6892 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC_PATH msg=audit(1162851240.259:1195): path="/home/kmacmill/.ICEauthority" type=AVC msg=audit(1162851240.267:1196): avc: denied { search } for pid=6892 comm="evolution-alarm" name="gconfd-kmacmill" dev=dm-0 ino=15648282 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=dir type=AVC msg=audit(1162851240.267:1196): avc: denied { read } for pid=6892 comm="evolution-alarm" name="ior" dev=dm-0 ino=15648303 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162851240.267:1196): arch=40000003 syscall=5 success=yes exit=11 a0=9326700 a1=0 a2=1b6 a3=9326748 items=0 ppid=1 pid=6892 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC msg=audit(1162851240.267:1197): avc: denied { getattr } for pid=6892 comm="evolution-alarm" name="ior" dev=dm-0 ino=15648303 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162851240.267:1197): arch=40000003 syscall=197 success=yes exit=0 a0=b a1=bff64ac8 a2=7afff4 a3=9326748 items=0 ppid=1 pid=6892 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC_PATH msg=audit(1162851240.267:1197): path="/tmp/gconfd-kmacmill/lock/ior" type=AVC msg=audit(1162851240.267:1198): avc: denied { write } for pid=6892 comm="evolution-alarm" name="linc-19be-0-41f49a5b6e22f" dev=dm-0 ino=15648248 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=sock_file type=SYSCALL msg=audit(1162851240.267:1198): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=bff651e0 a2=4e570f80 a3=0 items=0 ppid=1 pid=6892 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC msg=audit(1162851240.267:1199): avc: denied { write } for pid=6892 comm="evolution-alarm" name="orbit-kmacmill" dev=dm-0 ino=15648177 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=dir type=AVC msg=audit(1162851240.267:1199): avc: denied { add_name } for pid=6892 comm="evolution-alarm" name="linc-1aec-0-7f9bab7e41c94" scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=dir type=AVC msg=audit(1162851240.267:1199): avc: denied { create } for pid=6892 comm="evolution-alarm" name="linc-1aec-0-7f9bab7e41c94" scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=sock_file type=SYSCALL msg=audit(1162851240.267:1199): arch=40000003 syscall=102 success=yes exit=0 a0=2 a1=bff65220 a2=4e570f80 a3=b7f3e8ac items=0 ppid=1 pid=6892 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC msg=audit(1162851240.267:1200): avc: denied { connectto } for pid=6590 comm="gconfd-2" name="linc-1aec-0-7f9bab7e41c94" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tclass=unix_stream_socket type=SYSCALL msg=audit(1162851240.267:1200): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=bfe86020 a2=4e570f80 a3=0 items=0 ppid=1 pid=6590 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1162851240.267:1200): path="/tmp/orbit-kmacmill/linc-1aec-0-7f9bab7e41c94" type=AVC msg=audit(1162851240.279:1201): avc: denied { read } for pid=6892 comm="evolution-alarm" name="meminfo" dev=proc ino=-268435454 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=system_u:object_r:proc_t:s0 tclass=file type=SYSCALL msg=audit(1162851240.279:1201): arch=40000003 syscall=5 success=yes exit=18 a0=79799a a1=0 a2=1b6 a3=933ee60 items=0 ppid=1 pid=6892 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC msg=audit(1162851240.279:1202): avc: denied { getattr } for pid=6892 comm="evolution-alarm" name="meminfo" dev=proc ino=-268435454 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=system_u:object_r:proc_t:s0 tclass=file type=SYSCALL msg=audit(1162851240.279:1202): arch=40000003 syscall=197 success=yes exit=0 a0=12 a1=bff60d3c a2=7afff4 a3=933ee60 items=0 ppid=1 pid=6892 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC_PATH msg=audit(1162851240.279:1202): path="/proc/meminfo" type=AVC msg=audit(1162851240.279:1203): avc: denied { connectto } for pid=6892 comm="evolution-alarm" path=002F746D702F646275732D47416759386D56457350 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=staff_u:staff_r:staff_dbusd_t:s0 tclass=unix_stream_socket type=SYSCALL msg=audit(1162851240.279:1203): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=bff65040 a2=fb9494 a3=0 items=0 ppid=1 pid=6892 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC msg=audit(1162851240.291:1204): avc: denied { write } for pid=6892 comm="evolution-alarm" name="bonobo-activation-register.lock" dev=dm-0 ino=15648339 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162851240.291:1204): arch=40000003 syscall=5 success=yes exit=19 a0=934c9a0 a1=42 a2=1c0 a3=934c9a0 items=0 ppid=1 pid=6892 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC msg=audit(1162851240.291:1205): avc: denied { lock } for pid=6892 comm="evolution-alarm" name="bonobo-activation-register.lock" dev=dm-0 ino=15648339 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162851240.291:1205): arch=40000003 syscall=221 success=yes exit=0 a0=13 a1=7 a2=bff650ec a3=bff650ec items=0 ppid=1 pid=6892 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC_PATH msg=audit(1162851240.291:1205): path="/tmp/orbit-kmacmill/bonobo-activation-register.lock" type=AVC msg=audit(1162851240.295:1206): avc: denied { signal } for pid=6896 comm="evolution-data-" scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:staff_r:staff_evolution_server_t:s0 tclass=process type=SYSCALL msg=audit(1162851240.295:1206): arch=40000003 syscall=270 success=yes exit=0 a0=1ad7 a1=1af3 a2=21 a3=b72efbd0 items=0 ppid=1 pid=6896 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC msg=audit(1162851240.307:1207): avc: denied { getattr } for pid=6892 comm="evolution-alarm" name="[100287]" dev=pipefs ino=100287 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=fifo_file type=SYSCALL msg=audit(1162851240.307:1207): arch=40000003 syscall=197 success=yes exit=0 a0=1f a1=bff654b4 a2=7afff4 a3=9354540 items=0 ppid=1 pid=6892 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC_PATH msg=audit(1162851240.307:1207): path="pipe:[100287]" type=USER_ACCT msg=audit(1162851601.929:1208): user pid=6948 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162851601.933:1209): login pid=6948 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162851601.933:1210): user pid=6948 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162851601.933:1211): user pid=6948 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162851601.937:1212): avc: denied { search } for pid=6949 comm="sadc" name="net" dev=proc ino=-268435432 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=dir type=AVC msg=audit(1162851601.937:1212): avc: denied { read } for pid=6949 comm="sadc" name="dev" dev=proc ino=-268435159 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=file type=SYSCALL msg=audit(1162851601.937:1212): arch=40000003 syscall=5 success=yes exit=3 a0=8050371 a1=0 a2=1b6 a3=85b0800 items=0 ppid=6948 pid=6949 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162851601.937:1213): avc: denied { getattr } for pid=6949 comm="sadc" name="dev" dev=proc ino=-268435159 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=file type=SYSCALL msg=audit(1162851601.937:1213): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bfb0b438 a2=96aff4 a3=85b0800 items=0 ppid=6948 pid=6949 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162851601.937:1213): path="/proc/net/dev" type=AVC msg=audit(1162851601.937:1214): avc: denied { search } for pid=6949 comm="sadc" name="sa" dev=dm-0 ino=14607631 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=dir type=SYSCALL msg=audit(1162851601.937:1214): arch=40000003 syscall=33 success=yes exit=0 a0=bfb0b7e4 a1=0 a2=bfb0b6d8 a3=bfb0b6e0 items=0 ppid=6948 pid=6949 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162851601.937:1215): avc: denied { read append } for pid=6949 comm="sadc" name="sa06" dev=dm-0 ino=14600291 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=file type=SYSCALL msg=audit(1162851601.937:1215): arch=40000003 syscall=5 success=yes exit=3 a0=bfb0b7e4 a1=402 a2=bfb0b9a8 a3=bfb0b6e0 items=0 ppid=6948 pid=6949 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162851601.937:1216): avc: denied { search } for pid=6949 comm="sadc" name="fs" dev=proc ino=-268435428 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=dir type=AVC msg=audit(1162851601.937:1216): avc: denied { read } for pid=6949 comm="sadc" name="dentry-state" dev=proc ino=-268435227 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=file type=SYSCALL msg=audit(1162851601.937:1216): arch=40000003 syscall=5 success=yes exit=4 a0=805037f a1=0 a2=1b6 a3=85b0df0 items=0 ppid=6948 pid=6949 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162851601.937:1217): avc: denied { getattr } for pid=6949 comm="sadc" name="dentry-state" dev=proc ino=-268435227 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=file type=SYSCALL msg=audit(1162851601.937:1217): arch=40000003 syscall=197 success=yes exit=0 a0=4 a1=bfb0b294 a2=96aff4 a3=85b0df0 items=0 ppid=6948 pid=6949 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162851601.937:1217): path="/proc/sys/fs/dentry-state" type=AVC msg=audit(1162851601.941:1218): avc: denied { lock } for pid=6949 comm="sadc" name="sa06" dev=dm-0 ino=14600291 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=file type=SYSCALL msg=audit(1162851601.941:1218): arch=40000003 syscall=143 success=yes exit=0 a0=3 a1=6 a2=bfb0b6e0 a3=3 items=0 ppid=6948 pid=6949 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162851601.941:1218): path="/var/log/sa/sa06" type=CRED_DISP msg=audit(1162851601.949:1219): user pid=6948 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162851601.949:1220): user pid=6948 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162852201.015:1221): user pid=6973 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162852201.015:1222): login pid=6973 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162852201.015:1223): user pid=6973 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162852201.015:1224): user pid=6973 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162852201.019:1225): avc: denied { execute } for pid=6974 comm="sh" name="sa1" dev=dm-0 ino=13061698 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:lib_t:s0 tclass=file type=AVC msg=audit(1162852201.019:1225): avc: denied { execute_no_trans } for pid=6974 comm="sh" name="sa1" dev=dm-0 ino=13061698 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1162852201.019:1225): arch=40000003 syscall=11 success=yes exit=0 a0=87271b0 a1=8727358 a2=8727290 a3=8727008 items=0 ppid=6973 pid=6974 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sa1" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162852201.019:1225): path="/usr/lib/sa/sa1" type=CRED_DISP msg=audit(1162852201.031:1226): user pid=6973 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162852201.031:1227): user pid=6973 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162852801.092:1228): user pid=7028 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162852801.092:1229): login pid=7028 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162852801.092:1230): user pid=7028 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162852801.092:1231): user pid=7028 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162852801.104:1232): user pid=7028 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162852801.104:1233): user pid=7028 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162853401.170:1234): user pid=7088 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162853401.170:1235): login pid=7088 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162853401.170:1236): user pid=7088 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162853401.170:1237): user pid=7088 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162853401.186:1238): user pid=7088 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162853401.186:1239): user pid=7088 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162853418.483:1240): avc: denied { search } for pid=7092 comm="evolution" name="nscd" dev=dm-0 ino=14436932 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=system_u:object_r:nscd_var_run_t:s0 tclass=dir type=SYSCALL msg=audit(1162853418.483:1240): arch=40000003 syscall=102 success=no exit=-2 a0=3 a1=bfcd8318 a2=269ff4 a3=3 items=0 ppid=1 pid=7092 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC msg=audit(1162853418.487:1241): avc: denied { read } for pid=7092 comm="evolution" name=".gdmAHKGIT" dev=dm-0 ino=14469334 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162853418.487:1241): arch=40000003 syscall=33 success=yes exit=0 a0=bfcd9dff a1=4 a2=4db18a64 a3=bfcd9dff items=0 ppid=1 pid=7092 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC msg=audit(1162853418.487:1242): avc: denied { getattr } for pid=7092 comm="evolution" name=".gdmAHKGIT" dev=dm-0 ino=14469334 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162853418.487:1242): arch=40000003 syscall=197 success=yes exit=0 a0=4 a1=bfcd824c a2=269ff4 a3=98cb730 items=0 ppid=1 pid=7092 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC_PATH msg=audit(1162853418.487:1242): path="/tmp/.gdmAHKGIT" type=AVC msg=audit(1162853418.495:1243): avc: denied { read } for pid=7092 comm="evolution" name=".ICEauthority" dev=dm-0 ino=6570930 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=staff_u:object_r:staff_iceauth_home_t:s0 tclass=file type=SYSCALL msg=audit(1162853418.495:1243): arch=40000003 syscall=33 success=yes exit=0 a0=98e1218 a1=4 a2=4dc5d770 a3=98e1218 items=0 ppid=1 pid=7092 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC msg=audit(1162853418.495:1244): avc: denied { getattr } for pid=7092 comm="evolution" name=".ICEauthority" dev=dm-0 ino=6570930 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=staff_u:object_r:staff_iceauth_home_t:s0 tclass=file type=SYSCALL msg=audit(1162853418.495:1244): arch=40000003 syscall=197 success=yes exit=0 a0=b a1=bfcd83ec a2=269ff4 a3=98e1af8 items=0 ppid=1 pid=7092 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC_PATH msg=audit(1162853418.495:1244): path="/home/kmacmill/.ICEauthority" type=USER_AVC msg=audit(1162853418.735:1245): user pid=2350 uid=81 auid=4294967295 subj=system_u:system_r:system_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager member=state dest=org.freedesktop.NetworkManager spid=7092 tpid=2797 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=system_u:system_r:NetworkManager_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1162853418.735:1246): user pid=2350 uid=81 auid=4294967295 subj=system_u:system_r:system_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.51 spid=2797 tpid=7092 scontext=system_u:system_r:NetworkManager_t:s0 tcontext=staff_u:staff_r:staff_evolution_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=AVC msg=audit(1162853418.791:1247): avc: denied { create } for pid=7101 comm="evolution" scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=staff_u:staff_r:staff_evolution_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1162853418.791:1247): arch=40000003 syscall=102 success=yes exit=33 a0=1 a1=b16fe274 a2=269ff4 a3=a7ed7f items=0 ppid=1 pid=7101 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC msg=audit(1162853418.791:1248): avc: denied { bind } for pid=7101 comm="evolution" scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=staff_u:staff_r:staff_evolution_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1162853418.791:1248): arch=40000003 syscall=102 success=yes exit=0 a0=2 a1=b16fe274 a2=269ff4 a3=21 items=0 ppid=1 pid=7101 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC msg=audit(1162853418.791:1249): avc: denied { getattr } for pid=7101 comm="evolution" scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=staff_u:staff_r:staff_evolution_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1162853418.791:1249): arch=40000003 syscall=102 success=yes exit=0 a0=6 a1=b16fe274 a2=269ff4 a3=21 items=0 ppid=1 pid=7101 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC msg=audit(1162853418.791:1250): avc: denied { write } for pid=7101 comm="evolution" scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=staff_u:staff_r:staff_evolution_t:s0 tclass=netlink_route_socket type=AVC msg=audit(1162853418.791:1250): avc: denied { nlmsg_read } for pid=7101 comm="evolution" scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=staff_u:staff_r:staff_evolution_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1162853418.791:1250): arch=40000003 syscall=102 success=yes exit=20 a0=b a1=b16fd1b4 a2=269ff4 a3=0 items=0 ppid=1 pid=7101 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC msg=audit(1162853418.791:1251): avc: denied { read } for pid=7101 comm="evolution" scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=staff_u:staff_r:staff_evolution_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1162853418.791:1251): arch=40000003 syscall=102 success=yes exit=188 a0=11 a1=b16fd1b4 a2=269ff4 a3=0 items=0 ppid=1 pid=7101 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=USER_ACCT msg=audit(1162854001.247:1252): user pid=7134 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162854001.247:1253): login pid=7134 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162854001.247:1254): user pid=7134 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162854001.247:1255): user pid=7134 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162854001.251:1256): avc: denied { execute } for pid=7135 comm="sa1" name="sadc" dev=dm-0 ino=11981386 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=AVC msg=audit(1162854001.251:1256): avc: denied { execute_no_trans } for pid=7135 comm="sa1" name="sadc" dev=dm-0 ino=11981386 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=AVC msg=audit(1162854001.251:1256): avc: denied { read } for pid=7135 comm="sa1" name="sadc" dev=dm-0 ino=11981386 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162854001.251:1256): arch=40000003 syscall=11 success=yes exit=0 a0=87bfd48 a1=87bf740 a2=87bfd60 a3=87bf740 items=0 ppid=7134 pid=7135 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162854001.251:1256): path="/usr/lib/sa/sadc" type=AVC_PATH msg=audit(1162854001.251:1256): path="/usr/lib/sa/sadc" type=CRED_DISP msg=audit(1162854001.263:1257): user pid=7134 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162854001.263:1258): user pid=7134 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162854041.050:1259): avc: denied { execmem } for pid=7137 comm="gnome-screensav" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=process type=SYSCALL msg=audit(1162854041.050:1259): arch=40000003 syscall=192 success=yes exit=7720960 a0=75d000 a1=1a000 a2=7 a3=812 items=0 ppid=6775 pid=7137 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-screensav" exe="/usr/libexec/gnome-screensaver-gl-helper" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162854041.086:1260): avc: denied { execstack } for pid=7137 comm="gnome-screensav" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=process type=SYSCALL msg=audit(1162854041.086:1260): arch=40000003 syscall=125 success=yes exit=0 a0=bff9d000 a1=1000 a2=1000007 a3=fffff000 items=0 ppid=6775 pid=7137 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-screensav" exe="/usr/libexec/gnome-screensaver-gl-helper" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162854041.278:1261): avc: denied { execute } for pid=7137 comm="gnome-screensav" name="zero" dev=tmpfs ino=1524 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:zero_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1162854041.278:1261): arch=40000003 syscall=192 success=yes exit=10993664 a0=0 a1=2000 a2=7 a3=2 items=0 ppid=6775 pid=7137 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-screensav" exe="/usr/libexec/gnome-screensaver-gl-helper" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1162854041.278:1261): path="/dev/zero" type=AVC msg=audit(1162854041.282:1262): avc: denied { read } for pid=7137 comm="gnome-screensav" name=".gdmAHKGIT" dev=dm-0 ino=14469334 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162854041.282:1262): arch=40000003 syscall=33 success=yes exit=0 a0=bff9ee90 a1=4 a2=4db18a64 a3=bff9ee90 items=0 ppid=6775 pid=7137 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-screensav" exe="/usr/libexec/gnome-screensaver-gl-helper" subj=staff_u:staff_r:staff_t:s0 key=(null) type=USER_ACCT msg=audit(1162854061.267:1263): user pid=7139 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162854061.271:1264): login pid=7139 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162854061.271:1265): user pid=7139 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162854061.271:1266): user pid=7139 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162854061.275:1267): avc: denied { getattr } for pid=7140 comm="bash" name="run-parts" dev=dm-0 ino=10331890 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1162854061.275:1267): arch=40000003 syscall=195 success=yes exit=0 a0=9961120 a1=bfe19ed0 a2=bd9ff4 a3=9961120 items=0 ppid=7139 pid=7140 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="bash" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162854061.275:1267): path="/usr/bin/run-parts" type=AVC msg=audit(1162854061.275:1268): avc: denied { execute } for pid=7140 comm="bash" name="run-parts" dev=dm-0 ino=10331890 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1162854061.275:1268): arch=40000003 syscall=33 success=yes exit=0 a0=9961120 a1=1 a2=11 a3=9961120 items=0 ppid=7139 pid=7140 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="bash" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162854061.275:1269): avc: denied { read } for pid=7140 comm="bash" name="run-parts" dev=dm-0 ino=10331890 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1162854061.275:1269): arch=40000003 syscall=33 success=yes exit=0 a0=9961120 a1=4 a2=ffffffff a3=9961120 items=0 ppid=7139 pid=7140 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="bash" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162854061.275:1270): avc: denied { execute_no_trans } for pid=7140 comm="bash" name="run-parts" dev=dm-0 ino=10331890 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1162854061.275:1270): arch=40000003 syscall=11 success=yes exit=0 a0=9961120 a1=99613d8 a2=99612f8 a3=9960f98 items=0 ppid=7139 pid=7140 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="run-parts" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162854061.275:1270): path="/usr/bin/run-parts" type=AVC msg=audit(1162854061.275:1271): avc: denied { ioctl } for pid=7140 comm="run-parts" name="run-parts" dev=dm-0 ino=10331890 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1162854061.275:1271): arch=40000003 syscall=54 success=no exit=-25 a0=3 a1=5401 a2=bf837318 a3=bf837358 items=0 ppid=7139 pid=7140 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="run-parts" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162854061.275:1271): path="/usr/bin/run-parts" type=AVC msg=audit(1162854061.279:1272): avc: denied { execute } for pid=7140 comm="run-parts" name="inn-cron-nntpsend" dev=dm-0 ino=9331477 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1162854061.279:1272): arch=40000003 syscall=33 success=yes exit=0 a0=9e6d990 a1=1 a2=1 a3=9e6dc98 items=0 ppid=7139 pid=7140 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="run-parts" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162854061.279:1273): avc: denied { execute_no_trans } for pid=7141 comm="run-parts" name="inn-cron-nntpsend" dev=dm-0 ino=9331477 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1162854061.279:1273): arch=40000003 syscall=11 success=yes exit=0 a0=9e6da10 a1=9e6dad8 a2=9e6dae8 a3=9e6d758 items=0 ppid=7140 pid=7141 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="inn-cron-nntpse" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162854061.279:1273): path="/etc/cron.hourly/inn-cron-nntpsend" type=AVC msg=audit(1162854061.279:1274): avc: denied { read } for pid=7143 comm="chkconfig" name="innd" dev=dm-0 ino=9331492 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162854061.279:1274): arch=40000003 syscall=5 success=yes exit=3 a0=bff001c0 a1=0 a2=ffffffff a3=96b9038 items=0 ppid=7141 pid=7143 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="chkconfig" exe="/sbin/chkconfig" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162854061.279:1275): avc: denied { getattr } for pid=7143 comm="chkconfig" name="innd" dev=dm-0 ino=9331492 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162854061.279:1275): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bff00130 a2=a98ff4 a3=3 items=0 ppid=7141 pid=7143 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="chkconfig" exe="/sbin/chkconfig" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162854061.279:1275): path="/etc/rc.d/init.d/innd" type=CRED_DISP msg=audit(1162854061.291:1276): user pid=7139 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162854061.291:1277): user pid=7139 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162854601.345:1278): user pid=7165 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162854601.345:1279): login pid=7165 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162854601.345:1280): user pid=7165 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162854601.345:1281): user pid=7165 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162854601.361:1282): user pid=7165 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162854601.361:1283): user pid=7165 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162855201.426:1284): user pid=7183 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162855201.426:1285): login pid=7183 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162855201.426:1286): user pid=7183 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162855201.426:1287): user pid=7183 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162855201.438:1288): user pid=7183 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162855201.438:1289): user pid=7183 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162855801.500:1290): user pid=7201 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162855801.500:1291): login pid=7201 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162855801.504:1292): user pid=7201 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162855801.504:1293): user pid=7201 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162855801.516:1294): user pid=7201 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162855801.516:1295): user pid=7201 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162855927.312:1296): avc: denied { read } for pid=7208 comm="firefox-bin" name=".gdmAHKGIT" dev=dm-0 ino=14469334 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162855927.312:1296): arch=40000003 syscall=33 success=yes exit=0 a0=bfacdfcb a1=4 a2=4db18a64 a3=bfacdfcb items=0 ppid=1 pid=7208 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162855927.312:1297): avc: denied { getattr } for pid=7208 comm="firefox-bin" name=".gdmAHKGIT" dev=dm-0 ino=14469334 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162855927.312:1297): arch=40000003 syscall=197 success=yes exit=0 a0=4 a1=bfacc66c a2=9eaff4 a3=8156140 items=0 ppid=1 pid=7208 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162855927.312:1297): path="/tmp/.gdmAHKGIT" type=AVC msg=audit(1162855963.506:1298): avc: denied { getattr } for pid=7208 comm="firefox-bin" name="libflashplayer.so" dev=dm-0 ino=6547382 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=user_u:object_r:user_mozilla_home_t:s0 tclass=file type=SYSCALL msg=audit(1162855963.506:1298): arch=40000003 syscall=196 success=yes exit=0 a0=bfacb558 a1=bfacb4bc a2=9eaff4 a3=90c12c0 items=0 ppid=1 pid=7208 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162855963.506:1298): path="/home/kmacmill/.mozilla/plugins/libflashplayer.so" type=AVC msg=audit(1162855965.502:1299): avc: denied { read } for pid=7208 comm="firefox-bin" name="libflashplayer.so" dev=dm-0 ino=6547382 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=user_u:object_r:user_mozilla_home_t:s0 tclass=file type=SYSCALL msg=audit(1162855965.502:1299): arch=40000003 syscall=5 success=yes exit=56 a0=8c33338 a1=0 a2=8c33330 a3=8c33338 items=0 ppid=1 pid=7208 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162855965.506:1300): avc: denied { execute } for pid=7208 comm="firefox-bin" name="libflashplayer.so" dev=dm-0 ino=6547382 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=user_u:object_r:user_mozilla_home_t:s0 tclass=file type=SYSCALL msg=audit(1162855965.506:1300): arch=40000003 syscall=192 success=yes exit=24420352 a0=0 a1=738dbc a2=5 a3=802 items=0 ppid=1 pid=7208 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162855965.506:1300): path="/home/kmacmill/.mozilla/plugins/libflashplayer.so" type=AVC msg=audit(1162856262.425:1301): avc: denied { ioctl } for pid=7279 comm="ps" name="[102106]" dev=pipefs ino=102106 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_mozilla_t:s0 tclass=fifo_file type=SYSCALL msg=audit(1162856262.425:1301): arch=40000003 syscall=54 success=no exit=-22 a0=1 a1=5413 a2=bfb23d94 a3=bfb23dd8 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162856262.425:1301): path="pipe:[102106]" type=AVC msg=audit(1162856262.425:1302): avc: denied { getattr } for pid=7279 comm="ps" name="1" dev=proc ino=65538 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=dir type=SYSCALL msg=audit(1162856262.425:1302): arch=40000003 syscall=195 success=yes exit=0 a0=868d97c a1=bfb23cf0 a2=648ff4 a3=3 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162856262.425:1302): path="/proc/1" type=AVC msg=audit(1162856262.425:1303): avc: denied { search } for pid=7279 comm="ps" name="1" dev=proc ino=65538 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=dir type=AVC msg=audit(1162856262.425:1303): avc: denied { read } for pid=7279 comm="ps" name="stat" dev=proc ino=65549 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=file type=SYSCALL msg=audit(1162856262.425:1303): arch=40000003 syscall=5 success=yes exit=18 a0=4cfe4780 a1=0 a2=0 a3=4cfe4780 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162856262.425:1304): avc: denied { getattr } for pid=7279 comm="ps" name="2" dev=proc ino=131074 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir type=SYSCALL msg=audit(1162856262.425:1304): arch=40000003 syscall=195 success=yes exit=0 a0=868d97c a1=bfb23cf0 a2=648ff4 a3=3 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162856262.425:1304): path="/proc/2" type=AVC msg=audit(1162856262.425:1305): avc: denied { search } for pid=7279 comm="ps" name="2" dev=proc ino=131074 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir type=AVC msg=audit(1162856262.425:1305): avc: denied { read } for pid=7279 comm="ps" name="stat" dev=proc ino=131085 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=file type=SYSCALL msg=audit(1162856262.425:1305): arch=40000003 syscall=5 success=yes exit=18 a0=4cfe4780 a1=0 a2=0 a3=4cfe4780 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162856262.429:1306): avc: denied { getattr } for pid=7279 comm="ps" name="455" dev=proc ino=29818882 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:udev_t:s0-s0:c0.c1023 tclass=dir type=SYSCALL msg=audit(1162856262.429:1306): arch=40000003 syscall=195 success=yes exit=0 a0=868d97c a1=bfb23cf0 a2=648ff4 a3=3 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162856262.429:1306): path="/proc/455" type=AVC msg=audit(1162856262.429:1307): avc: denied { search } for pid=7279 comm="ps" name="455" dev=proc ino=29818882 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:udev_t:s0-s0:c0.c1023 tclass=dir type=AVC msg=audit(1162856262.429:1307): avc: denied { read } for pid=7279 comm="ps" name="stat" dev=proc ino=29818893 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:udev_t:s0-s0:c0.c1023 tclass=file type=SYSCALL msg=audit(1162856262.429:1307): arch=40000003 syscall=5 success=yes exit=18 a0=4cfe4780 a1=0 a2=0 a3=4cfe4780 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162856262.429:1308): avc: denied { getattr } for pid=7279 comm="ps" name="2180" dev=proc ino=142868482 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:restorecond_t:s0 tclass=dir type=SYSCALL msg=audit(1162856262.429:1308): arch=40000003 syscall=195 success=yes exit=0 a0=868d97c a1=bfb23cf0 a2=648ff4 a3=3 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162856262.429:1308): path="/proc/2180" type=AVC msg=audit(1162856262.429:1309): avc: denied { search } for pid=7279 comm="ps" name="2180" dev=proc ino=142868482 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:restorecond_t:s0 tclass=dir type=AVC msg=audit(1162856262.429:1309): avc: denied { read } for pid=7279 comm="ps" name="stat" dev=proc ino=142868493 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:restorecond_t:s0 tclass=file type=SYSCALL msg=audit(1162856262.429:1309): arch=40000003 syscall=5 success=yes exit=18 a0=4cfe4780 a1=0 a2=0 a3=4cfe4780 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162856262.429:1310): avc: denied { getattr } for pid=7279 comm="ps" name="2192" dev=proc ino=143654914 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:auditd_t:s0 tclass=dir type=SYSCALL msg=audit(1162856262.429:1310): arch=40000003 syscall=195 success=yes exit=0 a0=868d97c a1=bfb23cf0 a2=648ff4 a3=3 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162856262.429:1310): path="/proc/2192" type=AVC msg=audit(1162856262.429:1311): avc: denied { search } for pid=7279 comm="ps" name="2192" dev=proc ino=143654914 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:auditd_t:s0 tclass=dir type=AVC msg=audit(1162856262.429:1311): avc: denied { read } for pid=7279 comm="ps" name="stat" dev=proc ino=143654925 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:auditd_t:s0 tclass=file type=SYSCALL msg=audit(1162856262.429:1311): arch=40000003 syscall=5 success=yes exit=18 a0=4cfe4780 a1=0 a2=0 a3=4cfe4780 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162856262.429:1312): avc: denied { getattr } for pid=7279 comm="ps" name="2208" dev=proc ino=144703490 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:syslogd_t:s0 tclass=dir type=SYSCALL msg=audit(1162856262.429:1312): arch=40000003 syscall=195 success=yes exit=0 a0=868d97c a1=bfb23cf0 a2=648ff4 a3=3 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162856262.429:1312): path="/proc/2208" type=AVC msg=audit(1162856262.429:1313): avc: denied { search } for pid=7279 comm="ps" name="2208" dev=proc ino=144703490 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:syslogd_t:s0 tclass=dir type=AVC msg=audit(1162856262.429:1313): avc: denied { read } for pid=7279 comm="ps" name="stat" dev=proc ino=144703501 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:syslogd_t:s0 tclass=file type=SYSCALL msg=audit(1162856262.429:1313): arch=40000003 syscall=5 success=yes exit=18 a0=4cfe4780 a1=0 a2=0 a3=4cfe4780 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162856262.429:1314): avc: denied { getattr } for pid=7279 comm="ps" name="2211" dev=proc ino=144900098 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:klogd_t:s0 tclass=dir type=SYSCALL msg=audit(1162856262.429:1314): arch=40000003 syscall=195 success=yes exit=0 a0=868d97c a1=bfb23cf0 a2=648ff4 a3=3 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162856262.429:1314): path="/proc/2211" type=AVC msg=audit(1162856262.429:1315): avc: denied { search } for pid=7279 comm="ps" name="2211" dev=proc ino=144900098 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:klogd_t:s0 tclass=dir type=AVC msg=audit(1162856262.429:1315): avc: denied { read } for pid=7279 comm="ps" name="stat" dev=proc ino=144900109 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:klogd_t:s0 tclass=file type=SYSCALL msg=audit(1162856262.429:1315): arch=40000003 syscall=5 success=yes exit=18 a0=4cfe4780 a1=0 a2=0 a3=4cfe4780 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162856262.429:1316): avc: denied { getattr } for pid=7279 comm="ps" name="2223" dev=proc ino=145686530 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:irqbalance_t:s0 tclass=dir type=SYSCALL msg=audit(1162856262.429:1316): arch=40000003 syscall=195 success=yes exit=0 a0=868d97c a1=bfb23cf0 a2=648ff4 a3=3 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162856262.429:1316): path="/proc/2223" type=AVC msg=audit(1162856262.429:1317): avc: denied { search } for pid=7279 comm="ps" name="2223" dev=proc ino=145686530 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:irqbalance_t:s0 tclass=dir type=AVC msg=audit(1162856262.429:1317): avc: denied { read } for pid=7279 comm="ps" name="stat" dev=proc ino=145686541 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:irqbalance_t:s0 tclass=file type=SYSCALL msg=audit(1162856262.429:1317): arch=40000003 syscall=5 success=yes exit=18 a0=4cfe4780 a1=0 a2=0 a3=4cfe4780 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162856262.433:1318): avc: denied { getattr } for pid=7279 comm="ps" name="2239" dev=proc ino=146735106 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:setrans_t:s0-s0:c0.c1023 tclass=dir type=SYSCALL msg=audit(1162856262.433:1318): arch=40000003 syscall=195 success=yes exit=0 a0=868d97c a1=bfb23cf0 a2=648ff4 a3=3 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162856262.433:1318): path="/proc/2239" type=AVC msg=audit(1162856262.433:1319): avc: denied { search } for pid=7279 comm="ps" name="2239" dev=proc ino=146735106 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:setrans_t:s0-s0:c0.c1023 tclass=dir type=AVC msg=audit(1162856262.433:1319): avc: denied { read } for pid=7279 comm="ps" name="stat" dev=proc ino=146735117 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:setrans_t:s0-s0:c0.c1023 tclass=file type=SYSCALL msg=audit(1162856262.433:1319): arch=40000003 syscall=5 success=yes exit=18 a0=4cfe4780 a1=0 a2=0 a3=4cfe4780 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162856262.433:1320): avc: denied { getattr } for pid=7279 comm="ps" name="2252" dev=proc ino=147587074 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:portmap_t:s0 tclass=dir type=SYSCALL msg=audit(1162856262.433:1320): arch=40000003 syscall=195 success=yes exit=0 a0=868d97c a1=bfb23cf0 a2=648ff4 a3=3 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162856262.433:1320): path="/proc/2252" type=AVC msg=audit(1162856262.433:1321): avc: denied { search } for pid=7279 comm="ps" name="2252" dev=proc ino=147587074 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:portmap_t:s0 tclass=dir type=AVC msg=audit(1162856262.433:1321): avc: denied { read } for pid=7279 comm="ps" name="stat" dev=proc ino=147587085 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:portmap_t:s0 tclass=file type=SYSCALL msg=audit(1162856262.433:1321): arch=40000003 syscall=5 success=yes exit=18 a0=4cfe4780 a1=0 a2=0 a3=4cfe4780 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162856262.433:1322): avc: denied { getattr } for pid=7279 comm="ps" name="2286" dev=proc ino=149815298 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:rpcd_t:s0 tclass=dir type=SYSCALL msg=audit(1162856262.433:1322): arch=40000003 syscall=195 success=yes exit=0 a0=868d97c a1=bfb23cf0 a2=648ff4 a3=3 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162856262.433:1322): path="/proc/2286" type=AVC msg=audit(1162856262.433:1323): avc: denied { search } for pid=7279 comm="ps" name="2286" dev=proc ino=149815298 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:rpcd_t:s0 tclass=dir type=AVC msg=audit(1162856262.433:1323): avc: denied { read } for pid=7279 comm="ps" name="stat" dev=proc ino=149815309 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:rpcd_t:s0 tclass=file type=SYSCALL msg=audit(1162856262.433:1323): arch=40000003 syscall=5 success=yes exit=18 a0=4cfe4780 a1=0 a2=0 a3=4cfe4780 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162856262.433:1324): avc: denied { getattr } for pid=7279 comm="ps" name="2350" dev=proc ino=154009602 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:system_dbusd_t:s0 tclass=dir type=SYSCALL msg=audit(1162856262.433:1324): arch=40000003 syscall=195 success=yes exit=0 a0=868d97c a1=bfb23cf0 a2=648ff4 a3=3 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162856262.433:1324): path="/proc/2350" type=AVC msg=audit(1162856262.433:1325): avc: denied { search } for pid=7279 comm="ps" name="2350" dev=proc ino=154009602 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:system_dbusd_t:s0 tclass=dir type=AVC msg=audit(1162856262.433:1325): avc: denied { read } for pid=7279 comm="ps" name="stat" dev=proc ino=154009613 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:system_dbusd_t:s0 tclass=file type=SYSCALL msg=audit(1162856262.433:1325): arch=40000003 syscall=5 success=yes exit=18 a0=4cfe4780 a1=0 a2=0 a3=4cfe4780 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162856262.433:1326): avc: denied { getattr } for pid=7279 comm="ps" name="2362" dev=proc ino=154796034 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:bluetooth_t:s0 tclass=dir type=SYSCALL msg=audit(1162856262.433:1326): arch=40000003 syscall=195 success=yes exit=0 a0=868d97c a1=bfb23cf0 a2=648ff4 a3=3 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162856262.433:1326): path="/proc/2362" type=AVC msg=audit(1162856262.433:1327): avc: denied { search } for pid=7279 comm="ps" name="2362" dev=proc ino=154796034 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:bluetooth_t:s0 tclass=dir type=AVC msg=audit(1162856262.433:1327): avc: denied { read } for pid=7279 comm="ps" name="stat" dev=proc ino=154796045 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:bluetooth_t:s0 tclass=file type=SYSCALL msg=audit(1162856262.433:1327): arch=40000003 syscall=5 success=yes exit=18 a0=4cfe4780 a1=0 a2=0 a3=4cfe4780 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162856262.433:1328): avc: denied { read } for pid=7279 comm="ps" name="stat" dev=proc ino=156827661 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=file type=SYSCALL msg=audit(1162856262.433:1328): arch=40000003 syscall=5 success=yes exit=18 a0=4cfe4780 a1=0 a2=0 a3=4cfe4780 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162856262.433:1329): avc: denied { getattr } for pid=7279 comm="ps" name="2452" dev=proc ino=160694274 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:automount_t:s0 tclass=dir type=SYSCALL msg=audit(1162856262.433:1329): arch=40000003 syscall=195 success=yes exit=0 a0=868d97c a1=bfb23cf0 a2=648ff4 a3=3 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162856262.433:1329): path="/proc/2452" type=AVC msg=audit(1162856262.433:1330): avc: denied { search } for pid=7279 comm="ps" name="2452" dev=proc ino=160694274 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:automount_t:s0 tclass=dir type=AVC msg=audit(1162856262.433:1330): avc: denied { read } for pid=7279 comm="ps" name="stat" dev=proc ino=160694285 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:automount_t:s0 tclass=file type=SYSCALL msg=audit(1162856262.433:1330): arch=40000003 syscall=5 success=yes exit=18 a0=4cfe4780 a1=0 a2=0 a3=4cfe4780 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162856262.433:1331): avc: denied { getattr } for pid=7279 comm="ps" name="2471" dev=proc ino=161939458 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:apmd_t:s0 tclass=dir type=SYSCALL msg=audit(1162856262.433:1331): arch=40000003 syscall=195 success=yes exit=0 a0=868d97c a1=bfb23cf0 a2=648ff4 a3=3 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162856262.433:1331): path="/proc/2471" type=AVC msg=audit(1162856262.433:1332): avc: denied { search } for pid=7279 comm="ps" name="2471" dev=proc ino=161939458 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:apmd_t:s0 tclass=dir type=AVC msg=audit(1162856262.433:1332): avc: denied { read } for pid=7279 comm="ps" name="stat" dev=proc ino=161939469 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:apmd_t:s0 tclass=file type=SYSCALL msg=audit(1162856262.433:1332): arch=40000003 syscall=5 success=yes exit=18 a0=4cfe4780 a1=0 a2=0 a3=4cfe4780 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162856262.433:1333): avc: denied { getattr } for pid=7279 comm="ps" name="2482" dev=proc ino=162660354 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:hplip_t:s0 tclass=dir type=SYSCALL msg=audit(1162856262.433:1333): arch=40000003 syscall=195 success=yes exit=0 a0=868d97c a1=bfb23cf0 a2=648ff4 a3=3 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162856262.433:1333): path="/proc/2482" type=AVC msg=audit(1162856262.433:1334): avc: denied { search } for pid=7279 comm="ps" name="2482" dev=proc ino=162660354 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:hplip_t:s0 tclass=dir type=AVC msg=audit(1162856262.433:1334): avc: denied { read } for pid=7279 comm="ps" name="stat" dev=proc ino=162660365 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:hplip_t:s0 tclass=file type=SYSCALL msg=audit(1162856262.433:1334): arch=40000003 syscall=5 success=yes exit=18 a0=4cfe4780 a1=0 a2=0 a3=4cfe4780 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162856262.433:1335): avc: denied { getattr } for pid=7279 comm="ps" name="2499" dev=proc ino=163774466 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:cupsd_t:s0-s0:c0.c1023 tclass=dir type=SYSCALL msg=audit(1162856262.433:1335): arch=40000003 syscall=195 success=yes exit=0 a0=868d97c a1=bfb23cf0 a2=648ff4 a3=3 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162856262.433:1335): path="/proc/2499" type=AVC msg=audit(1162856262.433:1336): avc: denied { search } for pid=7279 comm="ps" name="2499" dev=proc ino=163774466 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:cupsd_t:s0-s0:c0.c1023 tclass=dir type=AVC msg=audit(1162856262.433:1336): avc: denied { read } for pid=7279 comm="ps" name="stat" dev=proc ino=163774477 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:cupsd_t:s0-s0:c0.c1023 tclass=file type=SYSCALL msg=audit(1162856262.433:1336): arch=40000003 syscall=5 success=yes exit=18 a0=4cfe4780 a1=0 a2=0 a3=4cfe4780 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162856262.433:1337): avc: denied { getattr } for pid=7279 comm="ps" name="2513" dev=proc ino=164691970 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tclass=dir type=SYSCALL msg=audit(1162856262.433:1337): arch=40000003 syscall=195 success=yes exit=0 a0=868d97c a1=bfb23cf0 a2=648ff4 a3=3 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162856262.433:1337): path="/proc/2513" type=AVC msg=audit(1162856262.433:1338): avc: denied { search } for pid=7279 comm="ps" name="2513" dev=proc ino=164691970 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tclass=dir type=AVC msg=audit(1162856262.433:1338): avc: denied { read } for pid=7279 comm="ps" name="stat" dev=proc ino=164691981 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tclass=file type=SYSCALL msg=audit(1162856262.433:1338): arch=40000003 syscall=5 success=yes exit=18 a0=4cfe4780 a1=0 a2=0 a3=4cfe4780 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162856262.433:1339): avc: denied { getattr } for pid=7279 comm="ps" name="2525" dev=proc ino=165478402 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:inetd_t:s0 tclass=dir type=SYSCALL msg=audit(1162856262.433:1339): arch=40000003 syscall=195 success=yes exit=0 a0=868d97c a1=bfb23cf0 a2=648ff4 a3=3 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162856262.433:1339): path="/proc/2525" type=AVC msg=audit(1162856262.433:1340): avc: denied { search } for pid=7279 comm="ps" name="2525" dev=proc ino=165478402 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:inetd_t:s0 tclass=dir type=AVC msg=audit(1162856262.433:1340): avc: denied { read } for pid=7279 comm="ps" name="stat" dev=proc ino=165478413 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:inetd_t:s0 tclass=file type=SYSCALL msg=audit(1162856262.433:1340): arch=40000003 syscall=5 success=yes exit=18 a0=4cfe4780 a1=0 a2=0 a3=4cfe4780 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162856262.433:1341): avc: denied { getattr } for pid=7279 comm="ps" name="2545" dev=proc ino=166789122 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:sendmail_t:s0 tclass=dir type=SYSCALL msg=audit(1162856262.433:1341): arch=40000003 syscall=195 success=yes exit=0 a0=868d97c a1=bfb23cf0 a2=648ff4 a3=3 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162856262.433:1341): path="/proc/2545" type=AVC msg=audit(1162856262.433:1342): avc: denied { search } for pid=7279 comm="ps" name="2545" dev=proc ino=166789122 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:sendmail_t:s0 tclass=dir type=AVC msg=audit(1162856262.433:1342): avc: denied { read } for pid=7279 comm="ps" name="stat" dev=proc ino=166789133 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:sendmail_t:s0 tclass=file type=SYSCALL msg=audit(1162856262.433:1342): arch=40000003 syscall=5 success=yes exit=18 a0=4cfe4780 a1=0 a2=0 a3=4cfe4780 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162856262.437:1343): avc: denied { getattr } for pid=7279 comm="ps" name="2566" dev=proc ino=168165378 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:gpm_t:s0 tclass=dir type=SYSCALL msg=audit(1162856262.437:1343): arch=40000003 syscall=195 success=yes exit=0 a0=868d97c a1=bfb23cf0 a2=648ff4 a3=3 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162856262.437:1343): path="/proc/2566" type=AVC msg=audit(1162856262.437:1344): avc: denied { search } for pid=7279 comm="ps" name="2566" dev=proc ino=168165378 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:gpm_t:s0 tclass=dir type=AVC msg=audit(1162856262.437:1344): avc: denied { read } for pid=7279 comm="ps" name="stat" dev=proc ino=168165389 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:gpm_t:s0 tclass=file type=SYSCALL msg=audit(1162856262.437:1344): arch=40000003 syscall=5 success=yes exit=18 a0=4cfe4780 a1=0 a2=0 a3=4cfe4780 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162856262.437:1345): avc: denied { getattr } for pid=7279 comm="ps" name="2577" dev=proc ino=168886274 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tclass=dir type=SYSCALL msg=audit(1162856262.437:1345): arch=40000003 syscall=195 success=yes exit=0 a0=868d97c a1=bfb23cf0 a2=648ff4 a3=3 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162856262.437:1345): path="/proc/2577" type=AVC msg=audit(1162856262.437:1346): avc: denied { search } for pid=7279 comm="ps" name="2577" dev=proc ino=168886274 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tclass=dir type=AVC msg=audit(1162856262.437:1346): avc: denied { read } for pid=7279 comm="ps" name="stat" dev=proc ino=168886285 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tclass=file type=SYSCALL msg=audit(1162856262.437:1346): arch=40000003 syscall=5 success=yes exit=18 a0=4cfe4780 a1=0 a2=0 a3=4cfe4780 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162856262.437:1347): avc: denied { getattr } for pid=7279 comm="ps" name="2614" dev=proc ino=171311106 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:xfs_t:s0 tclass=dir type=SYSCALL msg=audit(1162856262.437:1347): arch=40000003 syscall=195 success=yes exit=0 a0=868d97c a1=bfb23cf0 a2=648ff4 a3=3 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162856262.437:1347): path="/proc/2614" type=AVC msg=audit(1162856262.437:1348): avc: denied { search } for pid=7279 comm="ps" name="2614" dev=proc ino=171311106 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:xfs_t:s0 tclass=dir type=AVC msg=audit(1162856262.437:1348): avc: denied { read } for pid=7279 comm="ps" name="stat" dev=proc ino=171311117 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:xfs_t:s0 tclass=file type=SYSCALL msg=audit(1162856262.437:1348): arch=40000003 syscall=5 success=yes exit=18 a0=4cfe4780 a1=0 a2=0 a3=4cfe4780 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162856262.437:1349): avc: denied { getattr } for pid=7279 comm="ps" name="2707" dev=proc ino=177405954 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:avahi_t:s0 tclass=dir type=SYSCALL msg=audit(1162856262.437:1349): arch=40000003 syscall=195 success=yes exit=0 a0=868d97c a1=bfb23cf0 a2=648ff4 a3=3 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162856262.437:1349): path="/proc/2707" type=AVC msg=audit(1162856262.437:1350): avc: denied { search } for pid=7279 comm="ps" name="2707" dev=proc ino=177405954 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:avahi_t:s0 tclass=dir type=AVC msg=audit(1162856262.437:1350): avc: denied { read } for pid=7279 comm="ps" name="stat" dev=proc ino=177405965 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:avahi_t:s0 tclass=file type=SYSCALL msg=audit(1162856262.437:1350): arch=40000003 syscall=5 success=yes exit=18 a0=4cfe4780 a1=0 a2=0 a3=4cfe4780 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162856262.437:1351): avc: denied { getattr } for pid=7279 comm="ps" name="2719" dev=proc ino=178192386 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:dhcpc_t:s0 tclass=dir type=SYSCALL msg=audit(1162856262.437:1351): arch=40000003 syscall=195 success=yes exit=0 a0=868d97c a1=bfb23cf0 a2=648ff4 a3=3 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162856262.437:1351): path="/proc/2719" type=AVC msg=audit(1162856262.437:1352): avc: denied { search } for pid=7279 comm="ps" name="2719" dev=proc ino=178192386 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:dhcpc_t:s0 tclass=dir type=AVC msg=audit(1162856262.437:1352): avc: denied { read } for pid=7279 comm="ps" name="stat" dev=proc ino=178192397 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:dhcpc_t:s0 tclass=file type=SYSCALL msg=audit(1162856262.437:1352): arch=40000003 syscall=5 success=yes exit=18 a0=4cfe4780 a1=0 a2=0 a3=4cfe4780 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162856262.437:1353): avc: denied { getattr } for pid=7279 comm="ps" name="2730" dev=proc ino=178913282 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:hald_t:s0 tclass=dir type=SYSCALL msg=audit(1162856262.437:1353): arch=40000003 syscall=195 success=yes exit=0 a0=868d97c a1=bfb23cf0 a2=648ff4 a3=3 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162856262.437:1353): path="/proc/2730" type=AVC msg=audit(1162856262.437:1354): avc: denied { search } for pid=7279 comm="ps" name="2730" dev=proc ino=178913282 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:hald_t:s0 tclass=dir type=AVC msg=audit(1162856262.437:1354): avc: denied { read } for pid=7279 comm="ps" name="stat" dev=proc ino=178913293 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:hald_t:s0 tclass=file type=SYSCALL msg=audit(1162856262.437:1354): arch=40000003 syscall=5 success=yes exit=18 a0=4cfe4780 a1=0 a2=0 a3=4cfe4780 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162856262.437:1355): avc: denied { getattr } for pid=7279 comm="ps" name="2797" dev=proc ino=183304194 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:NetworkManager_t:s0 tclass=dir type=SYSCALL msg=audit(1162856262.437:1355): arch=40000003 syscall=195 success=yes exit=0 a0=868d97c a1=bfb23cf0 a2=648ff4 a3=3 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162856262.437:1355): path="/proc/2797" type=AVC msg=audit(1162856262.437:1356): avc: denied { search } for pid=7279 comm="ps" name="2797" dev=proc ino=183304194 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:NetworkManager_t:s0 tclass=dir type=AVC msg=audit(1162856262.437:1356): avc: denied { read } for pid=7279 comm="ps" name="stat" dev=proc ino=183304205 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:NetworkManager_t:s0 tclass=file type=SYSCALL msg=audit(1162856262.437:1356): arch=40000003 syscall=5 success=yes exit=18 a0=4cfe4780 a1=0 a2=0 a3=4cfe4780 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162856262.437:1357): avc: denied { getattr } for pid=7279 comm="ps" name="2824" dev=proc ino=185073666 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:fsdaemon_t:s0 tclass=dir type=SYSCALL msg=audit(1162856262.437:1357): arch=40000003 syscall=195 success=yes exit=0 a0=868d97c a1=bfb23cf0 a2=648ff4 a3=3 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162856262.437:1357): path="/proc/2824" type=AVC msg=audit(1162856262.437:1358): avc: denied { search } for pid=7279 comm="ps" name="2824" dev=proc ino=185073666 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:fsdaemon_t:s0 tclass=dir type=AVC msg=audit(1162856262.437:1358): avc: denied { read } for pid=7279 comm="ps" name="stat" dev=proc ino=185073677 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:fsdaemon_t:s0 tclass=file type=SYSCALL msg=audit(1162856262.437:1358): arch=40000003 syscall=5 success=yes exit=18 a0=4cfe4780 a1=0 a2=0 a3=4cfe4780 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162856262.437:1359): avc: denied { getattr } for pid=7279 comm="ps" name="2835" dev=proc ino=185794562 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:getty_t:s0 tclass=dir type=SYSCALL msg=audit(1162856262.437:1359): arch=40000003 syscall=195 success=yes exit=0 a0=868d97c a1=bfb23cf0 a2=648ff4 a3=3 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162856262.437:1359): path="/proc/2835" type=AVC msg=audit(1162856262.441:1360): avc: denied { search } for pid=7279 comm="ps" name="2835" dev=proc ino=185794562 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:getty_t:s0 tclass=dir type=AVC msg=audit(1162856262.441:1360): avc: denied { read } for pid=7279 comm="ps" name="stat" dev=proc ino=185794573 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:getty_t:s0 tclass=file type=SYSCALL msg=audit(1162856262.441:1360): arch=40000003 syscall=5 success=yes exit=18 a0=4cfe4780 a1=0 a2=0 a3=4cfe4780 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162856262.441:1361): avc: denied { getattr } for pid=7279 comm="ps" name="3060" dev=proc ino=200540162 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=user_u:user_r:user_t:s0 tclass=dir type=SYSCALL msg=audit(1162856262.441:1361): arch=40000003 syscall=195 success=yes exit=0 a0=868d97c a1=bfb23cf0 a2=648ff4 a3=3 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162856262.441:1361): path="/proc/3060" type=AVC msg=audit(1162856262.441:1362): avc: denied { search } for pid=7279 comm="ps" name="3060" dev=proc ino=200540162 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=user_u:user_r:user_t:s0 tclass=dir type=AVC msg=audit(1162856262.441:1362): avc: denied { read } for pid=7279 comm="ps" name="stat" dev=proc ino=200540173 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=user_u:user_r:user_t:s0 tclass=file type=SYSCALL msg=audit(1162856262.441:1362): arch=40000003 syscall=5 success=yes exit=18 a0=4cfe4780 a1=0 a2=0 a3=4cfe4780 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162856262.441:1363): avc: denied { getattr } for pid=7279 comm="ps" name="3895" dev=proc ino=255262722 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_dbusd_t:s0 tclass=dir type=SYSCALL msg=audit(1162856262.441:1363): arch=40000003 syscall=195 success=yes exit=0 a0=868d97c a1=bfb23cf0 a2=648ff4 a3=3 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162856262.441:1363): path="/proc/3895" type=AVC msg=audit(1162856262.441:1364): avc: denied { search } for pid=7279 comm="ps" name="3895" dev=proc ino=255262722 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_dbusd_t:s0 tclass=dir type=AVC msg=audit(1162856262.441:1364): avc: denied { read } for pid=7279 comm="ps" name="stat" dev=proc ino=255262733 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_dbusd_t:s0 tclass=file type=SYSCALL msg=audit(1162856262.441:1364): arch=40000003 syscall=5 success=yes exit=18 a0=4cfe4780 a1=0 a2=0 a3=4cfe4780 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162856262.441:1365): avc: denied { getattr } for pid=7279 comm="ps" name="4653" dev=proc ino=304939010 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tclass=dir type=SYSCALL msg=audit(1162856262.441:1365): arch=40000003 syscall=195 success=yes exit=0 a0=868d97c a1=bfb23cf0 a2=648ff4 a3=3 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162856262.441:1365): path="/proc/4653" type=AVC msg=audit(1162856262.441:1366): avc: denied { search } for pid=7279 comm="ps" name="4653" dev=proc ino=304939010 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tclass=dir type=AVC msg=audit(1162856262.441:1366): avc: denied { read } for pid=7279 comm="ps" name="stat" dev=proc ino=304939021 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tclass=file type=SYSCALL msg=audit(1162856262.441:1366): arch=40000003 syscall=5 success=yes exit=18 a0=4cfe4780 a1=0 a2=0 a3=4cfe4780 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162856262.441:1367): avc: denied { getattr } for pid=7279 comm="ps" name="6279" dev=proc ino=411500546 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dir type=SYSCALL msg=audit(1162856262.441:1367): arch=40000003 syscall=195 success=yes exit=0 a0=868d97c a1=bfb23cf0 a2=648ff4 a3=3 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162856262.441:1367): path="/proc/6279" type=AVC msg=audit(1162856262.441:1368): avc: denied { search } for pid=7279 comm="ps" name="6279" dev=proc ino=411500546 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dir type=AVC msg=audit(1162856262.441:1368): avc: denied { read } for pid=7279 comm="ps" name="stat" dev=proc ino=411500557 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=file type=SYSCALL msg=audit(1162856262.441:1368): arch=40000003 syscall=5 success=yes exit=18 a0=4cfe4780 a1=0 a2=0 a3=4cfe4780 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162856262.441:1369): avc: denied { getattr } for pid=7279 comm="ps" name="6501" dev=proc ino=426049538 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:xdm_xserver_t:s0-s0:c0.c1023 tclass=dir type=SYSCALL msg=audit(1162856262.441:1369): arch=40000003 syscall=195 success=yes exit=0 a0=868d97c a1=bfb23cf0 a2=648ff4 a3=3 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162856262.441:1369): path="/proc/6501" type=AVC msg=audit(1162856262.441:1370): avc: denied { search } for pid=7279 comm="ps" name="6501" dev=proc ino=426049538 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:xdm_xserver_t:s0-s0:c0.c1023 tclass=dir type=AVC msg=audit(1162856262.441:1370): avc: denied { read } for pid=7279 comm="ps" name="stat" dev=proc ino=426049549 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:xdm_xserver_t:s0-s0:c0.c1023 tclass=file type=SYSCALL msg=audit(1162856262.441:1370): arch=40000003 syscall=5 success=yes exit=18 a0=4cfe4780 a1=0 a2=0 a3=4cfe4780 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162856262.445:1371): avc: denied { getattr } for pid=7279 comm="ps" name="6583" dev=proc ino=431423490 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_ssh_agent_t:s0 tclass=dir type=SYSCALL msg=audit(1162856262.445:1371): arch=40000003 syscall=195 success=yes exit=0 a0=868d97c a1=bfb23cf0 a2=648ff4 a3=3 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162856262.445:1371): path="/proc/6583" type=AVC msg=audit(1162856262.445:1372): avc: denied { search } for pid=7279 comm="ps" name="6583" dev=proc ino=431423490 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_ssh_agent_t:s0 tclass=dir type=AVC msg=audit(1162856262.445:1372): avc: denied { read } for pid=7279 comm="ps" name="stat" dev=proc ino=431423501 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_ssh_agent_t:s0 tclass=file type=SYSCALL msg=audit(1162856262.445:1372): arch=40000003 syscall=5 success=yes exit=18 a0=4cfe4780 a1=0 a2=0 a3=4cfe4780 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162856262.449:1373): avc: denied { getattr } for pid=7279 comm="ps" name="6686" dev=proc ino=438173698 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:pam_t:s0 tclass=dir type=SYSCALL msg=audit(1162856262.449:1373): arch=40000003 syscall=195 success=yes exit=0 a0=868d97c a1=bfb23cf0 a2=648ff4 a3=3 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162856262.449:1373): path="/proc/6686" type=AVC msg=audit(1162856262.449:1374): avc: denied { search } for pid=7279 comm="ps" name="6686" dev=proc ino=438173698 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:pam_t:s0 tclass=dir type=AVC msg=audit(1162856262.449:1374): avc: denied { read } for pid=7279 comm="ps" name="stat" dev=proc ino=438173709 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:pam_t:s0 tclass=file type=SYSCALL msg=audit(1162856262.449:1374): arch=40000003 syscall=5 success=yes exit=18 a0=4cfe4780 a1=0 a2=0 a3=4cfe4780 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162856262.449:1375): avc: denied { getattr } for pid=7279 comm="ps" name="/" dev=devpts ino=1 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:devpts_t:s0 tclass=dir type=SYSCALL msg=audit(1162856262.449:1375): arch=40000003 syscall=195 success=yes exit=0 a0=4cfe2840 a1=bfb21500 a2=648ff4 a3=3 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162856262.449:1375): path="/dev/pts" type=AVC msg=audit(1162856262.449:1376): avc: denied { read } for pid=7279 comm="ps" name="2" dev=proc ino=439058434 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=lnk_file type=AVC msg=audit(1162856262.449:1376): avc: denied { ptrace } for pid=7279 comm="ps" scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=process type=SYSCALL msg=audit(1162856262.449:1376): arch=40000003 syscall=85 success=yes exit=10 a0=bfb21538 a1=4cfe2840 a2=7f a3=bfb21538 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162856262.449:1377): avc: denied { search } for pid=7279 comm="ps" name="/" dev=devpts ino=1 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:devpts_t:s0 tclass=dir type=AVC msg=audit(1162856262.449:1377): avc: denied { getattr } for pid=7279 comm="ps" name="1" dev=devpts ino=3 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:sysadm_devpts_t:s0 tclass=chr_file type=SYSCALL msg=audit(1162856262.449:1377): arch=40000003 syscall=195 success=yes exit=0 a0=4cfe2840 a1=bfb21440 a2=648ff4 a3=3 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162856262.449:1377): path="/dev/pts/1" type=AVC msg=audit(1162856262.449:1378): avc: denied { getattr } for pid=7279 comm="ps" name="6720" dev=proc ino=440401922 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_su_t:s0 tclass=dir type=SYSCALL msg=audit(1162856262.449:1378): arch=40000003 syscall=195 success=yes exit=0 a0=868d97c a1=bfb23cf0 a2=648ff4 a3=3 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162856262.449:1378): path="/proc/6720" type=AVC msg=audit(1162856262.449:1379): avc: denied { search } for pid=7279 comm="ps" name="6720" dev=proc ino=440401922 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_su_t:s0 tclass=dir type=AVC msg=audit(1162856262.449:1379): avc: denied { read } for pid=7279 comm="ps" name="stat" dev=proc ino=440401933 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_su_t:s0 tclass=file type=SYSCALL msg=audit(1162856262.449:1379): arch=40000003 syscall=5 success=yes exit=18 a0=4cfe4780 a1=0 a2=0 a3=4cfe4780 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162856262.449:1380): avc: denied { getattr } for pid=7279 comm="ps" name="6743" dev=proc ino=441909250 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:newrole_t:s0 tclass=dir type=SYSCALL msg=audit(1162856262.449:1380): arch=40000003 syscall=195 success=yes exit=0 a0=868d97c a1=bfb23cf0 a2=648ff4 a3=3 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162856262.449:1380): path="/proc/6743" type=AVC msg=audit(1162856262.449:1381): avc: denied { search } for pid=7279 comm="ps" name="6743" dev=proc ino=441909250 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:newrole_t:s0 tclass=dir type=AVC msg=audit(1162856262.449:1381): avc: denied { read } for pid=7279 comm="ps" name="stat" dev=proc ino=441909261 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:newrole_t:s0 tclass=file type=SYSCALL msg=audit(1162856262.449:1381): arch=40000003 syscall=5 success=yes exit=18 a0=4cfe4780 a1=0 a2=0 a3=4cfe4780 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162856262.449:1382): avc: denied { getattr } for pid=7279 comm="ps" name="6744" dev=proc ino=441974786 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:sysadm_r:sysadm_t:s0 tclass=dir type=SYSCALL msg=audit(1162856262.449:1382): arch=40000003 syscall=195 success=yes exit=0 a0=868d97c a1=bfb23cf0 a2=648ff4 a3=3 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162856262.449:1382): path="/proc/6744" type=AVC msg=audit(1162856262.449:1383): avc: denied { search } for pid=7279 comm="ps" name="6744" dev=proc ino=441974786 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:sysadm_r:sysadm_t:s0 tclass=dir type=AVC msg=audit(1162856262.449:1383): avc: denied { read } for pid=7279 comm="ps" name="stat" dev=proc ino=441974797 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:sysadm_r:sysadm_t:s0 tclass=file type=SYSCALL msg=audit(1162856262.449:1383): arch=40000003 syscall=5 success=yes exit=18 a0=4cfe4780 a1=0 a2=0 a3=4cfe4780 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162856262.453:1384): avc: denied { getattr } for pid=7279 comm="ps" name="6871" dev=proc ino=450297858 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_evolution_server_t:s0 tclass=dir type=SYSCALL msg=audit(1162856262.453:1384): arch=40000003 syscall=195 success=yes exit=0 a0=868d97c a1=bfb23cf0 a2=648ff4 a3=3 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162856262.453:1384): path="/proc/6871" type=AVC msg=audit(1162856262.453:1385): avc: denied { search } for pid=7279 comm="ps" name="6871" dev=proc ino=450297858 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_evolution_server_t:s0 tclass=dir type=AVC msg=audit(1162856262.453:1385): avc: denied { read } for pid=7279 comm="ps" name="stat" dev=proc ino=450297869 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_evolution_server_t:s0 tclass=file type=SYSCALL msg=audit(1162856262.453:1385): arch=40000003 syscall=5 success=yes exit=18 a0=4cfe4780 a1=0 a2=0 a3=4cfe4780 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162856262.453:1386): avc: denied { getattr } for pid=7279 comm="ps" name="6892" dev=proc ino=451674114 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tclass=dir type=SYSCALL msg=audit(1162856262.453:1386): arch=40000003 syscall=195 success=yes exit=0 a0=868d97c a1=bfb23cf0 a2=648ff4 a3=3 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162856262.453:1386): path="/proc/6892" type=AVC msg=audit(1162856262.453:1387): avc: denied { search } for pid=7279 comm="ps" name="6892" dev=proc ino=451674114 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tclass=dir type=AVC msg=audit(1162856262.453:1387): avc: denied { read } for pid=7279 comm="ps" name="stat" dev=proc ino=451674125 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tclass=file type=SYSCALL msg=audit(1162856262.453:1387): arch=40000003 syscall=5 success=yes exit=18 a0=4cfe4780 a1=0 a2=0 a3=4cfe4780 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162856262.453:1388): avc: denied { getattr } for pid=7279 comm="ps" name="2" dev=devpts ino=4 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_devpts_t:s0 tclass=chr_file type=SYSCALL msg=audit(1162856262.453:1388): arch=40000003 syscall=195 success=yes exit=0 a0=4cfe2840 a1=bfb21440 a2=648ff4 a3=3 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162856262.453:1388): path="/dev/pts/2" type=AVC msg=audit(1162856262.873:1389): avc: denied { write } for pid=7208 comm="firefox-bin" name="tmp" dev=dm-0 ino=14469313 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:tmp_t:s0 tclass=dir type=AVC msg=audit(1162856262.873:1389): avc: denied { add_name } for pid=7208 comm="firefox-bin" name="FlashoraxPs" scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:tmp_t:s0 tclass=dir type=AVC msg=audit(1162856262.873:1389): avc: denied { create } for pid=7208 comm="firefox-bin" name="FlashoraxPs" scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162856262.873:1389): arch=40000003 syscall=5 success=yes exit=46 a0=bfacc47b a1=c2 a2=180 a3=1dfd81 items=0 ppid=1 pid=7208 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162856262.873:1390): avc: denied { read write } for pid=7208 comm="firefox-bin" name="FlashoraxPs" dev=dm-0 ino=14469565 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162856262.873:1390): arch=40000003 syscall=5 success=yes exit=46 a0=a6808db8 a1=242 a2=1b6 a3=9a75398 items=0 ppid=1 pid=7208 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162856262.873:1391): avc: denied { getattr } for pid=7208 comm="firefox-bin" name="FlashoraxPs" dev=dm-0 ino=14469565 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162856262.873:1391): arch=40000003 syscall=197 success=yes exit=0 a0=2e a1=bfacc2f8 a2=9eaff4 a3=9a75398 items=0 ppid=1 pid=7208 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162856262.873:1391): path="/tmp/FlashoraxPs" type=AVC msg=audit(1162856263.025:1392): avc: denied { search } for pid=7208 comm="firefox-bin" name="pcm" dev=dm-0 ino=9330155 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:alsa_etc_rw_t:s0 tclass=dir type=AVC msg=audit(1162856263.025:1392): avc: denied { read } for pid=7208 comm="firefox-bin" name="default.conf" dev=dm-0 ino=9330152 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:alsa_etc_rw_t:s0 tclass=file type=SYSCALL msg=audit(1162856263.025:1392): arch=40000003 syscall=5 success=yes exit=50 a0=99095e8 a1=0 a2=1b6 a3=8c4dd48 items=0 ppid=1 pid=7208 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162856263.025:1393): avc: denied { getattr } for pid=7208 comm="firefox-bin" name="default.conf" dev=dm-0 ino=9330152 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:alsa_etc_rw_t:s0 tclass=file type=SYSCALL msg=audit(1162856263.025:1393): arch=40000003 syscall=197 success=yes exit=0 a0=32 a1=bfacc280 a2=9eaff4 a3=8c4dd48 items=0 ppid=1 pid=7208 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162856263.025:1393): path="/etc/alsa/pcm/default.conf" type=AVC msg=audit(1162856263.029:1394): avc: denied { search } for pid=7208 comm="firefox-bin" name="4-1:1.1" dev=sysfs ino=972 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:sysfs_t:s0 tclass=dir type=SYSCALL msg=audit(1162856263.029:1394): arch=40000003 syscall=54 success=yes exit=0 a0=32 a1=c25c4111 a2=bfacbfbc a3=bfacbfbc items=0 ppid=1 pid=7208 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162856278.190:1395): avc: denied { remove_name } for pid=7281 comm="firefox-bin" name="FlashoraxPs" dev=dm-0 ino=14469565 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:tmp_t:s0 tclass=dir type=AVC msg=audit(1162856278.190:1395): avc: denied { unlink } for pid=7281 comm="firefox-bin" name="FlashoraxPs" dev=dm-0 ino=14469565 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162856278.190:1395): arch=40000003 syscall=10 success=yes exit=0 a0=a6808d70 a1=1 a2=1d711e0 a3=a6805e28 items=0 ppid=1 pid=7281 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=USER_ACCT msg=audit(1162856401.581:1396): user pid=7297 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162856401.581:1397): login pid=7297 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162856401.581:1398): user pid=7297 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162856401.581:1399): user pid=7297 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162856401.585:1400): avc: denied { execute } for pid=7298 comm="sh" name="sa1" dev=dm-0 ino=13061698 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:lib_t:s0 tclass=file type=AVC msg=audit(1162856401.585:1400): avc: denied { execute_no_trans } for pid=7298 comm="sh" name="sa1" dev=dm-0 ino=13061698 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1162856401.585:1400): arch=40000003 syscall=11 success=yes exit=0 a0=8b581b0 a1=8b58358 a2=8b58290 a3=8b58008 items=0 ppid=7297 pid=7298 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sa1" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162856401.585:1400): path="/usr/lib/sa/sa1" type=AVC msg=audit(1162856401.589:1401): avc: denied { execute } for pid=7298 comm="sa1" name="sadc" dev=dm-0 ino=11981386 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=AVC msg=audit(1162856401.589:1401): avc: denied { execute_no_trans } for pid=7298 comm="sa1" name="sadc" dev=dm-0 ino=11981386 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=AVC msg=audit(1162856401.589:1401): avc: denied { read } for pid=7298 comm="sa1" name="sadc" dev=dm-0 ino=11981386 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162856401.589:1401): arch=40000003 syscall=11 success=yes exit=0 a0=8b58d48 a1=8b58740 a2=8b58d60 a3=8b58740 items=0 ppid=7297 pid=7298 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162856401.589:1401): path="/usr/lib/sa/sadc" type=AVC_PATH msg=audit(1162856401.589:1401): path="/usr/lib/sa/sadc" type=AVC msg=audit(1162856401.589:1402): avc: denied { search } for pid=7298 comm="sadc" name="net" dev=proc ino=-268435432 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=dir type=AVC msg=audit(1162856401.589:1402): avc: denied { read } for pid=7298 comm="sadc" name="dev" dev=proc ino=-268435159 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=file type=SYSCALL msg=audit(1162856401.589:1402): arch=40000003 syscall=5 success=yes exit=3 a0=8050371 a1=0 a2=1b6 a3=8089800 items=0 ppid=7297 pid=7298 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162856401.589:1403): avc: denied { getattr } for pid=7298 comm="sadc" name="dev" dev=proc ino=-268435159 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=file type=SYSCALL msg=audit(1162856401.589:1403): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bf97e2a8 a2=c69ff4 a3=8089800 items=0 ppid=7297 pid=7298 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162856401.589:1403): path="/proc/net/dev" type=AVC msg=audit(1162856401.589:1404): avc: denied { search } for pid=7298 comm="sadc" name="sa" dev=dm-0 ino=14607631 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=dir type=SYSCALL msg=audit(1162856401.589:1404): arch=40000003 syscall=33 success=yes exit=0 a0=bf97e654 a1=0 a2=bf97e548 a3=bf97e550 items=0 ppid=7297 pid=7298 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162856401.589:1405): avc: denied { read append } for pid=7298 comm="sadc" name="sa06" dev=dm-0 ino=14600291 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=file type=SYSCALL msg=audit(1162856401.589:1405): arch=40000003 syscall=5 success=yes exit=3 a0=bf97e654 a1=402 a2=bf97e818 a3=bf97e550 items=0 ppid=7297 pid=7298 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162856401.589:1406): avc: denied { search } for pid=7298 comm="sadc" name="fs" dev=proc ino=-268435428 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=dir type=AVC msg=audit(1162856401.589:1406): avc: denied { read } for pid=7298 comm="sadc" name="dentry-state" dev=proc ino=-268435227 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=file type=SYSCALL msg=audit(1162856401.589:1406): arch=40000003 syscall=5 success=yes exit=4 a0=805037f a1=0 a2=1b6 a3=8089d60 items=0 ppid=7297 pid=7298 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162856401.589:1407): avc: denied { getattr } for pid=7298 comm="sadc" name="dentry-state" dev=proc ino=-268435227 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=file type=SYSCALL msg=audit(1162856401.589:1407): arch=40000003 syscall=197 success=yes exit=0 a0=4 a1=bf97e104 a2=c69ff4 a3=8089d60 items=0 ppid=7297 pid=7298 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162856401.589:1407): path="/proc/sys/fs/dentry-state" type=AVC msg=audit(1162856401.589:1408): avc: denied { search } for pid=7298 comm="sadc" name="rpc" dev=proc ino=-268434552 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_rpc_t:s0 tclass=dir type=SYSCALL msg=audit(1162856401.589:1408): arch=40000003 syscall=5 success=no exit=-2 a0=80502a5 a1=0 a2=1b6 a3=8089d60 items=0 ppid=7297 pid=7298 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162856401.593:1409): avc: denied { lock } for pid=7298 comm="sadc" name="sa06" dev=dm-0 ino=14600291 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=file type=SYSCALL msg=audit(1162856401.593:1409): arch=40000003 syscall=143 success=yes exit=0 a0=3 a1=6 a2=bf97e550 a3=3 items=0 ppid=7297 pid=7298 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162856401.593:1409): path="/var/log/sa/sa06" type=CRED_DISP msg=audit(1162856401.601:1410): user pid=7297 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162856401.601:1411): user pid=7297 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162856952.116:1412): avc: denied { execmem } for pid=7314 comm="gnome-screensav" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=process type=SYSCALL msg=audit(1162856952.116:1412): arch=40000003 syscall=192 success=yes exit=8175616 a0=7cc000 a1=1a000 a2=7 a3=812 items=0 ppid=6775 pid=7314 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-screensav" exe="/usr/libexec/gnome-screensaver-gl-helper" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162856952.116:1413): avc: denied { execstack } for pid=7314 comm="gnome-screensav" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=process type=SYSCALL msg=audit(1162856952.116:1413): arch=40000003 syscall=125 success=yes exit=0 a0=bfa30000 a1=1000 a2=1000007 a3=fffff000 items=0 ppid=6775 pid=7314 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-screensav" exe="/usr/libexec/gnome-screensaver-gl-helper" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162856952.140:1414): avc: denied { execute } for pid=7314 comm="gnome-screensav" name="zero" dev=tmpfs ino=1524 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:zero_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1162856952.140:1414): arch=40000003 syscall=192 success=yes exit=1114112 a0=0 a1=2000 a2=7 a3=2 items=0 ppid=6775 pid=7314 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-screensav" exe="/usr/libexec/gnome-screensaver-gl-helper" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1162856952.140:1414): path="/dev/zero" type=AVC msg=audit(1162856952.144:1415): avc: denied { read } for pid=7314 comm="gnome-screensav" name=".gdmAHKGIT" dev=dm-0 ino=14469334 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162856952.144:1415): arch=40000003 syscall=33 success=yes exit=0 a0=bfa30e90 a1=4 a2=4db18a64 a3=bfa30e90 items=0 ppid=6775 pid=7314 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-screensav" exe="/usr/libexec/gnome-screensaver-gl-helper" subj=staff_u:staff_r:staff_t:s0 key=(null) type=USER_ACCT msg=audit(1162857001.671:1416): user pid=7316 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162857001.675:1417): login pid=7316 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162857001.675:1418): user pid=7316 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162857001.675:1419): user pid=7316 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162857001.687:1420): user pid=7316 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162857001.687:1421): user pid=7316 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162857601.756:1422): user pid=7334 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162857601.756:1423): login pid=7334 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162857601.756:1424): user pid=7334 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162857601.756:1425): user pid=7334 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162857601.772:1426): user pid=7334 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162857601.772:1427): user pid=7334 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162857661.784:1428): user pid=7338 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162857661.784:1429): login pid=7338 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162857661.784:1430): user pid=7338 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162857661.784:1431): user pid=7338 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162857661.788:1432): avc: denied { getattr } for pid=7339 comm="bash" name="run-parts" dev=dm-0 ino=10331890 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1162857661.788:1432): arch=40000003 syscall=195 success=yes exit=0 a0=9b4a120 a1=bfd0fdd0 a2=248ff4 a3=9b4a120 items=0 ppid=7338 pid=7339 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="bash" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162857661.788:1432): path="/usr/bin/run-parts" type=AVC msg=audit(1162857661.788:1433): avc: denied { execute } for pid=7339 comm="bash" name="run-parts" dev=dm-0 ino=10331890 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1162857661.788:1433): arch=40000003 syscall=33 success=yes exit=0 a0=9b4a120 a1=1 a2=11 a3=9b4a120 items=0 ppid=7338 pid=7339 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="bash" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162857661.788:1434): avc: denied { read } for pid=7339 comm="bash" name="run-parts" dev=dm-0 ino=10331890 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1162857661.788:1434): arch=40000003 syscall=33 success=yes exit=0 a0=9b4a120 a1=4 a2=ffffffff a3=9b4a120 items=0 ppid=7338 pid=7339 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="bash" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162857661.788:1435): avc: denied { execute_no_trans } for pid=7339 comm="bash" name="run-parts" dev=dm-0 ino=10331890 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1162857661.788:1435): arch=40000003 syscall=11 success=yes exit=0 a0=9b4a120 a1=9b4a3d8 a2=9b4a2f8 a3=9b49f98 items=0 ppid=7338 pid=7339 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="run-parts" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162857661.788:1435): path="/usr/bin/run-parts" type=AVC msg=audit(1162857661.788:1436): avc: denied { ioctl } for pid=7339 comm="run-parts" name="run-parts" dev=dm-0 ino=10331890 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1162857661.788:1436): arch=40000003 syscall=54 success=no exit=-25 a0=3 a1=5401 a2=bfd0ffe8 a3=bfd10028 items=0 ppid=7338 pid=7339 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="run-parts" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162857661.788:1436): path="/usr/bin/run-parts" type=AVC msg=audit(1162857661.792:1437): avc: denied { execute } for pid=7339 comm="run-parts" name="inn-cron-nntpsend" dev=dm-0 ino=9331477 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1162857661.792:1437): arch=40000003 syscall=33 success=yes exit=0 a0=9b4b990 a1=1 a2=1 a3=9b4bc98 items=0 ppid=7338 pid=7339 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="run-parts" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162857661.792:1438): avc: denied { execute_no_trans } for pid=7340 comm="run-parts" name="inn-cron-nntpsend" dev=dm-0 ino=9331477 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1162857661.792:1438): arch=40000003 syscall=11 success=yes exit=0 a0=9b4ba10 a1=9b4bad8 a2=9b4bae8 a3=9b4b758 items=0 ppid=7339 pid=7340 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="inn-cron-nntpse" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162857661.792:1438): path="/etc/cron.hourly/inn-cron-nntpsend" type=AVC msg=audit(1162857661.796:1439): avc: denied { execute } for pid=7342 comm="inn-cron-nntpse" name="chkconfig" dev=dm-0 ino=2848378 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sbin_t:s0 tclass=file type=AVC msg=audit(1162857661.796:1439): avc: denied { execute_no_trans } for pid=7342 comm="inn-cron-nntpse" name="chkconfig" dev=dm-0 ino=2848378 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sbin_t:s0 tclass=file type=AVC msg=audit(1162857661.796:1439): avc: denied { read } for pid=7342 comm="inn-cron-nntpse" name="chkconfig" dev=dm-0 ino=2848378 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sbin_t:s0 tclass=file type=SYSCALL msg=audit(1162857661.796:1439): arch=40000003 syscall=11 success=yes exit=0 a0=9776678 a1=9776808 a2=9776720 a3=9776508 items=0 ppid=7340 pid=7342 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="chkconfig" exe="/sbin/chkconfig" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162857661.796:1439): path="/sbin/chkconfig" type=AVC_PATH msg=audit(1162857661.796:1439): path="/sbin/chkconfig" type=AVC msg=audit(1162857661.796:1440): avc: denied { read } for pid=7342 comm="chkconfig" name="innd" dev=dm-0 ino=9331492 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162857661.796:1440): arch=40000003 syscall=5 success=yes exit=3 a0=bfddf8a0 a1=0 a2=ffffffff a3=9d41038 items=0 ppid=7340 pid=7342 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="chkconfig" exe="/sbin/chkconfig" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162857661.796:1441): avc: denied { getattr } for pid=7342 comm="chkconfig" name="innd" dev=dm-0 ino=9331492 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162857661.796:1441): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bfddf810 a2=977ff4 a3=3 items=0 ppid=7340 pid=7342 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="chkconfig" exe="/sbin/chkconfig" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162857661.796:1441): path="/etc/rc.d/init.d/innd" type=CRED_DISP msg=audit(1162857661.804:1442): user pid=7338 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162857661.804:1443): user pid=7338 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162858201.870:1444): user pid=7364 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162858201.870:1445): login pid=7364 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162858201.870:1446): user pid=7364 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162858201.870:1447): user pid=7364 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162858201.882:1448): user pid=7364 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162858201.886:1449): user pid=7364 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162858801.947:1450): user pid=7382 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162858801.947:1451): login pid=7382 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162858801.947:1452): user pid=7382 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162858801.947:1453): user pid=7382 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162858801.967:1454): user pid=7382 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162858801.967:1455): user pid=7382 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162859401.037:1456): user pid=7400 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162859401.037:1457): login pid=7400 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162859401.037:1458): user pid=7400 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162859401.037:1459): user pid=7400 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162859401.049:1460): user pid=7400 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162859401.049:1461): user pid=7400 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162859927.374:1462): avc: denied { read } for pid=7418 comm="firefox-bin" name=".gdmAHKGIT" dev=dm-0 ino=14469334 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162859927.374:1462): arch=40000003 syscall=33 success=yes exit=0 a0=bfb2ffcb a1=4 a2=4db18a64 a3=bfb2ffcb items=0 ppid=1 pid=7418 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162859927.374:1463): avc: denied { getattr } for pid=7418 comm="firefox-bin" name=".gdmAHKGIT" dev=dm-0 ino=14469334 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162859927.374:1463): arch=40000003 syscall=197 success=yes exit=0 a0=4 a1=bfb2decc a2=7bfff4 a3=9356140 items=0 ppid=1 pid=7418 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162859927.374:1463): path="/tmp/.gdmAHKGIT" type=AVC msg=audit(1162859943.499:1464): avc: denied { getattr } for pid=7418 comm="firefox-bin" name="libflashplayer.so" dev=dm-0 ino=6547382 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=user_u:object_r:user_mozilla_home_t:s0 tclass=file type=SYSCALL msg=audit(1162859943.499:1464): arch=40000003 syscall=196 success=yes exit=0 a0=bfb2c628 a1=bfb2c58c a2=7bfff4 a3=9e16d28 items=0 ppid=1 pid=7418 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162859943.499:1464): path="/home/kmacmill/.mozilla/plugins/libflashplayer.so" type=AVC msg=audit(1162859943.627:1465): avc: denied { read } for pid=7418 comm="firefox-bin" name="libflashplayer.so" dev=dm-0 ino=6547382 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=user_u:object_r:user_mozilla_home_t:s0 tclass=file type=SYSCALL msg=audit(1162859943.627:1465): arch=40000003 syscall=5 success=yes exit=47 a0=9f09628 a1=0 a2=7c1150 a3=9f09628 items=0 ppid=1 pid=7418 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162859943.627:1466): avc: denied { execute } for pid=7418 comm="firefox-bin" name="libflashplayer.so" dev=dm-0 ino=6547382 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=user_u:object_r:user_mozilla_home_t:s0 tclass=file type=SYSCALL msg=audit(1162859943.627:1466): arch=40000003 syscall=192 success=yes exit=74682368 a0=0 a1=738dbc a2=5 a3=802 items=0 ppid=1 pid=7418 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162859943.627:1466): path="/home/kmacmill/.mozilla/plugins/libflashplayer.so" type=USER_ACCT msg=audit(1162860001.106:1467): user pid=7444 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162860001.106:1468): login pid=7444 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162860001.106:1469): user pid=7444 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162860001.110:1470): user pid=7444 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162860001.114:1471): avc: denied { search } for pid=7445 comm="sadc" name="rpc" dev=proc ino=-268434552 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_rpc_t:s0 tclass=dir type=SYSCALL msg=audit(1162860001.114:1471): arch=40000003 syscall=5 success=no exit=-2 a0=80502a5 a1=0 a2=1b6 a3=8646d60 items=0 ppid=7444 pid=7445 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=CRED_DISP msg=audit(1162860001.122:1472): user pid=7444 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162860001.122:1473): user pid=7444 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162860601.192:1474): user pid=7484 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162860601.192:1475): login pid=7484 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162860601.192:1476): user pid=7484 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162860601.192:1477): user pid=7484 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162860601.200:1478): avc: denied { search } for pid=7485 comm="sadc" name="net" dev=proc ino=-268435432 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=dir type=AVC msg=audit(1162860601.200:1478): avc: denied { read } for pid=7485 comm="sadc" name="dev" dev=proc ino=-268435159 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=file type=SYSCALL msg=audit(1162860601.200:1478): arch=40000003 syscall=5 success=yes exit=3 a0=8050371 a1=0 a2=1b6 a3=8a2f800 items=0 ppid=7484 pid=7485 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162860601.200:1479): avc: denied { getattr } for pid=7485 comm="sadc" name="dev" dev=proc ino=-268435159 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=file type=SYSCALL msg=audit(1162860601.200:1479): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bfe9d7c8 a2=371ff4 a3=8a2f800 items=0 ppid=7484 pid=7485 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162860601.200:1479): path="/proc/net/dev" type=AVC msg=audit(1162860601.200:1480): avc: denied { read append } for pid=7485 comm="sadc" name="sa06" dev=dm-0 ino=14600291 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=file type=SYSCALL msg=audit(1162860601.200:1480): arch=40000003 syscall=5 success=yes exit=3 a0=bfe9db74 a1=402 a2=bfe9dd38 a3=bfe9da70 items=0 ppid=7484 pid=7485 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162860601.200:1481): avc: denied { lock } for pid=7485 comm="sadc" name="sa06" dev=dm-0 ino=14600291 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=file type=SYSCALL msg=audit(1162860601.200:1481): arch=40000003 syscall=143 success=yes exit=0 a0=3 a1=6 a2=bfe9da70 a3=3 items=0 ppid=7484 pid=7485 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162860601.200:1481): path="/var/log/sa/sa06" type=CRED_DISP msg=audit(1162860601.244:1482): user pid=7484 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162860601.244:1483): user pid=7484 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162861201.297:1484): user pid=7540 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162861201.297:1485): login pid=7540 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162861201.301:1486): user pid=7540 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162861201.301:1487): user pid=7540 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162861201.329:1488): user pid=7540 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162861201.329:1489): user pid=7540 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162861261.337:1490): user pid=7544 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162861261.337:1491): login pid=7544 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162861261.337:1492): user pid=7544 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162861261.337:1493): user pid=7544 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162861261.357:1494): user pid=7544 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162861261.357:1495): user pid=7544 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162861801.415:1496): user pid=7575 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162861801.415:1497): login pid=7575 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162861801.415:1498): user pid=7575 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162861801.415:1499): user pid=7575 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162861801.423:1500): avc: denied { search } for pid=7576 comm="sadc" name="sa" dev=dm-0 ino=14607631 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=dir type=SYSCALL msg=audit(1162861801.423:1500): arch=40000003 syscall=33 success=yes exit=0 a0=bf951624 a1=0 a2=bf951518 a3=bf951520 items=0 ppid=7575 pid=7576 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=CRED_DISP msg=audit(1162861801.443:1501): user pid=7575 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162861801.443:1502): user pid=7575 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162862333.952:1503): avc: denied { write } for pid=6892 comm="evolution-alarm" name=".gnome2" dev=dm-0 ino=6547212 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=staff_u:object_r:staff_home_t:s0 tclass=dir type=AVC msg=audit(1162862333.952:1503): avc: denied { add_name } for pid=6892 comm="evolution-alarm" name="evolution-alarm-notify-vSUaW9" scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=staff_u:object_r:staff_home_t:s0 tclass=dir type=AVC msg=audit(1162862333.952:1503): avc: denied { create } for pid=6892 comm="evolution-alarm" name="evolution-alarm-notify-vSUaW9" scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=staff_u:object_r:staff_home_t:s0 tclass=file type=SYSCALL msg=audit(1162862333.952:1503): arch=40000003 syscall=5 success=yes exit=23 a0=934d450 a1=c2 a2=180 a3=2f829a items=0 ppid=1 pid=6892 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC msg=audit(1162862333.952:1504): avc: denied { remove_name } for pid=6892 comm="evolution-alarm" name="evolution-alarm-notify-vSUaW9" dev=dm-0 ino=6574545 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=staff_u:object_r:staff_home_t:s0 tclass=dir type=AVC msg=audit(1162862333.952:1504): avc: denied { unlink } for pid=6892 comm="evolution-alarm" name="evolution-alarm-notify-vSUaW9" dev=dm-0 ino=6574545 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=staff_u:object_r:staff_home_t:s0 tclass=file type=SYSCALL msg=audit(1162862333.952:1504): arch=40000003 syscall=10 success=yes exit=0 a0=934d450 a1=2 a2=4d48efd8 a3=9323060 items=0 ppid=1 pid=6892 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC msg=audit(1162862333.960:1505): avc: denied { search } for pid=6892 comm="evolution-alarm" name="orbit-kmacmill" dev=dm-0 ino=15648177 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=dir type=AVC msg=audit(1162862333.960:1505): avc: denied { write } for pid=6892 comm="evolution-alarm" name="orbit-kmacmill" dev=dm-0 ino=15648177 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=dir type=AVC msg=audit(1162862333.960:1505): avc: denied { remove_name } for pid=6892 comm="evolution-alarm" name="linc-1aec-0-7f9bab7e41c94" dev=dm-0 ino=15648472 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=dir type=AVC msg=audit(1162862333.960:1505): avc: denied { unlink } for pid=6892 comm="evolution-alarm" name="linc-1aec-0-7f9bab7e41c94" dev=dm-0 ino=15648472 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=sock_file type=SYSCALL msg=audit(1162862333.960:1505): arch=40000003 syscall=10 success=yes exit=0 a0=9327b10 a1=92fbb90 a2=4df37708 a3=c items=0 ppid=1 pid=6892 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC msg=audit(1162862333.960:1506): avc: denied { search } for pid=6871 comm="evolution-data-" name="tmp" dev=dm-0 ino=14469313 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=system_u:object_r:tmp_t:s0 tclass=dir type=AVC msg=audit(1162862333.960:1506): avc: denied { search } for pid=6871 comm="evolution-data-" name="orbit-kmacmill" dev=dm-0 ino=15648177 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=dir type=AVC msg=audit(1162862333.960:1507): avc: denied { signal } for pid=7604 comm="evolution-alarm" scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tclass=process type=SYSCALL msg=audit(1162862333.960:1507): arch=40000003 syscall=270 success=yes exit=0 a0=1aec a1=1db4 a2=6 a3=b72f9c2c items=0 ppid=1 pid=7604 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=SYSCALL msg=audit(1162862333.960:1506): arch=40000003 syscall=102 success=no exit=-2 a0=3 a1=bfd5d1c0 a2=4e570f80 a3=0 items=0 ppid=1 pid=6871 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC msg=audit(1162862334.088:1508): avc: denied { write } for pid=6723 comm="bash" name="1" dev=devpts ino=3 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:sysadm_devpts_t:s0 tclass=chr_file type=SYSCALL msg=audit(1162862334.088:1508): arch=40000003 syscall=4 success=no exit=-5 a0=2 a1=b7fa8000 a2=2e a3=2e items=0 ppid=6720 pid=6723 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1162862334.088:1508): path=2F6465762F7074732F31202864656C6574656429 type=AVC msg=audit(1162862334.092:1509): avc: denied { read } for pid=6723 comm="bash" name="1" dev=devpts ino=3 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:sysadm_devpts_t:s0 tclass=chr_file type=SYSCALL msg=audit(1162862334.092:1509): arch=40000003 syscall=3 success=yes exit=0 a0=0 a1=bf8662db a2=1 a3=249420 items=0 ppid=6720 pid=6723 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1162862334.092:1509): path=2F6465762F7074732F31202864656C6574656429 type=AVC msg=audit(1162862334.092:1510): avc: denied { append } for pid=6723 comm="bash" name=".bash_history" dev=dm-0 ino=13127151 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:user_home_t:s0 tclass=file type=SYSCALL msg=audit(1162862334.092:1510): arch=40000003 syscall=5 success=yes exit=3 a0=8250cf0 a1=8401 a2=0 a3=8401 items=0 ppid=6720 pid=6723 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162862334.092:1511): avc: denied { read } for pid=6723 comm="bash" name=".bash_history" dev=dm-0 ino=13127151 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:user_home_t:s0 tclass=file type=SYSCALL msg=audit(1162862334.092:1511): arch=40000003 syscall=5 success=yes exit=3 a0=8250cf0 a1=8000 a2=0 a3=8000 items=0 ppid=6720 pid=6723 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162862334.092:1512): avc: denied { write } for pid=6723 comm="bash" name=".bash_history" dev=dm-0 ino=13127151 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:user_home_t:s0 tclass=file type=SYSCALL msg=audit(1162862334.092:1512): arch=40000003 syscall=5 success=yes exit=3 a0=8250cf0 a1=8201 a2=0 a3=8201 items=0 ppid=6720 pid=6723 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=CRED_DISP msg=audit(1162862334.096:1513): user pid=6720 uid=500 auid=500 subj=staff_u:staff_r:staff_su_t:s0 msg='PAM: setcred acct=root : exe="/bin/su" (hostname=?, addr=?, terminal=pts/1 res=success)' type=AVC msg=audit(1162862334.096:1514): avc: denied { search } for pid=6720 comm="su" name="root" dev=dm-0 ino=13127137 scontext=staff_u:staff_r:staff_su_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1162862334.096:1514): avc: denied { write } for pid=6720 comm="su" name="root" dev=dm-0 ino=13127137 scontext=staff_u:staff_r:staff_su_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1162862334.096:1514): avc: denied { remove_name } for pid=6720 comm="su" name=".xauthyeka65" dev=dm-0 ino=13127378 scontext=staff_u:staff_r:staff_su_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1162862334.096:1514): avc: denied { unlink } for pid=6720 comm="su" name=".xauthyeka65" dev=dm-0 ino=13127378 scontext=staff_u:staff_r:staff_su_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1162862334.096:1514): arch=40000003 syscall=10 success=yes exit=0 a0=93769a8 a1=9376a86 a2=140bc8 a3=9373008 items=0 ppid=1 pid=6720 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=(none) comm="su" exe="/bin/su" subj=staff_u:staff_r:staff_su_t:s0 key=(null) type=USER_END msg=audit(1162862334.100:1515): user pid=6720 uid=500 auid=500 subj=staff_u:staff_r:staff_su_t:s0 msg='PAM: session close acct=root : exe="/bin/su" (hostname=?, addr=?, terminal=pts/1 res=success)' type=AVC msg=audit(1162862334.116:1516): avc: denied { execheap } for pid=6639 comm="beagle-search" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=process type=AVC msg=audit(1162862334.116:1516): avc: denied { execmem } for pid=6639 comm="beagle-search" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=process type=SYSCALL msg=audit(1162862334.116:1516): arch=40000003 syscall=125 success=yes exit=0 a0=9b76000 a1=1000 a2=7 a3=1 items=0 ppid=1 pid=6639 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="beagle-search" exe="/usr/bin/mono" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162862334.212:1517): avc: denied { write } for pid=7607 comm="bug-buddy" name="6531" dev=dm-0 ino=14469454 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:ice_tmp_t:s0 tclass=sock_file type=SYSCALL msg=audit(1162862334.212:1517): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=bf8965f0 a2=4dc5d770 a3=15 items=0 ppid=7606 pid=7607 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="bug-buddy" exe="/usr/bin/bug-buddy" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162862338.965:1518): avc: denied { write } for pid=6871 comm="evolution-data-" name="orbit-kmacmill" dev=dm-0 ino=15648177 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=dir type=AVC msg=audit(1162862338.965:1518): avc: denied { remove_name } for pid=6871 comm="evolution-data-" name="linc-1ad7-0-5a56670ecf53d" dev=dm-0 ino=15648464 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=dir type=AVC msg=audit(1162862338.965:1518): avc: denied { unlink } for pid=6871 comm="evolution-data-" name="linc-1ad7-0-5a56670ecf53d" dev=dm-0 ino=15648464 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=sock_file type=SYSCALL msg=audit(1162862338.965:1518): arch=40000003 syscall=10 success=yes exit=0 a0=87021d8 a1=86f70c8 a2=4df37708 a3=a items=0 ppid=1 pid=6871 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC msg=audit(1162862343.985:1519): avc: denied { write } for pid=6531 comm="gnome-session" name=".ICE-unix" dev=dm-0 ino=14469315 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:ice_tmp_t:s0 tclass=dir type=AVC msg=audit(1162862343.985:1519): avc: denied { remove_name } for pid=6531 comm="gnome-session" name="6531" dev=dm-0 ino=14469454 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:ice_tmp_t:s0 tclass=dir type=AVC msg=audit(1162862343.985:1519): avc: denied { unlink } for pid=6531 comm="gnome-session" name="6531" dev=dm-0 ino=14469454 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:ice_tmp_t:s0 tclass=sock_file type=SYSCALL msg=audit(1162862343.985:1519): arch=40000003 syscall=10 success=yes exit=0 a0=8b4bb7a a1=1 a2=4dc5d770 a3=8b4bb08 items=0 ppid=4697 pid=6531 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-session" exe="/usr/bin/gnome-session" subj=staff_u:staff_r:staff_t:s0 key=(null) type=USER_END msg=audit(1162862344.101:1520): user pid=4697 uid=0 auid=500 subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 msg='PAM: session close acct=kmacmill : exe="/usr/sbin/gdm-binary" (hostname=?, addr=?, terminal=:0 res=success)' type=CRED_DISP msg=audit(1162862344.101:1521): user pid=4697 uid=0 auid=500 subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 msg='PAM: setcred acct=kmacmill : exe="/usr/sbin/gdm-binary" (hostname=?, addr=?, terminal=:0 res=success)' type=DAEMON_END msg=audit(1162862354.005:5730) auditd normal halt, sending auid=4294967295 pid=8144 subj=system_u:system_r:initrc_t:s0 type=DAEMON_START msg=audit(1162905957.883:2600) auditd start, ver=1.2.9, format=raw, auid=4294967295 pid=2166 res=success, auditd pid=21 type=CONFIG_CHANGE msg=audit(1162905957.979:51): audit_enabled=1 old=0 by auid=4294967295 subj=system_u:system_r:auditd_t:s0 type=CONFIG_CHANGE msg=audit(1162905958.435:52): audit_backlog_limit=256 old=64 by auid=4294967295 subj=system_u:system_r:auditctl_t:s0 type=AVC msg=audit(1162905958.459:53): avc: denied { read write } for pid=2181 comm="syslogd" name="0" dev=devpts ino=2 scontext=system_u:system_r:syslogd_t:s0 tcontext=system_u:object_r:rhgb_devpts_t:s0 tclass=chr_file type=SYSCALL msg=audit(1162905958.459:53): arch=40000003 syscall=11 success=yes exit=0 a0=8887ae8 a1=88880d8 a2=8887fe0 a3=8887a58 items=0 ppid=2180 pid=2181 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="syslogd" exe="/sbin/syslogd" subj=system_u:system_r:syslogd_t:s0 key=(null) type=AVC_PATH msg=audit(1162905958.459:53): path="/dev/pts/0" type=AVC msg=audit(1162905959.207:54): avc: denied { read write } for pid=2184 comm="klogd" name="0" dev=devpts ino=2 scontext=system_u:system_r:klogd_t:s0 tcontext=system_u:object_r:rhgb_devpts_t:s0 tclass=chr_file type=SYSCALL msg=audit(1162905959.207:54): arch=40000003 syscall=11 success=yes exit=0 a0=99e5b28 a1=99e6078 a2=99e5f88 a3=99e59e0 items=0 ppid=2183 pid=2184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="klogd" exe="/sbin/klogd" subj=system_u:system_r:klogd_t:s0 key=(null) type=AVC_PATH msg=audit(1162905959.207:54): path="/dev/pts/0" type=AVC msg=audit(1162905959.763:55): avc: denied { read write } for pid=2196 comm="irqbalance" name="0" dev=devpts ino=2 scontext=system_u:system_r:irqbalance_t:s0 tcontext=system_u:object_r:rhgb_devpts_t:s0 tclass=chr_file type=SYSCALL msg=audit(1162905959.763:55): arch=40000003 syscall=11 success=yes exit=0 a0=9a2ad70 a1=9a2b068 a2=9a2af70 a3=9a2a9e8 items=0 ppid=2195 pid=2196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="irqbalance" exe="/usr/sbin/irqbalance" subj=system_u:system_r:irqbalance_t:s0 key=(null) type=AVC_PATH msg=audit(1162905959.763:55): path="/dev/pts/0" type=AVC msg=audit(1162905960.255:56): avc: denied { read write } for pid=2212 comm="mcstransd" name="0" dev=devpts ino=2 scontext=system_u:system_r:setrans_t:s0-s0:c0.c1023 tcontext=system_u:object_r:rhgb_devpts_t:s0 tclass=chr_file type=SYSCALL msg=audit(1162905960.255:56): arch=40000003 syscall=11 success=yes exit=0 a0=8f11ce0 a1=8f11fe0 a2=8f11ef8 a3=8f11970 items=0 ppid=2211 pid=2212 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="mcstransd" exe="/sbin/mcstransd" subj=system_u:system_r:setrans_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162905960.255:56): path="/dev/pts/0" type=AVC msg=audit(1162905960.935:57): avc: denied { read write } for pid=2225 comm="portmap" name="0" dev=devpts ino=2 scontext=system_u:system_r:portmap_t:s0 tcontext=system_u:object_r:rhgb_devpts_t:s0 tclass=chr_file type=SYSCALL msg=audit(1162905960.935:57): arch=40000003 syscall=11 success=yes exit=0 a0=99b3c18 a1=99b4048 a2=99b3f58 a3=99b39b0 items=0 ppid=2224 pid=2225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="portmap" exe="/sbin/portmap" subj=system_u:system_r:portmap_t:s0 key=(null) type=AVC_PATH msg=audit(1162905960.935:57): path="/dev/pts/0" type=AVC msg=audit(1162905964.171:58): avc: denied { read write } for pid=2259 comm="rpc.statd" name="0" dev=devpts ino=2 scontext=system_u:system_r:rpcd_t:s0 tcontext=system_u:object_r:rhgb_devpts_t:s0 tclass=chr_file type=SYSCALL msg=audit(1162905964.171:58): arch=40000003 syscall=11 success=yes exit=0 a0=8394d58 a1=8395060 a2=8394f70 a3=83949e8 items=0 ppid=2258 pid=2259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="rpc.statd" exe="/sbin/rpc.statd" subj=system_u:system_r:rpcd_t:s0 key=(null) type=AVC_PATH msg=audit(1162905964.171:58): path="/dev/pts/0" type=AVC msg=audit(1162905964.379:59): avc: denied { read write } for pid=2266 comm="consoletype" name="0" dev=devpts ino=2 scontext=system_u:system_r:consoletype_t:s0 tcontext=system_u:object_r:rhgb_devpts_t:s0 tclass=chr_file type=SYSCALL msg=audit(1162905964.379:59): arch=40000003 syscall=11 success=yes exit=0 a0=8ce8b70 a1=8ce8bb8 a2=8ce86c0 a3=8ce8a90 items=0 ppid=2265 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="consoletype" exe="/sbin/consoletype" subj=system_u:system_r:consoletype_t:s0 key=(null) type=AVC_PATH msg=audit(1162905964.379:59): path="/dev/pts/0" type=AVC msg=audit(1162905964.383:60): avc: denied { getattr } for pid=2266 comm="consoletype" name="0" dev=devpts ino=2 scontext=system_u:system_r:consoletype_t:s0 tcontext=system_u:object_r:rhgb_devpts_t:s0 tclass=chr_file type=SYSCALL msg=audit(1162905964.383:60): arch=40000003 syscall=197 success=yes exit=0 a0=0 a1=bfa8ff20 a2=42aff4 a3=3 items=0 ppid=2265 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="consoletype" exe="/sbin/consoletype" subj=system_u:system_r:consoletype_t:s0 key=(null) type=AVC_PATH msg=audit(1162905964.383:60): path="/dev/pts/0" type=AVC msg=audit(1162905964.447:61): avc: denied { read write } for pid=2282 comm="modprobe" name="0" dev=devpts ino=2 scontext=system_u:system_r:insmod_t:s0 tcontext=system_u:object_r:rhgb_devpts_t:s0 tclass=chr_file type=SYSCALL msg=audit(1162905964.447:61): arch=40000003 syscall=11 success=yes exit=0 a0=8b460b8 a1=8b48428 a2=8b517c8 a3=8b48320 items=0 ppid=2271 pid=2282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="modprobe" exe="/sbin/modprobe" subj=system_u:system_r:insmod_t:s0 key=(null) type=AVC_PATH msg=audit(1162905964.447:61): path="/dev/pts/0" type=AVC msg=audit(1162905964.447:62): avc: denied { getattr } for pid=2282 comm="modprobe" name="0" dev=devpts ino=2 scontext=system_u:system_r:insmod_t:s0 tcontext=system_u:object_r:rhgb_devpts_t:s0 tclass=chr_file type=SYSCALL msg=audit(1162905964.447:62): arch=40000003 syscall=197 success=yes exit=0 a0=2 a1=bfd2d770 a2=7d9ff4 a3=3 items=0 ppid=2271 pid=2282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="modprobe" exe="/sbin/modprobe" subj=system_u:system_r:insmod_t:s0 key=(null) type=AVC_PATH msg=audit(1162905964.447:62): path="/dev/pts/0" type=AVC msg=audit(1162905964.523:63): avc: denied { ioctl } for pid=2283 comm="sh" name="0" dev=devpts ino=2 scontext=system_u:system_r:insmod_t:s0 tcontext=system_u:object_r:rhgb_devpts_t:s0 tclass=chr_file type=SYSCALL msg=audit(1162905964.523:63): arch=40000003 syscall=54 success=yes exit=0 a0=0 a1=5401 a2=bffae19c a3=bffae1dc items=0 ppid=2282 pid=2283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sh" exe="/bin/bash" subj=system_u:system_r:insmod_t:s0 key=(null) type=AVC_PATH msg=audit(1162905964.523:63): path="/dev/pts/0" type=AVC msg=audit(1162905965.040:64): avc: denied { read write } for pid=2321 comm="dbus-daemon" name="0" dev=devpts ino=2 scontext=system_u:system_r:system_dbusd_t:s0 tcontext=system_u:object_r:rhgb_devpts_t:s0 tclass=chr_file type=SYSCALL msg=audit(1162905965.040:64): arch=40000003 syscall=11 success=yes exit=0 a0=82c3ad0 a1=82c40c8 a2=82c3fc8 a3=82c3a40 items=0 ppid=2320 pid=2321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="dbus-daemon" exe="/bin/dbus-daemon" subj=system_u:system_r:system_dbusd_t:s0 key=(null) type=AVC_PATH msg=audit(1162905965.040:64): path="/dev/pts/0" type=AVC msg=audit(1162905965.880:65): avc: denied { read write } for pid=2335 comm="hcid" name="0" dev=devpts ino=2 scontext=system_u:system_r:bluetooth_t:s0 tcontext=system_u:object_r:rhgb_devpts_t:s0 tclass=chr_file type=SYSCALL msg=audit(1162905965.880:65): arch=40000003 syscall=11 success=yes exit=0 a0=8abba80 a1=8abbf78 a2=8abbe80 a3=8abba00 items=0 ppid=2334 pid=2335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="hcid" exe="/usr/sbin/hcid" subj=system_u:system_r:bluetooth_t:s0 key=(null) type=AVC_PATH msg=audit(1162905965.880:65): path="/dev/pts/0" type=AVC msg=audit(1162905966.308:66): avc: denied { read write } for pid=2400 comm="hidd" name="0" dev=devpts ino=2 scontext=system_u:system_r:bluetooth_t:s0 tcontext=system_u:object_r:rhgb_devpts_t:s0 tclass=chr_file type=SYSCALL msg=audit(1162905966.308:66): arch=40000003 syscall=11 success=yes exit=0 a0=8fd9b78 a1=8fd9fc8 a2=8fd9ec8 a3=8fd9a48 items=0 ppid=2399 pid=2400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="hidd" exe="/usr/bin/hidd" subj=system_u:system_r:bluetooth_t:s0 key=(null) type=AVC_PATH msg=audit(1162905966.308:66): path="/dev/pts/0" type=AVC msg=audit(1162905966.616:67): avc: denied { read write } for pid=2425 comm="automount" name="0" dev=devpts ino=2 scontext=system_u:system_r:automount_t:s0 tcontext=system_u:object_r:rhgb_devpts_t:s0 tclass=chr_file type=SYSCALL msg=audit(1162905966.616:67): arch=40000003 syscall=11 success=yes exit=0 a0=964d738 a1=964d698 a2=964da90 a3=964d5c8 items=0 ppid=2414 pid=2425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="automount" exe="/usr/sbin/automount" subj=system_u:system_r:automount_t:s0 key=(null) type=AVC_PATH msg=audit(1162905966.616:67): path="/dev/pts/0" type=AVC msg=audit(1162905966.900:68): avc: denied { read write } for pid=2444 comm="acpid" name="0" dev=devpts ino=2 scontext=system_u:system_r:apmd_t:s0 tcontext=system_u:object_r:rhgb_devpts_t:s0 tclass=chr_file type=SYSCALL msg=audit(1162905966.900:68): arch=40000003 syscall=11 success=yes exit=0 a0=8fc6a80 a1=8fc6f78 a2=8fc6e80 a3=8fc6a00 items=0 ppid=2443 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="acpid" exe="/usr/sbin/acpid" subj=system_u:system_r:apmd_t:s0 key=(null) type=AVC_PATH msg=audit(1162905966.900:68): path="/dev/pts/0" type=AVC msg=audit(1162905967.032:69): avc: denied { read write } for pid=2455 comm="hpiod" name="0" dev=devpts ino=2 scontext=system_u:system_r:hplip_t:s0 tcontext=system_u:object_r:rhgb_devpts_t:s0 tclass=chr_file type=SYSCALL msg=audit(1162905967.032:69): arch=40000003 syscall=11 success=yes exit=0 a0=8a9cc58 a1=8a9cf40 a2=8a9ce58 a3=8a9c9b8 items=0 ppid=2454 pid=2455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="hpiod" exe="/usr/sbin/hpiod" subj=system_u:system_r:hplip_t:s0 key=(null) type=AVC_PATH msg=audit(1162905967.032:69): path="/dev/pts/0" type=AVC msg=audit(1162905967.336:70): avc: denied { ioctl } for pid=2459 comm="python" name="0" dev=devpts ino=2 scontext=system_u:system_r:hplip_t:s0 tcontext=system_u:object_r:rhgb_devpts_t:s0 tclass=chr_file type=SYSCALL msg=audit(1162905967.336:70): arch=40000003 syscall=54 success=yes exit=0 a0=0 a1=5401 a2=bfafb6c8 a3=bfafb708 items=0 ppid=2458 pid=2459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="python" exe="/usr/bin/python" subj=system_u:system_r:hplip_t:s0 key=(null) type=AVC_PATH msg=audit(1162905967.336:70): path="/dev/pts/0" type=AVC msg=audit(1162905967.336:71): avc: denied { getattr } for pid=2459 comm="python" name="0" dev=devpts ino=2 scontext=system_u:system_r:hplip_t:s0 tcontext=system_u:object_r:rhgb_devpts_t:s0 tclass=chr_file type=SYSCALL msg=audit(1162905967.336:71): arch=40000003 syscall=197 success=yes exit=0 a0=0 a1=bfafb6a8 a2=813ff4 a3=81483c items=0 ppid=2458 pid=2459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="python" exe="/usr/bin/python" subj=system_u:system_r:hplip_t:s0 key=(null) type=AVC_PATH msg=audit(1162905967.336:71): path="/dev/pts/0" type=AVC msg=audit(1162905968.076:72): avc: denied { read write } for pid=2472 comm="cupsd" name="0" dev=devpts ino=2 scontext=system_u:system_r:cupsd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:rhgb_devpts_t:s0 tclass=chr_file type=SYSCALL msg=audit(1162905968.076:72): arch=40000003 syscall=11 success=yes exit=0 a0=9749c18 a1=974a048 a2=9749f58 a3=97499b0 items=0 ppid=2471 pid=2472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="cupsd" exe="/usr/sbin/cupsd" subj=system_u:system_r:cupsd_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162905968.076:72): path="/dev/pts/0" type=LABEL_LEVEL_CHANGE msg=audit(1162905968.484:73): user pid=2473 uid=0 auid=4294967295 subj=system_u:system_r:cupsd_t:s0-s0:c0.c1023 msg='printer=ML-1740 uri=hal:///org/freedesktop/Hal/devices/usb_device_4e8_324c_2W61BKCX911232K0_if0_printer_noserial banners=none,none range=unknown: exe="/usr/sbin/cupsd" (hostname=localhost.localdomain, addr=127.0.0.1, terminal=? res=success)' type=AVC msg=audit(1162905968.808:74): avc: denied { setfscreate } for pid=2485 comm="cp" scontext=system_u:system_r:initrc_t:s0 tcontext=system_u:system_r:initrc_t:s0 tclass=process type=SYSCALL msg=audit(1162905968.808:74): arch=40000003 syscall=4 success=yes exit=30 a0=3 a1=9a41088 a2=1e a3=4d02f748 items=0 ppid=2477 pid=2485 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="cp" exe="/bin/cp" subj=system_u:system_r:initrc_t:s0 key=(null) type=AVC msg=audit(1162905968.808:75): avc: denied { relabelfrom } for pid=2485 comm="cp" name="localtime" dev=dm-0 ino=14537075 scontext=system_u:system_r:initrc_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=file type=AVC msg=audit(1162905968.808:75): avc: denied { relabelto } for pid=2485 comm="cp" name="localtime" dev=dm-0 ino=14537075 scontext=system_u:system_r:initrc_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1162905968.808:75): arch=40000003 syscall=228 success=yes exit=0 a0=4 a1=4d02f0d3 a2=9a41088 a3=1e items=0 ppid=2477 pid=2485 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="cp" exe="/bin/cp" subj=system_u:system_r:initrc_t:s0 key=(null) type=AVC msg=audit(1162905968.808:76): avc: denied { setattr } for pid=2485 comm="cp" name="localtime" dev=dm-0 ino=14537075 scontext=system_u:system_r:initrc_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1162905968.808:76): arch=40000003 syscall=271 success=yes exit=0 a0=bf97d034 a1=bf97d09c a2=e1aff4 a3=0 items=0 ppid=2477 pid=2485 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="cp" exe="/bin/cp" subj=system_u:system_r:initrc_t:s0 key=(null) type=AVC msg=audit(1162905968.808:77): avc: denied { read write } for pid=2486 comm="sshd" name="0" dev=devpts ino=2 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:rhgb_devpts_t:s0 tclass=chr_file type=SYSCALL msg=audit(1162905968.808:77): arch=40000003 syscall=11 success=yes exit=0 a0=9fa6398 a1=9fa67a0 a2=9fa69c0 a3=9fa3830 items=0 ppid=2477 pid=2486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:sshd_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162905968.808:77): path="/dev/pts/0" type=AVC msg=audit(1162905968.840:78): avc: denied { read write } for pid=2493 comm="consoletype" name="0" dev=devpts ino=2 scontext=system_u:system_r:consoletype_t:s0 tcontext=system_u:object_r:rhgb_devpts_t:s0 tclass=chr_file type=SYSCALL msg=audit(1162905968.840:78): arch=40000003 syscall=11 success=yes exit=0 a0=8e03de8 a1=8e03e30 a2=8e03930 a3=8e03d08 items=0 ppid=2492 pid=2493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="consoletype" exe="/sbin/consoletype" subj=system_u:system_r:consoletype_t:s0 key=(null) type=AVC_PATH msg=audit(1162905968.840:78): path="/dev/pts/0" type=AVC msg=audit(1162905968.840:79): avc: denied { getattr } for pid=2493 comm="consoletype" name="0" dev=devpts ino=2 scontext=system_u:system_r:consoletype_t:s0 tcontext=system_u:object_r:rhgb_devpts_t:s0 tclass=chr_file type=SYSCALL msg=audit(1162905968.840:79): arch=40000003 syscall=197 success=yes exit=0 a0=0 a1=bfb27fb0 a2=516ff4 a3=3 items=0 ppid=2492 pid=2493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="consoletype" exe="/sbin/consoletype" subj=system_u:system_r:consoletype_t:s0 key=(null) type=AVC_PATH msg=audit(1162905968.840:79): path="/dev/pts/0" type=AVC msg=audit(1162905969.004:80): avc: denied { read write } for pid=2498 comm="xinetd" name="0" dev=devpts ino=2 scontext=system_u:system_r:inetd_t:s0 tcontext=system_u:object_r:rhgb_devpts_t:s0 tclass=chr_file type=SYSCALL msg=audit(1162905969.004:80): arch=40000003 syscall=11 success=yes exit=0 a0=8d06258 a1=8d067f0 a2=8d066c8 a3=8d06128 items=0 ppid=2497 pid=2498 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="xinetd" exe="/usr/sbin/xinetd" subj=system_u:system_r:inetd_t:s0 key=(null) type=AVC_PATH msg=audit(1162905969.004:80): path="/dev/pts/0" type=AVC msg=audit(1162905969.340:81): avc: denied { read write } for pid=2514 comm="newaliases" name="0" dev=devpts ino=2 scontext=system_u:system_r:sendmail_t:s0 tcontext=system_u:object_r:rhgb_devpts_t:s0 tclass=chr_file type=SYSCALL msg=audit(1162905969.340:81): arch=40000003 syscall=11 success=yes exit=0 a0=8945d70 a1=8941ae0 a2=894cde8 a3=895dcd8 items=0 ppid=2503 pid=2514 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=51 sgid=51 fsgid=51 tty=(none) comm="newaliases" exe="/usr/sbin/sendmail.sendmail" subj=system_u:system_r:sendmail_t:s0 key=(null) type=AVC_PATH msg=audit(1162905969.340:81): path="/dev/pts/0" type=AVC msg=audit(1162905969.344:82): avc: denied { getattr } for pid=2514 comm="newaliases" name="0" dev=devpts ino=2 scontext=system_u:system_r:sendmail_t:s0 tcontext=system_u:object_r:rhgb_devpts_t:s0 tclass=chr_file type=SYSCALL msg=audit(1162905969.344:82): arch=40000003 syscall=197 success=yes exit=0 a0=0 a1=bf95cf00 a2=514ff4 a3=3 items=0 ppid=2503 pid=2514 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=51 sgid=51 fsgid=51 tty=(none) comm="newaliases" exe="/usr/sbin/sendmail.sendmail" subj=system_u:system_r:sendmail_t:s0 key=(null) type=AVC_PATH msg=audit(1162905969.344:82): path="/dev/pts/0" type=AVC msg=audit(1162905969.352:83): avc: denied { ioctl } for pid=2514 comm="newaliases" name="0" dev=devpts ino=2 scontext=system_u:system_r:sendmail_t:s0 tcontext=system_u:object_r:rhgb_devpts_t:s0 tclass=chr_file type=SYSCALL msg=audit(1162905969.352:83): arch=40000003 syscall=54 success=yes exit=0 a0=0 a1=5401 a2=bf95cd88 a3=bf95cdc8 items=0 ppid=2503 pid=2514 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=51 sgid=51 fsgid=51 tty=(none) comm="newaliases" exe="/usr/sbin/sendmail.sendmail" subj=system_u:system_r:sendmail_t:s0 key=(null) type=AVC_PATH msg=audit(1162905969.352:83): path="/dev/pts/0" type=AVC msg=audit(1162905969.800:84): avc: denied { read write } for pid=2539 comm="gpm" name="0" dev=devpts ino=2 scontext=system_u:system_r:gpm_t:s0 tcontext=system_u:object_r:rhgb_devpts_t:s0 tclass=chr_file type=SYSCALL msg=audit(1162905969.800:84): arch=40000003 syscall=11 success=yes exit=0 a0=9da1d30 a1=9da2180 a2=9da2078 a3=9da1af0 items=0 ppid=2538 pid=2539 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="gpm" exe="/usr/sbin/gpm" subj=system_u:system_r:gpm_t:s0 key=(null) type=AVC_PATH msg=audit(1162905969.800:84): path="/dev/pts/0" type=AVC msg=audit(1162905969.828:85): avc: denied { read write } for pid=2550 comm="crond" name="0" dev=devpts ino=2 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:rhgb_devpts_t:s0 tclass=chr_file type=SYSCALL msg=audit(1162905969.828:85): arch=40000003 syscall=11 success=yes exit=0 a0=9c3bc18 a1=9c3c048 a2=9c3bf58 a3=9c3b9b0 items=0 ppid=2549 pid=2550 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="crond" exe="/usr/sbin/crond" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162905969.828:85): path="/dev/pts/0" type=AVC msg=audit(1162905970.036:86): avc: denied { ioctl } for pid=1460 comm="Xorg" name="nvidia0" dev=tmpfs ino=1535 scontext=system_u:system_r:rhgb_t:s0 tcontext=system_u:object_r:xserver_misc_device_t:s0 tclass=chr_file type=AVC msg=audit(1162905970.040:87): avc: denied { read write } for pid=1460 comm="Xorg" name="nvidia0" dev=tmpfs ino=1535 scontext=system_u:system_r:rhgb_t:s0 tcontext=system_u:object_r:xserver_misc_device_t:s0 tclass=chr_file type=AVC msg=audit(1162905970.784:88): avc: denied { read write } for pid=2587 comm="xfs" name="0" dev=devpts ino=2 scontext=system_u:system_r:xfs_t:s0 tcontext=system_u:object_r:rhgb_devpts_t:s0 tclass=chr_file type=SYSCALL msg=audit(1162905970.784:88): arch=40000003 syscall=11 success=yes exit=0 a0=a0e4b00 a1=a0e50f8 a2=a0e4ff8 a3=a0e4a70 items=0 ppid=2586 pid=2587 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="xfs" exe="/usr/bin/xfs" subj=system_u:system_r:xfs_t:s0 key=(null) type=AVC_PATH msg=audit(1162905970.784:88): path="/dev/pts/0" type=AVC msg=audit(1162905970.848:89): avc: denied { read write } for pid=2598 comm="anacron" name="0" dev=devpts ino=2 scontext=system_u:system_r:system_crond_t:s0 tcontext=system_u:object_r:rhgb_devpts_t:s0 tclass=chr_file type=SYSCALL msg=audit(1162905970.848:89): arch=40000003 syscall=11 success=yes exit=0 a0=9e58d88 a1=9e59090 a2=9e58fa0 a3=9e58a18 items=0 ppid=2597 pid=2598 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="anacron" exe="/usr/sbin/anacron" subj=system_u:system_r:system_crond_t:s0 key=(null) type=AVC_PATH msg=audit(1162905970.848:89): path="/dev/pts/0" type=AVC msg=audit(1162905970.936:90): avc: denied { ioctl } for pid=2598 comm="anacron" name="0" dev=devpts ino=2 scontext=system_u:system_r:system_crond_t:s0 tcontext=system_u:object_r:rhgb_devpts_t:s0 tclass=chr_file type=SYSCALL msg=audit(1162905970.936:90): arch=40000003 syscall=54 success=no exit=-25 a0=0 a1=5422 a2=0 a3=2 items=0 ppid=2597 pid=2598 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="anacron" exe="/usr/sbin/anacron" subj=system_u:system_r:system_crond_t:s0 key=(null) type=AVC_PATH msg=audit(1162905970.936:90): path="/dev/pts/0" type=AVC msg=audit(1162905970.936:91): avc: denied { write } for pid=2599 comm="anacron" name="run" dev=dm-0 ino=14436616 scontext=system_u:system_r:system_crond_t:s0 tcontext=system_u:object_r:var_run_t:s0 tclass=dir type=AVC msg=audit(1162905970.936:91): avc: denied { add_name } for pid=2599 comm="anacron" name="anacron.pid" scontext=system_u:system_r:system_crond_t:s0 tcontext=system_u:object_r:var_run_t:s0 tclass=dir type=AVC msg=audit(1162905970.936:91): avc: denied { create } for pid=2599 comm="anacron" name="anacron.pid" scontext=system_u:system_r:system_crond_t:s0 tcontext=system_u:object_r:var_run_t:s0 tclass=file type=SYSCALL msg=audit(1162905970.936:91): arch=40000003 syscall=5 success=yes exit=3 a0=804c925 a1=241 a2=1b6 a3=8269020 items=0 ppid=2598 pid=2599 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="anacron" exe="/usr/sbin/anacron" subj=system_u:system_r:system_crond_t:s0 key=(null) type=AVC msg=audit(1162905970.936:92): avc: denied { write } for pid=2599 comm="anacron" name="anacron.pid" dev=dm-0 ino=14437020 scontext=system_u:system_r:system_crond_t:s0 tcontext=system_u:object_r:var_run_t:s0 tclass=file type=SYSCALL msg=audit(1162905970.936:92): arch=40000003 syscall=4 success=yes exit=4 a0=3 a1=b7fe7000 a2=4 a3=4 items=0 ppid=2598 pid=2599 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="anacron" exe="/usr/sbin/anacron" subj=system_u:system_r:system_crond_t:s0 key=(null) type=AVC_PATH msg=audit(1162905970.936:92): path="/var/run/anacron.pid" type=AVC msg=audit(1162905970.964:93): avc: denied { read write } for pid=2608 comm="atd" name="0" dev=devpts ino=2 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:rhgb_devpts_t:s0 tclass=chr_file type=SYSCALL msg=audit(1162905970.964:93): arch=40000003 syscall=11 success=yes exit=0 a0=9823a80 a1=9823f78 a2=9823e80 a3=9823a00 items=0 ppid=2607 pid=2608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="atd" exe="/usr/sbin/atd" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162905970.964:93): path="/dev/pts/0" type=AVC msg=audit(1162905971.144:94): avc: denied { read write } for pid=2670 comm="readahead" name="0" dev=devpts ino=2 scontext=system_u:system_r:readahead_t:s0 tcontext=system_u:object_r:rhgb_devpts_t:s0 tclass=chr_file type=SYSCALL msg=audit(1162905971.144:94): arch=40000003 syscall=11 success=yes exit=0 a0=88ca0d0 a1=88c9f98 a2=88d4658 a3=88c82f8 items=0 ppid=1 pid=2670 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="readahead" exe="/usr/sbin/readahead" subj=system_u:system_r:readahead_t:s0 key=(null) type=AVC_PATH msg=audit(1162905971.144:94): path="/dev/pts/0" type=AVC msg=audit(1162905971.252:95): avc: denied { getattr } for pid=2670 comm="readahead" name="0" dev=devpts ino=2 scontext=system_u:system_r:readahead_t:s0 tcontext=system_u:object_r:rhgb_devpts_t:s0 tclass=chr_file type=SYSCALL msg=audit(1162905971.252:95): arch=40000003 syscall=195 success=yes exit=0 a0=bfa53aa4 a1=bfa53980 a2=40bff4 a3=3 items=0 ppid=1 pid=2670 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="readahead" exe="/usr/sbin/readahead" subj=system_u:system_r:readahead_t:s0 key=(null) type=AVC_PATH msg=audit(1162905971.252:95): path="/dev/pts/0" type=AVC msg=audit(1162905971.360:96): avc: denied { setattr } for pid=2678 comm="cp" name="localtime" dev=dm-0 ino=9330774 scontext=system_u:system_r:initrc_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1162905971.360:96): arch=40000003 syscall=271 success=yes exit=0 a0=bfda1c54 a1=bfda1cbc a2=248ff4 a3=0 items=0 ppid=2673 pid=2678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="cp" exe="/bin/cp" subj=system_u:system_r:initrc_t:s0 key=(null) type=AVC msg=audit(1162905971.360:97): avc: denied { read write } for pid=2679 comm="avahi-daemon" name="0" dev=devpts ino=2 scontext=system_u:system_r:avahi_t:s0 tcontext=system_u:object_r:rhgb_devpts_t:s0 tclass=chr_file type=SYSCALL msg=audit(1162905971.360:97): arch=40000003 syscall=11 success=yes exit=0 a0=85e3370 a1=85e35d0 a2=85eb8f8 a3=85e3168 items=0 ppid=2673 pid=2679 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="avahi-daemon" exe="/usr/sbin/avahi-daemon" subj=system_u:system_r:avahi_t:s0 key=(null) type=AVC_PATH msg=audit(1162905971.360:97): path="/dev/pts/0" type=AVC msg=audit(1162905974.672:98): avc: denied { read write } for pid=2705 comm="hald" name="0" dev=devpts ino=2 scontext=system_u:system_r:hald_t:s0 tcontext=system_u:object_r:rhgb_devpts_t:s0 tclass=chr_file type=SYSCALL msg=audit(1162905974.672:98): arch=40000003 syscall=11 success=yes exit=0 a0=82c4c18 a1=82c5048 a2=82c4f58 a3=82c49b0 items=0 ppid=2704 pid=2705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="hald" exe="/usr/sbin/hald" subj=system_u:system_r:hald_t:s0 key=(null) type=AVC_PATH msg=audit(1162905974.672:98): path="/dev/pts/0" type=AVC msg=audit(1162905977.128:99): avc: denied { accept } for pid=1460 comm="Xorg" lport=6009 scontext=system_u:system_r:rhgb_t:s0 tcontext=system_u:system_r:rhgb_t:s0 tclass=tcp_socket type=AVC msg=audit(1162905977.216:100): avc: denied { write } for pid=2718 comm="xkbcomp" name="xkb" dev=dm-0 ino=14437298 scontext=system_u:system_r:rhgb_t:s0 tcontext=system_u:object_r:xkb_var_lib_t:s0 tclass=dir type=AVC msg=audit(1162905977.216:100): avc: denied { add_name } for pid=2718 comm="xkbcomp" name="server-9.xkm" scontext=system_u:system_r:rhgb_t:s0 tcontext=system_u:object_r:xkb_var_lib_t:s0 tclass=dir type=AVC msg=audit(1162905977.216:100): avc: denied { create } for pid=2718 comm="xkbcomp" name="server-9.xkm" scontext=system_u:system_r:rhgb_t:s0 tcontext=system_u:object_r:xkb_var_lib_t:s0 tclass=file type=SYSCALL msg=audit(1162905977.216:100): arch=40000003 syscall=5 success=yes exit=0 a0=bfdc3efe a1=c1 a2=1b6 a3=2494c0 items=0 ppid=1460 pid=2718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=tty8 comm="xkbcomp" exe="/usr/bin/xkbcomp" subj=system_u:system_r:rhgb_t:s0 key=(null) type=AVC msg=audit(1162905977.216:101): avc: denied { write } for pid=2718 comm="xkbcomp" name="server-9.xkm" dev=dm-0 ino=14437174 scontext=system_u:system_r:rhgb_t:s0 tcontext=system_u:object_r:xkb_var_lib_t:s0 tclass=file type=SYSCALL msg=audit(1162905977.216:101): arch=40000003 syscall=4 success=yes exit=4096 a0=0 a1=b7f0f000 a2=1000 a3=1000 items=0 ppid=1460 pid=2718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=tty8 comm="xkbcomp" exe="/usr/bin/xkbcomp" subj=system_u:system_r:rhgb_t:s0 key=(null) type=AVC_PATH msg=audit(1162905977.216:101): path="/var/lib/xkb/server-9.xkm" type=AVC msg=audit(1162905977.216:102): avc: denied { remove_name } for pid=1460 comm="Xorg" name="server-9.xkm" dev=dm-0 ino=14437174 scontext=system_u:system_r:rhgb_t:s0 tcontext=system_u:object_r:xkb_var_lib_t:s0 tclass=dir type=AVC msg=audit(1162905977.216:103): avc: denied { unlink } for pid=1460 comm="Xorg" name="server-9.xkm" dev=dm-0 ino=14437174 scontext=system_u:system_r:rhgb_t:s0 tcontext=system_u:object_r:xkb_var_lib_t:s0 tclass=file type=AVC msg=audit(1162905980.961:104): avc: denied { read write } for pid=2765 comm="consoletype" name="0" dev=devpts ino=2 scontext=system_u:system_r:consoletype_t:s0 tcontext=system_u:object_r:rhgb_devpts_t:s0 tclass=chr_file type=SYSCALL msg=audit(1162905980.961:104): arch=40000003 syscall=11 success=yes exit=0 a0=96c5d70 a1=96c5db8 a2=96c58e8 a3=96c5c90 items=0 ppid=2764 pid=2765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="consoletype" exe="/sbin/consoletype" subj=system_u:system_r:consoletype_t:s0 key=(null) type=AVC_PATH msg=audit(1162905980.961:104): path="/dev/pts/0" type=AVC msg=audit(1162905980.961:105): avc: denied { getattr } for pid=2765 comm="consoletype" name="0" dev=devpts ino=2 scontext=system_u:system_r:consoletype_t:s0 tcontext=system_u:object_r:rhgb_devpts_t:s0 tclass=chr_file type=SYSCALL msg=audit(1162905980.961:105): arch=40000003 syscall=197 success=yes exit=0 a0=0 a1=bfa696f0 a2=b97ff4 a3=3 items=0 ppid=2764 pid=2765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="consoletype" exe="/sbin/consoletype" subj=system_u:system_r:consoletype_t:s0 key=(null) type=AVC_PATH msg=audit(1162905980.961:105): path="/dev/pts/0" type=AVC msg=audit(1162905980.977:106): avc: denied { read write } for pid=2770 comm="NetworkManager" name="0" dev=devpts ino=2 scontext=system_u:system_r:NetworkManager_t:s0 tcontext=system_u:object_r:rhgb_devpts_t:s0 tclass=chr_file type=SYSCALL msg=audit(1162905980.977:106): arch=40000003 syscall=11 success=yes exit=0 a0=90ebe88 a1=90ec2d0 a2=90ec198 a3=90ebad8 items=0 ppid=2769 pid=2770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="NetworkManager" exe="/usr/sbin/NetworkManager" subj=system_u:system_r:NetworkManager_t:s0 key=(null) type=AVC_PATH msg=audit(1162905980.977:106): path="/dev/pts/0" type=AVC msg=audit(1162905982.669:107): avc: denied { read write } for pid=2796 comm="smartd" name="0" dev=devpts ino=2 scontext=system_u:system_r:fsdaemon_t:s0 tcontext=system_u:object_r:rhgb_devpts_t:s0 tclass=chr_file type=SYSCALL msg=audit(1162905982.669:107): arch=40000003 syscall=11 success=yes exit=0 a0=8db3ba8 a1=8db3ff8 a2=8db3ef8 a3=8db3a78 items=0 ppid=2795 pid=2796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="smartd" exe="/usr/sbin/smartd" subj=system_u:system_r:fsdaemon_t:s0 key=(null) type=AVC_PATH msg=audit(1162905982.669:107): path="/dev/pts/0" type=AVC msg=audit(1162905985.521:108): avc: denied { ioctl } for pid=1460 comm="Xorg" name="nvidiactl" dev=tmpfs ino=1545 scontext=system_u:system_r:rhgb_t:s0 tcontext=system_u:object_r:xserver_misc_device_t:s0 tclass=chr_file type=AVC msg=audit(1162905985.569:109): avc: denied { write } for pid=1460 comm="Xorg" name="00.0" dev=proc ino=-268435022 scontext=system_u:system_r:rhgb_t:s0 tcontext=system_u:object_r:proc_t:s0 tclass=file type=AVC msg=audit(1162905985.573:110): avc: denied { chown } for pid=1460 comm="Xorg" capability=0 scontext=system_u:system_r:rhgb_t:s0 tcontext=system_u:system_r:rhgb_t:s0 tclass=capability type=AVC msg=audit(1162905985.573:111): avc: denied { setattr } for pid=1460 comm="Xorg" name="tty0" dev=tmpfs ino=761 scontext=system_u:system_r:rhgb_t:s0 tcontext=system_u:object_r:tty_device_t:s0 tclass=chr_file type=USER_ERR msg=audit(1162905989.541:112): user pid=2827 uid=0 auid=4294967295 subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 msg='PAM: bad_ident acct=? : exe="/usr/sbin/gdm-binary" (hostname=?, addr=?, terminal=console res=failed)' type=USER_AUTH msg=audit(1162906001.198:113): user pid=2934 uid=0 auid=4294967295 subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 msg='PAM: authentication acct=kmacmill : exe="/usr/sbin/gdm-binary" (hostname=?, addr=?, terminal=:0 res=success)' type=USER_ACCT msg=audit(1162906001.206:114): user pid=2934 uid=0 auid=4294967295 subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 msg='PAM: accounting acct=kmacmill : exe="/usr/sbin/gdm-binary" (hostname=?, addr=?, terminal=:0 res=success)' type=CRED_ACQ msg=audit(1162906001.206:115): user pid=2934 uid=0 auid=4294967295 subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 msg='PAM: setcred acct=kmacmill : exe="/usr/sbin/gdm-binary" (hostname=?, addr=?, terminal=:0 res=success)' type=LOGIN msg=audit(1162906001.210:116): login pid=2934 uid=0 old auid=4294967295 new auid=500 type=USER_START msg=audit(1162906001.254:117): user pid=2934 uid=0 auid=500 subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 msg='PAM: session open acct=kmacmill : exe="/usr/sbin/gdm-binary" (hostname=?, addr=?, terminal=:0 res=success)' type=USER_LOGIN msg=audit(1162906001.254:118): user pid=2934 uid=0 auid=500 subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 msg='uid=500: exe="/usr/sbin/gdm-binary" (hostname=localhost.localdomain, addr=127.0.0.1, terminal=:0 res=success)' type=AVC msg=audit(1162906001.634:119): avc: denied { read } for pid=2965 comm="gdm-binary" name=".ICEauthority" dev=dm-0 ino=6570930 scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=staff_u:object_r:staff_iceauth_home_t:s0 tclass=file type=SYSCALL msg=audit(1162906001.634:119): arch=40000003 syscall=5 success=yes exit=9 a0=80865d5 a1=0 a2=1 a3=a items=0 ppid=2934 pid=2965 auid=500 uid=0 gid=500 euid=0 suid=0 fsuid=0 egid=0 sgid=500 fsgid=0 tty=(none) comm="gdm-binary" exe="/usr/sbin/gdm-binary" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162906001.654:120): avc: denied { getattr } for pid=2965 comm="gdm-binary" name=".ICEauthority" dev=dm-0 ino=6570930 scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=staff_u:object_r:staff_iceauth_home_t:s0 tclass=file type=SYSCALL msg=audit(1162906001.654:120): arch=40000003 syscall=196 success=yes exit=0 a0=80865d5 a1=bffc5400 a2=82dff4 a3=3 items=0 ppid=2934 pid=2965 auid=500 uid=0 gid=500 euid=0 suid=0 fsuid=0 egid=0 sgid=500 fsgid=0 tty=(none) comm="gdm-binary" exe="/usr/sbin/gdm-binary" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162906001.654:120): path="/home/kmacmill/.ICEauthority" type=AVC msg=audit(1162906001.670:121): avc: denied { read } for pid=2978 comm="xrdb" name=".gdmF70UIT" dev=dm-0 ino=14469320 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162906001.670:121): arch=40000003 syscall=33 success=yes exit=0 a0=bfaeffce a1=4 a2=4db18a64 a3=bfaeffce items=0 ppid=2965 pid=2978 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="xrdb" exe="/usr/bin/xrdb" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162906001.974:122): avc: denied { getattr } for pid=3019 comm="dbus-daemon" name="/" dev=dm-0 ino=2 scontext=staff_u:staff_r:staff_dbusd_t:s0 tcontext=system_u:object_r:fs_t:s0 tclass=filesystem type=SYSCALL msg=audit(1162906001.974:122): arch=40000003 syscall=100 success=yes exit=0 a0=5 a1=bff14d8c a2=493ff4 a3=ffffffb8 items=0 ppid=3018 pid=3019 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="dbus-daemon" exe="/bin/dbus-daemon" subj=staff_u:staff_r:staff_dbusd_t:s0 key=(null) type=AVC msg=audit(1162906001.974:123): avc: denied { search } for pid=3019 comm="dbus-daemon" name="kmacmill" dev=dm-0 ino=6547202 scontext=staff_u:staff_r:staff_dbusd_t:s0 tcontext=staff_u:object_r:staff_home_dir_t:s0 tclass=dir type=AVC msg=audit(1162906001.974:123): avc: denied { search } for pid=3019 comm="dbus-daemon" name=".local" dev=dm-0 ino=6815703 scontext=staff_u:staff_r:staff_dbusd_t:s0 tcontext=staff_u:object_r:staff_home_t:s0 tclass=dir type=SYSCALL msg=audit(1162906001.974:123): arch=40000003 syscall=5 success=no exit=-2 a0=8eddb98 a1=18800 a2=36025c a3=bff14ec8 items=0 ppid=3018 pid=3019 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="dbus-daemon" exe="/bin/dbus-daemon" subj=staff_u:staff_r:staff_dbusd_t:s0 key=(null) type=AVC msg=audit(1162906003.926:124): avc: denied { write } for pid=2965 comm="gnome-session" name=".ICE-unix" dev=dm-0 ino=14567572 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:ice_tmp_t:s0 tclass=dir type=AVC msg=audit(1162906003.926:124): avc: denied { add_name } for pid=2965 comm="gnome-session" name="2965" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:ice_tmp_t:s0 tclass=dir type=AVC msg=audit(1162906003.926:124): avc: denied { create } for pid=2965 comm="gnome-session" name="2965" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:ice_tmp_t:s0 tclass=sock_file type=SYSCALL msg=audit(1162906003.926:124): arch=40000003 syscall=102 success=yes exit=0 a0=2 a1=bf9ce660 a2=4dc5d770 a3=0 items=0 ppid=2934 pid=2965 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-session" exe="/usr/bin/gnome-session" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162906004.018:125): avc: denied { read write } for pid=3029 comm="gnome-settings-" name="[11958]" dev=sockfs ino=11958 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_dbusd_t:s0 tclass=netlink_selinux_socket type=SYSCALL msg=audit(1162906004.018:125): arch=40000003 syscall=11 success=yes exit=0 a0=8ee4b88 a1=8ee4430 a2=8ee4d68 a3=b items=0 ppid=3028 pid=3029 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-settings-" exe="/usr/libexec/gnome-settings-daemon" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1162906004.018:125): path="socket:[11958]" type=AVC msg=audit(1162906004.602:126): avc: denied { read } for pid=3029 comm="gnome-settings-" name="resolv.conf" dev=dm-0 ino=9330746 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:net_conf_t:s0 tclass=file type=SYSCALL msg=audit(1162906004.602:126): arch=40000003 syscall=5 success=yes exit=21 a0=581d13 a1=0 a2=1b6 a3=9ddb1c8 items=0 ppid=3028 pid=3029 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-settings-" exe="/usr/libexec/gnome-settings-daemon" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162906004.734:127): avc: denied { read } for pid=3037 comm="esd" name="default.conf" dev=dm-0 ino=9330152 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:alsa_etc_rw_t:s0 tclass=file type=SYSCALL msg=audit(1162906004.734:127): arch=40000003 syscall=5 success=yes exit=14 a0=99dd258 a1=0 a2=1b6 a3=99dd278 items=0 ppid=1 pid=3037 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="esd" exe="/usr/bin/esd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162906005.982:128): avc: denied { write } for pid=3056 comm="metacity" name="2965" dev=dm-0 ino=14567716 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:ice_tmp_t:s0 tclass=sock_file type=SYSCALL msg=audit(1162906005.982:128): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=bfe71c10 a2=4dc5d770 a3=15 items=0 ppid=1 pid=3056 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="metacity" exe="/usr/bin/metacity" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162906006.202:129): avc: denied { sigchld } for pid=3073 comm="dbus-daemon" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_dbusd_t:s0 tclass=process type=SYSCALL msg=audit(1162906006.202:129): arch=40000003 syscall=7 success=yes exit=0 a0=c02 a1=bff14918 a2=1 a3=c02 items=0 ppid=3021 pid=3073 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="dbus-daemon" exe="/bin/dbus-daemon" subj=staff_u:staff_r:staff_dbusd_t:s0 key=(null) type=AVC msg=audit(1162906006.414:130): avc: denied { execute } for pid=3080 comm="beagle-search" name="mono" dev=dm-0 ino=10323612 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:mono_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162906006.414:130): arch=40000003 syscall=33 success=yes exit=0 a0=8e8db10 a1=1 a2=11 a3=8e8db10 items=0 ppid=1 pid=3080 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="beagle-search" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162906006.414:131): avc: denied { read } for pid=3080 comm="beagle-search" name="mono" dev=dm-0 ino=10323612 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:mono_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162906006.414:131): arch=40000003 syscall=33 success=yes exit=0 a0=8e8db10 a1=4 a2=ffffffff a3=8e8db10 items=0 ppid=1 pid=3080 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="beagle-search" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162906006.414:132): avc: denied { execute_no_trans } for pid=3080 comm="beagle-search" name="mono" dev=dm-0 ino=10323612 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:mono_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162906006.414:132): arch=40000003 syscall=11 success=yes exit=0 a0=8e8d928 a1=8e8daf8 a2=8e8e200 a3=8e8daf8 items=0 ppid=1 pid=3080 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="mono" exe="/usr/bin/mono" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1162906006.414:132): path="/usr/bin/mono" type=AVC msg=audit(1162906006.718:133): avc: denied { execheap } for pid=3080 comm="mono" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=process type=AVC msg=audit(1162906006.718:133): avc: denied { execmem } for pid=3080 comm="mono" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=process type=SYSCALL msg=audit(1162906006.718:133): arch=40000003 syscall=125 success=yes exit=0 a0=9fec000 a1=1000 a2=7 a3=1 items=0 ppid=1 pid=3080 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="mono" exe="/usr/bin/mono" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162906008.014:134): avc: denied { ioctl } for pid=3112 comm="pam_timestamp_c" name="[11821]" dev=pipefs ino=11821 scontext=staff_u:staff_r:pam_t:s0 tcontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tclass=fifo_file type=SYSCALL msg=audit(1162906008.014:134): arch=40000003 syscall=54 success=no exit=-22 a0=2 a1=5401 a2=bfe86abc a3=bfe86afc items=0 ppid=3106 pid=3112 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=(none) comm="pam_timestamp_c" exe="/sbin/pam_timestamp_check" subj=staff_u:staff_r:pam_t:s0 key=(null) type=AVC_PATH msg=audit(1162906008.014:134): path="pipe:[11821]" type=AVC msg=audit(1162906008.338:135): avc: denied { execheap } for pid=3111 comm="mono" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=process type=AVC msg=audit(1162906008.338:135): avc: denied { execmem } for pid=3111 comm="mono" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=process type=SYSCALL msg=audit(1162906008.338:135): arch=40000003 syscall=125 success=yes exit=0 a0=994f000 a1=1000 a2=7 a3=1 items=0 ppid=3093 pid=3111 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="mono" exe="/usr/bin/mono" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162906010.194:136): avc: denied { read } for pid=3087 comm="sealert" name=".gdmF70UIT" dev=dm-0 ino=14469320 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162906010.194:136): arch=40000003 syscall=33 success=yes exit=0 a0=bf82ce56 a1=4 a2=4db18a64 a3=bf82ce56 items=0 ppid=1 pid=3087 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="sealert" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162906018.299:137): avc: denied { read } for pid=3111 comm="beagled" name="max_user_instances" dev=proc ino=-268435218 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=file type=SYSCALL msg=audit(1162906018.299:137): arch=40000003 syscall=5 success=yes exit=24 a0=f0733c a1=0 a2=1 a3=9ad4110 items=0 ppid=1 pid=3111 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="beagled" exe="/usr/bin/mono" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162906035.312:138): avc: denied { write } for pid=3159 comm="nm-vpnc-auth-di" name="2965" dev=dm-0 ino=14567716 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:ice_tmp_t:s0 tclass=sock_file type=SYSCALL msg=audit(1162906035.312:138): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=bfef76b0 a2=4dc5d770 a3=15 items=0 ppid=3098 pid=3159 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="nm-vpnc-auth-di" exe="/usr/libexec/nm-vpnc-auth-dialog" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162906041.868:139): avc: denied { read write } for pid=3191 comm="notification-da" name="[11958]" dev=sockfs ino=11958 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_dbusd_t:s0 tclass=netlink_selinux_socket type=SYSCALL msg=audit(1162906041.868:139): arch=40000003 syscall=11 success=yes exit=0 a0=8ef6540 a1=8eea710 a2=8ef66c8 a3=15 items=0 ppid=3190 pid=3191 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="notification-da" exe="/usr/libexec/notification-daemon" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1162906041.868:139): path="socket:[11958]" type=AVC msg=audit(1162906044.868:140): avc: denied { read } for pid=3193 comm="firefox-bin" name=".gdmF70UIT" dev=dm-0 ino=14469320 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162906044.868:140): arch=40000003 syscall=33 success=yes exit=0 a0=bffb3fcb a1=4 a2=4db18a64 a3=bffb3fcb items=0 ppid=1 pid=3193 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162906044.868:141): avc: denied { getattr } for pid=3193 comm="firefox-bin" name=".gdmF70UIT" dev=dm-0 ino=14469320 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162906044.868:141): arch=40000003 syscall=197 success=yes exit=0 a0=4 a1=bffb1b4c a2=f64ff4 a3=8f15140 items=0 ppid=1 pid=3193 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162906044.868:141): path="/tmp/.gdmF70UIT" type=AVC msg=audit(1162906050.593:142): avc: denied { search } for pid=3205 comm="evolution" name="nscd" dev=dm-0 ino=14436932 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=system_u:object_r:nscd_var_run_t:s0 tclass=dir type=SYSCALL msg=audit(1162906050.593:142): arch=40000003 syscall=102 success=no exit=-2 a0=3 a1=bf99bfe8 a2=fb4ff4 a3=3 items=0 ppid=1 pid=3205 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC msg=audit(1162906050.597:143): avc: denied { read } for pid=3205 comm="evolution" name=".gdmF70UIT" dev=dm-0 ino=14469320 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162906050.597:143): arch=40000003 syscall=33 success=yes exit=0 a0=bf99edff a1=4 a2=4db18a64 a3=bf99edff items=0 ppid=1 pid=3205 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC msg=audit(1162906050.597:144): avc: denied { getattr } for pid=3205 comm="evolution" name=".gdmF70UIT" dev=dm-0 ino=14469320 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162906050.597:144): arch=40000003 syscall=197 success=yes exit=0 a0=4 a1=bf99bf1c a2=fb4ff4 a3=9602730 items=0 ppid=1 pid=3205 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC_PATH msg=audit(1162906050.597:144): path="/tmp/.gdmF70UIT" type=AVC msg=audit(1162906050.609:145): avc: denied { search } for pid=3205 comm="evolution" name=".ICE-unix" dev=dm-0 ino=14567572 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=system_u:object_r:ice_tmp_t:s0 tclass=dir type=AVC msg=audit(1162906050.609:145): avc: denied { write } for pid=3205 comm="evolution" name="2965" dev=dm-0 ino=14567716 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=staff_u:object_r:ice_tmp_t:s0 tclass=sock_file type=SYSCALL msg=audit(1162906050.609:145): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=bf99c020 a2=4dc5d770 a3=15 items=0 ppid=1 pid=3205 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC msg=audit(1162906050.609:146): avc: denied { read } for pid=3205 comm="evolution" name=".ICEauthority" dev=dm-0 ino=6570930 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=staff_u:object_r:staff_iceauth_home_t:s0 tclass=file type=SYSCALL msg=audit(1162906050.609:146): arch=40000003 syscall=33 success=yes exit=0 a0=9618218 a1=4 a2=4dc5d770 a3=9618218 items=0 ppid=1 pid=3205 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC msg=audit(1162906050.609:147): avc: denied { getattr } for pid=3205 comm="evolution" name=".ICEauthority" dev=dm-0 ino=6570930 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=staff_u:object_r:staff_iceauth_home_t:s0 tclass=file type=SYSCALL msg=audit(1162906050.609:147): arch=40000003 syscall=197 success=yes exit=0 a0=b a1=bf99c0bc a2=fb4ff4 a3=9618af8 items=0 ppid=1 pid=3205 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC_PATH msg=audit(1162906050.609:147): path="/home/kmacmill/.ICEauthority" type=AVC msg=audit(1162906053.301:148): avc: denied { read } for pid=3207 comm="xchat" name="resolv.conf" dev=dm-0 ino=9334542 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:net_conf_t:s0 tclass=file type=SYSCALL msg=audit(1162906053.301:148): arch=40000003 syscall=5 success=yes exit=9 a0=432d13 a1=0 a2=1b6 a3=9b48c68 items=0 ppid=3203 pid=3207 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="xchat" exe="/usr/bin/xchat" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162906053.377:149): avc: denied { write } for pid=3214 comm="evolution-data-" name="[13401]" dev=pipefs ino=13401 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=fifo_file type=SYSCALL msg=audit(1162906053.377:149): arch=40000003 syscall=11 success=yes exit=0 a0=833e808 a1=833e478 a2=833e4d0 a3=0 items=0 ppid=1 pid=3214 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC_PATH msg=audit(1162906053.377:149): path="pipe:[13401]" type=AVC msg=audit(1162906053.497:150): avc: denied { read } for pid=3214 comm="evolution-data-" name="gconv-modules.cache" dev=dm-0 ino=10387675 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=user_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1162906053.497:150): arch=40000003 syscall=5 success=yes exit=3 a0=6a29dc a1=0 a2=0 a3=0 items=0 ppid=1 pid=3214 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC msg=audit(1162906053.497:151): avc: denied { getattr } for pid=3214 comm="evolution-data-" name="gconv-modules.cache" dev=dm-0 ino=10387675 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=user_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1162906053.497:151): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bf841ebc a2=6b9ff4 a3=3 items=0 ppid=1 pid=3214 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC_PATH msg=audit(1162906053.497:151): path="/usr/lib/gconv/gconv-modules.cache" type=AVC msg=audit(1162906053.501:152): avc: denied { getsched } for pid=3214 comm="evolution-data-" scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:staff_r:staff_evolution_server_t:s0 tclass=process type=SYSCALL msg=audit(1162906053.501:152): arch=40000003 syscall=155 success=yes exit=0 a0=c8e a1=b7f858dc a2=12bff4 a3=b7f856d0 items=0 ppid=1 pid=3214 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC msg=audit(1162906053.501:153): avc: denied { search } for pid=3214 comm="evolution-data-" name="locale" dev=dm-0 ino=10311905 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=dir type=AVC msg=audit(1162906053.501:153): avc: denied { read } for pid=3214 comm="evolution-data-" name="locale.alias" dev=dm-0 ino=10314350 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1162906053.501:153): arch=40000003 syscall=5 success=yes exit=3 a0=4df2984c a1=8000 a2=1b6 a3=8ea7480 items=0 ppid=1 pid=3214 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC msg=audit(1162906053.501:154): avc: denied { getattr } for pid=3214 comm="evolution-data-" name="locale.alias" dev=dm-0 ino=10314350 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1162906053.501:154): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bf8423e8 a2=6b9ff4 a3=8ea7480 items=0 ppid=1 pid=3214 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC_PATH msg=audit(1162906053.501:154): path="/usr/share/locale/locale.alias" type=AVC msg=audit(1162906053.501:155): avc: denied { read } for pid=3214 comm="evolution-data-" name="locale-archive" dev=dm-0 ino=10328905 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=user_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1162906053.501:155): arch=40000003 syscall=5 success=yes exit=3 a0=6a2a00 a1=8000 a2=1 a3=bf8423b0 items=0 ppid=1 pid=3214 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC msg=audit(1162906053.501:156): avc: denied { getattr } for pid=3214 comm="evolution-data-" name="locale-archive" dev=dm-0 ino=10328905 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=user_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1162906053.501:156): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=6baaa0 a2=6b9ff4 a3=bf8423b0 items=0 ppid=1 pid=3214 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC_PATH msg=audit(1162906053.501:156): path="/usr/lib/locale/locale-archive" type=AVC msg=audit(1162906053.501:157): avc: denied { read } for pid=3214 comm="evolution-data-" name="tmp" dev=dm-0 ino=14469313 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=system_u:object_r:tmp_t:s0 tclass=dir type=SYSCALL msg=audit(1162906053.501:157): arch=40000003 syscall=5 success=yes exit=9 a0=8ea95a8 a1=18800 a2=bdefc0 a3=8ea95a8 items=0 ppid=1 pid=3214 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC msg=audit(1162906053.501:158): avc: denied { getattr } for pid=3214 comm="evolution-data-" name="tmp" dev=dm-0 ino=14469313 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=system_u:object_r:tmp_t:s0 tclass=dir type=SYSCALL msg=audit(1162906053.501:158): arch=40000003 syscall=197 success=yes exit=0 a0=9 a1=bf8424cc a2=6b9ff4 a3=9 items=0 ppid=1 pid=3214 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC_PATH msg=audit(1162906053.501:158): path="/tmp" type=AVC msg=audit(1162906053.501:159): avc: denied { search } for pid=3214 comm="evolution-data-" name="tmp" dev=dm-0 ino=14469313 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=system_u:object_r:tmp_t:s0 tclass=dir type=AVC msg=audit(1162906053.501:159): avc: denied { getattr } for pid=3214 comm="evolution-data-" name="orbit-kmacmill" dev=dm-0 ino=14567713 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=dir type=SYSCALL msg=audit(1162906053.501:159): arch=40000003 syscall=195 success=yes exit=0 a0=8ea9a68 a1=bf842510 a2=6b9ff4 a3=3 items=0 ppid=1 pid=3214 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC_PATH msg=audit(1162906053.501:159): path="/tmp/orbit-kmacmill" type=AVC msg=audit(1162906053.501:160): avc: denied { setattr } for pid=3214 comm="evolution-data-" name="orbit-kmacmill" dev=dm-0 ino=14567713 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=dir type=SYSCALL msg=audit(1162906053.501:160): arch=40000003 syscall=30 success=yes exit=0 a0=8ea9a90 a1=bf842564 a2=4e570f80 a3=1f4 items=0 ppid=1 pid=3214 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC msg=audit(1162906053.501:161): avc: denied { read } for pid=3214 comm="evolution-data-" name="urandom" dev=tmpfs ino=2054 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=system_u:object_r:urandom_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1162906053.501:161): arch=40000003 syscall=5 success=yes exit=9 a0=4def9880 a1=8000 a2=1b6 a3=8eaa800 items=0 ppid=1 pid=3214 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC msg=audit(1162906053.501:162): avc: denied { getattr } for pid=3214 comm="evolution-data-" name="urandom" dev=tmpfs ino=2054 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=system_u:object_r:urandom_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1162906053.501:162): arch=40000003 syscall=197 success=yes exit=0 a0=9 a1=bf8424ec a2=6b9ff4 a3=8eaa800 items=0 ppid=1 pid=3214 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC_PATH msg=audit(1162906053.501:162): path="/dev/urandom" type=AVC msg=audit(1162906053.501:163): avc: denied { ioctl } for pid=3214 comm="evolution-data-" name="urandom" dev=tmpfs ino=2054 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=system_u:object_r:urandom_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1162906053.501:163): arch=40000003 syscall=54 success=no exit=-22 a0=9 a1=5401 a2=bf84244c a3=bf84248c items=0 ppid=1 pid=3214 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC_PATH msg=audit(1162906053.501:163): path="/dev/urandom" type=AVC msg=audit(1162906053.505:164): avc: denied { search } for pid=3214 comm="evolution-data-" name="gconfd-kmacmill" dev=dm-0 ino=15648282 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=dir type=AVC msg=audit(1162906053.505:164): avc: denied { read } for pid=3214 comm="evolution-data-" name="ior" dev=dm-0 ino=15648171 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162906053.505:164): arch=40000003 syscall=5 success=yes exit=9 a0=8eabe38 a1=0 a2=1b6 a3=8eabe60 items=0 ppid=1 pid=3214 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC msg=audit(1162906053.505:165): avc: denied { getattr } for pid=3214 comm="evolution-data-" name="ior" dev=dm-0 ino=15648171 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162906053.505:165): arch=40000003 syscall=197 success=yes exit=0 a0=9 a1=bf841b78 a2=6b9ff4 a3=8eabe60 items=0 ppid=1 pid=3214 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC_PATH msg=audit(1162906053.505:165): path="/tmp/gconfd-kmacmill/lock/ior" type=AVC msg=audit(1162906053.505:166): avc: denied { write } for pid=3214 comm="evolution-data-" name="linc-bd0-0-6f75742e134f6" dev=dm-0 ino=14567714 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=sock_file type=AVC msg=audit(1162906053.505:166): avc: denied { connectto } for pid=3214 comm="evolution-data-" name="linc-bd0-0-6f75742e134f6" scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=unix_stream_socket type=SYSCALL msg=audit(1162906053.505:166): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=bf842290 a2=4e570f80 a3=0 items=0 ppid=1 pid=3214 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC_PATH msg=audit(1162906053.505:166): path="/tmp/orbit-kmacmill/linc-bd0-0-6f75742e134f6" type=AVC msg=audit(1162906053.505:167): avc: denied { write } for pid=3214 comm="evolution-data-" name="orbit-kmacmill" dev=dm-0 ino=14567713 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=dir type=AVC msg=audit(1162906053.505:167): avc: denied { add_name } for pid=3214 comm="evolution-data-" name="linc-c8e-0-2f6d638e7c118" scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=dir type=AVC msg=audit(1162906053.505:167): avc: denied { create } for pid=3214 comm="evolution-data-" name="linc-c8e-0-2f6d638e7c118" scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=sock_file type=SYSCALL msg=audit(1162906053.505:167): arch=40000003 syscall=102 success=yes exit=0 a0=2 a1=bf8422d0 a2=4e570f80 a3=b7f8569c items=0 ppid=1 pid=3214 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC msg=audit(1162906053.505:168): avc: denied { connectto } for pid=3024 comm="gconfd-2" name="linc-c8e-0-2f6d638e7c118" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_evolution_server_t:s0 tclass=unix_stream_socket type=SYSCALL msg=audit(1162906053.505:168): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=bf902a90 a2=4e570f80 a3=0 items=0 ppid=1 pid=3024 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1162906053.505:168): path="/tmp/orbit-kmacmill/linc-c8e-0-2f6d638e7c118" type=AVC msg=audit(1162906053.837:169): avc: denied { write } for pid=3214 comm="evolution-data-" name="bonobo-activation-register.lock" dev=dm-0 ino=14567725 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162906053.837:169): arch=40000003 syscall=5 success=yes exit=16 a0=8eb28b8 a1=42 a2=1c0 a3=8eb28b8 items=0 ppid=1 pid=3214 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC msg=audit(1162906053.837:170): avc: denied { lock } for pid=3214 comm="evolution-data-" name="bonobo-activation-register.lock" dev=dm-0 ino=14567725 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162906053.837:170): arch=40000003 syscall=221 success=yes exit=0 a0=10 a1=7 a2=bf84252c a3=bf84252c items=0 ppid=1 pid=3214 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC_PATH msg=audit(1162906053.837:170): path="/tmp/orbit-kmacmill/bonobo-activation-register.lock" type=AVC msg=audit(1162906054.041:171): avc: denied { getattr } for pid=3214 comm="evolution-data-" name="[13401]" dev=pipefs ino=13401 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=fifo_file type=SYSCALL msg=audit(1162906054.041:171): arch=40000003 syscall=197 success=yes exit=0 a0=1d a1=bf842564 a2=6b9ff4 a3=8ebfca0 items=0 ppid=1 pid=3214 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC_PATH msg=audit(1162906054.041:171): path="pipe:[13401]" type=USER_AVC msg=audit(1162906057.949:172): user pid=2324 uid=81 auid=4294967295 subj=system_u:system_r:system_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager member=state dest=org.freedesktop.NetworkManager spid=3205 tpid=2771 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=system_u:system_r:NetworkManager_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1162906057.949:173): user pid=2324 uid=81 auid=4294967295 subj=system_u:system_r:system_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.22 spid=2771 tpid=3205 scontext=system_u:system_r:NetworkManager_t:s0 tcontext=staff_u:staff_r:staff_evolution_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=AVC msg=audit(1162906057.997:174): avc: denied { create } for pid=3226 comm="evolution" scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=staff_u:staff_r:staff_evolution_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1162906057.997:174): arch=40000003 syscall=102 success=yes exit=35 a0=1 a1=b184f274 a2=fb4ff4 a3=8cfd7f items=0 ppid=1 pid=3226 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC msg=audit(1162906057.997:175): avc: denied { bind } for pid=3226 comm="evolution" scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=staff_u:staff_r:staff_evolution_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1162906057.997:175): arch=40000003 syscall=102 success=yes exit=0 a0=2 a1=b184f274 a2=fb4ff4 a3=23 items=0 ppid=1 pid=3226 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC msg=audit(1162906057.997:176): avc: denied { getattr } for pid=3226 comm="evolution" scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=staff_u:staff_r:staff_evolution_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1162906057.997:176): arch=40000003 syscall=102 success=yes exit=0 a0=6 a1=b184f274 a2=fb4ff4 a3=23 items=0 ppid=1 pid=3226 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC msg=audit(1162906058.001:177): avc: denied { write } for pid=3226 comm="evolution" scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=staff_u:staff_r:staff_evolution_t:s0 tclass=netlink_route_socket type=AVC msg=audit(1162906058.001:177): avc: denied { nlmsg_read } for pid=3226 comm="evolution" scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=staff_u:staff_r:staff_evolution_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1162906058.001:177): arch=40000003 syscall=102 success=yes exit=20 a0=b a1=b184e1b4 a2=fb4ff4 a3=0 items=0 ppid=1 pid=3226 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC msg=audit(1162906058.001:178): avc: denied { read } for pid=3226 comm="evolution" scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=staff_u:staff_r:staff_evolution_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1162906058.001:178): arch=40000003 syscall=102 success=yes exit=188 a0=11 a1=b184e1b4 a2=fb4ff4 a3=0 items=0 ppid=1 pid=3226 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC msg=audit(1162906058.001:179): avc: denied { search } for pid=3226 comm="evolution" name="nscd" dev=dm-0 ino=14436932 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=system_u:object_r:nscd_var_run_t:s0 tclass=dir type=SYSCALL msg=audit(1162906058.001:179): arch=40000003 syscall=102 success=no exit=-2 a0=3 a1=b184ee74 a2=fb4ff4 a3=0 items=0 ppid=1 pid=3226 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC msg=audit(1162906060.209:180): avc: denied { write } for pid=3239 comm="evolution-alarm" name="[13479]" dev=pipefs ino=13479 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=fifo_file type=SYSCALL msg=audit(1162906060.209:180): arch=40000003 syscall=11 success=yes exit=0 a0=833fbc0 a1=8346628 a2=83477f8 a3=0 items=0 ppid=1 pid=3239 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC_PATH msg=audit(1162906060.209:180): path="pipe:[13479]" type=AVC msg=audit(1162906060.433:181): avc: denied { read } for pid=3239 comm="evolution-alarm" name="libeutil.so.0.0.0" dev=dm-0 ino=14174689 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=system_u:object_r:shlib_t:s0 tclass=file type=SYSCALL msg=audit(1162906060.433:181): arch=40000003 syscall=5 success=yes exit=3 a0=bf922090 a1=0 a2=0 a3=bf922090 items=0 ppid=1 pid=3239 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC msg=audit(1162906060.433:182): avc: denied { getattr } for pid=3239 comm="evolution-alarm" name="libeutil.so.0.0.0" dev=dm-0 ino=14174689 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=system_u:object_r:shlib_t:s0 tclass=file type=SYSCALL msg=audit(1162906060.433:182): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bf9220e4 a2=daafc0 a3=4 items=0 ppid=1 pid=3239 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC_PATH msg=audit(1162906060.433:182): path="/usr/lib/evolution/2.10/libeutil.so.0.0.0" type=AVC msg=audit(1162906060.433:183): avc: denied { execute } for pid=3239 comm="evolution-alarm" name="libeutil.so.0.0.0" dev=dm-0 ino=14174689 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=system_u:object_r:shlib_t:s0 tclass=file type=SYSCALL msg=audit(1162906060.433:183): arch=40000003 syscall=192 success=yes exit=1297682432 a0=4d591000 a1=33cd0 a2=5 a3=802 items=0 ppid=1 pid=3239 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC_PATH msg=audit(1162906060.433:183): path="/usr/lib/evolution/2.10/libeutil.so.0.0.0" type=AVC msg=audit(1162906060.433:184): avc: denied { read } for pid=3239 comm="evolution-alarm" name="ld.so.cache" dev=dm-0 ino=9330239 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=user_u:object_r:ld_so_cache_t:s0 tclass=file type=SYSCALL msg=audit(1162906060.433:184): arch=40000003 syscall=5 success=yes exit=3 a0=da8037 a1=0 a2=dab650 a3=ffffffff items=0 ppid=1 pid=3239 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC msg=audit(1162906060.433:185): avc: denied { getattr } for pid=3239 comm="evolution-alarm" name="ld.so.cache" dev=dm-0 ino=9330239 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=user_u:object_r:ld_so_cache_t:s0 tclass=file type=SYSCALL msg=audit(1162906060.433:185): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bf921fd8 a2=daafc0 a3=ffffffff items=0 ppid=1 pid=3239 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC_PATH msg=audit(1162906060.433:185): path="/etc/ld.so.cache" type=AVC msg=audit(1162906060.673:186): avc: denied { read } for pid=3239 comm="evolution-alarm" name="ld-2.5.90.so" dev=dm-0 ino=13716563 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=system_u:object_r:ld_so_t:s0 tclass=file type=SYSCALL msg=audit(1162906060.673:186): arch=40000003 syscall=125 success=yes exit=0 a0=daa000 a1=1000 a2=1 a3=380 items=0 ppid=1 pid=3239 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC_PATH msg=audit(1162906060.673:186): path="/lib/ld-2.5.90.so" type=AVC msg=audit(1162906060.677:187): avc: denied { getsched } for pid=3239 comm="evolution-alarm" scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tclass=process type=SYSCALL msg=audit(1162906060.677:187): arch=40000003 syscall=155 success=yes exit=0 a0=ca7 a1=b7f8daec a2=ba4ff4 a3=b7f8d8e0 items=0 ppid=1 pid=3239 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC msg=audit(1162906060.677:188): avc: denied { read } for pid=3239 comm="evolution-alarm" name="nsswitch.conf" dev=dm-0 ino=9330856 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1162906060.677:188): arch=40000003 syscall=5 success=yes exit=3 a0=2c3e3d a1=0 a2=1b6 a3=87b3a00 items=0 ppid=1 pid=3239 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC msg=audit(1162906060.677:189): avc: denied { getattr } for pid=3239 comm="evolution-alarm" name="nsswitch.conf" dev=dm-0 ino=9330856 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1162906060.677:189): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bf9221c8 a2=2dbff4 a3=87b3a00 items=0 ppid=1 pid=3239 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC_PATH msg=audit(1162906060.677:189): path="/etc/nsswitch.conf" type=AVC msg=audit(1162906060.677:190): avc: denied { read } for pid=3239 comm="evolution-alarm" name="ld.so.cache" dev=dm-0 ino=9330239 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=user_u:object_r:ld_so_cache_t:s0 tclass=file type=SYSCALL msg=audit(1162906060.677:190): arch=40000003 syscall=5 success=yes exit=3 a0=da8037 a1=0 a2=2a a3=ffffffff items=0 ppid=1 pid=3239 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC msg=audit(1162906060.677:191): avc: denied { getattr } for pid=3239 comm="evolution-alarm" name="ld.so.cache" dev=dm-0 ino=9330239 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=user_u:object_r:ld_so_cache_t:s0 tclass=file type=SYSCALL msg=audit(1162906060.677:191): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bf921c58 a2=daafc0 a3=ffffffff items=0 ppid=1 pid=3239 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC_PATH msg=audit(1162906060.677:191): path="/etc/ld.so.cache" type=AVC msg=audit(1162906060.681:192): avc: denied { read } for pid=3239 comm="evolution-alarm" name="locale.alias" dev=dm-0 ino=10379454 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=file type=SYSCALL msg=audit(1162906060.681:192): arch=40000003 syscall=5 success=yes exit=3 a0=bf91e168 a1=0 a2=1b6 a3=87bb280 items=0 ppid=1 pid=3239 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC msg=audit(1162906060.681:193): avc: denied { getattr } for pid=3239 comm="evolution-alarm" name="locale.alias" dev=dm-0 ino=10379454 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=file type=SYSCALL msg=audit(1162906060.681:193): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bf91dd88 a2=2dbff4 a3=87bb280 items=0 ppid=1 pid=3239 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC_PATH msg=audit(1162906060.681:193): path="/usr/share/X11/locale/locale.alias" type=AVC msg=audit(1162906060.685:194): avc: denied { read } for pid=3239 comm="evolution-alarm" name=".gdmF70UIT" dev=dm-0 ino=14469320 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162906060.685:194): arch=40000003 syscall=33 success=yes exit=0 a0=bf924b68 a1=4 a2=4db18a64 a3=bf924b68 items=0 ppid=1 pid=3239 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC msg=audit(1162906060.685:195): avc: denied { getattr } for pid=3239 comm="evolution-alarm" name=".gdmF70UIT" dev=dm-0 ino=14469320 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162906060.685:195): arch=40000003 syscall=197 success=yes exit=0 a0=4 a1=bf92201c a2=2dbff4 a3=87be6c0 items=0 ppid=1 pid=3239 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC_PATH msg=audit(1162906060.685:195): path="/tmp/.gdmF70UIT" type=AVC msg=audit(1162906060.685:196): avc: denied { read } for pid=3239 comm="evolution-alarm" name="ISO8859-1.so" dev=dm-0 ino=10387600 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=system_u:object_r:shlib_t:s0 tclass=file type=SYSCALL msg=audit(1162906060.685:196): arch=40000003 syscall=5 success=yes exit=4 a0=87cd8d0 a1=0 a2=87cd8c8 a3=87cd8d0 items=0 ppid=1 pid=3239 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC msg=audit(1162906060.685:197): avc: denied { getattr } for pid=3239 comm="evolution-alarm" name="ISO8859-1.so" dev=dm-0 ino=10387600 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=system_u:object_r:shlib_t:s0 tclass=file type=SYSCALL msg=audit(1162906060.685:197): arch=40000003 syscall=197 success=yes exit=0 a0=4 a1=bf921bcc a2=daafc0 a3=5 items=0 ppid=1 pid=3239 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC_PATH msg=audit(1162906060.685:197): path="/usr/lib/gconv/ISO8859-1.so" type=AVC msg=audit(1162906060.685:198): avc: denied { execute } for pid=3239 comm="evolution-alarm" name="ISO8859-1.so" dev=dm-0 ino=10387600 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=system_u:object_r:shlib_t:s0 tclass=file type=SYSCALL msg=audit(1162906060.685:198): arch=40000003 syscall=192 success=yes exit=12324864 a0=0 a1=2014 a2=5 a3=802 items=0 ppid=1 pid=3239 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC_PATH msg=audit(1162906060.685:198): path="/usr/lib/gconv/ISO8859-1.so" type=AVC msg=audit(1162906060.689:199): avc: denied { read } for pid=3239 comm="evolution-alarm" name="tmp" dev=dm-0 ino=14469313 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=system_u:object_r:tmp_t:s0 tclass=dir type=SYSCALL msg=audit(1162906060.689:199): arch=40000003 syscall=5 success=yes exit=10 a0=87b3700 a1=18800 a2=daafc0 a3=87b3700 items=0 ppid=1 pid=3239 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC msg=audit(1162906060.689:200): avc: denied { getattr } for pid=3239 comm="evolution-alarm" name="orbit-kmacmill" dev=dm-0 ino=14567713 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=dir type=SYSCALL msg=audit(1162906060.689:200): arch=40000003 syscall=195 success=yes exit=0 a0=87d1250 a1=bf922680 a2=2dbff4 a3=3 items=0 ppid=1 pid=3239 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC_PATH msg=audit(1162906060.689:200): path="/tmp/orbit-kmacmill" type=AVC msg=audit(1162906060.689:201): avc: denied { setattr } for pid=3239 comm="evolution-alarm" name="orbit-kmacmill" dev=dm-0 ino=14567713 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=dir type=SYSCALL msg=audit(1162906060.689:201): arch=40000003 syscall=30 success=yes exit=0 a0=87d0230 a1=bf9226d4 a2=4e570f80 a3=1f4 items=0 ppid=1 pid=3239 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC msg=audit(1162906060.689:202): avc: denied { read } for pid=3239 comm="evolution-alarm" name="urandom" dev=tmpfs ino=2054 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=system_u:object_r:urandom_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1162906060.689:202): arch=40000003 syscall=5 success=yes exit=10 a0=4def9880 a1=8000 a2=1b6 a3=87d02a8 items=0 ppid=1 pid=3239 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC msg=audit(1162906060.689:203): avc: denied { getattr } for pid=3239 comm="evolution-alarm" name="urandom" dev=tmpfs ino=2054 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=system_u:object_r:urandom_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1162906060.689:203): arch=40000003 syscall=197 success=yes exit=0 a0=a a1=bf92265c a2=2dbff4 a3=87d02a8 items=0 ppid=1 pid=3239 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC_PATH msg=audit(1162906060.689:203): path="/dev/urandom" type=AVC msg=audit(1162906060.689:204): avc: denied { ioctl } for pid=3239 comm="evolution-alarm" name="urandom" dev=tmpfs ino=2054 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=system_u:object_r:urandom_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1162906060.689:204): arch=40000003 syscall=54 success=no exit=-22 a0=a a1=5401 a2=bf9225bc a3=bf9225fc items=0 ppid=1 pid=3239 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC_PATH msg=audit(1162906060.689:204): path="/dev/urandom" type=AVC msg=audit(1162906060.693:205): avc: denied { read } for pid=3239 comm="evolution-alarm" name="modules" dev=dm-0 ino=9331073 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=dir type=SYSCALL msg=audit(1162906060.693:205): arch=40000003 syscall=5 success=yes exit=10 a0=87d1618 a1=18800 a2=4dea3d07 a3=87d1618 items=0 ppid=1 pid=3239 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC msg=audit(1162906060.693:206): avc: denied { search } for pid=3239 comm="evolution-alarm" name=".ICE-unix" dev=dm-0 ino=14567572 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=system_u:object_r:ice_tmp_t:s0 tclass=dir type=AVC msg=audit(1162906060.693:206): avc: denied { write } for pid=3239 comm="evolution-alarm" name="2965" dev=dm-0 ino=14567716 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=staff_u:object_r:ice_tmp_t:s0 tclass=sock_file type=AVC msg=audit(1162906060.693:206): avc: denied { connectto } for pid=3239 comm="evolution-alarm" name="2965" scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=unix_stream_socket type=SYSCALL msg=audit(1162906060.693:206): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=bf9220d0 a2=4dc5d770 a3=15 items=0 ppid=1 pid=3239 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC_PATH msg=audit(1162906060.693:206): path="/tmp/.ICE-unix/2965" type=AVC msg=audit(1162906060.693:207): avc: denied { read } for pid=3239 comm="evolution-alarm" name=".ICEauthority" dev=dm-0 ino=6570930 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=staff_u:object_r:staff_iceauth_home_t:s0 tclass=file type=SYSCALL msg=audit(1162906060.693:207): arch=40000003 syscall=33 success=yes exit=0 a0=87d3fa0 a1=4 a2=4dc5d770 a3=87d3fa0 items=0 ppid=1 pid=3239 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC msg=audit(1162906060.693:208): avc: denied { getattr } for pid=3239 comm="evolution-alarm" name=".ICEauthority" dev=dm-0 ino=6570930 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=staff_u:object_r:staff_iceauth_home_t:s0 tclass=file type=SYSCALL msg=audit(1162906060.693:208): arch=40000003 syscall=197 success=yes exit=0 a0=b a1=bf92216c a2=2dbff4 a3=87d4880 items=0 ppid=1 pid=3239 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC_PATH msg=audit(1162906060.693:208): path="/home/kmacmill/.ICEauthority" type=AVC msg=audit(1162906060.697:209): avc: denied { search } for pid=3239 comm="evolution-alarm" name="gconfd-kmacmill" dev=dm-0 ino=15648282 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=dir type=AVC msg=audit(1162906060.697:209): avc: denied { read } for pid=3239 comm="evolution-alarm" name="ior" dev=dm-0 ino=15648171 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162906060.697:209): arch=40000003 syscall=5 success=yes exit=11 a0=87d7728 a1=0 a2=1b6 a3=87d7770 items=0 ppid=1 pid=3239 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC msg=audit(1162906060.697:210): avc: denied { getattr } for pid=3239 comm="evolution-alarm" name="ior" dev=dm-0 ino=15648171 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162906060.697:210): arch=40000003 syscall=197 success=yes exit=0 a0=b a1=bf921c88 a2=2dbff4 a3=87d7770 items=0 ppid=1 pid=3239 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC_PATH msg=audit(1162906060.697:210): path="/tmp/gconfd-kmacmill/lock/ior" type=AVC msg=audit(1162906060.697:211): avc: denied { write } for pid=3239 comm="evolution-alarm" name="linc-bd0-0-6f75742e134f6" dev=dm-0 ino=14567714 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=sock_file type=SYSCALL msg=audit(1162906060.697:211): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=bf9223a0 a2=4e570f80 a3=0 items=0 ppid=1 pid=3239 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC msg=audit(1162906060.697:212): avc: denied { write } for pid=3239 comm="evolution-alarm" name="orbit-kmacmill" dev=dm-0 ino=14567713 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=dir type=AVC msg=audit(1162906060.697:212): avc: denied { add_name } for pid=3239 comm="evolution-alarm" name="linc-ca7-0-6fcffd09ab5a6" scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=dir type=AVC msg=audit(1162906060.697:212): avc: denied { create } for pid=3239 comm="evolution-alarm" name="linc-ca7-0-6fcffd09ab5a6" scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=sock_file type=SYSCALL msg=audit(1162906060.697:212): arch=40000003 syscall=102 success=yes exit=0 a0=2 a1=bf9223e0 a2=4e570f80 a3=b7f8d8ac items=0 ppid=1 pid=3239 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC msg=audit(1162906060.697:213): avc: denied { connectto } for pid=3024 comm="gconfd-2" name="linc-ca7-0-6fcffd09ab5a6" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tclass=unix_stream_socket type=SYSCALL msg=audit(1162906060.697:213): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=bf902a90 a2=4e570f80 a3=0 items=0 ppid=1 pid=3024 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1162906060.697:213): path="/tmp/orbit-kmacmill/linc-ca7-0-6fcffd09ab5a6" type=AVC msg=audit(1162906061.066:214): avc: denied { read } for pid=3239 comm="evolution-alarm" name="meminfo" dev=proc ino=-268435454 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=system_u:object_r:proc_t:s0 tclass=file type=SYSCALL msg=audit(1162906061.066:214): arch=40000003 syscall=5 success=yes exit=18 a0=2c399a a1=0 a2=1b6 a3=87efe98 items=0 ppid=1 pid=3239 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC msg=audit(1162906061.066:215): avc: denied { getattr } for pid=3239 comm="evolution-alarm" name="meminfo" dev=proc ino=-268435454 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=system_u:object_r:proc_t:s0 tclass=file type=SYSCALL msg=audit(1162906061.066:215): arch=40000003 syscall=197 success=yes exit=0 a0=12 a1=bf91defc a2=2dbff4 a3=87efe98 items=0 ppid=1 pid=3239 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC_PATH msg=audit(1162906061.066:215): path="/proc/meminfo" type=AVC msg=audit(1162906061.066:216): avc: denied { connectto } for pid=3239 comm="evolution-alarm" path=002F746D702F646275732D6E6948324A5970414645 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=staff_u:staff_r:staff_dbusd_t:s0 tclass=unix_stream_socket type=SYSCALL msg=audit(1162906061.066:216): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=bf922200 a2=a04494 a3=0 items=0 ppid=1 pid=3239 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC msg=audit(1162906061.078:217): avc: denied { write } for pid=3239 comm="evolution-alarm" name="bonobo-activation-register.lock" dev=dm-0 ino=14567725 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162906061.078:217): arch=40000003 syscall=5 success=yes exit=19 a0=87fdba0 a1=42 a2=1c0 a3=87fdba0 items=0 ppid=1 pid=3239 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC msg=audit(1162906061.078:218): avc: denied { lock } for pid=3239 comm="evolution-alarm" name="bonobo-activation-register.lock" dev=dm-0 ino=14567725 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162906061.078:218): arch=40000003 syscall=221 success=yes exit=0 a0=13 a1=7 a2=bf9222ac a3=bf9222ac items=0 ppid=1 pid=3239 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC_PATH msg=audit(1162906061.078:218): path="/tmp/orbit-kmacmill/bonobo-activation-register.lock" type=AVC msg=audit(1162906061.122:219): avc: denied { signal } for pid=3243 comm="evolution-data-" scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:staff_r:staff_evolution_server_t:s0 tclass=process type=SYSCALL msg=audit(1162906061.122:219): arch=40000003 syscall=270 success=yes exit=0 a0=c8e a1=c8f a2=21 a3=b7d84bd0 items=0 ppid=1 pid=3243 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC msg=audit(1162906061.126:220): avc: denied { getattr } for pid=3239 comm="evolution-alarm" name="[13479]" dev=pipefs ino=13479 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=fifo_file type=SYSCALL msg=audit(1162906061.126:220): arch=40000003 syscall=197 success=yes exit=0 a0=1e a1=bf922674 a2=2dbff4 a3=8806300 items=0 ppid=1 pid=3239 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC_PATH msg=audit(1162906061.126:220): path="pipe:[13479]" type=AVC msg=audit(1162906080.663:221): avc: denied { execheap } for pid=3276 comm="beagled" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=process type=AVC msg=audit(1162906080.663:221): avc: denied { execmem } for pid=3276 comm="beagled" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=process type=SYSCALL msg=audit(1162906080.663:221): arch=40000003 syscall=125 success=yes exit=0 a0=9bba000 a1=1000 a2=7 a3=1 items=0 ppid=1 pid=3276 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="beagled" exe="/usr/bin/mono" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162906121.825:222): avc: denied { execute } for pid=3302 comm="firefox" name="firefox-bin" dev=dm-0 ino=10379744 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=system_u:object_r:mozilla_exec_t:s0 tclass=file type=AVC msg=audit(1162906121.825:222): avc: denied { execute_no_trans } for pid=3302 comm="firefox" name="firefox-bin" dev=dm-0 ino=10379744 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=system_u:object_r:mozilla_exec_t:s0 tclass=file type=AVC msg=audit(1162906121.825:222): avc: denied { read } for pid=3302 comm="firefox" name="firefox-bin" dev=dm-0 ino=10379744 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=system_u:object_r:mozilla_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162906121.825:222): arch=40000003 syscall=11 success=yes exit=0 a0=81a18b8 a1=81a3928 a2=81a4120 a3=81a3928 items=0 ppid=1 pid=3302 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC_PATH msg=audit(1162906121.825:222): path="/usr/lib/firefox-2.0/firefox-bin" type=AVC_PATH msg=audit(1162906121.825:222): path="/usr/lib/firefox-2.0/firefox-bin" type=AVC msg=audit(1162906121.837:223): avc: denied { getattr } for pid=3302 comm="firefox-bin" name="firefox-bin" dev=dm-0 ino=10379744 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=system_u:object_r:mozilla_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162906121.837:223): arch=40000003 syscall=196 success=yes exit=0 a0=bfdf2d18 a1=bfdf280c a2=248ff4 a3=bfdf4a05 items=0 ppid=1 pid=3302 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC_PATH msg=audit(1162906121.837:223): path="/usr/lib/firefox-2.0/firefox-bin" type=USER_ACCT msg=audit(1162906202.054:224): user pid=3313 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162906202.054:225): login pid=3313 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162906202.054:226): user pid=3313 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162906202.054:227): user pid=3313 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162906202.058:228): avc: denied { execute } for pid=3314 comm="sh" name="sa1" dev=dm-0 ino=13061698 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:lib_t:s0 tclass=file type=AVC msg=audit(1162906202.058:228): avc: denied { execute_no_trans } for pid=3314 comm="sh" name="sa1" dev=dm-0 ino=13061698 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1162906202.058:228): arch=40000003 syscall=11 success=yes exit=0 a0=87a11b0 a1=87a1358 a2=87a1290 a3=87a1008 items=0 ppid=3313 pid=3314 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sa1" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162906202.058:228): path="/usr/lib/sa/sa1" type=AVC msg=audit(1162906202.086:229): avc: denied { execute } for pid=3314 comm="sa1" name="sadc" dev=dm-0 ino=11981386 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=AVC msg=audit(1162906202.086:229): avc: denied { execute_no_trans } for pid=3314 comm="sa1" name="sadc" dev=dm-0 ino=11981386 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=AVC msg=audit(1162906202.086:229): avc: denied { read } for pid=3314 comm="sa1" name="sadc" dev=dm-0 ino=11981386 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162906202.086:229): arch=40000003 syscall=11 success=yes exit=0 a0=8f54d48 a1=8f54740 a2=8f54d60 a3=8f54740 items=0 ppid=3313 pid=3314 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162906202.086:229): path="/usr/lib/sa/sadc" type=AVC_PATH msg=audit(1162906202.086:229): path="/usr/lib/sa/sadc" type=AVC msg=audit(1162906202.090:230): avc: denied { search } for pid=3314 comm="sadc" name="net" dev=proc ino=-268435432 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=dir type=AVC msg=audit(1162906202.090:230): avc: denied { read } for pid=3314 comm="sadc" name="dev" dev=proc ino=-268435159 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=file type=SYSCALL msg=audit(1162906202.090:230): arch=40000003 syscall=5 success=yes exit=3 a0=8050371 a1=0 a2=1b6 a3=8eaf800 items=0 ppid=3313 pid=3314 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162906202.090:231): avc: denied { getattr } for pid=3314 comm="sadc" name="dev" dev=proc ino=-268435159 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=file type=SYSCALL msg=audit(1162906202.090:231): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bf8b91e8 a2=248ff4 a3=8eaf800 items=0 ppid=3313 pid=3314 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162906202.090:231): path="/proc/net/dev" type=AVC msg=audit(1162906202.090:232): avc: denied { search } for pid=3314 comm="sadc" name="sa" dev=dm-0 ino=14607631 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=dir type=SYSCALL msg=audit(1162906202.090:232): arch=40000003 syscall=33 success=yes exit=0 a0=bf8b9594 a1=0 a2=bf8b9488 a3=bf8b9490 items=0 ppid=3313 pid=3314 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162906202.090:233): avc: denied { read append } for pid=3314 comm="sadc" name="sa07" dev=dm-0 ino=14600351 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=file type=SYSCALL msg=audit(1162906202.090:233): arch=40000003 syscall=5 success=yes exit=3 a0=bf8b9594 a1=402 a2=bf8b9758 a3=bf8b9490 items=0 ppid=3313 pid=3314 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162906202.090:234): avc: denied { search } for pid=3314 comm="sadc" name="fs" dev=proc ino=-268435428 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=dir type=AVC msg=audit(1162906202.090:234): avc: denied { read } for pid=3314 comm="sadc" name="dentry-state" dev=proc ino=-268435227 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=file type=SYSCALL msg=audit(1162906202.090:234): arch=40000003 syscall=5 success=yes exit=4 a0=805037f a1=0 a2=1b6 a3=8eafdf0 items=0 ppid=3313 pid=3314 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162906202.090:235): avc: denied { getattr } for pid=3314 comm="sadc" name="dentry-state" dev=proc ino=-268435227 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=file type=SYSCALL msg=audit(1162906202.090:235): arch=40000003 syscall=197 success=yes exit=0 a0=4 a1=bf8b9044 a2=248ff4 a3=8eafdf0 items=0 ppid=3313 pid=3314 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162906202.090:235): path="/proc/sys/fs/dentry-state" type=AVC msg=audit(1162906202.090:236): avc: denied { search } for pid=3314 comm="sadc" name="rpc" dev=proc ino=-268434552 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_rpc_t:s0 tclass=dir type=SYSCALL msg=audit(1162906202.090:236): arch=40000003 syscall=5 success=no exit=-2 a0=80502a5 a1=0 a2=1b6 a3=8eafdf0 items=0 ppid=3313 pid=3314 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162906202.090:237): avc: denied { lock } for pid=3314 comm="sadc" name="sa07" dev=dm-0 ino=14600351 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=file type=SYSCALL msg=audit(1162906202.090:237): arch=40000003 syscall=143 success=yes exit=0 a0=3 a1=6 a2=bf8b9490 a3=3 items=0 ppid=3313 pid=3314 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162906202.090:237): path="/var/log/sa/sa07" type=CRED_DISP msg=audit(1162906202.122:238): user pid=3313 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162906202.122:239): user pid=3313 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162906204.526:240): avc: denied { getattr } for pid=2322 comm="setroubleshootd" name="net" dev=proc ino=-268435432 scontext=system_u:system_r:setroubleshootd_t:s0 tcontext=system_u:object_r:proc_net_t:s0 tclass=dir type=SYSCALL msg=audit(1162906204.526:240): arch=40000003 syscall=195 success=yes exit=0 a0=b7a69150 a1=b7a69194 a2=f18ff4 a3=b7a69159 items=0 ppid=1 pid=2322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="setroubleshootd" exe="/usr/bin/python" subj=system_u:system_r:setroubleshootd_t:s0 key=(null) type=AVC_PATH msg=audit(1162906204.526:240): path="/proc/net" type=USER_ACCT msg=audit(1162906801.188:241): user pid=3389 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162906801.188:242): login pid=3389 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162906801.188:243): user pid=3389 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162906801.188:244): user pid=3389 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162906801.192:245): avc: denied { execute } for pid=3390 comm="sa1" name="sadc" dev=dm-0 ino=11981386 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=AVC msg=audit(1162906801.192:245): avc: denied { execute_no_trans } for pid=3390 comm="sa1" name="sadc" dev=dm-0 ino=11981386 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=AVC msg=audit(1162906801.192:245): avc: denied { read } for pid=3390 comm="sa1" name="sadc" dev=dm-0 ino=11981386 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162906801.192:245): arch=40000003 syscall=11 success=yes exit=0 a0=8948d48 a1=8948740 a2=8948d60 a3=8948740 items=0 ppid=3389 pid=3390 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162906801.192:245): path="/usr/lib/sa/sadc" type=AVC_PATH msg=audit(1162906801.192:245): path="/usr/lib/sa/sadc" type=CRED_DISP msg=audit(1162906801.204:246): user pid=3389 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162906801.204:247): user pid=3389 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162906994.496:248): avc: denied { search } for pid=3434 comm="gpg" name="home" dev=dm-0 ino=6547201 scontext=staff_u:staff_r:staff_gpg_t:s0 tcontext=system_u:object_r:home_root_t:s0 tclass=dir type=AVC msg=audit(1162906994.496:248): avc: denied { search } for pid=3434 comm="gpg" name="kmacmill" dev=dm-0 ino=6547202 scontext=staff_u:staff_r:staff_gpg_t:s0 tcontext=staff_u:object_r:staff_home_dir_t:s0 tclass=dir type=SYSCALL msg=audit(1162906994.496:248): arch=40000003 syscall=33 success=no exit=-2 a0=96c69f8 a1=4 a2=814bbc a3=96c69c8 items=0 ppid=3205 pid=3434 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gpg" exe="/usr/bin/gpg" subj=staff_u:staff_r:staff_gpg_t:s0 key=(null) type=AVC msg=audit(1162906994.700:249): avc: denied { search } for pid=3434 comm="gpg" name="tmp" dev=dm-0 ino=14469313 scontext=staff_u:staff_r:staff_gpg_t:s0 tcontext=system_u:object_r:tmp_t:s0 tclass=dir type=AVC msg=audit(1162906994.700:249): avc: denied { read } for pid=3434 comm="gpg" name="evolution-pgp.M0FTIT" dev=dm-0 ino=14469396 scontext=staff_u:staff_r:staff_gpg_t:s0 tcontext=staff_u:object_r:staff_evolution_orbit_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162906994.700:249): arch=40000003 syscall=5 success=yes exit=3 a0=bf9efb1a a1=8000 a2=0 a3=8000 items=0 ppid=3205 pid=3434 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gpg" exe="/usr/bin/gpg" subj=staff_u:staff_r:staff_gpg_t:s0 key=(null) type=AVC msg=audit(1162907008.873:250): avc: denied { search } for pid=3439 comm="evolution-data-" name="tmp" dev=dm-0 ino=14469313 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=system_u:object_r:tmp_t:s0 tclass=dir type=AVC msg=audit(1162907008.873:250): avc: denied { write } for pid=3439 comm="evolution-data-" name="linc-c85-0-25367ec497172" dev=dm-0 ino=14567744 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=sock_file type=SYSCALL msg=audit(1162907008.873:250): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=b5f3fe70 a2=4e570f80 a3=0 items=0 ppid=1 pid=3439 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC msg=audit(1162907009.201:251): avc: denied { create } for pid=3439 comm="evolution-data-" scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:staff_r:staff_evolution_server_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1162907009.201:251): arch=40000003 syscall=102 success=yes exit=26 a0=1 a1=b5f3fb04 a2=6b9ff4 a3=b5f3fd91 items=0 ppid=1 pid=3439 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC msg=audit(1162907009.201:252): avc: denied { bind } for pid=3439 comm="evolution-data-" scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:staff_r:staff_evolution_server_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1162907009.201:252): arch=40000003 syscall=102 success=yes exit=0 a0=2 a1=b5f3fb04 a2=6b9ff4 a3=1a items=0 ppid=1 pid=3439 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC msg=audit(1162907009.201:253): avc: denied { getattr } for pid=3439 comm="evolution-data-" scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:staff_r:staff_evolution_server_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1162907009.201:253): arch=40000003 syscall=102 success=yes exit=0 a0=6 a1=b5f3fb04 a2=6b9ff4 a3=1a items=0 ppid=1 pid=3439 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC msg=audit(1162907009.201:254): avc: denied { write } for pid=3439 comm="evolution-data-" scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:staff_r:staff_evolution_server_t:s0 tclass=netlink_route_socket type=AVC msg=audit(1162907009.201:254): avc: denied { nlmsg_read } for pid=3439 comm="evolution-data-" scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:staff_r:staff_evolution_server_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1162907009.201:254): arch=40000003 syscall=102 success=yes exit=20 a0=b a1=b5f3ea44 a2=6b9ff4 a3=0 items=0 ppid=1 pid=3439 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC msg=audit(1162907009.201:255): avc: denied { read } for pid=3439 comm="evolution-data-" scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:staff_r:staff_evolution_server_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1162907009.201:255): arch=40000003 syscall=102 success=yes exit=188 a0=11 a1=b5f3ea44 a2=6b9ff4 a3=0 items=0 ppid=1 pid=3439 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC msg=audit(1162907012.161:256): avc: denied { execute } for pid=3444 comm="firefox" name="firefox-bin" dev=dm-0 ino=10379744 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=system_u:object_r:mozilla_exec_t:s0 tclass=file type=AVC msg=audit(1162907012.161:256): avc: denied { execute_no_trans } for pid=3444 comm="firefox" name="firefox-bin" dev=dm-0 ino=10379744 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=system_u:object_r:mozilla_exec_t:s0 tclass=file type=AVC msg=audit(1162907012.161:256): avc: denied { read } for pid=3444 comm="firefox" name="firefox-bin" dev=dm-0 ino=10379744 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=system_u:object_r:mozilla_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162907012.161:256): arch=40000003 syscall=11 success=yes exit=0 a0=9ca3898 a1=9ca5908 a2=9ca6100 a3=9ca5908 items=0 ppid=1 pid=3444 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC_PATH msg=audit(1162907012.161:256): path="/usr/lib/firefox-2.0/firefox-bin" type=AVC_PATH msg=audit(1162907012.161:256): path="/usr/lib/firefox-2.0/firefox-bin" type=AVC msg=audit(1162907012.169:257): avc: denied { getattr } for pid=3444 comm="firefox-bin" name="firefox-bin" dev=dm-0 ino=10379744 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=system_u:object_r:mozilla_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162907012.169:257): arch=40000003 syscall=196 success=yes exit=0 a0=bfc35b68 a1=bfc3565c a2=248ff4 a3=bfc36a12 items=0 ppid=1 pid=3444 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC_PATH msg=audit(1162907012.169:257): path="/usr/lib/firefox-2.0/firefox-bin" type=USER_ACCT msg=audit(1162907401.269:258): user pid=3519 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162907401.273:259): login pid=3519 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162907401.273:260): user pid=3519 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162907401.273:261): user pid=3519 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162907401.277:262): avc: denied { search } for pid=3520 comm="sadc" name="sa" dev=dm-0 ino=14607631 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=dir type=SYSCALL msg=audit(1162907401.277:262): arch=40000003 syscall=33 success=yes exit=0 a0=bfd85254 a1=0 a2=bfd85148 a3=bfd85150 items=0 ppid=3519 pid=3520 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162907401.277:263): avc: denied { read append } for pid=3520 comm="sadc" name="sa07" dev=dm-0 ino=14600351 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=file type=SYSCALL msg=audit(1162907401.277:263): arch=40000003 syscall=5 success=yes exit=3 a0=bfd85254 a1=402 a2=bfd85418 a3=bfd85150 items=0 ppid=3519 pid=3520 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162907401.281:264): avc: denied { lock } for pid=3520 comm="sadc" name="sa07" dev=dm-0 ino=14600351 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=file type=SYSCALL msg=audit(1162907401.281:264): arch=40000003 syscall=143 success=yes exit=0 a0=3 a1=6 a2=bfd85150 a3=3 items=0 ppid=3519 pid=3520 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162907401.281:264): path="/var/log/sa/sa07" type=CRED_DISP msg=audit(1162907401.289:265): user pid=3519 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162907401.289:266): user pid=3519 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162907975.585:267): avc: denied { getattr } for pid=3193 comm="firefox-bin" name="libflashplayer.so" dev=dm-0 ino=6547382 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=user_u:object_r:user_mozilla_home_t:s0 tclass=file type=SYSCALL msg=audit(1162907975.585:267): arch=40000003 syscall=196 success=yes exit=0 a0=bffaf564 a1=bffaf4c8 a2=f64ff4 a3=a15d798 items=0 ppid=1 pid=3193 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162907975.585:267): path="/home/kmacmill/.mozilla/plugins/libflashplayer.so" type=USER_ACCT msg=audit(1162908001.359:268): user pid=3556 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162908001.359:269): login pid=3556 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162908001.359:270): user pid=3556 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162908001.359:271): user pid=3556 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162908001.375:272): user pid=3556 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162908001.375:273): user pid=3556 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162908061.387:274): user pid=3561 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162908061.387:275): login pid=3561 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162908061.387:276): user pid=3561 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162908061.387:277): user pid=3561 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162908061.391:278): avc: denied { getattr } for pid=3562 comm="bash" name="run-parts" dev=dm-0 ino=10331890 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1162908061.391:278): arch=40000003 syscall=195 success=yes exit=0 a0=9ff8120 a1=bfc3b4f0 a2=92eff4 a3=9ff8120 items=0 ppid=3561 pid=3562 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="bash" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162908061.391:278): path="/usr/bin/run-parts" type=AVC msg=audit(1162908061.423:279): avc: denied { execute } for pid=3562 comm="bash" name="run-parts" dev=dm-0 ino=10331890 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1162908061.423:279): arch=40000003 syscall=33 success=yes exit=0 a0=9ff8120 a1=1 a2=11 a3=9ff8120 items=0 ppid=3561 pid=3562 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="bash" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162908061.423:280): avc: denied { read } for pid=3562 comm="bash" name="run-parts" dev=dm-0 ino=10331890 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1162908061.423:280): arch=40000003 syscall=33 success=yes exit=0 a0=9ff8120 a1=4 a2=ffffffff a3=9ff8120 items=0 ppid=3561 pid=3562 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="bash" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162908061.423:281): avc: denied { execute_no_trans } for pid=3562 comm="bash" name="run-parts" dev=dm-0 ino=10331890 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1162908061.423:281): arch=40000003 syscall=11 success=yes exit=0 a0=9ff8120 a1=9ff83d8 a2=9ff82f8 a3=9ff7f98 items=0 ppid=3561 pid=3562 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="run-parts" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162908061.423:281): path="/usr/bin/run-parts" type=AVC msg=audit(1162908061.427:282): avc: denied { ioctl } for pid=3562 comm="run-parts" name="run-parts" dev=dm-0 ino=10331890 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1162908061.427:282): arch=40000003 syscall=54 success=no exit=-25 a0=3 a1=5401 a2=bfc6df48 a3=bfc6df88 items=0 ppid=3561 pid=3562 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="run-parts" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162908061.427:282): path="/usr/bin/run-parts" type=AVC msg=audit(1162908061.443:283): avc: denied { execute } for pid=3562 comm="run-parts" name="inn-cron-nntpsend" dev=dm-0 ino=9331477 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1162908061.443:283): arch=40000003 syscall=33 success=yes exit=0 a0=9158990 a1=1 a2=1 a3=9158c98 items=0 ppid=3561 pid=3562 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="run-parts" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162908061.443:284): avc: denied { execute_no_trans } for pid=3563 comm="run-parts" name="inn-cron-nntpsend" dev=dm-0 ino=9331477 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1162908061.443:284): arch=40000003 syscall=11 success=yes exit=0 a0=9158a10 a1=9158ad8 a2=9158ae8 a3=9158758 items=0 ppid=3562 pid=3563 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="inn-cron-nntpse" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162908061.443:284): path="/etc/cron.hourly/inn-cron-nntpsend" type=AVC msg=audit(1162908061.455:285): avc: denied { execute } for pid=3565 comm="inn-cron-nntpse" name="chkconfig" dev=dm-0 ino=2848378 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sbin_t:s0 tclass=file type=AVC msg=audit(1162908061.455:285): avc: denied { execute_no_trans } for pid=3565 comm="inn-cron-nntpse" name="chkconfig" dev=dm-0 ino=2848378 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sbin_t:s0 tclass=file type=AVC msg=audit(1162908061.455:285): avc: denied { read } for pid=3565 comm="inn-cron-nntpse" name="chkconfig" dev=dm-0 ino=2848378 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sbin_t:s0 tclass=file type=SYSCALL msg=audit(1162908061.455:285): arch=40000003 syscall=11 success=yes exit=0 a0=9846678 a1=9846808 a2=9846720 a3=9846508 items=0 ppid=3563 pid=3565 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="chkconfig" exe="/sbin/chkconfig" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162908061.455:285): path="/sbin/chkconfig" type=AVC_PATH msg=audit(1162908061.455:285): path="/sbin/chkconfig" type=AVC msg=audit(1162908061.483:286): avc: denied { read } for pid=3565 comm="chkconfig" name="innd" dev=dm-0 ino=9331492 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162908061.483:286): arch=40000003 syscall=5 success=yes exit=3 a0=bf9eccb0 a1=0 a2=ffffffff a3=8bf5038 items=0 ppid=3563 pid=3565 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="chkconfig" exe="/sbin/chkconfig" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162908061.483:287): avc: denied { getattr } for pid=3565 comm="chkconfig" name="innd" dev=dm-0 ino=9331492 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162908061.483:287): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bf9ecc20 a2=fc6ff4 a3=3 items=0 ppid=3563 pid=3565 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="chkconfig" exe="/sbin/chkconfig" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162908061.483:287): path="/etc/rc.d/init.d/innd" type=CRED_DISP msg=audit(1162908061.543:288): user pid=3561 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162908061.543:289): user pid=3561 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162908185.322:290): avc: denied { search } for pid=3575 comm="evolution" name=".ICE-unix" dev=dm-0 ino=14567572 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=system_u:object_r:ice_tmp_t:s0 tclass=dir type=SYSCALL msg=audit(1162908185.322:290): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=bf95f7e0 a2=4dc5d770 a3=15 items=0 ppid=1 pid=3575 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC msg=audit(1162908185.322:291): avc: denied { read } for pid=3575 comm="evolution" name=".ICEauthority" dev=dm-0 ino=6570930 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=staff_u:object_r:staff_iceauth_home_t:s0 tclass=file type=SYSCALL msg=audit(1162908185.322:291): arch=40000003 syscall=33 success=yes exit=0 a0=9ac0218 a1=4 a2=4dc5d770 a3=9ac0218 items=0 ppid=1 pid=3575 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC msg=audit(1162908185.322:292): avc: denied { getattr } for pid=3575 comm="evolution" name=".ICEauthority" dev=dm-0 ino=6570930 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=staff_u:object_r:staff_iceauth_home_t:s0 tclass=file type=SYSCALL msg=audit(1162908185.322:292): arch=40000003 syscall=197 success=yes exit=0 a0=b a1=bf95f87c a2=4c0ff4 a3=9ac0af8 items=0 ppid=1 pid=3575 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC_PATH msg=audit(1162908185.322:292): path="/home/kmacmill/.ICEauthority" type=USER_AVC msg=audit(1162908185.586:293): user pid=2324 uid=81 auid=4294967295 subj=system_u:system_r:system_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager member=state dest=org.freedesktop.NetworkManager spid=3575 tpid=2771 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=system_u:system_r:NetworkManager_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1162908185.590:294): user pid=2324 uid=81 auid=4294967295 subj=system_u:system_r:system_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.23 spid=2771 tpid=3575 scontext=system_u:system_r:NetworkManager_t:s0 tcontext=staff_u:staff_r:staff_evolution_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=AVC msg=audit(1162908185.638:295): avc: denied { create } for pid=3584 comm="evolution" scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=staff_u:staff_r:staff_evolution_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1162908185.638:295): arch=40000003 syscall=102 success=yes exit=35 a0=1 a1=b0d9d274 a2=4c0ff4 a3=802d7f items=0 ppid=1 pid=3584 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC msg=audit(1162908185.638:296): avc: denied { bind } for pid=3584 comm="evolution" scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=staff_u:staff_r:staff_evolution_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1162908185.638:296): arch=40000003 syscall=102 success=yes exit=0 a0=2 a1=b0d9d274 a2=4c0ff4 a3=23 items=0 ppid=1 pid=3584 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC msg=audit(1162908185.638:297): avc: denied { getattr } for pid=3584 comm="evolution" scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=staff_u:staff_r:staff_evolution_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1162908185.638:297): arch=40000003 syscall=102 success=yes exit=0 a0=6 a1=b0d9d274 a2=4c0ff4 a3=23 items=0 ppid=1 pid=3584 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC msg=audit(1162908185.638:298): avc: denied { write } for pid=3584 comm="evolution" scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=staff_u:staff_r:staff_evolution_t:s0 tclass=netlink_route_socket type=AVC msg=audit(1162908185.638:298): avc: denied { nlmsg_read } for pid=3584 comm="evolution" scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=staff_u:staff_r:staff_evolution_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1162908185.638:298): arch=40000003 syscall=102 success=yes exit=20 a0=b a1=b0d9c1b4 a2=4c0ff4 a3=0 items=0 ppid=1 pid=3584 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC msg=audit(1162908185.638:299): avc: denied { read } for pid=3584 comm="evolution" scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=staff_u:staff_r:staff_evolution_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1162908185.638:299): arch=40000003 syscall=102 success=yes exit=188 a0=11 a1=b0d9c1b4 a2=4c0ff4 a3=0 items=0 ppid=1 pid=3584 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC msg=audit(1162908185.642:300): avc: denied { search } for pid=3584 comm="evolution" name="nscd" dev=dm-0 ino=14436932 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=system_u:object_r:nscd_var_run_t:s0 tclass=dir type=SYSCALL msg=audit(1162908185.642:300): arch=40000003 syscall=102 success=no exit=-2 a0=3 a1=b0d9ce74 a2=4c0ff4 a3=0 items=0 ppid=1 pid=3584 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC msg=audit(1162908377.786:301): avc: denied { read } for pid=3193 comm="firefox-bin" name="libflashplayer.so" dev=dm-0 ino=6547382 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=user_u:object_r:user_mozilla_home_t:s0 tclass=file type=SYSCALL msg=audit(1162908377.786:301): arch=40000003 syscall=5 success=yes exit=60 a0=a315b68 a1=0 a2=4d765048 a3=a315b68 items=0 ppid=1 pid=3193 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162908377.806:302): avc: denied { execute } for pid=3193 comm="firefox-bin" name="libflashplayer.so" dev=dm-0 ino=6547382 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=user_u:object_r:user_mozilla_home_t:s0 tclass=file type=SYSCALL msg=audit(1162908377.806:302): arch=40000003 syscall=192 success=yes exit=24014848 a0=0 a1=738dbc a2=5 a3=802 items=0 ppid=1 pid=3193 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162908377.806:302): path="/home/kmacmill/.mozilla/plugins/libflashplayer.so" type=AVC msg=audit(1162908378.158:303): avc: denied { read } for pid=3193 comm="firefox-bin" name=".gdmF70UIT" dev=dm-0 ino=14469320 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162908378.158:303): arch=40000003 syscall=33 success=yes exit=0 a0=bffb3fcb a1=4 a2=4db18a64 a3=bffb3fcb items=0 ppid=1 pid=3193 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162908378.158:304): avc: denied { getattr } for pid=3193 comm="firefox-bin" name=".gdmF70UIT" dev=dm-0 ino=14469320 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162908378.158:304): arch=40000003 syscall=197 success=yes exit=0 a0=3d a1=bffaea8c a2=f64ff4 a3=9d2b038 items=0 ppid=1 pid=3193 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162908378.158:304): path="/tmp/.gdmF70UIT" type=USER_ACCT msg=audit(1162908601.608:305): user pid=3618 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162908601.608:306): login pid=3618 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162908601.608:307): user pid=3618 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162908601.608:308): user pid=3618 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162908601.612:309): avc: denied { search } for pid=3619 comm="sadc" name="net" dev=proc ino=-268435432 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=dir type=SYSCALL msg=audit(1162908601.612:309): arch=40000003 syscall=5 success=yes exit=3 a0=8050371 a1=0 a2=1b6 a3=8803800 items=0 ppid=3618 pid=3619 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=CRED_DISP msg=audit(1162908601.624:310): user pid=3618 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162908601.624:311): user pid=3618 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162909201.686:312): user pid=3656 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162909201.686:313): login pid=3656 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162909201.686:314): user pid=3656 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162909201.686:315): user pid=3656 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162909201.706:316): user pid=3656 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162909201.706:317): user pid=3656 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162909801.775:318): user pid=3774 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162909801.775:319): login pid=3774 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162909801.775:320): user pid=3774 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162909801.775:321): user pid=3774 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162909801.791:322): user pid=3774 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162909801.791:323): user pid=3774 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162909864.491:324): avc: denied { read } for pid=3783 comm="gnome-terminal" name=".gdmF70UIT" dev=dm-0 ino=14469320 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162909864.491:324): arch=40000003 syscall=33 success=yes exit=0 a0=bff99df5 a1=4 a2=4db18a64 a3=bff99df5 items=0 ppid=1 pid=3783 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-terminal" exe="/usr/bin/gnome-terminal" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162909864.503:325): avc: denied { write } for pid=3783 comm="gnome-terminal" name="2965" dev=dm-0 ino=14567716 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:ice_tmp_t:s0 tclass=sock_file type=SYSCALL msg=audit(1162909864.503:325): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=bff97ff0 a2=4dc5d770 a3=15 items=0 ppid=1 pid=3783 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-terminal" exe="/usr/bin/gnome-terminal" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162909871.660:326): avc: denied { getattr } for pid=3811 comm="0logwatch" name="root" dev=dm-0 ino=13127137 scontext=system_u:system_r:logwatch_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=SYSCALL msg=audit(1162909871.660:326): arch=40000003 syscall=195 success=yes exit=0 a0=92f43e0 a1=92a50c8 a2=24cff4 a3=92f43e0 items=0 ppid=3808 pid=3811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="0logwatch" exe="/usr/bin/perl" subj=system_u:system_r:logwatch_t:s0 key=(null) type=AVC_PATH msg=audit(1162909871.660:326): path="/root" type=AVC msg=audit(1162909871.660:327): avc: denied { search } for pid=3811 comm="0logwatch" name="root" dev=dm-0 ino=13127137 scontext=system_u:system_r:logwatch_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=SYSCALL msg=audit(1162909871.660:327): arch=40000003 syscall=195 success=no exit=-2 a0=92f43e0 a1=92a50c8 a2=24cff4 a3=92f43e0 items=0 ppid=3808 pid=3811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="0logwatch" exe="/usr/bin/perl" subj=system_u:system_r:logwatch_t:s0 key=(null) type=AVC msg=audit(1162909881.284:328): avc: denied { search } for pid=4239 comm="procmail" name="root" dev=dm-0 ino=13127137 scontext=system_u:system_r:procmail_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=SYSCALL msg=audit(1162909881.284:328): arch=40000003 syscall=5 success=no exit=-2 a0=8717d90 a1=8000 a2=0 a3=8000 items=0 ppid=4238 pid=4239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="procmail" exe="/usr/bin/procmail" subj=system_u:system_r:procmail_t:s0 key=(null) type=AVC msg=audit(1162909881.356:329): avc: denied { create } for pid=4242 comm="mktemp" name=".beagleindexwapi.WBuTxi4242" scontext=system_u:system_r:system_crond_t:s0 tcontext=system_u:object_r:tmp_t:s0 tclass=dir type=SYSCALL msg=audit(1162909881.356:329): arch=40000003 syscall=39 success=yes exit=0 a0=95be008 a1=1c0 a2=95be00c a3=95be008 items=0 ppid=4240 pid=4242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="mktemp" exe="/bin/mktemp" subj=system_u:system_r:system_crond_t:s0 key=(null) type=AVC msg=audit(1162909881.356:330): avc: denied { setattr } for pid=4243 comm="chown" name=".beagleindexwapi.WBuTxi4242" dev=dm-0 ino=14567747 scontext=system_u:system_r:system_crond_t:s0 tcontext=system_u:object_r:tmp_t:s0 tclass=dir type=SYSCALL msg=audit(1162909881.356:330): arch=40000003 syscall=212 success=yes exit=0 a0=a0545c8 a1=3a a2=ffffffff a3=0 items=0 ppid=4240 pid=4243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="chown" exe="/bin/chown" subj=system_u:system_r:system_crond_t:s0 key=(null) type=AVC msg=audit(1162909881.420:331): avc: denied { search } for pid=4252 comm="runuser" scontext=system_u:system_r:system_crond_t:s0 tcontext=system_u:system_r:system_crond_t:s0 tclass=key type=SYSCALL msg=audit(1162909881.420:331): arch=40000003 syscall=288 success=yes exit=644961874 a0=0 a1=fffffffd a2=0 a3=3a items=0 ppid=4240 pid=4252 auid=4294967295 uid=58 gid=58 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="runuser" exe="/sbin/runuser" subj=system_u:system_r:system_crond_t:s0 key=(null) type=AVC msg=audit(1162909881.448:332): avc: denied { write } for pid=4252 comm="runuser" scontext=system_u:system_r:system_crond_t:s0 tcontext=system_u:system_r:system_crond_t:s0 tclass=key type=AVC msg=audit(1162909881.448:332): avc: denied { link } for pid=4252 comm="runuser" scontext=system_u:system_r:system_crond_t:s0 tcontext=system_u:system_r:system_crond_t:s0 tclass=key type=SYSCALL msg=audit(1162909881.448:332): arch=40000003 syscall=288 success=yes exit=0 a0=8 a1=fffffffc a2=fffffffd a3=3a items=0 ppid=4240 pid=4252 auid=4294967295 uid=58 gid=58 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="runuser" exe="/sbin/runuser" subj=system_u:system_r:system_crond_t:s0 key=(null) type=AVC msg=audit(1162909881.448:333): avc: denied { create } for pid=4252 comm="runuser" scontext=system_u:system_r:system_crond_t:s0 tcontext=system_u:system_r:system_crond_t:s0 tclass=netlink_audit_socket type=SYSCALL msg=audit(1162909881.448:333): arch=40000003 syscall=102 success=yes exit=4 a0=1 a1=bfb31c50 a2=4d8cdff4 a3=0 items=0 ppid=4240 pid=4252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="runuser" exe="/sbin/runuser" subj=system_u:system_r:system_crond_t:s0 key=(null) type=AVC msg=audit(1162909881.448:334): avc: denied { write } for pid=4252 comm="runuser" scontext=system_u:system_r:system_crond_t:s0 tcontext=system_u:system_r:system_crond_t:s0 tclass=netlink_audit_socket type=AVC msg=audit(1162909881.448:334): avc: denied { nlmsg_relay } for pid=4252 comm="runuser" scontext=system_u:system_r:system_crond_t:s0 tcontext=system_u:system_r:system_crond_t:s0 tclass=netlink_audit_socket type=AVC msg=audit(1162909881.448:334): avc: denied { audit_write } for pid=4252 comm="runuser" capability=29 scontext=system_u:system_r:system_crond_t:s0 tcontext=system_u:system_r:system_crond_t:s0 tclass=capability type=USER_START msg=audit(1162909881.448:335): user pid=4252 uid=0 auid=4294967295 subj=system_u:system_r:system_crond_t:s0 msg='PAM: session open acct=beaglidx : exe="/sbin/runuser" (hostname=?, addr=?, terminal=? res=success)' type=SYSCALL msg=audit(1162909881.448:334): arch=40000003 syscall=102 success=yes exit=116 a0=b a1=bfb26ed0 a2=4d8cdff4 a3=bfb2d910 items=0 ppid=4240 pid=4252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="runuser" exe="/sbin/runuser" subj=system_u:system_r:system_crond_t:s0 key=(null) type=AVC msg=audit(1162909881.448:336): avc: denied { read } for pid=4252 comm="runuser" scontext=system_u:system_r:system_crond_t:s0 tcontext=system_u:system_r:system_crond_t:s0 tclass=netlink_audit_socket type=SYSCALL msg=audit(1162909881.448:336): arch=40000003 syscall=102 success=yes exit=36 a0=c a1=bfb26e80 a2=4d8cdff4 a3=bfb2924c items=0 ppid=4240 pid=4252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="runuser" exe="/sbin/runuser" subj=system_u:system_r:system_crond_t:s0 key=(null) type=CRED_ACQ msg=audit(1162909881.448:337): user pid=4252 uid=0 auid=4294967295 subj=system_u:system_r:system_crond_t:s0 msg='PAM: setcred acct=beaglidx : exe="/sbin/runuser" (hostname=?, addr=?, terminal=? res=success)' type=AVC msg=audit(1162909881.692:338): avc: denied { execute } for pid=4253 comm="beagle-build-in" name="mono" dev=dm-0 ino=10323612 scontext=system_u:system_r:system_crond_t:s0 tcontext=system_u:object_r:mono_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162909881.692:338): arch=40000003 syscall=33 success=yes exit=0 a0=845d5b0 a1=1 a2=11 a3=845d5b0 items=0 ppid=4252 pid=4253 auid=4294967295 uid=58 gid=58 euid=58 suid=58 fsuid=58 egid=58 sgid=58 fsgid=58 tty=(none) comm="beagle-build-in" exe="/bin/bash" subj=system_u:system_r:system_crond_t:s0 key=(null) type=AVC msg=audit(1162909881.692:339): avc: denied { read } for pid=4253 comm="beagle-build-in" name="mono" dev=dm-0 ino=10323612 scontext=system_u:system_r:system_crond_t:s0 tcontext=system_u:object_r:mono_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162909881.692:339): arch=40000003 syscall=33 success=yes exit=0 a0=845d5b0 a1=4 a2=ffffffff a3=845d5b0 items=0 ppid=4252 pid=4253 auid=4294967295 uid=58 gid=58 euid=58 suid=58 fsuid=58 egid=58 sgid=58 fsgid=58 tty=(none) comm="beagle-build-in" exe="/bin/bash" subj=system_u:system_r:system_crond_t:s0 key=(null) type=AVC msg=audit(1162909881.692:340): avc: denied { execute_no_trans } for pid=4253 comm="beagle-build-in" name="mono" dev=dm-0 ino=10323612 scontext=system_u:system_r:system_crond_t:s0 tcontext=system_u:object_r:mono_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162909881.692:340): arch=40000003 syscall=11 success=yes exit=0 a0=845d000 a1=845cbd8 a2=845d798 a3=845cbd8 items=0 ppid=4252 pid=4253 auid=4294967295 uid=58 gid=58 euid=58 suid=58 fsuid=58 egid=58 sgid=58 fsgid=58 tty=(none) comm="mono" exe="/usr/bin/mono" subj=system_u:system_r:system_crond_t:s0 key=(null) type=AVC_PATH msg=audit(1162909881.692:340): path="/usr/bin/mono" type=AVC msg=audit(1162909881.696:341): avc: denied { execheap } for pid=4253 comm="mono" scontext=system_u:system_r:system_crond_t:s0 tcontext=system_u:system_r:system_crond_t:s0 tclass=process type=AVC msg=audit(1162909881.696:341): avc: denied { execmem } for pid=4253 comm="mono" scontext=system_u:system_r:system_crond_t:s0 tcontext=system_u:system_r:system_crond_t:s0 tclass=process type=SYSCALL msg=audit(1162909881.696:341): arch=40000003 syscall=125 success=yes exit=0 a0=8575000 a1=1000 a2=7 a3=1 items=0 ppid=4252 pid=4253 auid=4294967295 uid=58 gid=58 euid=58 suid=58 fsuid=58 egid=58 sgid=58 fsgid=58 tty=(none) comm="mono" exe="/usr/bin/mono" subj=system_u:system_r:system_crond_t:s0 key=(null) type=AVC msg=audit(1162909881.696:342): avc: denied { getsched } for pid=4253 comm="mono" scontext=system_u:system_r:system_crond_t:s0 tcontext=system_u:system_r:system_crond_t:s0 tclass=process type=SYSCALL msg=audit(1162909881.696:342): arch=40000003 syscall=155 success=yes exit=0 a0=109d a1=b7f828dc a2=496ff4 a3=b7f826d0 items=0 ppid=4252 pid=4253 auid=4294967295 uid=58 gid=58 euid=58 suid=58 fsuid=58 egid=58 sgid=58 fsgid=58 tty=(none) comm="mono" exe="/usr/bin/mono" subj=system_u:system_r:system_crond_t:s0 key=(null) type=AVC msg=audit(1162909881.708:343): avc: denied { create } for pid=4253 comm="mono" key=1291864389 scontext=system_u:system_r:system_crond_t:s0 tcontext=system_u:system_r:system_crond_t:s0 tclass=sem type=SYSCALL msg=audit(1162909881.708:343): arch=40000003 syscall=117 success=yes exit=32769 a0=2 a1=4d004945 a2=8 a3=780 items=0 ppid=4252 pid=4253 auid=4294967295 uid=58 gid=58 euid=58 suid=58 fsuid=58 egid=58 sgid=58 fsgid=58 tty=(none) comm="mono" exe="/usr/bin/mono" subj=system_u:system_r:system_crond_t:s0 key=(null) type=AVC msg=audit(1162909881.708:344): avc: denied { unix_write } for pid=4253 comm="mono" key=1291864389 scontext=system_u:system_r:system_crond_t:s0 tcontext=system_u:system_r:system_crond_t:s0 tclass=sem type=AVC msg=audit(1162909881.708:344): avc: denied { write } for pid=4253 comm="mono" key=1291864389 scontext=system_u:system_r:system_crond_t:s0 tcontext=system_u:system_r:system_crond_t:s0 tclass=sem type=SYSCALL msg=audit(1162909881.708:344): arch=40000003 syscall=117 success=yes exit=0 a0=3 a1=8001 a2=0 a3=111 items=0 ppid=4252 pid=4253 auid=4294967295 uid=58 gid=58 euid=58 suid=58 fsuid=58 egid=58 sgid=58 fsgid=58 tty=(none) comm="mono" exe="/usr/bin/mono" subj=system_u:system_r:system_crond_t:s0 key=(null) type=AVC msg=audit(1162909881.708:345): avc: denied { read } for pid=4253 comm="mono" key=1291864389 scontext=system_u:system_r:system_crond_t:s0 tcontext=system_u:system_r:system_crond_t:s0 tclass=sem type=SYSCALL msg=audit(1162909881.708:345): arch=40000003 syscall=117 success=yes exit=0 a0=1 a1=8001 a2=1 a3=0 items=0 ppid=4252 pid=4253 auid=4294967295 uid=58 gid=58 euid=58 suid=58 fsuid=58 egid=58 sgid=58 fsgid=58 tty=(none) comm="mono" exe="/usr/bin/mono" subj=system_u:system_r:system_crond_t:s0 key=(null) type=AVC msg=audit(1162909881.916:346): avc: denied { write } for pid=4253 comm="beagle-build-in" name="applications" dev=dm-0 ino=14504728 scontext=system_u:system_r:system_crond_t:s0 tcontext=user_u:object_r:var_t:s0 tclass=dir type=AVC msg=audit(1162909881.916:346): avc: denied { remove_name } for pid=4253 comm="beagle-build-in" name="Locks" dev=dm-0 ino=14504729 scontext=system_u:system_r:system_crond_t:s0 tcontext=user_u:object_r:var_t:s0 tclass=dir type=AVC msg=audit(1162909881.916:346): avc: denied { rmdir } for pid=4253 comm="beagle-build-in" name="Locks" dev=dm-0 ino=14504729 scontext=system_u:system_r:system_crond_t:s0 tcontext=user_u:object_r:var_t:s0 tclass=dir type=SYSCALL msg=audit(1162909881.916:346): arch=40000003 syscall=40 success=yes exit=0 a0=8644198 a1=45 a2=8208528 a3=8644198 items=0 ppid=4252 pid=4253 auid=4294967295 uid=58 gid=58 euid=58 suid=58 fsuid=58 egid=58 sgid=58 fsgid=58 tty=(none) comm="beagle-build-in" exe="/usr/bin/mono" subj=system_u:system_r:system_crond_t:s0 key=(null) type=AVC msg=audit(1162909881.932:347): avc: denied { unlink } for pid=4253 comm="beagle-build-in" name="_228.cfs" dev=dm-0 ino=14535829 scontext=system_u:system_r:system_crond_t:s0 tcontext=system_u:object_r:var_t:s0 tclass=file type=SYSCALL msg=audit(1162909881.932:347): arch=40000003 syscall=10 success=yes exit=0 a0=864a890 a1=45 a2=8208528 a3=864a890 items=0 ppid=4252 pid=4253 auid=4294967295 uid=58 gid=58 euid=58 suid=58 fsuid=58 egid=58 sgid=58 fsgid=58 tty=(none) comm="beagle-build-in" exe="/usr/bin/mono" subj=system_u:system_r:system_crond_t:s0 key=(null) type=AVC msg=audit(1162909881.972:348): avc: denied { unlink } for pid=4253 comm="beagle-build-in" name="segments" dev=dm-0 ino=14504743 scontext=system_u:system_r:system_crond_t:s0 tcontext=user_u:object_r:var_t:s0 tclass=file type=SYSCALL msg=audit(1162909881.972:348): arch=40000003 syscall=10 success=yes exit=0 a0=8681000 a1=45 a2=8208528 a3=8681000 items=0 ppid=4252 pid=4253 auid=4294967295 uid=58 gid=58 euid=58 suid=58 fsuid=58 egid=58 sgid=58 fsgid=58 tty=(none) comm="beagle-build-in" exe="/usr/bin/mono" subj=system_u:system_r:system_crond_t:s0 key=(null) type=AVC msg=audit(1162909882.040:349): avc: denied { write } for pid=4253 comm="beagle-build-in" name="indexes" dev=dm-0 ino=14437230 scontext=system_u:system_r:system_crond_t:s0 tcontext=system_u:object_r:var_t:s0 tclass=dir type=AVC msg=audit(1162909882.040:349): avc: denied { remove_name } for pid=4253 comm="beagle-build-in" name="applications" dev=dm-0 ino=14504728 scontext=system_u:system_r:system_crond_t:s0 tcontext=system_u:object_r:var_t:s0 tclass=dir type=SYSCALL msg=audit(1162909882.040:349): arch=40000003 syscall=40 success=yes exit=0 a0=8653f58 a1=45 a2=8208528 a3=8653f58 items=0 ppid=4252 pid=4253 auid=4294967295 uid=58 gid=58 euid=58 suid=58 fsuid=58 egid=58 sgid=58 fsgid=58 tty=(none) comm="beagle-build-in" exe="/usr/bin/mono" subj=system_u:system_r:system_crond_t:s0 key=(null) type=AVC msg=audit(1162909882.044:350): avc: denied { add_name } for pid=4253 comm="beagle-build-in" name="applications" scontext=system_u:system_r:system_crond_t:s0 tcontext=system_u:object_r:var_t:s0 tclass=dir type=AVC msg=audit(1162909882.044:350): avc: denied { create } for pid=4253 comm="beagle-build-in" name="applications" scontext=system_u:system_r:system_crond_t:s0 tcontext=system_u:object_r:var_t:s0 tclass=dir type=SYSCALL msg=audit(1162909882.044:350): arch=40000003 syscall=39 success=yes exit=0 a0=86488f8 a1=1ff a2=8208528 a3=86488f8 items=0 ppid=4252 pid=4253 auid=4294967295 uid=58 gid=58 euid=58 suid=58 fsuid=58 egid=58 sgid=58 fsgid=58 tty=(none) comm="beagle-build-in" exe="/usr/bin/mono" subj=system_u:system_r:system_crond_t:s0 key=(null) type=AVC msg=audit(1162909882.288:351): avc: denied { create } for pid=4253 comm="beagle-build-in" name="lucene-387e9e5278e1cbfa1ca3bb850a474745-write.lock" scontext=system_u:system_r:system_crond_t:s0 tcontext=system_u:object_r:var_t:s0 tclass=file type=SYSCALL msg=audit(1162909882.288:351): arch=40000003 syscall=5 success=yes exit=12 a0=871b158 a1=80c2 a2=100 a3=80c2 items=0 ppid=4252 pid=4253 auid=4294967295 uid=58 gid=58 euid=58 suid=58 fsuid=58 egid=58 sgid=58 fsgid=58 tty=(none) comm="beagle-build-in" exe="/usr/bin/mono" subj=system_u:system_r:system_crond_t:s0 key=(null) type=AVC msg=audit(1162909882.296:352): avc: denied { write } for pid=4253 comm="beagle-build-in" name="lucene-387e9e5278e1cbfa1ca3bb850a474745-write.lock" dev=dm-0 ino=14567754 scontext=system_u:system_r:system_crond_t:s0 tcontext=system_u:object_r:var_t:s0 tclass=file type=SYSCALL msg=audit(1162909882.296:352): arch=40000003 syscall=4 success=yes exit=5 a0=c a1=87227b8 a2=5 a3=81c30 items=0 ppid=4252 pid=4253 auid=4294967295 uid=58 gid=58 euid=58 suid=58 fsuid=58 egid=58 sgid=58 fsgid=58 tty=(none) comm="beagle-build-in" exe="/usr/bin/mono" subj=system_u:system_r:system_crond_t:s0 key=(null) type=AVC_PATH msg=audit(1162909882.296:352): path="/var/cache/beagle/indexes/applications/Locks/lucene-387e9e5278e1cbfa1ca3bb850a474745-write.lock" type=AVC msg=audit(1162909882.304:353): avc: denied { rename } for pid=4253 comm="beagle-build-in" name="segments.new" dev=dm-0 ino=14567756 scontext=system_u:system_r:system_crond_t:s0 tcontext=system_u:object_r:var_t:s0 tclass=file type=SYSCALL msg=audit(1162909882.304:353): arch=40000003 syscall=38 success=yes exit=0 a0=8721790 a1=8720bc0 a2=8208528 a3=8721790 items=0 ppid=4252 pid=4253 auid=4294967295 uid=58 gid=58 euid=58 suid=58 fsuid=58 egid=58 sgid=58 fsgid=58 tty=(none) comm="beagle-build-in" exe="/usr/bin/mono" subj=system_u:system_r:system_crond_t:s0 key=(null) type=AVC msg=audit(1162909925.087:354): avc: denied { unix_read } for pid=4253 comm="beagle-build-in" key=1291864389 scontext=system_u:system_r:system_crond_t:s0 tcontext=system_u:system_r:system_crond_t:s0 tclass=sem type=SYSCALL msg=audit(1162909925.087:354): arch=40000003 syscall=117 success=yes exit=2 a0=3 a1=8001 a2=7 a3=10c items=0 ppid=4252 pid=4253 auid=4294967295 uid=58 gid=58 euid=58 suid=58 fsuid=58 egid=58 sgid=58 fsgid=58 tty=(none) comm="beagle-build-in" exe="/usr/bin/mono" subj=system_u:system_r:system_crond_t:s0 key=(null) type=AVC msg=audit(1162909925.087:355): avc: denied { destroy } for pid=4253 comm="beagle-build-in" key=1291864389 scontext=system_u:system_r:system_crond_t:s0 tcontext=system_u:system_r:system_crond_t:s0 tclass=sem type=SYSCALL msg=audit(1162909925.087:355): arch=40000003 syscall=117 success=yes exit=0 a0=3 a1=8001 a2=0 a3=100 items=0 ppid=4252 pid=4253 auid=4294967295 uid=58 gid=58 euid=58 suid=58 fsuid=58 egid=58 sgid=58 fsgid=58 tty=(none) comm="beagle-build-in" exe="/usr/bin/mono" subj=system_u:system_r:system_crond_t:s0 key=(null) type=AVC msg=audit(1162909925.091:356): avc: denied { audit_write } for pid=4252 comm="runuser" capability=29 scontext=system_u:system_r:system_crond_t:s0 tcontext=system_u:system_r:system_crond_t:s0 tclass=capability type=CRED_DISP msg=audit(1162909925.091:357): user pid=4252 uid=0 auid=4294967295 subj=system_u:system_r:system_crond_t:s0 msg='PAM: setcred acct=beaglidx : exe="/sbin/runuser" (hostname=?, addr=?, terminal=? res=success)' type=SYSCALL msg=audit(1162909925.091:356): arch=40000003 syscall=102 success=yes exit=112 a0=b a1=bfb26ed0 a2=4d8cdff4 a3=bfb2d910 items=0 ppid=4240 pid=4252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="runuser" exe="/sbin/runuser" subj=system_u:system_r:system_crond_t:s0 key=(null) type=USER_END msg=audit(1162909925.091:358): user pid=4252 uid=0 auid=4294967295 subj=system_u:system_r:system_crond_t:s0 msg='PAM: session close acct=beaglidx : exe="/sbin/runuser" (hostname=?, addr=?, terminal=? res=success)' type=USER_START msg=audit(1162909925.139:359): user pid=4291 uid=0 auid=4294967295 subj=system_u:system_r:system_crond_t:s0 msg='PAM: session open acct=beaglidx : exe="/sbin/runuser" (hostname=?, addr=?, terminal=? res=success)' type=CRED_ACQ msg=audit(1162909925.139:360): user pid=4291 uid=0 auid=4294967295 subj=system_u:system_r:system_crond_t:s0 msg='PAM: setcred acct=beaglidx : exe="/sbin/runuser" (hostname=?, addr=?, terminal=? res=success)' type=USER_AUTH msg=audit(1162909926.015:361): user pid=4282 uid=500 auid=500 subj=staff_u:staff_r:staff_su_t:s0 msg='PAM: authentication acct=root : exe="/bin/su" (hostname=?, addr=?, terminal=pts/2 res=success)' type=USER_ACCT msg=audit(1162909926.015:362): user pid=4282 uid=500 auid=500 subj=staff_u:staff_r:staff_su_t:s0 msg='PAM: accounting acct=root : exe="/bin/su" (hostname=?, addr=?, terminal=pts/2 res=success)' type=AVC msg=audit(1162909926.043:363): avc: denied { search } for pid=4282 comm="su" name="root" dev=dm-0 ino=13127137 scontext=staff_u:staff_r:staff_su_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=SYSCALL msg=audit(1162909926.043:363): arch=40000003 syscall=5 success=no exit=-2 a0=bfccd0f8 a1=8000 a2=1b6 a3=971d9a8 items=0 ppid=4262 pid=4282 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=pts2 comm="su" exe="/bin/su" subj=staff_u:staff_r:staff_su_t:s0 key=(null) type=AVC msg=audit(1162909926.079:364): avc: denied { write } for pid=4298 comm="xauth" name=".gdmF70UIT" dev=dm-0 ino=14469320 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162909926.079:364): arch=40000003 syscall=33 success=yes exit=0 a0=bfd4991c a1=2 a2=bfd484f0 a3=0 items=0 ppid=4282 pid=4298 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts2 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC msg=audit(1162909926.079:365): avc: denied { read } for pid=4298 comm="xauth" name=".gdmF70UIT" dev=dm-0 ino=14469320 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162909926.079:365): arch=40000003 syscall=5 success=yes exit=2 a0=bfd4991c a1=0 a2=1b6 a3=8423008 items=0 ppid=4282 pid=4298 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts2 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC msg=audit(1162909926.079:366): avc: denied { getattr } for pid=4298 comm="xauth" name=".gdmF70UIT" dev=dm-0 ino=14469320 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162909926.079:366): arch=40000003 syscall=197 success=yes exit=0 a0=2 a1=bfd4823c a2=907ff4 a3=8423008 items=0 ppid=4282 pid=4298 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts2 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC_PATH msg=audit(1162909926.079:366): path="/tmp/.gdmF70UIT" type=AVC msg=audit(1162909926.083:367): avc: denied { write } for pid=4282 comm="su" name="root" dev=dm-0 ino=13127137 scontext=staff_u:staff_r:staff_su_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1162909926.083:367): avc: denied { add_name } for pid=4282 comm="su" name=".xauth7KBaGA" scontext=staff_u:staff_r:staff_su_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1162909926.083:367): avc: denied { create } for pid=4282 comm="su" name=".xauth7KBaGA" scontext=staff_u:staff_r:staff_su_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1162909926.083:367): arch=40000003 syscall=5 success=yes exit=4 a0=971dacb a1=80c2 a2=180 a3=80c2 items=0 ppid=4262 pid=4282 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=pts2 comm="su" exe="/bin/su" subj=staff_u:staff_r:staff_su_t:s0 key=(null) type=AVC msg=audit(1162909926.083:368): avc: denied { setattr } for pid=4282 comm="su" name=".xauth7KBaGA" dev=dm-0 ino=13127376 scontext=staff_u:staff_r:staff_su_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1162909926.083:368): arch=40000003 syscall=207 success=yes exit=0 a0=4 a1=0 a2=0 a3=42a69f items=0 ppid=4262 pid=4282 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=pts2 comm="su" exe="/bin/su" subj=staff_u:staff_r:staff_su_t:s0 key=(null) type=AVC msg=audit(1162909926.083:369): avc: denied { search } for pid=4299 comm="xauth" name="root" dev=dm-0 ino=13127137 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=SYSCALL msg=audit(1162909926.083:369): arch=40000003 syscall=195 success=no exit=-2 a0=bf9ac427 a1=bf9abf40 a2=c97ff4 a3=3 items=0 ppid=4282 pid=4299 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC msg=audit(1162909926.083:370): avc: denied { write } for pid=4299 comm="xauth" name="root" dev=dm-0 ino=13127137 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1162909926.083:370): avc: denied { add_name } for pid=4299 comm="xauth" name=".xauth7KBaGA-c" scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1162909926.083:370): avc: denied { create } for pid=4299 comm="xauth" name=".xauth7KBaGA-c" scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1162909926.083:370): arch=40000003 syscall=5 success=yes exit=2 a0=bf9ac427 a1=c1 a2=180 a3=ffffffff items=0 ppid=4282 pid=4299 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC msg=audit(1162909926.083:371): avc: denied { link } for pid=4299 comm="xauth" name=".xauth7KBaGA-c" dev=dm-0 ino=13127377 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1162909926.083:371): arch=40000003 syscall=9 success=yes exit=0 a0=bf9ac427 a1=bf9ac026 a2=4db18a64 a3=2 items=0 ppid=4282 pid=4299 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC msg=audit(1162909926.083:372): avc: denied { write } for pid=4299 comm="xauth" name=".xauth7KBaGA" dev=dm-0 ino=13127376 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1162909926.083:372): arch=40000003 syscall=33 success=yes exit=0 a0=bf9ae918 a1=2 a2=bf9ac950 a3=0 items=0 ppid=4282 pid=4299 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC msg=audit(1162909926.083:373): avc: denied { read } for pid=4299 comm="xauth" name=".xauth7KBaGA" dev=dm-0 ino=13127376 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1162909926.083:373): arch=40000003 syscall=5 success=yes exit=2 a0=bf9ae918 a1=0 a2=1b6 a3=90c5008 items=0 ppid=4282 pid=4299 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC msg=audit(1162909926.083:374): avc: denied { getattr } for pid=4299 comm="xauth" name=".xauth7KBaGA" dev=dm-0 ino=13127376 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1162909926.083:374): arch=40000003 syscall=197 success=yes exit=0 a0=2 a1=bf9ac69c a2=c97ff4 a3=90c5008 items=0 ppid=4282 pid=4299 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC_PATH msg=audit(1162909926.083:374): path="/root/.xauth7KBaGA" type=AVC msg=audit(1162909926.083:375): avc: denied { remove_name } for pid=4299 comm="xauth" name=".xauth7KBaGA" dev=dm-0 ino=13127376 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1162909926.083:375): avc: denied { unlink } for pid=4299 comm="xauth" name=".xauth7KBaGA" dev=dm-0 ino=13127376 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1162909926.083:375): arch=40000003 syscall=10 success=yes exit=0 a0=90c5008 a1=1000 a2=0 a3=90c508a items=0 ppid=4282 pid=4299 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=USER_START msg=audit(1162909926.083:376): user pid=4282 uid=500 auid=500 subj=staff_u:staff_r:staff_su_t:s0 msg='PAM: session open acct=root : exe="/bin/su" (hostname=?, addr=?, terminal=pts/2 res=success)' type=CRED_ACQ msg=audit(1162909926.083:377): user pid=4282 uid=500 auid=500 subj=staff_u:staff_r:staff_su_t:s0 msg='PAM: setcred acct=root : exe="/bin/su" (hostname=?, addr=?, terminal=pts/2 res=success)' type=AVC msg=audit(1162909926.087:378): avc: denied { dac_override } for pid=4300 comm="bash" capability=1 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=capability type=SYSCALL msg=audit(1162909926.087:378): arch=40000003 syscall=195 success=yes exit=0 a0=9a7be38 a1=bfd8a290 a2=673ff4 a3=bfd8a290 items=0 ppid=4282 pid=4300 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162909926.087:379): avc: denied { read } for pid=4300 comm="bash" name=".bashrc" dev=dm-0 ino=13127142 scontext=staff_u:staff_r:staff_t:s0 tcontext=root:object_r:user_home_t:s0 tclass=file type=SYSCALL msg=audit(1162909926.087:379): arch=40000003 syscall=5 success=yes exit=3 a0=9a7db58 a1=8000 a2=0 a3=8000 items=0 ppid=4282 pid=4300 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162909926.175:380): avc: denied { read } for pid=4300 comm="bash" name=".bash_history" dev=dm-0 ino=13127151 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:user_home_t:s0 tclass=file type=SYSCALL msg=audit(1162909926.175:380): arch=40000003 syscall=5 success=yes exit=3 a0=9a7dd38 a1=8000 a2=0 a3=8000 items=0 ppid=4282 pid=4300 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=USER_AUTH msg=audit(1162909932.419:381): user pid=4321 uid=0 auid=500 subj=staff_u:staff_r:newrole_t:s0 msg='PAM: authentication acct=kmacmill : exe="/usr/bin/newrole" (hostname=?, addr=?, terminal=pts/2 res=success)' type=USER_ACCT msg=audit(1162909932.419:382): user pid=4321 uid=0 auid=500 subj=staff_u:staff_r:newrole_t:s0 msg='PAM: accounting acct=kmacmill : exe="/usr/bin/newrole" (hostname=?, addr=?, terminal=pts/2 res=success)' type=USER_ROLE_CHANGE msg=audit(1162909932.423:383): user pid=4324 uid=0 auid=500 subj=staff_u:staff_r:newrole_t:s0 msg='newrole: old-context=staff_u:staff_r:staff_t new-context=staff_u:sysadm_r:sysadm_t: exe="/usr/bin/newrole" (hostname=?, addr=?, terminal=/dev/pts/2 res=success)' type=AVC msg=audit(1162910331.648:384): avc: denied { read } for pid=4374 comm="mozilla-xremote" name=".gdmF70UIT" dev=dm-0 ino=14469320 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162910331.648:384): arch=40000003 syscall=33 success=yes exit=0 a0=bfc4cf92 a1=4 a2=4db18a64 a3=bfc4cf92 items=0 ppid=4373 pid=4374 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="mozilla-xremote" exe="/usr/lib/firefox-2.0/mozilla-xremote-client" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162910331.684:385): avc: denied { read } for pid=4371 comm="firefox-bin" name=".gdmF70UIT" dev=dm-0 ino=14469320 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162910331.684:385): arch=40000003 syscall=33 success=yes exit=0 a0=bf976fcb a1=4 a2=4db18a64 a3=bf976fcb items=0 ppid=1 pid=4371 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162910331.684:386): avc: denied { getattr } for pid=4371 comm="firefox-bin" name=".gdmF70UIT" dev=dm-0 ino=14469320 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162910331.684:386): arch=40000003 syscall=197 success=yes exit=0 a0=4 a1=bf973d1c a2=36aff4 a3=85d3140 items=0 ppid=1 pid=4371 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162910331.684:386): path="/tmp/.gdmF70UIT" type=AVC msg=audit(1162910331.836:387): avc: denied { unix_write } for pid=4292 comm="beagle-build-in" key=1291864389 scontext=system_u:system_r:system_crond_t:s0 tcontext=system_u:system_r:system_crond_t:s0 tclass=sem type=AVC msg=audit(1162910331.836:387): avc: denied { read write } for pid=4292 comm="beagle-build-in" key=1291864389 scontext=system_u:system_r:system_crond_t:s0 tcontext=system_u:system_r:system_crond_t:s0 tclass=sem type=SYSCALL msg=audit(1162910331.836:387): arch=40000003 syscall=117 success=yes exit=0 a0=1 a1=10001 a2=1 a3=0 items=0 ppid=4291 pid=4292 auid=4294967295 uid=58 gid=58 euid=58 suid=58 fsuid=58 egid=58 sgid=58 fsgid=58 tty=(none) comm="beagle-build-in" exe="/usr/bin/mono" subj=system_u:system_r:system_crond_t:s0 key=(null) type=AVC msg=audit(1162910339.621:388): avc: denied { getattr } for pid=4371 comm="firefox-bin" name="libflashplayer.so" dev=dm-0 ino=6547382 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=user_u:object_r:user_mozilla_home_t:s0 tclass=file type=SYSCALL msg=audit(1162910339.621:388): arch=40000003 syscall=196 success=yes exit=0 a0=bf9716e4 a1=bf971648 a2=36aff4 a3=8dbb4c8 items=0 ppid=1 pid=4371 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162910339.621:388): path="/home/kmacmill/.mozilla/plugins/libflashplayer.so" type=AVC msg=audit(1162910340.461:389): avc: denied { read } for pid=4371 comm="firefox-bin" name="libflashplayer.so" dev=dm-0 ino=6547382 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=user_u:object_r:user_mozilla_home_t:s0 tclass=file type=SYSCALL msg=audit(1162910340.461:389): arch=40000003 syscall=5 success=yes exit=46 a0=ae84b060 a1=0 a2=0 a3=ae84b060 items=0 ppid=1 pid=4371 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162910340.461:390): avc: denied { execute } for pid=4371 comm="firefox-bin" name="libflashplayer.so" dev=dm-0 ino=6547382 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=user_u:object_r:user_mozilla_home_t:s0 tclass=file type=SYSCALL msg=audit(1162910340.461:390): arch=40000003 syscall=192 success=yes exit=102780928 a0=0 a1=738dbc a2=5 a3=802 items=0 ppid=1 pid=4371 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162910340.461:390): path="/home/kmacmill/.mozilla/plugins/libflashplayer.so" type=AVC msg=audit(1162910353.258:391): avc: denied { read } for pid=4371 comm="firefox-bin" name=".gdmF70UIT" dev=dm-0 ino=14469320 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162910353.258:391): arch=40000003 syscall=33 success=yes exit=0 a0=bf976fcb a1=4 a2=4db18a64 a3=bf976fcb items=0 ppid=1 pid=4371 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162910353.258:392): avc: denied { getattr } for pid=4371 comm="firefox-bin" name=".gdmF70UIT" dev=dm-0 ino=14469320 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162910353.258:392): arch=40000003 syscall=197 success=yes exit=0 a0=28 a1=bf970c5c a2=36aff4 a3=ae82ff58 items=0 ppid=1 pid=4371 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162910353.258:392): path="/tmp/.gdmF70UIT" type=AVC msg=audit(1162910371.007:393): avc: denied { execute } for pid=4371 comm="firefox-bin" name="nprhapengine.so" dev=dm-0 ino=6547712 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_mozilla_home_t:s0 tclass=file type=SYSCALL msg=audit(1162910371.007:393): arch=40000003 syscall=192 success=yes exit=33730560 a0=0 a1=2af6e0 a2=5 a3=802 items=0 ppid=1 pid=4371 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162910371.007:393): path="/home/kmacmill/.mozilla/plugins/nprhapengine.so" type=AVC msg=audit(1162910371.063:394): avc: denied { execstack } for pid=4371 comm="firefox-bin" scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_mozilla_t:s0 tclass=process type=AVC msg=audit(1162910371.063:394): avc: denied { execmem } for pid=4371 comm="firefox-bin" scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_mozilla_t:s0 tclass=process type=SYSCALL msg=audit(1162910371.063:394): arch=40000003 syscall=125 success=yes exit=0 a0=bf974000 a1=1000 a2=1000007 a3=fffff000 items=0 ppid=1 pid=4371 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162910371.115:395): avc: denied { execmod } for pid=4371 comm="firefox-bin" name="nprhapengine.so" dev=dm-0 ino=6547712 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_mozilla_home_t:s0 tclass=file type=SYSCALL msg=audit(1162910371.115:395): arch=40000003 syscall=125 success=yes exit=0 a0=202b000 a1=26f000 a2=5 a3=bf971620 items=0 ppid=1 pid=4371 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162910371.115:395): path="/home/kmacmill/.mozilla/plugins/nprhapengine.so" type=AVC msg=audit(1162910376.651:396): avc: denied { search } for pid=4371 comm="firefox-bin" name="4-1:1.1" dev=sysfs ino=972 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:sysfs_t:s0 tclass=dir type=SYSCALL msg=audit(1162910376.651:396): arch=40000003 syscall=54 success=yes exit=0 a0=42 a1=c0045002 a2=bf973f14 a3=abd446b4 items=0 ppid=1 pid=4371 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162910376.699:397): avc: denied { write } for pid=4296 comm="beagle-build-in" name="PrimaryIndex" dev=dm-0 ino=14534976 scontext=system_u:system_r:system_crond_t:s0 tcontext=system_u:object_r:var_t:s0 tclass=dir type=AVC msg=audit(1162910376.699:397): avc: denied { add_name } for pid=4296 comm="beagle-build-in" name="_9hc.fnm" scontext=system_u:system_r:system_crond_t:s0 tcontext=system_u:object_r:var_t:s0 tclass=dir type=SYSCALL msg=audit(1162910376.699:397): arch=40000003 syscall=5 success=yes exit=14 a0=b6556648 a1=8041 a2=1a4 a3=8041 items=0 ppid=4291 pid=4296 auid=4294967295 uid=58 gid=58 euid=58 suid=58 fsuid=58 egid=58 sgid=58 fsgid=58 tty=(none) comm="beagle-build-in" exe="/usr/bin/mono" subj=system_u:system_r:system_crond_t:s0 key=(null) type=AVC msg=audit(1162910376.723:398): avc: denied { remove_name } for pid=4296 comm="beagle-build-in" name="segments" dev=dm-0 ino=14535064 scontext=system_u:system_r:system_crond_t:s0 tcontext=system_u:object_r:var_t:s0 tclass=dir type=SYSCALL msg=audit(1162910376.723:398): arch=40000003 syscall=10 success=yes exit=0 a0=b6556600 a1=45 a2=8208528 a3=b6556600 items=0 ppid=4291 pid=4296 auid=4294967295 uid=58 gid=58 euid=58 suid=58 fsuid=58 egid=58 sgid=58 fsgid=58 tty=(none) comm="beagle-build-in" exe="/usr/bin/mono" subj=system_u:system_r:system_crond_t:s0 key=(null) type=AVC msg=audit(1162910401.857:399): avc: denied { unlink } for pid=4296 comm="beagle-build-in" name="FileAttributesStore.db-journal" dev=dm-0 ino=14534984 scontext=system_u:system_r:system_crond_t:s0 tcontext=system_u:object_r:var_t:s0 tclass=file type=SYSCALL msg=audit(1162910401.857:399): arch=40000003 syscall=10 success=yes exit=0 a0=9d21242 a1=1 a2=4d3cee2c a3=9d21100 items=0 ppid=4291 pid=4296 auid=4294967295 uid=58 gid=58 euid=58 suid=58 fsuid=58 egid=58 sgid=58 fsgid=58 tty=(none) comm="beagle-build-in" exe="/usr/bin/mono" subj=system_u:system_r:system_crond_t:s0 key=(null) type=AVC msg=audit(1162910401.857:400): avc: denied { create } for pid=4296 comm="beagle-build-in" name="FileAttributesStore.db-journal" scontext=system_u:system_r:system_crond_t:s0 tcontext=system_u:object_r:var_t:s0 tclass=file type=SYSCALL msg=audit(1162910401.857:400): arch=40000003 syscall=5 success=yes exit=14 a0=9d21242 a1=80c2 a2=1a4 a3=80c2 items=0 ppid=4291 pid=4296 auid=4294967295 uid=58 gid=58 euid=58 suid=58 fsuid=58 egid=58 sgid=58 fsgid=58 tty=(none) comm="beagle-build-in" exe="/usr/bin/mono" subj=system_u:system_r:system_crond_t:s0 key=(null) type=AVC msg=audit(1162910401.857:401): avc: denied { write } for pid=4296 comm="beagle-build-in" name="FileAttributesStore.db-journal" dev=dm-0 ino=14534984 scontext=system_u:system_r:system_crond_t:s0 tcontext=system_u:object_r:var_t:s0 tclass=file type=SYSCALL msg=audit(1162910401.857:401): arch=40000003 syscall=4 success=yes exit=24 a0=e a1=b6bcda64 a2=18 a3=18 items=0 ppid=4291 pid=4296 auid=4294967295 uid=58 gid=58 euid=58 suid=58 fsuid=58 egid=58 sgid=58 fsgid=58 tty=(none) comm="beagle-build-in" exe="/usr/bin/mono" subj=system_u:system_r:system_crond_t:s0 key=(null) type=AVC_PATH msg=audit(1162910401.857:401): path="/var/cache/beagle/indexes/documentation/FileAttributesStore.db-journal" type=USER_ACCT msg=audit(1162910401.857:402): user pid=4418 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162910401.857:403): login pid=4418 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162910401.861:404): user pid=4418 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162910401.861:405): user pid=4418 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162910401.861:406): avc: denied { execute } for pid=4419 comm="sh" name="sa1" dev=dm-0 ino=13061698 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:lib_t:s0 tclass=file type=AVC msg=audit(1162910401.861:406): avc: denied { execute_no_trans } for pid=4419 comm="sh" name="sa1" dev=dm-0 ino=13061698 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1162910401.861:406): arch=40000003 syscall=11 success=yes exit=0 a0=92291b0 a1=9229358 a2=9229290 a3=9229008 items=0 ppid=4418 pid=4419 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sa1" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162910401.861:406): path="/usr/lib/sa/sa1" type=AVC msg=audit(1162910401.865:407): avc: denied { execute } for pid=4419 comm="sa1" name="sadc" dev=dm-0 ino=11981386 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=AVC msg=audit(1162910401.865:407): avc: denied { execute_no_trans } for pid=4419 comm="sa1" name="sadc" dev=dm-0 ino=11981386 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=AVC msg=audit(1162910401.865:407): avc: denied { read } for pid=4419 comm="sa1" name="sadc" dev=dm-0 ino=11981386 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162910401.865:407): arch=40000003 syscall=11 success=yes exit=0 a0=9229d48 a1=9229740 a2=9229d60 a3=9229740 items=0 ppid=4418 pid=4419 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162910401.865:407): path="/usr/lib/sa/sadc" type=AVC_PATH msg=audit(1162910401.865:407): path="/usr/lib/sa/sadc" type=AVC msg=audit(1162910401.865:408): avc: denied { search } for pid=4419 comm="sadc" name="net" dev=proc ino=-268435432 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=dir type=AVC msg=audit(1162910401.865:408): avc: denied { read } for pid=4419 comm="sadc" name="dev" dev=proc ino=-268435159 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=file type=SYSCALL msg=audit(1162910401.865:408): arch=40000003 syscall=5 success=yes exit=3 a0=8050371 a1=0 a2=1b6 a3=9756800 items=0 ppid=4418 pid=4419 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162910401.865:409): avc: denied { getattr } for pid=4419 comm="sadc" name="dev" dev=proc ino=-268435159 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=file type=SYSCALL msg=audit(1162910401.865:409): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bffbf0e8 a2=9d1ff4 a3=9756800 items=0 ppid=4418 pid=4419 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162910401.865:409): path="/proc/net/dev" type=AVC msg=audit(1162910401.865:410): avc: denied { search } for pid=4419 comm="sadc" name="sa" dev=dm-0 ino=14607631 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=dir type=SYSCALL msg=audit(1162910401.865:410): arch=40000003 syscall=33 success=yes exit=0 a0=bffbf494 a1=0 a2=bffbf388 a3=bffbf390 items=0 ppid=4418 pid=4419 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162910401.865:411): avc: denied { read append } for pid=4419 comm="sadc" name="sa07" dev=dm-0 ino=14600351 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=file type=SYSCALL msg=audit(1162910401.865:411): arch=40000003 syscall=5 success=yes exit=3 a0=bffbf494 a1=402 a2=bffbf658 a3=bffbf390 items=0 ppid=4418 pid=4419 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162910401.865:412): avc: denied { search } for pid=4419 comm="sadc" name="fs" dev=proc ino=-268435428 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=dir type=AVC msg=audit(1162910401.865:412): avc: denied { read } for pid=4419 comm="sadc" name="dentry-state" dev=proc ino=-268435227 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=file type=SYSCALL msg=audit(1162910401.865:412): arch=40000003 syscall=5 success=yes exit=4 a0=805037f a1=0 a2=1b6 a3=9756df0 items=0 ppid=4418 pid=4419 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162910401.865:413): avc: denied { getattr } for pid=4419 comm="sadc" name="dentry-state" dev=proc ino=-268435227 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=file type=SYSCALL msg=audit(1162910401.865:413): arch=40000003 syscall=197 success=yes exit=0 a0=4 a1=bffbef44 a2=9d1ff4 a3=9756df0 items=0 ppid=4418 pid=4419 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162910401.865:413): path="/proc/sys/fs/dentry-state" type=AVC msg=audit(1162910401.865:414): avc: denied { search } for pid=4419 comm="sadc" name="rpc" dev=proc ino=-268434552 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_rpc_t:s0 tclass=dir type=SYSCALL msg=audit(1162910401.865:414): arch=40000003 syscall=5 success=no exit=-2 a0=80502a5 a1=0 a2=1b6 a3=9756df0 items=0 ppid=4418 pid=4419 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162910401.869:415): avc: denied { lock } for pid=4419 comm="sadc" name="sa07" dev=dm-0 ino=14600351 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=file type=SYSCALL msg=audit(1162910401.869:415): arch=40000003 syscall=143 success=yes exit=0 a0=3 a1=6 a2=bffbf390 a3=3 items=0 ppid=4418 pid=4419 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162910401.869:415): path="/var/log/sa/sa07" type=CRED_DISP msg=audit(1162910401.885:416): user pid=4418 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162910401.885:417): user pid=4418 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162910402.229:418): avc: denied { rename } for pid=4296 comm="beagle-build-in" name="segments.new" dev=dm-0 ino=14535044 scontext=system_u:system_r:system_crond_t:s0 tcontext=system_u:object_r:var_t:s0 tclass=file type=SYSCALL msg=audit(1162910402.229:418): arch=40000003 syscall=38 success=yes exit=0 a0=b6533ee0 a1=b6533b58 a2=8208528 a3=b6533ee0 items=0 ppid=4291 pid=4296 auid=4294967295 uid=58 gid=58 euid=58 suid=58 fsuid=58 egid=58 sgid=58 fsgid=58 tty=(none) comm="beagle-build-in" exe="/usr/bin/mono" subj=system_u:system_r:system_crond_t:s0 key=(null) type=AVC msg=audit(1162910855.309:419): avc: denied { execute } for pid=4324 comm="bash" name="audit2policy" dev=dm-0 ino=13683706 scontext=staff_u:sysadm_r:sysadm_t:s0 tcontext=staff_u:object_r:staff_home_t:s0 tclass=file type=SYSCALL msg=audit(1162910855.309:419): arch=40000003 syscall=33 success=yes exit=0 a0=9c26268 a1=1 a2=11 a3=9c26268 items=0 ppid=4321 pid=4324 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="bash" exe="/bin/bash" subj=staff_u:sysadm_r:sysadm_t:s0 key=(null) type=AVC msg=audit(1162910857.045:420): avc: denied { execute_no_trans } for pid=4498 comm="bash" name="audit2policy" dev=dm-0 ino=13683706 scontext=staff_u:sysadm_r:sysadm_t:s0 tcontext=staff_u:object_r:staff_home_t:s0 tclass=file type=SYSCALL msg=audit(1162910857.045:420): arch=40000003 syscall=11 success=yes exit=0 a0=9c27358 a1=9c24610 a2=9c23ec0 a3=9c24340 items=0 ppid=4324 pid=4498 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="audit2policy" exe="/usr/bin/python" subj=staff_u:sysadm_r:sysadm_t:s0 key=(null) type=AVC_PATH msg=audit(1162910857.045:420): path="/home/kmacmill/projects/selinux/madison/audit2policy" type=USER_ACCT msg=audit(1162911001.962:421): user pid=4529 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162911001.962:422): login pid=4529 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162911001.962:423): user pid=4529 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162911001.962:424): user pid=4529 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162911001.970:425): avc: denied { execute } for pid=4530 comm="sa1" name="sadc" dev=dm-0 ino=11981386 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=AVC msg=audit(1162911001.970:425): avc: denied { execute_no_trans } for pid=4530 comm="sa1" name="sadc" dev=dm-0 ino=11981386 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=AVC msg=audit(1162911001.970:425): avc: denied { read } for pid=4530 comm="sa1" name="sadc" dev=dm-0 ino=11981386 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162911001.970:425): arch=40000003 syscall=11 success=yes exit=0 a0=962dd48 a1=962d740 a2=962dd60 a3=962d740 items=0 ppid=4529 pid=4530 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162911001.970:425): path="/usr/lib/sa/sadc" type=AVC_PATH msg=audit(1162911001.970:425): path="/usr/lib/sa/sadc" type=AVC msg=audit(1162911001.970:426): avc: denied { search } for pid=4530 comm="sadc" name="sa" dev=dm-0 ino=14607631 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=dir type=SYSCALL msg=audit(1162911001.970:426): arch=40000003 syscall=33 success=yes exit=0 a0=bfc9f974 a1=0 a2=bfc9f868 a3=bfc9f870 items=0 ppid=4529 pid=4530 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162911001.970:427): avc: denied { read append } for pid=4530 comm="sadc" name="sa07" dev=dm-0 ino=14600351 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=file type=SYSCALL msg=audit(1162911001.970:427): arch=40000003 syscall=5 success=yes exit=3 a0=bfc9f974 a1=402 a2=bfc9fb38 a3=bfc9f870 items=0 ppid=4529 pid=4530 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162911001.970:428): avc: denied { lock } for pid=4530 comm="sadc" name="sa07" dev=dm-0 ino=14600351 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=file type=SYSCALL msg=audit(1162911001.970:428): arch=40000003 syscall=143 success=yes exit=0 a0=3 a1=6 a2=bfc9f870 a3=3 items=0 ppid=4529 pid=4530 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162911001.970:428): path="/var/log/sa/sa07" type=CRED_DISP msg=audit(1162911002.118:429): user pid=4529 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162911002.118:430): user pid=4529 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162911228.792:431): avc: denied { unix_read } for pid=4292 comm="beagle-build-in" key=1291864389 scontext=system_u:system_r:system_crond_t:s0 tcontext=system_u:system_r:system_crond_t:s0 tclass=sem type=SYSCALL msg=audit(1162911228.792:431): arch=40000003 syscall=117 success=yes exit=2 a0=3 a1=10001 a2=7 a3=10c items=0 ppid=4291 pid=4292 auid=4294967295 uid=58 gid=58 euid=58 suid=58 fsuid=58 egid=58 sgid=58 fsgid=58 tty=(none) comm="beagle-build-in" exe="/usr/bin/mono" subj=system_u:system_r:system_crond_t:s0 key=(null) type=AVC msg=audit(1162911228.792:432): avc: denied { destroy } for pid=4292 comm="beagle-build-in" key=1291864389 scontext=system_u:system_r:system_crond_t:s0 tcontext=system_u:system_r:system_crond_t:s0 tclass=sem type=SYSCALL msg=audit(1162911228.792:432): arch=40000003 syscall=117 success=yes exit=0 a0=3 a1=10001 a2=0 a3=100 items=0 ppid=4291 pid=4292 auid=4294967295 uid=58 gid=58 euid=58 suid=58 fsuid=58 egid=58 sgid=58 fsgid=58 tty=(none) comm="beagle-build-in" exe="/usr/bin/mono" subj=system_u:system_r:system_crond_t:s0 key=(null) type=AVC msg=audit(1162911228.796:433): avc: denied { create } for pid=4291 comm="runuser" scontext=system_u:system_r:system_crond_t:s0 tcontext=system_u:system_r:system_crond_t:s0 tclass=netlink_audit_socket type=SYSCALL msg=audit(1162911228.796:433): arch=40000003 syscall=102 success=yes exit=4 a0=1 a1=bfdc6e80 a2=4d8cdff4 a3=8004 items=0 ppid=4240 pid=4291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="runuser" exe="/sbin/runuser" subj=system_u:system_r:system_crond_t:s0 key=(null) type=AVC msg=audit(1162911228.796:434): avc: denied { write } for pid=4291 comm="runuser" scontext=system_u:system_r:system_crond_t:s0 tcontext=system_u:system_r:system_crond_t:s0 tclass=netlink_audit_socket type=AVC msg=audit(1162911228.796:434): avc: denied { nlmsg_relay } for pid=4291 comm="runuser" scontext=system_u:system_r:system_crond_t:s0 tcontext=system_u:system_r:system_crond_t:s0 tclass=netlink_audit_socket type=AVC msg=audit(1162911228.796:434): avc: denied { audit_write } for pid=4291 comm="runuser" capability=29 scontext=system_u:system_r:system_crond_t:s0 tcontext=system_u:system_r:system_crond_t:s0 tclass=capability type=CRED_DISP msg=audit(1162911228.796:435): user pid=4291 uid=0 auid=4294967295 subj=system_u:system_r:system_crond_t:s0 msg='PAM: setcred acct=beaglidx : exe="/sbin/runuser" (hostname=?, addr=?, terminal=? res=success)' type=SYSCALL msg=audit(1162911228.796:434): arch=40000003 syscall=102 success=yes exit=112 a0=b a1=bfdbc100 a2=4d8cdff4 a3=bfdc2b40 items=0 ppid=4240 pid=4291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="runuser" exe="/sbin/runuser" subj=system_u:system_r:system_crond_t:s0 key=(null) type=AVC msg=audit(1162911228.796:436): avc: denied { read } for pid=4291 comm="runuser" scontext=system_u:system_r:system_crond_t:s0 tcontext=system_u:system_r:system_crond_t:s0 tclass=netlink_audit_socket type=SYSCALL msg=audit(1162911228.796:436): arch=40000003 syscall=102 success=yes exit=36 a0=c a1=bfdbc0b0 a2=4d8cdff4 a3=bfdbe47c items=0 ppid=4240 pid=4291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="runuser" exe="/sbin/runuser" subj=system_u:system_r:system_crond_t:s0 key=(null) type=AVC msg=audit(1162911228.796:437): avc: denied { search } for pid=4291 comm="runuser" scontext=system_u:system_r:system_crond_t:s0 tcontext=system_u:system_r:system_crond_t:s0 tclass=key type=AVC msg=audit(1162911228.796:437): avc: denied { write } for pid=4291 comm="runuser" scontext=system_u:system_r:system_crond_t:s0 tcontext=system_u:system_r:system_crond_t:s0 tclass=key type=SYSCALL msg=audit(1162911228.796:437): arch=40000003 syscall=288 success=yes exit=0 a0=3 a1=1dd81146 a2=0 a3=3a items=0 ppid=4240 pid=4291 auid=4294967295 uid=0 gid=0 euid=58 suid=58 fsuid=58 egid=0 sgid=0 fsgid=0 tty=(none) comm="runuser" exe="/sbin/runuser" subj=system_u:system_r:system_crond_t:s0 key=(null) type=USER_END msg=audit(1162911228.796:438): user pid=4291 uid=0 auid=4294967295 subj=system_u:system_r:system_crond_t:s0 msg='PAM: session close acct=beaglidx : exe="/sbin/runuser" (hostname=?, addr=?, terminal=? res=success)' type=AVC msg=audit(1162911228.932:439): avc: denied { rmdir } for pid=4570 comm="rm" name=".wapi" dev=dm-0 ino=14567748 scontext=system_u:system_r:system_crond_t:s0 tcontext=system_u:object_r:tmp_t:s0 tclass=dir type=SYSCALL msg=audit(1162911228.932:439): arch=40000003 syscall=40 success=yes exit=0 a0=9c61960 a1=bfbb20d4 a2=805277c a3=2 items=0 ppid=4240 pid=4570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="rm" exe="/bin/rm" subj=system_u:system_r:system_crond_t:s0 key=(null) type=AVC msg=audit(1162911229.901:440): avc: denied { read } for pid=4576 comm="chkconfig" name="innd" dev=dm-0 ino=9331492 scontext=system_u:system_r:system_crond_t:s0 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162911229.901:440): arch=40000003 syscall=5 success=yes exit=3 a0=bfa96cd0 a1=0 a2=ffffffff a3=8995858 items=0 ppid=4574 pid=4576 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="chkconfig" exe="/sbin/chkconfig" subj=system_u:system_r:system_crond_t:s0 key=(null) type=AVC msg=audit(1162911334.707:441): avc: denied { getattr } for pid=11055 comm="updatedb" name="/" dev=rpc_pipefs ino=8009 scontext=system_u:system_r:locate_t:s0 tcontext=system_u:object_r:rpc_pipefs_t:s0 tclass=dir type=SYSCALL msg=audit(1162911334.707:441): arch=40000003 syscall=196 success=yes exit=0 a0=bfe324b8 a1=bfe32288 a2=faaff4 a3=98cea6c items=0 ppid=11050 pid=11055 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:locate_t:s0 key=(null) type=AVC_PATH msg=audit(1162911334.707:441): path="/var/lib/nfs/rpc_pipefs" type=AVC msg=audit(1162911334.707:442): avc: denied { getattr } for pid=11055 comm="updatedb" name="/" dev=hdc ino=3008 scontext=system_u:system_r:locate_t:s0 tcontext=system_u:object_r:iso9660_t:s0 tclass=dir type=SYSCALL msg=audit(1162911334.707:442): arch=40000003 syscall=196 success=yes exit=0 a0=bfe324b8 a1=bfe32288 a2=faaff4 a3=98cea68 items=0 ppid=11050 pid=11055 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:locate_t:s0 key=(null) type=AVC_PATH msg=audit(1162911334.707:442): path=2F6D656469612F5761726372616674204949495F type=AVC msg=audit(1162911473.860:443): avc: denied { search } for pid=4371 comm="firefox-bin" name="4-1:1.1" dev=sysfs ino=972 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:sysfs_t:s0 tclass=dir type=SYSCALL msg=audit(1162911473.860:443): arch=40000003 syscall=54 success=yes exit=0 a0=29 a1=c0045002 a2=bf973f14 a3=abd446b4 items=0 ppid=1 pid=4371 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162911513.254:444): avc: denied { getattr } for pid=11055 comm="updatedb" name="/" dev=rpc_pipefs ino=8009 scontext=system_u:system_r:locate_t:s0 tcontext=system_u:object_r:rpc_pipefs_t:s0 tclass=dir type=SYSCALL msg=audit(1162911513.254:444): arch=40000003 syscall=196 success=yes exit=0 a0=bfe324b8 a1=bfe32288 a2=faaff4 a3=98cea6c items=0 ppid=11050 pid=11055 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:locate_t:s0 key=(null) type=AVC_PATH msg=audit(1162911513.254:444): path="/var/lib/nfs/rpc_pipefs" type=AVC msg=audit(1162911514.670:445): avc: denied { read } for pid=11055 comm="updatedb" name="/" dev=selinuxfs ino=344 scontext=system_u:system_r:locate_t:s0 tcontext=system_u:object_r:security_t:s0 tclass=dir type=SYSCALL msg=audit(1162911514.670:445): arch=40000003 syscall=5 success=yes exit=7 a0=804dc02 a1=18800 a2=bfe3229c a3=98cc928 items=0 ppid=11050 pid=11055 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:locate_t:s0 key=(null) type=AVC msg=audit(1162911582.255:446): avc: denied { read } for pid=4371 comm="firefox-bin" name=".gdmF70UIT" dev=dm-0 ino=14469320 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162911582.255:446): arch=40000003 syscall=33 success=yes exit=0 a0=bf976fcb a1=4 a2=4db18a64 a3=bf976fcb items=0 ppid=1 pid=4371 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162911582.255:447): avc: denied { getattr } for pid=4371 comm="firefox-bin" name=".gdmF70UIT" dev=dm-0 ino=14469320 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162911582.255:447): arch=40000003 syscall=197 success=yes exit=0 a0=3f a1=bf97398c a2=36aff4 a3=ab1b79f8 items=0 ppid=1 pid=4371 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162911582.255:447): path="/tmp/.gdmF70UIT" type=AVC msg=audit(1162911582.555:448): avc: denied { write } for pid=11102 comm="prelink" name="prelink.quick" dev=dm-0 ino=14438319 scontext=system_u:system_r:system_crond_t:s0 tcontext=system_u:object_r:var_lib_t:s0 tclass=file type=SYSCALL msg=audit(1162911582.555:448): arch=40000003 syscall=5 success=yes exit=3 a0=82b3708 a1=8241 a2=1b6 a3=8241 items=0 ppid=11094 pid=11102 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="prelink" exe="/bin/bash" subj=system_u:system_r:system_crond_t:s0 key=(null) type=USER_ACCT msg=audit(1162911601.424:449): user pid=11104 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162911601.424:450): login pid=11104 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162911601.432:451): user pid=11104 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162911601.432:452): user pid=11104 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162911601.436:453): avc: denied { execute } for pid=11105 comm="sh" name="sa1" dev=dm-0 ino=13061698 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:lib_t:s0 tclass=file type=AVC msg=audit(1162911601.436:453): avc: denied { execute_no_trans } for pid=11105 comm="sh" name="sa1" dev=dm-0 ino=13061698 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1162911601.436:453): arch=40000003 syscall=11 success=yes exit=0 a0=9a591b0 a1=9a59358 a2=9a59290 a3=9a59008 items=0 ppid=11104 pid=11105 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sa1" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162911601.436:453): path="/usr/lib/sa/sa1" type=AVC msg=audit(1162911601.536:454): avc: denied { execute } for pid=11105 comm="sa1" name="sadc" dev=dm-0 ino=11981386 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=AVC msg=audit(1162911601.536:454): avc: denied { execute_no_trans } for pid=11105 comm="sa1" name="sadc" dev=dm-0 ino=11981386 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=AVC msg=audit(1162911601.536:454): avc: denied { read } for pid=11105 comm="sa1" name="sadc" dev=dm-0 ino=11981386 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162911601.536:454): arch=40000003 syscall=11 success=yes exit=0 a0=833ad48 a1=833a740 a2=833ad60 a3=833a740 items=0 ppid=11104 pid=11105 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162911601.536:454): path="/usr/lib/sa/sadc" type=AVC_PATH msg=audit(1162911601.536:454): path="/usr/lib/sa/sadc" type=AVC msg=audit(1162911601.540:455): avc: denied { search } for pid=11105 comm="sadc" name="net" dev=proc ino=-268435432 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=dir type=AVC msg=audit(1162911601.540:455): avc: denied { read } for pid=11105 comm="sadc" name="dev" dev=proc ino=-268435159 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=file type=SYSCALL msg=audit(1162911601.540:455): arch=40000003 syscall=5 success=yes exit=3 a0=8050371 a1=0 a2=1b6 a3=8295800 items=0 ppid=11104 pid=11105 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162911601.540:456): avc: denied { getattr } for pid=11105 comm="sadc" name="dev" dev=proc ino=-268435159 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=file type=SYSCALL msg=audit(1162911601.540:456): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bfe60788 a2=2c3ff4 a3=8295800 items=0 ppid=11104 pid=11105 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162911601.540:456): path="/proc/net/dev" type=AVC msg=audit(1162911601.540:457): avc: denied { search } for pid=11105 comm="sadc" name="sa" dev=dm-0 ino=14607631 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=dir type=SYSCALL msg=audit(1162911601.540:457): arch=40000003 syscall=33 success=yes exit=0 a0=bfe60b34 a1=0 a2=bfe60a28 a3=bfe60a30 items=0 ppid=11104 pid=11105 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162911601.540:458): avc: denied { read append } for pid=11105 comm="sadc" name="sa07" dev=dm-0 ino=14600351 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=file type=SYSCALL msg=audit(1162911601.540:458): arch=40000003 syscall=5 success=yes exit=3 a0=bfe60b34 a1=402 a2=bfe60cf8 a3=bfe60a30 items=0 ppid=11104 pid=11105 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162911601.596:459): avc: denied { search } for pid=11105 comm="sadc" name="fs" dev=proc ino=-268435428 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=dir type=AVC msg=audit(1162911601.596:459): avc: denied { read } for pid=11105 comm="sadc" name="dentry-state" dev=proc ino=-268435227 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=file type=SYSCALL msg=audit(1162911601.596:459): arch=40000003 syscall=5 success=yes exit=4 a0=805037f a1=0 a2=1b6 a3=8295df0 items=0 ppid=11104 pid=11105 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162911601.596:460): avc: denied { getattr } for pid=11105 comm="sadc" name="dentry-state" dev=proc ino=-268435227 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=file type=SYSCALL msg=audit(1162911601.596:460): arch=40000003 syscall=197 success=yes exit=0 a0=4 a1=bfe605e4 a2=2c3ff4 a3=8295df0 items=0 ppid=11104 pid=11105 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162911601.596:460): path="/proc/sys/fs/dentry-state" type=AVC msg=audit(1162911601.596:461): avc: denied { search } for pid=11105 comm="sadc" name="rpc" dev=proc ino=-268434552 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_rpc_t:s0 tclass=dir type=SYSCALL msg=audit(1162911601.596:461): arch=40000003 syscall=5 success=no exit=-2 a0=80502a5 a1=0 a2=1b6 a3=8295df0 items=0 ppid=11104 pid=11105 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162911601.600:462): avc: denied { lock } for pid=11105 comm="sadc" name="sa07" dev=dm-0 ino=14600351 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=file type=SYSCALL msg=audit(1162911601.600:462): arch=40000003 syscall=143 success=yes exit=0 a0=3 a1=6 a2=bfe60a30 a3=3 items=0 ppid=11104 pid=11105 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162911601.600:462): path="/var/log/sa/sa07" type=CRED_DISP msg=audit(1162911601.704:463): user pid=11104 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162911601.704:464): user pid=11104 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162911661.712:465): user pid=12754 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162911661.712:466): login pid=12754 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162911661.712:467): user pid=12754 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162911661.716:468): user pid=12754 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162911661.716:469): avc: denied { getattr } for pid=12755 comm="bash" name="run-parts" dev=dm-0 ino=10331890 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1162911661.716:469): arch=40000003 syscall=195 success=yes exit=0 a0=9e38120 a1=bfee4fa0 a2=dbcff4 a3=9e38120 items=0 ppid=12754 pid=12755 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="bash" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162911661.716:469): path="/usr/bin/run-parts" type=AVC msg=audit(1162911661.716:470): avc: denied { execute } for pid=12755 comm="bash" name="run-parts" dev=dm-0 ino=10331890 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1162911661.716:470): arch=40000003 syscall=33 success=yes exit=0 a0=9e38120 a1=1 a2=11 a3=9e38120 items=0 ppid=12754 pid=12755 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="bash" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162911661.716:471): avc: denied { read } for pid=12755 comm="bash" name="run-parts" dev=dm-0 ino=10331890 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1162911661.716:471): arch=40000003 syscall=33 success=yes exit=0 a0=9e38120 a1=4 a2=ffffffff a3=9e38120 items=0 ppid=12754 pid=12755 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="bash" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162911661.716:472): avc: denied { execute_no_trans } for pid=12755 comm="bash" name="run-parts" dev=dm-0 ino=10331890 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1162911661.716:472): arch=40000003 syscall=11 success=yes exit=0 a0=9e38120 a1=9e383d8 a2=9e382f8 a3=9e37f98 items=0 ppid=12754 pid=12755 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="run-parts" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162911661.716:472): path="/usr/bin/run-parts" type=AVC msg=audit(1162911661.756:473): avc: denied { ioctl } for pid=12755 comm="run-parts" name="run-parts" dev=dm-0 ino=10331890 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1162911661.756:473): arch=40000003 syscall=54 success=no exit=-25 a0=3 a1=5401 a2=bfd16ff8 a3=bfd17038 items=0 ppid=12754 pid=12755 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="run-parts" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162911661.756:473): path="/usr/bin/run-parts" type=AVC msg=audit(1162911661.780:474): avc: denied { execute } for pid=12755 comm="run-parts" name="inn-cron-nntpsend" dev=dm-0 ino=9331477 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1162911661.780:474): arch=40000003 syscall=33 success=yes exit=0 a0=93ee990 a1=1 a2=1 a3=93eec98 items=0 ppid=12754 pid=12755 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="run-parts" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162911661.780:475): avc: denied { execute_no_trans } for pid=12758 comm="run-parts" name="inn-cron-nntpsend" dev=dm-0 ino=9331477 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1162911661.780:475): arch=40000003 syscall=11 success=yes exit=0 a0=93eea10 a1=93eead8 a2=93eeae8 a3=93ee758 items=0 ppid=12755 pid=12758 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="inn-cron-nntpse" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162911661.780:475): path="/etc/cron.hourly/inn-cron-nntpsend" type=AVC msg=audit(1162911661.832:476): avc: denied { execute } for pid=12760 comm="inn-cron-nntpse" name="chkconfig" dev=dm-0 ino=2848378 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sbin_t:s0 tclass=file type=AVC msg=audit(1162911661.832:476): avc: denied { execute_no_trans } for pid=12760 comm="inn-cron-nntpse" name="chkconfig" dev=dm-0 ino=2848378 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sbin_t:s0 tclass=file type=AVC msg=audit(1162911661.832:476): avc: denied { read } for pid=12760 comm="inn-cron-nntpse" name="chkconfig" dev=dm-0 ino=2848378 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sbin_t:s0 tclass=file type=SYSCALL msg=audit(1162911661.832:476): arch=40000003 syscall=11 success=yes exit=0 a0=8f9b678 a1=8f9b808 a2=8f9b720 a3=8f9b508 items=0 ppid=12758 pid=12760 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="chkconfig" exe="/sbin/chkconfig" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162911661.832:476): path="/sbin/chkconfig" type=AVC_PATH msg=audit(1162911661.832:476): path="/sbin/chkconfig" type=AVC msg=audit(1162911661.928:477): avc: denied { read } for pid=12760 comm="chkconfig" name="innd" dev=dm-0 ino=9331492 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162911661.928:477): arch=40000003 syscall=5 success=yes exit=3 a0=bfb2edf0 a1=0 a2=ffffffff a3=87d4038 items=0 ppid=12758 pid=12760 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="chkconfig" exe="/sbin/chkconfig" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162911661.928:478): avc: denied { getattr } for pid=12760 comm="chkconfig" name="innd" dev=dm-0 ino=9331492 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162911661.928:478): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bfb2ed60 a2=63cff4 a3=3 items=0 ppid=12758 pid=12760 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="chkconfig" exe="/sbin/chkconfig" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162911661.928:478): path="/etc/rc.d/init.d/innd" type=CRED_DISP msg=audit(1162911661.972:479): user pid=12754 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162911661.976:480): user pid=12754 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162911943.065:481): avc: denied { search } for pid=4371 comm="firefox-bin" name="usbdev4.2_ep01" dev=sysfs ino=247897 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:sysfs_t:s0 tclass=dir type=SYSCALL msg=audit(1162911943.065:481): arch=40000003 syscall=6 success=yes exit=0 a0=29 a1=0 a2=229b790 a3=ab187a88 items=0 ppid=1 pid=4371 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162912027.014:482): avc: denied { read } for pid=4371 comm="firefox-bin" name=".gdmF70UIT" dev=dm-0 ino=14469320 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162912027.014:482): arch=40000003 syscall=33 success=yes exit=0 a0=bf976fcb a1=4 a2=4db18a64 a3=bf976fcb items=0 ppid=1 pid=4371 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162912027.014:483): avc: denied { getattr } for pid=4371 comm="firefox-bin" name=".gdmF70UIT" dev=dm-0 ino=14469320 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162912027.014:483): arch=40000003 syscall=197 success=yes exit=0 a0=3e a1=bf97398c a2=36aff4 a3=b2c6b110 items=0 ppid=1 pid=4371 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162912027.014:483): path="/tmp/.gdmF70UIT" type=USER_ACCT msg=audit(1162912201.225:484): user pid=17460 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162912201.225:485): login pid=17460 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162912201.257:486): user pid=17460 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162912201.257:487): user pid=17460 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162912201.289:488): avc: denied { execute } for pid=17461 comm="sh" name="sa1" dev=dm-0 ino=13061698 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:lib_t:s0 tclass=file type=AVC msg=audit(1162912201.289:488): avc: denied { execute_no_trans } for pid=17461 comm="sh" name="sa1" dev=dm-0 ino=13061698 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1162912201.289:488): arch=40000003 syscall=11 success=yes exit=0 a0=98881b0 a1=9888358 a2=9888290 a3=9888008 items=0 ppid=17460 pid=17461 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sa1" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162912201.289:488): path="/usr/lib/sa/sa1" type=AVC msg=audit(1162912201.389:489): avc: denied { search } for pid=17461 comm="sadc" name="net" dev=proc ino=-268435432 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=dir type=AVC msg=audit(1162912201.389:489): avc: denied { read } for pid=17461 comm="sadc" name="dev" dev=proc ino=-268435159 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=file type=SYSCALL msg=audit(1162912201.389:489): arch=40000003 syscall=5 success=yes exit=3 a0=8050371 a1=0 a2=1b6 a3=8261800 items=0 ppid=17460 pid=17461 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162912201.393:490): avc: denied { getattr } for pid=17461 comm="sadc" name="dev" dev=proc ino=-268435159 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=file type=SYSCALL msg=audit(1162912201.393:490): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bfb8edb8 a2=239ff4 a3=8261800 items=0 ppid=17460 pid=17461 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162912201.393:490): path="/proc/net/dev" type=AVC msg=audit(1162912201.501:491): avc: denied { search } for pid=17461 comm="sadc" name="fs" dev=proc ino=-268435428 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=dir type=AVC msg=audit(1162912201.501:491): avc: denied { read } for pid=17461 comm="sadc" name="dentry-state" dev=proc ino=-268435227 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=file type=SYSCALL msg=audit(1162912201.501:491): arch=40000003 syscall=5 success=yes exit=4 a0=805037f a1=0 a2=1b6 a3=8261df0 items=0 ppid=17460 pid=17461 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162912201.501:492): avc: denied { getattr } for pid=17461 comm="sadc" name="dentry-state" dev=proc ino=-268435227 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=file type=SYSCALL msg=audit(1162912201.501:492): arch=40000003 syscall=197 success=yes exit=0 a0=4 a1=bfb8ec14 a2=239ff4 a3=8261df0 items=0 ppid=17460 pid=17461 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162912201.501:492): path="/proc/sys/fs/dentry-state" type=AVC msg=audit(1162912201.501:493): avc: denied { search } for pid=17461 comm="sadc" name="rpc" dev=proc ino=-268434552 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_rpc_t:s0 tclass=dir type=SYSCALL msg=audit(1162912201.501:493): arch=40000003 syscall=5 success=no exit=-2 a0=80502a5 a1=0 a2=1b6 a3=8261df0 items=0 ppid=17460 pid=17461 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=CRED_DISP msg=audit(1162912201.633:494): user pid=17460 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162912201.637:495): user pid=17460 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162912454.541:496): avc: denied { read } for pid=18789 comm="ldd" name="init" dev=dm-0 ino=9984490 scontext=system_u:system_r:system_crond_t:s0 tcontext=system_u:object_r:init_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162912454.541:496): arch=40000003 syscall=33 success=yes exit=0 a0=8f33888 a1=4 a2=1 a3=8f33920 items=0 ppid=18788 pid=18789 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="ldd" exe="/bin/bash" subj=system_u:system_r:system_crond_t:s0 key=(null) type=AVC msg=audit(1162912454.541:497): avc: denied { execute } for pid=18789 comm="ldd" name="init" dev=dm-0 ino=9984490 scontext=system_u:system_r:system_crond_t:s0 tcontext=system_u:object_r:init_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162912454.541:497): arch=40000003 syscall=33 success=yes exit=0 a0=8f2f680 a1=1 a2=1 a3=8f33ce8 items=0 ppid=18788 pid=18789 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="ldd" exe="/bin/bash" subj=system_u:system_r:system_crond_t:s0 key=(null) type=AVC msg=audit(1162912454.545:498): avc: denied { execute_no_trans } for pid=18793 comm="ldd" name="init" dev=dm-0 ino=9984490 scontext=system_u:system_r:system_crond_t:s0 tcontext=system_u:object_r:init_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162912454.545:498): arch=40000003 syscall=11 success=yes exit=0 a0=8f2de50 a1=8f33ed8 a2=8f2e230 a3=8f2dcd8 items=0 ppid=18792 pid=18793 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="init" exe="/sbin/init" subj=system_u:system_r:system_crond_t:s0 key=(null) type=AVC_PATH msg=audit(1162912454.545:498): path="/sbin/init" type=AVC msg=audit(1162912459.649:499): avc: denied { execute } for pid=18802 comm="bash" name="audit2policy" dev=dm-0 ino=13683706 scontext=staff_u:sysadm_r:sysadm_t:s0 tcontext=staff_u:object_r:staff_home_t:s0 tclass=file type=AVC msg=audit(1162912459.649:499): avc: denied { execute_no_trans } for pid=18802 comm="bash" name="audit2policy" dev=dm-0 ino=13683706 scontext=staff_u:sysadm_r:sysadm_t:s0 tcontext=staff_u:object_r:staff_home_t:s0 tclass=file type=SYSCALL msg=audit(1162912459.649:499): arch=40000003 syscall=11 success=yes exit=0 a0=9c209e8 a1=9c27370 a2=9c23ec0 a3=9c20a30 items=0 ppid=4324 pid=18802 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="audit2policy" exe="/usr/bin/python" subj=staff_u:sysadm_r:sysadm_t:s0 key=(null) type=AVC_PATH msg=audit(1162912459.649:499): path="/home/kmacmill/projects/selinux/madison/audit2policy" type=AVC msg=audit(1162912482.851:500): avc: denied { write } for pid=2599 comm="anacron" name="run" dev=dm-0 ino=14436616 scontext=system_u:system_r:system_crond_t:s0 tcontext=system_u:object_r:var_run_t:s0 tclass=dir type=AVC msg=audit(1162912482.851:500): avc: denied { remove_name } for pid=2599 comm="anacron" name="anacron.pid" dev=dm-0 ino=14437020 scontext=system_u:system_r:system_crond_t:s0 tcontext=system_u:object_r:var_run_t:s0 tclass=dir type=AVC msg=audit(1162912482.851:500): avc: denied { unlink } for pid=2599 comm="anacron" name="anacron.pid" dev=dm-0 ino=14437020 scontext=system_u:system_r:system_crond_t:s0 tcontext=system_u:object_r:var_run_t:s0 tclass=file type=SYSCALL msg=audit(1162912482.851:500): arch=40000003 syscall=10 success=yes exit=0 a0=804c925 a1=fe8c98 a2=fe7ff4 a3=1 items=0 ppid=1 pid=2599 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="anacron" exe="/usr/sbin/anacron" subj=system_u:system_r:system_crond_t:s0 key=(null) type=AVC msg=audit(1162912619.407:501): avc: denied { search } for pid=4371 comm="firefox-bin" name="usbdev4.2_ep01" dev=sysfs ino=277031 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:sysfs_t:s0 tclass=dir type=SYSCALL msg=audit(1162912619.407:501): arch=40000003 syscall=6 success=yes exit=0 a0=29 a1=0 a2=229b790 a3=aab165c0 items=0 ppid=1 pid=4371 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=USER_ACCT msg=audit(1162912801.707:502): user pid=18887 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162912801.707:503): login pid=18887 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162912801.707:504): user pid=18887 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162912801.707:505): user pid=18887 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162912801.711:506): avc: denied { execute } for pid=18888 comm="sa1" name="sadc" dev=dm-0 ino=11981390 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=AVC msg=audit(1162912801.711:506): avc: denied { execute_no_trans } for pid=18888 comm="sa1" name="sadc" dev=dm-0 ino=11981390 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=AVC msg=audit(1162912801.711:506): avc: denied { read } for pid=18888 comm="sa1" name="sadc" dev=dm-0 ino=11981390 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162912801.711:506): arch=40000003 syscall=11 success=yes exit=0 a0=8c1cd48 a1=8c1c740 a2=8c1cd60 a3=8c1c740 items=0 ppid=18887 pid=18888 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162912801.711:506): path="/usr/lib/sa/sadc" type=AVC_PATH msg=audit(1162912801.711:506): path="/usr/lib/sa/sadc" type=AVC msg=audit(1162912801.711:507): avc: denied { search } for pid=18888 comm="sadc" name="net" dev=proc ino=-268435432 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=dir type=AVC msg=audit(1162912801.711:507): avc: denied { read } for pid=18888 comm="sadc" name="dev" dev=proc ino=-268435159 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=file type=SYSCALL msg=audit(1162912801.711:507): arch=40000003 syscall=5 success=yes exit=3 a0=8050371 a1=0 a2=1b6 a3=8b77800 items=0 ppid=18887 pid=18888 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162912801.711:508): avc: denied { getattr } for pid=18888 comm="sadc" name="dev" dev=proc ino=-268435159 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=file type=SYSCALL msg=audit(1162912801.711:508): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bf809138 a2=239ff4 a3=8b77800 items=0 ppid=18887 pid=18888 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162912801.711:508): path="/proc/net/dev" type=AVC msg=audit(1162912801.711:509): avc: denied { search } for pid=18888 comm="sadc" name="sa" dev=dm-0 ino=14607631 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=dir type=SYSCALL msg=audit(1162912801.711:509): arch=40000003 syscall=33 success=yes exit=0 a0=bf8094e4 a1=0 a2=bf8093d8 a3=bf8093e0 items=0 ppid=18887 pid=18888 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162912801.715:510): avc: denied { read append } for pid=18888 comm="sadc" name="sa07" dev=dm-0 ino=14600351 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=file type=SYSCALL msg=audit(1162912801.715:510): arch=40000003 syscall=5 success=yes exit=3 a0=bf8094e4 a1=402 a2=bf8096a8 a3=bf8093e0 items=0 ppid=18887 pid=18888 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162912801.715:511): avc: denied { lock } for pid=18888 comm="sadc" name="sa07" dev=dm-0 ino=14600351 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=file type=SYSCALL msg=audit(1162912801.715:511): arch=40000003 syscall=143 success=yes exit=0 a0=3 a1=6 a2=bf8093e0 a3=3 items=0 ppid=18887 pid=18888 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162912801.715:511): path="/var/log/sa/sa07" type=CRED_DISP msg=audit(1162912801.739:512): user pid=18887 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162912801.739:513): user pid=18887 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162913401.808:514): user pid=18990 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162913401.808:515): login pid=18990 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162913401.808:516): user pid=18990 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162913401.808:517): user pid=18990 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162913401.812:518): avc: denied { execute } for pid=18991 comm="sh" name="sa1" dev=dm-0 ino=13061698 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:lib_t:s0 tclass=file type=AVC msg=audit(1162913401.812:518): avc: denied { execute_no_trans } for pid=18991 comm="sh" name="sa1" dev=dm-0 ino=13061698 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1162913401.812:518): arch=40000003 syscall=11 success=yes exit=0 a0=90d71b0 a1=90d7358 a2=90d7290 a3=90d7008 items=0 ppid=18990 pid=18991 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sa1" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162913401.812:518): path="/usr/lib/sa/sa1" type=AVC msg=audit(1162913401.816:519): avc: denied { search } for pid=18991 comm="sadc" name="fs" dev=proc ino=-268435428 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=dir type=AVC msg=audit(1162913401.816:519): avc: denied { read } for pid=18991 comm="sadc" name="dentry-state" dev=proc ino=-268435227 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=file type=SYSCALL msg=audit(1162913401.816:519): arch=40000003 syscall=5 success=yes exit=4 a0=805037f a1=0 a2=1b6 a3=86b7df0 items=0 ppid=18990 pid=18991 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162913401.816:520): avc: denied { getattr } for pid=18991 comm="sadc" name="dentry-state" dev=proc ino=-268435227 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=file type=SYSCALL msg=audit(1162913401.816:520): arch=40000003 syscall=197 success=yes exit=0 a0=4 a1=bfbe0364 a2=239ff4 a3=86b7df0 items=0 ppid=18990 pid=18991 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162913401.816:520): path="/proc/sys/fs/dentry-state" type=AVC msg=audit(1162913401.816:521): avc: denied { search } for pid=18991 comm="sadc" name="rpc" dev=proc ino=-268434552 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_rpc_t:s0 tclass=dir type=SYSCALL msg=audit(1162913401.816:521): arch=40000003 syscall=5 success=no exit=-2 a0=80502a5 a1=0 a2=1b6 a3=86b7df0 items=0 ppid=18990 pid=18991 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=CRED_DISP msg=audit(1162913401.828:522): user pid=18990 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162913401.828:523): user pid=18990 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162913401.888:524): avc: denied { read } for pid=4371 comm="firefox-bin" name=".gdmF70UIT" dev=dm-0 ino=14469320 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162913401.888:524): arch=40000003 syscall=33 success=yes exit=0 a0=bf976fcb a1=4 a2=4db18a64 a3=bf976fcb items=0 ppid=1 pid=4371 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162913401.888:525): avc: denied { getattr } for pid=4371 comm="firefox-bin" name=".gdmF70UIT" dev=dm-0 ino=14469320 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162913401.888:525): arch=40000003 syscall=197 success=yes exit=0 a0=32 a1=bf97398c a2=36aff4 a3=aa4a0518 items=0 ppid=1 pid=4371 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162913401.888:525): path="/tmp/.gdmF70UIT" type=AVC msg=audit(1162913576.187:526): avc: denied { read } for pid=19023 comm="mozilla-xremote" name=".gdmF70UIT" dev=dm-0 ino=14469320 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162913576.187:526): arch=40000003 syscall=33 success=yes exit=0 a0=bfca3f92 a1=4 a2=de7a64 a3=bfca3f92 items=0 ppid=19022 pid=19023 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="mozilla-xremote" exe="/usr/lib/firefox-2.0/mozilla-xremote-client" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162913584.800:527): avc: denied { execmem } for pid=4371 comm="firefox-bin" scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_mozilla_t:s0 tclass=process type=SYSCALL msg=audit(1162913584.800:527): arch=40000003 syscall=192 success=yes exit=93360128 a0=0 a1=a01000 a2=7 a3=22 items=0 ppid=1 pid=4371 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162913723.828:528): avc: denied { read } for pid=4371 comm="firefox-bin" name="libflashplayer.so" dev=dm-0 ino=6547382 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=user_u:object_r:user_mozilla_home_t:s0 tclass=file type=SYSCALL msg=audit(1162913723.828:528): arch=40000003 syscall=5 success=yes exit=63 a0=aa0964f0 a1=0 a2=aa0964e8 a3=aa0964f0 items=0 ppid=1 pid=4371 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162913723.828:529): avc: denied { getattr } for pid=4371 comm="firefox-bin" name="libflashplayer.so" dev=dm-0 ino=6547382 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=user_u:object_r:user_mozilla_home_t:s0 tclass=file type=SYSCALL msg=audit(1162913723.828:529): arch=40000003 syscall=197 success=yes exit=0 a0=3f a1=bf9711d0 a2=230fc0 a3=40 items=0 ppid=1 pid=4371 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162913723.828:529): path="/home/kmacmill/.mozilla/plugins/libflashplayer.so" type=AVC msg=audit(1162913723.828:530): avc: denied { execute } for pid=4371 comm="firefox-bin" name="libflashplayer.so" dev=dm-0 ino=6547382 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=user_u:object_r:user_mozilla_home_t:s0 tclass=file type=SYSCALL msg=audit(1162913723.828:530): arch=40000003 syscall=192 success=yes exit=26157056 a0=0 a1=738dbc a2=5 a3=802 items=0 ppid=1 pid=4371 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162913723.828:530): path="/home/kmacmill/.mozilla/plugins/libflashplayer.so" type=AVC msg=audit(1162913771.903:531): avc: denied { search } for pid=19088 comm="gpg" name="home" dev=dm-0 ino=6547201 scontext=staff_u:staff_r:staff_gpg_t:s0 tcontext=system_u:object_r:home_root_t:s0 tclass=dir type=AVC msg=audit(1162913771.903:531): avc: denied { search } for pid=19088 comm="gpg" name="kmacmill" dev=dm-0 ino=6547202 scontext=staff_u:staff_r:staff_gpg_t:s0 tcontext=staff_u:object_r:staff_home_dir_t:s0 tclass=dir type=SYSCALL msg=audit(1162913771.903:531): arch=40000003 syscall=33 success=no exit=-2 a0=98cf9f8 a1=4 a2=dfabbc a3=98cf9c8 items=0 ppid=3575 pid=19088 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gpg" exe="/usr/bin/gpg" subj=staff_u:staff_r:staff_gpg_t:s0 key=(null) type=AVC msg=audit(1162913772.127:532): avc: denied { search } for pid=19088 comm="gpg" name="tmp" dev=dm-0 ino=14469313 scontext=staff_u:staff_r:staff_gpg_t:s0 tcontext=system_u:object_r:tmp_t:s0 tclass=dir type=AVC msg=audit(1162913772.127:532): avc: denied { read } for pid=19088 comm="gpg" name="evolution-pgp.Y1R1IT" dev=dm-0 ino=14469396 scontext=staff_u:staff_r:staff_gpg_t:s0 tcontext=staff_u:object_r:staff_evolution_orbit_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162913772.127:532): arch=40000003 syscall=5 success=yes exit=3 a0=bfceeb1a a1=8000 a2=0 a3=8000 items=0 ppid=3575 pid=19088 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gpg" exe="/usr/bin/gpg" subj=staff_u:staff_r:staff_gpg_t:s0 key=(null) type=AVC msg=audit(1162913785.060:533): avc: denied { read } for pid=19094 comm="mozilla-xremote" name=".gdmF70UIT" dev=dm-0 ino=14469320 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162913785.060:533): arch=40000003 syscall=33 success=yes exit=0 a0=bf974f92 a1=4 a2=de7a64 a3=bf974f92 items=0 ppid=19093 pid=19094 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="mozilla-xremote" exe="/usr/lib/firefox-2.0/mozilla-xremote-client" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC msg=audit(1162913785.060:534): avc: denied { getattr } for pid=19094 comm="mozilla-xremote" name=".gdmF70UIT" dev=dm-0 ino=14469320 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162913785.060:534): arch=40000003 syscall=197 success=yes exit=0 a0=4 a1=bf9739bc a2=47aff4 a3=8b39ab0 items=0 ppid=19093 pid=19094 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="mozilla-xremote" exe="/usr/lib/firefox-2.0/mozilla-xremote-client" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC_PATH msg=audit(1162913785.060:534): path="/tmp/.gdmF70UIT" type=AVC msg=audit(1162913785.096:535): avc: denied { execute } for pid=19091 comm="firefox" name="firefox-bin" dev=dm-0 ino=13552825 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=system_u:object_r:mozilla_exec_t:s0 tclass=file type=AVC msg=audit(1162913785.096:535): avc: denied { execute_no_trans } for pid=19091 comm="firefox" name="firefox-bin" dev=dm-0 ino=13552825 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=system_u:object_r:mozilla_exec_t:s0 tclass=file type=AVC msg=audit(1162913785.096:535): avc: denied { read } for pid=19091 comm="firefox" name="firefox-bin" dev=dm-0 ino=13552825 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=system_u:object_r:mozilla_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162913785.096:535): arch=40000003 syscall=11 success=yes exit=0 a0=86bb8b8 a1=86bd928 a2=86be120 a3=86bd928 items=0 ppid=1 pid=19091 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC_PATH msg=audit(1162913785.096:535): path="/usr/lib/firefox-2.0/firefox-bin" type=AVC_PATH msg=audit(1162913785.096:535): path="/usr/lib/firefox-2.0/firefox-bin" type=AVC msg=audit(1162913785.332:536): avc: denied { getattr } for pid=19091 comm="firefox-bin" name="firefox-bin" dev=dm-0 ino=13552825 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=system_u:object_r:mozilla_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162913785.332:536): arch=40000003 syscall=196 success=yes exit=0 a0=bfc25b48 a1=bfc2563c a2=239ff4 a3=bfc26a05 items=0 ppid=1 pid=19091 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC_PATH msg=audit(1162913785.332:536): path="/usr/lib/firefox-2.0/firefox-bin" type=AVC msg=audit(1162913785.740:537): avc: denied { search } for pid=19091 comm="firefox-bin" name="nscd" dev=dm-0 ino=14436932 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=system_u:object_r:nscd_var_run_t:s0 tclass=dir type=SYSCALL msg=audit(1162913785.740:537): arch=40000003 syscall=102 success=no exit=-2 a0=3 a1=bfc259b8 a2=239ff4 a3=3 items=0 ppid=1 pid=19091 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC msg=audit(1162913787.352:538): avc: denied { search } for pid=19101 comm="evolution-data-" name="tmp" dev=dm-0 ino=14469313 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=system_u:object_r:tmp_t:s0 tclass=dir type=AVC msg=audit(1162913787.352:538): avc: denied { search } for pid=19101 comm="evolution-data-" name="orbit-kmacmill" dev=dm-0 ino=14567713 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=dir type=AVC msg=audit(1162913787.352:538): avc: denied { write } for pid=19101 comm="evolution-data-" name="linc-df7-0-776fae0850c0c" dev=dm-0 ino=14567744 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=sock_file type=SYSCALL msg=audit(1162913787.352:538): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=b5f3fe70 a2=4e570f80 a3=0 items=0 ppid=1 pid=19101 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe=2F7573722F6C6962657865632F65766F6C7574696F6E2D646174612D7365727665722D312E31302E237072656C696E6B232E663161413778202864656C6574656429 subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC msg=audit(1162913787.840:539): avc: denied { write } for pid=19101 comm="evolution-data-" name="linc-c8e-0-2f6d638e7c118" dev=dm-0 ino=14567745 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=sock_file type=SYSCALL msg=audit(1162913787.840:539): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=b5f3fcd0 a2=4e570f80 a3=0 items=0 ppid=1 pid=19101 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe=2F7573722F6C6962657865632F65766F6C7574696F6E2D646174612D7365727665722D312E31302E237072656C696E6B232E663161413778202864656C6574656429 subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC msg=audit(1162913787.908:540): avc: denied { create } for pid=19101 comm="evolution-data-" scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:staff_r:staff_evolution_server_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1162913787.908:540): arch=40000003 syscall=102 success=yes exit=27 a0=1 a1=b5f3fb04 a2=6b9ff4 a3=b5f3fd91 items=0 ppid=1 pid=19101 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe=2F7573722F6C6962657865632F65766F6C7574696F6E2D646174612D7365727665722D312E31302E237072656C696E6B232E663161413778202864656C6574656429 subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC msg=audit(1162913787.908:541): avc: denied { bind } for pid=19101 comm="evolution-data-" scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:staff_r:staff_evolution_server_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1162913787.908:541): arch=40000003 syscall=102 success=yes exit=0 a0=2 a1=b5f3fb04 a2=6b9ff4 a3=1b items=0 ppid=1 pid=19101 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe=2F7573722F6C6962657865632F65766F6C7574696F6E2D646174612D7365727665722D312E31302E237072656C696E6B232E663161413778202864656C6574656429 subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC msg=audit(1162913787.908:542): avc: denied { getattr } for pid=19101 comm="evolution-data-" scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:staff_r:staff_evolution_server_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1162913787.908:542): arch=40000003 syscall=102 success=yes exit=0 a0=6 a1=b5f3fb04 a2=6b9ff4 a3=1b items=0 ppid=1 pid=19101 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe=2F7573722F6C6962657865632F65766F6C7574696F6E2D646174612D7365727665722D312E31302E237072656C696E6B232E663161413778202864656C6574656429 subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC msg=audit(1162913787.908:543): avc: denied { write } for pid=19101 comm="evolution-data-" scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:staff_r:staff_evolution_server_t:s0 tclass=netlink_route_socket type=AVC msg=audit(1162913787.908:543): avc: denied { nlmsg_read } for pid=19101 comm="evolution-data-" scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:staff_r:staff_evolution_server_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1162913787.908:543): arch=40000003 syscall=102 success=yes exit=20 a0=b a1=b5f3ea44 a2=6b9ff4 a3=0 items=0 ppid=1 pid=19101 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe=2F7573722F6C6962657865632F65766F6C7574696F6E2D646174612D7365727665722D312E31302E237072656C696E6B232E663161413778202864656C6574656429 subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC msg=audit(1162913787.908:544): avc: denied { read } for pid=19101 comm="evolution-data-" scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:staff_r:staff_evolution_server_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1162913787.908:544): arch=40000003 syscall=102 success=yes exit=188 a0=11 a1=b5f3ea44 a2=6b9ff4 a3=0 items=0 ppid=1 pid=19101 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe=2F7573722F6C6962657865632F65766F6C7574696F6E2D646174612D7365727665722D312E31302E237072656C696E6B232E663161413778202864656C6574656429 subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC msg=audit(1162913789.312:545): avc: denied { search } for pid=19105 comm="gpg" name="kmacmill" dev=dm-0 ino=6547202 scontext=staff_u:staff_r:staff_gpg_t:s0 tcontext=staff_u:object_r:staff_home_dir_t:s0 tclass=dir type=SYSCALL msg=audit(1162913789.312:545): arch=40000003 syscall=33 success=no exit=-2 a0=865d9f8 a1=4 a2=a92bbc a3=865d9c8 items=0 ppid=3575 pid=19105 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gpg" exe="/usr/bin/gpg" subj=staff_u:staff_r:staff_gpg_t:s0 key=(null) type=AVC msg=audit(1162913794.937:546): avc: denied { create } for pid=19111 comm="evolution" scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=staff_u:staff_r:staff_evolution_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1162913794.937:546): arch=40000003 syscall=102 success=yes exit=48 a0=1 a1=b179e274 a2=4c0ff4 a3=0 items=0 ppid=1 pid=19111 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC msg=audit(1162913794.937:547): avc: denied { bind } for pid=19111 comm="evolution" scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=staff_u:staff_r:staff_evolution_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1162913794.937:547): arch=40000003 syscall=102 success=yes exit=0 a0=2 a1=b179e274 a2=4c0ff4 a3=30 items=0 ppid=1 pid=19111 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC msg=audit(1162913794.937:548): avc: denied { getattr } for pid=19111 comm="evolution" scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=staff_u:staff_r:staff_evolution_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1162913794.937:548): arch=40000003 syscall=102 success=yes exit=0 a0=6 a1=b179e274 a2=4c0ff4 a3=30 items=0 ppid=1 pid=19111 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC msg=audit(1162913794.937:549): avc: denied { write } for pid=19111 comm="evolution" scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=staff_u:staff_r:staff_evolution_t:s0 tclass=netlink_route_socket type=AVC msg=audit(1162913794.937:549): avc: denied { nlmsg_read } for pid=19111 comm="evolution" scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=staff_u:staff_r:staff_evolution_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1162913794.937:549): arch=40000003 syscall=102 success=yes exit=20 a0=b a1=b179d1b4 a2=4c0ff4 a3=0 items=0 ppid=1 pid=19111 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC msg=audit(1162913794.937:550): avc: denied { read } for pid=19111 comm="evolution" scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=staff_u:staff_r:staff_evolution_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1162913794.937:550): arch=40000003 syscall=102 success=yes exit=188 a0=11 a1=b179d1b4 a2=4c0ff4 a3=0 items=0 ppid=1 pid=19111 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=USER_ACCT msg=audit(1162914001.894:551): user pid=19157 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162914001.894:552): login pid=19157 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162914001.894:553): user pid=19157 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162914001.894:554): user pid=19157 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162914001.898:555): avc: denied { execute } for pid=19158 comm="sa1" name="sadc" dev=dm-0 ino=11981390 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=AVC msg=audit(1162914001.898:555): avc: denied { execute_no_trans } for pid=19158 comm="sa1" name="sadc" dev=dm-0 ino=11981390 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=AVC msg=audit(1162914001.898:555): avc: denied { read } for pid=19158 comm="sa1" name="sadc" dev=dm-0 ino=11981390 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162914001.898:555): arch=40000003 syscall=11 success=yes exit=0 a0=84b1d48 a1=84b1740 a2=84b1d60 a3=84b1740 items=0 ppid=19157 pid=19158 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162914001.898:555): path="/usr/lib/sa/sadc" type=AVC_PATH msg=audit(1162914001.898:555): path="/usr/lib/sa/sadc" type=AVC msg=audit(1162914001.898:556): avc: denied { search } for pid=19158 comm="sadc" name="sa" dev=dm-0 ino=14607631 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=dir type=SYSCALL msg=audit(1162914001.898:556): arch=40000003 syscall=33 success=yes exit=0 a0=bfea2374 a1=0 a2=bfea2268 a3=bfea2270 items=0 ppid=19157 pid=19158 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162914001.898:557): avc: denied { read append } for pid=19158 comm="sadc" name="sa07" dev=dm-0 ino=14600351 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=file type=SYSCALL msg=audit(1162914001.898:557): arch=40000003 syscall=5 success=yes exit=3 a0=bfea2374 a1=402 a2=bfea2538 a3=bfea2270 items=0 ppid=19157 pid=19158 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162914001.898:558): avc: denied { lock } for pid=19158 comm="sadc" name="sa07" dev=dm-0 ino=14600351 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=file type=SYSCALL msg=audit(1162914001.898:558): arch=40000003 syscall=143 success=yes exit=0 a0=3 a1=6 a2=bfea2270 a3=3 items=0 ppid=19157 pid=19158 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162914001.898:558): path="/var/log/sa/sa07" type=CRED_DISP msg=audit(1162914001.910:559): user pid=19157 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162914001.910:560): user pid=19157 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162914100.280:561): avc: denied { execute } for pid=19185 comm="bash" name="audit2policy" dev=dm-0 ino=13683706 scontext=staff_u:sysadm_r:sysadm_t:s0 tcontext=staff_u:object_r:staff_home_t:s0 tclass=file type=AVC msg=audit(1162914100.280:561): avc: denied { execute_no_trans } for pid=19185 comm="bash" name="audit2policy" dev=dm-0 ino=13683706 scontext=staff_u:sysadm_r:sysadm_t:s0 tcontext=staff_u:object_r:staff_home_t:s0 tclass=file type=SYSCALL msg=audit(1162914100.280:561): arch=40000003 syscall=11 success=yes exit=0 a0=9c25f18 a1=9c34a20 a2=9c23ec0 a3=9c34ca8 items=0 ppid=4324 pid=19185 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="audit2policy" exe="/usr/bin/python" subj=staff_u:sysadm_r:sysadm_t:s0 key=(null) type=AVC_PATH msg=audit(1162914100.280:561): path="/home/kmacmill/projects/selinux/madison/audit2policy" type=USER_ACCT msg=audit(1162914601.967:562): user pid=19284 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162914601.967:563): login pid=19284 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162914601.967:564): user pid=19284 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162914601.967:565): user pid=19284 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162914601.999:566): user pid=19284 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162914601.999:567): user pid=19284 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162915201.317:568): user pid=19490 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162915201.317:569): login pid=19490 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162915201.317:570): user pid=19490 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162915201.317:571): user pid=19490 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162915201.329:572): user pid=19490 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162915201.329:573): user pid=19490 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162915217.242:574): avc: denied { search } for pid=19500 comm="firefox-bin" name="nscd" dev=dm-0 ino=14436932 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=system_u:object_r:nscd_var_run_t:s0 tclass=dir type=SYSCALL msg=audit(1162915217.242:574): arch=40000003 syscall=102 success=no exit=-2 a0=3 a1=bfb168b8 a2=239ff4 a3=3 items=0 ppid=1 pid=19500 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=USER_ACCT msg=audit(1162915261.340:575): user pid=19525 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162915261.340:576): login pid=19525 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162915261.340:577): user pid=19525 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162915261.340:578): user pid=19525 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162915261.344:579): avc: denied { getattr } for pid=19526 comm="bash" name="run-parts" dev=dm-0 ino=10331890 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1162915261.344:579): arch=40000003 syscall=195 success=yes exit=0 a0=9344120 a1=bff1efe0 a2=239ff4 a3=9344120 items=0 ppid=19525 pid=19526 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="bash" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162915261.344:579): path="/usr/bin/run-parts" type=AVC msg=audit(1162915261.344:580): avc: denied { execute } for pid=19526 comm="bash" name="run-parts" dev=dm-0 ino=10331890 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1162915261.344:580): arch=40000003 syscall=33 success=yes exit=0 a0=9344120 a1=1 a2=11 a3=9344120 items=0 ppid=19525 pid=19526 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="bash" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162915261.344:581): avc: denied { read } for pid=19526 comm="bash" name="run-parts" dev=dm-0 ino=10331890 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1162915261.344:581): arch=40000003 syscall=33 success=yes exit=0 a0=9344120 a1=4 a2=ffffffff a3=9344120 items=0 ppid=19525 pid=19526 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="bash" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162915261.344:582): avc: denied { execute_no_trans } for pid=19526 comm="bash" name="run-parts" dev=dm-0 ino=10331890 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1162915261.344:582): arch=40000003 syscall=11 success=yes exit=0 a0=9344120 a1=93443d8 a2=93442f8 a3=9343f98 items=0 ppid=19525 pid=19526 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="run-parts" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162915261.344:582): path="/usr/bin/run-parts" type=AVC msg=audit(1162915261.344:583): avc: denied { ioctl } for pid=19526 comm="run-parts" name="run-parts" dev=dm-0 ino=10331890 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1162915261.344:583): arch=40000003 syscall=54 success=no exit=-25 a0=3 a1=5401 a2=bfaf35d8 a3=bfaf3618 items=0 ppid=19525 pid=19526 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="run-parts" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162915261.344:583): path="/usr/bin/run-parts" type=AVC msg=audit(1162915261.408:584): avc: denied { execute } for pid=19526 comm="run-parts" name="inn-cron-nntpsend" dev=dm-0 ino=9331477 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1162915261.408:584): arch=40000003 syscall=33 success=yes exit=0 a0=9b9d990 a1=1 a2=1 a3=9b9dc98 items=0 ppid=19525 pid=19526 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="run-parts" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162915261.408:585): avc: denied { execute_no_trans } for pid=19527 comm="run-parts" name="inn-cron-nntpsend" dev=dm-0 ino=9331477 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1162915261.408:585): arch=40000003 syscall=11 success=yes exit=0 a0=9b9da10 a1=9b9dad8 a2=9b9dae8 a3=9b9d758 items=0 ppid=19526 pid=19527 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="inn-cron-nntpse" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162915261.408:585): path="/etc/cron.hourly/inn-cron-nntpsend" type=AVC msg=audit(1162915261.452:586): avc: denied { execute } for pid=19529 comm="inn-cron-nntpse" name="chkconfig" dev=dm-0 ino=9984740 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sbin_t:s0 tclass=file type=AVC msg=audit(1162915261.452:586): avc: denied { execute_no_trans } for pid=19529 comm="inn-cron-nntpse" name="chkconfig" dev=dm-0 ino=9984740 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sbin_t:s0 tclass=file type=AVC msg=audit(1162915261.452:586): avc: denied { read } for pid=19529 comm="inn-cron-nntpse" name="chkconfig" dev=dm-0 ino=9984740 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sbin_t:s0 tclass=file type=SYSCALL msg=audit(1162915261.452:586): arch=40000003 syscall=11 success=yes exit=0 a0=85b5678 a1=85b5808 a2=85b5720 a3=85b5508 items=0 ppid=19527 pid=19529 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="chkconfig" exe="/sbin/chkconfig" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162915261.452:586): path="/sbin/chkconfig" type=AVC_PATH msg=audit(1162915261.452:586): path="/sbin/chkconfig" type=AVC msg=audit(1162915261.476:587): avc: denied { read } for pid=19529 comm="chkconfig" name="innd" dev=dm-0 ino=9331492 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162915261.476:587): arch=40000003 syscall=5 success=yes exit=3 a0=bff191e0 a1=0 a2=ffffffff a3=8e7b038 items=0 ppid=19527 pid=19529 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="chkconfig" exe="/sbin/chkconfig" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162915261.509:588): avc: denied { getattr } for pid=19529 comm="chkconfig" name="innd" dev=dm-0 ino=9331492 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162915261.509:588): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bff19150 a2=239ff4 a3=3 items=0 ppid=19527 pid=19529 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="chkconfig" exe="/sbin/chkconfig" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162915261.509:588): path="/etc/rc.d/init.d/innd" type=CRED_DISP msg=audit(1162915261.537:589): user pid=19525 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162915261.537:590): user pid=19525 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162915365.643:591): avc: denied { write } for pid=4371 comm="firefox-bin" name="tmp" dev=dm-0 ino=14469313 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:tmp_t:s0 tclass=dir type=AVC msg=audit(1162915365.643:591): avc: denied { add_name } for pid=4371 comm="firefox-bin" name="xz46pk56" scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:tmp_t:s0 tclass=dir type=AVC msg=audit(1162915365.643:591): avc: denied { create } for pid=4371 comm="firefox-bin" name="xz46pk56" scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162915365.643:591): arch=40000003 syscall=5 success=yes exit=69 a0=ac402920 a1=82c1 a2=180 a3=82c1 items=0 ppid=1 pid=4371 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162915365.643:592): avc: denied { write } for pid=4371 comm="firefox-bin" name="xz46pk56" dev=dm-0 ino=14469396 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162915365.643:592): arch=40000003 syscall=5 success=yes exit=69 a0=ac402920 a1=8041 a2=180 a3=8041 items=0 ppid=1 pid=4371 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162915370.767:593): avc: denied { getattr } for pid=4371 comm="firefox-bin" name="Fortress-WP.pdf" dev=dm-0 ino=14469397 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162915370.767:593): arch=40000003 syscall=195 success=yes exit=0 a0=ac7c1c28 a1=bf973794 a2=36aff4 a3=3 items=0 ppid=1 pid=4371 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162915370.767:593): path="/tmp/Fortress-WP.pdf" type=AVC msg=audit(1162915370.767:594): avc: denied { remove_name } for pid=4371 comm="firefox-bin" name="Fortress-WP.pdf" dev=dm-0 ino=14469397 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:tmp_t:s0 tclass=dir type=AVC msg=audit(1162915370.767:594): avc: denied { unlink } for pid=4371 comm="firefox-bin" name="Fortress-WP.pdf" dev=dm-0 ino=14469397 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162915370.767:594): arch=40000003 syscall=10 success=yes exit=0 a0=ac7c1c28 a1=0 a2=4d765304 a3=0 items=0 ppid=1 pid=4371 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162915370.767:595): avc: denied { rename } for pid=4371 comm="firefox-bin" name="xz46pk56" dev=dm-0 ino=14469396 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162915370.767:595): arch=40000003 syscall=38 success=yes exit=0 a0=ac402920 a1=bf97385c a2=4d765304 a3=0 items=0 ppid=1 pid=4371 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162915371.587:596): avc: denied { search } for pid=19567 comm="evince" name=".ICE-unix" dev=dm-0 ino=14567572 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:ice_tmp_t:s0 tclass=dir type=AVC msg=audit(1162915371.587:596): avc: denied { write } for pid=19567 comm="evince" name="2965" dev=dm-0 ino=14567716 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:ice_tmp_t:s0 tclass=sock_file type=SYSCALL msg=audit(1162915371.587:596): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=bfbcb260 a2=39b770 a3=15 items=0 ppid=4371 pid=19567 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evince" exe="/usr/bin/evince" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162915371.591:597): avc: denied { read } for pid=19567 comm="evince" name=".ICEauthority" dev=dm-0 ino=6570930 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_iceauth_home_t:s0 tclass=file type=SYSCALL msg=audit(1162915371.591:597): arch=40000003 syscall=33 success=yes exit=0 a0=8f74950 a1=4 a2=39b770 a3=8f74950 items=0 ppid=4371 pid=19567 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evince" exe="/usr/bin/evince" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162915371.627:598): avc: denied { getattr } for pid=19567 comm="evince" name=".ICEauthority" dev=dm-0 ino=6570930 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_iceauth_home_t:s0 tclass=file type=SYSCALL msg=audit(1162915371.627:598): arch=40000003 syscall=197 success=yes exit=0 a0=2d a1=bfbcb2fc a2=25dff4 a3=8f75230 items=0 ppid=4371 pid=19567 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evince" exe="/usr/bin/evince" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162915371.627:598): path="/home/kmacmill/.ICEauthority" type=AVC msg=audit(1162915371.967:599): avc: denied { connectto } for pid=19567 comm="evince" path=002F746D702F646275732D6E6948324A5970414645 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_dbusd_t:s0 tclass=unix_stream_socket type=SYSCALL msg=audit(1162915371.967:599): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=bfbcb7d0 a2=7dcf494 a3=15 items=0 ppid=4371 pid=19567 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evince" exe="/usr/bin/evince" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162915374.488:600): avc: denied { read } for pid=19570 comm="gam_server" name="inotify" dev=inotifyfs ino=339 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:inotifyfs_t:s0 tclass=dir type=SYSCALL msg=audit(1162915374.488:600): arch=40000003 syscall=3 success=yes exit=48 a0=3 a1=913f4f8 a2=400 a3=400 items=0 ppid=1 pid=19570 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gam_server" exe="/usr/libexec/gam_server" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162915374.488:600): path="inotify" type=AVC msg=audit(1162915374.512:601): avc: denied { read } for pid=19568 comm="evince" name="Fortress-WP.pdf" dev=dm-0 ino=14469396 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162915374.512:601): arch=40000003 syscall=5 success=yes exit=55 a0=90bfc70 a1=8000 a2=1b6 a3=90c5708 items=0 ppid=4371 pid=19568 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evince" exe="/usr/bin/evince" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162915374.756:602): avc: denied { create } for pid=19567 comm="evince" name=".recently-used.xbel.CED2IT" scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1162915374.756:602): arch=40000003 syscall=5 success=yes exit=61 a0=9105920 a1=80c2 a2=1b6 a3=80c2 items=0 ppid=4371 pid=19567 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evince" exe="/usr/bin/evince" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162915374.756:603): avc: denied { getattr } for pid=19567 comm="evince" name=".recently-used.xbel.CED2IT" dev=dm-0 ino=11885042 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1162915374.756:603): arch=40000003 syscall=197 success=yes exit=0 a0=3d a1=bfbcac14 a2=25dff4 a3=911ec28 items=0 ppid=4371 pid=19567 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evince" exe="/usr/bin/evince" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162915374.756:603): path="/home/kmacmill/.recently-used.xbel.CED2IT" type=AVC msg=audit(1162915374.756:604): avc: denied { write } for pid=19567 comm="evince" name=".recently-used.xbel.CED2IT" dev=dm-0 ino=11885042 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1162915374.756:604): arch=40000003 syscall=4 success=yes exit=90112 a0=3d a1=912cd50 a2=16000 a3=16000 items=0 ppid=4371 pid=19567 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evince" exe="/usr/bin/evince" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162915374.756:604): path="/home/kmacmill/.recently-used.xbel.CED2IT" type=AVC msg=audit(1162915374.756:605): avc: denied { rename } for pid=19567 comm="evince" name=".recently-used.xbel.CED2IT" dev=dm-0 ino=11885042 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1162915374.756:605): arch=40000003 syscall=38 success=yes exit=0 a0=90dcb48 a1=8fc5968 a2=76c0708 a3=b7f3e8cc items=0 ppid=4371 pid=19567 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evince" exe="/usr/bin/evince" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162915375.592:606): avc: denied { read } for pid=19567 comm="evince" name=".recently-used.xbel" dev=dm-0 ino=11885042 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1162915375.592:606): arch=40000003 syscall=5 success=yes exit=61 a0=8fc5968 a1=8000 a2=0 a3=8000 items=0 ppid=4371 pid=19567 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evince" exe="/usr/bin/evince" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162915575.868:607): avc: denied { search } for pid=19568 comm="evince" name="usbdev4.2_ep01" dev=sysfs ino=328509 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:sysfs_t:s0 tclass=dir type=AVC msg=audit(1162915608.822:608): avc: denied { read } for pid=4371 comm="firefox-bin" name=".gdmF70UIT" dev=dm-0 ino=14469320 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162915608.822:608): arch=40000003 syscall=33 success=yes exit=0 a0=bf976fcb a1=4 a2=4db18a64 a3=bf976fcb items=0 ppid=1 pid=4371 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162915608.822:609): avc: denied { getattr } for pid=4371 comm="firefox-bin" name=".gdmF70UIT" dev=dm-0 ino=14469320 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162915608.822:609): arch=40000003 syscall=197 success=yes exit=0 a0=3e a1=bf9732ec a2=36aff4 a3=a5b1c038 items=0 ppid=1 pid=4371 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162915608.822:609): path="/tmp/.gdmF70UIT" type=AVC msg=audit(1162915756.967:610): avc: denied { execmem } for pid=4378 comm="firefox-bin" scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_mozilla_t:s0 tclass=process type=SYSCALL msg=audit(1162915756.967:610): arch=40000003 syscall=192 success=yes exit=116039680 a0=0 a1=a01000 a2=7 a3=22 items=0 ppid=1 pid=4378 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=USER_ACCT msg=audit(1162915801.590:611): user pid=19625 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162915801.590:612): login pid=19625 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162915801.590:613): user pid=19625 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162915801.590:614): user pid=19625 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162915801.598:615): avc: denied { search } for pid=19626 comm="sadc" name="net" dev=proc ino=-268435432 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=dir type=AVC msg=audit(1162915801.598:615): avc: denied { read } for pid=19626 comm="sadc" name="dev" dev=proc ino=-268435159 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=file type=SYSCALL msg=audit(1162915801.598:615): arch=40000003 syscall=5 success=yes exit=3 a0=8050371 a1=0 a2=1b6 a3=9305800 items=0 ppid=19625 pid=19626 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162915801.598:616): avc: denied { getattr } for pid=19626 comm="sadc" name="dev" dev=proc ino=-268435159 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=file type=SYSCALL msg=audit(1162915801.598:616): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bfe3ca28 a2=239ff4 a3=9305800 items=0 ppid=19625 pid=19626 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162915801.598:616): path="/proc/net/dev" type=AVC msg=audit(1162915801.598:617): avc: denied { search } for pid=19626 comm="sadc" name="fs" dev=proc ino=-268435428 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=dir type=AVC msg=audit(1162915801.598:617): avc: denied { read } for pid=19626 comm="sadc" name="dentry-state" dev=proc ino=-268435227 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=file type=SYSCALL msg=audit(1162915801.598:617): arch=40000003 syscall=5 success=yes exit=4 a0=805037f a1=0 a2=1b6 a3=9305df0 items=0 ppid=19625 pid=19626 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162915801.598:618): avc: denied { getattr } for pid=19626 comm="sadc" name="dentry-state" dev=proc ino=-268435227 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=file type=SYSCALL msg=audit(1162915801.598:618): arch=40000003 syscall=197 success=yes exit=0 a0=4 a1=bfe3c884 a2=239ff4 a3=9305df0 items=0 ppid=19625 pid=19626 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162915801.598:618): path="/proc/sys/fs/dentry-state" type=CRED_DISP msg=audit(1162915801.610:619): user pid=19625 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162915801.610:620): user pid=19625 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162915974.193:621): avc: denied { read } for pid=4371 comm="firefox-bin" name="libflashplayer.so" dev=dm-0 ino=6547382 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=user_u:object_r:user_mozilla_home_t:s0 tclass=file type=SYSCALL msg=audit(1162915974.193:621): arch=40000003 syscall=5 success=yes exit=75 a0=aa089078 a1=0 a2=b5e00040 a3=aa089078 items=0 ppid=1 pid=4371 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162915974.193:622): avc: denied { getattr } for pid=4371 comm="firefox-bin" name="libflashplayer.so" dev=dm-0 ino=6547382 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=user_u:object_r:user_mozilla_home_t:s0 tclass=file type=SYSCALL msg=audit(1162915974.193:622): arch=40000003 syscall=197 success=yes exit=0 a0=4b a1=bf970ad4 a2=230fc0 a3=4c items=0 ppid=1 pid=4371 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162915974.193:622): path="/home/kmacmill/.mozilla/plugins/libflashplayer.so" type=AVC msg=audit(1162915974.193:623): avc: denied { execute } for pid=4371 comm="firefox-bin" name="libflashplayer.so" dev=dm-0 ino=6547382 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=user_u:object_r:user_mozilla_home_t:s0 tclass=file type=SYSCALL msg=audit(1162915974.193:623): arch=40000003 syscall=192 success=yes exit=104456192 a0=0 a1=738dbc a2=5 a3=802 items=0 ppid=1 pid=4371 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162915974.193:623): path="/home/kmacmill/.mozilla/plugins/libflashplayer.so" type=USER_ACCT msg=audit(1162916401.676:624): user pid=19751 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162916401.676:625): login pid=19751 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162916401.676:626): user pid=19751 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162916401.676:627): user pid=19751 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162916401.680:628): avc: denied { execute } for pid=19752 comm="sa1" name="sadc" dev=dm-0 ino=11981390 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=AVC msg=audit(1162916401.680:628): avc: denied { execute_no_trans } for pid=19752 comm="sa1" name="sadc" dev=dm-0 ino=11981390 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=AVC msg=audit(1162916401.680:628): avc: denied { read } for pid=19752 comm="sa1" name="sadc" dev=dm-0 ino=11981390 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162916401.680:628): arch=40000003 syscall=11 success=yes exit=0 a0=8aa3d48 a1=8aa3740 a2=8aa3d60 a3=8aa3740 items=0 ppid=19751 pid=19752 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162916401.680:628): path="/usr/lib/sa/sadc" type=AVC_PATH msg=audit(1162916401.680:628): path="/usr/lib/sa/sadc" type=AVC msg=audit(1162916401.684:629): avc: denied { search } for pid=19752 comm="sadc" name="sa" dev=dm-0 ino=14607631 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=dir type=SYSCALL msg=audit(1162916401.684:629): arch=40000003 syscall=33 success=yes exit=0 a0=bfd40214 a1=0 a2=bfd40108 a3=bfd40110 items=0 ppid=19751 pid=19752 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=CRED_DISP msg=audit(1162916401.696:630): user pid=19751 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162916401.696:631): user pid=19751 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162916996.341:632): avc: denied { search } for pid=19878 comm="gpg" name="home" dev=dm-0 ino=6547201 scontext=staff_u:staff_r:staff_gpg_t:s0 tcontext=system_u:object_r:home_root_t:s0 tclass=dir type=AVC msg=audit(1162916996.341:632): avc: denied { search } for pid=19878 comm="gpg" name="kmacmill" dev=dm-0 ino=6547202 scontext=staff_u:staff_r:staff_gpg_t:s0 tcontext=staff_u:object_r:staff_home_dir_t:s0 tclass=dir type=SYSCALL msg=audit(1162916996.341:632): arch=40000003 syscall=33 success=no exit=-2 a0=9da69f8 a1=4 a2=ca7bbc a3=9da69c8 items=0 ppid=3575 pid=19878 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gpg" exe="/usr/bin/gpg" subj=staff_u:staff_r:staff_gpg_t:s0 key=(null) type=AVC msg=audit(1162916996.341:633): avc: denied { search } for pid=19878 comm="gpg" name="tmp" dev=dm-0 ino=14469313 scontext=staff_u:staff_r:staff_gpg_t:s0 tcontext=system_u:object_r:tmp_t:s0 tclass=dir type=AVC msg=audit(1162916996.341:633): avc: denied { read } for pid=19878 comm="gpg" name="evolution-pgp.SGNUIT" dev=dm-0 ino=14469397 scontext=staff_u:staff_r:staff_gpg_t:s0 tcontext=staff_u:object_r:staff_evolution_orbit_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162916996.341:633): arch=40000003 syscall=5 success=yes exit=3 a0=bf8b4b1a a1=8000 a2=0 a3=8000 items=0 ppid=3575 pid=19878 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gpg" exe="/usr/bin/gpg" subj=staff_u:staff_r:staff_gpg_t:s0 key=(null) type=USER_ACCT msg=audit(1162917001.757:634): user pid=19879 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162917001.757:635): login pid=19879 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162917001.761:636): user pid=19879 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162917001.761:637): user pid=19879 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162917001.765:638): avc: denied { read append } for pid=19880 comm="sadc" name="sa07" dev=dm-0 ino=14600351 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=file type=SYSCALL msg=audit(1162917001.765:638): arch=40000003 syscall=5 success=yes exit=3 a0=bfe0bae4 a1=402 a2=bfe0bca8 a3=bfe0b9e0 items=0 ppid=19879 pid=19880 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162917001.765:639): avc: denied { lock } for pid=19880 comm="sadc" name="sa07" dev=dm-0 ino=14600351 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=file type=SYSCALL msg=audit(1162917001.765:639): arch=40000003 syscall=143 success=yes exit=0 a0=3 a1=6 a2=bfe0b9e0 a3=3 items=0 ppid=19879 pid=19880 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162917001.765:639): path="/var/log/sa/sa07" type=CRED_DISP msg=audit(1162917001.793:640): user pid=19879 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162917001.793:641): user pid=19879 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162917038.508:642): avc: denied { read } for pid=19888 comm="mozilla-xremote" name=".gdmF70UIT" dev=dm-0 ino=14469320 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162917038.508:642): arch=40000003 syscall=33 success=yes exit=0 a0=bfccff92 a1=4 a2=de7a64 a3=bfccff92 items=0 ppid=19887 pid=19888 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="mozilla-xremote" exe="/usr/lib/firefox-2.0/mozilla-xremote-client" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162917232.176:643): avc: denied { write } for pid=19916 comm="gnome-terminal" name="2965" dev=dm-0 ino=14567716 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:ice_tmp_t:s0 tclass=sock_file type=SYSCALL msg=audit(1162917232.176:643): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=bfeaf5b0 a2=39b770 a3=15 items=0 ppid=1 pid=19916 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-terminal" exe="/usr/bin/gnome-terminal" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162917240.052:644): avc: denied { getattr } for pid=19922 comm="bash" name="unix" dev=proc ino=-268434925 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:sysctl_net_unix_t:s0 tclass=dir type=SYSCALL msg=audit(1162917240.052:644): arch=40000003 syscall=195 success=yes exit=0 a0=9999ea8 a1=bfcb9848 a2=239ff4 a3=9999ea8 items=0 ppid=3783 pid=19922 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts3 comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1162917240.052:644): path="/proc/sys/net/unix" type=AVC msg=audit(1162917242.712:645): avc: denied { read } for pid=19922 comm="bash" name="unix" dev=proc ino=-268434925 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:sysctl_net_unix_t:s0 tclass=dir type=SYSCALL msg=audit(1162917242.712:645): arch=40000003 syscall=5 success=yes exit=3 a0=9999728 a1=18800 a2=0 a3=999970a items=0 ppid=3783 pid=19922 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts3 comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162917242.712:646): avc: denied { search } for pid=19922 comm="bash" name="unix" dev=proc ino=-268434925 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:sysctl_net_unix_t:s0 tclass=dir type=AVC msg=audit(1162917242.712:646): avc: denied { getattr } for pid=19922 comm="bash" name="max_dgram_qlen" dev=proc ino=-268434924 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:sysctl_net_unix_t:s0 tclass=file type=SYSCALL msg=audit(1162917242.712:646): arch=40000003 syscall=195 success=yes exit=0 a0=9999740 a1=bfcb9934 a2=239ff4 a3=2 items=0 ppid=3783 pid=19922 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts3 comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1162917242.712:646): path="/proc/sys/net/unix/max_dgram_qlen" type=AVC msg=audit(1162917340.570:647): avc: denied { execute } for pid=4324 comm="bash" name="audit2policy" dev=dm-0 ino=13683706 scontext=staff_u:sysadm_r:sysadm_t:s0 tcontext=staff_u:object_r:staff_home_t:s0 tclass=file type=SYSCALL msg=audit(1162917340.570:647): arch=40000003 syscall=33 success=yes exit=0 a0=9c29130 a1=1 a2=11 a3=9c29130 items=0 ppid=4321 pid=4324 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="bash" exe="/bin/bash" subj=staff_u:sysadm_r:sysadm_t:s0 key=(null) type=AVC msg=audit(1162917341.046:648): avc: denied { execute_no_trans } for pid=19949 comm="bash" name="audit2policy" dev=dm-0 ino=13683706 scontext=staff_u:sysadm_r:sysadm_t:s0 tcontext=staff_u:object_r:staff_home_t:s0 tclass=file type=SYSCALL msg=audit(1162917341.046:648): arch=40000003 syscall=11 success=yes exit=0 a0=9c22688 a1=9c22620 a2=9c23ec0 a3=9c28c28 items=0 ppid=4324 pid=19949 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="audit2policy" exe="/usr/bin/python" subj=staff_u:sysadm_r:sysadm_t:s0 key=(null) type=AVC_PATH msg=audit(1162917341.046:648): path="/home/kmacmill/projects/selinux/madison/audit2policy" type=USER_ACCT msg=audit(1162917601.863:649): user pid=19977 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162917601.863:650): login pid=19977 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162917601.863:651): user pid=19977 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162917601.863:652): user pid=19977 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162917601.927:653): user pid=19977 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162917601.927:654): user pid=19977 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162918201.988:655): user pid=20054 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162918201.988:656): login pid=20054 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162918201.988:657): user pid=20054 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162918201.988:658): user pid=20054 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162918202.008:659): user pid=20054 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162918202.008:660): user pid=20054 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162918801.066:661): user pid=20120 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162918801.066:662): login pid=20120 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162918801.066:663): user pid=20120 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162918801.066:664): user pid=20120 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162918801.082:665): user pid=20120 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162918801.082:666): user pid=20120 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162918861.093:667): user pid=20125 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162918861.093:668): login pid=20125 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162918861.093:669): user pid=20125 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162918861.093:670): user pid=20125 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162918861.097:671): avc: denied { getattr } for pid=20126 comm="bash" name="run-parts" dev=dm-0 ino=10331890 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1162918861.097:671): arch=40000003 syscall=195 success=yes exit=0 a0=8efa120 a1=bff70830 a2=375ff4 a3=8efa120 items=0 ppid=20125 pid=20126 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="bash" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162918861.097:671): path="/usr/bin/run-parts" type=AVC msg=audit(1162918861.097:672): avc: denied { execute } for pid=20126 comm="bash" name="run-parts" dev=dm-0 ino=10331890 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1162918861.097:672): arch=40000003 syscall=33 success=yes exit=0 a0=8efa120 a1=1 a2=11 a3=8efa120 items=0 ppid=20125 pid=20126 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="bash" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162918861.097:673): avc: denied { read } for pid=20126 comm="bash" name="run-parts" dev=dm-0 ino=10331890 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1162918861.097:673): arch=40000003 syscall=33 success=yes exit=0 a0=8efa120 a1=4 a2=ffffffff a3=8efa120 items=0 ppid=20125 pid=20126 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="bash" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162918861.097:674): avc: denied { execute_no_trans } for pid=20126 comm="bash" name="run-parts" dev=dm-0 ino=10331890 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1162918861.097:674): arch=40000003 syscall=11 success=yes exit=0 a0=8efa120 a1=8efa3d8 a2=8efa2f8 a3=8ef9f98 items=0 ppid=20125 pid=20126 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="run-parts" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162918861.097:674): path="/usr/bin/run-parts" type=AVC msg=audit(1162918861.101:675): avc: denied { ioctl } for pid=20126 comm="run-parts" name="run-parts" dev=dm-0 ino=10331890 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1162918861.101:675): arch=40000003 syscall=54 success=no exit=-25 a0=3 a1=5401 a2=bfd46828 a3=bfd46868 items=0 ppid=20125 pid=20126 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="run-parts" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162918861.101:675): path="/usr/bin/run-parts" type=AVC msg=audit(1162918861.101:676): avc: denied { execute } for pid=20126 comm="run-parts" name="inn-cron-nntpsend" dev=dm-0 ino=9331477 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1162918861.101:676): arch=40000003 syscall=33 success=yes exit=0 a0=9b3a990 a1=1 a2=1 a3=9b3ac98 items=0 ppid=20125 pid=20126 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="run-parts" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162918861.101:677): avc: denied { execute_no_trans } for pid=20127 comm="run-parts" name="inn-cron-nntpsend" dev=dm-0 ino=9331477 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1162918861.101:677): arch=40000003 syscall=11 success=yes exit=0 a0=9b3aa10 a1=9b3aad8 a2=9b3aae8 a3=9b3a758 items=0 ppid=20126 pid=20127 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="inn-cron-nntpse" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162918861.101:677): path="/etc/cron.hourly/inn-cron-nntpsend" type=AVC msg=audit(1162918861.105:678): avc: denied { execute } for pid=20128 comm="inn-cron-nntpse" name="chkconfig" dev=dm-0 ino=9984740 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sbin_t:s0 tclass=file type=AVC msg=audit(1162918861.105:678): avc: denied { execute_no_trans } for pid=20128 comm="inn-cron-nntpse" name="chkconfig" dev=dm-0 ino=9984740 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sbin_t:s0 tclass=file type=AVC msg=audit(1162918861.105:678): avc: denied { read } for pid=20128 comm="inn-cron-nntpse" name="chkconfig" dev=dm-0 ino=9984740 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sbin_t:s0 tclass=file type=SYSCALL msg=audit(1162918861.105:678): arch=40000003 syscall=11 success=yes exit=0 a0=95f8678 a1=95f8808 a2=95f8720 a3=95f8508 items=0 ppid=20127 pid=20128 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="chkconfig" exe="/sbin/chkconfig" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162918861.105:678): path="/sbin/chkconfig" type=AVC_PATH msg=audit(1162918861.105:678): path="/sbin/chkconfig" type=AVC msg=audit(1162918861.105:679): avc: denied { read } for pid=20128 comm="chkconfig" name="innd" dev=dm-0 ino=9331492 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162918861.105:679): arch=40000003 syscall=5 success=yes exit=3 a0=bff4da10 a1=0 a2=ffffffff a3=8768038 items=0 ppid=20127 pid=20128 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="chkconfig" exe="/sbin/chkconfig" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162918861.105:680): avc: denied { getattr } for pid=20128 comm="chkconfig" name="innd" dev=dm-0 ino=9331492 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162918861.105:680): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bff4d980 a2=2eeff4 a3=3 items=0 ppid=20127 pid=20128 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="chkconfig" exe="/sbin/chkconfig" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162918861.105:680): path="/etc/rc.d/init.d/innd" type=CRED_DISP msg=audit(1162918861.113:681): user pid=20125 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162918861.113:682): user pid=20125 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162919401.167:683): user pid=20179 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162919401.167:684): login pid=20179 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162919401.167:685): user pid=20179 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162919401.167:686): user pid=20179 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162919401.175:687): avc: denied { search } for pid=20180 comm="sadc" name="net" dev=proc ino=-268435432 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=dir type=SYSCALL msg=audit(1162919401.175:687): arch=40000003 syscall=5 success=yes exit=3 a0=8050371 a1=0 a2=1b6 a3=9b31800 items=0 ppid=20179 pid=20180 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=CRED_DISP msg=audit(1162919401.187:688): user pid=20179 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162919401.187:689): user pid=20179 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162920001.245:690): user pid=20253 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162920001.245:691): login pid=20253 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162920001.245:692): user pid=20253 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162920001.245:693): user pid=20253 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162920001.261:694): user pid=20253 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162920001.261:695): user pid=20253 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162920013.069:696): avc: denied { read } for pid=20277 comm="mozilla-xremote" name=".gdmF70UIT" dev=dm-0 ino=14469320 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162920013.069:696): arch=40000003 syscall=33 success=yes exit=0 a0=bf950f92 a1=4 a2=de7a64 a3=bf950f92 items=0 ppid=20276 pid=20277 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="mozilla-xremote" exe="/usr/lib/firefox-2.0/mozilla-xremote-client" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162920030.163:697): avc: denied { execmem } for pid=4371 comm="firefox-bin" scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_mozilla_t:s0 tclass=process type=SYSCALL msg=audit(1162920030.163:697): arch=40000003 syscall=192 success=yes exit=96612352 a0=0 a1=a01000 a2=7 a3=22 items=0 ppid=1 pid=4371 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162920048.188:698): avc: denied { read } for pid=4371 comm="firefox-bin" name=".gdmF70UIT" dev=dm-0 ino=14469320 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162920048.188:698): arch=40000003 syscall=33 success=yes exit=0 a0=bf976fcb a1=4 a2=4db18a64 a3=bf976fcb items=0 ppid=1 pid=4371 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162920048.188:699): avc: denied { getattr } for pid=4371 comm="firefox-bin" name=".gdmF70UIT" dev=dm-0 ino=14469320 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162920048.188:699): arch=40000003 syscall=197 success=yes exit=0 a0=47 a1=bf9739e8 a2=36aff4 a3=ac901250 items=0 ppid=1 pid=4371 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162920048.188:699): path="/tmp/.gdmF70UIT" type=AVC msg=audit(1162920137.525:700): avc: denied { execute } for pid=20295 comm="firefox-bin" name="nprhapengine.so" dev=dm-0 ino=6547712 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_mozilla_home_t:s0 tclass=file type=SYSCALL msg=audit(1162920137.525:700): arch=40000003 syscall=192 success=yes exit=70774784 a0=0 a1=2af6e0 a2=5 a3=802 items=0 ppid=1 pid=20295 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162920137.525:700): path="/home/kmacmill/.mozilla/plugins/nprhapengine.so" type=AVC msg=audit(1162920137.537:701): avc: denied { execstack } for pid=20295 comm="firefox-bin" scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_mozilla_t:s0 tclass=process type=SYSCALL msg=audit(1162920137.537:701): arch=40000003 syscall=125 success=yes exit=0 a0=bf924000 a1=1000 a2=1000007 a3=fffff000 items=0 ppid=1 pid=20295 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162920137.573:702): avc: denied { execmod } for pid=20295 comm="firefox-bin" name="nprhapengine.so" dev=dm-0 ino=6547712 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_mozilla_home_t:s0 tclass=file type=SYSCALL msg=audit(1162920137.573:702): arch=40000003 syscall=125 success=yes exit=0 a0=437f000 a1=26f000 a2=5 a3=bf920a50 items=0 ppid=1 pid=20295 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162920137.573:702): path="/home/kmacmill/.mozilla/plugins/nprhapengine.so" type=AVC msg=audit(1162920142.458:703): avc: denied { ioctl } for pid=20328 comm="ps" name="[379798]" dev=pipefs ino=379798 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_mozilla_t:s0 tclass=fifo_file type=SYSCALL msg=audit(1162920142.458:703): arch=40000003 syscall=54 success=no exit=-22 a0=1 a1=5413 a2=bff1a184 a3=bff1a1c8 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162920142.458:703): path="pipe:[379798]" type=AVC msg=audit(1162920142.482:704): avc: denied { getattr } for pid=20328 comm="ps" name="1" dev=proc ino=65538 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=dir type=SYSCALL msg=audit(1162920142.482:704): arch=40000003 syscall=195 success=yes exit=0 a0=996897c a1=bff1a0e0 a2=239ff4 a3=3 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162920142.482:704): path="/proc/1" type=AVC msg=audit(1162920142.482:705): avc: denied { search } for pid=20328 comm="ps" name="1" dev=proc ino=65538 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=dir type=AVC msg=audit(1162920142.482:705): avc: denied { read } for pid=20328 comm="ps" name="stat" dev=proc ino=65549 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=file type=SYSCALL msg=audit(1162920142.482:705): arch=40000003 syscall=5 success=yes exit=18 a0=4bd780 a1=0 a2=0 a3=4bd780 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162920142.482:706): avc: denied { getattr } for pid=20328 comm="ps" name="2" dev=proc ino=131074 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir type=SYSCALL msg=audit(1162920142.482:706): arch=40000003 syscall=195 success=yes exit=0 a0=996897c a1=bff1a0e0 a2=239ff4 a3=3 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162920142.482:706): path="/proc/2" type=AVC msg=audit(1162920142.482:707): avc: denied { search } for pid=20328 comm="ps" name="2" dev=proc ino=131074 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir type=AVC msg=audit(1162920142.482:707): avc: denied { read } for pid=20328 comm="ps" name="stat" dev=proc ino=131085 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=file type=SYSCALL msg=audit(1162920142.482:707): arch=40000003 syscall=5 success=yes exit=18 a0=4bd780 a1=0 a2=0 a3=4bd780 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162920142.486:708): avc: denied { getattr } for pid=20328 comm="ps" name="455" dev=proc ino=29818882 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:udev_t:s0-s0:c0.c1023 tclass=dir type=SYSCALL msg=audit(1162920142.486:708): arch=40000003 syscall=195 success=yes exit=0 a0=996897c a1=bff1a0e0 a2=239ff4 a3=3 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162920142.486:708): path="/proc/455" type=AVC msg=audit(1162920142.486:709): avc: denied { search } for pid=20328 comm="ps" name="455" dev=proc ino=29818882 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:udev_t:s0-s0:c0.c1023 tclass=dir type=AVC msg=audit(1162920142.486:709): avc: denied { read } for pid=20328 comm="ps" name="stat" dev=proc ino=29818893 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:udev_t:s0-s0:c0.c1023 tclass=file type=SYSCALL msg=audit(1162920142.486:709): arch=40000003 syscall=5 success=yes exit=18 a0=4bd780 a1=0 a2=0 a3=4bd780 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162920142.486:710): avc: denied { getattr } for pid=20328 comm="ps" name="2154" dev=proc ino=141164546 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:restorecond_t:s0 tclass=dir type=SYSCALL msg=audit(1162920142.486:710): arch=40000003 syscall=195 success=yes exit=0 a0=996897c a1=bff1a0e0 a2=239ff4 a3=3 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162920142.486:710): path="/proc/2154" type=AVC msg=audit(1162920142.486:711): avc: denied { search } for pid=20328 comm="ps" name="2154" dev=proc ino=141164546 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:restorecond_t:s0 tclass=dir type=AVC msg=audit(1162920142.486:711): avc: denied { read } for pid=20328 comm="ps" name="stat" dev=proc ino=141164557 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:restorecond_t:s0 tclass=file type=SYSCALL msg=audit(1162920142.486:711): arch=40000003 syscall=5 success=yes exit=18 a0=4bd780 a1=0 a2=0 a3=4bd780 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162920142.486:712): avc: denied { getattr } for pid=20328 comm="ps" name="2166" dev=proc ino=141950978 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:auditd_t:s0 tclass=dir type=SYSCALL msg=audit(1162920142.486:712): arch=40000003 syscall=195 success=yes exit=0 a0=996897c a1=bff1a0e0 a2=239ff4 a3=3 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162920142.486:712): path="/proc/2166" type=AVC msg=audit(1162920142.486:713): avc: denied { search } for pid=20328 comm="ps" name="2166" dev=proc ino=141950978 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:auditd_t:s0 tclass=dir type=AVC msg=audit(1162920142.486:713): avc: denied { read } for pid=20328 comm="ps" name="stat" dev=proc ino=141950989 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:auditd_t:s0 tclass=file type=SYSCALL msg=audit(1162920142.486:713): arch=40000003 syscall=5 success=yes exit=18 a0=4bd780 a1=0 a2=0 a3=4bd780 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162920142.486:714): avc: denied { getattr } for pid=20328 comm="ps" name="2182" dev=proc ino=142999554 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:syslogd_t:s0 tclass=dir type=SYSCALL msg=audit(1162920142.486:714): arch=40000003 syscall=195 success=yes exit=0 a0=996897c a1=bff1a0e0 a2=239ff4 a3=3 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162920142.486:714): path="/proc/2182" type=AVC msg=audit(1162920142.486:715): avc: denied { search } for pid=20328 comm="ps" name="2182" dev=proc ino=142999554 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:syslogd_t:s0 tclass=dir type=AVC msg=audit(1162920142.486:715): avc: denied { read } for pid=20328 comm="ps" name="stat" dev=proc ino=142999565 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:syslogd_t:s0 tclass=file type=SYSCALL msg=audit(1162920142.486:715): arch=40000003 syscall=5 success=yes exit=18 a0=4bd780 a1=0 a2=0 a3=4bd780 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162920142.486:716): avc: denied { getattr } for pid=20328 comm="ps" name="2185" dev=proc ino=143196162 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:klogd_t:s0 tclass=dir type=SYSCALL msg=audit(1162920142.486:716): arch=40000003 syscall=195 success=yes exit=0 a0=996897c a1=bff1a0e0 a2=239ff4 a3=3 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162920142.486:716): path="/proc/2185" type=AVC msg=audit(1162920142.486:717): avc: denied { search } for pid=20328 comm="ps" name="2185" dev=proc ino=143196162 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:klogd_t:s0 tclass=dir type=AVC msg=audit(1162920142.486:717): avc: denied { read } for pid=20328 comm="ps" name="stat" dev=proc ino=143196173 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:klogd_t:s0 tclass=file type=SYSCALL msg=audit(1162920142.486:717): arch=40000003 syscall=5 success=yes exit=18 a0=4bd780 a1=0 a2=0 a3=4bd780 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162920142.486:718): avc: denied { getattr } for pid=20328 comm="ps" name="2197" dev=proc ino=143982594 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:irqbalance_t:s0 tclass=dir type=SYSCALL msg=audit(1162920142.486:718): arch=40000003 syscall=195 success=yes exit=0 a0=996897c a1=bff1a0e0 a2=239ff4 a3=3 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162920142.486:718): path="/proc/2197" type=AVC msg=audit(1162920142.486:719): avc: denied { search } for pid=20328 comm="ps" name="2197" dev=proc ino=143982594 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:irqbalance_t:s0 tclass=dir type=AVC msg=audit(1162920142.486:719): avc: denied { read } for pid=20328 comm="ps" name="stat" dev=proc ino=143982605 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:irqbalance_t:s0 tclass=file type=SYSCALL msg=audit(1162920142.486:719): arch=40000003 syscall=5 success=yes exit=18 a0=4bd780 a1=0 a2=0 a3=4bd780 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162920142.486:720): avc: denied { getattr } for pid=20328 comm="ps" name="2213" dev=proc ino=145031170 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:setrans_t:s0-s0:c0.c1023 tclass=dir type=SYSCALL msg=audit(1162920142.486:720): arch=40000003 syscall=195 success=yes exit=0 a0=996897c a1=bff1a0e0 a2=239ff4 a3=3 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162920142.486:720): path="/proc/2213" type=AVC msg=audit(1162920142.486:721): avc: denied { search } for pid=20328 comm="ps" name="2213" dev=proc ino=145031170 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:setrans_t:s0-s0:c0.c1023 tclass=dir type=AVC msg=audit(1162920142.486:721): avc: denied { read } for pid=20328 comm="ps" name="stat" dev=proc ino=145031181 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:setrans_t:s0-s0:c0.c1023 tclass=file type=SYSCALL msg=audit(1162920142.486:721): arch=40000003 syscall=5 success=yes exit=18 a0=4bd780 a1=0 a2=0 a3=4bd780 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162920142.490:722): avc: denied { getattr } for pid=20328 comm="ps" name="2226" dev=proc ino=145883138 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:portmap_t:s0 tclass=dir type=SYSCALL msg=audit(1162920142.490:722): arch=40000003 syscall=195 success=yes exit=0 a0=996897c a1=bff1a0e0 a2=239ff4 a3=3 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162920142.490:722): path="/proc/2226" type=AVC msg=audit(1162920142.490:723): avc: denied { search } for pid=20328 comm="ps" name="2226" dev=proc ino=145883138 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:portmap_t:s0 tclass=dir type=AVC msg=audit(1162920142.490:723): avc: denied { read } for pid=20328 comm="ps" name="stat" dev=proc ino=145883149 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:portmap_t:s0 tclass=file type=SYSCALL msg=audit(1162920142.490:723): arch=40000003 syscall=5 success=yes exit=18 a0=4bd780 a1=0 a2=0 a3=4bd780 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162920142.490:724): avc: denied { getattr } for pid=20328 comm="ps" name="2260" dev=proc ino=148111362 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:rpcd_t:s0 tclass=dir type=SYSCALL msg=audit(1162920142.490:724): arch=40000003 syscall=195 success=yes exit=0 a0=996897c a1=bff1a0e0 a2=239ff4 a3=3 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162920142.490:724): path="/proc/2260" type=AVC msg=audit(1162920142.490:725): avc: denied { search } for pid=20328 comm="ps" name="2260" dev=proc ino=148111362 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:rpcd_t:s0 tclass=dir type=AVC msg=audit(1162920142.490:725): avc: denied { read } for pid=20328 comm="ps" name="stat" dev=proc ino=148111373 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:rpcd_t:s0 tclass=file type=SYSCALL msg=audit(1162920142.490:725): arch=40000003 syscall=5 success=yes exit=18 a0=4bd780 a1=0 a2=0 a3=4bd780 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162920142.490:726): avc: denied { getattr } for pid=20328 comm="ps" name="2324" dev=proc ino=152305666 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:system_dbusd_t:s0 tclass=dir type=SYSCALL msg=audit(1162920142.490:726): arch=40000003 syscall=195 success=yes exit=0 a0=996897c a1=bff1a0e0 a2=239ff4 a3=3 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162920142.490:726): path="/proc/2324" type=AVC msg=audit(1162920142.490:727): avc: denied { search } for pid=20328 comm="ps" name="2324" dev=proc ino=152305666 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:system_dbusd_t:s0 tclass=dir type=AVC msg=audit(1162920142.490:727): avc: denied { read } for pid=20328 comm="ps" name="stat" dev=proc ino=152305677 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:system_dbusd_t:s0 tclass=file type=SYSCALL msg=audit(1162920142.490:727): arch=40000003 syscall=5 success=yes exit=18 a0=4bd780 a1=0 a2=0 a3=4bd780 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162920142.490:728): avc: denied { getattr } for pid=20328 comm="ps" name="2336" dev=proc ino=153092098 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:bluetooth_t:s0 tclass=dir type=SYSCALL msg=audit(1162920142.490:728): arch=40000003 syscall=195 success=yes exit=0 a0=996897c a1=bff1a0e0 a2=239ff4 a3=3 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162920142.490:728): path="/proc/2336" type=AVC msg=audit(1162920142.490:729): avc: denied { search } for pid=20328 comm="ps" name="2336" dev=proc ino=153092098 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:bluetooth_t:s0 tclass=dir type=AVC msg=audit(1162920142.490:729): avc: denied { read } for pid=20328 comm="ps" name="stat" dev=proc ino=153092109 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:bluetooth_t:s0 tclass=file type=SYSCALL msg=audit(1162920142.490:729): arch=40000003 syscall=5 success=yes exit=18 a0=4bd780 a1=0 a2=0 a3=4bd780 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162920142.490:730): avc: denied { getattr } for pid=20328 comm="ps" name="2426" dev=proc ino=158990338 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:automount_t:s0 tclass=dir type=SYSCALL msg=audit(1162920142.490:730): arch=40000003 syscall=195 success=yes exit=0 a0=996897c a1=bff1a0e0 a2=239ff4 a3=3 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162920142.490:730): path="/proc/2426" type=AVC msg=audit(1162920142.490:731): avc: denied { search } for pid=20328 comm="ps" name="2426" dev=proc ino=158990338 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:automount_t:s0 tclass=dir type=AVC msg=audit(1162920142.490:731): avc: denied { read } for pid=20328 comm="ps" name="stat" dev=proc ino=158990349 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:automount_t:s0 tclass=file type=SYSCALL msg=audit(1162920142.490:731): arch=40000003 syscall=5 success=yes exit=18 a0=4bd780 a1=0 a2=0 a3=4bd780 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162920142.490:732): avc: denied { getattr } for pid=20328 comm="ps" name="2445" dev=proc ino=160235522 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:apmd_t:s0 tclass=dir type=SYSCALL msg=audit(1162920142.490:732): arch=40000003 syscall=195 success=yes exit=0 a0=996897c a1=bff1a0e0 a2=239ff4 a3=3 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162920142.490:732): path="/proc/2445" type=AVC msg=audit(1162920142.490:733): avc: denied { search } for pid=20328 comm="ps" name="2445" dev=proc ino=160235522 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:apmd_t:s0 tclass=dir type=AVC msg=audit(1162920142.490:733): avc: denied { read } for pid=20328 comm="ps" name="stat" dev=proc ino=160235533 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:apmd_t:s0 tclass=file type=SYSCALL msg=audit(1162920142.490:733): arch=40000003 syscall=5 success=yes exit=18 a0=4bd780 a1=0 a2=0 a3=4bd780 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162920142.490:734): avc: denied { getattr } for pid=20328 comm="ps" name="2456" dev=proc ino=160956418 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:hplip_t:s0 tclass=dir type=SYSCALL msg=audit(1162920142.490:734): arch=40000003 syscall=195 success=yes exit=0 a0=996897c a1=bff1a0e0 a2=239ff4 a3=3 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162920142.490:734): path="/proc/2456" type=AVC msg=audit(1162920142.490:735): avc: denied { search } for pid=20328 comm="ps" name="2456" dev=proc ino=160956418 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:hplip_t:s0 tclass=dir type=AVC msg=audit(1162920142.490:735): avc: denied { read } for pid=20328 comm="ps" name="stat" dev=proc ino=160956429 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:hplip_t:s0 tclass=file type=SYSCALL msg=audit(1162920142.490:735): arch=40000003 syscall=5 success=yes exit=18 a0=4bd780 a1=0 a2=0 a3=4bd780 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162920142.490:736): avc: denied { getattr } for pid=20328 comm="ps" name="2473" dev=proc ino=162070530 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:cupsd_t:s0-s0:c0.c1023 tclass=dir type=SYSCALL msg=audit(1162920142.490:736): arch=40000003 syscall=195 success=yes exit=0 a0=996897c a1=bff1a0e0 a2=239ff4 a3=3 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162920142.490:736): path="/proc/2473" type=AVC msg=audit(1162920142.490:737): avc: denied { search } for pid=20328 comm="ps" name="2473" dev=proc ino=162070530 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:cupsd_t:s0-s0:c0.c1023 tclass=dir type=AVC msg=audit(1162920142.490:737): avc: denied { read } for pid=20328 comm="ps" name="stat" dev=proc ino=162070541 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:cupsd_t:s0-s0:c0.c1023 tclass=file type=SYSCALL msg=audit(1162920142.490:737): arch=40000003 syscall=5 success=yes exit=18 a0=4bd780 a1=0 a2=0 a3=4bd780 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162920142.490:738): avc: denied { getattr } for pid=20328 comm="ps" name="2487" dev=proc ino=162988034 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tclass=dir type=SYSCALL msg=audit(1162920142.490:738): arch=40000003 syscall=195 success=yes exit=0 a0=996897c a1=bff1a0e0 a2=239ff4 a3=3 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162920142.490:738): path="/proc/2487" type=AVC msg=audit(1162920142.490:739): avc: denied { search } for pid=20328 comm="ps" name="2487" dev=proc ino=162988034 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tclass=dir type=AVC msg=audit(1162920142.490:739): avc: denied { read } for pid=20328 comm="ps" name="stat" dev=proc ino=162988045 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tclass=file type=SYSCALL msg=audit(1162920142.490:739): arch=40000003 syscall=5 success=yes exit=18 a0=4bd780 a1=0 a2=0 a3=4bd780 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162920142.490:740): avc: denied { getattr } for pid=20328 comm="ps" name="2499" dev=proc ino=163774466 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:inetd_t:s0 tclass=dir type=SYSCALL msg=audit(1162920142.490:740): arch=40000003 syscall=195 success=yes exit=0 a0=996897c a1=bff1a0e0 a2=239ff4 a3=3 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162920142.490:740): path="/proc/2499" type=AVC msg=audit(1162920142.490:741): avc: denied { search } for pid=20328 comm="ps" name="2499" dev=proc ino=163774466 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:inetd_t:s0 tclass=dir type=AVC msg=audit(1162920142.490:741): avc: denied { read } for pid=20328 comm="ps" name="stat" dev=proc ino=163774477 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:inetd_t:s0 tclass=file type=SYSCALL msg=audit(1162920142.490:741): arch=40000003 syscall=5 success=yes exit=18 a0=4bd780 a1=0 a2=0 a3=4bd780 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162920142.490:742): avc: denied { getattr } for pid=20328 comm="ps" name="2519" dev=proc ino=165085186 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:sendmail_t:s0 tclass=dir type=SYSCALL msg=audit(1162920142.490:742): arch=40000003 syscall=195 success=yes exit=0 a0=996897c a1=bff1a0e0 a2=239ff4 a3=3 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162920142.490:742): path="/proc/2519" type=AVC msg=audit(1162920142.490:743): avc: denied { search } for pid=20328 comm="ps" name="2519" dev=proc ino=165085186 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:sendmail_t:s0 tclass=dir type=AVC msg=audit(1162920142.490:743): avc: denied { read } for pid=20328 comm="ps" name="stat" dev=proc ino=165085197 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:sendmail_t:s0 tclass=file type=SYSCALL msg=audit(1162920142.490:743): arch=40000003 syscall=5 success=yes exit=18 a0=4bd780 a1=0 a2=0 a3=4bd780 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162920142.490:744): avc: denied { getattr } for pid=20328 comm="ps" name="2540" dev=proc ino=166461442 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:gpm_t:s0 tclass=dir type=SYSCALL msg=audit(1162920142.490:744): arch=40000003 syscall=195 success=yes exit=0 a0=996897c a1=bff1a0e0 a2=239ff4 a3=3 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162920142.490:744): path="/proc/2540" type=AVC msg=audit(1162920142.490:745): avc: denied { search } for pid=20328 comm="ps" name="2540" dev=proc ino=166461442 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:gpm_t:s0 tclass=dir type=AVC msg=audit(1162920142.490:745): avc: denied { read } for pid=20328 comm="ps" name="stat" dev=proc ino=166461453 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:gpm_t:s0 tclass=file type=SYSCALL msg=audit(1162920142.490:745): arch=40000003 syscall=5 success=yes exit=18 a0=4bd780 a1=0 a2=0 a3=4bd780 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162920142.490:746): avc: denied { getattr } for pid=20328 comm="ps" name="2551" dev=proc ino=167182338 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tclass=dir type=SYSCALL msg=audit(1162920142.490:746): arch=40000003 syscall=195 success=yes exit=0 a0=996897c a1=bff1a0e0 a2=239ff4 a3=3 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162920142.490:746): path="/proc/2551" type=AVC msg=audit(1162920142.494:747): avc: denied { search } for pid=20328 comm="ps" name="2551" dev=proc ino=167182338 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tclass=dir type=AVC msg=audit(1162920142.494:747): avc: denied { read } for pid=20328 comm="ps" name="stat" dev=proc ino=167182349 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tclass=file type=SYSCALL msg=audit(1162920142.494:747): arch=40000003 syscall=5 success=yes exit=18 a0=4bd780 a1=0 a2=0 a3=4bd780 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162920142.494:748): avc: denied { getattr } for pid=20328 comm="ps" name="2588" dev=proc ino=169607170 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:xfs_t:s0 tclass=dir type=SYSCALL msg=audit(1162920142.494:748): arch=40000003 syscall=195 success=yes exit=0 a0=996897c a1=bff1a0e0 a2=239ff4 a3=3 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162920142.494:748): path="/proc/2588" type=AVC msg=audit(1162920142.494:749): avc: denied { search } for pid=20328 comm="ps" name="2588" dev=proc ino=169607170 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:xfs_t:s0 tclass=dir type=AVC msg=audit(1162920142.494:749): avc: denied { read } for pid=20328 comm="ps" name="stat" dev=proc ino=169607181 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:xfs_t:s0 tclass=file type=SYSCALL msg=audit(1162920142.494:749): arch=40000003 syscall=5 success=yes exit=18 a0=4bd780 a1=0 a2=0 a3=4bd780 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162920142.494:750): avc: denied { getattr } for pid=20328 comm="ps" name="2681" dev=proc ino=175702018 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:avahi_t:s0 tclass=dir type=SYSCALL msg=audit(1162920142.494:750): arch=40000003 syscall=195 success=yes exit=0 a0=996897c a1=bff1a0e0 a2=239ff4 a3=3 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162920142.494:750): path="/proc/2681" type=AVC msg=audit(1162920142.494:751): avc: denied { search } for pid=20328 comm="ps" name="2681" dev=proc ino=175702018 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:avahi_t:s0 tclass=dir type=AVC msg=audit(1162920142.494:751): avc: denied { read } for pid=20328 comm="ps" name="stat" dev=proc ino=175702029 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:avahi_t:s0 tclass=file type=SYSCALL msg=audit(1162920142.494:751): arch=40000003 syscall=5 success=yes exit=18 a0=4bd780 a1=0 a2=0 a3=4bd780 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162920142.494:752): avc: denied { getattr } for pid=20328 comm="ps" name="2693" dev=proc ino=176488450 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:dhcpc_t:s0 tclass=dir type=SYSCALL msg=audit(1162920142.494:752): arch=40000003 syscall=195 success=yes exit=0 a0=996897c a1=bff1a0e0 a2=239ff4 a3=3 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162920142.494:752): path="/proc/2693" type=AVC msg=audit(1162920142.494:753): avc: denied { search } for pid=20328 comm="ps" name="2693" dev=proc ino=176488450 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:dhcpc_t:s0 tclass=dir type=AVC msg=audit(1162920142.494:753): avc: denied { read } for pid=20328 comm="ps" name="stat" dev=proc ino=176488461 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:dhcpc_t:s0 tclass=file type=SYSCALL msg=audit(1162920142.494:753): arch=40000003 syscall=5 success=yes exit=18 a0=4bd780 a1=0 a2=0 a3=4bd780 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162920142.494:754): avc: denied { getattr } for pid=20328 comm="ps" name="2706" dev=proc ino=177340418 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:hald_t:s0 tclass=dir type=SYSCALL msg=audit(1162920142.494:754): arch=40000003 syscall=195 success=yes exit=0 a0=996897c a1=bff1a0e0 a2=239ff4 a3=3 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162920142.494:754): path="/proc/2706" type=AVC msg=audit(1162920142.494:755): avc: denied { search } for pid=20328 comm="ps" name="2706" dev=proc ino=177340418 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:hald_t:s0 tclass=dir type=AVC msg=audit(1162920142.494:755): avc: denied { read } for pid=20328 comm="ps" name="stat" dev=proc ino=177340429 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:hald_t:s0 tclass=file type=SYSCALL msg=audit(1162920142.494:755): arch=40000003 syscall=5 success=yes exit=18 a0=4bd780 a1=0 a2=0 a3=4bd780 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162920142.494:756): avc: denied { getattr } for pid=20328 comm="ps" name="2771" dev=proc ino=181600258 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:NetworkManager_t:s0 tclass=dir type=SYSCALL msg=audit(1162920142.494:756): arch=40000003 syscall=195 success=yes exit=0 a0=996897c a1=bff1a0e0 a2=239ff4 a3=3 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162920142.494:756): path="/proc/2771" type=AVC msg=audit(1162920142.494:757): avc: denied { search } for pid=20328 comm="ps" name="2771" dev=proc ino=181600258 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:NetworkManager_t:s0 tclass=dir type=AVC msg=audit(1162920142.494:757): avc: denied { read } for pid=20328 comm="ps" name="stat" dev=proc ino=181600269 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:NetworkManager_t:s0 tclass=file type=SYSCALL msg=audit(1162920142.494:757): arch=40000003 syscall=5 success=yes exit=18 a0=4bd780 a1=0 a2=0 a3=4bd780 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162920142.494:758): avc: denied { getattr } for pid=20328 comm="ps" name="2798" dev=proc ino=183369730 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:fsdaemon_t:s0 tclass=dir type=SYSCALL msg=audit(1162920142.494:758): arch=40000003 syscall=195 success=yes exit=0 a0=996897c a1=bff1a0e0 a2=239ff4 a3=3 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162920142.494:758): path="/proc/2798" type=AVC msg=audit(1162920142.494:759): avc: denied { search } for pid=20328 comm="ps" name="2798" dev=proc ino=183369730 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:fsdaemon_t:s0 tclass=dir type=AVC msg=audit(1162920142.494:759): avc: denied { read } for pid=20328 comm="ps" name="stat" dev=proc ino=183369741 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:fsdaemon_t:s0 tclass=file type=SYSCALL msg=audit(1162920142.494:759): arch=40000003 syscall=5 success=yes exit=18 a0=4bd780 a1=0 a2=0 a3=4bd780 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162920142.494:760): avc: denied { getattr } for pid=20328 comm="ps" name="2813" dev=proc ino=184352770 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:getty_t:s0 tclass=dir type=SYSCALL msg=audit(1162920142.494:760): arch=40000003 syscall=195 success=yes exit=0 a0=996897c a1=bff1a0e0 a2=239ff4 a3=3 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162920142.494:760): path="/proc/2813" type=AVC msg=audit(1162920142.494:761): avc: denied { search } for pid=20328 comm="ps" name="2813" dev=proc ino=184352770 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:getty_t:s0 tclass=dir type=AVC msg=audit(1162920142.494:761): avc: denied { read } for pid=20328 comm="ps" name="stat" dev=proc ino=184352781 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:getty_t:s0 tclass=file type=SYSCALL msg=audit(1162920142.494:761): arch=40000003 syscall=5 success=yes exit=18 a0=4bd780 a1=0 a2=0 a3=4bd780 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162920142.494:762): avc: denied { getattr } for pid=20328 comm="ps" name="2827" dev=proc ino=185270274 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tclass=dir type=SYSCALL msg=audit(1162920142.494:762): arch=40000003 syscall=195 success=yes exit=0 a0=996897c a1=bff1a0e0 a2=239ff4 a3=3 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162920142.494:762): path="/proc/2827" type=AVC msg=audit(1162920142.494:763): avc: denied { search } for pid=20328 comm="ps" name="2827" dev=proc ino=185270274 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tclass=dir type=AVC msg=audit(1162920142.494:763): avc: denied { read } for pid=20328 comm="ps" name="stat" dev=proc ino=185270285 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tclass=file type=SYSCALL msg=audit(1162920142.494:763): arch=40000003 syscall=5 success=yes exit=18 a0=4bd780 a1=0 a2=0 a3=4bd780 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162920142.494:764): avc: denied { getattr } for pid=20328 comm="ps" name="2936" dev=proc ino=192413698 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:xdm_xserver_t:s0-s0:c0.c1023 tclass=dir type=SYSCALL msg=audit(1162920142.494:764): arch=40000003 syscall=195 success=yes exit=0 a0=996897c a1=bff1a0e0 a2=239ff4 a3=3 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162920142.494:764): path="/proc/2936" type=AVC msg=audit(1162920142.494:765): avc: denied { search } for pid=20328 comm="ps" name="2936" dev=proc ino=192413698 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:xdm_xserver_t:s0-s0:c0.c1023 tclass=dir type=AVC msg=audit(1162920142.494:765): avc: denied { read } for pid=20328 comm="ps" name="stat" dev=proc ino=192413709 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:xdm_xserver_t:s0-s0:c0.c1023 tclass=file type=SYSCALL msg=audit(1162920142.494:765): arch=40000003 syscall=5 success=yes exit=18 a0=4bd780 a1=0 a2=0 a3=4bd780 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162920142.498:766): avc: denied { getattr } for pid=20328 comm="ps" name="2965" dev=proc ino=194314242 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dir type=SYSCALL msg=audit(1162920142.498:766): arch=40000003 syscall=195 success=yes exit=0 a0=996897c a1=bff1a0e0 a2=239ff4 a3=3 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162920142.498:766): path="/proc/2965" type=AVC msg=audit(1162920142.498:767): avc: denied { search } for pid=20328 comm="ps" name="2965" dev=proc ino=194314242 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dir type=AVC msg=audit(1162920142.498:767): avc: denied { read } for pid=20328 comm="ps" name="stat" dev=proc ino=194314253 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=file type=SYSCALL msg=audit(1162920142.498:767): arch=40000003 syscall=5 success=yes exit=18 a0=4bd780 a1=0 a2=0 a3=4bd780 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162920142.498:768): avc: denied { getattr } for pid=20328 comm="ps" name="3017" dev=proc ino=197722114 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_ssh_agent_t:s0 tclass=dir type=SYSCALL msg=audit(1162920142.498:768): arch=40000003 syscall=195 success=yes exit=0 a0=996897c a1=bff1a0e0 a2=239ff4 a3=3 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162920142.498:768): path="/proc/3017" type=AVC msg=audit(1162920142.498:769): avc: denied { search } for pid=20328 comm="ps" name="3017" dev=proc ino=197722114 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_ssh_agent_t:s0 tclass=dir type=AVC msg=audit(1162920142.498:769): avc: denied { read } for pid=20328 comm="ps" name="stat" dev=proc ino=197722125 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_ssh_agent_t:s0 tclass=file type=SYSCALL msg=audit(1162920142.498:769): arch=40000003 syscall=5 success=yes exit=18 a0=4bd780 a1=0 a2=0 a3=4bd780 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162920142.498:770): avc: denied { getattr } for pid=20328 comm="ps" name="3021" dev=proc ino=197984258 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_dbusd_t:s0 tclass=dir type=SYSCALL msg=audit(1162920142.498:770): arch=40000003 syscall=195 success=yes exit=0 a0=996897c a1=bff1a0e0 a2=239ff4 a3=3 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162920142.498:770): path="/proc/3021" type=AVC msg=audit(1162920142.498:771): avc: denied { search } for pid=20328 comm="ps" name="3021" dev=proc ino=197984258 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_dbusd_t:s0 tclass=dir type=AVC msg=audit(1162920142.498:771): avc: denied { read } for pid=20328 comm="ps" name="stat" dev=proc ino=197984269 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_dbusd_t:s0 tclass=file type=SYSCALL msg=audit(1162920142.498:771): arch=40000003 syscall=5 success=yes exit=18 a0=4bd780 a1=0 a2=0 a3=4bd780 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162920142.498:772): avc: denied { getattr } for pid=20328 comm="ps" name="3112" dev=proc ino=203948034 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:pam_t:s0 tclass=dir type=SYSCALL msg=audit(1162920142.498:772): arch=40000003 syscall=195 success=yes exit=0 a0=996897c a1=bff1a0e0 a2=239ff4 a3=3 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162920142.498:772): path="/proc/3112" type=AVC msg=audit(1162920142.498:773): avc: denied { search } for pid=20328 comm="ps" name="3112" dev=proc ino=203948034 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:pam_t:s0 tclass=dir type=AVC msg=audit(1162920142.498:773): avc: denied { read } for pid=20328 comm="ps" name="stat" dev=proc ino=203948045 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:pam_t:s0 tclass=file type=SYSCALL msg=audit(1162920142.498:773): arch=40000003 syscall=5 success=yes exit=18 a0=4bd780 a1=0 a2=0 a3=4bd780 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162920142.502:774): avc: denied { getattr } for pid=20328 comm="ps" name="3214" dev=proc ino=210632706 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_evolution_server_t:s0 tclass=dir type=SYSCALL msg=audit(1162920142.502:774): arch=40000003 syscall=195 success=yes exit=0 a0=996897c a1=bff1a0e0 a2=239ff4 a3=3 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162920142.502:774): path="/proc/3214" type=AVC msg=audit(1162920142.502:775): avc: denied { search } for pid=20328 comm="ps" name="3214" dev=proc ino=210632706 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_evolution_server_t:s0 tclass=dir type=AVC msg=audit(1162920142.502:775): avc: denied { read } for pid=20328 comm="ps" name="stat" dev=proc ino=210632717 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_evolution_server_t:s0 tclass=file type=SYSCALL msg=audit(1162920142.502:775): arch=40000003 syscall=5 success=yes exit=18 a0=4bd780 a1=0 a2=0 a3=4bd780 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162920142.502:776): avc: denied { getattr } for pid=20328 comm="ps" name="3239" dev=proc ino=212271106 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tclass=dir type=SYSCALL msg=audit(1162920142.502:776): arch=40000003 syscall=195 success=yes exit=0 a0=996897c a1=bff1a0e0 a2=239ff4 a3=3 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162920142.502:776): path="/proc/3239" type=AVC msg=audit(1162920142.502:777): avc: denied { search } for pid=20328 comm="ps" name="3239" dev=proc ino=212271106 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tclass=dir type=AVC msg=audit(1162920142.502:777): avc: denied { read } for pid=20328 comm="ps" name="stat" dev=proc ino=212271117 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tclass=file type=SYSCALL msg=audit(1162920142.502:777): arch=40000003 syscall=5 success=yes exit=18 a0=4bd780 a1=0 a2=0 a3=4bd780 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162920142.502:778): avc: denied { getattr } for pid=20328 comm="ps" name="3575" dev=proc ino=234291202 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_evolution_t:s0 tclass=dir type=SYSCALL msg=audit(1162920142.502:778): arch=40000003 syscall=195 success=yes exit=0 a0=996897c a1=bff1a0e0 a2=239ff4 a3=3 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162920142.502:778): path="/proc/3575" type=AVC msg=audit(1162920142.502:779): avc: denied { search } for pid=20328 comm="ps" name="3575" dev=proc ino=234291202 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_evolution_t:s0 tclass=dir type=AVC msg=audit(1162920142.502:779): avc: denied { read } for pid=20328 comm="ps" name="stat" dev=proc ino=234291213 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_evolution_t:s0 tclass=file type=SYSCALL msg=audit(1162920142.502:779): arch=40000003 syscall=5 success=yes exit=18 a0=4bd780 a1=0 a2=0 a3=4bd780 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162920142.502:780): avc: denied { getattr } for pid=20328 comm="ps" name="/" dev=devpts ino=1 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:devpts_t:s0 tclass=dir type=SYSCALL msg=audit(1162920142.502:780): arch=40000003 syscall=195 success=yes exit=0 a0=4bb840 a1=bff178f0 a2=239ff4 a3=3 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162920142.502:780): path="/dev/pts" type=AVC msg=audit(1162920142.502:781): avc: denied { read } for pid=20328 comm="ps" name="2" dev=proc ino=248152066 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=lnk_file type=AVC msg=audit(1162920142.502:781): avc: denied { ptrace } for pid=20328 comm="ps" scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=process type=SYSCALL msg=audit(1162920142.502:781): arch=40000003 syscall=85 success=yes exit=10 a0=bff17928 a1=4bb840 a2=7f a3=bff17928 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162920142.502:782): avc: denied { search } for pid=20328 comm="ps" name="/" dev=devpts ino=1 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:devpts_t:s0 tclass=dir type=AVC msg=audit(1162920142.502:782): avc: denied { getattr } for pid=20328 comm="ps" name="1" dev=devpts ino=3 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_devpts_t:s0 tclass=chr_file type=SYSCALL msg=audit(1162920142.502:782): arch=40000003 syscall=195 success=yes exit=0 a0=4bb840 a1=bff17830 a2=239ff4 a3=3 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162920142.502:782): path="/dev/pts/1" type=AVC msg=audit(1162920142.502:783): avc: denied { getattr } for pid=20328 comm="ps" name="2" dev=devpts ino=4 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:sysadm_devpts_t:s0 tclass=chr_file type=SYSCALL msg=audit(1162920142.502:783): arch=40000003 syscall=195 success=yes exit=0 a0=4bb840 a1=bff17830 a2=239ff4 a3=3 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162920142.502:783): path="/dev/pts/2" type=AVC msg=audit(1162920142.502:784): avc: denied { getattr } for pid=20328 comm="ps" name="4282" dev=proc ino=280625154 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_su_t:s0 tclass=dir type=SYSCALL msg=audit(1162920142.502:784): arch=40000003 syscall=195 success=yes exit=0 a0=996897c a1=bff1a0e0 a2=239ff4 a3=3 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162920142.502:784): path="/proc/4282" type=AVC msg=audit(1162920142.502:785): avc: denied { search } for pid=20328 comm="ps" name="4282" dev=proc ino=280625154 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_su_t:s0 tclass=dir type=AVC msg=audit(1162920142.502:785): avc: denied { read } for pid=20328 comm="ps" name="stat" dev=proc ino=280625165 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_su_t:s0 tclass=file type=SYSCALL msg=audit(1162920142.502:785): arch=40000003 syscall=5 success=yes exit=18 a0=4bd780 a1=0 a2=0 a3=4bd780 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162920142.502:786): avc: denied { getattr } for pid=20328 comm="ps" name="4321" dev=proc ino=283181058 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:newrole_t:s0 tclass=dir type=SYSCALL msg=audit(1162920142.502:786): arch=40000003 syscall=195 success=yes exit=0 a0=996897c a1=bff1a0e0 a2=239ff4 a3=3 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162920142.502:786): path="/proc/4321" type=AVC msg=audit(1162920142.502:787): avc: denied { search } for pid=20328 comm="ps" name="4321" dev=proc ino=283181058 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:newrole_t:s0 tclass=dir type=AVC msg=audit(1162920142.502:787): avc: denied { read } for pid=20328 comm="ps" name="stat" dev=proc ino=283181069 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:newrole_t:s0 tclass=file type=SYSCALL msg=audit(1162920142.502:787): arch=40000003 syscall=5 success=yes exit=18 a0=4bd780 a1=0 a2=0 a3=4bd780 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162920142.502:788): avc: denied { getattr } for pid=20328 comm="ps" name="4324" dev=proc ino=283377666 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:sysadm_r:sysadm_t:s0 tclass=dir type=SYSCALL msg=audit(1162920142.502:788): arch=40000003 syscall=195 success=yes exit=0 a0=996897c a1=bff1a0e0 a2=239ff4 a3=3 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162920142.502:788): path="/proc/4324" type=AVC msg=audit(1162920142.502:789): avc: denied { search } for pid=20328 comm="ps" name="4324" dev=proc ino=283377666 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:sysadm_r:sysadm_t:s0 tclass=dir type=AVC msg=audit(1162920142.502:789): avc: denied { read } for pid=20328 comm="ps" name="stat" dev=proc ino=283377677 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:sysadm_r:sysadm_t:s0 tclass=file type=SYSCALL msg=audit(1162920142.502:789): arch=40000003 syscall=5 success=yes exit=18 a0=4bd780 a1=0 a2=0 a3=4bd780 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162920144.582:790): avc: denied { write } for pid=20295 comm="firefox-bin" name="tmp" dev=dm-0 ino=14469313 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:tmp_t:s0 tclass=dir type=AVC msg=audit(1162920144.582:790): avc: denied { add_name } for pid=20295 comm="firefox-bin" name="Flash6fMJkH" scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:tmp_t:s0 tclass=dir type=AVC msg=audit(1162920144.582:790): avc: denied { create } for pid=20295 comm="firefox-bin" name="Flash6fMJkH" scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162920144.582:790): arch=40000003 syscall=5 success=yes exit=50 a0=bf923acb a1=c2 a2=180 a3=293500 items=0 ppid=1 pid=20295 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162920144.582:791): avc: denied { read write } for pid=20295 comm="firefox-bin" name="Flash6fMJkH" dev=dm-0 ino=14469397 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162920144.582:791): arch=40000003 syscall=5 success=yes exit=50 a0=a6d65080 a1=242 a2=1b6 a3=90edaa0 items=0 ppid=1 pid=20295 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162920144.582:792): avc: denied { getattr } for pid=20295 comm="firefox-bin" name="Flash6fMJkH" dev=dm-0 ino=14469397 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162920144.582:792): arch=40000003 syscall=197 success=yes exit=0 a0=32 a1=bf923948 a2=239ff4 a3=90edaa0 items=0 ppid=1 pid=20295 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162920144.582:792): path="/tmp/Flash6fMJkH" type=AVC msg=audit(1162920363.911:793): avc: denied { search } for pid=20295 comm="firefox-bin" name="pcm" dev=dm-0 ino=9330155 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:alsa_etc_rw_t:s0 tclass=dir type=AVC msg=audit(1162920363.911:793): avc: denied { read } for pid=20295 comm="firefox-bin" name="default.conf" dev=dm-0 ino=9330152 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:alsa_etc_rw_t:s0 tclass=file type=SYSCALL msg=audit(1162920363.911:793): arch=40000003 syscall=5 success=yes exit=53 a0=8c301e0 a1=0 a2=1b6 a3=982b840 items=0 ppid=1 pid=20295 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162920363.927:794): avc: denied { getattr } for pid=20295 comm="firefox-bin" name="default.conf" dev=dm-0 ino=9330152 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:alsa_etc_rw_t:s0 tclass=file type=SYSCALL msg=audit(1162920363.927:794): arch=40000003 syscall=197 success=yes exit=0 a0=35 a1=bf923770 a2=239ff4 a3=982b840 items=0 ppid=1 pid=20295 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162920363.927:794): path="/etc/alsa/pcm/default.conf" type=AVC msg=audit(1162920363.951:795): avc: denied { search } for pid=20295 comm="firefox-bin" name="4-1:1.1" dev=sysfs ino=972 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:sysfs_t:s0 tclass=dir type=SYSCALL msg=audit(1162920363.951:795): arch=40000003 syscall=54 success=yes exit=0 a0=35 a1=c25c4111 a2=bf9234ac a3=bf9234ac items=0 ppid=1 pid=20295 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162920398.374:796): avc: denied { remove_name } for pid=20295 comm="firefox-bin" name="7j7px5ah.bin" dev=dm-0 ino=14469399 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:tmp_t:s0 tclass=dir type=AVC msg=audit(1162920398.374:796): avc: denied { unlink } for pid=20295 comm="firefox-bin" name="7j7px5ah.bin" dev=dm-0 ino=14469399 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162920398.374:796): arch=40000003 syscall=10 success=yes exit=0 a0=960cca8 a1=0 a2=6e44304 a3=0 items=0 ppid=1 pid=20295 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162920425.635:797): avc: denied { create } for pid=20374 comm="evolution" scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=staff_u:staff_r:staff_evolution_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1162920425.635:797): arch=40000003 syscall=102 success=yes exit=49 a0=1 a1=b410d274 a2=4c0ff4 a3=802d7f items=0 ppid=1 pid=20374 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC msg=audit(1162920425.635:798): avc: denied { bind } for pid=20374 comm="evolution" scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=staff_u:staff_r:staff_evolution_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1162920425.635:798): arch=40000003 syscall=102 success=yes exit=0 a0=2 a1=b410d274 a2=4c0ff4 a3=31 items=0 ppid=1 pid=20374 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC msg=audit(1162920425.635:799): avc: denied { getattr } for pid=20374 comm="evolution" scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=staff_u:staff_r:staff_evolution_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1162920425.635:799): arch=40000003 syscall=102 success=yes exit=0 a0=6 a1=b410d274 a2=4c0ff4 a3=31 items=0 ppid=1 pid=20374 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC msg=audit(1162920425.635:800): avc: denied { write } for pid=20374 comm="evolution" scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=staff_u:staff_r:staff_evolution_t:s0 tclass=netlink_route_socket type=AVC msg=audit(1162920425.635:800): avc: denied { nlmsg_read } for pid=20374 comm="evolution" scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=staff_u:staff_r:staff_evolution_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1162920425.635:800): arch=40000003 syscall=102 success=yes exit=20 a0=b a1=b410c1b4 a2=4c0ff4 a3=0 items=0 ppid=1 pid=20374 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC msg=audit(1162920425.635:801): avc: denied { read } for pid=20374 comm="evolution" scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=staff_u:staff_r:staff_evolution_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1162920425.635:801): arch=40000003 syscall=102 success=yes exit=128 a0=11 a1=b410c1b4 a2=4c0ff4 a3=0 items=0 ppid=1 pid=20374 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=USER_ACCT msg=audit(1162920601.326:802): user pid=20440 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162920601.326:803): login pid=20440 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162920601.326:804): user pid=20440 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162920601.326:805): user pid=20440 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162920601.330:806): avc: denied { execute } for pid=20441 comm="sh" name="sa1" dev=dm-0 ino=13061698 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:lib_t:s0 tclass=file type=AVC msg=audit(1162920601.330:806): avc: denied { execute_no_trans } for pid=20441 comm="sh" name="sa1" dev=dm-0 ino=13061698 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1162920601.330:806): arch=40000003 syscall=11 success=yes exit=0 a0=8f781b0 a1=8f78358 a2=8f78290 a3=8f78008 items=0 ppid=20440 pid=20441 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sa1" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162920601.330:806): path="/usr/lib/sa/sa1" type=AVC msg=audit(1162920601.330:807): avc: denied { execute } for pid=20441 comm="sa1" name="sadc" dev=dm-0 ino=11981390 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=AVC msg=audit(1162920601.330:807): avc: denied { execute_no_trans } for pid=20441 comm="sa1" name="sadc" dev=dm-0 ino=11981390 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=AVC msg=audit(1162920601.330:807): avc: denied { read } for pid=20441 comm="sa1" name="sadc" dev=dm-0 ino=11981390 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162920601.330:807): arch=40000003 syscall=11 success=yes exit=0 a0=99c1d48 a1=99c1740 a2=99c1d60 a3=99c1740 items=0 ppid=20440 pid=20441 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162920601.330:807): path="/usr/lib/sa/sadc" type=AVC_PATH msg=audit(1162920601.330:807): path="/usr/lib/sa/sadc" type=AVC msg=audit(1162920601.330:808): avc: denied { search } for pid=20441 comm="sadc" name="net" dev=proc ino=-268435432 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=dir type=AVC msg=audit(1162920601.330:808): avc: denied { read } for pid=20441 comm="sadc" name="dev" dev=proc ino=-268435159 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=file type=SYSCALL msg=audit(1162920601.330:808): arch=40000003 syscall=5 success=yes exit=3 a0=8050371 a1=0 a2=1b6 a3=991c800 items=0 ppid=20440 pid=20441 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162920601.334:809): avc: denied { getattr } for pid=20441 comm="sadc" name="dev" dev=proc ino=-268435159 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=file type=SYSCALL msg=audit(1162920601.334:809): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bf913238 a2=239ff4 a3=991c800 items=0 ppid=20440 pid=20441 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162920601.334:809): path="/proc/net/dev" type=AVC msg=audit(1162920601.334:810): avc: denied { search } for pid=20441 comm="sadc" name="sa" dev=dm-0 ino=14607631 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=dir type=SYSCALL msg=audit(1162920601.334:810): arch=40000003 syscall=33 success=yes exit=0 a0=bf9135e4 a1=0 a2=bf9134d8 a3=bf9134e0 items=0 ppid=20440 pid=20441 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162920601.334:811): avc: denied { read append } for pid=20441 comm="sadc" name="sa07" dev=dm-0 ino=14600351 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=file type=SYSCALL msg=audit(1162920601.334:811): arch=40000003 syscall=5 success=yes exit=3 a0=bf9135e4 a1=402 a2=bf9137a8 a3=bf9134e0 items=0 ppid=20440 pid=20441 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162920601.334:812): avc: denied { search } for pid=20441 comm="sadc" name="fs" dev=proc ino=-268435428 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=dir type=SYSCALL msg=audit(1162920601.334:812): arch=40000003 syscall=5 success=yes exit=4 a0=805037f a1=0 a2=1b6 a3=991cd60 items=0 ppid=20440 pid=20441 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162920601.334:813): avc: denied { search } for pid=20441 comm="sadc" name="rpc" dev=proc ino=-268434552 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_rpc_t:s0 tclass=dir type=SYSCALL msg=audit(1162920601.334:813): arch=40000003 syscall=5 success=no exit=-2 a0=80502a5 a1=0 a2=1b6 a3=991cd60 items=0 ppid=20440 pid=20441 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162920601.334:814): avc: denied { lock } for pid=20441 comm="sadc" name="sa07" dev=dm-0 ino=14600351 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=file type=SYSCALL msg=audit(1162920601.334:814): arch=40000003 syscall=143 success=yes exit=0 a0=3 a1=6 a2=bf9134e0 a3=3 items=0 ppid=20440 pid=20441 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162920601.334:814): path="/var/log/sa/sa07" type=CRED_DISP msg=audit(1162920601.350:815): user pid=20440 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162920601.350:816): user pid=20440 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162920787.822:817): avc: denied { search } for pid=20497 comm="evolution" name="nscd" dev=dm-0 ino=14436932 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=system_u:object_r:nscd_var_run_t:s0 tclass=dir type=SYSCALL msg=audit(1162920787.822:817): arch=40000003 syscall=102 success=no exit=-2 a0=3 a1=b219efd8 a2=4c0ff4 a3=0 items=0 ppid=1 pid=20497 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC msg=audit(1162921052.278:818): avc: denied { search } for pid=20295 comm="firefox-bin" name="usbdev4.2_ep01" dev=sysfs ino=380744 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:sysfs_t:s0 tclass=dir type=SYSCALL msg=audit(1162921052.278:818): arch=40000003 syscall=91 success=yes exit=0 a0=b7fcc000 a1=1000 a2=7ea9ebc a3=9be1028 items=0 ppid=1 pid=20295 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162921060.375:819): avc: denied { read } for pid=20537 comm="nm-vpnc-auth-di" name=".gdmF70UIT" dev=dm-0 ino=14469320 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162921060.375:819): arch=40000003 syscall=33 success=yes exit=0 a0=bfd3ee46 a1=4 a2=de7a64 a3=bfd3ee46 items=0 ppid=3098 pid=20537 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="nm-vpnc-auth-di" exe="/usr/libexec/nm-vpnc-auth-dialog" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162921102.986:820): avc: denied { read } for pid=20574 comm="xchat" name="resolv.conf" dev=dm-0 ino=9334542 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:net_conf_t:s0 tclass=file type=SYSCALL msg=audit(1162921102.986:820): arch=40000003 syscall=5 success=yes exit=9 a0=432d13 a1=0 a2=1b6 a3=9a0fcf8 items=0 ppid=3203 pid=20574 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="xchat" exe="/usr/bin/xchat" subj=staff_u:staff_r:staff_t:s0 key=(null) type=USER_ACCT msg=audit(1162921201.420:821): user pid=20607 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162921201.424:822): login pid=20607 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162921201.424:823): user pid=20607 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162921201.424:824): user pid=20607 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162921201.424:825): avc: denied { execute } for pid=20608 comm="sh" name="sa1" dev=dm-0 ino=13061698 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:lib_t:s0 tclass=file type=AVC msg=audit(1162921201.424:825): avc: denied { execute_no_trans } for pid=20608 comm="sh" name="sa1" dev=dm-0 ino=13061698 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1162921201.424:825): arch=40000003 syscall=11 success=yes exit=0 a0=9d971b0 a1=9d97358 a2=9d97290 a3=9d97008 items=0 ppid=20607 pid=20608 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sa1" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162921201.424:825): path="/usr/lib/sa/sa1" type=AVC msg=audit(1162921201.428:826): avc: denied { execute } for pid=20608 comm="sa1" name="sadc" dev=dm-0 ino=11981390 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=AVC msg=audit(1162921201.428:826): avc: denied { execute_no_trans } for pid=20608 comm="sa1" name="sadc" dev=dm-0 ino=11981390 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=AVC msg=audit(1162921201.428:826): avc: denied { read } for pid=20608 comm="sa1" name="sadc" dev=dm-0 ino=11981390 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162921201.428:826): arch=40000003 syscall=11 success=yes exit=0 a0=8f92d48 a1=8f92740 a2=8f92d60 a3=8f92740 items=0 ppid=20607 pid=20608 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162921201.428:826): path="/usr/lib/sa/sadc" type=AVC_PATH msg=audit(1162921201.428:826): path="/usr/lib/sa/sadc" type=AVC msg=audit(1162921201.428:827): avc: denied { search } for pid=20608 comm="sadc" name="sa" dev=dm-0 ino=14607631 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=dir type=SYSCALL msg=audit(1162921201.428:827): arch=40000003 syscall=33 success=yes exit=0 a0=bfa8a764 a1=0 a2=bfa8a658 a3=bfa8a660 items=0 ppid=20607 pid=20608 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162921201.428:828): avc: denied { read append } for pid=20608 comm="sadc" name="sa07" dev=dm-0 ino=14600351 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=file type=SYSCALL msg=audit(1162921201.428:828): arch=40000003 syscall=5 success=yes exit=3 a0=bfa8a764 a1=402 a2=bfa8a928 a3=bfa8a660 items=0 ppid=20607 pid=20608 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162921201.428:829): avc: denied { search } for pid=20608 comm="sadc" name="fs" dev=proc ino=-268435428 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=dir type=AVC msg=audit(1162921201.428:829): avc: denied { read } for pid=20608 comm="sadc" name="dentry-state" dev=proc ino=-268435227 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=file type=SYSCALL msg=audit(1162921201.428:829): arch=40000003 syscall=5 success=yes exit=4 a0=805037f a1=0 a2=1b6 a3=8eeddf0 items=0 ppid=20607 pid=20608 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162921201.432:830): avc: denied { getattr } for pid=20608 comm="sadc" name="dentry-state" dev=proc ino=-268435227 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=file type=SYSCALL msg=audit(1162921201.432:830): arch=40000003 syscall=197 success=yes exit=0 a0=4 a1=bfa8a214 a2=239ff4 a3=8eeddf0 items=0 ppid=20607 pid=20608 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162921201.432:830): path="/proc/sys/fs/dentry-state" type=AVC msg=audit(1162921201.432:831): avc: denied { search } for pid=20608 comm="sadc" name="rpc" dev=proc ino=-268434552 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_rpc_t:s0 tclass=dir type=SYSCALL msg=audit(1162921201.432:831): arch=40000003 syscall=5 success=no exit=-2 a0=80502a5 a1=0 a2=1b6 a3=8eeddf0 items=0 ppid=20607 pid=20608 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162921201.432:832): avc: denied { lock } for pid=20608 comm="sadc" name="sa07" dev=dm-0 ino=14600351 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=file type=SYSCALL msg=audit(1162921201.432:832): arch=40000003 syscall=143 success=yes exit=0 a0=3 a1=6 a2=bfa8a660 a3=3 items=0 ppid=20607 pid=20608 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162921201.432:832): path="/var/log/sa/sa07" type=CRED_DISP msg=audit(1162921201.444:833): user pid=20607 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162921201.444:834): user pid=20607 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162921791.973:835): avc: denied { execmem } for pid=20631 comm="gnome-screensav" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=process type=SYSCALL msg=audit(1162921791.973:835): arch=40000003 syscall=192 success=yes exit=133574656 a0=7f63000 a1=1a000 a2=7 a3=812 items=0 ppid=3158 pid=20631 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-screensav" exe="/usr/libexec/gnome-screensaver-gl-helper" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162921791.973:836): avc: denied { execstack } for pid=20631 comm="gnome-screensav" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=process type=SYSCALL msg=audit(1162921791.973:836): arch=40000003 syscall=125 success=yes exit=0 a0=bffc3000 a1=1000 a2=1000007 a3=fffff000 items=0 ppid=3158 pid=20631 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-screensav" exe="/usr/libexec/gnome-screensaver-gl-helper" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162921792.041:837): avc: denied { execute } for pid=20631 comm="gnome-screensav" name="zero" dev=tmpfs ino=1524 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:zero_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1162921792.041:837): arch=40000003 syscall=192 success=yes exit=10104832 a0=0 a1=2000 a2=7 a3=2 items=0 ppid=3158 pid=20631 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-screensav" exe="/usr/libexec/gnome-screensaver-gl-helper" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1162921792.041:837): path="/dev/zero" type=USER_ACCT msg=audit(1162921801.505:838): user pid=20632 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162921801.505:839): login pid=20632 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162921801.505:840): user pid=20632 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162921801.505:841): user pid=20632 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162921801.517:842): user pid=20632 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162921801.521:843): user pid=20632 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162922401.579:844): user pid=20655 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162922401.583:845): login pid=20655 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162922401.583:846): user pid=20655 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162922401.583:847): user pid=20655 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162922401.595:848): user pid=20655 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162922401.595:849): user pid=20655 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162922461.602:850): user pid=20659 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162922461.602:851): login pid=20659 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162922461.606:852): user pid=20659 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162922461.606:853): user pid=20659 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162922461.610:854): avc: denied { getattr } for pid=20660 comm="bash" name="run-parts" dev=dm-0 ino=10331890 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1162922461.610:854): arch=40000003 syscall=195 success=yes exit=0 a0=8881120 a1=bfd71e30 a2=239ff4 a3=8881120 items=0 ppid=20659 pid=20660 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="bash" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162922461.610:854): path="/usr/bin/run-parts" type=AVC msg=audit(1162922461.610:855): avc: denied { execute } for pid=20660 comm="bash" name="run-parts" dev=dm-0 ino=10331890 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1162922461.610:855): arch=40000003 syscall=33 success=yes exit=0 a0=8881120 a1=1 a2=11 a3=8881120 items=0 ppid=20659 pid=20660 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="bash" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162922461.610:856): avc: denied { read } for pid=20660 comm="bash" name="run-parts" dev=dm-0 ino=10331890 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1162922461.610:856): arch=40000003 syscall=33 success=yes exit=0 a0=8881120 a1=4 a2=ffffffff a3=8881120 items=0 ppid=20659 pid=20660 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="bash" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162922461.610:857): avc: denied { execute_no_trans } for pid=20660 comm="bash" name="run-parts" dev=dm-0 ino=10331890 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1162922461.610:857): arch=40000003 syscall=11 success=yes exit=0 a0=8881120 a1=88813d8 a2=88812f8 a3=8880f98 items=0 ppid=20659 pid=20660 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="run-parts" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162922461.610:857): path="/usr/bin/run-parts" type=AVC msg=audit(1162922461.610:858): avc: denied { ioctl } for pid=20660 comm="run-parts" name="run-parts" dev=dm-0 ino=10331890 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1162922461.610:858): arch=40000003 syscall=54 success=no exit=-25 a0=3 a1=5401 a2=bfe32118 a3=bfe32158 items=0 ppid=20659 pid=20660 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="run-parts" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162922461.610:858): path="/usr/bin/run-parts" type=AVC msg=audit(1162922461.610:859): avc: denied { execute } for pid=20660 comm="run-parts" name="inn-cron-nntpsend" dev=dm-0 ino=9331477 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1162922461.610:859): arch=40000003 syscall=33 success=yes exit=0 a0=9947990 a1=1 a2=1 a3=9947c98 items=0 ppid=20659 pid=20660 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="run-parts" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162922461.610:860): avc: denied { execute_no_trans } for pid=20661 comm="run-parts" name="inn-cron-nntpsend" dev=dm-0 ino=9331477 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1162922461.610:860): arch=40000003 syscall=11 success=yes exit=0 a0=9947a10 a1=9947ad8 a2=9947ae8 a3=9947758 items=0 ppid=20660 pid=20661 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="inn-cron-nntpse" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162922461.610:860): path="/etc/cron.hourly/inn-cron-nntpsend" type=AVC msg=audit(1162922461.614:861): avc: denied { execute } for pid=20662 comm="inn-cron-nntpse" name="chkconfig" dev=dm-0 ino=9984740 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sbin_t:s0 tclass=file type=AVC msg=audit(1162922461.614:861): avc: denied { execute_no_trans } for pid=20662 comm="inn-cron-nntpse" name="chkconfig" dev=dm-0 ino=9984740 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sbin_t:s0 tclass=file type=AVC msg=audit(1162922461.614:861): avc: denied { read } for pid=20662 comm="inn-cron-nntpse" name="chkconfig" dev=dm-0 ino=9984740 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sbin_t:s0 tclass=file type=SYSCALL msg=audit(1162922461.614:861): arch=40000003 syscall=11 success=yes exit=0 a0=946e678 a1=946e808 a2=946e720 a3=946e508 items=0 ppid=20661 pid=20662 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="chkconfig" exe="/sbin/chkconfig" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162922461.614:861): path="/sbin/chkconfig" type=AVC_PATH msg=audit(1162922461.614:861): path="/sbin/chkconfig" type=AVC msg=audit(1162922461.614:862): avc: denied { read } for pid=20662 comm="chkconfig" name="innd" dev=dm-0 ino=9331492 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162922461.614:862): arch=40000003 syscall=5 success=yes exit=3 a0=bf918be0 a1=0 a2=ffffffff a3=824f038 items=0 ppid=20661 pid=20662 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="chkconfig" exe="/sbin/chkconfig" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162922461.614:863): avc: denied { getattr } for pid=20662 comm="chkconfig" name="innd" dev=dm-0 ino=9331492 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162922461.614:863): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bf918b50 a2=239ff4 a3=3 items=0 ppid=20661 pid=20662 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="chkconfig" exe="/sbin/chkconfig" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162922461.614:863): path="/etc/rc.d/init.d/innd" type=CRED_DISP msg=audit(1162922461.626:864): user pid=20659 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162922461.626:865): user pid=20659 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162923001.688:866): user pid=20720 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162923001.688:867): login pid=20720 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162923001.688:868): user pid=20720 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162923001.688:869): user pid=20720 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162923001.704:870): user pid=20720 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162923001.704:871): user pid=20720 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162923595.241:872): avc: denied { execute } for pid=20743 comm="gnome-screensav" name="zero" dev=tmpfs ino=1524 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:zero_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1162923595.241:872): arch=40000003 syscall=192 success=yes exit=4689920 a0=0 a1=2000 a2=7 a3=2 items=0 ppid=3158 pid=20743 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-screensav" exe="/usr/libexec/gnome-screensaver-gl-helper" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1162923595.241:872): path="/dev/zero" type=USER_ACCT msg=audit(1162923601.770:873): user pid=20744 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162923601.770:874): login pid=20744 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162923601.770:875): user pid=20744 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162923601.770:876): user pid=20744 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162923601.778:877): user pid=20744 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162923601.778:878): user pid=20744 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162924201.839:879): user pid=20771 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162924201.839:880): login pid=20771 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162924201.839:881): user pid=20771 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162924201.839:882): user pid=20771 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162924201.855:883): user pid=20771 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162924201.855:884): user pid=20771 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162924801.917:885): user pid=20796 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162924801.917:886): login pid=20796 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162924801.917:887): user pid=20796 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162924801.917:888): user pid=20796 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162924801.933:889): user pid=20796 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162924801.933:890): user pid=20796 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162925401.990:891): user pid=20821 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162925401.990:892): login pid=20821 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162925401.990:893): user pid=20821 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162925401.990:894): user pid=20821 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162925402.002:895): user pid=20821 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162925402.002:896): user pid=20821 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162926001.064:897): user pid=20846 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162926001.064:898): login pid=20846 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162926001.064:899): user pid=20846 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162926001.064:900): user pid=20846 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162926001.080:901): user pid=20846 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162926001.080:902): user pid=20846 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162926061.087:903): user pid=20850 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162926061.087:904): login pid=20850 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162926061.087:905): user pid=20850 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162926061.087:906): user pid=20850 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162926061.103:907): user pid=20850 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162926061.107:908): user pid=20850 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162926601.157:909): user pid=20879 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162926601.157:910): login pid=20879 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162926601.157:911): user pid=20879 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162926601.161:912): user pid=20879 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162926601.173:913): user pid=20879 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162926601.173:914): user pid=20879 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162927201.247:915): user pid=20903 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162927201.247:916): login pid=20903 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162927201.247:917): user pid=20903 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162927201.247:918): user pid=20903 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162927201.263:919): user pid=20903 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162927201.263:920): user pid=20903 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162927801.324:921): user pid=20930 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162927801.328:922): login pid=20930 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162927801.328:923): user pid=20930 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162927801.328:924): user pid=20930 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162927801.340:925): user pid=20930 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162927801.340:926): user pid=20930 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162928401.410:927): user pid=20953 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162928401.410:928): login pid=20953 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162928401.410:929): user pid=20953 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162928401.410:930): user pid=20953 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162928401.426:931): user pid=20953 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162928401.426:932): user pid=20953 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162929001.487:933): user pid=20976 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162929001.487:934): login pid=20976 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162929001.487:935): user pid=20976 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162929001.487:936): user pid=20976 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162929001.495:937): user pid=20976 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162929001.495:938): user pid=20976 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162929601.561:939): user pid=21000 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162929601.561:940): login pid=21000 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162929601.561:941): user pid=21000 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162929601.561:942): user pid=21000 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162929601.577:943): user pid=21000 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162929601.577:944): user pid=21000 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162929661.588:945): user pid=21004 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162929661.588:946): login pid=21004 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162929661.588:947): user pid=21004 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162929661.588:948): user pid=21004 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162929661.608:949): user pid=21004 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162929661.608:950): user pid=21004 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162930201.670:951): user pid=21033 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162930201.670:952): login pid=21033 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162930201.670:953): user pid=21033 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162930201.670:954): user pid=21033 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162930201.686:955): user pid=21033 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162930201.686:956): user pid=21033 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162930801.744:957): user pid=21056 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162930801.744:958): login pid=21056 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162930801.744:959): user pid=21056 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162930801.744:960): user pid=21056 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162930801.760:961): user pid=21056 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162930801.760:962): user pid=21056 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162931401.825:963): user pid=21081 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162931401.825:964): login pid=21081 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162931401.825:965): user pid=21081 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162931401.825:966): user pid=21081 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162931401.841:967): user pid=21081 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162931401.841:968): user pid=21081 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162932001.895:969): user pid=21104 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162932001.895:970): login pid=21104 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162932001.899:971): user pid=21104 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162932001.899:972): user pid=21104 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162932001.911:973): user pid=21104 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162932001.911:974): user pid=21104 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162932601.984:975): user pid=21129 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162932601.984:976): login pid=21129 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162932601.984:977): user pid=21129 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162932601.984:978): user pid=21129 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162932602.000:979): user pid=21129 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162932602.000:980): user pid=21129 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162933201.062:981): user pid=21152 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162933201.066:982): login pid=21152 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162933201.066:983): user pid=21152 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162933201.066:984): user pid=21152 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162933201.078:985): user pid=21152 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162933201.078:986): user pid=21152 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162933261.085:987): user pid=21156 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162933261.085:988): login pid=21156 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162933261.085:989): user pid=21156 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162933261.085:990): user pid=21156 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162933261.105:991): user pid=21156 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162933261.105:992): user pid=21156 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162933801.167:993): user pid=21184 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162933801.167:994): login pid=21184 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162933801.167:995): user pid=21184 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162933801.167:996): user pid=21184 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162933801.183:997): user pid=21184 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162933801.183:998): user pid=21184 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162934401.249:999): user pid=21210 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162934401.249:1000): login pid=21210 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162934401.249:1001): user pid=21210 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162934401.249:1002): user pid=21210 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162934401.285:1003): user pid=21210 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162934401.285:1004): user pid=21210 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162935001.354:1005): user pid=21237 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162935001.354:1006): login pid=21237 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162935001.354:1007): user pid=21237 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162935001.354:1008): user pid=21237 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162935001.370:1009): user pid=21237 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162935001.370:1010): user pid=21237 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162935601.440:1011): user pid=21260 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162935601.440:1012): login pid=21260 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162935601.440:1013): user pid=21260 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162935601.440:1014): user pid=21260 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162935601.456:1015): user pid=21260 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162935601.456:1016): user pid=21260 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162936201.517:1017): user pid=21285 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162936201.517:1018): login pid=21285 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162936201.517:1019): user pid=21285 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162936201.517:1020): user pid=21285 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162936201.533:1021): user pid=21285 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162936201.533:1022): user pid=21285 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162936801.603:1023): user pid=21308 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162936801.603:1024): login pid=21308 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162936801.603:1025): user pid=21308 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162936801.603:1026): user pid=21308 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162936801.619:1027): user pid=21308 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162936801.619:1028): user pid=21308 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162936861.626:1029): user pid=21312 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162936861.626:1030): login pid=21312 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162936861.626:1031): user pid=21312 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162936861.626:1032): user pid=21312 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162936861.646:1033): user pid=21312 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162936861.646:1034): user pid=21312 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162937184.851:1035): avc: denied { read } for pid=21353 comm="mozilla-xremote" name=".gdmF70UIT" dev=dm-0 ino=14469320 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162937184.851:1035): arch=40000003 syscall=33 success=yes exit=0 a0=bfa81f92 a1=4 a2=de7a64 a3=bfa81f92 items=0 ppid=21352 pid=21353 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="mozilla-xremote" exe="/usr/lib/firefox-2.0/mozilla-xremote-client" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC msg=audit(1162937184.851:1036): avc: denied { getattr } for pid=21353 comm="mozilla-xremote" name=".gdmF70UIT" dev=dm-0 ino=14469320 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162937184.851:1036): arch=40000003 syscall=197 success=yes exit=0 a0=4 a1=bfa80acc a2=239ff4 a3=817bab0 items=0 ppid=21352 pid=21353 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="mozilla-xremote" exe="/usr/lib/firefox-2.0/mozilla-xremote-client" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC_PATH msg=audit(1162937184.851:1036): path="/tmp/.gdmF70UIT" type=AVC msg=audit(1162937184.879:1037): avc: denied { execute } for pid=21350 comm="firefox" name="firefox-bin" dev=dm-0 ino=13552825 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=system_u:object_r:mozilla_exec_t:s0 tclass=file type=AVC msg=audit(1162937184.879:1037): avc: denied { execute_no_trans } for pid=21350 comm="firefox" name="firefox-bin" dev=dm-0 ino=13552825 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=system_u:object_r:mozilla_exec_t:s0 tclass=file type=AVC msg=audit(1162937184.879:1037): avc: denied { read } for pid=21350 comm="firefox" name="firefox-bin" dev=dm-0 ino=13552825 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=system_u:object_r:mozilla_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162937184.879:1037): arch=40000003 syscall=11 success=yes exit=0 a0=881f8b8 a1=8821920 a2=8822118 a3=8821920 items=0 ppid=1 pid=21350 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC_PATH msg=audit(1162937184.879:1037): path="/usr/lib/firefox-2.0/firefox-bin" type=AVC_PATH msg=audit(1162937184.879:1037): path="/usr/lib/firefox-2.0/firefox-bin" type=AVC msg=audit(1162937184.891:1038): avc: denied { getattr } for pid=21350 comm="firefox-bin" name="firefox-bin" dev=dm-0 ino=13552825 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=system_u:object_r:mozilla_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162937184.891:1038): arch=40000003 syscall=196 success=yes exit=0 a0=bfbce2f8 a1=bfbcddec a2=47aff4 a3=bfbcfa06 items=0 ppid=1 pid=21350 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC_PATH msg=audit(1162937184.891:1038): path="/usr/lib/firefox-2.0/firefox-bin" type=AVC msg=audit(1162937189.635:1039): avc: denied { read } for pid=21358 comm="firefox-bin" name=".gdmF70UIT" dev=dm-0 ino=14469320 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162937189.635:1039): arch=40000003 syscall=33 success=yes exit=0 a0=bf94cfcb a1=4 a2=de7a64 a3=bf94cfcb items=0 ppid=1 pid=21358 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162937189.635:1040): avc: denied { getattr } for pid=21358 comm="firefox-bin" name=".gdmF70UIT" dev=dm-0 ino=14469320 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162937189.635:1040): arch=40000003 syscall=197 success=yes exit=0 a0=4 a1=bf94acec a2=239ff4 a3=9838140 items=0 ppid=1 pid=21358 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162937189.635:1040): path="/tmp/.gdmF70UIT" type=AVC msg=audit(1162937312.079:1041): avc: denied { search } for pid=21414 comm="firefox-bin" name="nscd" dev=dm-0 ino=14436932 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=system_u:object_r:nscd_var_run_t:s0 tclass=dir type=SYSCALL msg=audit(1162937312.079:1041): arch=40000003 syscall=102 success=no exit=-2 a0=3 a1=bff6ccd8 a2=239ff4 a3=3 items=0 ppid=1 pid=21414 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC msg=audit(1162937330.052:1042): avc: denied { execute } for pid=21358 comm="firefox-bin" name="realplay" dev=dm-0 ino=12212539 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=file type=SYSCALL msg=audit(1162937330.052:1042): arch=40000003 syscall=33 success=yes exit=0 a0=a12f7fc a1=1 a2=76c0708 a3=8 items=0 ppid=1 pid=21358 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162937330.084:1043): avc: denied { write } for pid=21358 comm="firefox-bin" name="tmp" dev=dm-0 ino=14469313 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:tmp_t:s0 tclass=dir type=AVC msg=audit(1162937330.084:1043): avc: denied { add_name } for pid=21358 comm="firefox-bin" name="o1smfxjx" scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:tmp_t:s0 tclass=dir type=AVC msg=audit(1162937330.084:1043): avc: denied { create } for pid=21358 comm="firefox-bin" name="o1smfxjx" scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162937330.084:1043): arch=40000003 syscall=5 success=yes exit=39 a0=a1336b0 a1=82c1 a2=180 a3=82c1 items=0 ppid=1 pid=21358 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162937330.084:1044): avc: denied { write } for pid=21358 comm="firefox-bin" name="o1smfxjx" dev=dm-0 ino=14469397 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162937330.084:1044): arch=40000003 syscall=5 success=yes exit=39 a0=a1336b0 a1=8041 a2=180 a3=8041 items=0 ppid=1 pid=21358 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162937340.076:1045): avc: denied { getattr } for pid=21358 comm="firefox-bin" name="part3.ogg" dev=dm-0 ino=14469399 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162937340.076:1045): arch=40000003 syscall=195 success=yes exit=0 a0=9f14fc8 a1=bf949384 a2=239ff4 a3=3 items=0 ppid=1 pid=21358 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162937340.076:1045): path="/tmp/part3.ogg" type=AVC msg=audit(1162937340.076:1046): avc: denied { remove_name } for pid=21358 comm="firefox-bin" name="part3.ogg" dev=dm-0 ino=14469399 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:tmp_t:s0 tclass=dir type=AVC msg=audit(1162937340.076:1046): avc: denied { unlink } for pid=21358 comm="firefox-bin" name="part3.ogg" dev=dm-0 ino=14469399 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162937340.076:1046): arch=40000003 syscall=10 success=yes exit=0 a0=9f14fc8 a1=0 a2=6e44304 a3=0 items=0 ppid=1 pid=21358 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162937340.076:1047): avc: denied { rename } for pid=21358 comm="firefox-bin" name="o1smfxjx" dev=dm-0 ino=14469397 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162937340.076:1047): arch=40000003 syscall=38 success=yes exit=0 a0=a1336b0 a1=bf94944c a2=6e44304 a3=0 items=0 ppid=1 pid=21358 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162937340.080:1048): avc: denied { execute_no_trans } for pid=21437 comm="firefox-bin" name="realplay" dev=dm-0 ino=12212539 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=file type=SYSCALL msg=audit(1162937340.080:1048): arch=40000003 syscall=11 success=yes exit=0 a0=a5cadf8 a1=9fa1660 a2=9ac6e40 a3=0 items=0 ppid=21358 pid=21437 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="realplay" exe="/bin/bash" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162937340.080:1048): path="/usr/local/RealPlayer/realplay" type=AVC msg=audit(1162937340.632:1049): avc: denied { execmem } for pid=21442 comm="realplay.bin" scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_mozilla_t:s0 tclass=process type=SYSCALL msg=audit(1162937340.632:1049): arch=40000003 syscall=192 per=400000 success=yes exit=16302080 a0=0 a1=a01000 a2=7 a3=22 items=0 ppid=21437 pid=21442 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="realplay.bin" exe="/usr/local/RealPlayer/realplay.bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162937341.152:1050): avc: denied { search } for pid=21442 comm="realplay.bin" name="usbdev4.2_ep01" dev=sysfs ino=384384 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:sysfs_t:s0 tclass=dir type=SYSCALL msg=audit(1162937341.152:1050): arch=40000003 syscall=6 per=400000 success=yes exit=0 a0=1f a1=0 a2=3852ed4 a3=9478dd0 items=0 ppid=21437 pid=21442 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="realplay.bin" exe="/usr/local/RealPlayer/realplay.bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162937341.216:1051): avc: denied { read } for pid=21442 comm="realplay.bin" name="part3.ogg" dev=dm-0 ino=14469397 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162937341.216:1051): arch=40000003 syscall=5 per=400000 success=yes exit=31 a0=94a7f38 a1=0 a2=180 a3=94a8008 items=0 ppid=21437 pid=21442 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="realplay.bin" exe="/usr/local/RealPlayer/realplay.bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162937365.042:1052): avc: denied { search } for pid=21459 comm="gpg" name="home" dev=dm-0 ino=6547201 scontext=staff_u:staff_r:staff_gpg_t:s0 tcontext=system_u:object_r:home_root_t:s0 tclass=dir type=AVC msg=audit(1162937365.042:1052): avc: denied { search } for pid=21459 comm="gpg" name="kmacmill" dev=dm-0 ino=6547202 scontext=staff_u:staff_r:staff_gpg_t:s0 tcontext=staff_u:object_r:staff_home_dir_t:s0 tclass=dir type=SYSCALL msg=audit(1162937365.042:1052): arch=40000003 syscall=33 success=no exit=-2 a0=9c449f8 a1=4 a2=f19bbc a3=9c449c8 items=0 ppid=3575 pid=21459 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gpg" exe="/usr/bin/gpg" subj=staff_u:staff_r:staff_gpg_t:s0 key=(null) type=AVC msg=audit(1162937365.042:1053): avc: denied { search } for pid=21459 comm="gpg" name="tmp" dev=dm-0 ino=14469313 scontext=staff_u:staff_r:staff_gpg_t:s0 tcontext=system_u:object_r:tmp_t:s0 tclass=dir type=AVC msg=audit(1162937365.042:1053): avc: denied { read } for pid=21459 comm="gpg" name="evolution-pgp.X7ROIT" dev=dm-0 ino=14469397 scontext=staff_u:staff_r:staff_gpg_t:s0 tcontext=staff_u:object_r:staff_evolution_orbit_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162937365.042:1053): arch=40000003 syscall=5 success=yes exit=3 a0=bfbf0b1a a1=8000 a2=0 a3=8000 items=0 ppid=3575 pid=21459 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gpg" exe="/usr/bin/gpg" subj=staff_u:staff_r:staff_gpg_t:s0 key=(null) type=USER_ACCT msg=audit(1162937401.704:1054): user pid=21469 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162937401.704:1055): login pid=21469 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162937401.708:1056): user pid=21469 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162937401.708:1057): user pid=21469 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162937401.712:1058): avc: denied { search } for pid=21470 comm="sadc" name="net" dev=proc ino=-268435432 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=dir type=AVC msg=audit(1162937401.712:1058): avc: denied { read } for pid=21470 comm="sadc" name="dev" dev=proc ino=-268435159 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=file type=SYSCALL msg=audit(1162937401.712:1058): arch=40000003 syscall=5 success=yes exit=3 a0=8050371 a1=0 a2=1b6 a3=84b9800 items=0 ppid=21469 pid=21470 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162937401.712:1059): avc: denied { getattr } for pid=21470 comm="sadc" name="dev" dev=proc ino=-268435159 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=file type=SYSCALL msg=audit(1162937401.712:1059): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bf808138 a2=239ff4 a3=84b9800 items=0 ppid=21469 pid=21470 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162937401.712:1059): path="/proc/net/dev" type=CRED_DISP msg=audit(1162937401.720:1060): user pid=21469 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162937401.720:1061): user pid=21469 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162937572.283:1062): avc: denied { search } for pid=21498 comm="bug-buddy" name=".ICE-unix" dev=dm-0 ino=14567572 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=system_u:object_r:ice_tmp_t:s0 tclass=dir type=AVC msg=audit(1162937572.283:1062): avc: denied { write } for pid=21498 comm="bug-buddy" name="2965" dev=dm-0 ino=14567716 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=staff_u:object_r:ice_tmp_t:s0 tclass=sock_file type=SYSCALL msg=audit(1162937572.283:1062): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=bf969ec0 a2=39b770 a3=15 items=0 ppid=21497 pid=21498 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="bug-buddy" exe="/usr/bin/bug-buddy" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC msg=audit(1162937572.283:1063): avc: denied { read } for pid=21498 comm="bug-buddy" name=".ICEauthority" dev=dm-0 ino=6570930 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=staff_u:object_r:staff_iceauth_home_t:s0 tclass=file type=SYSCALL msg=audit(1162937572.283:1063): arch=40000003 syscall=33 success=yes exit=0 a0=89a4258 a1=4 a2=39b770 a3=89a4258 items=0 ppid=21497 pid=21498 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="bug-buddy" exe="/usr/bin/bug-buddy" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC msg=audit(1162937572.283:1064): avc: denied { getattr } for pid=21498 comm="bug-buddy" name=".ICEauthority" dev=dm-0 ino=6570930 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=staff_u:object_r:staff_iceauth_home_t:s0 tclass=file type=SYSCALL msg=audit(1162937572.283:1064): arch=40000003 syscall=197 success=yes exit=0 a0=29 a1=bf969f5c a2=2ddff4 a3=89a4b38 items=0 ppid=21497 pid=21498 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="bug-buddy" exe="/usr/bin/bug-buddy" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC_PATH msg=audit(1162937572.283:1064): path="/home/kmacmill/.ICEauthority" type=AVC msg=audit(1162937572.851:1065): avc: denied { getattr } for pid=21500 comm="gam_server" name="inotify" dev=inotifyfs ino=339 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=system_u:object_r:inotifyfs_t:s0 tclass=dir type=SYSCALL msg=audit(1162937572.851:1065): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bfa629ac a2=239ff4 a3=3 items=0 ppid=1 pid=21500 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gam_server" exe="/usr/libexec/gam_server" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC_PATH msg=audit(1162937572.851:1065): path="inotify" type=AVC msg=audit(1162937572.907:1066): avc: denied { getattr } for pid=21500 comm="gam_server" name="mtab" dev=dm-0 ino=9330919 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=system_u:object_r:etc_runtime_t:s0 tclass=file type=SYSCALL msg=audit(1162937572.907:1066): arch=40000003 syscall=195 success=yes exit=0 a0=805a6a8 a1=bfa62798 a2=239ff4 a3=8b018d8 items=0 ppid=1 pid=21500 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gam_server" exe="/usr/libexec/gam_server" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC_PATH msg=audit(1162937572.907:1066): path="/etc/mtab" type=AVC msg=audit(1162937572.907:1067): avc: denied { read } for pid=21500 comm="gam_server" name="mtab" dev=dm-0 ino=9330919 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=system_u:object_r:etc_runtime_t:s0 tclass=file type=SYSCALL msg=audit(1162937572.907:1067): arch=40000003 syscall=5 success=yes exit=8 a0=805a6a8 a1=8000 a2=0 a3=8000 items=0 ppid=1 pid=21500 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gam_server" exe="/usr/libexec/gam_server" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC msg=audit(1162937577.503:1068): avc: denied { read } for pid=21500 comm="gam_server" name="inotify" dev=inotifyfs ino=339 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=system_u:object_r:inotifyfs_t:s0 tclass=dir type=SYSCALL msg=audit(1162937577.503:1068): arch=40000003 syscall=3 success=yes exit=16 a0=3 a1=8b08678 a2=400 a3=400 items=0 ppid=1 pid=21500 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gam_server" exe="/usr/libexec/gam_server" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC_PATH msg=audit(1162937577.503:1068): path="inotify" type=AVC msg=audit(1162937581.079:1069): avc: denied { getattr } for pid=21498 comm="bug-buddy" name="/" dev=sysfs ino=1 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=system_u:object_r:sysfs_t:s0 tclass=dir type=SYSCALL msg=audit(1162937581.079:1069): arch=40000003 syscall=195 success=yes exit=0 a0=b79218 a1=bf96423c a2=2ddff4 a3=4 items=0 ppid=21497 pid=21498 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="bug-buddy" exe="/usr/bin/bug-buddy" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC_PATH msg=audit(1162937581.079:1069): path="/sys" type=AVC msg=audit(1162937581.375:1070): avc: denied { ptrace } for pid=21506 comm="gdb" scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=staff_u:staff_r:staff_evolution_t:s0 tclass=process type=SYSCALL msg=audit(1162937581.375:1070): arch=40000003 syscall=26 success=yes exit=0 a0=10 a1=df7 a2=0 a3=0 items=0 ppid=1 pid=21506 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gdb" exe="/usr/bin/gdb" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC msg=audit(1162937581.375:1071): avc: denied { sigstop } for pid=21507 comm="gdb" scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=staff_u:staff_r:staff_evolution_t:s0 tclass=process type=SYSCALL msg=audit(1162937581.375:1071): arch=40000003 syscall=37 success=yes exit=0 a0=5403 a1=13 a2=df7 a3=0 items=0 ppid=21506 pid=21507 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gdb" exe="/usr/bin/gdb" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC msg=audit(1162937591.840:1072): avc: denied { read } for pid=21529 comm="mozilla-xremote" name=".gdmF70UIT" dev=dm-0 ino=14469320 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162937591.840:1072): arch=40000003 syscall=33 success=yes exit=0 a0=bf879f92 a1=4 a2=de7a64 a3=bf879f92 items=0 ppid=21528 pid=21529 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="mozilla-xremote" exe="/usr/lib/firefox-2.0/mozilla-xremote-client" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162937591.864:1073): avc: denied { read } for pid=21526 comm="firefox-bin" name=".gdmF70UIT" dev=dm-0 ino=14469320 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162937591.864:1073): arch=40000003 syscall=33 success=yes exit=0 a0=bf944fcb a1=4 a2=de7a64 a3=bf944fcb items=0 ppid=1 pid=21526 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162937591.864:1074): avc: denied { getattr } for pid=21526 comm="firefox-bin" name=".gdmF70UIT" dev=dm-0 ino=14469320 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162937591.864:1074): arch=40000003 syscall=197 success=yes exit=0 a0=4 a1=bf942cdc a2=239ff4 a3=9186140 items=0 ppid=1 pid=21526 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162937591.864:1074): path="/tmp/.gdmF70UIT" type=USER_ACCT msg=audit(1162938001.790:1075): user pid=21555 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162938001.790:1076): login pid=21555 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162938001.790:1077): user pid=21555 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162938001.790:1078): user pid=21555 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162938001.794:1079): avc: denied { execute } for pid=21556 comm="sh" name="sa1" dev=dm-0 ino=13061698 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:lib_t:s0 tclass=file type=AVC msg=audit(1162938001.794:1079): avc: denied { execute_no_trans } for pid=21556 comm="sh" name="sa1" dev=dm-0 ino=13061698 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1162938001.794:1079): arch=40000003 syscall=11 success=yes exit=0 a0=9b301b0 a1=9b30358 a2=9b30290 a3=9b30008 items=0 ppid=21555 pid=21556 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sa1" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162938001.794:1079): path="/usr/lib/sa/sa1" type=AVC msg=audit(1162938001.798:1080): avc: denied { execute } for pid=21556 comm="sa1" name="sadc" dev=dm-0 ino=11981390 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=AVC msg=audit(1162938001.798:1080): avc: denied { execute_no_trans } for pid=21556 comm="sa1" name="sadc" dev=dm-0 ino=11981390 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=AVC msg=audit(1162938001.798:1080): avc: denied { read } for pid=21556 comm="sa1" name="sadc" dev=dm-0 ino=11981390 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162938001.798:1080): arch=40000003 syscall=11 success=yes exit=0 a0=9b30d48 a1=9b30740 a2=9b30d60 a3=9b30740 items=0 ppid=21555 pid=21556 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162938001.798:1080): path="/usr/lib/sa/sadc" type=AVC_PATH msg=audit(1162938001.798:1080): path="/usr/lib/sa/sadc" type=AVC msg=audit(1162938001.798:1081): avc: denied { search } for pid=21556 comm="sadc" name="sa" dev=dm-0 ino=14607631 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=dir type=SYSCALL msg=audit(1162938001.798:1081): arch=40000003 syscall=33 success=yes exit=0 a0=bf7fdcd4 a1=0 a2=bf7fdbc8 a3=bf7fdbd0 items=0 ppid=21555 pid=21556 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162938001.798:1082): avc: denied { read append } for pid=21556 comm="sadc" name="sa07" dev=dm-0 ino=14600351 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=file type=SYSCALL msg=audit(1162938001.798:1082): arch=40000003 syscall=5 success=yes exit=3 a0=bf7fdcd4 a1=402 a2=bf7fde98 a3=bf7fdbd0 items=0 ppid=21555 pid=21556 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162938001.798:1083): avc: denied { search } for pid=21556 comm="sadc" name="fs" dev=proc ino=-268435428 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=dir type=AVC msg=audit(1162938001.798:1083): avc: denied { read } for pid=21556 comm="sadc" name="dentry-state" dev=proc ino=-268435227 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=file type=SYSCALL msg=audit(1162938001.798:1083): arch=40000003 syscall=5 success=yes exit=4 a0=805037f a1=0 a2=1b6 a3=9201d60 items=0 ppid=21555 pid=21556 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162938001.798:1084): avc: denied { getattr } for pid=21556 comm="sadc" name="dentry-state" dev=proc ino=-268435227 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=file type=SYSCALL msg=audit(1162938001.798:1084): arch=40000003 syscall=197 success=yes exit=0 a0=4 a1=bf7fd784 a2=239ff4 a3=9201d60 items=0 ppid=21555 pid=21556 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162938001.798:1084): path="/proc/sys/fs/dentry-state" type=AVC msg=audit(1162938001.798:1085): avc: denied { search } for pid=21556 comm="sadc" name="rpc" dev=proc ino=-268434552 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_rpc_t:s0 tclass=dir type=SYSCALL msg=audit(1162938001.798:1085): arch=40000003 syscall=5 success=no exit=-2 a0=80502a5 a1=0 a2=1b6 a3=9201d60 items=0 ppid=21555 pid=21556 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162938001.802:1086): avc: denied { lock } for pid=21556 comm="sadc" name="sa07" dev=dm-0 ino=14600351 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=file type=SYSCALL msg=audit(1162938001.802:1086): arch=40000003 syscall=143 success=yes exit=0 a0=3 a1=6 a2=bf7fdbd0 a3=3 items=0 ppid=21555 pid=21556 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162938001.802:1086): path="/var/log/sa/sa07" type=CRED_DISP msg=audit(1162938001.810:1087): user pid=21555 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162938001.810:1088): user pid=21555 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162938205.102:1089): avc: denied { execmem } for pid=21563 comm="gnome-screensav" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=process type=SYSCALL msg=audit(1162938205.102:1089): arch=40000003 syscall=192 success=yes exit=133574656 a0=7f63000 a1=1a000 a2=7 a3=812 items=0 ppid=3158 pid=21563 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-screensav" exe="/usr/libexec/gnome-screensaver-gl-helper" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162938205.102:1090): avc: denied { execstack } for pid=21563 comm="gnome-screensav" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=process type=SYSCALL msg=audit(1162938205.102:1090): arch=40000003 syscall=125 success=yes exit=0 a0=bfe47000 a1=1000 a2=1000007 a3=fffff000 items=0 ppid=3158 pid=21563 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-screensav" exe="/usr/libexec/gnome-screensaver-gl-helper" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162938205.126:1091): avc: denied { execute } for pid=21563 comm="gnome-screensav" name="zero" dev=tmpfs ino=1524 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:zero_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1162938205.126:1091): arch=40000003 syscall=192 success=yes exit=10162176 a0=0 a1=2000 a2=7 a3=2 items=0 ppid=3158 pid=21563 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-screensav" exe="/usr/libexec/gnome-screensaver-gl-helper" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1162938205.126:1091): path="/dev/zero" type=USER_ACCT msg=audit(1162938601.875:1092): user pid=21576 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162938601.879:1093): login pid=21576 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162938601.879:1094): user pid=21576 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162938601.879:1095): user pid=21576 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162938601.891:1096): user pid=21576 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162938601.891:1097): user pid=21576 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162939201.961:1098): user pid=21594 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162939201.961:1099): login pid=21594 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162939201.961:1100): user pid=21594 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162939201.961:1101): user pid=21594 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162939201.977:1102): user pid=21594 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162939201.977:1103): user pid=21594 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162939801.046:1104): user pid=21612 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162939801.046:1105): login pid=21612 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162939801.046:1106): user pid=21612 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162939801.046:1107): user pid=21612 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162939801.058:1108): user pid=21612 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162939801.058:1109): user pid=21612 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162940401.128:1110): user pid=21630 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162940401.128:1111): login pid=21630 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162940401.128:1112): user pid=21630 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162940401.128:1113): user pid=21630 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162940401.148:1114): user pid=21630 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162940401.148:1115): user pid=21630 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162940461.159:1116): user pid=21634 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162940461.159:1117): login pid=21634 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162940461.159:1118): user pid=21634 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162940461.159:1119): user pid=21634 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162940461.163:1120): avc: denied { getattr } for pid=21635 comm="bash" name="run-parts" dev=dm-0 ino=10331890 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1162940461.163:1120): arch=40000003 syscall=195 success=yes exit=0 a0=9ed2120 a1=bfe57f10 a2=239ff4 a3=9ed2120 items=0 ppid=21634 pid=21635 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="bash" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162940461.163:1120): path="/usr/bin/run-parts" type=AVC msg=audit(1162940461.163:1121): avc: denied { execute } for pid=21635 comm="bash" name="run-parts" dev=dm-0 ino=10331890 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1162940461.163:1121): arch=40000003 syscall=33 success=yes exit=0 a0=9ed2120 a1=1 a2=11 a3=9ed2120 items=0 ppid=21634 pid=21635 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="bash" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162940461.163:1122): avc: denied { read } for pid=21635 comm="bash" name="run-parts" dev=dm-0 ino=10331890 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1162940461.163:1122): arch=40000003 syscall=33 success=yes exit=0 a0=9ed2120 a1=4 a2=ffffffff a3=9ed2120 items=0 ppid=21634 pid=21635 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="bash" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162940461.163:1123): avc: denied { execute_no_trans } for pid=21635 comm="bash" name="run-parts" dev=dm-0 ino=10331890 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1162940461.163:1123): arch=40000003 syscall=11 success=yes exit=0 a0=9ed2120 a1=9ed23d8 a2=9ed22f8 a3=9ed1f98 items=0 ppid=21634 pid=21635 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="run-parts" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162940461.163:1123): path="/usr/bin/run-parts" type=AVC msg=audit(1162940461.167:1124): avc: denied { ioctl } for pid=21635 comm="run-parts" name="run-parts" dev=dm-0 ino=10331890 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1162940461.167:1124): arch=40000003 syscall=54 success=no exit=-25 a0=3 a1=5401 a2=bfd36818 a3=bfd36858 items=0 ppid=21634 pid=21635 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="run-parts" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162940461.167:1124): path="/usr/bin/run-parts" type=AVC msg=audit(1162940461.167:1125): avc: denied { execute } for pid=21635 comm="run-parts" name="inn-cron-nntpsend" dev=dm-0 ino=9331477 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1162940461.167:1125): arch=40000003 syscall=33 success=yes exit=0 a0=93c6990 a1=1 a2=1 a3=93c6c98 items=0 ppid=21634 pid=21635 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="run-parts" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162940461.167:1126): avc: denied { execute_no_trans } for pid=21636 comm="run-parts" name="inn-cron-nntpsend" dev=dm-0 ino=9331477 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1162940461.167:1126): arch=40000003 syscall=11 success=yes exit=0 a0=93c6a10 a1=93c6ad8 a2=93c6ae8 a3=93c6758 items=0 ppid=21635 pid=21636 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="inn-cron-nntpse" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162940461.167:1126): path="/etc/cron.hourly/inn-cron-nntpsend" type=AVC msg=audit(1162940461.171:1127): avc: denied { read } for pid=21637 comm="chkconfig" name="innd" dev=dm-0 ino=9331492 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162940461.171:1127): arch=40000003 syscall=5 success=yes exit=3 a0=bfb45610 a1=0 a2=ffffffff a3=9338038 items=0 ppid=21636 pid=21637 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="chkconfig" exe="/sbin/chkconfig" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162940461.171:1128): avc: denied { getattr } for pid=21637 comm="chkconfig" name="innd" dev=dm-0 ino=9331492 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162940461.171:1128): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bfb45580 a2=239ff4 a3=3 items=0 ppid=21636 pid=21637 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="chkconfig" exe="/sbin/chkconfig" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162940461.171:1128): path="/etc/rc.d/init.d/innd" type=CRED_DISP msg=audit(1162940461.183:1129): user pid=21634 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162940461.183:1130): user pid=21634 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162941001.245:1131): user pid=21658 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162941001.245:1132): login pid=21658 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162941001.245:1133): user pid=21658 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162941001.245:1134): user pid=21658 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162941001.257:1135): user pid=21658 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162941001.261:1136): user pid=21658 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162941601.315:1137): user pid=21676 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162941601.315:1138): login pid=21676 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162941601.319:1139): user pid=21676 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162941601.319:1140): user pid=21676 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162941601.351:1141): user pid=21676 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162941601.351:1142): user pid=21676 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162942201.420:1143): user pid=21701 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162942201.420:1144): login pid=21701 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162942201.420:1145): user pid=21701 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162942201.420:1146): user pid=21701 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162942201.432:1147): user pid=21701 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162942201.432:1148): user pid=21701 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162942801.490:1149): user pid=21719 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162942801.490:1150): login pid=21719 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162942801.494:1151): user pid=21719 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162942801.494:1152): user pid=21719 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162942801.502:1153): user pid=21719 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162942801.502:1154): user pid=21719 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162943401.563:1155): user pid=21737 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162943401.563:1156): login pid=21737 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162943401.563:1157): user pid=21737 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162943401.563:1158): user pid=21737 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162943401.579:1159): user pid=21737 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162943401.579:1160): user pid=21737 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162944001.633:1161): user pid=21755 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162944001.637:1162): login pid=21755 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162944001.637:1163): user pid=21755 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162944001.637:1164): user pid=21755 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162944001.649:1165): user pid=21755 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162944001.649:1166): user pid=21755 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162944061.656:1167): user pid=21759 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162944061.656:1168): login pid=21759 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162944061.660:1169): user pid=21759 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162944061.660:1170): user pid=21759 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162944061.676:1171): user pid=21759 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162944061.676:1172): user pid=21759 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162944601.734:1173): user pid=21783 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162944601.734:1174): login pid=21783 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162944601.734:1175): user pid=21783 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162944601.734:1176): user pid=21783 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162944601.750:1177): user pid=21783 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162944601.750:1178): user pid=21783 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162945201.816:1179): user pid=21801 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162945201.816:1180): login pid=21801 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162945201.816:1181): user pid=21801 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162945201.816:1182): user pid=21801 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162945201.828:1183): user pid=21801 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162945201.828:1184): user pid=21801 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162945801.889:1185): user pid=21821 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162945801.889:1186): login pid=21821 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162945801.889:1187): user pid=21821 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162945801.889:1188): user pid=21821 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162945801.905:1189): user pid=21821 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162945801.905:1190): user pid=21821 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162946401.967:1191): user pid=21839 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162946401.967:1192): login pid=21839 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162946401.967:1193): user pid=21839 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162946401.967:1194): user pid=21839 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162946401.983:1195): user pid=21839 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162946401.983:1196): user pid=21839 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162947001.036:1197): user pid=21857 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162947001.036:1198): login pid=21857 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162947001.036:1199): user pid=21857 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162947001.036:1200): user pid=21857 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162947001.048:1201): user pid=21857 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162947001.048:1202): user pid=21857 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162947601.118:1203): user pid=21875 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162947601.118:1204): login pid=21875 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162947601.118:1205): user pid=21875 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162947601.118:1206): user pid=21875 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162947601.130:1207): user pid=21875 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162947601.130:1208): user pid=21875 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162947661.141:1209): user pid=21879 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162947661.141:1210): login pid=21879 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162947661.141:1211): user pid=21879 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162947661.141:1212): user pid=21879 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162947661.161:1213): user pid=21879 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162947661.161:1214): user pid=21879 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162948201.211:1215): user pid=21903 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162948201.211:1216): login pid=21903 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162948201.215:1217): user pid=21903 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162948201.215:1218): user pid=21903 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162948201.231:1219): user pid=21903 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162948201.235:1220): user pid=21903 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162948801.293:1221): user pid=21921 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162948801.293:1222): login pid=21921 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162948801.293:1223): user pid=21921 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162948801.293:1224): user pid=21921 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162948801.305:1225): user pid=21921 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162948801.309:1226): user pid=21921 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162949401.366:1227): user pid=21941 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162949401.370:1228): login pid=21941 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162949401.370:1229): user pid=21941 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162949401.370:1230): user pid=21941 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162949401.382:1231): user pid=21941 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162949401.382:1232): user pid=21941 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162950001.444:1233): user pid=21959 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162950001.444:1234): login pid=21959 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162950001.444:1235): user pid=21959 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162950001.444:1236): user pid=21959 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162950001.460:1237): user pid=21959 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162950001.460:1238): user pid=21959 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162950601.525:1239): user pid=21977 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162950601.525:1240): login pid=21977 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162950601.525:1241): user pid=21977 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162950601.525:1242): user pid=21977 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162950601.537:1243): user pid=21977 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162950601.537:1244): user pid=21977 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162951201.599:1245): user pid=21995 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162951201.599:1246): login pid=21995 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162951201.599:1247): user pid=21995 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162951201.599:1248): user pid=21995 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162951201.615:1249): user pid=21995 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162951201.615:1250): user pid=21995 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162951261.626:1251): user pid=21999 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162951261.626:1252): login pid=21999 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162951261.626:1253): user pid=21999 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162951261.626:1254): user pid=21999 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162951261.646:1255): user pid=21999 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162951261.646:1256): user pid=21999 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162951801.708:1257): user pid=22023 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162951801.708:1258): login pid=22023 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162951801.708:1259): user pid=22023 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162951801.708:1260): user pid=22023 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162951801.720:1261): user pid=22023 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162951801.720:1262): user pid=22023 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162952401.782:1263): user pid=22041 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162952401.782:1264): login pid=22041 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162952401.782:1265): user pid=22041 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162952401.782:1266): user pid=22041 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162952401.794:1267): user pid=22041 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162952401.794:1268): user pid=22041 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162953001.863:1269): user pid=22061 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162953001.863:1270): login pid=22061 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162953001.863:1271): user pid=22061 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162953001.863:1272): user pid=22061 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162953001.875:1273): user pid=22061 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162953001.879:1274): user pid=22061 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162953601.933:1275): user pid=22079 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162953601.933:1276): login pid=22079 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162953601.937:1277): user pid=22079 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162953601.937:1278): user pid=22079 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162953601.949:1279): user pid=22079 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162953601.949:1280): user pid=22079 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162954201.014:1281): user pid=22097 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162954201.014:1282): login pid=22097 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162954201.014:1283): user pid=22097 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162954201.014:1284): user pid=22097 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162954201.026:1285): user pid=22097 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162954201.030:1286): user pid=22097 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162954801.092:1287): user pid=22115 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162954801.092:1288): login pid=22115 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162954801.092:1289): user pid=22115 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162954801.092:1290): user pid=22115 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162954801.104:1291): user pid=22115 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162954801.104:1292): user pid=22115 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162954861.111:1293): user pid=22119 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162954861.111:1294): login pid=22119 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162954861.115:1295): user pid=22119 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162954861.115:1296): user pid=22119 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162954861.131:1297): user pid=22119 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162954861.131:1298): user pid=22119 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162955401.189:1299): user pid=22143 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162955401.189:1300): login pid=22143 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162955401.189:1301): user pid=22143 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162955401.189:1302): user pid=22143 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162955401.205:1303): user pid=22143 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162955401.205:1304): user pid=22143 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162956001.267:1305): user pid=22162 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162956001.267:1306): login pid=22162 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162956001.267:1307): user pid=22162 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162956001.267:1308): user pid=22162 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162956001.279:1309): user pid=22162 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162956001.279:1310): user pid=22162 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162956601.348:1311): user pid=22182 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162956601.348:1312): login pid=22182 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162956601.348:1313): user pid=22182 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162956601.348:1314): user pid=22182 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162956601.364:1315): user pid=22182 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162956601.364:1316): user pid=22182 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162957201.438:1317): user pid=22200 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162957201.438:1318): login pid=22200 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162957201.438:1319): user pid=22200 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162957201.438:1320): user pid=22200 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162957201.450:1321): user pid=22200 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162957201.450:1322): user pid=22200 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162957801.511:1323): user pid=22218 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162957801.511:1324): login pid=22218 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162957801.511:1325): user pid=22218 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162957801.511:1326): user pid=22218 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162957801.527:1327): user pid=22218 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162957801.527:1328): user pid=22218 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162958401.597:1329): user pid=22236 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162958401.597:1330): login pid=22236 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162958401.597:1331): user pid=22236 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162958401.597:1332): user pid=22236 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162958401.609:1333): user pid=22236 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162958401.609:1334): user pid=22236 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162958461.620:1335): user pid=22239 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162958461.620:1336): login pid=22239 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162958461.620:1337): user pid=22239 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162958461.620:1338): user pid=22239 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162958461.636:1339): user pid=22239 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162958461.636:1340): user pid=22239 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162959001.690:1341): user pid=22264 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162959001.690:1342): login pid=22264 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162959001.694:1343): user pid=22264 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162959001.694:1344): user pid=22264 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162959001.706:1345): user pid=22264 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162959001.706:1346): user pid=22264 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162959601.776:1347): user pid=22282 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162959601.776:1348): login pid=22282 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162959601.776:1349): user pid=22282 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162959601.776:1350): user pid=22282 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162959601.788:1351): user pid=22282 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162959601.792:1352): user pid=22282 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162960201.853:1353): user pid=22302 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162960201.853:1354): login pid=22302 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162960201.853:1355): user pid=22302 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162960201.853:1356): user pid=22302 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162960201.865:1357): user pid=22302 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162960201.869:1358): user pid=22302 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162960801.927:1359): user pid=22320 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162960801.927:1360): login pid=22320 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162960801.927:1361): user pid=22320 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162960801.927:1362): user pid=22320 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162960801.971:1363): user pid=22320 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162960801.971:1364): user pid=22320 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162961401.040:1365): user pid=22338 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162961401.040:1366): login pid=22338 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162961401.040:1367): user pid=22338 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162961401.040:1368): user pid=22338 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162961401.052:1369): user pid=22338 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162961401.052:1370): user pid=22338 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162961581.067:1371): user pid=22344 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162961581.067:1372): login pid=22344 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162961581.067:1373): user pid=22344 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162961581.067:1374): user pid=22344 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162961581.115:1375): avc: denied { getattr } for pid=22345 comm="sa2" name="sa07" dev=dm-0 ino=14600351 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=file type=SYSCALL msg=audit(1162961581.115:1375): arch=40000003 syscall=195 success=yes exit=0 a0=93090b0 a1=bfe26d58 a2=239ff4 a3=9309080 items=0 ppid=22344 pid=22345 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sa2" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162961581.115:1375): path="/var/log/sa/sa07" type=AVC msg=audit(1162961581.115:1376): avc: denied { write } for pid=22347 comm="sa2" name="sa" dev=dm-0 ino=14607631 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=dir type=AVC msg=audit(1162961581.115:1376): avc: denied { add_name } for pid=22347 comm="sa2" name="sar07" scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=dir type=AVC msg=audit(1162961581.115:1376): avc: denied { create } for pid=22347 comm="sa2" name="sar07" scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=file type=SYSCALL msg=audit(1162961581.115:1376): arch=40000003 syscall=5 success=yes exit=3 a0=9307a00 a1=8241 a2=1b6 a3=8241 items=0 ppid=22345 pid=22347 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sa2" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162961581.199:1377): avc: denied { write } for pid=22347 comm="sar" name="sar07" dev=dm-0 ino=14600270 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=file type=SYSCALL msg=audit(1162961581.199:1377): arch=40000003 syscall=4 success=yes exit=0 a0=1 a1=8051aa5 a2=0 a3=0 items=0 ppid=22345 pid=22347 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sar" exe="/usr/bin/sar" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162961581.199:1377): path="/var/log/sa/sar07" type=AVC msg=audit(1162961581.307:1378): avc: denied { getattr } for pid=22348 comm="find" name="sa" dev=dm-0 ino=14607631 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=dir type=SYSCALL msg=audit(1162961581.307:1378): arch=40000003 syscall=196 success=yes exit=0 a0=bfcbff2b a1=bfcbe708 a2=239ff4 a3=bfcbff2b items=0 ppid=22345 pid=22348 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="find" exe="/usr/bin/find" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162961581.307:1378): path="/var/log/sa" type=AVC msg=audit(1162961581.311:1379): avc: denied { read } for pid=22348 comm="find" name="sa" dev=dm-0 ino=14607631 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=dir type=SYSCALL msg=audit(1162961581.311:1379): arch=40000003 syscall=5 success=yes exit=4 a0=bfcbff2b a1=18800 a2=bfcbe5b8 a3=ffffffff items=0 ppid=22345 pid=22348 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="find" exe="/usr/bin/find" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162961581.359:1380): avc: denied { remove_name } for pid=22349 comm="rm" name="sar29" dev=dm-0 ino=14600293 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=dir type=AVC msg=audit(1162961581.359:1380): avc: denied { unlink } for pid=22349 comm="rm" name="sar29" dev=dm-0 ino=14600293 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=file type=SYSCALL msg=audit(1162961581.359:1380): arch=40000003 syscall=10 success=yes exit=0 a0=bfa91f5b a1=0 a2=805277c a3=bfa91844 items=0 ppid=22348 pid=22349 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="rm" exe="/bin/rm" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=CRED_DISP msg=audit(1162961581.547:1381): user pid=22344 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162961581.547:1382): user pid=22344 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162962001.598:1383): user pid=22367 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162962001.598:1384): login pid=22367 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162962001.598:1385): user pid=22367 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162962001.602:1386): user pid=22367 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162962001.618:1387): user pid=22367 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162962001.618:1388): user pid=22367 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162962061.629:1389): user pid=22370 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162962061.629:1390): login pid=22370 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162962061.629:1391): user pid=22370 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162962061.629:1392): user pid=22370 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162962061.649:1393): user pid=22370 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162962061.649:1394): user pid=22370 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162962601.711:1395): user pid=22395 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162962601.711:1396): login pid=22395 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162962601.711:1397): user pid=22395 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162962601.711:1398): user pid=22395 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162962601.723:1399): user pid=22395 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162962601.723:1400): user pid=22395 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162963201.785:1401): user pid=22413 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162963201.785:1402): login pid=22413 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162963201.785:1403): user pid=22413 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162963201.785:1404): user pid=22413 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162963201.801:1405): user pid=22413 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162963201.801:1406): user pid=22413 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162963801.870:1407): user pid=22433 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162963801.870:1408): login pid=22433 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162963801.870:1409): user pid=22433 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162963801.870:1410): user pid=22433 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162963801.882:1411): user pid=22433 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162963801.882:1412): user pid=22433 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162964401.948:1413): user pid=22451 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162964401.948:1414): login pid=22451 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162964401.952:1415): user pid=22451 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162964401.952:1416): user pid=22451 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162964401.964:1417): user pid=22451 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162964401.964:1418): user pid=22451 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162965001.033:1419): user pid=22469 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162965001.033:1420): login pid=22469 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162965001.033:1421): user pid=22469 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162965001.033:1422): user pid=22469 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162965001.049:1423): user pid=22469 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162965001.049:1424): user pid=22469 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162965601.115:1425): user pid=22487 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162965601.115:1426): login pid=22487 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162965601.115:1427): user pid=22487 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162965601.115:1428): user pid=22487 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162965601.127:1429): user pid=22487 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162965601.127:1430): user pid=22487 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162965661.134:1431): user pid=22490 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162965661.134:1432): login pid=22490 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162965661.138:1433): user pid=22490 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162965661.138:1434): user pid=22490 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162965661.154:1435): user pid=22490 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162965661.154:1436): user pid=22490 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162966201.212:1437): user pid=22515 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162966201.212:1438): login pid=22515 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162966201.212:1439): user pid=22515 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162966201.216:1440): user pid=22515 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162966201.236:1441): user pid=22515 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162966201.236:1442): user pid=22515 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162966801.310:1443): user pid=22533 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162966801.310:1444): login pid=22533 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162966801.310:1445): user pid=22533 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162966801.310:1446): user pid=22533 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162966801.326:1447): user pid=22533 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162966801.326:1448): user pid=22533 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162967401.387:1449): user pid=22553 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162967401.387:1450): login pid=22553 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162967401.387:1451): user pid=22553 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162967401.387:1452): user pid=22553 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162967401.399:1453): user pid=22553 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162967401.399:1454): user pid=22553 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162968001.473:1455): user pid=22571 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162968001.473:1456): login pid=22571 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162968001.473:1457): user pid=22571 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162968001.473:1458): user pid=22571 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162968001.485:1459): user pid=22571 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162968001.485:1460): user pid=22571 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162968601.546:1461): user pid=22589 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162968601.546:1462): login pid=22589 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162968601.546:1463): user pid=22589 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162968601.546:1464): user pid=22589 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162968601.562:1465): user pid=22589 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162968601.562:1466): user pid=22589 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162969201.640:1467): user pid=22607 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162969201.640:1468): login pid=22607 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162969201.640:1469): user pid=22607 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162969201.640:1470): user pid=22607 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162969201.672:1471): user pid=22607 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162969201.672:1472): user pid=22607 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162969261.683:1473): user pid=22610 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162969261.683:1474): login pid=22610 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162969261.683:1475): user pid=22610 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162969261.683:1476): user pid=22610 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162969261.699:1477): user pid=22610 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162969261.703:1478): user pid=22610 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162969801.761:1479): user pid=22635 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162969801.765:1480): login pid=22635 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162969801.765:1481): user pid=22635 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162969801.765:1482): user pid=22635 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162969801.777:1483): user pid=22635 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162969801.777:1484): user pid=22635 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162970401.847:1485): user pid=22653 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162970401.847:1486): login pid=22653 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162970401.847:1487): user pid=22653 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162970401.847:1488): user pid=22653 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162970401.883:1489): user pid=22653 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162970401.883:1490): user pid=22653 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162971001.948:1491): user pid=22673 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162971001.948:1492): login pid=22673 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162971001.948:1493): user pid=22673 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162971001.948:1494): user pid=22673 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162971001.960:1495): user pid=22673 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162971001.960:1496): user pid=22673 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162971601.026:1497): user pid=22691 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162971601.026:1498): login pid=22691 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162971601.026:1499): user pid=22691 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162971601.026:1500): user pid=22691 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162971601.042:1501): user pid=22691 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162971601.042:1502): user pid=22691 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162972201.107:1503): user pid=22709 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162972201.107:1504): login pid=22709 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162972201.107:1505): user pid=22709 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162972201.107:1506): user pid=22709 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162972201.143:1507): user pid=22709 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162972201.143:1508): user pid=22709 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162972801.197:1509): user pid=22727 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162972801.197:1510): login pid=22727 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162972801.201:1511): user pid=22727 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162972801.201:1512): user pid=22727 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162972801.213:1513): user pid=22727 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162972801.213:1514): user pid=22727 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162972861.224:1515): user pid=22730 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162972861.224:1516): login pid=22730 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162972861.224:1517): user pid=22730 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162972861.228:1518): user pid=22730 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162972861.244:1519): user pid=22730 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162972861.248:1520): user pid=22730 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162973401.298:1521): user pid=22755 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162973401.298:1522): login pid=22755 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162973401.298:1523): user pid=22755 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162973401.298:1524): user pid=22755 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162973401.314:1525): user pid=22755 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162973401.314:1526): user pid=22755 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162974001.376:1527): user pid=22773 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162974001.376:1528): login pid=22773 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162974001.376:1529): user pid=22773 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162974001.380:1530): user pid=22773 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162974001.392:1531): user pid=22773 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162974001.392:1532): user pid=22773 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162974601.461:1533): user pid=22793 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162974601.461:1534): login pid=22793 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162974601.461:1535): user pid=22793 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162974601.461:1536): user pid=22793 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162974601.473:1537): user pid=22793 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162974601.473:1538): user pid=22793 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162975201.531:1539): user pid=22811 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162975201.531:1540): login pid=22811 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162975201.535:1541): user pid=22811 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162975201.535:1542): user pid=22811 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162975201.547:1543): user pid=22811 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162975201.547:1544): user pid=22811 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162975801.608:1545): user pid=22829 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162975801.608:1546): login pid=22829 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162975801.608:1547): user pid=22829 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162975801.608:1548): user pid=22829 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162975801.624:1549): user pid=22829 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162975801.624:1550): user pid=22829 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162976401.690:1551): user pid=22847 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162976401.690:1552): login pid=22847 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162976401.690:1553): user pid=22847 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162976401.690:1554): user pid=22847 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162976401.702:1555): user pid=22847 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162976401.702:1556): user pid=22847 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162976461.709:1557): user pid=22850 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162976461.709:1558): login pid=22850 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162976461.713:1559): user pid=22850 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162976461.713:1560): user pid=22850 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162976461.729:1561): user pid=22850 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162976461.729:1562): user pid=22850 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162976521.737:1563): user pid=22862 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162976521.737:1564): login pid=22862 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162976521.737:1565): user pid=22862 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162976521.737:1566): user pid=22862 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162976521.793:1567): avc: denied { getattr } for pid=22864 comm="0anacron" name="anacron" dev=dm-0 ino=10320623 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:anacron_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162976521.793:1567): arch=40000003 syscall=195 success=yes exit=0 a0=92ba8b0 a1=bf96f830 a2=2e7ff4 a3=92ba8b0 items=0 ppid=22863 pid=22864 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="0anacron" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976521.793:1567): path="/usr/sbin/anacron" type=AVC msg=audit(1162976521.793:1568): avc: denied { execute } for pid=22864 comm="0anacron" name="anacron" dev=dm-0 ino=10320623 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:anacron_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162976521.793:1568): arch=40000003 syscall=33 success=yes exit=0 a0=92ba8b0 a1=1 a2=11 a3=92ba8b0 items=0 ppid=22863 pid=22864 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="0anacron" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976521.793:1569): avc: denied { read } for pid=22864 comm="0anacron" name="anacron" dev=dm-0 ino=10320623 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:anacron_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162976521.793:1569): arch=40000003 syscall=33 success=yes exit=0 a0=92ba8b0 a1=4 a2=ffffffff a3=92ba8b0 items=0 ppid=22863 pid=22864 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="0anacron" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976521.793:1570): avc: denied { execute_no_trans } for pid=22866 comm="0anacron" name="anacron" dev=dm-0 ino=10320623 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:anacron_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162976521.793:1570): arch=40000003 syscall=11 success=yes exit=0 a0=92ba8b0 a1=92bac30 a2=92bab48 a3=92ba6e0 items=0 ppid=22864 pid=22866 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="anacron" exe="/usr/sbin/anacron" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976521.793:1570): path="/usr/sbin/anacron" type=AVC msg=audit(1162976521.809:1571): avc: denied { search } for pid=22866 comm="anacron" name="lock" dev=dm-0 ino=14436610 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_lock_t:s0 tclass=dir type=SYSCALL msg=audit(1162976521.809:1571): arch=40000003 syscall=10 success=no exit=-2 a0=804c93a a1=ffffffcc a2=bf916f04 a3=1 items=0 ppid=22864 pid=22866 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="anacron" exe="/usr/sbin/anacron" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976521.813:1572): avc: denied { write } for pid=22867 comm="anacron" name="subsys" dev=dm-0 ino=14436611 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_lock_t:s0 tclass=dir type=AVC msg=audit(1162976521.813:1572): avc: denied { add_name } for pid=22867 comm="anacron" name="anacron" scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_lock_t:s0 tclass=dir type=AVC msg=audit(1162976521.813:1572): avc: denied { create } for pid=22867 comm="anacron" name="anacron" scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_lock_t:s0 tclass=file type=SYSCALL msg=audit(1162976521.813:1572): arch=40000003 syscall=5 success=yes exit=3 a0=804c93a a1=c1 a2=180 a3=1 items=0 ppid=1 pid=22867 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="anacron" exe="/usr/sbin/anacron" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976521.833:1573): avc: denied { write } for pid=22867 comm="anacron" name="cron.daily" dev=dm-0 ino=14437389 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_spool_t:s0 tclass=file type=SYSCALL msg=audit(1162976521.833:1573): arch=40000003 syscall=5 success=yes exit=3 a0=92c2858 a1=42 a2=180 a3=92c2820 items=0 ppid=1 pid=22867 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="anacron" exe="/usr/sbin/anacron" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976521.833:1574): avc: denied { setattr } for pid=22867 comm="anacron" name="cron.daily" dev=dm-0 ino=14437389 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_spool_t:s0 tclass=file type=SYSCALL msg=audit(1162976521.833:1574): arch=40000003 syscall=207 success=yes exit=0 a0=3 a1=0 a2=0 a3=92c2820 items=0 ppid=1 pid=22867 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="anacron" exe="/usr/sbin/anacron" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976521.813:1575): avc: denied { getattr } for pid=22863 comm="run-parts" name="logwatch.pl" dev=dm-0 ino=10741010 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:logwatch_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162976521.813:1575): arch=40000003 syscall=195 success=yes exit=0 a0=94a18b0 a1=bf9d7bd8 a2=239ff4 a3=94a21e8 items=0 ppid=22862 pid=22863 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="run-parts" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976521.813:1575): path="/usr/share/logwatch/scripts/logwatch.pl" type=AVC msg=audit(1162976521.861:1576): avc: denied { execute } for pid=22863 comm="run-parts" name="logwatch.pl" dev=dm-0 ino=10741010 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:logwatch_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162976521.861:1576): arch=40000003 syscall=33 success=yes exit=0 a0=94a18b0 a1=1 a2=1 a3=94a1c88 items=0 ppid=22862 pid=22863 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="run-parts" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976521.861:1577): avc: denied { execute_no_trans } for pid=22868 comm="run-parts" name="logwatch.pl" dev=dm-0 ino=10741010 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:logwatch_exec_t:s0 tclass=file type=AVC msg=audit(1162976521.861:1577): avc: denied { read } for pid=22868 comm="run-parts" name="logwatch.pl" dev=dm-0 ino=10741010 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:logwatch_exec_t:s0 tclass=file type=AVC msg=audit(1162976521.865:1578): avc: denied { remove_name } for pid=22867 comm="anacron" name="anacron" dev=dm-0 ino=14437015 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_lock_t:s0 tclass=dir type=AVC msg=audit(1162976521.865:1578): avc: denied { unlink } for pid=22867 comm="anacron" name="anacron" dev=dm-0 ino=14437015 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_lock_t:s0 tclass=file type=SYSCALL msg=audit(1162976521.865:1578): arch=40000003 syscall=10 success=yes exit=0 a0=804c93a a1=23ac98 a2=239ff4 a3=1 items=0 ppid=1 pid=22867 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="anacron" exe="/usr/sbin/anacron" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=SYSCALL msg=audit(1162976521.861:1577): arch=40000003 syscall=11 success=yes exit=0 a0=94a18f0 a1=94a1f88 a2=94a2098 a3=94a1fc0 items=0 ppid=22863 pid=22868 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="0logwatch" exe="/usr/bin/perl" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976521.861:1577): path="/usr/share/logwatch/scripts/logwatch.pl" type=AVC_PATH msg=audit(1162976521.861:1577): path="/usr/share/logwatch/scripts/logwatch.pl" type=AVC msg=audit(1162976522.029:1579): avc: denied { ioctl } for pid=22868 comm="0logwatch" name="logwatch.pl" dev=dm-0 ino=10741010 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:logwatch_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162976522.029:1579): arch=40000003 syscall=54 success=no exit=-25 a0=3 a1=5401 a2=bfbd6da8 a3=bfbd6de8 items=0 ppid=22863 pid=22868 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="0logwatch" exe="/usr/bin/perl" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976522.029:1579): path="/usr/share/logwatch/scripts/logwatch.pl" type=AVC msg=audit(1162976522.821:1580): avc: denied { getattr } for pid=22868 comm="0logwatch" name="Logwatch.pm" dev=dm-0 ino=10740999 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:usr_t:s0 tclass=file type=SYSCALL msg=audit(1162976522.821:1580): arch=40000003 syscall=195 success=yes exit=0 a0=8a74a20 a1=bfbd694c a2=239ff4 a3=8a74a20 items=0 ppid=22863 pid=22868 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="0logwatch" exe="/usr/bin/perl" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976522.821:1580): path="/usr/share/logwatch/lib/Logwatch.pm" type=AVC msg=audit(1162976522.821:1581): avc: denied { read } for pid=22868 comm="0logwatch" name="Logwatch.pm" dev=dm-0 ino=10740999 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:usr_t:s0 tclass=file type=SYSCALL msg=audit(1162976522.821:1581): arch=40000003 syscall=5 success=yes exit=3 a0=8a756e8 a1=8000 a2=0 a3=8000 items=0 ppid=22863 pid=22868 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="0logwatch" exe="/usr/bin/perl" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976522.821:1582): avc: denied { ioctl } for pid=22868 comm="0logwatch" name="Logwatch.pm" dev=dm-0 ino=10740999 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:usr_t:s0 tclass=file type=SYSCALL msg=audit(1162976522.821:1582): arch=40000003 syscall=54 success=no exit=-25 a0=3 a1=5401 a2=bfbd6748 a3=bfbd6788 items=0 ppid=22863 pid=22868 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="0logwatch" exe="/usr/bin/perl" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976522.821:1582): path="/usr/share/logwatch/lib/Logwatch.pm" type=AVC msg=audit(1162976523.141:1583): avc: denied { read } for pid=22868 comm="0logwatch" name="httpd" dev=dm-0 ino=14436676 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:httpd_log_t:s0 tclass=dir type=SYSCALL msg=audit(1162976523.141:1583): arch=40000003 syscall=5 success=yes exit=3 a0=bfbcce78 a1=18800 a2=bfbccd3c a3=bfbd0f1c items=0 ppid=22863 pid=22868 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="0logwatch" exe="/usr/bin/perl" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976523.185:1584): avc: denied { getattr } for pid=22868 comm="0logwatch" name="httpd" dev=dm-0 ino=14436676 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:httpd_log_t:s0 tclass=dir type=SYSCALL msg=audit(1162976523.185:1584): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bfbccd3c a2=239ff4 a3=3 items=0 ppid=22863 pid=22868 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="0logwatch" exe="/usr/bin/perl" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976523.185:1584): path="/var/log/httpd" type=AVC msg=audit(1162976523.205:1585): avc: denied { search } for pid=22868 comm="0logwatch" name="httpd" dev=dm-0 ino=14436676 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:httpd_log_t:s0 tclass=dir type=AVC msg=audit(1162976523.205:1585): avc: denied { getattr } for pid=22868 comm="0logwatch" name="access_log" dev=dm-0 ino=14437011 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=user_u:object_r:httpd_log_t:s0 tclass=file type=SYSCALL msg=audit(1162976523.205:1585): arch=40000003 syscall=196 success=yes exit=0 a0=bfbcbd98 a1=bfbcad38 a2=239ff4 a3=bfbcad38 items=0 ppid=22863 pid=22868 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="0logwatch" exe="/usr/bin/perl" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976523.205:1585): path="/var/log/httpd/access_log" type=AVC msg=audit(1162976523.213:1586): avc: denied { getattr } for pid=22868 comm="0logwatch" name="maillog" dev=dm-0 ino=14438079 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file type=SYSCALL msg=audit(1162976523.213:1586): arch=40000003 syscall=196 success=yes exit=0 a0=bfbcde78 a1=bfbcce18 a2=239ff4 a3=bfbcce18 items=0 ppid=22863 pid=22868 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="0logwatch" exe="/usr/bin/perl" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976523.213:1586): path="/var/log/maillog" type=AVC msg=audit(1162976523.249:1587): avc: denied { read } for pid=22868 comm="0logwatch" name="samba" dev=dm-0 ino=14436668 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:samba_log_t:s0 tclass=dir type=SYSCALL msg=audit(1162976523.249:1587): arch=40000003 syscall=5 success=yes exit=3 a0=bfbcce78 a1=18800 a2=bfbccd3c a3=bfbd0f08 items=0 ppid=22863 pid=22868 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="0logwatch" exe="/usr/bin/perl" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976523.261:1588): avc: denied { getattr } for pid=22868 comm="0logwatch" name="samba" dev=dm-0 ino=14436668 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:samba_log_t:s0 tclass=dir type=SYSCALL msg=audit(1162976523.261:1588): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bfbccd3c a2=239ff4 a3=3 items=0 ppid=22863 pid=22868 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="0logwatch" exe="/usr/bin/perl" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976523.261:1588): path="/var/log/samba" type=AVC msg=audit(1162976523.265:1589): avc: denied { search } for pid=22868 comm="0logwatch" name="samba" dev=dm-0 ino=14436668 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:samba_log_t:s0 tclass=dir type=AVC msg=audit(1162976523.265:1589): avc: denied { getattr } for pid=22868 comm="0logwatch" name="smbd.log.3" dev=dm-0 ino=14437190 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:samba_log_t:s0 tclass=file type=SYSCALL msg=audit(1162976523.265:1589): arch=40000003 syscall=196 success=yes exit=0 a0=bfbcbd98 a1=bfbcad38 a2=239ff4 a3=bfbcad38 items=0 ppid=22863 pid=22868 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="0logwatch" exe="/usr/bin/perl" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976523.265:1589): path="/var/log/samba/smbd.log.3" type=AVC msg=audit(1162976523.317:1590): avc: denied { read } for pid=22868 comm="0logwatch" name="logwatch" dev=dm-0 ino=14437047 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:logwatch_cache_t:s0 tclass=dir type=SYSCALL msg=audit(1162976523.317:1590): arch=40000003 syscall=5 success=yes exit=3 a0=8a91338 a1=18800 a2=870006 a3=8a3ec70 items=0 ppid=22863 pid=22868 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="0logwatch" exe="/usr/bin/perl" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976523.317:1591): avc: denied { getattr } for pid=22868 comm="0logwatch" name="logwatch" dev=dm-0 ino=14437047 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:logwatch_cache_t:s0 tclass=dir type=SYSCALL msg=audit(1162976523.317:1591): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bfbd6fcc a2=239ff4 a3=3 items=0 ppid=22863 pid=22868 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="0logwatch" exe="/usr/bin/perl" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976523.317:1591): path="/var/cache/logwatch" type=AVC msg=audit(1162976523.337:1592): avc: denied { search } for pid=22868 comm="0logwatch" name="logwatch" dev=dm-0 ino=14437047 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:logwatch_cache_t:s0 tclass=dir type=AVC msg=audit(1162976523.337:1592): avc: denied { write } for pid=22868 comm="0logwatch" name="logwatch" dev=dm-0 ino=14437047 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:logwatch_cache_t:s0 tclass=dir type=AVC msg=audit(1162976523.337:1592): avc: denied { add_name } for pid=22868 comm="0logwatch" name="logwatch.ueRIpGof" scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:logwatch_cache_t:s0 tclass=dir type=AVC msg=audit(1162976523.337:1592): avc: denied { create } for pid=22868 comm="0logwatch" name="logwatch.ueRIpGof" scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:logwatch_cache_t:s0 tclass=dir type=SYSCALL msg=audit(1162976523.337:1592): arch=40000003 syscall=39 success=yes exit=0 a0=8ac9900 a1=1c0 a2=a095cc a3=8ac9900 items=0 ppid=22863 pid=22868 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="0logwatch" exe="/usr/bin/perl" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976523.557:1593): avc: denied { create } for pid=22881 comm="sh" name="maillog-archive" scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:logwatch_cache_t:s0 tclass=file type=SYSCALL msg=audit(1162976523.557:1593): arch=40000003 syscall=5 success=yes exit=3 a0=8320c48 a1=8441 a2=1b6 a3=8441 items=0 ppid=22880 pid=22881 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sh" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976523.557:1594): avc: denied { getattr } for pid=22881 comm="cat" name="maillog-archive" dev=dm-0 ino=14796674 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:logwatch_cache_t:s0 tclass=file type=SYSCALL msg=audit(1162976523.557:1594): arch=40000003 syscall=197 success=yes exit=0 a0=1 a1=bf9545a4 a2=35eff4 a3=804bb4b items=0 ppid=22880 pid=22881 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="cat" exe="/bin/cat" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976523.557:1594): path="/var/cache/logwatch/logwatch.ueRIpGof/maillog-archive" type=AVC msg=audit(1162976523.561:1595): avc: denied { read } for pid=22881 comm="cat" name="maillog.1" dev=dm-0 ino=14437116 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file type=SYSCALL msg=audit(1162976523.561:1595): arch=40000003 syscall=5 success=yes exit=3 a0=bf954e5f a1=8000 a2=0 a3=8000 items=0 ppid=22880 pid=22881 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="cat" exe="/bin/cat" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976523.589:1596): avc: denied { append } for pid=22881 comm="cat" name="maillog-archive" dev=dm-0 ino=14796674 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:logwatch_cache_t:s0 tclass=file type=SYSCALL msg=audit(1162976523.589:1596): arch=40000003 syscall=4 success=yes exit=4096 a0=1 a1=8c1e000 a2=1000 a3=1000 items=0 ppid=22880 pid=22881 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="cat" exe="/bin/cat" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976523.589:1596): path="/var/cache/logwatch/logwatch.ueRIpGof/maillog-archive" type=AVC msg=audit(1162976523.605:1597): avc: denied { read } for pid=22883 comm="cat" name="maillog-archive" dev=dm-0 ino=14796674 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:logwatch_cache_t:s0 tclass=file type=SYSCALL msg=audit(1162976523.605:1597): arch=40000003 syscall=5 success=yes exit=3 a0=bfe14e2b a1=8000 a2=0 a3=8000 items=0 ppid=22882 pid=22883 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="cat" exe="/bin/cat" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976523.613:1598): avc: denied { ioctl } for pid=22886 comm="perl" name="maillog" dev=dm-0 ino=14796675 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:logwatch_cache_t:s0 tclass=file type=SYSCALL msg=audit(1162976523.613:1598): arch=40000003 syscall=54 success=no exit=-25 a0=1 a1=5401 a2=bfd93568 a3=bfd935a8 items=0 ppid=22882 pid=22886 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="perl" exe="/usr/bin/perl" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976523.613:1598): path="/var/cache/logwatch/logwatch.ueRIpGof/maillog" type=AVC msg=audit(1162976523.813:1599): avc: denied { write } for pid=22886 comm="perl" name="maillog" dev=dm-0 ino=14796675 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:logwatch_cache_t:s0 tclass=file type=SYSCALL msg=audit(1162976523.813:1599): arch=40000003 syscall=4 success=yes exit=1255 a0=1 a1=855af88 a2=4e7 a3=855af88 items=0 ppid=22882 pid=22886 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="perl" exe="/usr/bin/perl" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976523.813:1599): path="/var/cache/logwatch/logwatch.ueRIpGof/maillog" type=AVC msg=audit(1162976524.497:1600): avc: denied { read } for pid=22935 comm="cat" name="smbd.log.3" dev=dm-0 ino=14437190 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:samba_log_t:s0 tclass=file type=SYSCALL msg=audit(1162976524.497:1600): arch=40000003 syscall=5 success=yes exit=3 a0=bfbfcda6 a1=8000 a2=0 a3=8000 items=0 ppid=22934 pid=22935 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="cat" exe="/bin/cat" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976525.013:1601): avc: denied { read } for pid=22966 comm="cat" name="access_log" dev=dm-0 ino=14437011 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=user_u:object_r:httpd_log_t:s0 tclass=file type=SYSCALL msg=audit(1162976525.013:1601): arch=40000003 syscall=5 success=yes exit=3 a0=bf835e58 a1=8000 a2=0 a3=8000 items=0 ppid=22965 pid=22966 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="cat" exe="/bin/cat" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976526.709:1602): avc: denied { read } for pid=23215 comm="perl" name="mail" dev=dm-0 ino=14437156 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:mail_spool_t:s0 tclass=lnk_file type=AVC msg=audit(1162976526.709:1602): avc: denied { getattr } for pid=23215 comm="perl" name="mail" dev=dm-0 ino=14436619 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:mail_spool_t:s0 tclass=dir type=SYSCALL msg=audit(1162976526.709:1602): arch=40000003 syscall=195 success=yes exit=0 a0=8b10d60 a1=8ac30c8 a2=239ff4 a3=8b10d60 items=0 ppid=22868 pid=23215 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="perl" exe="/usr/bin/perl" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976526.709:1602): path="/var/spool/mail" type=AVC msg=audit(1162976526.709:1603): avc: denied { read } for pid=23215 comm="perl" name="mail" dev=dm-0 ino=14436619 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:mail_spool_t:s0 tclass=dir type=SYSCALL msg=audit(1162976526.709:1603): arch=40000003 syscall=5 success=yes exit=3 a0=8ad89c8 a1=18800 a2=8ac3008 a3=8b9c8d0 items=0 ppid=22868 pid=23215 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="perl" exe="/usr/bin/perl" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976526.709:1604): avc: denied { search } for pid=23215 comm="perl" name="mail" dev=dm-0 ino=14436619 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:mail_spool_t:s0 tclass=dir type=AVC msg=audit(1162976526.709:1604): avc: denied { getattr } for pid=23215 comm="perl" name="kmacmill" dev=dm-0 ino=14437393 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:mail_spool_t:s0 tclass=file type=SYSCALL msg=audit(1162976526.709:1604): arch=40000003 syscall=195 success=yes exit=0 a0=8b10d60 a1=8ac30c8 a2=239ff4 a3=8b3cee8 items=0 ppid=22868 pid=23215 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="perl" exe="/usr/bin/perl" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976526.709:1604): path="/var/spool/mail/kmacmill" type=AVC msg=audit(1162976526.985:1605): avc: denied { getattr } for pid=23280 comm="perl" name="ntpd" dev=dm-0 ino=10324369 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:ntpd_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162976526.985:1605): arch=40000003 syscall=195 success=yes exit=0 a0=823be80 a1=81e20c8 a2=239ff4 a3=823be80 items=0 ppid=23276 pid=23280 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="perl" exe="/usr/bin/perl" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976526.985:1605): path="/usr/sbin/ntpd" type=AVC msg=audit(1162976527.097:1606): avc: denied { read } for pid=23282 comm="df" name="mtab" dev=dm-0 ino=9330919 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:etc_runtime_t:s0 tclass=file type=SYSCALL msg=audit(1162976527.097:1606): arch=40000003 syscall=5 success=yes exit=3 a0=80505b1 a1=0 a2=1b6 a3=9c97048 items=0 ppid=23281 pid=23282 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="df" exe="/bin/df" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976527.097:1607): avc: denied { getattr } for pid=23282 comm="df" name="mtab" dev=dm-0 ino=9330919 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:etc_runtime_t:s0 tclass=file type=SYSCALL msg=audit(1162976527.097:1607): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bfd13290 a2=239ff4 a3=9c97048 items=0 ppid=23281 pid=23282 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="df" exe="/bin/df" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976527.097:1607): path="/etc/mtab" type=AVC msg=audit(1162976527.101:1608): avc: denied { search } for pid=23282 comm="df" name="nfs" dev=dm-0 ino=14437242 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_lib_nfs_t:s0 tclass=dir type=SYSCALL msg=audit(1162976527.101:1608): arch=40000003 syscall=268 success=yes exit=0 a0=9c98440 a1=54 a2=bfd12f94 a3=bfd12f94 items=0 ppid=23281 pid=23282 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="df" exe="/bin/df" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976527.101:1609): avc: denied { search } for pid=23282 comm="df" name="media" dev=dm-0 ino=6972769 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:mnt_t:s0 tclass=dir type=SYSCALL msg=audit(1162976527.101:1609): arch=40000003 syscall=268 success=yes exit=0 a0=9c984a0 a1=54 a2=bfd12f94 a3=bfd12f94 items=0 ppid=23281 pid=23282 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="df" exe="/bin/df" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976527.393:1610): avc: denied { setattr } for pid=22868 comm="0logwatch" name="logwatch.ueRIpGof" dev=dm-0 ino=14796673 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:logwatch_cache_t:s0 tclass=dir type=SYSCALL msg=audit(1162976527.393:1610): arch=40000003 syscall=15 success=yes exit=0 a0=8dc72b0 a1=1c0 a2=a095cc a3=8dc72b0 items=0 ppid=22863 pid=22868 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="0logwatch" exe="/usr/bin/perl" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976527.393:1611): avc: denied { remove_name } for pid=22868 comm="0logwatch" name="maillog" dev=dm-0 ino=14796675 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:logwatch_cache_t:s0 tclass=dir type=AVC msg=audit(1162976527.393:1611): avc: denied { unlink } for pid=22868 comm="0logwatch" name="maillog" dev=dm-0 ino=14796675 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:logwatch_cache_t:s0 tclass=file type=SYSCALL msg=audit(1162976527.393:1611): arch=40000003 syscall=10 success=yes exit=0 a0=8abda30 a1=87f0068 a2=a095cc a3=8abda30 items=0 ppid=22863 pid=22868 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="0logwatch" exe="/usr/bin/perl" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976527.393:1612): avc: denied { rmdir } for pid=22868 comm="0logwatch" name="logwatch.ueRIpGof" dev=dm-0 ino=14796673 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:logwatch_cache_t:s0 tclass=dir type=SYSCALL msg=audit(1162976527.393:1612): arch=40000003 syscall=40 success=yes exit=0 a0=8dc72b0 a1=885adec a2=a095cc a3=8dc72b0 items=0 ppid=22863 pid=22868 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="0logwatch" exe="/usr/bin/perl" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976527.461:1613): avc: denied { search } for pid=23290 comm="procmail" name="root" dev=dm-0 ino=13127137 scontext=system_u:system_r:procmail_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=SYSCALL msg=audit(1162976527.461:1613): arch=40000003 syscall=5 success=no exit=-2 a0=9000d90 a1=8000 a2=0 a3=8000 items=0 ppid=23285 pid=23290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="procmail" exe="/usr/bin/procmail" subj=system_u:system_r:procmail_t:s0 key=(null) type=AVC msg=audit(1162976527.493:1614): avc: denied { chown } for pid=23289 comm="chown" capability=0 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tclass=capability type=SYSCALL msg=audit(1162976527.493:1614): arch=40000003 syscall=212 success=yes exit=0 a0=8274da8 a1=3a a2=ffffffff a3=0 items=0 ppid=23286 pid=23289 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="chown" exe="/bin/chown" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976527.789:1615): avc: denied { link } for pid=23299 comm="runuser" scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tclass=key type=SYSCALL msg=audit(1162976527.789:1615): arch=40000003 syscall=288 success=yes exit=0 a0=8 a1=fffffffc a2=fffffffd a3=3a items=0 ppid=23286 pid=23299 auid=0 uid=58 gid=58 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="runuser" exe="/sbin/runuser" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=USER_START msg=audit(1162976528.013:1616): user pid=23299 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=beaglidx : exe="/sbin/runuser" (hostname=?, addr=?, terminal=? res=success)' type=CRED_ACQ msg=audit(1162976528.013:1617): user pid=23299 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=beaglidx : exe="/sbin/runuser" (hostname=?, addr=?, terminal=? res=success)' type=AVC msg=audit(1162976528.045:1618): avc: denied { ioctl } for pid=23300 comm="beagle-build-in" name="beagle-build-index" dev=dm-0 ino=10321858 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sbin_t:s0 tclass=file type=SYSCALL msg=audit(1162976528.045:1618): arch=40000003 syscall=54 success=no exit=-25 a0=3 a1=5401 a2=bff79158 a3=bff79198 items=0 ppid=23299 pid=23300 auid=0 uid=58 gid=58 euid=58 suid=58 fsuid=58 egid=58 sgid=58 fsgid=58 tty=(none) comm="beagle-build-in" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976528.045:1618): path="/usr/sbin/beagle-build-index" type=AVC msg=audit(1162976528.045:1619): avc: denied { getattr } for pid=23300 comm="beagle-build-in" name="beagle-build-index" dev=dm-0 ino=10321858 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sbin_t:s0 tclass=file type=SYSCALL msg=audit(1162976528.045:1619): arch=40000003 syscall=197 success=yes exit=0 a0=ff a1=bff7924c a2=239ff4 a3=0 items=0 ppid=23299 pid=23300 auid=0 uid=58 gid=58 euid=58 suid=58 fsuid=58 egid=58 sgid=58 fsgid=58 tty=(none) comm="beagle-build-in" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976528.045:1619): path="/usr/sbin/beagle-build-index" type=AVC msg=audit(1162976528.045:1620): avc: denied { getattr } for pid=23300 comm="beagle-build-in" name="mono" dev=dm-0 ino=10337402 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:mono_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162976528.045:1620): arch=40000003 syscall=195 success=yes exit=0 a0=9c32858 a1=bff78e90 a2=239ff4 a3=9c32858 items=0 ppid=23299 pid=23300 auid=0 uid=58 gid=58 euid=58 suid=58 fsuid=58 egid=58 sgid=58 fsgid=58 tty=(none) comm="beagle-build-in" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976528.045:1620): path="/usr/bin/mono" type=AVC msg=audit(1162976528.045:1621): avc: denied { execute } for pid=23300 comm="beagle-build-in" name="mono" dev=dm-0 ino=10337402 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:mono_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162976528.045:1621): arch=40000003 syscall=33 success=yes exit=0 a0=9c32858 a1=1 a2=11 a3=9c32858 items=0 ppid=23299 pid=23300 auid=0 uid=58 gid=58 euid=58 suid=58 fsuid=58 egid=58 sgid=58 fsgid=58 tty=(none) comm="beagle-build-in" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976528.045:1622): avc: denied { read } for pid=23300 comm="beagle-build-in" name="mono" dev=dm-0 ino=10337402 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:mono_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162976528.045:1622): arch=40000003 syscall=33 success=yes exit=0 a0=9c32858 a1=4 a2=ffffffff a3=9c32858 items=0 ppid=23299 pid=23300 auid=0 uid=58 gid=58 euid=58 suid=58 fsuid=58 egid=58 sgid=58 fsgid=58 tty=(none) comm="beagle-build-in" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976528.045:1623): avc: denied { execute_no_trans } for pid=23300 comm="beagle-build-in" name="mono" dev=dm-0 ino=10337402 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:mono_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162976528.045:1623): arch=40000003 syscall=11 success=yes exit=0 a0=9c322a8 a1=9c31fb0 a2=9c32a40 a3=9c31fb0 items=0 ppid=23299 pid=23300 auid=0 uid=58 gid=58 euid=58 suid=58 fsuid=58 egid=58 sgid=58 fsgid=58 tty=(none) comm="mono" exe="/usr/bin/mono" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976528.045:1623): path="/usr/bin/mono" type=AVC msg=audit(1162976528.333:1624): avc: denied { execheap } for pid=23300 comm="mono" scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tclass=process type=AVC msg=audit(1162976528.333:1624): avc: denied { execmem } for pid=23300 comm="mono" scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tclass=process type=SYSCALL msg=audit(1162976528.333:1624): arch=40000003 syscall=125 success=yes exit=0 a0=8ea2000 a1=1000 a2=7 a3=1 items=0 ppid=23299 pid=23300 auid=0 uid=58 gid=58 euid=58 suid=58 fsuid=58 egid=58 sgid=58 fsgid=58 tty=(none) comm="mono" exe="/usr/bin/mono" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976528.709:1625): avc: denied { read } for pid=23300 comm="beagle-build-in" name="applications" dev=dm-0 ino=14567751 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_t:s0 tclass=dir type=SYSCALL msg=audit(1162976528.709:1625): arch=40000003 syscall=5 success=yes exit=10 a0=8f001e0 a1=18800 a2=49f60 a3=8f001e0 items=0 ppid=23299 pid=23300 auid=0 uid=58 gid=58 euid=58 suid=58 fsuid=58 egid=58 sgid=58 fsgid=58 tty=(none) comm="beagle-build-in" exe="/usr/bin/mono" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976528.789:1626): avc: denied { getattr } for pid=23300 comm="beagle-build-in" name="FileAttributesStore.db" dev=dm-0 ino=14567759 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_t:s0 tclass=file type=SYSCALL msg=audit(1162976528.789:1626): arch=40000003 syscall=195 success=yes exit=0 a0=8f00b48 a1=bff77c20 a2=239ff4 a3=bff77c20 items=0 ppid=23299 pid=23300 auid=0 uid=58 gid=58 euid=58 suid=58 fsuid=58 egid=58 sgid=58 fsgid=58 tty=(none) comm="beagle-build-in" exe="/usr/bin/mono" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976528.789:1626): path="/var/cache/beagle/indexes/applications/FileAttributesStore.db" type=AVC msg=audit(1162976528.989:1627): avc: denied { read } for pid=23300 comm="beagle-build-in" name="version" dev=dm-0 ino=14567757 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_t:s0 tclass=file type=SYSCALL msg=audit(1162976528.989:1627): arch=40000003 syscall=5 success=yes exit=11 a0=8fa5200 a1=8000 a2=0 a3=8000 items=0 ppid=23299 pid=23300 auid=0 uid=58 gid=58 euid=58 suid=58 fsuid=58 egid=58 sgid=58 fsgid=58 tty=(none) comm="beagle-build-in" exe="/usr/bin/mono" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976529.498:1628): avc: denied { write } for pid=23300 comm="beagle-build-in" name="FileAttributesStore.db" dev=dm-0 ino=14567759 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_t:s0 tclass=file type=SYSCALL msg=audit(1162976529.498:1628): arch=40000003 syscall=5 success=yes exit=12 a0=9035550 a1=8042 a2=1a4 a3=8042 items=0 ppid=23299 pid=23300 auid=0 uid=58 gid=58 euid=58 suid=58 fsuid=58 egid=58 sgid=58 fsgid=58 tty=(none) comm="beagle-build-in" exe="/usr/bin/mono" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976529.538:1629): avc: denied { lock } for pid=23300 comm="beagle-build-in" name="FileAttributesStore.db" dev=dm-0 ino=14567759 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_t:s0 tclass=file type=SYSCALL msg=audit(1162976529.538:1629): arch=40000003 syscall=221 success=yes exit=0 a0=c a1=d a2=bff77328 a3=bff77328 items=0 ppid=23299 pid=23300 auid=0 uid=58 gid=58 euid=58 suid=58 fsuid=58 egid=58 sgid=58 fsgid=58 tty=(none) comm="beagle-build-in" exe="/usr/bin/mono" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976529.538:1629): path="/var/cache/beagle/indexes/applications/FileAttributesStore.db" type=AVC msg=audit(1162976529.686:1630): avc: denied { read } for pid=23303 comm="beagle-build-in" name="gimp-2.2.desktop" dev=dm-0 ino=10317656 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:usr_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1162976529.686:1630): arch=40000003 syscall=195 success=yes exit=0 a0=9052bc0 a1=b6f2af08 a2=239ff4 a3=b6f2af08 items=0 ppid=23299 pid=23303 auid=0 uid=58 gid=58 euid=58 suid=58 fsuid=58 egid=58 sgid=58 fsgid=58 tty=(none) comm="beagle-build-in" exe="/usr/bin/mono" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976529.686:1631): avc: denied { getattr } for pid=23303 comm="beagle-build-in" name="linux-uninstall.desktop" dev=dm-0 ino=10316106 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=user_u:object_r:usr_t:s0 tclass=file type=SYSCALL msg=audit(1162976529.686:1631): arch=40000003 syscall=195 success=yes exit=0 a0=9054888 a1=b6f2af08 a2=239ff4 a3=b6f2af08 items=0 ppid=23299 pid=23303 auid=0 uid=58 gid=58 euid=58 suid=58 fsuid=58 egid=58 sgid=58 fsgid=58 tty=(none) comm="beagle-build-in" exe="/usr/bin/mono" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976529.686:1631): path="/usr/share/applications/linux-uninstall.desktop" type=AVC msg=audit(1162976529.710:1632): avc: denied { getattr } for pid=23303 comm="beagle-build-in" name="gimp-2.2.desktop" dev=dm-0 ino=10317656 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:usr_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1162976529.710:1632): arch=40000003 syscall=196 success=yes exit=0 a0=b6c01c58 a1=b6f2ae74 a2=239ff4 a3=de720 items=0 ppid=23299 pid=23303 auid=0 uid=58 gid=58 euid=58 suid=58 fsuid=58 egid=58 sgid=58 fsgid=58 tty=(none) comm="beagle-build-in" exe="/usr/bin/mono" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976529.710:1632): path="/usr/share/applications/gimp-2.2.desktop" type=AVC msg=audit(1162976530.070:1633): avc: denied { write } for pid=23304 comm="beagle-build-in" name="Locks" dev=dm-0 ino=14567752 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_t:s0 tclass=dir type=AVC msg=audit(1162976530.070:1633): avc: denied { add_name } for pid=23304 comm="beagle-build-in" name="lucene-387e9e5278e1cbfa1ca3bb850a474745-write.lock" scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_t:s0 tclass=dir type=AVC msg=audit(1162976530.070:1633): avc: denied { create } for pid=23304 comm="beagle-build-in" name="lucene-387e9e5278e1cbfa1ca3bb850a474745-write.lock" scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_t:s0 tclass=file type=SYSCALL msg=audit(1162976530.070:1633): arch=40000003 syscall=5 success=yes exit=13 a0=906c600 a1=80c2 a2=100 a3=80c2 items=0 ppid=23299 pid=23304 auid=0 uid=58 gid=58 euid=58 suid=58 fsuid=58 egid=58 sgid=58 fsgid=58 tty=(none) comm="beagle-build-in" exe="/usr/bin/mono" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976530.134:1634): avc: denied { remove_name } for pid=23304 comm="beagle-build-in" name="lucene-387e9e5278e1cbfa1ca3bb850a474745-commit.lock" dev=dm-0 ino=14567744 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_t:s0 tclass=dir type=AVC msg=audit(1162976530.134:1634): avc: denied { unlink } for pid=23304 comm="beagle-build-in" name="lucene-387e9e5278e1cbfa1ca3bb850a474745-commit.lock" dev=dm-0 ino=14567744 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_t:s0 tclass=file type=SYSCALL msg=audit(1162976530.134:1634): arch=40000003 syscall=10 success=yes exit=0 a0=9027b28 a1=45 a2=8208528 a3=9027b28 items=0 ppid=23299 pid=23304 auid=0 uid=58 gid=58 euid=58 suid=58 fsuid=58 egid=58 sgid=58 fsgid=58 tty=(none) comm="beagle-build-in" exe="/usr/bin/mono" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=CRED_DISP msg=audit(1162976532.774:1635): user pid=23299 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=beaglidx : exe="/sbin/runuser" (hostname=?, addr=?, terminal=? res=success)' type=USER_END msg=audit(1162976532.774:1636): user pid=23299 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=beaglidx : exe="/sbin/runuser" (hostname=?, addr=?, terminal=? res=success)' type=USER_START msg=audit(1162976532.834:1637): user pid=23314 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=beaglidx : exe="/sbin/runuser" (hostname=?, addr=?, terminal=? res=success)' type=CRED_ACQ msg=audit(1162976532.834:1638): user pid=23314 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=beaglidx : exe="/sbin/runuser" (hostname=?, addr=?, terminal=? res=success)' type=AVC msg=audit(1162976544.858:1639): avc: denied { getattr } for pid=23318 comm="beagle-build-in" name="README.txt" dev=dm-0 ino=10379427 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=root:object_r:usr_t:s0 tclass=file type=SYSCALL msg=audit(1162976544.858:1639): arch=40000003 syscall=195 success=yes exit=0 a0=941d790 a1=b6ef3f08 a2=239ff4 a3=b6ef3f08 items=0 ppid=23314 pid=23318 auid=0 uid=58 gid=58 euid=58 suid=58 fsuid=58 egid=58 sgid=58 fsgid=58 tty=(none) comm="beagle-build-in" exe="/usr/bin/mono" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976544.858:1639): path="/usr/share/doc/NVIDIA_GLX-1.0/README.txt" type=AVC msg=audit(1162976556.151:1640): avc: denied { read } for pid=23318 comm="beagle-build-in" name="log4j" dev=dm-0 ino=10446960 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=user_u:object_r:usr_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1162976556.151:1640): arch=40000003 syscall=195 success=yes exit=0 a0=9406288 a1=b6ef3f08 a2=239ff4 a3=b6ef3f08 items=0 ppid=23314 pid=23318 auid=0 uid=58 gid=58 euid=58 suid=58 fsuid=58 egid=58 sgid=58 fsgid=58 tty=(none) comm="beagle-build-in" exe="/usr/bin/mono" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=CRED_DISP msg=audit(1162976592.245:1641): user pid=23314 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=beaglidx : exe="/sbin/runuser" (hostname=?, addr=?, terminal=? res=success)' type=USER_END msg=audit(1162976592.249:1642): user pid=23314 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=beaglidx : exe="/sbin/runuser" (hostname=?, addr=?, terminal=? res=success)' type=AVC msg=audit(1162976592.313:1643): avc: denied { search } for pid=23324 comm="cups" name="cups" dev=dm-0 ino=14437056 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:print_spool_t:s0 tclass=dir type=AVC msg=audit(1162976592.313:1643): avc: denied { getattr } for pid=23324 comm="cups" name="tmp" dev=dm-0 ino=14437057 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:print_spool_t:s0 tclass=dir type=SYSCALL msg=audit(1162976592.313:1643): arch=40000003 syscall=195 success=yes exit=0 a0=97d4908 a1=bfbb98b8 a2=239ff4 a3=97d58f8 items=0 ppid=22863 pid=23324 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="cups" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976592.313:1643): path="/var/spool/cups/tmp" type=AVC msg=audit(1162976592.341:1644): avc: denied { execute } for pid=23326 comm="cups" name="tmpwatch" dev=dm-0 ino=10323837 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:tmpreaper_exec_t:s0 tclass=file type=AVC msg=audit(1162976592.341:1644): avc: denied { execute_no_trans } for pid=23326 comm="cups" name="tmpwatch" dev=dm-0 ino=10323837 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:tmpreaper_exec_t:s0 tclass=file type=AVC msg=audit(1162976592.341:1644): avc: denied { read } for pid=23326 comm="cups" name="tmpwatch" dev=dm-0 ino=10323837 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:tmpreaper_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162976592.341:1644): arch=40000003 syscall=11 success=yes exit=0 a0=97d5b90 a1=97d4b60 a2=97d5bd8 a3=97d57e0 items=0 ppid=23324 pid=23326 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="tmpwatch" exe="/usr/sbin/tmpwatch" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976592.341:1644): path="/usr/sbin/tmpwatch" type=AVC_PATH msg=audit(1162976592.341:1644): path="/usr/sbin/tmpwatch" type=AVC msg=audit(1162976592.341:1645): avc: denied { read } for pid=23326 comm="tmpwatch" name="tmp" dev=dm-0 ino=14437057 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:print_spool_t:s0 tclass=dir type=SYSCALL msg=audit(1162976592.341:1645): arch=40000003 syscall=5 success=yes exit=4 a0=804abea a1=18800 a2=fd00 a3=0 items=0 ppid=23324 pid=23326 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="tmpwatch" exe="/usr/sbin/tmpwatch" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976592.349:1646): avc: denied { setattr } for pid=23326 comm="tmpwatch" name="tmp" dev=dm-0 ino=14437057 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:print_spool_t:s0 tclass=dir type=SYSCALL msg=audit(1162976592.349:1646): arch=40000003 syscall=30 success=yes exit=0 a0=804abea a1=bfbf20c0 a2=0 a3=0 items=0 ppid=23324 pid=23326 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="tmpwatch" exe="/usr/sbin/tmpwatch" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976592.389:1647): avc: denied { execute } for pid=23333 comm="logrotate" name="logrotate" dev=dm-0 ino=10319445 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:logrotate_exec_t:s0 tclass=file type=AVC msg=audit(1162976592.389:1647): avc: denied { execute_no_trans } for pid=23333 comm="logrotate" name="logrotate" dev=dm-0 ino=10319445 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:logrotate_exec_t:s0 tclass=file type=AVC msg=audit(1162976592.389:1647): avc: denied { read } for pid=23333 comm="logrotate" name="logrotate" dev=dm-0 ino=10319445 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:logrotate_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162976592.389:1647): arch=40000003 syscall=11 success=yes exit=0 a0=98ec540 a1=98ec6c8 a2=98ec5f8 a3=98ec3c0 items=0 ppid=23331 pid=23333 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="logrotate" exe="/usr/sbin/logrotate" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976592.389:1647): path="/usr/sbin/logrotate" type=AVC_PATH msg=audit(1162976592.389:1647): path="/usr/sbin/logrotate" type=AVC msg=audit(1162976592.421:1648): avc: denied { getattr } for pid=23333 comm="logrotate" name="acpid" dev=dm-0 ino=14437362 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:apmd_log_t:s0 tclass=file type=SYSCALL msg=audit(1162976592.421:1648): arch=40000003 syscall=196 success=yes exit=0 a0=88526c0 a1=bfbe4a90 a2=239ff4 a3=0 items=0 ppid=23331 pid=23333 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="logrotate" exe="/usr/sbin/logrotate" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976592.421:1648): path="/var/log/acpid" type=AVC msg=audit(1162976592.429:1649): avc: denied { read } for pid=23333 comm="logrotate" name="cups" dev=dm-0 ino=14437052 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:cupsd_log_t:s0 tclass=dir type=SYSCALL msg=audit(1162976592.429:1649): arch=40000003 syscall=5 success=yes exit=4 a0=bfbe4730 a1=18800 a2=239ff4 a3=0 items=0 ppid=23331 pid=23333 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="logrotate" exe="/usr/sbin/logrotate" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976592.429:1650): avc: denied { getattr } for pid=23333 comm="logrotate" name="cups" dev=dm-0 ino=14437052 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:cupsd_log_t:s0 tclass=dir type=SYSCALL msg=audit(1162976592.429:1650): arch=40000003 syscall=197 success=yes exit=0 a0=4 a1=bfbe445c a2=239ff4 a3=4 items=0 ppid=23331 pid=23333 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="logrotate" exe="/usr/sbin/logrotate" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976592.429:1650): path="/var/log/cups" type=AVC msg=audit(1162976592.429:1651): avc: denied { search } for pid=23333 comm="logrotate" name="cups" dev=dm-0 ino=14437052 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:cupsd_log_t:s0 tclass=dir type=AVC msg=audit(1162976592.429:1651): avc: denied { getattr } for pid=23333 comm="logrotate" name="access_log" dev=dm-0 ino=14437876 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:cupsd_log_t:s0 tclass=file type=SYSCALL msg=audit(1162976592.429:1651): arch=40000003 syscall=196 success=yes exit=0 a0=8852860 a1=bfbe4a90 a2=239ff4 a3=0 items=0 ppid=23331 pid=23333 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="logrotate" exe="/usr/sbin/logrotate" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976592.429:1651): path="/var/log/cups/access_log" type=AVC msg=audit(1162976592.557:1652): avc: denied { search } for pid=23333 comm="logrotate" name="account" dev=dm-0 ino=14437046 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:acct_data_t:s0 tclass=dir type=AVC msg=audit(1162976592.557:1652): avc: denied { getattr } for pid=23333 comm="logrotate" name="pacct" dev=dm-0 ino=14437048 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:acct_data_t:s0 tclass=file type=SYSCALL msg=audit(1162976592.557:1652): arch=40000003 syscall=196 success=yes exit=0 a0=8853648 a1=bfbe4a90 a2=239ff4 a3=0 items=0 ppid=23331 pid=23333 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="logrotate" exe="/usr/sbin/logrotate" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976592.557:1652): path="/var/account/pacct" type=AVC msg=audit(1162976592.609:1653): avc: denied { read } for pid=23333 comm="logrotate" name="setroubleshoot" dev=dm-0 ino=14469339 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:setroubleshoot_var_log_t:s0 tclass=dir type=SYSCALL msg=audit(1162976592.609:1653): arch=40000003 syscall=5 success=yes exit=4 a0=bfbe4750 a1=18800 a2=18a5c0 a3=0 items=0 ppid=23331 pid=23333 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="logrotate" exe="/usr/sbin/logrotate" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976592.625:1654): avc: denied { getattr } for pid=23333 comm="logrotate" name="setroubleshoot" dev=dm-0 ino=14469339 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:setroubleshoot_var_log_t:s0 tclass=dir type=SYSCALL msg=audit(1162976592.625:1654): arch=40000003 syscall=197 success=yes exit=0 a0=4 a1=bfbe447c a2=239ff4 a3=4 items=0 ppid=23331 pid=23333 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="logrotate" exe="/usr/sbin/logrotate" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976592.625:1654): path="/var/log/setroubleshoot" type=AVC msg=audit(1162976592.633:1655): avc: denied { search } for pid=23333 comm="logrotate" name="setroubleshoot" dev=dm-0 ino=14469339 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:setroubleshoot_var_log_t:s0 tclass=dir type=AVC msg=audit(1162976592.633:1655): avc: denied { getattr } for pid=23333 comm="logrotate" name="setroubleshootd.log" dev=dm-0 ino=14469341 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=user_u:object_r:setroubleshoot_var_log_t:s0 tclass=file type=SYSCALL msg=audit(1162976592.633:1655): arch=40000003 syscall=196 success=yes exit=0 a0=88546f0 a1=bfbe4a90 a2=239ff4 a3=0 items=0 ppid=23331 pid=23333 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="logrotate" exe="/usr/sbin/logrotate" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976592.633:1655): path="/var/log/setroubleshoot/setroubleshootd.log" type=AVC msg=audit(1162976592.665:1656): avc: denied { getattr } for pid=23333 comm="logrotate" name="catalina.out" dev=dm-0 ino=14731349 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=user_u:object_r:var_log_t:s0 tclass=file type=SYSCALL msg=audit(1162976592.665:1656): arch=40000003 syscall=196 success=yes exit=0 a0=88534c8 a1=bfbe4a90 a2=239ff4 a3=0 items=0 ppid=23331 pid=23333 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="logrotate" exe="/usr/sbin/logrotate" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976592.665:1656): path="/var/log/tomcat5/catalina.out" type=AVC msg=audit(1162976592.705:1657): avc: denied { getattr } for pid=23333 comm="logrotate" name="wtmp" dev=dm-0 ino=6422812 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:wtmp_t:s0 tclass=file type=SYSCALL msg=audit(1162976592.705:1657): arch=40000003 syscall=196 success=yes exit=0 a0=8853678 a1=bfbe5080 a2=239ff4 a3=0 items=0 ppid=23331 pid=23333 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="logrotate" exe="/usr/sbin/logrotate" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976592.705:1657): path="/var/log/wtmp" type=AVC msg=audit(1162976592.705:1658): avc: denied { getattr } for pid=23333 comm="logrotate" name="logrotate.status" dev=dm-0 ino=14436936 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:logrotate_var_lib_t:s0 tclass=file type=SYSCALL msg=audit(1162976592.705:1658): arch=40000003 syscall=195 success=yes exit=0 a0=805083f a1=bfbe5514 a2=239ff4 a3=88523e0 items=0 ppid=23331 pid=23333 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="logrotate" exe="/usr/sbin/logrotate" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976592.705:1658): path="/var/lib/logrotate.status" type=AVC msg=audit(1162976592.733:1659): avc: denied { read } for pid=23333 comm="logrotate" name="logrotate.status" dev=dm-0 ino=14436936 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:logrotate_var_lib_t:s0 tclass=file type=SYSCALL msg=audit(1162976592.733:1659): arch=40000003 syscall=5 success=yes exit=3 a0=805083f a1=8000 a2=1b6 a3=88523e0 items=0 ppid=23331 pid=23333 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="logrotate" exe="/usr/sbin/logrotate" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976592.737:1660): avc: denied { getattr } for pid=23333 comm="logrotate" name="acpid" dev=dm-0 ino=14437362 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:apmd_log_t:s0 tclass=file type=SYSCALL msg=audit(1162976592.737:1660): arch=40000003 syscall=195 success=yes exit=0 a0=8852718 a1=bfbe52e0 a2=239ff4 a3=0 items=0 ppid=23331 pid=23333 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="logrotate" exe="/usr/sbin/logrotate" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976592.737:1660): path="/var/log/acpid" type=AVC msg=audit(1162976592.737:1661): avc: denied { write } for pid=23333 comm="logrotate" name="logrotate.status" dev=dm-0 ino=14436936 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:logrotate_var_lib_t:s0 tclass=file type=SYSCALL msg=audit(1162976592.737:1661): arch=40000003 syscall=5 success=yes exit=3 a0=805083f a1=8241 a2=1b6 a3=8855368 items=0 ppid=23331 pid=23333 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="logrotate" exe="/usr/sbin/logrotate" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976592.777:1662): avc: denied { search } for pid=23334 comm="makewhatis.cron" name="lock" dev=dm-0 ino=14436610 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_lock_t:s0 tclass=dir type=SYSCALL msg=audit(1162976592.777:1662): arch=40000003 syscall=195 success=no exit=-2 a0=827ba80 a1=bfac29a8 a2=239ff4 a3=827b548 items=0 ppid=22863 pid=23334 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="makewhatis.cron" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976592.817:1663): avc: denied { write } for pid=23339 comm="touch" name="lock" dev=dm-0 ino=14436610 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_lock_t:s0 tclass=dir type=AVC msg=audit(1162976592.817:1663): avc: denied { add_name } for pid=23339 comm="touch" name="makewhatis.lock" scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_lock_t:s0 tclass=dir type=AVC msg=audit(1162976592.817:1663): avc: denied { create } for pid=23339 comm="touch" name="makewhatis.lock" scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_lock_t:s0 tclass=file type=SYSCALL msg=audit(1162976592.817:1663): arch=40000003 syscall=5 success=yes exit=0 a0=bfa62f5f a1=8941 a2=1b6 a3=8941 items=0 ppid=23334 pid=23339 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="touch" exe="/bin/touch" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976592.817:1664): avc: denied { write } for pid=23339 comm="touch" name="makewhatis.lock" dev=dm-0 ino=14437015 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_lock_t:s0 tclass=file type=SYSCALL msg=audit(1162976592.817:1664): arch=40000003 syscall=271 success=yes exit=0 a0=bfa60ec4 a1=0 a2=239ff4 a3=0 items=0 ppid=23334 pid=23339 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="touch" exe="/bin/touch" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976592.877:1665): avc: denied { getattr } for pid=23340 comm="makewhatis" name="man" dev=dm-0 ino=10311888 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:man_t:s0 tclass=dir type=SYSCALL msg=audit(1162976592.877:1665): arch=40000003 syscall=195 success=yes exit=0 a0=8ac0de0 a1=bfcae198 a2=239ff4 a3=8ac0e60 items=0 ppid=23334 pid=23340 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="makewhatis" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976592.877:1665): path="/usr/share/man" type=AVC msg=audit(1162976592.881:1666): avc: denied { search } for pid=23340 comm="makewhatis" name="man" dev=dm-0 ino=10311888 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:man_t:s0 tclass=dir type=SYSCALL msg=audit(1162976592.881:1666): arch=40000003 syscall=195 success=no exit=-2 a0=8ac1088 a1=bfcae198 a2=239ff4 a3=8ac11d8 items=0 ppid=23334 pid=23340 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="makewhatis" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976592.897:1667): avc: denied { read } for pid=23354 comm="find" name="man1" dev=dm-0 ino=10311889 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:man_t:s0 tclass=dir type=SYSCALL msg=audit(1162976592.897:1667): arch=40000003 syscall=5 success=yes exit=3 a0=80648ce a1=8000 a2=0 a3=8000 items=0 ppid=23340 pid=23354 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="find" exe="/usr/bin/find" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976592.901:1668): avc: denied { getattr } for pid=23354 comm="find" name="pamtofits.1.gz" dev=dm-0 ino=10330525 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:man_t:s0 tclass=file type=SYSCALL msg=audit(1162976592.901:1668): arch=40000003 syscall=196 success=yes exit=0 a0=95562e4 a1=bfb81478 a2=239ff4 a3=bfb81478 items=0 ppid=23340 pid=23354 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="find" exe="/usr/bin/find" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976592.901:1668): path="/usr/share/man/man1/pamtofits.1.gz" type=AVC msg=audit(1162976668.826:1669): avc: denied { read } for pid=23378 comm="cat" name="whatis" dev=dm-0 ino=14437978 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:man_t:s0 tclass=file type=SYSCALL msg=audit(1162976668.826:1669): arch=40000003 syscall=5 success=yes exit=3 a0=bfb87f20 a1=8000 a2=0 a3=8000 items=0 ppid=23340 pid=23378 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="cat" exe="/bin/cat" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976668.950:1670): avc: denied { write } for pid=23380 comm="makewhatis" name="whatis" dev=dm-0 ino=14437978 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:man_t:s0 tclass=file type=SYSCALL msg=audit(1162976668.950:1670): arch=40000003 syscall=5 success=yes exit=3 a0=8aca928 a1=8241 a2=1b6 a3=8241 items=0 ppid=23340 pid=23380 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="makewhatis" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976669.010:1671): avc: denied { setattr } for pid=23381 comm="chmod" name="whatis" dev=dm-0 ino=14437978 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:man_t:s0 tclass=file type=SYSCALL msg=audit(1162976669.010:1671): arch=40000003 syscall=15 success=yes exit=0 a0=88ca090 a1=1a4 a2=8051594 a3=0 items=0 ppid=23340 pid=23381 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="chmod" exe="/bin/chmod" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976669.166:1672): avc: denied { getattr } for pid=23383 comm="find" name="rubber.1" dev=dm-0 ino=11425301 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=user_u:object_r:man_t:s0 tclass=file type=SYSCALL msg=audit(1162976669.166:1672): arch=40000003 syscall=196 success=yes exit=0 a0=816bc44 a1=bfe2e728 a2=239ff4 a3=bfe2e728 items=0 ppid=23340 pid=23383 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="find" exe="/usr/bin/find" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976669.166:1672): path="/usr/local/man/man1/rubber.1" type=AVC msg=audit(1162976669.166:1673): avc: denied { getattr } for pid=23340 comm="makewhatis" name="man8" dev=dm-0 ino=14535139 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=user_u:object_r:man_t:s0 tclass=dir type=SYSCALL msg=audit(1162976669.166:1673): arch=40000003 syscall=195 success=yes exit=0 a0=8acb2a8 a1=bfcacdb8 a2=239ff4 a3=8acb1b8 items=0 ppid=23334 pid=23340 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="makewhatis" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976669.166:1673): path="/usr/local/man/man8" type=AVC msg=audit(1162976669.206:1674): avc: denied { search } for pid=23340 comm="makewhatis" name="man8" dev=dm-0 ino=14535139 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=user_u:object_r:man_t:s0 tclass=dir type=SYSCALL msg=audit(1162976669.206:1674): arch=40000003 syscall=12 success=yes exit=0 a0=8acafd8 a1=1 a2=0 a3=8acafd8 items=0 ppid=23334 pid=23340 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="makewhatis" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976669.206:1675): avc: denied { read } for pid=23384 comm="find" name="man8" dev=dm-0 ino=14535139 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=user_u:object_r:man_t:s0 tclass=dir type=SYSCALL msg=audit(1162976669.206:1675): arch=40000003 syscall=5 success=yes exit=3 a0=80648ce a1=8000 a2=0 a3=8000 items=0 ppid=23340 pid=23384 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="find" exe="/usr/bin/find" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976669.674:1676): avc: denied { remove_name } for pid=23430 comm="rm" name="makewhatis.lock" dev=dm-0 ino=14437015 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_lock_t:s0 tclass=dir type=AVC msg=audit(1162976669.674:1676): avc: denied { unlink } for pid=23430 comm="rm" name="makewhatis.lock" dev=dm-0 ino=14437015 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_lock_t:s0 tclass=file type=SYSCALL msg=audit(1162976669.674:1676): arch=40000003 syscall=10 success=yes exit=0 a0=bffe4f65 a1=0 a2=805277c a3=bffe35a4 items=0 ppid=23334 pid=23430 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="rm" exe="/bin/rm" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976669.710:1677): avc: denied { execute } for pid=23436 comm="mlocate.cron" name="updatedb" dev=dm-0 ino=10334536 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:locate_exec_t:s0 tclass=file type=AVC msg=audit(1162976669.710:1677): avc: denied { execute_no_trans } for pid=23436 comm="mlocate.cron" name="updatedb" dev=dm-0 ino=10334536 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:locate_exec_t:s0 tclass=file type=AVC msg=audit(1162976669.710:1677): avc: denied { read } for pid=23436 comm="mlocate.cron" name="updatedb" dev=dm-0 ino=10334536 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:locate_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162976669.710:1677): arch=40000003 syscall=11 success=yes exit=0 a0=97cb4a8 a1=97cb490 a2=97cbd98 a3=97cba48 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976669.710:1677): path="/usr/bin/updatedb" type=AVC_PATH msg=audit(1162976669.710:1677): path="/usr/bin/updatedb" type=AVC msg=audit(1162976669.754:1678): avc: denied { search } for pid=23436 comm="updatedb" name="mlocate" dev=dm-0 ino=14437049 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:locate_var_lib_t:s0 tclass=dir type=AVC msg=audit(1162976669.754:1678): avc: denied { read } for pid=23436 comm="updatedb" name="mlocate.db" dev=dm-0 ino=14438247 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:locate_var_lib_t:s0 tclass=file type=SYSCALL msg=audit(1162976669.754:1678): arch=40000003 syscall=5 success=yes exit=3 a0=804d345 a1=8000 a2=0 a3=8000 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976669.786:1679): avc: denied { write } for pid=23436 comm="updatedb" name="mlocate" dev=dm-0 ino=14437049 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:locate_var_lib_t:s0 tclass=dir type=AVC msg=audit(1162976669.786:1679): avc: denied { add_name } for pid=23436 comm="updatedb" name="mlocate.db.DwVvuL" scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:locate_var_lib_t:s0 tclass=dir type=AVC msg=audit(1162976669.786:1679): avc: denied { create } for pid=23436 comm="updatedb" name="mlocate.db.DwVvuL" scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:locate_var_lib_t:s0 tclass=file type=SYSCALL msg=audit(1162976669.786:1679): arch=40000003 syscall=5 success=yes exit=4 a0=8ff0fa0 a1=80c2 a2=180 a3=80c2 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976669.786:1680): avc: denied { getattr } for pid=23436 comm="updatedb" name="mlocate.db.DwVvuL" dev=dm-0 ino=14437015 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:locate_var_lib_t:s0 tclass=file type=SYSCALL msg=audit(1162976669.786:1680): arch=40000003 syscall=197 success=yes exit=0 a0=4 a1=bfbb7de4 a2=239ff4 a3=8ff0fc8 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976669.786:1680): path="/var/lib/mlocate/mlocate.db.DwVvuL" type=AVC msg=audit(1162976669.786:1681): avc: denied { getattr } for pid=23436 comm="updatedb" name="/" dev=sda1 ino=2 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:boot_t:s0 tclass=dir type=SYSCALL msg=audit(1162976669.786:1681): arch=40000003 syscall=196 success=yes exit=0 a0=8ff116d a1=bfbb3ca4 a2=239ff4 a3=bfbb3ca4 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976669.786:1681): path="/boot" type=AVC msg=audit(1162976669.786:1682): avc: denied { getattr } for pid=23436 comm="updatedb" name="/" dev=tmpfs ino=6550 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir type=SYSCALL msg=audit(1162976669.786:1682): arch=40000003 syscall=196 success=yes exit=0 a0=bfbb3d88 a1=bfbb3b58 a2=239ff4 a3=8ff5243 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976669.786:1682): path="/dev/shm" type=AVC msg=audit(1162976669.786:1683): avc: denied { getattr } for pid=23436 comm="updatedb" name="fs" dev=proc ino=-268435428 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=dir type=SYSCALL msg=audit(1162976669.786:1683): arch=40000003 syscall=196 success=yes exit=0 a0=bfbb3d88 a1=bfbb3b58 a2=239ff4 a3=8ff5247 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976669.786:1683): path="/proc/sys/fs" type=AVC msg=audit(1162976669.786:1684): avc: denied { getattr } for pid=23436 comm="updatedb" name="/" dev=binfmt_misc ino=6641 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:binfmt_misc_fs_t:s0 tclass=dir type=SYSCALL msg=audit(1162976669.786:1684): arch=40000003 syscall=196 success=yes exit=0 a0=bfbb3d88 a1=bfbb3b58 a2=239ff4 a3=8ff524a items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976669.786:1684): path="/proc/sys/fs/binfmt_misc" type=AVC msg=audit(1162976669.786:1685): avc: denied { getattr } for pid=23436 comm="updatedb" name="nfs" dev=dm-0 ino=14437242 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_lib_nfs_t:s0 tclass=dir type=SYSCALL msg=audit(1162976669.786:1685): arch=40000003 syscall=196 success=yes exit=0 a0=bfbb3d88 a1=bfbb3b58 a2=239ff4 a3=8ff5248 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976669.786:1685): path="/var/lib/nfs" type=AVC msg=audit(1162976669.786:1686): avc: denied { getattr } for pid=23436 comm="updatedb" name="/" dev=rpc_pipefs ino=8009 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:rpc_pipefs_t:s0 tclass=dir type=SYSCALL msg=audit(1162976669.786:1686): arch=40000003 syscall=196 success=yes exit=0 a0=bfbb3d88 a1=bfbb3b58 a2=239ff4 a3=8ff524c items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976669.786:1686): path="/var/lib/nfs/rpc_pipefs" type=AVC msg=audit(1162976669.786:1687): avc: denied { getattr } for pid=23436 comm="updatedb" name="media" dev=dm-0 ino=6972769 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:mnt_t:s0 tclass=dir type=SYSCALL msg=audit(1162976669.786:1687): arch=40000003 syscall=196 success=yes exit=0 a0=bfbb3d88 a1=bfbb3b58 a2=239ff4 a3=8ff5242 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976669.786:1687): path="/media" type=AVC msg=audit(1162976669.786:1688): avc: denied { getattr } for pid=23436 comm="updatedb" name="/" dev=hdc ino=3008 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:iso9660_t:s0 tclass=dir type=SYSCALL msg=audit(1162976669.786:1688): arch=40000003 syscall=196 success=yes exit=0 a0=bfbb3d88 a1=bfbb3b58 a2=239ff4 a3=8ff5248 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976669.786:1688): path=2F6D656469612F5761726372616674204949495F type=AVC msg=audit(1162976669.790:1689): avc: denied { search } for pid=23436 comm="updatedb" name="/" dev=sda1 ino=2 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:boot_t:s0 tclass=dir type=SYSCALL msg=audit(1162976669.790:1689): arch=40000003 syscall=12 success=yes exit=0 a0=8ff116d a1=bfbb3ca4 a2=bfbb5f50 a3=8ff116d items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976669.886:1690): avc: denied { getattr } for pid=23436 comm="updatedb" name="lost+found" dev=sda1 ino=11 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:lost_found_t:s0 tclass=dir type=SYSCALL msg=audit(1162976669.886:1690): arch=40000003 syscall=196 success=yes exit=0 a0=8ff15d1 a1=bfbb1ad4 a2=239ff4 a3=bfbb1ad4 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976669.886:1690): path="/boot/lost+found" type=AVC msg=audit(1162976669.898:1691): avc: denied { write } for pid=23436 comm="updatedb" name="mlocate.db.DwVvuL" dev=dm-0 ino=14437015 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:locate_var_lib_t:s0 tclass=file type=SYSCALL msg=audit(1162976669.898:1691): arch=40000003 syscall=4 success=yes exit=4096 a0=4 a1=b7f67000 a2=1000 a3=1000 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976669.898:1691): path="/var/lib/mlocate/mlocate.db.DwVvuL" type=AVC msg=audit(1162976670.038:1692): avc: denied { getattr } for pid=23436 comm="updatedb" name="printconf" dev=dm-0 ino=9331054 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:cupsd_rw_etc_t:s0 tclass=dir type=SYSCALL msg=audit(1162976670.038:1692): arch=40000003 syscall=196 success=yes exit=0 a0=8ff665d a1=bfbad734 a2=239ff4 a3=bfbad734 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976670.038:1692): path="/etc/alchemist/namespace/printconf" type=AVC msg=audit(1162976670.054:1693): avc: denied { getattr } for pid=23436 comm="updatedb" name="pcm" dev=dm-0 ino=9330155 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:alsa_etc_rw_t:s0 tclass=dir type=SYSCALL msg=audit(1162976670.054:1693): arch=40000003 syscall=196 success=yes exit=0 a0=8ff6655 a1=bfbaf904 a2=239ff4 a3=bfbaf904 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976670.054:1693): path="/etc/alsa/pcm" type=AVC msg=audit(1162976670.054:1694): avc: denied { getattr } for pid=23436 comm="updatedb" name="amanda" dev=dm-0 ino=11425219 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:amanda_config_t:s0 tclass=dir type=SYSCALL msg=audit(1162976670.054:1694): arch=40000003 syscall=196 success=yes exit=0 a0=8ff6409 a1=bfbb1ad4 a2=239ff4 a3=bfbb1ad4 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976670.054:1694): path="/etc/amanda" type=AVC msg=audit(1162976670.066:1695): avc: denied { search } for pid=23436 comm="updatedb" name="amanda" dev=dm-0 ino=11425219 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:amanda_config_t:s0 tclass=dir type=SYSCALL msg=audit(1162976670.066:1695): arch=40000003 syscall=12 success=yes exit=0 a0=8ff6409 a1=bfbb1ad4 a2=bfbb3d80 a3=8ff6409 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976670.090:1696): avc: denied { getattr } for pid=23436 comm="updatedb" name="audit" dev=dm-0 ino=11494585 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:auditd_etc_t:s0 tclass=dir type=SYSCALL msg=audit(1162976670.090:1696): arch=40000003 syscall=196 success=yes exit=0 a0=8ff13e1 a1=bfbb1ad4 a2=239ff4 a3=bfbb1ad4 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976670.090:1696): path="/etc/audit" type=AVC msg=audit(1162976670.090:1697): avc: denied { getattr } for pid=23436 comm="updatedb" name="blkid" dev=dm-0 ino=9330183 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:etc_runtime_t:s0 tclass=dir type=SYSCALL msg=audit(1162976670.090:1697): arch=40000003 syscall=196 success=yes exit=0 a0=8ff14d5 a1=bfbb1ad4 a2=239ff4 a3=bfbb1ad4 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976670.090:1697): path="/etc/blkid" type=AVC msg=audit(1162976670.102:1698): avc: denied { getattr } for pid=23436 comm="updatedb" name="bluetooth" dev=dm-0 ino=9330923 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bluetooth_conf_t:s0 tclass=dir type=SYSCALL msg=audit(1162976670.102:1698): arch=40000003 syscall=196 success=yes exit=0 a0=8ff6281 a1=bfbb1ad4 a2=239ff4 a3=bfbb1ad4 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976670.102:1698): path="/etc/bluetooth" type=AVC msg=audit(1162976670.102:1699): avc: denied { getattr } for pid=23436 comm="updatedb" name="cups" dev=dm-0 ino=9330715 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:cupsd_etc_t:s0 tclass=dir type=SYSCALL msg=audit(1162976670.102:1699): arch=40000003 syscall=196 success=yes exit=0 a0=8ff1589 a1=bfbb1ad4 a2=239ff4 a3=bfbb1ad4 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976670.102:1699): path="/etc/cups" type=AVC msg=audit(1162976670.110:1700): avc: denied { search } for pid=23436 comm="updatedb" name="cups" dev=dm-0 ino=9330715 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:cupsd_etc_t:s0 tclass=dir type=SYSCALL msg=audit(1162976670.110:1700): arch=40000003 syscall=12 success=yes exit=0 a0=8ff1589 a1=bfbb1ad4 a2=bfbb3d80 a3=8ff1589 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976670.118:1701): avc: denied { getattr } for pid=23436 comm="updatedb" name="dbus-1" dev=dm-0 ino=9329778 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:dbusd_etc_t:s0 tclass=dir type=SYSCALL msg=audit(1162976670.118:1701): arch=40000003 syscall=196 success=yes exit=0 a0=8ff1c19 a1=bfbb1ad4 a2=239ff4 a3=bfbb1ad4 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976670.118:1701): path="/etc/dbus-1" type=AVC msg=audit(1162976670.118:1702): avc: denied { search } for pid=23436 comm="updatedb" name="dbus-1" dev=dm-0 ino=9329778 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:dbusd_etc_t:s0 tclass=dir type=SYSCALL msg=audit(1162976670.118:1702): arch=40000003 syscall=12 success=yes exit=0 a0=8ff1c19 a1=bfbb1ad4 a2=bfbb3d80 a3=8ff1c19 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976670.226:1703): avc: denied { getattr } for pid=23436 comm="updatedb" name="hp" dev=dm-0 ino=9330526 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hplip_etc_t:s0 tclass=dir type=SYSCALL msg=audit(1162976670.226:1703): arch=40000003 syscall=196 success=yes exit=0 a0=8ff1c89 a1=bfbb1ad4 a2=239ff4 a3=bfbb1ad4 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976670.226:1703): path="/etc/hp" type=AVC msg=audit(1162976670.230:1704): avc: denied { getattr } for pid=23436 comm="updatedb" name="htdig" dev=dm-0 ino=9362555 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:httpd_sys_content_t:s0 tclass=dir type=SYSCALL msg=audit(1162976670.230:1704): arch=40000003 syscall=196 success=yes exit=0 a0=8ff1e9d a1=bfbb1ad4 a2=239ff4 a3=bfbb1ad4 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976670.230:1704): path="/etc/htdig" type=AVC msg=audit(1162976670.250:1705): avc: denied { getattr } for pid=23436 comm="updatedb" name="httpd" dev=dm-0 ino=9330261 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:httpd_config_t:s0 tclass=dir type=SYSCALL msg=audit(1162976670.250:1705): arch=40000003 syscall=196 success=yes exit=0 a0=8ff13b9 a1=bfbb1ad4 a2=239ff4 a3=bfbb1ad4 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976670.250:1705): path="/etc/httpd" type=AVC msg=audit(1162976670.274:1706): avc: denied { search } for pid=23436 comm="updatedb" name="httpd" dev=dm-0 ino=9330261 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:httpd_config_t:s0 tclass=dir type=SYSCALL msg=audit(1162976670.274:1706): arch=40000003 syscall=12 success=yes exit=0 a0=8ff13b9 a1=bfbb1ad4 a2=bfbb3d80 a3=8ff13b9 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976670.334:1707): avc: denied { getattr } for pid=23436 comm="updatedb" name="lvm" dev=dm-0 ino=9329762 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:lvm_etc_t:s0 tclass=dir type=SYSCALL msg=audit(1162976670.334:1707): arch=40000003 syscall=196 success=yes exit=0 a0=8ff1951 a1=bfbb1ad4 a2=239ff4 a3=bfbb1ad4 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976670.334:1707): path="/etc/lvm" type=AVC msg=audit(1162976670.342:1708): avc: denied { search } for pid=23436 comm="updatedb" name="lvm" dev=dm-0 ino=9329762 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:lvm_etc_t:s0 tclass=dir type=SYSCALL msg=audit(1162976670.342:1708): arch=40000003 syscall=12 success=yes exit=0 a0=8ff1951 a1=bfbb1ad4 a2=bfbb3d80 a3=8ff1951 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976670.342:1709): avc: denied { getattr } for pid=23436 comm="updatedb" name="archive" dev=dm-0 ino=9330266 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:lvm_metadata_t:s0 tclass=dir type=SYSCALL msg=audit(1162976670.342:1709): arch=40000003 syscall=196 success=yes exit=0 a0=8ff6645 a1=bfbaf904 a2=239ff4 a3=bfbaf904 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976670.342:1709): path="/etc/lvm/archive" type=AVC msg=audit(1162976670.346:1710): avc: denied { getattr } for pid=23436 comm="updatedb" name="mail" dev=dm-0 ino=9330776 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:etc_mail_t:s0 tclass=dir type=SYSCALL msg=audit(1162976670.346:1710): arch=40000003 syscall=196 success=yes exit=0 a0=8ff19c5 a1=bfbb1ad4 a2=239ff4 a3=bfbb1ad4 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976670.346:1710): path="/etc/mail" type=AVC msg=audit(1162976670.346:1711): avc: denied { search } for pid=23436 comm="updatedb" name="mail" dev=dm-0 ino=9330776 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:etc_mail_t:s0 tclass=dir type=SYSCALL msg=audit(1162976670.346:1711): arch=40000003 syscall=12 success=yes exit=0 a0=8ff19c5 a1=bfbb1ad4 a2=bfbb3d80 a3=8ff19c5 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976670.358:1712): avc: denied { getattr } for pid=23436 comm="updatedb" name="news" dev=dm-0 ino=11981501 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:innd_etc_t:s0 tclass=dir type=SYSCALL msg=audit(1162976670.358:1712): arch=40000003 syscall=196 success=yes exit=0 a0=8ff1339 a1=bfbb1ad4 a2=239ff4 a3=bfbb1ad4 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976670.358:1712): path="/etc/news" type=AVC msg=audit(1162976670.454:1713): avc: denied { getattr } for pid=23436 comm="updatedb" name="ppp" dev=dm-0 ino=9330491 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:pppd_etc_t:s0 tclass=dir type=SYSCALL msg=audit(1162976670.454:1713): arch=40000003 syscall=196 success=yes exit=0 a0=8ff2071 a1=bfbb1ad4 a2=239ff4 a3=bfbb1ad4 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976670.454:1713): path="/etc/ppp" type=AVC msg=audit(1162976670.454:1714): avc: denied { search } for pid=23436 comm="updatedb" name="ppp" dev=dm-0 ino=9330491 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:pppd_etc_t:s0 tclass=dir type=SYSCALL msg=audit(1162976670.454:1714): arch=40000003 syscall=12 success=yes exit=0 a0=8ff2071 a1=bfbb1ad4 a2=bfbb3d80 a3=8ff2071 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976670.454:1715): avc: denied { getattr } for pid=23436 comm="updatedb" name="peers" dev=dm-0 ino=9330497 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:pppd_etc_rw_t:s0 tclass=dir type=SYSCALL msg=audit(1162976670.454:1715): arch=40000003 syscall=196 success=yes exit=0 a0=8ff6719 a1=bfbaf904 a2=239ff4 a3=bfbaf904 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976670.454:1715): path="/etc/ppp/peers" type=AVC msg=audit(1162976670.466:1716): avc: denied { read } for pid=23436 comm="updatedb" name="ppp" dev=dm-0 ino=9330491 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:pppd_etc_t:s0 tclass=dir type=SYSCALL msg=audit(1162976670.466:1716): arch=40000003 syscall=5 success=yes exit=8 a0=804dc02 a1=8000 a2=0 a3=8000 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976670.466:1717): avc: denied { search } for pid=23436 comm="updatedb" name="peers" dev=dm-0 ino=9330497 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:pppd_etc_rw_t:s0 tclass=dir type=SYSCALL msg=audit(1162976670.466:1717): arch=40000003 syscall=12 success=yes exit=0 a0=8ff6719 a1=8000 a2=bfbb1bb0 a3=8ff6719 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976670.482:1718): avc: denied { getattr } for pid=23436 comm="updatedb" name="racoon" dev=dm-0 ino=9330979 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:ipsec_conf_file_t:s0 tclass=dir type=SYSCALL msg=audit(1162976670.482:1718): arch=40000003 syscall=196 success=yes exit=0 a0=8ff15b1 a1=bfbb1ad4 a2=239ff4 a3=bfbb1ad4 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976670.482:1718): path="/etc/racoon" type=AVC msg=audit(1162976670.486:1719): avc: denied { search } for pid=23436 comm="updatedb" name="racoon" dev=dm-0 ino=9330979 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:ipsec_conf_file_t:s0 tclass=dir type=SYSCALL msg=audit(1162976670.486:1719): arch=40000003 syscall=12 success=yes exit=0 a0=8ff15b1 a1=bfbb1ad4 a2=bfbb3d80 a3=8ff15b1 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976670.486:1720): avc: denied { getattr } for pid=23436 comm="updatedb" name="certs" dev=dm-0 ino=9330980 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:ipsec_key_file_t:s0 tclass=dir type=SYSCALL msg=audit(1162976670.486:1720): arch=40000003 syscall=196 success=yes exit=0 a0=8ff6639 a1=bfbaf904 a2=239ff4 a3=bfbaf904 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976670.486:1720): path="/etc/racoon/certs" type=AVC msg=audit(1162976670.522:1721): avc: denied { getattr } for pid=23436 comm="updatedb" name="samba" dev=dm-0 ino=9330307 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:samba_etc_t:s0 tclass=dir type=SYSCALL msg=audit(1162976670.522:1721): arch=40000003 syscall=196 success=yes exit=0 a0=8ff1765 a1=bfbb1ad4 a2=239ff4 a3=bfbb1ad4 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976670.522:1721): path="/etc/samba" type=AVC msg=audit(1162976670.522:1722): avc: denied { getattr } for pid=23436 comm="updatedb" name="console.apps" dev=dm-0 ino=9330284 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:userhelper_conf_t:s0 tclass=dir type=SYSCALL msg=audit(1162976670.522:1722): arch=40000003 syscall=196 success=yes exit=0 a0=8ff6661 a1=bfbaf904 a2=239ff4 a3=bfbaf904 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976670.522:1722): path="/etc/security/console.apps" type=AVC msg=audit(1162976670.538:1723): avc: denied { getattr } for pid=23436 comm="updatedb" name="files" dev=dm-0 ino=9334527 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_context_t:s0 tclass=dir type=SYSCALL msg=audit(1162976670.538:1723): arch=40000003 syscall=196 success=yes exit=0 a0=8ff674d a1=bfbab564 a2=239ff4 a3=bfbab564 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976670.538:1723): path="/etc/selinux/strict/contexts/files" type=AVC msg=audit(1162976670.554:1724): avc: denied { getattr } for pid=23436 comm="updatedb" name="active" dev=dm-0 ino=9334708 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=staff_u:object_r:semanage_store_t:s0 tclass=dir type=SYSCALL msg=audit(1162976670.554:1724): arch=40000003 syscall=196 success=yes exit=0 a0=8ff66dd a1=bfbab564 a2=239ff4 a3=bfbab564 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976670.554:1724): path="/etc/selinux/strict/modules/active" type=AVC msg=audit(1162976670.566:1725): avc: denied { search } for pid=23436 comm="updatedb" name="active" dev=dm-0 ino=9334708 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=staff_u:object_r:semanage_store_t:s0 tclass=dir type=SYSCALL msg=audit(1162976670.566:1725): arch=40000003 syscall=12 success=yes exit=0 a0=8ff66dd a1=8000 a2=bfbad810 a3=8ff66dd items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976670.586:1726): avc: denied { getattr } for pid=23436 comm="updatedb" name="policy" dev=dm-0 ino=9334538 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:policy_config_t:s0 tclass=dir type=SYSCALL msg=audit(1162976670.586:1726): arch=40000003 syscall=196 success=yes exit=0 a0=8ff66ad a1=bfbad734 a2=239ff4 a3=bfbad734 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976670.586:1726): path="/etc/selinux/strict/policy" type=AVC msg=audit(1162976670.658:1727): avc: denied { getattr } for pid=23436 comm="updatedb" name="active" dev=dm-0 ino=9331999 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=user_u:object_r:semanage_store_t:s0 tclass=dir type=SYSCALL msg=audit(1162976670.658:1727): arch=40000003 syscall=196 success=yes exit=0 a0=8ff66f9 a1=bfbab564 a2=239ff4 a3=bfbab564 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976670.658:1727): path="/etc/selinux/targeted/modules/active" type=AVC msg=audit(1162976670.678:1728): avc: denied { search } for pid=23436 comm="updatedb" name="active" dev=dm-0 ino=9331999 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=user_u:object_r:semanage_store_t:s0 tclass=dir type=SYSCALL msg=audit(1162976670.678:1728): arch=40000003 syscall=12 success=yes exit=0 a0=8ff66f9 a1=8000 a2=bfbad810 a3=8ff66f9 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976670.686:1729): avc: denied { getattr } for pid=23436 comm="updatedb" name="previous" dev=dm-0 ino=9331688 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:semanage_store_t:s0 tclass=dir type=SYSCALL msg=audit(1162976670.686:1729): arch=40000003 syscall=196 success=yes exit=0 a0=8ff6705 a1=bfbab564 a2=239ff4 a3=bfbab564 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976670.686:1729): path="/etc/selinux/targeted/modules/previous" type=AVC msg=audit(1162976670.698:1730): avc: denied { search } for pid=23436 comm="updatedb" name="previous" dev=dm-0 ino=9331688 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:semanage_store_t:s0 tclass=dir type=SYSCALL msg=audit(1162976670.698:1730): arch=40000003 syscall=12 success=yes exit=0 a0=8ff6705 a1=bfbab564 a2=bfbad810 a3=8ff6705 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976670.722:1731): avc: denied { getattr } for pid=23436 comm="updatedb" name="stunnel" dev=dm-0 ino=9330593 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:stunnel_etc_t:s0 tclass=dir type=SYSCALL msg=audit(1162976670.722:1731): arch=40000003 syscall=196 success=yes exit=0 a0=8ff65d9 a1=bfbb1ad4 a2=239ff4 a3=bfbb1ad4 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976670.722:1731): path="/etc/stunnel" type=AVC msg=audit(1162976670.926:1732): avc: denied { getattr } for pid=23436 comm="updatedb" name=".kde" dev=dm-0 ino=14640795 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=user_u:object_r:user_home_t:s0 tclass=dir type=SYSCALL msg=audit(1162976670.926:1732): arch=40000003 syscall=196 success=yes exit=0 a0=8ff12d5 a1=bfbaf904 a2=239ff4 a3=bfbaf904 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976670.926:1732): path="/home/foo/.kde" type=AVC msg=audit(1162976670.966:1733): avc: denied { search } for pid=23436 comm="updatedb" name=".kde" dev=dm-0 ino=14640795 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=user_u:object_r:user_home_t:s0 tclass=dir type=SYSCALL msg=audit(1162976670.966:1733): arch=40000003 syscall=12 success=yes exit=0 a0=8ff12d5 a1=8000 a2=bfbb1bb0 a3=8ff12d5 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976670.966:1734): avc: denied { getattr } for pid=23436 comm="updatedb" name=".AbiSuite" dev=dm-0 ino=6579948 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=staff_u:object_r:staff_home_t:s0 tclass=dir type=SYSCALL msg=audit(1162976670.966:1734): arch=40000003 syscall=196 success=yes exit=0 a0=8ff196d a1=bfbaf904 a2=239ff4 a3=bfbaf904 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976670.966:1734): path="/home/kmacmill/.AbiSuite" type=AVC msg=audit(1162976670.990:1735): avc: denied { search } for pid=23436 comm="updatedb" name=".Trash" dev=dm-0 ino=6547233 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=staff_u:object_r:staff_home_t:s0 tclass=dir type=SYSCALL msg=audit(1162976670.990:1735): arch=40000003 syscall=12 success=yes exit=0 a0=8ff17fd a1=8000 a2=bfbb1bb0 a3=8ff17fd items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976670.990:1736): avc: denied { read } for pid=23436 comm="updatedb" name=".Trash" dev=dm-0 ino=6547233 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=staff_u:object_r:staff_home_t:s0 tclass=dir type=SYSCALL msg=audit(1162976670.990:1736): arch=40000003 syscall=5 success=yes exit=9 a0=804dc02 a1=8000 a2=0 a3=8000 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976672.098:1737): avc: denied { getattr } for pid=23436 comm="updatedb" name=".camel_certs" dev=dm-0 ino=6809377 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=staff_u:object_r:staff_evolution_home_t:s0 tclass=dir type=SYSCALL msg=audit(1162976672.098:1737): arch=40000003 syscall=196 success=yes exit=0 a0=8ff158d a1=bfbaf904 a2=239ff4 a3=bfbaf904 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976672.098:1737): path="/home/kmacmill/.camel_certs" type=AVC msg=audit(1162976673.006:1738): avc: denied { search } for pid=23436 comm="updatedb" name=".evolution" dev=dm-0 ino=6776355 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=staff_u:object_r:staff_evolution_home_t:s0 tclass=dir type=SYSCALL msg=audit(1162976673.006:1738): arch=40000003 syscall=12 success=yes exit=0 a0=8ff1389 a1=bfbaf904 a2=bfbb1bb0 a3=8ff1389 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976673.006:1739): avc: denied { read } for pid=23436 comm="updatedb" name=".evolution" dev=dm-0 ino=6776355 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=staff_u:object_r:staff_evolution_home_t:s0 tclass=dir type=SYSCALL msg=audit(1162976673.006:1739): arch=40000003 syscall=5 success=yes exit=9 a0=804dc02 a1=18800 a2=bfbaf7cc a3=8ff6248 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976673.491:1740): avc: denied { getattr } for pid=23436 comm="updatedb" name=".fonts" dev=dm-0 ino=6612820 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=staff_u:object_r:staff_fonts_t:s0 tclass=dir type=SYSCALL msg=audit(1162976673.491:1740): arch=40000003 syscall=196 success=yes exit=0 a0=8ff1301 a1=bfbaf904 a2=239ff4 a3=bfbaf904 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976673.491:1740): path="/home/kmacmill/.fonts" type=AVC msg=audit(1162976675.011:1741): avc: denied { getattr } for pid=23436 comm="updatedb" name=".gnupg" dev=dm-0 ino=6814310 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=staff_u:object_r:staff_gpg_secret_t:s0 tclass=dir type=SYSCALL msg=audit(1162976675.011:1741): arch=40000003 syscall=196 success=yes exit=0 a0=8ff18a5 a1=bfbaf904 a2=239ff4 a3=bfbaf904 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976675.011:1741): path="/home/kmacmill/.gnupg" type=AVC msg=audit(1162976675.467:1742): avc: denied { getattr } for pid=23436 comm="updatedb" name=".java" dev=dm-0 ino=6781792 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=staff_u:object_r:staff_mozilla_home_t:s0 tclass=dir type=SYSCALL msg=audit(1162976675.467:1742): arch=40000003 syscall=196 success=yes exit=0 a0=8ff1999 a1=bfbaf904 a2=239ff4 a3=bfbaf904 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976675.467:1742): path="/home/kmacmill/.java" type=AVC msg=audit(1162976675.467:1743): avc: denied { search } for pid=23436 comm="updatedb" name=".java" dev=dm-0 ino=6781792 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=staff_u:object_r:staff_mozilla_home_t:s0 tclass=dir type=SYSCALL msg=audit(1162976675.467:1743): arch=40000003 syscall=12 success=yes exit=0 a0=8ff1999 a1=bfbaf904 a2=bfbb1bb0 a3=8ff1999 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976675.467:1744): avc: denied { read } for pid=23436 comm="updatedb" name=".java" dev=dm-0 ino=6781792 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=staff_u:object_r:staff_mozilla_home_t:s0 tclass=dir type=SYSCALL msg=audit(1162976675.467:1744): arch=40000003 syscall=5 success=yes exit=9 a0=804dc02 a1=8000 a2=0 a3=8000 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976676.563:1745): avc: denied { getattr } for pid=23436 comm="updatedb" name=".mplayer" dev=dm-0 ino=6843133 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=staff_u:object_r:staff_mplayer_home_t:s0 tclass=dir type=SYSCALL msg=audit(1162976676.563:1745): arch=40000003 syscall=196 success=yes exit=0 a0=8ff18bd a1=bfbaf904 a2=239ff4 a3=bfbaf904 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976676.563:1745): path="/home/kmacmill/.mplayer" type=AVC msg=audit(1162976676.751:1746): avc: denied { getattr } for pid=23436 comm="updatedb" name=".spamassassin" dev=dm-0 ino=6810443 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=staff_u:object_r:staff_spamassassin_home_t:s0 tclass=dir type=SYSCALL msg=audit(1162976676.751:1746): arch=40000003 syscall=196 success=yes exit=0 a0=8ff1705 a1=bfbaf904 a2=239ff4 a3=bfbaf904 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976676.751:1746): path="/home/kmacmill/.spamassassin" type=AVC msg=audit(1162976676.775:1747): avc: denied { getattr } for pid=23436 comm="updatedb" name=".ssh" dev=dm-0 ino=6579939 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=staff_u:object_r:staff_home_ssh_t:s0 tclass=dir type=SYSCALL msg=audit(1162976676.775:1747): arch=40000003 syscall=196 success=yes exit=0 a0=8ff130d a1=bfbaf904 a2=239ff4 a3=bfbaf904 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976676.775:1747): path="/home/kmacmill/.ssh" type=AVC msg=audit(1162976677.067:1748): avc: denied { getattr } for pid=23436 comm="updatedb" name=".thunderbird" dev=dm-0 ino=6783128 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=staff_u:object_r:staff_thunderbird_home_t:s0 tclass=dir type=SYSCALL msg=audit(1162976677.067:1748): arch=40000003 syscall=196 success=yes exit=0 a0=8ff1505 a1=bfbaf904 a2=239ff4 a3=bfbaf904 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976677.067:1748): path="/home/kmacmill/.thunderbird" type=AVC msg=audit(1162976677.067:1749): avc: denied { search } for pid=23436 comm="updatedb" name=".thunderbird" dev=dm-0 ino=6783128 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=staff_u:object_r:staff_thunderbird_home_t:s0 tclass=dir type=SYSCALL msg=audit(1162976677.067:1749): arch=40000003 syscall=12 success=yes exit=0 a0=8ff1505 a1=bfbaf904 a2=bfbb1bb0 a3=8ff1505 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976677.067:1750): avc: denied { read } for pid=23436 comm="updatedb" name=".thunderbird" dev=dm-0 ino=6783128 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=staff_u:object_r:staff_thunderbird_home_t:s0 tclass=dir type=SYSCALL msg=audit(1162976677.067:1750): arch=40000003 syscall=5 success=yes exit=9 a0=804dc02 a1=8000 a2=0 a3=8000 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976778.857:1751): avc: denied { getattr } for pid=23436 comm="updatedb" name="modules" dev=dm-0 ino=13716388 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:modules_object_t:s0 tclass=dir type=SYSCALL msg=audit(1162976778.857:1751): arch=40000003 syscall=196 success=yes exit=0 a0=8ff1b39 a1=bfbb1ad4 a2=239ff4 a3=bfbb1ad4 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976778.857:1751): path="/lib/modules" type=AVC msg=audit(1162976778.857:1752): avc: denied { search } for pid=23436 comm="updatedb" name="modules" dev=dm-0 ino=13716388 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:modules_object_t:s0 tclass=dir type=SYSCALL msg=audit(1162976778.857:1752): arch=40000003 syscall=12 success=yes exit=0 a0=8ff1b39 a1=bfbb1ad4 a2=bfbb3d80 a3=8ff1b39 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976778.857:1753): avc: denied { read } for pid=23436 comm="updatedb" name="modules" dev=dm-0 ino=13716388 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:modules_object_t:s0 tclass=dir type=SYSCALL msg=audit(1162976778.857:1753): arch=40000003 syscall=5 success=yes exit=8 a0=804dc02 a1=8000 a2=0 a3=8000 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976779.557:1754): avc: denied { getattr } for pid=23436 comm="updatedb" name="misc" dev=dm-0 ino=13750632 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=user_u:object_r:modules_object_t:s0 tclass=dir type=SYSCALL msg=audit(1162976779.557:1754): arch=40000003 syscall=196 success=yes exit=0 a0=8ff1fe9 a1=bfbad734 a2=239ff4 a3=bfbad734 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976779.557:1754): path="/lib/modules/2.6.17-1.2145_FC5smp/misc" type=AVC msg=audit(1162976783.645:1755): avc: denied { search } for pid=23436 comm="updatedb" name="drivers" dev=dm-0 ino=13716394 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=user_u:object_r:modules_object_t:s0 tclass=dir type=SYSCALL msg=audit(1162976783.645:1755): arch=40000003 syscall=12 success=yes exit=0 a0=8ff7249 a1=8000 a2=bfbad810 a3=8ff7249 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976783.669:1756): avc: denied { read } for pid=23436 comm="updatedb" name="drivers" dev=dm-0 ino=13716394 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=user_u:object_r:modules_object_t:s0 tclass=dir type=SYSCALL msg=audit(1162976783.669:1756): arch=40000003 syscall=5 success=yes exit=11 a0=804dc02 a1=8000 a2=0 a3=8000 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976783.729:1757): avc: denied { getattr } for pid=23436 comm="updatedb" name="fs" dev=proc ino=-268435428 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=dir type=SYSCALL msg=audit(1162976783.729:1757): arch=40000003 syscall=196 success=yes exit=0 a0=bfbb3d88 a1=bfbb3b58 a2=239ff4 a3=8ff5247 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976783.729:1757): path="/proc/sys/fs" type=AVC msg=audit(1162976783.729:1758): avc: denied { search } for pid=23436 comm="updatedb" name="fs" dev=proc ino=-268435428 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=dir type=SYSCALL msg=audit(1162976783.729:1758): arch=40000003 syscall=196 success=yes exit=0 a0=bfbb3d88 a1=bfbb3b58 a2=239ff4 a3=8ff524a items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976783.729:1759): avc: denied { getattr } for pid=23436 comm="updatedb" name="nfs" dev=dm-0 ino=14437242 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_lib_nfs_t:s0 tclass=dir type=SYSCALL msg=audit(1162976783.729:1759): arch=40000003 syscall=196 success=yes exit=0 a0=bfbb3d88 a1=bfbb3b58 a2=239ff4 a3=8ff5248 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976783.729:1759): path="/var/lib/nfs" type=AVC msg=audit(1162976783.729:1760): avc: denied { search } for pid=23436 comm="updatedb" name="nfs" dev=dm-0 ino=14437242 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_lib_nfs_t:s0 tclass=dir type=AVC msg=audit(1162976783.729:1760): avc: denied { getattr } for pid=23436 comm="updatedb" name="/" dev=rpc_pipefs ino=8009 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:rpc_pipefs_t:s0 tclass=dir type=SYSCALL msg=audit(1162976783.729:1760): arch=40000003 syscall=196 success=yes exit=0 a0=bfbb3d88 a1=bfbb3b58 a2=239ff4 a3=8ff524c items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976783.729:1760): path="/var/lib/nfs/rpc_pipefs" type=AVC msg=audit(1162976783.729:1761): avc: denied { getattr } for pid=23436 comm="updatedb" name="windows" dev=dm-0 ino=12178745 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=user_u:object_r:mnt_t:s0 tclass=dir type=SYSCALL msg=audit(1162976783.729:1761): arch=40000003 syscall=196 success=yes exit=0 a0=8ff1275 a1=bfbb1ad4 a2=239ff4 a3=bfbb1ad4 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976783.729:1761): path="/mnt/windows" type=AVC msg=audit(1162976783.865:1762): avc: denied { getattr } for pid=23436 comm="updatedb" name=".Trash" dev=dm-0 ino=13159950 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=root:object_r:user_home_t:s0 tclass=dir type=SYSCALL msg=audit(1162976783.865:1762): arch=40000003 syscall=196 success=yes exit=0 a0=8ff1289 a1=bfbb1ad4 a2=239ff4 a3=bfbb1ad4 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976783.865:1762): path="/root/.Trash" type=AVC msg=audit(1162976783.933:1763): avc: denied { read } for pid=23436 comm="updatedb" name=".ccache" dev=dm-0 ino=13127266 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=user_u:object_r:user_home_t:s0 tclass=dir type=SYSCALL msg=audit(1162976783.933:1763): arch=40000003 syscall=5 success=yes exit=8 a0=804dc02 a1=8000 a2=0 a3=8000 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976784.553:1764): avc: denied { getattr } for pid=23436 comm="updatedb" name=".gconf" dev=dm-0 ino=13127147 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_home_t:s0 tclass=dir type=SYSCALL msg=audit(1162976784.553:1764): arch=40000003 syscall=196 success=yes exit=0 a0=8ff133d a1=bfbb1ad4 a2=239ff4 a3=bfbb1ad4 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976784.553:1764): path="/root/.gconf" type=AVC msg=audit(1162976784.553:1765): avc: denied { search } for pid=23436 comm="updatedb" name=".gconf" dev=dm-0 ino=13127147 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_home_t:s0 tclass=dir type=SYSCALL msg=audit(1162976784.553:1765): arch=40000003 syscall=12 success=yes exit=0 a0=8ff133d a1=bfbb1ad4 a2=bfbb3d80 a3=8ff133d items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976784.553:1766): avc: denied { read } for pid=23436 comm="updatedb" name=".gconf" dev=dm-0 ino=13127147 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_home_t:s0 tclass=dir type=SYSCALL msg=audit(1162976784.553:1766): arch=40000003 syscall=5 success=yes exit=8 a0=804dc02 a1=8000 a2=0 a3=8000 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976784.649:1767): avc: denied { search } for pid=23436 comm="updatedb" name="panel" dev=dm-0 ino=13159964 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=root:object_r:user_home_t:s0 tclass=dir type=SYSCALL msg=audit(1162976784.649:1767): arch=40000003 syscall=12 success=yes exit=0 a0=8ff190d a1=bfbad734 a2=bfbaf9e0 a3=8ff190d items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976784.653:1768): avc: denied { read } for pid=23436 comm="updatedb" name="panel" dev=dm-0 ino=13159964 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=root:object_r:user_home_t:s0 tclass=dir type=SYSCALL msg=audit(1162976784.653:1768): arch=40000003 syscall=5 success=yes exit=10 a0=804dc02 a1=8000 a2=0 a3=8000 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976784.801:1769): avc: denied { getattr } for pid=23436 comm="updatedb" name=".mozilla" dev=dm-0 ino=13127150 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=root:object_r:user_mozilla_home_t:s0 tclass=dir type=SYSCALL msg=audit(1162976784.801:1769): arch=40000003 syscall=196 success=yes exit=0 a0=8ff1415 a1=bfbb1ad4 a2=239ff4 a3=bfbb1ad4 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976784.801:1769): path="/root/.mozilla" type=AVC msg=audit(1162976784.813:1770): avc: denied { getattr } for pid=23436 comm="updatedb" name=".ssh" dev=dm-0 ino=13127265 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=root:object_r:user_home_ssh_t:s0 tclass=dir type=SYSCALL msg=audit(1162976784.813:1770): arch=40000003 syscall=196 success=yes exit=0 a0=8ff148d a1=bfbb1ad4 a2=239ff4 a3=bfbb1ad4 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976784.813:1770): path="/root/.ssh" type=AVC msg=audit(1162976784.845:1771): avc: denied { getattr } for pid=23436 comm="updatedb" name="tftpboot" dev=dm-0 ino=14763937 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:tftpdir_t:s0 tclass=dir type=SYSCALL msg=audit(1162976784.845:1771): arch=40000003 syscall=196 success=yes exit=0 a0=8ff1241 a1=bfbb3ca4 a2=239ff4 a3=bfbb3ca4 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976784.845:1771): path="/tftpboot" type=AVC msg=audit(1162976784.873:1772): avc: denied { search } for pid=23436 comm="updatedb" name="tftpboot" dev=dm-0 ino=14763937 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:tftpdir_t:s0 tclass=dir type=SYSCALL msg=audit(1162976784.873:1772): arch=40000003 syscall=12 success=yes exit=0 a0=8ff1241 a1=bfbb3ca4 a2=bfbb5f50 a3=8ff1241 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976784.873:1773): avc: denied { getattr } for pid=23436 comm="updatedb" name="pxelinux.cfg" dev=dm-0 ino=14763989 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=user_u:object_r:tftpdir_t:s0 tclass=dir type=SYSCALL msg=audit(1162976784.873:1773): arch=40000003 syscall=196 success=yes exit=0 a0=8ff1295 a1=bfbb1ad4 a2=239ff4 a3=bfbb1ad4 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976784.873:1773): path="/tftpboot/pxelinux.cfg" type=AVC msg=audit(1162976788.046:1774): avc: denied { getattr } for pid=23436 comm="updatedb" name="amanda" dev=dm-0 ino=11425231 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:amanda_usr_lib_t:s0 tclass=dir type=SYSCALL msg=audit(1162976788.046:1774): arch=40000003 syscall=196 success=yes exit=0 a0=9009c95 a1=bfbaf904 a2=239ff4 a3=bfbaf904 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976788.046:1774): path="/usr/lib/amanda" type=AVC msg=audit(1162976788.474:1775): avc: denied { getattr } for pid=23436 comm="updatedb" name="games" dev=dm-0 ino=10311856 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:games_exec_t:s0 tclass=dir type=SYSCALL msg=audit(1162976788.474:1775): arch=40000003 syscall=196 success=yes exit=0 a0=8fff39d a1=bfbaf904 a2=239ff4 a3=bfbaf904 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976788.474:1775): path="/usr/lib/games" type=AVC msg=audit(1162976789.082:1776): avc: denied { getattr } for pid=23436 comm="updatedb" name="httpd" dev=dm-0 ino=10640259 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:httpd_modules_t:s0 tclass=dir type=SYSCALL msg=audit(1162976789.082:1776): arch=40000003 syscall=196 success=yes exit=0 a0=8ff7cf5 a1=bfbaf904 a2=239ff4 a3=bfbaf904 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976789.082:1776): path="/usr/lib/httpd" type=AVC msg=audit(1162976789.082:1777): avc: denied { search } for pid=23436 comm="updatedb" name="httpd" dev=dm-0 ino=10640259 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:httpd_modules_t:s0 tclass=dir type=SYSCALL msg=audit(1162976789.082:1777): arch=40000003 syscall=12 success=yes exit=0 a0=8ff7cf5 a1=bfbaf904 a2=bfbb1bb0 a3=8ff7cf5 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976802.927:1778): avc: denied { getattr } for pid=23436 comm="updatedb" name="settings" dev=dm-0 ino=10575168 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:xdm_var_run_t:s0 tclass=dir type=SYSCALL msg=audit(1162976802.927:1778): arch=40000003 syscall=196 success=yes exit=0 a0=900b2f5 a1=bfbab564 a2=239ff4 a3=bfbab564 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976802.927:1778): path="/usr/lib/qt-3.3/etc/settings" type=AVC msg=audit(1162976805.899:1779): avc: denied { getattr } for pid=23436 comm="updatedb" name="fonts" dev=dm-0 ino=12407306 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:fonts_t:s0 tclass=dir type=SYSCALL msg=audit(1162976805.899:1779): arch=40000003 syscall=196 success=yes exit=0 a0=8ff1429 a1=bfbad734 a2=239ff4 a3=bfbad734 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976805.899:1779): path="/usr/local/share/fonts" type=AVC msg=audit(1162976805.899:1780): avc: denied { search } for pid=23436 comm="updatedb" name="fonts" dev=dm-0 ino=12407306 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:fonts_t:s0 tclass=dir type=SYSCALL msg=audit(1162976805.899:1780): arch=40000003 syscall=12 success=yes exit=0 a0=8ff1429 a1=bfbad734 a2=bfbaf9e0 a3=8ff1429 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976805.947:1781): avc: denied { getattr } for pid=23436 comm="updatedb" name="src" dev=dm-0 ino=10311882 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:src_t:s0 tclass=dir type=SYSCALL msg=audit(1162976805.947:1781): arch=40000003 syscall=196 success=yes exit=0 a0=8ff13e5 a1=bfbaf904 a2=239ff4 a3=bfbaf904 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976805.947:1781): path="/usr/local/src" type=AVC msg=audit(1162976809.203:1782): avc: denied { getattr } for pid=23436 comm="updatedb" name="cracklib" dev=dm-0 ino=10442892 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:crack_db_t:s0 tclass=dir type=SYSCALL msg=audit(1162976809.203:1782): arch=40000003 syscall=196 success=yes exit=0 a0=8ff166d a1=bfbaf904 a2=239ff4 a3=bfbaf904 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976809.203:1782): path="/usr/share/cracklib" type=AVC msg=audit(1162976809.307:1783): avc: denied { read } for pid=23436 comm="updatedb" name="cups" dev=dm-0 ino=10738055 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:cupsd_etc_t:s0 tclass=dir type=SYSCALL msg=audit(1162976809.307:1783): arch=40000003 syscall=5 success=yes exit=9 a0=804dc02 a1=8000 a2=0 a3=8000 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976809.995:1784): avc: denied { read } for pid=23436 comm="updatedb" name="fonts" dev=dm-0 ino=10541654 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:fonts_t:s0 tclass=dir type=SYSCALL msg=audit(1162976809.995:1784): arch=40000003 syscall=5 success=yes exit=9 a0=804dc02 a1=8000 a2=0 a3=8000 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976811.091:1785): avc: denied { getattr } for pid=23436 comm="updatedb" name="hwdata" dev=dm-0 ino=10607875 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hwdata_t:s0 tclass=dir type=SYSCALL msg=audit(1162976811.091:1785): arch=40000003 syscall=196 success=yes exit=0 a0=8ff1d01 a1=bfbaf904 a2=239ff4 a3=bfbaf904 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976811.091:1785): path="/usr/share/hwdata" type=AVC msg=audit(1162976811.095:1786): avc: denied { search } for pid=23436 comm="updatedb" name="hwdata" dev=dm-0 ino=10607875 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hwdata_t:s0 tclass=dir type=SYSCALL msg=audit(1162976811.095:1786): arch=40000003 syscall=12 success=yes exit=0 a0=8ff1d01 a1=bfbaf904 a2=bfbb1bb0 a3=8ff1d01 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976823.180:1787): avc: denied { search } for pid=23436 comm="updatedb" name="src" dev=dm-0 ino=10311902 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:src_t:s0 tclass=dir type=SYSCALL msg=audit(1162976823.180:1787): arch=40000003 syscall=12 success=yes exit=0 a0=8ff131d a1=bfbb1ad4 a2=bfbb3d80 a3=8ff131d items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976823.180:1788): avc: denied { getattr } for pid=23436 comm="updatedb" name="kernels" dev=dm-0 ino=11655090 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=user_u:object_r:src_t:s0 tclass=dir type=SYSCALL msg=audit(1162976823.180:1788): arch=40000003 syscall=196 success=yes exit=0 a0=8ff1335 a1=bfbaf904 a2=239ff4 a3=bfbaf904 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976823.180:1788): path="/usr/src/kernels" type=AVC msg=audit(1162976823.180:1789): avc: denied { read } for pid=23436 comm="updatedb" name="src" dev=dm-0 ino=10311902 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:src_t:s0 tclass=dir type=SYSCALL msg=audit(1162976823.180:1789): arch=40000003 syscall=5 success=yes exit=8 a0=804dc02 a1=8000 a2=0 a3=8000 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976823.180:1790): avc: denied { search } for pid=23436 comm="updatedb" name="kernels" dev=dm-0 ino=11655090 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=user_u:object_r:src_t:s0 tclass=dir type=SYSCALL msg=audit(1162976823.180:1790): arch=40000003 syscall=12 success=yes exit=0 a0=8ff1335 a1=8000 a2=bfbb1bb0 a3=8ff1335 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976823.180:1791): avc: denied { read } for pid=23436 comm="updatedb" name="kernels" dev=dm-0 ino=11655090 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=user_u:object_r:src_t:s0 tclass=dir type=SYSCALL msg=audit(1162976823.180:1791): arch=40000003 syscall=5 success=yes exit=9 a0=804dc02 a1=8000 a2=0 a3=8000 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976832.540:1792): avc: denied { getattr } for pid=23436 comm="updatedb" name="account" dev=dm-0 ino=14437046 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:acct_data_t:s0 tclass=dir type=SYSCALL msg=audit(1162976832.540:1792): arch=40000003 syscall=196 success=yes exit=0 a0=8ff1275 a1=bfbb1ad4 a2=239ff4 a3=bfbb1ad4 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976832.540:1792): path="/var/account" type=AVC msg=audit(1162976832.560:1793): avc: denied { search } for pid=23436 comm="updatedb" name="printconf.local" dev=dm-0 ino=14436630 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:cupsd_rw_etc_t:s0 tclass=dir type=SYSCALL msg=audit(1162976832.560:1793): arch=40000003 syscall=12 success=yes exit=0 a0=8ff1431 a1=8000 a2=bfbaf9e0 a3=8ff1431 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976832.564:1794): avc: denied { getattr } for pid=23436 comm="updatedb" name="cups" dev=dm-0 ino=14534811 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=user_u:object_r:cupsd_rw_etc_t:s0 tclass=dir type=SYSCALL msg=audit(1162976832.564:1794): arch=40000003 syscall=196 success=yes exit=0 a0=8ff13b1 a1=bfbaf904 a2=239ff4 a3=bfbaf904 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976832.564:1794): path="/var/cache/cups" type=AVC msg=audit(1162976832.820:1795): avc: denied { getattr } for pid=23436 comm="updatedb" name="cvs" dev=dm-0 ino=14731350 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:cvs_data_t:s0 tclass=dir type=SYSCALL msg=audit(1162976832.820:1795): arch=40000003 syscall=196 success=yes exit=0 a0=8ff129d a1=bfbb1ad4 a2=239ff4 a3=bfbb1ad4 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976832.820:1795): path="/var/cvs" type=AVC msg=audit(1162976832.868:1796): avc: denied { getattr } for pid=23436 comm="updatedb" name="gdm" dev=dm-0 ino=14437234 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:xserver_log_t:s0 tclass=dir type=SYSCALL msg=audit(1162976832.868:1796): arch=40000003 syscall=196 success=yes exit=0 a0=8ff12c9 a1=bfbb1ad4 a2=239ff4 a3=bfbb1ad4 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976832.868:1796): path="/var/gdm" type=AVC msg=audit(1162976832.868:1797): avc: denied { search } for pid=23436 comm="updatedb" name="gdm" dev=dm-0 ino=14437234 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:xserver_log_t:s0 tclass=dir type=SYSCALL msg=audit(1162976832.868:1797): arch=40000003 syscall=12 success=yes exit=0 a0=8ff12c9 a1=bfbb1ad4 a2=bfbb3d80 a3=8ff12c9 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976832.888:1798): avc: denied { getattr } for pid=23436 comm="updatedb" name="alternatives" dev=dm-0 ino=14436621 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:rpm_var_lib_t:s0 tclass=dir type=SYSCALL msg=audit(1162976832.888:1798): arch=40000003 syscall=196 success=yes exit=0 a0=8ff1395 a1=bfbaf904 a2=239ff4 a3=bfbaf904 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976832.888:1798): path="/var/lib/alternatives" type=AVC msg=audit(1162976832.888:1799): avc: denied { getattr } for pid=23436 comm="updatedb" name="amanda" dev=dm-0 ino=14534972 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:amanda_var_lib_t:s0 tclass=dir type=SYSCALL msg=audit(1162976832.888:1799): arch=40000003 syscall=196 success=yes exit=0 a0=8ff13a9 a1=bfbaf904 a2=239ff4 a3=bfbaf904 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976832.888:1799): path="/var/lib/amanda" type=AVC msg=audit(1162976832.892:1800): avc: denied { read } for pid=23436 comm="updatedb" name="lib" dev=dm-0 ino=14436578 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_lib_t:s0 tclass=dir type=SYSCALL msg=audit(1162976832.892:1800): arch=40000003 syscall=5 success=yes exit=8 a0=804dc02 a1=8000 a2=0 a3=8000 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976832.892:1801): avc: denied { search } for pid=23436 comm="updatedb" name="amanda" dev=dm-0 ino=14534972 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:amanda_var_lib_t:s0 tclass=dir type=SYSCALL msg=audit(1162976832.892:1801): arch=40000003 syscall=12 success=yes exit=0 a0=8ff13a9 a1=8000 a2=bfbb1bb0 a3=8ff13a9 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976832.892:1802): avc: denied { getattr } for pid=23436 comm="updatedb" name="DailySet1" dev=dm-0 ino=14534978 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:amanda_data_t:s0 tclass=dir type=SYSCALL msg=audit(1162976832.892:1802): arch=40000003 syscall=196 success=yes exit=0 a0=8ff1545 a1=bfbad734 a2=239ff4 a3=bfbad734 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976832.892:1802): path="/var/lib/amanda/DailySet1" type=AVC msg=audit(1162976832.904:1803): avc: denied { read } for pid=23436 comm="updatedb" name="amanda" dev=dm-0 ino=14534972 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:amanda_var_lib_t:s0 tclass=dir type=SYSCALL msg=audit(1162976832.904:1803): arch=40000003 syscall=5 success=yes exit=9 a0=804dc02 a1=8000 a2=0 a3=8000 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976832.904:1804): avc: denied { search } for pid=23436 comm="updatedb" name="DailySet1" dev=dm-0 ino=14534978 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:amanda_data_t:s0 tclass=dir type=SYSCALL msg=audit(1162976832.904:1804): arch=40000003 syscall=12 success=yes exit=0 a0=8ff1545 a1=8000 a2=bfbaf9e0 a3=8ff1545 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976832.908:1805): avc: denied { getattr } for pid=23436 comm="updatedb" name="gnutar-lists" dev=dm-0 ino=14534980 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:amanda_gnutarlists_t:s0 tclass=dir type=SYSCALL msg=audit(1162976832.908:1805): arch=40000003 syscall=196 success=yes exit=0 a0=8ff1555 a1=bfbad734 a2=239ff4 a3=bfbad734 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976832.908:1805): path="/var/lib/amanda/gnutar-lists" type=AVC msg=audit(1162976832.908:1806): avc: denied { getattr } for pid=23436 comm="updatedb" name="bluetooth" dev=dm-0 ino=15648230 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bluetooth_var_lib_t:s0 tclass=dir type=SYSCALL msg=audit(1162976832.908:1806): arch=40000003 syscall=196 success=yes exit=0 a0=8ff13b5 a1=bfbaf904 a2=239ff4 a3=bfbaf904 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976832.908:1806): path="/var/lib/bluetooth" type=AVC msg=audit(1162976832.924:1807): avc: denied { search } for pid=23436 comm="updatedb" name="bluetooth" dev=dm-0 ino=15648230 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bluetooth_var_lib_t:s0 tclass=dir type=SYSCALL msg=audit(1162976832.924:1807): arch=40000003 syscall=12 success=yes exit=0 a0=8ff13b5 a1=bfbaf904 a2=bfbb1bb0 a3=8ff13b5 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976832.936:1808): avc: denied { getattr } for pid=23436 comm="updatedb" name="dav" dev=dm-0 ino=14436675 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:httpd_var_lib_t:s0 tclass=dir type=SYSCALL msg=audit(1162976832.936:1808): arch=40000003 syscall=196 success=yes exit=0 a0=8ff13cd a1=bfbaf904 a2=239ff4 a3=bfbaf904 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976832.936:1808): path="/var/lib/dav" type=AVC msg=audit(1162976832.980:1809): avc: denied { getattr } for pid=23436 comm="updatedb" name="dhclient" dev=dm-0 ino=14437064 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:dhcpc_state_t:s0 tclass=dir type=SYSCALL msg=audit(1162976832.980:1809): arch=40000003 syscall=196 success=yes exit=0 a0=8ff13d9 a1=bfbaf904 a2=239ff4 a3=bfbaf904 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976832.980:1809): path="/var/lib/dhclient" type=AVC msg=audit(1162976832.980:1810): avc: denied { getattr } for pid=23436 comm="updatedb" name="dhcpd" dev=dm-0 ino=14607569 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:dhcpd_state_t:s0 tclass=dir type=SYSCALL msg=audit(1162976832.980:1810): arch=40000003 syscall=196 success=yes exit=0 a0=8ff13e9 a1=bfbaf904 a2=239ff4 a3=bfbaf904 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976832.980:1810): path="/var/lib/dhcpd" type=AVC msg=audit(1162976832.988:1811): avc: denied { read } for pid=23436 comm="updatedb" name="nvidia" dev=dm-0 ino=14437025 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=user_u:object_r:var_lib_t:s0 tclass=dir type=SYSCALL msg=audit(1162976832.988:1811): arch=40000003 syscall=5 success=yes exit=10 a0=804dc02 a1=8000 a2=0 a3=8000 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976833.032:1812): avc: denied { getattr } for pid=23436 comm="updatedb" name="games" dev=dm-0 ino=14436607 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:games_data_t:s0 tclass=dir type=SYSCALL msg=audit(1162976833.032:1812): arch=40000003 syscall=196 success=yes exit=0 a0=8ff140d a1=bfbaf904 a2=239ff4 a3=bfbaf904 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976833.032:1812): path="/var/lib/games" type=AVC msg=audit(1162976833.044:1813): avc: denied { search } for pid=23436 comm="updatedb" name="games" dev=dm-0 ino=14436607 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:games_data_t:s0 tclass=dir type=SYSCALL msg=audit(1162976833.044:1813): arch=40000003 syscall=12 success=yes exit=0 a0=8ff140d a1=bfbaf904 a2=bfbb1bb0 a3=8ff140d items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976833.072:1814): avc: denied { getattr } for pid=23436 comm="updatedb" name="mlocate" dev=dm-0 ino=14437049 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:locate_var_lib_t:s0 tclass=dir type=SYSCALL msg=audit(1162976833.072:1814): arch=40000003 syscall=196 success=yes exit=0 a0=8ff1455 a1=bfbaf904 a2=239ff4 a3=bfbaf904 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976833.072:1814): path="/var/lib/mlocate" type=AVC msg=audit(1162976833.072:1815): avc: denied { read } for pid=23436 comm="updatedb" name="mlocate" dev=dm-0 ino=14437049 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:locate_var_lib_t:s0 tclass=dir type=SYSCALL msg=audit(1162976833.072:1815): arch=40000003 syscall=5 success=yes exit=9 a0=804dc02 a1=18800 a2=bfbaf7cc a3=8ff6248 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976833.072:1816): avc: denied { getattr } for pid=23436 comm="updatedb" name="news" dev=dm-0 ino=14607564 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:innd_var_lib_t:s0 tclass=dir type=SYSCALL msg=audit(1162976833.072:1816): arch=40000003 syscall=196 success=yes exit=0 a0=8ff1465 a1=bfbaf904 a2=239ff4 a3=bfbaf904 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976833.072:1816): path="/var/lib/news" type=AVC msg=audit(1162976833.084:1817): avc: denied { search } for pid=23436 comm="updatedb" name="news" dev=dm-0 ino=14607564 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:innd_var_lib_t:s0 tclass=dir type=SYSCALL msg=audit(1162976833.084:1817): arch=40000003 syscall=12 success=yes exit=0 a0=8ff1465 a1=bfbaf904 a2=bfbb1bb0 a3=8ff1465 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976833.112:1818): avc: denied { read } for pid=23436 comm="updatedb" name="nfs" dev=dm-0 ino=14437242 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_lib_nfs_t:s0 tclass=dir type=SYSCALL msg=audit(1162976833.112:1818): arch=40000003 syscall=5 success=yes exit=9 a0=804dc02 a1=8000 a2=0 a3=8000 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976833.132:1819): avc: denied { getattr } for pid=23436 comm="updatedb" name="ntp" dev=dm-0 ino=14436930 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:ntp_drift_t:s0 tclass=dir type=SYSCALL msg=audit(1162976833.132:1819): arch=40000003 syscall=196 success=yes exit=0 a0=8ff147d a1=bfbaf904 a2=239ff4 a3=bfbaf904 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976833.132:1819): path="/var/lib/ntp" type=AVC msg=audit(1162976833.164:1820): avc: denied { getattr } for pid=23436 comm="updatedb" name="setroubleshoot" dev=dm-0 ino=15287756 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:setroubleshoot_var_lib_t:s0 tclass=dir type=SYSCALL msg=audit(1162976833.164:1820): arch=40000003 syscall=196 success=yes exit=0 a0=8ff14c9 a1=bfbaf904 a2=239ff4 a3=bfbaf904 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976833.164:1820): path="/var/lib/setroubleshoot" type=AVC msg=audit(1162976833.200:1821): avc: denied { getattr } for pid=23436 comm="updatedb" name="texmf" dev=dm-0 ino=14731201 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:tetex_data_t:s0 tclass=dir type=SYSCALL msg=audit(1162976833.200:1821): arch=40000003 syscall=196 success=yes exit=0 a0=8ff14ed a1=bfbaf904 a2=239ff4 a3=bfbaf904 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976833.200:1821): path="/var/lib/texmf" type=AVC msg=audit(1162976833.200:1822): avc: denied { search } for pid=23436 comm="updatedb" name="texmf" dev=dm-0 ino=14731201 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:tetex_data_t:s0 tclass=dir type=SYSCALL msg=audit(1162976833.200:1822): arch=40000003 syscall=12 success=yes exit=0 a0=8ff14ed a1=bfbaf904 a2=bfbb1bb0 a3=8ff14ed items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976833.200:1823): avc: denied { read } for pid=23436 comm="updatedb" name="texmf" dev=dm-0 ino=14731201 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:tetex_data_t:s0 tclass=dir type=SYSCALL msg=audit(1162976833.200:1823): arch=40000003 syscall=5 success=yes exit=9 a0=804dc02 a1=18800 a2=bfbaf7cc a3=8ff6248 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976833.304:1824): avc: denied { getattr } for pid=23436 comm="updatedb" name="xen" dev=dm-0 ino=14534807 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:xend_var_lib_t:s0 tclass=dir type=SYSCALL msg=audit(1162976833.304:1824): arch=40000003 syscall=196 success=yes exit=0 a0=8ff1509 a1=bfbaf904 a2=239ff4 a3=bfbaf904 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976833.304:1824): path="/var/lib/xen" type=AVC msg=audit(1162976833.304:1825): avc: denied { search } for pid=23436 comm="updatedb" name="xen" dev=dm-0 ino=14534807 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:xend_var_lib_t:s0 tclass=dir type=SYSCALL msg=audit(1162976833.304:1825): arch=40000003 syscall=12 success=yes exit=0 a0=8ff1509 a1=bfbaf904 a2=bfbb1bb0 a3=8ff1509 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976833.328:1826): avc: denied { read } for pid=23436 comm="updatedb" name="xen" dev=dm-0 ino=14534807 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:xend_var_lib_t:s0 tclass=dir type=SYSCALL msg=audit(1162976833.328:1826): arch=40000003 syscall=5 success=yes exit=9 a0=804dc02 a1=8000 a2=0 a3=8000 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976833.328:1827): avc: denied { getattr } for pid=23436 comm="updatedb" name="xenstored" dev=dm-0 ino=14534834 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:xenstored_var_lib_t:s0 tclass=dir type=SYSCALL msg=audit(1162976833.328:1827): arch=40000003 syscall=196 success=yes exit=0 a0=8ff1515 a1=bfbaf904 a2=239ff4 a3=bfbaf904 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976833.328:1827): path="/var/lib/xenstored" type=AVC msg=audit(1162976833.328:1828): avc: denied { getattr } for pid=23436 comm="updatedb" name="xkb" dev=dm-0 ino=14437298 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:xkb_var_lib_t:s0 tclass=dir type=SYSCALL msg=audit(1162976833.328:1828): arch=40000003 syscall=196 success=yes exit=0 a0=8ff1525 a1=bfbaf904 a2=239ff4 a3=bfbaf904 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976833.328:1828): path="/var/lib/xkb" type=AVC msg=audit(1162976833.336:1829): avc: denied { getattr } for pid=23436 comm="updatedb" name="lock" dev=dm-0 ino=14436610 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_lock_t:s0 tclass=dir type=SYSCALL msg=audit(1162976833.336:1829): arch=40000003 syscall=196 success=yes exit=0 a0=8ff12ed a1=bfbb1ad4 a2=239ff4 a3=bfbb1ad4 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976833.336:1829): path="/var/lock" type=AVC msg=audit(1162976833.336:1830): avc: denied { read } for pid=23436 comm="updatedb" name="lock" dev=dm-0 ino=14436610 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_lock_t:s0 tclass=dir type=SYSCALL msg=audit(1162976833.336:1830): arch=40000003 syscall=5 success=yes exit=8 a0=804dc02 a1=18800 a2=bfbb199c a3=8ff40f0 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976833.336:1831): avc: denied { getattr } for pid=23436 comm="updatedb" name="lvm" dev=dm-0 ino=14436627 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:lvm_lock_t:s0 tclass=dir type=SYSCALL msg=audit(1162976833.336:1831): arch=40000003 syscall=196 success=yes exit=0 a0=8ff1395 a1=bfbaf904 a2=239ff4 a3=bfbaf904 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976833.336:1831): path="/var/lock/lvm" type=AVC msg=audit(1162976833.345:1832): avc: denied { getattr } for pid=23436 comm="updatedb" name="amanda" dev=dm-0 ino=14534977 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:amanda_log_t:s0 tclass=dir type=SYSCALL msg=audit(1162976833.345:1832): arch=40000003 syscall=196 success=yes exit=0 a0=8ff1405 a1=bfbaf904 a2=239ff4 a3=bfbaf904 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976833.345:1832): path="/var/log/amanda" type=AVC msg=audit(1162976833.345:1833): avc: denied { getattr } for pid=23436 comm="updatedb" name="audit" dev=dm-0 ino=14469481 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:auditd_log_t:s0 tclass=dir type=SYSCALL msg=audit(1162976833.345:1833): arch=40000003 syscall=196 success=yes exit=0 a0=8ff1451 a1=bfbaf904 a2=239ff4 a3=bfbaf904 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976833.345:1833): path="/var/log/audit" type=AVC msg=audit(1162976833.345:1834): avc: denied { getattr } for pid=23436 comm="updatedb" name="mail" dev=dm-0 ino=14437073 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sendmail_log_t:s0 tclass=dir type=SYSCALL msg=audit(1162976833.345:1834): arch=40000003 syscall=196 success=yes exit=0 a0=8ff1535 a1=bfbaf904 a2=239ff4 a3=bfbaf904 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976833.345:1834): path="/var/log/mail" type=AVC msg=audit(1162976833.345:1835): avc: denied { getattr } for pid=23436 comm="updatedb" name="news" dev=dm-0 ino=14607586 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:innd_log_t:s0 tclass=dir type=SYSCALL msg=audit(1162976833.345:1835): arch=40000003 syscall=196 success=yes exit=0 a0=8ff15e1 a1=bfbaf904 a2=239ff4 a3=bfbaf904 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976833.345:1835): path="/var/log/news" type=AVC msg=audit(1162976833.349:1836): avc: denied { search } for pid=23436 comm="updatedb" name="news" dev=dm-0 ino=14607586 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:innd_log_t:s0 tclass=dir type=SYSCALL msg=audit(1162976833.349:1836): arch=40000003 syscall=12 success=yes exit=0 a0=8ff15e1 a1=8000 a2=bfbb1bb0 a3=8ff15e1 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976833.369:1837): avc: denied { getattr } for pid=23436 comm="updatedb" name="prelink" dev=dm-0 ino=15647814 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:prelink_log_t:s0 tclass=dir type=SYSCALL msg=audit(1162976833.369:1837): arch=40000003 syscall=196 success=yes exit=0 a0=8ff1615 a1=bfbaf904 a2=239ff4 a3=bfbaf904 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976833.369:1837): path="/var/log/prelink" type=AVC msg=audit(1162976833.369:1838): avc: denied { getattr } for pid=23436 comm="updatedb" name="xen" dev=dm-0 ino=14567524 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:xend_var_log_t:s0 tclass=dir type=SYSCALL msg=audit(1162976833.369:1838): arch=40000003 syscall=196 success=yes exit=0 a0=8ff1799 a1=bfbaf904 a2=239ff4 a3=bfbaf904 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976833.369:1838): path="/var/log/xen" type=AVC msg=audit(1162976833.381:1839): avc: denied { getattr } for pid=23436 comm="updatedb" name="named" dev=dm-0 ino=14437060 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:named_zone_t:s0 tclass=dir type=SYSCALL msg=audit(1162976833.381:1839): arch=40000003 syscall=196 success=yes exit=0 a0=8ff1311 a1=bfbb1ad4 a2=239ff4 a3=bfbb1ad4 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976833.381:1839): path="/var/named" type=AVC msg=audit(1162976833.381:1840): avc: denied { search } for pid=23436 comm="updatedb" name="named" dev=dm-0 ino=14437060 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:named_zone_t:s0 tclass=dir type=SYSCALL msg=audit(1162976833.381:1840): arch=40000003 syscall=12 success=yes exit=0 a0=8ff1311 a1=bfbb1ad4 a2=bfbb3d80 a3=8ff1311 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976833.381:1841): avc: denied { getattr } for pid=23436 comm="updatedb" name="chroot" dev=dm-0 ino=14534815 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:named_conf_t:s0 tclass=dir type=SYSCALL msg=audit(1162976833.381:1841): arch=40000003 syscall=196 success=yes exit=0 a0=8ff1395 a1=bfbaf904 a2=239ff4 a3=bfbaf904 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976833.381:1841): path="/var/named/chroot" type=AVC msg=audit(1162976833.381:1842): avc: denied { read } for pid=23436 comm="updatedb" name="named" dev=dm-0 ino=14437060 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:named_zone_t:s0 tclass=dir type=SYSCALL msg=audit(1162976833.381:1842): arch=40000003 syscall=5 success=yes exit=8 a0=804dc02 a1=8000 a2=0 a3=8000 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976833.381:1843): avc: denied { search } for pid=23436 comm="updatedb" name="chroot" dev=dm-0 ino=14534815 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:named_conf_t:s0 tclass=dir type=SYSCALL msg=audit(1162976833.381:1843): arch=40000003 syscall=12 success=yes exit=0 a0=8ff1395 a1=8000 a2=bfbb1bb0 a3=8ff1395 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976833.401:1844): avc: denied { read } for pid=23436 comm="updatedb" name="chroot" dev=dm-0 ino=14534815 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:named_conf_t:s0 tclass=dir type=SYSCALL msg=audit(1162976833.401:1844): arch=40000003 syscall=5 success=yes exit=9 a0=804dc02 a1=8000 a2=0 a3=8000 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976833.401:1845): avc: denied { getattr } for pid=23436 comm="updatedb" name="named" dev=dm-0 ino=14534818 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=user_u:object_r:named_zone_t:s0 tclass=dir type=SYSCALL msg=audit(1162976833.401:1845): arch=40000003 syscall=196 success=yes exit=0 a0=8ff146d a1=bfbab564 a2=239ff4 a3=bfbab564 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976833.401:1845): path="/var/named/chroot/var/named" type=AVC msg=audit(1162976833.417:1846): avc: denied { search } for pid=23436 comm="updatedb" name="named" dev=dm-0 ino=14534818 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=user_u:object_r:named_zone_t:s0 tclass=dir type=SYSCALL msg=audit(1162976833.417:1846): arch=40000003 syscall=12 success=yes exit=0 a0=8ff146d a1=8000 a2=bfbad810 a3=8ff146d items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976833.417:1847): avc: denied { getattr } for pid=23436 comm="updatedb" name="data" dev=dm-0 ino=14534823 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:named_cache_t:s0 tclass=dir type=SYSCALL msg=audit(1162976833.417:1847): arch=40000003 syscall=196 success=yes exit=0 a0=8ff1485 a1=bfba9394 a2=239ff4 a3=bfba9394 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976833.417:1847): path="/var/named/chroot/var/named/data" type=AVC msg=audit(1162976833.441:1848): avc: denied { getattr } for pid=23436 comm="updatedb" name="named" dev=dm-0 ino=14534821 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:named_var_run_t:s0 tclass=dir type=SYSCALL msg=audit(1162976833.441:1848): arch=40000003 syscall=196 success=yes exit=0 a0=8ff1485 a1=bfba9394 a2=239ff4 a3=bfba9394 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976833.441:1848): path="/var/named/chroot/var/run/named" type=AVC msg=audit(1162976833.461:1849): avc: denied { getattr } for pid=23436 comm="updatedb" name="racoon" dev=dm-0 ino=14437084 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:ipsec_var_run_t:s0 tclass=dir type=SYSCALL msg=audit(1162976833.461:1849): arch=40000003 syscall=196 success=yes exit=0 a0=8ff1345 a1=bfbb1ad4 a2=239ff4 a3=bfbb1ad4 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976833.461:1849): path="/var/racoon" type=AVC msg=audit(1162976833.465:1850): avc: denied { getattr } for pid=23436 comm="updatedb" name="NetworkManager" dev=dm-0 ino=14437087 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:NetworkManager_var_run_t:s0 tclass=dir type=SYSCALL msg=audit(1162976833.465:1850): arch=40000003 syscall=196 success=yes exit=0 a0=8ff15fd a1=bfbaf904 a2=239ff4 a3=bfbaf904 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976833.465:1850): path="/var/run/NetworkManager" type=AVC msg=audit(1162976833.473:1851): avc: denied { getattr } for pid=23436 comm="updatedb" name="avahi-daemon" dev=dm-0 ino=14437058 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:avahi_var_run_t:s0 tclass=dir type=SYSCALL msg=audit(1162976833.473:1851): arch=40000003 syscall=196 success=yes exit=0 a0=8ff16bd a1=bfbaf904 a2=239ff4 a3=bfbaf904 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976833.473:1851): path="/var/run/avahi-daemon" type=AVC msg=audit(1162976833.473:1852): avc: denied { getattr } for pid=23436 comm="updatedb" name="console" dev=dm-0 ino=14436665 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:pam_var_console_t:s0 tclass=dir type=SYSCALL msg=audit(1162976833.473:1852): arch=40000003 syscall=196 success=yes exit=0 a0=8ff16e9 a1=bfbaf904 a2=239ff4 a3=bfbaf904 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976833.473:1852): path="/var/run/console" type=AVC msg=audit(1162976833.473:1853): avc: denied { getattr } for pid=23436 comm="updatedb" name="cups" dev=dm-0 ino=14534808 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:cupsd_var_run_t:s0 tclass=dir type=SYSCALL msg=audit(1162976833.473:1853): arch=40000003 syscall=196 success=yes exit=0 a0=8ff1439 a1=bfbaf904 a2=239ff4 a3=bfbaf904 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976833.473:1853): path="/var/run/cups" type=AVC msg=audit(1162976833.485:1854): avc: denied { search } for pid=23436 comm="updatedb" name="cups" dev=dm-0 ino=14534808 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:cupsd_var_run_t:s0 tclass=dir type=SYSCALL msg=audit(1162976833.485:1854): arch=40000003 syscall=12 success=yes exit=0 a0=8ff1439 a1=8000 a2=bfbb1bb0 a3=8ff1439 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976833.485:1855): avc: denied { getattr } for pid=23436 comm="updatedb" name="dbus" dev=dm-0 ino=14436623 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:system_dbusd_var_run_t:s0 tclass=dir type=SYSCALL msg=audit(1162976833.485:1855): arch=40000003 syscall=196 success=yes exit=0 a0=8ff142d a1=bfbaf904 a2=239ff4 a3=bfbaf904 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976833.485:1855): path="/var/run/dbus" type=AVC msg=audit(1162976833.485:1856): avc: denied { getattr } for pid=23436 comm="updatedb" name="mdadm" dev=dm-0 ino=14437081 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:mdadm_var_run_t:s0 tclass=dir type=SYSCALL msg=audit(1162976833.485:1856): arch=40000003 syscall=196 success=yes exit=0 a0=8ff1659 a1=bfbaf904 a2=239ff4 a3=bfbaf904 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976833.485:1856): path="/var/run/mdadm" type=AVC msg=audit(1162976833.505:1857): avc: denied { getattr } for pid=23436 comm="updatedb" name="news" dev=dm-0 ino=14607588 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:innd_var_run_t:s0 tclass=dir type=SYSCALL msg=audit(1162976833.505:1857): arch=40000003 syscall=196 success=yes exit=0 a0=8ff13cd a1=bfbaf904 a2=239ff4 a3=bfbaf904 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976833.505:1857): path="/var/run/news" type=AVC msg=audit(1162976833.509:1858): avc: denied { getattr } for pid=23436 comm="updatedb" name="ppp" dev=dm-0 ino=14437042 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:pppd_var_run_t:s0 tclass=dir type=SYSCALL msg=audit(1162976833.509:1858): arch=40000003 syscall=196 success=yes exit=0 a0=8ff1679 a1=bfbaf904 a2=239ff4 a3=bfbaf904 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976833.509:1858): path="/var/run/ppp" type=AVC msg=audit(1162976833.513:1859): avc: denied { getattr } for pid=23436 comm="updatedb" name="saslauthd" dev=dm-0 ino=14437072 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:saslauthd_var_run_t:s0 tclass=dir type=SYSCALL msg=audit(1162976833.513:1859): arch=40000003 syscall=196 success=yes exit=0 a0=8ff1611 a1=bfbaf904 a2=239ff4 a3=bfbaf904 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976833.513:1859): path="/var/run/saslauthd" type=AVC msg=audit(1162976833.513:1860): avc: denied { getattr } for pid=23436 comm="updatedb" name="setroubleshoot" dev=dm-0 ino=14469478 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:setroubleshoot_var_run_t:s0 tclass=dir type=SYSCALL msg=audit(1162976833.513:1860): arch=40000003 syscall=196 success=yes exit=0 a0=8ff13a5 a1=bfbaf904 a2=239ff4 a3=bfbaf904 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976833.513:1860): path="/var/run/setroubleshoot" type=AVC msg=audit(1162976833.517:1861): avc: denied { getattr } for pid=23436 comm="updatedb" name="sudo" dev=dm-0 ino=14437043 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:pam_var_run_t:s0 tclass=dir type=SYSCALL msg=audit(1162976833.517:1861): arch=40000003 syscall=196 success=yes exit=0 a0=8ff15b9 a1=bfbaf904 a2=239ff4 a3=bfbaf904 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976833.517:1861): path="/var/run/sudo" type=AVC msg=audit(1162976833.517:1862): avc: denied { search } for pid=23436 comm="updatedb" name="sudo" dev=dm-0 ino=14437043 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:pam_var_run_t:s0 tclass=dir type=SYSCALL msg=audit(1162976833.517:1862): arch=40000003 syscall=12 success=yes exit=0 a0=8ff15b9 a1=bfbaf904 a2=bfbb1bb0 a3=8ff15b9 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976833.517:1863): avc: denied { getattr } for pid=23436 comm="updatedb" name="kmacmill" dev=dm-0 ino=14437414 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=user_u:object_r:pam_var_run_t:s0 tclass=dir type=SYSCALL msg=audit(1162976833.517:1863): arch=40000003 syscall=196 success=yes exit=0 a0=8ff171d a1=bfbad734 a2=239ff4 a3=bfbad734 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976833.517:1863): path="/var/run/sudo/kmacmill" type=AVC msg=audit(1162976833.517:1864): avc: denied { search } for pid=23436 comm="updatedb" name="sudo" dev=dm-0 ino=14437043 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:pam_var_run_t:s0 tclass=dir type=AVC msg=audit(1162976833.517:1864): avc: denied { getattr } for pid=23436 comm="updatedb" name="root" dev=dm-0 ino=14534873 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=user_u:object_r:pam_var_run_t:s0 tclass=dir type=SYSCALL msg=audit(1162976833.517:1864): arch=40000003 syscall=196 success=yes exit=0 a0=8ff172d a1=bfbad734 a2=239ff4 a3=bfbad734 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976833.517:1864): path="/var/run/sudo/root" type=AVC msg=audit(1162976833.545:1865): avc: denied { getattr } for pid=23436 comm="updatedb" name="xend" dev=dm-0 ino=14534871 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:xend_var_run_t:s0 tclass=dir type=SYSCALL msg=audit(1162976833.545:1865): arch=40000003 syscall=196 success=yes exit=0 a0=8ff13e9 a1=bfbaf904 a2=239ff4 a3=bfbaf904 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976833.545:1865): path="/var/run/xend" type=AVC msg=audit(1162976833.557:1866): avc: denied { getattr } for pid=23436 comm="updatedb" name="xenstored" dev=dm-0 ino=14534835 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:xenstored_var_run_t:s0 tclass=dir type=SYSCALL msg=audit(1162976833.557:1866): arch=40000003 syscall=196 success=yes exit=0 a0=8ff1569 a1=bfbaf904 a2=239ff4 a3=bfbaf904 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976833.557:1866): path="/var/run/xenstored" type=AVC msg=audit(1162976833.581:1867): avc: denied { getattr } for pid=23436 comm="updatedb" name="clientmqueue" dev=dm-0 ino=14437075 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:mqueue_spool_t:s0 tclass=dir type=SYSCALL msg=audit(1162976833.581:1867): arch=40000003 syscall=196 success=yes exit=0 a0=8ff13ad a1=bfbaf904 a2=239ff4 a3=bfbaf904 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976833.581:1867): path="/var/spool/clientmqueue" type=AVC msg=audit(1162976833.581:1868): avc: denied { search } for pid=23436 comm="updatedb" name="clientmqueue" dev=dm-0 ino=14437075 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:mqueue_spool_t:s0 tclass=dir type=SYSCALL msg=audit(1162976833.581:1868): arch=40000003 syscall=12 success=yes exit=0 a0=8ff13ad a1=bfbaf904 a2=bfbb1bb0 a3=8ff13ad items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976833.581:1869): avc: denied { read } for pid=23436 comm="updatedb" name="clientmqueue" dev=dm-0 ino=14437075 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:mqueue_spool_t:s0 tclass=dir type=SYSCALL msg=audit(1162976833.581:1869): arch=40000003 syscall=5 success=yes exit=9 a0=804dc02 a1=18800 a2=bfbaf7cc a3=8ff6248 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976833.581:1870): avc: denied { getattr } for pid=23436 comm="updatedb" name="lpd" dev=dm-0 ino=14436618 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:print_spool_t:s0 tclass=dir type=SYSCALL msg=audit(1162976833.581:1870): arch=40000003 syscall=196 success=yes exit=0 a0=8ff13d9 a1=bfbaf904 a2=239ff4 a3=bfbaf904 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976833.581:1870): path="/var/spool/lpd" type=AVC msg=audit(1162976833.581:1871): avc: denied { getattr } for pid=23436 comm="updatedb" name="news" dev=dm-0 ino=14607589 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:news_spool_t:s0 tclass=dir type=SYSCALL msg=audit(1162976833.581:1871): arch=40000003 syscall=196 success=yes exit=0 a0=8ff13fd a1=bfbaf904 a2=239ff4 a3=bfbaf904 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976833.581:1871): path="/var/spool/news" type=AVC msg=audit(1162976833.581:1872): avc: denied { search } for pid=23436 comm="updatedb" name="news" dev=dm-0 ino=14607589 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:news_spool_t:s0 tclass=dir type=SYSCALL msg=audit(1162976833.581:1872): arch=40000003 syscall=12 success=yes exit=0 a0=8ff13fd a1=bfbaf904 a2=bfbb1bb0 a3=8ff13fd items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976833.605:1873): avc: denied { read } for pid=23436 comm="updatedb" name="news" dev=dm-0 ino=14607589 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:news_spool_t:s0 tclass=dir type=SYSCALL msg=audit(1162976833.605:1873): arch=40000003 syscall=5 success=yes exit=9 a0=804dc02 a1=8000 a2=0 a3=8000 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976833.605:1874): avc: denied { getattr } for pid=23436 comm="updatedb" name="c" dev=dm-0 ino=14607609 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=user_u:object_r:news_spool_t:s0 tclass=dir type=SYSCALL msg=audit(1162976833.605:1874): arch=40000003 syscall=196 success=yes exit=0 a0=8ff14a5 a1=bfbab564 a2=239ff4 a3=bfbab564 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976833.605:1874): path="/var/spool/news/overview/c" type=AVC msg=audit(1162976833.605:1875): avc: denied { search } for pid=23436 comm="updatedb" name="c" dev=dm-0 ino=14607609 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=user_u:object_r:news_spool_t:s0 tclass=dir type=SYSCALL msg=audit(1162976833.605:1875): arch=40000003 syscall=12 success=yes exit=0 a0=8ff14a5 a1=8000 a2=bfbad810 a3=8ff14a5 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976833.621:1876): avc: denied { search } for pid=23436 comm="updatedb" name="www" dev=dm-0 ino=14436677 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:httpd_sys_content_t:s0 tclass=dir type=SYSCALL msg=audit(1162976833.621:1876): arch=40000003 syscall=12 success=yes exit=0 a0=8ff1375 a1=bfbb1ad4 a2=bfbb3d80 a3=8ff1375 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976833.621:1877): avc: denied { getattr } for pid=23436 comm="updatedb" name="cgi-bin" dev=dm-0 ino=14436678 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:httpd_sys_script_exec_t:s0 tclass=dir type=SYSCALL msg=audit(1162976833.621:1877): arch=40000003 syscall=196 success=yes exit=0 a0=8ff1395 a1=bfbaf904 a2=239ff4 a3=bfbaf904 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976833.621:1877): path="/var/www/cgi-bin" type=AVC msg=audit(1162976833.641:1878): avc: denied { read } for pid=23436 comm="updatedb" name="www" dev=dm-0 ino=14436677 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:httpd_sys_content_t:s0 tclass=dir type=SYSCALL msg=audit(1162976833.641:1878): arch=40000003 syscall=5 success=yes exit=8 a0=804dc02 a1=8000 a2=0 a3=8000 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976833.685:1879): avc: denied { getattr } for pid=23436 comm="updatedb" name="yp" dev=dm-0 ino=14436620 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_yp_t:s0 tclass=dir type=SYSCALL msg=audit(1162976833.685:1879): arch=40000003 syscall=196 success=yes exit=0 a0=8ff138d a1=bfbb1ad4 a2=239ff4 a3=bfbb1ad4 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976833.685:1879): path="/var/yp" type=AVC msg=audit(1162976833.713:1880): avc: denied { setattr } for pid=23436 comm="updatedb" name="mlocate.db.DwVvuL" dev=dm-0 ino=14437015 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:locate_var_lib_t:s0 tclass=file type=SYSCALL msg=audit(1162976833.713:1880): arch=40000003 syscall=212 success=yes exit=0 a0=8ff0fa0 a1=ffffffff a2=15 a3=23b8f4 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976833.713:1881): avc: denied { fsetid } for pid=23436 comm="updatedb" capability=4 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tclass=capability type=SYSCALL msg=audit(1162976833.713:1881): arch=40000003 syscall=15 success=yes exit=0 a0=8ff0fa0 a1=1a0 a2=804f699 a3=23b8f4 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976833.713:1882): avc: denied { remove_name } for pid=23436 comm="updatedb" name="mlocate.db.DwVvuL" dev=dm-0 ino=14437015 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:locate_var_lib_t:s0 tclass=dir type=AVC msg=audit(1162976833.713:1882): avc: denied { rename } for pid=23436 comm="updatedb" name="mlocate.db.DwVvuL" dev=dm-0 ino=14437015 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:locate_var_lib_t:s0 tclass=file type=AVC msg=audit(1162976833.713:1882): avc: denied { unlink } for pid=23436 comm="updatedb" name="mlocate.db" dev=dm-0 ino=14438247 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:locate_var_lib_t:s0 tclass=file type=SYSCALL msg=audit(1162976833.713:1882): arch=40000003 syscall=38 success=yes exit=0 a0=8ff0fa0 a1=804d345 a2=804f699 a3=23b8f4 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976833.725:1883): avc: denied { execute } for pid=22863 comm="run-parts" name="prelink" dev=dm-0 ino=9330616 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1162976833.725:1883): arch=40000003 syscall=33 success=yes exit=0 a0=94a18b0 a1=1 a2=1 a3=94a1c30 items=0 ppid=22862 pid=22863 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="run-parts" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976833.725:1884): avc: denied { getattr } for pid=23442 comm="run-parts" name="gawk" dev=dm-0 ino=13683707 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1162976833.725:1884): arch=40000003 syscall=195 success=yes exit=0 a0=94a23b8 a1=bf9d8330 a2=239ff4 a3=94a23b8 items=0 ppid=22863 pid=23442 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="run-parts" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976833.725:1884): path="/bin/gawk" type=AVC msg=audit(1162976833.725:1885): avc: denied { execute } for pid=23442 comm="run-parts" name="gawk" dev=dm-0 ino=13683707 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1162976833.725:1885): arch=40000003 syscall=33 success=yes exit=0 a0=94a23b8 a1=1 a2=11 a3=94a23b8 items=0 ppid=22863 pid=23442 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="run-parts" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976833.725:1886): avc: denied { read } for pid=23442 comm="run-parts" name="gawk" dev=dm-0 ino=13683707 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1162976833.725:1886): arch=40000003 syscall=33 success=yes exit=0 a0=94a23b8 a1=4 a2=ffffffff a3=94a23b8 items=0 ppid=22863 pid=23442 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="run-parts" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976833.725:1887): avc: denied { execute_no_trans } for pid=23442 comm="run-parts" name="gawk" dev=dm-0 ino=13683707 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=AVC msg=audit(1162976833.725:1888): avc: denied { execute_no_trans } for pid=23441 comm="run-parts" name="prelink" dev=dm-0 ino=9330616 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1162976833.725:1887): arch=40000003 syscall=11 success=yes exit=0 a0=94a23b8 a1=94a1d40 a2=94a2098 a3=94a1be0 items=0 ppid=22863 pid=23442 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="awk" exe="/bin/gawk" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976833.725:1887): path="/bin/gawk" type=SYSCALL msg=audit(1162976833.725:1888): arch=40000003 syscall=11 success=yes exit=0 a0=94a18f0 a1=94a2238 a2=94a2098 a3=94a0838 items=0 ppid=22863 pid=23441 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="prelink" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976833.725:1888): path="/etc/cron.daily/prelink" type=AVC msg=audit(1162976833.757:1889): avc: denied { getattr } for pid=23441 comm="prelink" name="prelink.cache" dev=dm-0 ino=9330746 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:prelink_cache_t:s0 tclass=file type=SYSCALL msg=audit(1162976833.757:1889): arch=40000003 syscall=195 success=yes exit=0 a0=95fc7d0 a1=bfe51338 a2=239ff4 a3=95fc880 items=0 ppid=22863 pid=23441 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="prelink" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976833.757:1889): path="/etc/prelink.cache" type=AVC msg=audit(1162976833.777:1890): avc: denied { read } for pid=23444 comm="grep" name="prelink.cache" dev=dm-0 ino=9330746 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:prelink_cache_t:s0 tclass=file type=SYSCALL msg=audit(1162976833.777:1890): arch=40000003 syscall=5 success=yes exit=3 a0=bfeedf68 a1=8000 a2=0 a3=8000 items=0 ppid=23441 pid=23444 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="grep" exe="/bin/grep" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976833.889:1891): avc: denied { getattr } for pid=23446 comm="find" name="prelink.full" dev=dm-0 ino=14437327 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_lib_t:s0 tclass=file type=SYSCALL msg=audit(1162976833.889:1891): arch=40000003 syscall=196 success=yes exit=0 a0=bf898f5b a1=bf896b48 a2=2e8ff4 a3=bf898f5b items=0 ppid=23445 pid=23446 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="find" exe="/usr/bin/find" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976833.889:1891): path="/var/lib/misc/prelink.full" type=AVC msg=audit(1162976833.909:1892): avc: denied { search } for pid=23441 comm="prelink" name="rpm" dev=dm-0 ino=14436579 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:rpm_var_lib_t:s0 tclass=dir type=AVC msg=audit(1162976833.909:1892): avc: denied { getattr } for pid=23441 comm="prelink" name="Packages" dev=dm-0 ino=14437071 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:rpm_var_lib_t:s0 tclass=file type=SYSCALL msg=audit(1162976833.909:1892): arch=40000003 syscall=195 success=yes exit=0 a0=95fc9a8 a1=bfe50de8 a2=239ff4 a3=95fcc50 items=0 ppid=22863 pid=23441 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="prelink" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976833.909:1892): path="/var/lib/rpm/Packages" type=AVC msg=audit(1162976833.909:1893): avc: denied { execute } for pid=23451 comm="rpm" name="rpm" dev=dm-0 ino=13683834 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:rpm_exec_t:s0 tclass=file type=AVC msg=audit(1162976833.909:1893): avc: denied { execute_no_trans } for pid=23451 comm="rpm" name="rpm" dev=dm-0 ino=13683834 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:rpm_exec_t:s0 tclass=file type=AVC msg=audit(1162976833.909:1893): avc: denied { read } for pid=23451 comm="rpm" name="rpm" dev=dm-0 ino=13683834 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:rpm_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162976833.909:1893): arch=40000003 syscall=11 success=yes exit=0 a0=986a9a8 a1=986aa08 a2=986a720 a3=986a598 items=0 ppid=23449 pid=23451 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="rpm" exe="/bin/rpm" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976833.909:1893): path="/bin/rpm" type=AVC_PATH msg=audit(1162976833.909:1893): path="/bin/rpm" type=AVC msg=audit(1162976834.145:1894): avc: denied { write } for pid=23451 comm="rpmq" name="rpm" dev=dm-0 ino=14436579 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:rpm_var_lib_t:s0 tclass=dir type=SYSCALL msg=audit(1162976834.145:1894): arch=40000003 syscall=33 success=yes exit=0 a0=8c24810 a1=2 a2=9deb44 a3=0 items=0 ppid=23449 pid=23451 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="rpmq" exe="/usr/lib/rpm/rpmq" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976834.149:1895): avc: denied { read write } for pid=23451 comm="rpmq" name="__db.001" dev=dm-0 ino=14436585 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:rpm_var_lib_t:s0 tclass=file type=SYSCALL msg=audit(1162976834.149:1895): arch=40000003 syscall=5 success=yes exit=3 a0=8c24b50 a1=8002 a2=0 a3=8002 items=0 ppid=23449 pid=23451 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="rpmq" exe="/usr/lib/rpm/rpmq" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976834.149:1896): avc: denied { lock } for pid=23451 comm="rpmq" name="Packages" dev=dm-0 ino=14437071 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:rpm_var_lib_t:s0 tclass=file type=SYSCALL msg=audit(1162976834.149:1896): arch=40000003 syscall=221 success=yes exit=0 a0=3 a1=d a2=bfb2a58c a3=bfb2a58c items=0 ppid=23449 pid=23451 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="rpmq" exe="/usr/lib/rpm/rpmq" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976834.149:1896): path="/var/lib/rpm/Packages" type=AVC msg=audit(1162976851.122:1897): avc: denied { getattr } for pid=23456 comm="tmpwatch" name="ls-R" dev=dm-0 ino=14731502 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:tetex_data_t:s0 tclass=file type=SYSCALL msg=audit(1162976851.122:1897): arch=40000003 syscall=196 success=yes exit=0 a0=949304f a1=bfc98630 a2=34eff4 a3=0 items=0 ppid=23454 pid=23456 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="tmpwatch" exe="/usr/sbin/tmpwatch" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976851.122:1897): path="/var/lib/texmf/ls-R" type=AVC msg=audit(1162976851.150:1898): avc: denied { setattr } for pid=23456 comm="tmpwatch" name="ec" dev=dm-0 ino=14731255 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:tetex_data_t:s0 tclass=dir type=SYSCALL msg=audit(1162976851.150:1898): arch=40000003 syscall=30 success=yes exit=0 a0=804abea a1=bfc98300 a2=0 a3=0 items=0 ppid=23454 pid=23456 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="tmpwatch" exe="/usr/sbin/tmpwatch" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976851.174:1899): avc: denied { getattr } for pid=23459 comm="tmpwatch" name=".X11-unix" dev=dm-0 ino=14567593 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=dir type=SYSCALL msg=audit(1162976851.174:1899): arch=40000003 syscall=196 success=yes exit=0 a0=bfb4a7a7 a1=bfb4a6f8 a2=239ff4 a3=bfb4bf0c items=0 ppid=23457 pid=23459 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="tmpwatch" exe="/usr/sbin/tmpwatch" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976851.174:1899): path="/tmp/.X11-unix" type=AVC msg=audit(1162976851.174:1900): avc: denied { getattr } for pid=23459 comm="tmpwatch" name=".font-unix" dev=dm-0 ino=14567591 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:xfs_tmp_t:s0 tclass=dir type=SYSCALL msg=audit(1162976851.174:1900): arch=40000003 syscall=196 success=yes exit=0 a0=bfb4a7a7 a1=bfb4a6f8 a2=239ff4 a3=bfb4bf30 items=0 ppid=23457 pid=23459 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="tmpwatch" exe="/usr/sbin/tmpwatch" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976851.174:1900): path="/tmp/.font-unix" type=AVC msg=audit(1162976851.174:1901): avc: denied { getattr } for pid=23459 comm="tmpwatch" name=".ICE-unix" dev=dm-0 ino=14567572 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:ice_tmp_t:s0 tclass=dir type=SYSCALL msg=audit(1162976851.174:1901): arch=40000003 syscall=196 success=yes exit=0 a0=bfb4a7a7 a1=bfb4a6f8 a2=239ff4 a3=bfb4bf43 items=0 ppid=23457 pid=23459 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="tmpwatch" exe="/usr/sbin/tmpwatch" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976851.174:1901): path="/tmp/.ICE-unix" type=AVC msg=audit(1162976851.174:1902): avc: denied { getattr } for pid=23459 comm="tmpwatch" name="mapping-kmacmill" dev=dm-0 ino=14469334 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=sock_file type=SYSCALL msg=audit(1162976851.174:1902): arch=40000003 syscall=196 success=yes exit=0 a0=9ce415f a1=bfb4b740 a2=239ff4 a3=9ce4058 items=0 ppid=23457 pid=23459 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="tmpwatch" exe="/usr/sbin/tmpwatch" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976851.174:1902): path="/tmp/mapping-kmacmill" type=AVC msg=audit(1162976851.174:1903): avc: denied { getattr } for pid=23459 comm="tmpwatch" name="sealert.log" dev=dm-0 ino=14469458 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162976851.174:1903): arch=40000003 syscall=196 success=yes exit=0 a0=9ce4187 a1=bfb4b740 a2=239ff4 a3=0 items=0 ppid=23457 pid=23459 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="tmpwatch" exe="/usr/sbin/tmpwatch" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976851.174:1903): path="/tmp/sealert.log" type=AVC msg=audit(1162976851.178:1904): avc: denied { getattr } for pid=23459 comm="tmpwatch" name=".gdm_socket" dev=dm-0 ino=14469317 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=sock_file type=SYSCALL msg=audit(1162976851.178:1904): arch=40000003 syscall=196 success=yes exit=0 a0=9ce41a7 a1=bfb4b740 a2=239ff4 a3=0 items=0 ppid=23457 pid=23459 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="tmpwatch" exe="/usr/sbin/tmpwatch" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976851.178:1904): path="/tmp/.gdm_socket" type=AVC msg=audit(1162976851.178:1905): avc: denied { getattr } for pid=23459 comm="tmpwatch" name="gconfd-kmacmill" dev=dm-0 ino=15648282 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=dir type=SYSCALL msg=audit(1162976851.178:1905): arch=40000003 syscall=196 success=yes exit=0 a0=9ce41c7 a1=bfb4b740 a2=239ff4 a3=0 items=0 ppid=23457 pid=23459 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="tmpwatch" exe="/usr/sbin/tmpwatch" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976851.178:1905): path="/tmp/gconfd-kmacmill" type=AVC msg=audit(1162976851.178:1906): avc: denied { search } for pid=23459 comm="tmpwatch" name="gconfd-kmacmill" dev=dm-0 ino=15648282 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=dir type=SYSCALL msg=audit(1162976851.178:1906): arch=40000003 syscall=12 success=yes exit=0 a0=9ce41c7 a1=bfb4b4e8 a2=fd00 a3=0 items=0 ppid=23457 pid=23459 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="tmpwatch" exe="/usr/sbin/tmpwatch" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976851.178:1907): avc: denied { read } for pid=23459 comm="tmpwatch" name="gconfd-kmacmill" dev=dm-0 ino=15648282 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=dir type=SYSCALL msg=audit(1162976851.178:1907): arch=40000003 syscall=5 success=yes exit=6 a0=804abea a1=18800 a2=fd00 a3=0 items=0 ppid=23457 pid=23459 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="tmpwatch" exe="/usr/sbin/tmpwatch" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976851.218:1908): avc: denied { setattr } for pid=23459 comm="tmpwatch" name="lock" dev=dm-0 ino=15648168 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=dir type=AVC msg=audit(1162976851.218:1908): avc: denied { fowner } for pid=23459 comm="tmpwatch" capability=3 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tclass=capability type=SYSCALL msg=audit(1162976851.218:1908): arch=40000003 syscall=30 success=yes exit=0 a0=804abea a1=bfb4b540 a2=0 a3=0 items=0 ppid=23457 pid=23459 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="tmpwatch" exe="/usr/sbin/tmpwatch" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976851.218:1909): avc: denied { getattr } for pid=23459 comm="tmpwatch" name=".gdmF70UIT" dev=dm-0 ino=14469320 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162976851.218:1909): arch=40000003 syscall=196 success=yes exit=0 a0=9ce422f a1=bfb4b740 a2=239ff4 a3=9ce4080 items=0 ppid=23457 pid=23459 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="tmpwatch" exe="/usr/sbin/tmpwatch" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976851.218:1909): path="/tmp/.gdmF70UIT" type=AVC msg=audit(1162976851.218:1910): avc: denied { getattr } for pid=23459 comm="tmpwatch" name=".X0-lock" dev=dm-0 ino=14469318 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:xdm_xserver_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162976851.218:1910): arch=40000003 syscall=196 success=yes exit=0 a0=9ce424f a1=bfb4b740 a2=239ff4 a3=0 items=0 ppid=23457 pid=23459 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="tmpwatch" exe="/usr/sbin/tmpwatch" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976851.218:1910): path="/tmp/.X0-lock" type=AVC msg=audit(1162976851.238:1911): avc: denied { getattr } for pid=23459 comm="tmpwatch" name="Fortress-WP.pdf" dev=dm-0 ino=14469396 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=staff_u:object_r:tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162976851.238:1911): arch=40000003 syscall=196 success=yes exit=0 a0=9ce4287 a1=bfb4b740 a2=239ff4 a3=9ce5178 items=0 ppid=23457 pid=23459 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="tmpwatch" exe="/usr/sbin/tmpwatch" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976851.238:1911): path="/tmp/Fortress-WP.pdf" type=AVC msg=audit(1162976851.238:1912): avc: denied { rmdir } for pid=23459 comm="tmpwatch" name="orbit-kmacmill" dev=dm-0 ino=14567713 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=dir type=SYSCALL msg=audit(1162976851.238:1912): arch=40000003 syscall=40 success=no exit=-39 a0=9ce42af a1=9ce40d0 a2=bfb4b780 a3=9ce5158 items=0 ppid=23457 pid=23459 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="tmpwatch" exe="/usr/sbin/tmpwatch" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976851.246:1913): avc: denied { getattr } for pid=23459 comm="tmpwatch" name="ssh-OhlJzg2965" dev=dm-0 ino=14567711 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=staff_u:object_r:staff_ssh_agent_tmp_t:s0 tclass=dir type=SYSCALL msg=audit(1162976851.246:1913): arch=40000003 syscall=196 success=yes exit=0 a0=9ce42ff a1=bfb4b740 a2=239ff4 a3=9ce5178 items=0 ppid=23457 pid=23459 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="tmpwatch" exe="/usr/sbin/tmpwatch" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976851.246:1913): path="/tmp/ssh-OhlJzg2965" type=AVC msg=audit(1162976851.246:1914): avc: denied { search } for pid=23459 comm="tmpwatch" name="ssh-OhlJzg2965" dev=dm-0 ino=14567711 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=staff_u:object_r:staff_ssh_agent_tmp_t:s0 tclass=dir type=SYSCALL msg=audit(1162976851.246:1914): arch=40000003 syscall=12 success=yes exit=0 a0=9ce42ff a1=bfb4b4e8 a2=fd00 a3=0 items=0 ppid=23457 pid=23459 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="tmpwatch" exe="/usr/sbin/tmpwatch" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976851.246:1915): avc: denied { read } for pid=23459 comm="tmpwatch" name="ssh-OhlJzg2965" dev=dm-0 ino=14567711 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=staff_u:object_r:staff_ssh_agent_tmp_t:s0 tclass=dir type=SYSCALL msg=audit(1162976851.246:1915): arch=40000003 syscall=5 success=yes exit=6 a0=804abea a1=18800 a2=fd00 a3=0 items=0 ppid=23457 pid=23459 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="tmpwatch" exe="/usr/sbin/tmpwatch" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976851.250:1916): avc: denied { getattr } for pid=23459 comm="tmpwatch" name="agent.2965" dev=dm-0 ino=14567712 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=staff_u:object_r:staff_ssh_agent_tmp_t:s0 tclass=sock_file type=SYSCALL msg=audit(1162976851.250:1916): arch=40000003 syscall=196 success=yes exit=0 a0=9ce57af a1=bfb4b610 a2=239ff4 a3=0 items=0 ppid=23457 pid=23459 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="tmpwatch" exe="/usr/sbin/tmpwatch" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976851.250:1916): path="/tmp/ssh-OhlJzg2965/agent.2965" type=AVC msg=audit(1162976851.250:1917): avc: denied { setattr } for pid=23459 comm="tmpwatch" name="ssh-OhlJzg2965" dev=dm-0 ino=14567711 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=staff_u:object_r:staff_ssh_agent_tmp_t:s0 tclass=dir type=SYSCALL msg=audit(1162976851.250:1917): arch=40000003 syscall=30 success=yes exit=0 a0=804abea a1=bfb4b670 a2=0 a3=0 items=0 ppid=23457 pid=23459 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="tmpwatch" exe="/usr/sbin/tmpwatch" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976851.258:1918): avc: denied { setattr } for pid=23459 comm="tmpwatch" name="tmp" dev=dm-0 ino=14469313 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:tmp_t:s0 tclass=dir type=SYSCALL msg=audit(1162976851.258:1918): arch=40000003 syscall=30 success=yes exit=0 a0=804abea a1=bfb4b7a0 a2=0 a3=9ce5190 items=0 ppid=23457 pid=23459 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="tmpwatch" exe="/usr/sbin/tmpwatch" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976851.274:1919): avc: denied { setattr } for pid=23460 comm="tmpwatch" name="favicons" dev=dm-0 ino=14699100 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=user_u:object_r:tmp_t:s0 tclass=dir type=SYSCALL msg=audit(1162976851.274:1919): arch=40000003 syscall=30 success=yes exit=0 a0=804abea a1=bfa87500 a2=0 a3=0 items=0 ppid=23457 pid=23460 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="tmpwatch" exe="/usr/sbin/tmpwatch" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976851.274:1920): avc: denied { getattr } for pid=23460 comm="tmpwatch" name="ksycocastamp" dev=dm-0 ino=14469416 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=user_u:object_r:tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162976851.274:1920): arch=40000003 syscall=196 success=yes exit=0 a0=84df6d7 a1=bfa875d0 a2=292ff4 a3=84df0b0 items=0 ppid=23457 pid=23460 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="tmpwatch" exe="/usr/sbin/tmpwatch" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976851.274:1920): path="/var/tmp/kdecache-kmacmill/ksycocastamp" type=AVC msg=audit(1162976851.538:1921): avc: denied { setattr } for pid=23461 comm="tmpwatch" name="cat1" dev=dm-0 ino=14436644 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:man_t:s0 tclass=dir type=SYSCALL msg=audit(1162976851.538:1921): arch=40000003 syscall=30 success=yes exit=0 a0=804abea a1=bfc9f960 a2=0 a3=0 items=0 ppid=23457 pid=23461 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="tmpwatch" exe="/usr/sbin/tmpwatch" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=CRED_DISP msg=audit(1162976851.570:1922): user pid=22862 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162976851.570:1923): user pid=22862 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162977001.591:1924): user pid=23495 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162977001.591:1925): login pid=23495 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162977001.591:1926): user pid=23495 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162977001.591:1927): user pid=23495 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162977001.595:1928): avc: denied { execute } for pid=23496 comm="sh" name="sa1" dev=dm-0 ino=13061698 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:lib_t:s0 tclass=file type=AVC msg=audit(1162977001.595:1928): avc: denied { execute_no_trans } for pid=23496 comm="sh" name="sa1" dev=dm-0 ino=13061698 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1162977001.595:1928): arch=40000003 syscall=11 success=yes exit=0 a0=89241b0 a1=8924358 a2=8924290 a3=8924008 items=0 ppid=23495 pid=23496 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sa1" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162977001.595:1928): path="/usr/lib/sa/sa1" type=AVC msg=audit(1162977001.599:1929): avc: denied { search } for pid=23496 comm="sadc" name="net" dev=proc ino=-268435432 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=dir type=AVC msg=audit(1162977001.599:1929): avc: denied { read } for pid=23496 comm="sadc" name="dev" dev=proc ino=-268435159 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=file type=SYSCALL msg=audit(1162977001.599:1929): arch=40000003 syscall=5 success=yes exit=3 a0=8050371 a1=0 a2=1b6 a3=9c46800 items=0 ppid=23495 pid=23496 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162977001.599:1930): avc: denied { getattr } for pid=23496 comm="sadc" name="dev" dev=proc ino=-268435159 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=file type=SYSCALL msg=audit(1162977001.599:1930): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bf8799a8 a2=278ff4 a3=9c46800 items=0 ppid=23495 pid=23496 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162977001.599:1930): path="/proc/net/dev" type=AVC msg=audit(1162977001.599:1931): avc: denied { read } for pid=23496 comm="sadc" name="dentry-state" dev=proc ino=-268435227 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=file type=SYSCALL msg=audit(1162977001.599:1931): arch=40000003 syscall=5 success=yes exit=4 a0=805037f a1=0 a2=1b6 a3=9c46d60 items=0 ppid=23495 pid=23496 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162977001.599:1932): avc: denied { getattr } for pid=23496 comm="sadc" name="dentry-state" dev=proc ino=-268435227 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=file type=SYSCALL msg=audit(1162977001.599:1932): arch=40000003 syscall=197 success=yes exit=0 a0=4 a1=bf879804 a2=278ff4 a3=9c46d60 items=0 ppid=23495 pid=23496 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162977001.599:1932): path="/proc/sys/fs/dentry-state" type=AVC msg=audit(1162977001.599:1933): avc: denied { search } for pid=23496 comm="sadc" name="rpc" dev=proc ino=-268434552 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_rpc_t:s0 tclass=dir type=SYSCALL msg=audit(1162977001.599:1933): arch=40000003 syscall=5 success=no exit=-2 a0=80502a5 a1=0 a2=1b6 a3=9c46d60 items=0 ppid=23495 pid=23496 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=CRED_DISP msg=audit(1162977001.623:1934): user pid=23495 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162977001.623:1935): user pid=23495 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162977601.689:1936): user pid=23513 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162977601.689:1937): login pid=23513 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162977601.689:1938): user pid=23513 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162977601.689:1939): user pid=23513 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162977601.701:1940): user pid=23513 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162977601.701:1941): user pid=23513 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162978201.754:1942): user pid=23533 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162978201.754:1943): login pid=23533 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162978201.754:1944): user pid=23533 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162978201.754:1945): user pid=23533 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162978201.770:1946): user pid=23533 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162978201.770:1947): user pid=23533 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162978801.836:1948): user pid=23551 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162978801.836:1949): login pid=23551 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162978801.836:1950): user pid=23551 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162978801.836:1951): user pid=23551 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162978801.840:1952): avc: denied { execute } for pid=23552 comm="sa1" name="sadc" dev=dm-0 ino=11981390 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=AVC msg=audit(1162978801.840:1952): avc: denied { execute_no_trans } for pid=23552 comm="sa1" name="sadc" dev=dm-0 ino=11981390 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=AVC msg=audit(1162978801.840:1952): avc: denied { read } for pid=23552 comm="sa1" name="sadc" dev=dm-0 ino=11981390 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162978801.840:1952): arch=40000003 syscall=11 success=yes exit=0 a0=90d1d48 a1=90d1740 a2=90d1d60 a3=90d1740 items=0 ppid=23551 pid=23552 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162978801.840:1952): path="/usr/lib/sa/sadc" type=AVC_PATH msg=audit(1162978801.840:1952): path="/usr/lib/sa/sadc" type=CRED_DISP msg=audit(1162978801.876:1953): user pid=23551 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162978801.876:1954): user pid=23551 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162979401.933:1955): user pid=23569 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162979401.933:1956): login pid=23569 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162979401.937:1957): user pid=23569 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162979401.937:1958): user pid=23569 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162979401.949:1959): user pid=23569 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162979401.949:1960): user pid=23569 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162980001.018:1961): user pid=23587 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162980001.018:1962): login pid=23587 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162980001.018:1963): user pid=23587 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162980001.018:1964): user pid=23587 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162980001.030:1965): user pid=23587 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162980001.030:1966): user pid=23587 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162980061.046:1967): user pid=23590 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162980061.046:1968): login pid=23590 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162980061.046:1969): user pid=23590 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162980061.046:1970): user pid=23590 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162980061.050:1971): avc: denied { ioctl } for pid=23591 comm="run-parts" name="run-parts" dev=dm-0 ino=10331890 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1162980061.050:1971): arch=40000003 syscall=54 success=no exit=-25 a0=3 a1=5401 a2=bfe5b938 a3=bfe5b978 items=0 ppid=23590 pid=23591 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="run-parts" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162980061.050:1971): path="/usr/bin/run-parts" type=AVC msg=audit(1162980061.054:1972): avc: denied { execute } for pid=23594 comm="inn-cron-nntpse" name="chkconfig" dev=dm-0 ino=9984740 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sbin_t:s0 tclass=file type=AVC msg=audit(1162980061.054:1972): avc: denied { execute_no_trans } for pid=23594 comm="inn-cron-nntpse" name="chkconfig" dev=dm-0 ino=9984740 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sbin_t:s0 tclass=file type=AVC msg=audit(1162980061.054:1972): avc: denied { read } for pid=23594 comm="inn-cron-nntpse" name="chkconfig" dev=dm-0 ino=9984740 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sbin_t:s0 tclass=file type=SYSCALL msg=audit(1162980061.054:1972): arch=40000003 syscall=11 success=yes exit=0 a0=9765678 a1=9765808 a2=9765720 a3=9765508 items=0 ppid=23592 pid=23594 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="chkconfig" exe="/sbin/chkconfig" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162980061.054:1972): path="/sbin/chkconfig" type=AVC_PATH msg=audit(1162980061.054:1972): path="/sbin/chkconfig" type=CRED_DISP msg=audit(1162980061.066:1973): user pid=23590 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162980061.066:1974): user pid=23590 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162980601.120:1975): user pid=23615 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162980601.120:1976): login pid=23615 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162980601.124:1977): user pid=23615 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162980601.124:1978): user pid=23615 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162980601.136:1979): user pid=23615 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162980601.136:1980): user pid=23615 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162981201.205:1981): user pid=23633 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162981201.205:1982): login pid=23633 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162981201.205:1983): user pid=23633 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162981201.205:1984): user pid=23633 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162981201.221:1985): user pid=23633 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162981201.221:1986): user pid=23633 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162981801.291:1987): user pid=23653 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162981801.291:1988): login pid=23653 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162981801.291:1989): user pid=23653 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162981801.291:1990): user pid=23653 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162981801.303:1991): user pid=23653 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162981801.303:1992): user pid=23653 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162982401.364:1993): user pid=23676 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162982401.364:1994): login pid=23676 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162982401.364:1995): user pid=23676 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162982401.364:1996): user pid=23676 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162982401.372:1997): avc: denied { read append } for pid=23677 comm="sadc" name="sa08" dev=dm-0 ino=14600257 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=file type=SYSCALL msg=audit(1162982401.372:1997): arch=40000003 syscall=5 success=yes exit=3 a0=bfa55f24 a1=402 a2=bfa560e8 a3=bfa55e20 items=0 ppid=23676 pid=23677 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162982401.372:1998): avc: denied { lock } for pid=23677 comm="sadc" name="sa08" dev=dm-0 ino=14600257 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=file type=SYSCALL msg=audit(1162982401.372:1998): arch=40000003 syscall=143 success=yes exit=0 a0=3 a1=6 a2=bfa55e20 a3=3 items=0 ppid=23676 pid=23677 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162982401.372:1998): path="/var/log/sa/sa08" type=CRED_DISP msg=audit(1162982401.396:1999): user pid=23676 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162982401.396:2000): user pid=23676 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162983001.462:2001): user pid=23694 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162983001.462:2002): login pid=23694 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162983001.462:2003): user pid=23694 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162983001.462:2004): user pid=23694 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162983001.474:2005): user pid=23694 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162983001.474:2006): user pid=23694 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162983601.531:2007): user pid=23712 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162983601.531:2008): login pid=23712 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162983601.531:2009): user pid=23712 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162983601.531:2010): user pid=23712 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162983601.547:2011): user pid=23712 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162983601.547:2012): user pid=23712 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162983661.559:2013): user pid=23715 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162983661.559:2014): login pid=23715 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162983661.559:2015): user pid=23715 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162983661.559:2016): user pid=23715 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162983661.579:2017): user pid=23715 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162983661.579:2018): user pid=23715 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162984201.641:2019): user pid=23740 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162984201.641:2020): login pid=23740 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162984201.641:2021): user pid=23740 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162984201.641:2022): user pid=23740 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162984201.669:2023): user pid=23740 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162984201.669:2024): user pid=23740 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162984801.726:2025): user pid=23758 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162984801.726:2026): login pid=23758 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162984801.730:2027): user pid=23758 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162984801.730:2028): user pid=23758 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162984801.746:2029): user pid=23758 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162984801.746:2030): user pid=23758 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162985401.812:2031): user pid=23778 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162985401.812:2032): login pid=23778 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162985401.812:2033): user pid=23778 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162985401.812:2034): user pid=23778 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162985401.824:2035): user pid=23778 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162985401.828:2036): user pid=23778 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162986001.889:2037): user pid=23796 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162986001.893:2038): login pid=23796 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162986001.893:2039): user pid=23796 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162986001.893:2040): user pid=23796 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162986001.905:2041): user pid=23796 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162986001.905:2042): user pid=23796 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162986601.975:2043): user pid=23814 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162986601.975:2044): login pid=23814 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162986601.975:2045): user pid=23814 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162986601.975:2046): user pid=23814 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162986602.023:2047): user pid=23814 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162986602.023:2048): user pid=23814 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162987201.096:2049): user pid=23832 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162987201.096:2050): login pid=23832 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162987201.096:2051): user pid=23832 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162987201.096:2052): user pid=23832 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162987201.108:2053): user pid=23832 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162987201.112:2054): user pid=23832 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162987261.120:2055): user pid=23835 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162987261.124:2056): login pid=23835 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162987261.124:2057): user pid=23835 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162987261.124:2058): user pid=23835 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162987261.140:2059): user pid=23835 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162987261.140:2060): user pid=23835 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162987801.198:2061): user pid=23860 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162987801.198:2062): login pid=23860 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162987801.198:2063): user pid=23860 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162987801.198:2064): user pid=23860 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162987801.214:2065): user pid=23860 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162987801.214:2066): user pid=23860 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162988401.283:2067): user pid=23878 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162988401.283:2068): login pid=23878 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162988401.283:2069): user pid=23878 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162988401.283:2070): user pid=23878 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162988401.303:2071): user pid=23878 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162988401.303:2072): user pid=23878 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162989001.365:2073): user pid=23898 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162989001.365:2074): login pid=23898 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162989001.365:2075): user pid=23898 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162989001.365:2076): user pid=23898 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162989001.381:2077): user pid=23898 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162989001.381:2078): user pid=23898 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162989601.454:2079): user pid=23916 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162989601.454:2080): login pid=23916 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162989601.454:2081): user pid=23916 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162989601.454:2082): user pid=23916 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162989601.478:2083): user pid=23916 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162989601.478:2084): user pid=23916 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162990201.536:2085): user pid=23934 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162990201.536:2086): login pid=23934 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162990201.540:2087): user pid=23934 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162990201.540:2088): user pid=23934 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162990201.552:2089): user pid=23934 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162990201.552:2090): user pid=23934 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162990801.613:2091): user pid=23952 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162990801.613:2092): login pid=23952 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162990801.613:2093): user pid=23952 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162990801.613:2094): user pid=23952 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162990801.625:2095): user pid=23952 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162990801.625:2096): user pid=23952 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162990861.641:2097): user pid=23955 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162990861.641:2098): login pid=23955 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162990861.641:2099): user pid=23955 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162990861.641:2100): user pid=23955 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162990861.661:2101): user pid=23955 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162990861.661:2102): user pid=23955 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162991401.715:2103): user pid=23980 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162991401.719:2104): login pid=23980 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162991401.719:2105): user pid=23980 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162991401.719:2106): user pid=23980 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162991401.735:2107): user pid=23980 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162991401.735:2108): user pid=23980 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162992001.804:2109): user pid=23998 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162992001.804:2110): login pid=23998 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162992001.804:2111): user pid=23998 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162992001.804:2112): user pid=23998 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162992001.820:2113): user pid=23998 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162992001.820:2114): user pid=23998 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162992601.890:2115): user pid=24018 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162992601.890:2116): login pid=24018 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162992601.890:2117): user pid=24018 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162992601.890:2118): user pid=24018 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162992601.902:2119): user pid=24018 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162992601.902:2120): user pid=24018 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162993201.963:2121): user pid=24036 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162993201.963:2122): login pid=24036 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162993201.963:2123): user pid=24036 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162993201.963:2124): user pid=24036 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162993201.979:2125): user pid=24036 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162993201.979:2126): user pid=24036 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162993801.053:2127): user pid=24054 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162993801.053:2128): login pid=24054 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162993801.053:2129): user pid=24054 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162993801.053:2130): user pid=24054 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162993801.065:2131): user pid=24054 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162993801.065:2132): user pid=24054 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162994401.130:2133): user pid=24072 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162994401.130:2134): login pid=24072 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162994401.130:2135): user pid=24072 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162994401.130:2136): user pid=24072 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162994401.142:2137): user pid=24072 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162994401.142:2138): user pid=24072 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162994461.154:2139): user pid=24075 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162994461.154:2140): login pid=24075 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162994461.154:2141): user pid=24075 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162994461.158:2142): user pid=24075 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162994461.174:2143): user pid=24075 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162994461.174:2144): user pid=24075 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162994955.017:2145): avc: denied { read } for pid=24099 comm="nm-vpnc-auth-di" name=".gdmF70UIT" dev=dm-0 ino=14469320 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162994955.017:2145): arch=40000003 syscall=33 success=yes exit=0 a0=bfedde46 a1=4 a2=de7a64 a3=bfedde46 items=0 ppid=3098 pid=24099 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="nm-vpnc-auth-di" exe="/usr/libexec/nm-vpnc-auth-dialog" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162994955.161:2146): avc: denied { write } for pid=24099 comm="nm-vpnc-auth-di" name="2965" dev=dm-0 ino=14567716 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:ice_tmp_t:s0 tclass=sock_file type=SYSCALL msg=audit(1162994955.161:2146): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=bfedc6a0 a2=39b770 a3=15 items=0 ppid=3098 pid=24099 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="nm-vpnc-auth-di" exe="/usr/libexec/nm-vpnc-auth-dialog" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162994957.397:2147): avc: denied { read write } for pid=24121 comm="notification-da" name="[11958]" dev=sockfs ino=11958 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_dbusd_t:s0 tclass=netlink_selinux_socket type=SYSCALL msg=audit(1162994957.397:2147): arch=40000003 syscall=11 success=yes exit=0 a0=8eeae78 a1=8ef9188 a2=8eee770 a3=14 items=0 ppid=24120 pid=24121 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="notification-da" exe="/usr/libexec/notification-daemon" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1162994957.397:2147): path="socket:[11958]" type=AVC msg=audit(1162994957.481:2148): avc: denied { read } for pid=24121 comm="notification-da" name=".gdmF70UIT" dev=dm-0 ino=14469320 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162994957.481:2148): arch=40000003 syscall=33 success=yes exit=0 a0=bfce6e98 a1=4 a2=de7a64 a3=bfce6e98 items=0 ppid=24120 pid=24121 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="notification-da" exe="/usr/libexec/notification-daemon" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162994960.305:2149): avc: denied { read } for pid=24124 comm="xchat" name="resolv.conf" dev=dm-0 ino=9334542 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:net_conf_t:s0 tclass=file type=SYSCALL msg=audit(1162994960.305:2149): arch=40000003 syscall=5 success=yes exit=9 a0=221d13 a1=0 a2=1b6 a3=8737c68 items=0 ppid=24123 pid=24124 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="xchat" exe="/usr/bin/xchat" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162994962.137:2150): avc: denied { search } for pid=24127 comm="evolution" name="nscd" dev=dm-0 ino=14436932 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=system_u:object_r:nscd_var_run_t:s0 tclass=dir type=SYSCALL msg=audit(1162994962.137:2150): arch=40000003 syscall=102 success=no exit=-2 a0=3 a1=bfcb0af8 a2=239ff4 a3=3 items=0 ppid=1 pid=24127 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC msg=audit(1162994962.141:2151): avc: denied { read } for pid=24127 comm="evolution" name=".gdmF70UIT" dev=dm-0 ino=14469320 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162994962.141:2151): arch=40000003 syscall=33 success=yes exit=0 a0=bfcb2dff a1=4 a2=de7a64 a3=bfcb2dff items=0 ppid=1 pid=24127 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC msg=audit(1162994962.141:2152): avc: denied { getattr } for pid=24127 comm="evolution" name=".gdmF70UIT" dev=dm-0 ino=14469320 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162994962.141:2152): arch=40000003 syscall=197 success=yes exit=0 a0=4 a1=bfcb0a2c a2=239ff4 a3=8796730 items=0 ppid=1 pid=24127 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC_PATH msg=audit(1162994962.141:2152): path="/tmp/.gdmF70UIT" type=AVC msg=audit(1162994962.149:2153): avc: denied { search } for pid=24127 comm="evolution" name=".ICE-unix" dev=dm-0 ino=14567572 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=system_u:object_r:ice_tmp_t:s0 tclass=dir type=AVC msg=audit(1162994962.149:2153): avc: denied { write } for pid=24127 comm="evolution" name="2965" dev=dm-0 ino=14567716 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=staff_u:object_r:ice_tmp_t:s0 tclass=sock_file type=SYSCALL msg=audit(1162994962.149:2153): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=bfcb0b30 a2=39b770 a3=15 items=0 ppid=1 pid=24127 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC msg=audit(1162994962.149:2154): avc: denied { read } for pid=24127 comm="evolution" name=".ICEauthority" dev=dm-0 ino=6570930 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=staff_u:object_r:staff_iceauth_home_t:s0 tclass=file type=SYSCALL msg=audit(1162994962.149:2154): arch=40000003 syscall=33 success=yes exit=0 a0=87ac218 a1=4 a2=39b770 a3=87ac218 items=0 ppid=1 pid=24127 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC msg=audit(1162994962.149:2155): avc: denied { getattr } for pid=24127 comm="evolution" name=".ICEauthority" dev=dm-0 ino=6570930 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=staff_u:object_r:staff_iceauth_home_t:s0 tclass=file type=SYSCALL msg=audit(1162994962.149:2155): arch=40000003 syscall=197 success=yes exit=0 a0=b a1=bfcb0bcc a2=239ff4 a3=87acaf8 items=0 ppid=1 pid=24127 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC_PATH msg=audit(1162994962.149:2155): path="/home/kmacmill/.ICEauthority" type=AVC msg=audit(1162994963.042:2156): avc: denied { sigkill } for pid=24127 comm="evolution" scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=staff_u:staff_r:staff_evolution_t:s0 tclass=process type=SYSCALL msg=audit(1162994963.042:2156): arch=40000003 syscall=37 success=yes exit=0 a0=5e41 a1=9 a2=4b077b8 a3=5e41 items=0 ppid=1 pid=24127 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=USER_AVC msg=audit(1162994964.146:2157): user pid=2324 uid=81 auid=4294967295 subj=system_u:system_r:system_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager member=state dest=org.freedesktop.NetworkManager spid=24127 tpid=2771 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=system_u:system_r:NetworkManager_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1162994964.146:2158): user pid=2324 uid=81 auid=4294967295 subj=system_u:system_r:system_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.34 spid=2771 tpid=24127 scontext=system_u:system_r:NetworkManager_t:s0 tcontext=staff_u:staff_r:staff_evolution_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=AVC msg=audit(1162994964.190:2159): avc: denied { create } for pid=24135 comm="evolution" scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=staff_u:staff_r:staff_evolution_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1162994964.190:2159): arch=40000003 syscall=102 success=yes exit=35 a0=1 a1=b219f274 a2=239ff4 a3=5d56d7f items=0 ppid=1 pid=24135 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC msg=audit(1162994964.190:2160): avc: denied { bind } for pid=24135 comm="evolution" scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=staff_u:staff_r:staff_evolution_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1162994964.190:2160): arch=40000003 syscall=102 success=yes exit=0 a0=2 a1=b219f274 a2=239ff4 a3=23 items=0 ppid=1 pid=24135 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC msg=audit(1162994964.190:2161): avc: denied { getattr } for pid=24135 comm="evolution" scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=staff_u:staff_r:staff_evolution_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1162994964.190:2161): arch=40000003 syscall=102 success=yes exit=0 a0=6 a1=b219f274 a2=239ff4 a3=23 items=0 ppid=1 pid=24135 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC msg=audit(1162994964.190:2162): avc: denied { write } for pid=24135 comm="evolution" scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=staff_u:staff_r:staff_evolution_t:s0 tclass=netlink_route_socket type=AVC msg=audit(1162994964.190:2162): avc: denied { nlmsg_read } for pid=24135 comm="evolution" scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=staff_u:staff_r:staff_evolution_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1162994964.190:2162): arch=40000003 syscall=102 success=yes exit=20 a0=b a1=b219e1b4 a2=239ff4 a3=0 items=0 ppid=1 pid=24135 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC msg=audit(1162994964.190:2163): avc: denied { read } for pid=24135 comm="evolution" scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=staff_u:staff_r:staff_evolution_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1162994964.190:2163): arch=40000003 syscall=102 success=yes exit=188 a0=11 a1=b219e1b4 a2=239ff4 a3=0 items=0 ppid=1 pid=24135 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=USER_ACCT msg=audit(1162995001.236:2164): user pid=24158 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162995001.236:2165): login pid=24158 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162995001.236:2166): user pid=24158 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162995001.236:2167): user pid=24158 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162995001.240:2168): avc: denied { execute } for pid=24159 comm="sh" name="sa1" dev=dm-0 ino=13061698 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:lib_t:s0 tclass=file type=AVC msg=audit(1162995001.240:2168): avc: denied { execute_no_trans } for pid=24159 comm="sh" name="sa1" dev=dm-0 ino=13061698 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1162995001.240:2168): arch=40000003 syscall=11 success=yes exit=0 a0=8ecb1b0 a1=8ecb358 a2=8ecb290 a3=8ecb008 items=0 ppid=24158 pid=24159 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sa1" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162995001.240:2168): path="/usr/lib/sa/sa1" type=AVC msg=audit(1162995001.244:2169): avc: denied { search } for pid=24159 comm="sadc" name="net" dev=proc ino=-268435432 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=dir type=AVC msg=audit(1162995001.244:2169): avc: denied { read } for pid=24159 comm="sadc" name="dev" dev=proc ino=-268435159 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=file type=SYSCALL msg=audit(1162995001.244:2169): arch=40000003 syscall=5 success=yes exit=3 a0=8050371 a1=0 a2=1b6 a3=8e26800 items=0 ppid=24158 pid=24159 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162995001.244:2170): avc: denied { getattr } for pid=24159 comm="sadc" name="dev" dev=proc ino=-268435159 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=file type=SYSCALL msg=audit(1162995001.244:2170): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bff14838 a2=239ff4 a3=8e26800 items=0 ppid=24158 pid=24159 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162995001.244:2170): path="/proc/net/dev" type=AVC msg=audit(1162995001.244:2171): avc: denied { search } for pid=24159 comm="sadc" name="fs" dev=proc ino=-268435428 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=dir type=AVC msg=audit(1162995001.244:2171): avc: denied { read } for pid=24159 comm="sadc" name="dentry-state" dev=proc ino=-268435227 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=file type=SYSCALL msg=audit(1162995001.244:2171): arch=40000003 syscall=5 success=yes exit=4 a0=805037f a1=0 a2=1b6 a3=8e26df0 items=0 ppid=24158 pid=24159 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162995001.244:2172): avc: denied { getattr } for pid=24159 comm="sadc" name="dentry-state" dev=proc ino=-268435227 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=file type=SYSCALL msg=audit(1162995001.244:2172): arch=40000003 syscall=197 success=yes exit=0 a0=4 a1=bff14694 a2=239ff4 a3=8e26df0 items=0 ppid=24158 pid=24159 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162995001.244:2172): path="/proc/sys/fs/dentry-state" type=AVC msg=audit(1162995001.244:2173): avc: denied { search } for pid=24159 comm="sadc" name="rpc" dev=proc ino=-268434552 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_rpc_t:s0 tclass=dir type=SYSCALL msg=audit(1162995001.244:2173): arch=40000003 syscall=5 success=no exit=-2 a0=80502a5 a1=0 a2=1b6 a3=8e26df0 items=0 ppid=24158 pid=24159 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=CRED_DISP msg=audit(1162995001.256:2174): user pid=24158 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162995001.256:2175): user pid=24158 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162995036.438:2176): avc: denied { read } for pid=24173 comm="mozilla-xremote" name=".gdmF70UIT" dev=dm-0 ino=14469320 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162995036.438:2176): arch=40000003 syscall=33 success=yes exit=0 a0=bfb9af92 a1=4 a2=de7a64 a3=bfb9af92 items=0 ppid=24172 pid=24173 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="mozilla-xremote" exe="/usr/lib/firefox-2.0/mozilla-xremote-client" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC msg=audit(1162995036.438:2177): avc: denied { getattr } for pid=24173 comm="mozilla-xremote" name=".gdmF70UIT" dev=dm-0 ino=14469320 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162995036.438:2177): arch=40000003 syscall=197 success=yes exit=0 a0=4 a1=bfb993dc a2=239ff4 a3=8769ab0 items=0 ppid=24172 pid=24173 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="mozilla-xremote" exe="/usr/lib/firefox-2.0/mozilla-xremote-client" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC_PATH msg=audit(1162995036.438:2177): path="/tmp/.gdmF70UIT" type=AVC msg=audit(1162995036.470:2178): avc: denied { execute } for pid=24170 comm="firefox" name="firefox-bin" dev=dm-0 ino=13552825 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=system_u:object_r:mozilla_exec_t:s0 tclass=file type=AVC msg=audit(1162995036.470:2178): avc: denied { execute_no_trans } for pid=24170 comm="firefox" name="firefox-bin" dev=dm-0 ino=13552825 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=system_u:object_r:mozilla_exec_t:s0 tclass=file type=AVC msg=audit(1162995036.470:2178): avc: denied { read } for pid=24170 comm="firefox" name="firefox-bin" dev=dm-0 ino=13552825 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=system_u:object_r:mozilla_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162995036.470:2178): arch=40000003 syscall=11 success=yes exit=0 a0=8cf48b8 a1=8cf6920 a2=8cf7118 a3=8cf6920 items=0 ppid=1 pid=24170 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC_PATH msg=audit(1162995036.470:2178): path="/usr/lib/firefox-2.0/firefox-bin" type=AVC_PATH msg=audit(1162995036.470:2178): path="/usr/lib/firefox-2.0/firefox-bin" type=AVC msg=audit(1162995036.570:2179): avc: denied { getattr } for pid=24170 comm="firefox-bin" name="firefox-bin" dev=dm-0 ino=13552825 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=system_u:object_r:mozilla_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162995036.570:2179): arch=40000003 syscall=196 success=yes exit=0 a0=bfd04428 a1=bfd03f1c a2=239ff4 a3=bfd05a05 items=0 ppid=1 pid=24170 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC_PATH msg=audit(1162995036.570:2179): path="/usr/lib/firefox-2.0/firefox-bin" type=AVC msg=audit(1162995043.603:2180): avc: denied { read } for pid=24178 comm="firefox-bin" name=".gdmF70UIT" dev=dm-0 ino=14469320 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162995043.603:2180): arch=40000003 syscall=33 success=yes exit=0 a0=bfcf0fcb a1=4 a2=de7a64 a3=bfcf0fcb items=0 ppid=1 pid=24178 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162995043.603:2181): avc: denied { getattr } for pid=24178 comm="firefox-bin" name=".gdmF70UIT" dev=dm-0 ino=14469320 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162995043.603:2181): arch=40000003 syscall=197 success=yes exit=0 a0=4 a1=bfcef08c a2=239ff4 a3=84c2140 items=0 ppid=1 pid=24178 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162995043.603:2181): path="/tmp/.gdmF70UIT" type=AVC msg=audit(1162995146.313:2182): avc: denied { getattr } for pid=24178 comm="firefox-bin" name="libflashplayer.so" dev=dm-0 ino=6547382 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=user_u:object_r:user_mozilla_home_t:s0 tclass=file type=SYSCALL msg=audit(1162995146.313:2182): arch=40000003 syscall=196 success=yes exit=0 a0=bfcecc58 a1=bfcecbbc a2=239ff4 a3=982c840 items=0 ppid=1 pid=24178 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162995146.313:2182): path="/home/kmacmill/.mozilla/plugins/libflashplayer.so" type=AVC msg=audit(1162995147.313:2183): avc: denied { read } for pid=24178 comm="firefox-bin" name="libflashplayer.so" dev=dm-0 ino=6547382 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=user_u:object_r:user_mozilla_home_t:s0 tclass=file type=SYSCALL msg=audit(1162995147.313:2183): arch=40000003 syscall=5 success=yes exit=52 a0=969da00 a1=0 a2=0 a3=969da00 items=0 ppid=1 pid=24178 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162995147.329:2184): avc: denied { execute } for pid=24178 comm="firefox-bin" name="libflashplayer.so" dev=dm-0 ino=6547382 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=user_u:object_r:user_mozilla_home_t:s0 tclass=file type=SYSCALL msg=audit(1162995147.329:2184): arch=40000003 syscall=192 success=yes exit=26243072 a0=0 a1=738dbc a2=5 a3=802 items=0 ppid=1 pid=24178 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162995147.329:2184): path="/home/kmacmill/.mozilla/plugins/libflashplayer.so" type=USER_ACCT msg=audit(1162995601.325:2185): user pid=24285 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162995601.329:2186): login pid=24285 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162995601.329:2187): user pid=24285 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162995601.329:2188): user pid=24285 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162995601.333:2189): avc: denied { execute } for pid=24286 comm="sa1" name="sadc" dev=dm-0 ino=11981390 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=AVC msg=audit(1162995601.333:2189): avc: denied { execute_no_trans } for pid=24286 comm="sa1" name="sadc" dev=dm-0 ino=11981390 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=AVC msg=audit(1162995601.333:2189): avc: denied { read } for pid=24286 comm="sa1" name="sadc" dev=dm-0 ino=11981390 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162995601.333:2189): arch=40000003 syscall=11 success=yes exit=0 a0=9d1ed48 a1=9d1e740 a2=9d1ed60 a3=9d1e740 items=0 ppid=24285 pid=24286 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162995601.333:2189): path="/usr/lib/sa/sadc" type=AVC_PATH msg=audit(1162995601.333:2189): path="/usr/lib/sa/sadc" type=AVC msg=audit(1162995601.333:2190): avc: denied { search } for pid=24286 comm="sadc" name="sa" dev=dm-0 ino=14607631 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=dir type=SYSCALL msg=audit(1162995601.333:2190): arch=40000003 syscall=33 success=yes exit=0 a0=bf9b1684 a1=0 a2=bf9b1578 a3=bf9b1580 items=0 ppid=24285 pid=24286 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162995601.333:2191): avc: denied { read append } for pid=24286 comm="sadc" name="sa08" dev=dm-0 ino=14600257 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=file type=SYSCALL msg=audit(1162995601.333:2191): arch=40000003 syscall=5 success=yes exit=3 a0=bf9b1684 a1=402 a2=bf9b1848 a3=bf9b1580 items=0 ppid=24285 pid=24286 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162995601.333:2192): avc: denied { lock } for pid=24286 comm="sadc" name="sa08" dev=dm-0 ino=14600257 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=file type=SYSCALL msg=audit(1162995601.333:2192): arch=40000003 syscall=143 success=yes exit=0 a0=3 a1=6 a2=bf9b1580 a3=3 items=0 ppid=24285 pid=24286 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162995601.333:2192): path="/var/log/sa/sa08" type=CRED_DISP msg=audit(1162995601.393:2193): user pid=24285 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162995601.393:2194): user pid=24285 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162995783.573:2195): avc: denied { search } for pid=24305 comm="gpg" name="home" dev=dm-0 ino=6547201 scontext=staff_u:staff_r:staff_gpg_t:s0 tcontext=system_u:object_r:home_root_t:s0 tclass=dir type=AVC msg=audit(1162995783.573:2195): avc: denied { search } for pid=24305 comm="gpg" name="kmacmill" dev=dm-0 ino=6547202 scontext=staff_u:staff_r:staff_gpg_t:s0 tcontext=staff_u:object_r:staff_home_dir_t:s0 tclass=dir type=SYSCALL msg=audit(1162995783.573:2195): arch=40000003 syscall=33 success=no exit=-2 a0=9b409f8 a1=4 a2=ed4bbc a3=9b409c8 items=0 ppid=24127 pid=24305 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gpg" exe="/usr/bin/gpg" subj=staff_u:staff_r:staff_gpg_t:s0 key=(null) type=AVC msg=audit(1162995783.777:2196): avc: denied { search } for pid=24305 comm="gpg" name="tmp" dev=dm-0 ino=14469313 scontext=staff_u:staff_r:staff_gpg_t:s0 tcontext=system_u:object_r:tmp_t:s0 tclass=dir type=AVC msg=audit(1162995783.777:2196): avc: denied { read } for pid=24305 comm="gpg" name="evolution-pgp.BLRTIT" dev=dm-0 ino=14469397 scontext=staff_u:staff_r:staff_gpg_t:s0 tcontext=staff_u:object_r:staff_evolution_orbit_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162995783.777:2196): arch=40000003 syscall=5 success=yes exit=3 a0=bfcc8b1a a1=8000 a2=0 a3=8000 items=0 ppid=24127 pid=24305 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gpg" exe="/usr/bin/gpg" subj=staff_u:staff_r:staff_gpg_t:s0 key=(null) type=AVC msg=audit(1162996117.142:2197): avc: denied { execute } for pid=24178 comm="firefox-bin" name="nprhapengine.so" dev=dm-0 ino=6547712 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_mozilla_home_t:s0 tclass=file type=SYSCALL msg=audit(1162996117.142:2197): arch=40000003 syscall=192 success=yes exit=68603904 a0=0 a1=2af6e0 a2=5 a3=802 items=0 ppid=1 pid=24178 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162996117.142:2197): path="/home/kmacmill/.mozilla/plugins/nprhapengine.so" type=AVC msg=audit(1162996117.154:2198): avc: denied { execstack } for pid=24178 comm="firefox-bin" scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_mozilla_t:s0 tclass=process type=AVC msg=audit(1162996117.154:2198): avc: denied { execmem } for pid=24178 comm="firefox-bin" scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_mozilla_t:s0 tclass=process type=SYSCALL msg=audit(1162996117.154:2198): arch=40000003 syscall=125 success=yes exit=0 a0=bfcef000 a1=1000 a2=1000007 a3=fffff000 items=0 ppid=1 pid=24178 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162996117.198:2199): avc: denied { execmod } for pid=24178 comm="firefox-bin" name="nprhapengine.so" dev=dm-0 ino=6547712 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_mozilla_home_t:s0 tclass=file type=SYSCALL msg=audit(1162996117.198:2199): arch=40000003 syscall=125 success=yes exit=0 a0=416d000 a1=26f000 a2=5 a3=bfcec990 items=0 ppid=1 pid=24178 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162996117.198:2199): path="/home/kmacmill/.mozilla/plugins/nprhapengine.so" type=AVC msg=audit(1162996122.842:2200): avc: denied { search } for pid=24178 comm="firefox-bin" name="4-1:1.1" dev=sysfs ino=972 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:sysfs_t:s0 tclass=dir type=SYSCALL msg=audit(1162996122.842:2200): arch=40000003 syscall=54 success=yes exit=0 a0=43 a1=c0045002 a2=bfcef284 a3=a7b716c items=0 ppid=1 pid=24178 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=USER_ACCT msg=audit(1162996201.475:2201): user pid=24375 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162996201.475:2202): login pid=24375 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162996201.475:2203): user pid=24375 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162996201.475:2204): user pid=24375 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162996201.495:2205): user pid=24375 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162996201.495:2206): user pid=24375 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162996346.912:2207): avc: denied { write } for pid=24178 comm="firefox-bin" name="tmp" dev=dm-0 ino=14469313 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:tmp_t:s0 tclass=dir type=AVC msg=audit(1162996346.912:2207): avc: denied { add_name } for pid=24178 comm="firefox-bin" name="plugtmp" scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:tmp_t:s0 tclass=dir type=AVC msg=audit(1162996346.912:2207): avc: denied { create } for pid=24178 comm="firefox-bin" name="plugtmp" scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:tmp_t:s0 tclass=dir type=SYSCALL msg=audit(1162996346.912:2207): arch=40000003 syscall=39 success=yes exit=0 a0=aa846e8 a1=1c0 a2=6e44304 a3=1c0 items=0 ppid=1 pid=24178 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162996346.912:2208): avc: denied { write } for pid=24178 comm="firefox-bin" name="plugtmp" dev=dm-0 ino=14796673 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:tmp_t:s0 tclass=dir type=AVC msg=audit(1162996346.912:2208): avc: denied { add_name } for pid=24178 comm="firefox-bin" name="right.rail.exclude.html" scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:tmp_t:s0 tclass=dir type=AVC msg=audit(1162996346.912:2208): avc: denied { create } for pid=24178 comm="firefox-bin" name="right.rail.exclude.html" scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162996346.912:2208): arch=40000003 syscall=5 success=yes exit=71 a0=9b981e0 a1=82c1 a2=180 a3=82c1 items=0 ppid=1 pid=24178 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162996346.912:2209): avc: denied { write } for pid=24178 comm="firefox-bin" name="right.rail.exclude.html" dev=dm-0 ino=14796674 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162996346.912:2209): arch=40000003 syscall=5 success=yes exit=71 a0=9b981e0 a1=8241 a2=180 a3=8241 items=0 ppid=1 pid=24178 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162996358.917:2210): avc: denied { getattr } for pid=24178 comm="firefox-bin" name="right.rail.exclude.html" dev=dm-0 ino=14796674 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162996358.917:2210): arch=40000003 syscall=195 success=yes exit=0 a0=9b981e0 a1=bfcee7a0 a2=239ff4 a3=3 items=0 ppid=1 pid=24178 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162996358.917:2210): path="/tmp/plugtmp/right.rail.exclude.html" type=AVC msg=audit(1162996358.917:2211): avc: denied { remove_name } for pid=24178 comm="firefox-bin" name="right.rail.exclude.html" dev=dm-0 ino=14796674 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:tmp_t:s0 tclass=dir type=AVC msg=audit(1162996358.917:2211): avc: denied { unlink } for pid=24178 comm="firefox-bin" name="right.rail.exclude.html" dev=dm-0 ino=14796674 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162996358.917:2211): arch=40000003 syscall=10 success=yes exit=0 a0=9b981e0 a1=0 a2=6e44304 a3=0 items=0 ppid=1 pid=24178 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=USER_ACCT msg=audit(1162996801.568:2212): user pid=24467 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162996801.568:2213): login pid=24467 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162996801.568:2214): user pid=24467 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162996801.568:2215): user pid=24467 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162996801.572:2216): avc: denied { search } for pid=24468 comm="sadc" name="net" dev=proc ino=-268435432 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=dir type=SYSCALL msg=audit(1162996801.572:2216): arch=40000003 syscall=5 success=yes exit=3 a0=8050371 a1=0 a2=1b6 a3=9666800 items=0 ppid=24467 pid=24468 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=CRED_DISP msg=audit(1162996801.580:2217): user pid=24467 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162996801.584:2218): user pid=24467 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162997292.355:2219): avc: denied { read } for pid=24587 comm="mozilla-xremote" name=".gdmF70UIT" dev=dm-0 ino=14469320 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162997292.355:2219): arch=40000003 syscall=33 success=yes exit=0 a0=bfe5bf92 a1=4 a2=de7a64 a3=bfe5bf92 items=0 ppid=24586 pid=24587 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="mozilla-xremote" exe="/usr/lib/firefox-2.0/mozilla-xremote-client" subj=staff_u:staff_r:staff_t:s0 key=(null) type=USER_ACCT msg=audit(1162997401.650:2220): user pid=24603 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162997401.650:2221): login pid=24603 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162997401.650:2222): user pid=24603 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162997401.650:2223): user pid=24603 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162997401.666:2224): user pid=24603 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162997401.666:2225): user pid=24603 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162997573.365:2226): avc: denied { search } for pid=24178 comm="firefox-bin" name="4-1:1.1" dev=sysfs ino=972 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:sysfs_t:s0 tclass=dir type=SYSCALL msg=audit(1162997573.365:2226): arch=40000003 syscall=54 success=yes exit=0 a0=2c a1=c0045002 a2=bfcef284 a3=a7b716c items=0 ppid=1 pid=24178 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=USER_ACCT msg=audit(1162998001.731:2227): user pid=24671 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162998001.731:2228): login pid=24671 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162998001.731:2229): user pid=24671 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162998001.731:2230): user pid=24671 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162998001.735:2231): avc: denied { read } for pid=24672 comm="sadc" name="dev" dev=proc ino=-268435159 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=file type=SYSCALL msg=audit(1162998001.735:2231): arch=40000003 syscall=5 success=yes exit=3 a0=8050371 a1=0 a2=1b6 a3=93d2800 items=0 ppid=24671 pid=24672 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162998001.735:2232): avc: denied { getattr } for pid=24672 comm="sadc" name="dev" dev=proc ino=-268435159 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=file type=SYSCALL msg=audit(1162998001.735:2232): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bffa50c8 a2=282ff4 a3=93d2800 items=0 ppid=24671 pid=24672 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162998001.735:2232): path="/proc/net/dev" type=CRED_DISP msg=audit(1162998001.747:2233): user pid=24671 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162998001.747:2234): user pid=24671 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162998061.751:2235): user pid=24676 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162998061.755:2236): login pid=24676 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162998061.755:2237): user pid=24676 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162998061.755:2238): user pid=24676 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162998061.763:2239): avc: denied { execute } for pid=24680 comm="inn-cron-nntpse" name="chkconfig" dev=dm-0 ino=9984740 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sbin_t:s0 tclass=file type=AVC msg=audit(1162998061.763:2239): avc: denied { execute_no_trans } for pid=24680 comm="inn-cron-nntpse" name="chkconfig" dev=dm-0 ino=9984740 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sbin_t:s0 tclass=file type=AVC msg=audit(1162998061.763:2239): avc: denied { read } for pid=24680 comm="inn-cron-nntpse" name="chkconfig" dev=dm-0 ino=9984740 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sbin_t:s0 tclass=file type=SYSCALL msg=audit(1162998061.763:2239): arch=40000003 syscall=11 success=yes exit=0 a0=8d42678 a1=8d42808 a2=8d42720 a3=8d42508 items=0 ppid=24678 pid=24680 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="chkconfig" exe="/sbin/chkconfig" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162998061.763:2239): path="/sbin/chkconfig" type=AVC_PATH msg=audit(1162998061.763:2239): path="/sbin/chkconfig" type=AVC msg=audit(1162998061.763:2240): avc: denied { read } for pid=24680 comm="chkconfig" name="innd" dev=dm-0 ino=9331492 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162998061.763:2240): arch=40000003 syscall=5 success=yes exit=3 a0=bff169e0 a1=0 a2=ffffffff a3=9184038 items=0 ppid=24678 pid=24680 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="chkconfig" exe="/sbin/chkconfig" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162998061.763:2241): avc: denied { getattr } for pid=24680 comm="chkconfig" name="innd" dev=dm-0 ino=9331492 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162998061.763:2241): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bff16950 a2=239ff4 a3=3 items=0 ppid=24678 pid=24680 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="chkconfig" exe="/sbin/chkconfig" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162998061.763:2241): path="/etc/rc.d/init.d/innd" type=CRED_DISP msg=audit(1162998061.771:2242): user pid=24676 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162998061.775:2243): user pid=24676 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162998302.314:2244): avc: denied { execute } for pid=24729 comm="bash" name="audit2policy" dev=dm-0 ino=13683706 scontext=staff_u:sysadm_r:sysadm_t:s0 tcontext=staff_u:object_r:staff_home_t:s0 tclass=file type=AVC msg=audit(1162998302.314:2244): avc: denied { execute_no_trans } for pid=24729 comm="bash" name="audit2policy" dev=dm-0 ino=13683706 scontext=staff_u:sysadm_r:sysadm_t:s0 tcontext=staff_u:object_r:staff_home_t:s0 tclass=file type=SYSCALL msg=audit(1162998302.314:2244): arch=40000003 syscall=11 success=yes exit=0 a0=9c21608 a1=9c26730 a2=9c23ec0 a3=9c21f40 items=0 ppid=4324 pid=24729 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="audit2policy" exe="/usr/bin/python" subj=staff_u:sysadm_r:sysadm_t:s0 key=(null) type=AVC_PATH msg=audit(1162998302.314:2244): path="/home/kmacmill/projects/selinux/madison/audit2policy" type=AVC msg=audit(1162998522.584:2245): avc: denied { execute } for pid=4324 comm="bash" name="authconfig.py" dev=dm-0 ino=10607331 scontext=staff_u:sysadm_r:sysadm_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=file type=SYSCALL msg=audit(1162998522.584:2245): arch=40000003 syscall=33 success=yes exit=0 a0=9c20ad0 a1=1 a2=11 a3=9c20ad0 items=0 ppid=4321 pid=4324 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="bash" exe="/bin/bash" subj=staff_u:sysadm_r:sysadm_t:s0 key=(null) selinux-python-3.0/sepolgen/tests/test_data/httpd.log000066400000000000000000142664141356774067000231770ustar00rootroot00000000000000type=USER_AVC msg=audit(1163772866.369:8084): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.437:8085): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.449:8086): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.449:8087): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.449:8088): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.453:8089): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.453:8090): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.453:8091): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.453:8092): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.453:8093): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.453:8094): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.457:8095): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.461:8096): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.461:8097): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.465:8098): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.469:8099): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.481:8100): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.481:8101): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.481:8102): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.481:8103): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.485:8104): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.485:8105): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.485:8106): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.485:8107): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.485:8108): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.489:8109): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.489:8110): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.493:8111): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.497:8112): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.497:8113): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.509:8114): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.509:8115): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.509:8116): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.513:8117): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.513:8118): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.513:8119): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.517:8120): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.517:8121): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.517:8122): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.517:8123): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.521:8124): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.521:8125): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.525:8126): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.525:8127): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.553:8128): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.553:8129): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.553:8130): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.557:8131): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.557:8132): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.557:8133): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.557:8134): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.561:8135): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.561:8136): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.577:8137): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.577:8138): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.577:8139): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.577:8140): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.581:8141): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.581:8142): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.585:8143): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.585:8144): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.589:8145): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.589:8146): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.589:8147): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.589:8148): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.593:8149): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.593:8150): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.593:8151): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.597:8152): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.597:8153): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.601:8154): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.605:8155): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.621:8156): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.625:8157): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.625:8158): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.625:8159): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.625:8160): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.625:8161): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.625:8162): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.629:8163): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.629:8164): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.629:8165): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.633:8166): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.633:8167): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.633:8168): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.641:8169): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.649:8170): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.649:8171): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.653:8172): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.653:8173): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.653:8174): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.653:8175): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.653:8176): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.657:8177): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.657:8178): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.661:8179): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.661:8180): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.665:8181): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.665:8182): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.669:8183): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.681:8184): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.681:8185): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.681:8186): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.685:8187): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.685:8188): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.685:8189): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.685:8190): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.689:8191): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.689:8192): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.689:8193): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.689:8194): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.693:8195): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.697:8196): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.697:8197): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.705:8198): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.709:8199): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.709:8200): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.713:8201): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.713:8202): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.713:8203): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.713:8204): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.717:8205): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.717:8206): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.717:8207): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.721:8208): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.721:8209): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.725:8210): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.733:8211): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.741:8212): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.745:8213): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.745:8214): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.745:8215): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.745:8216): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.749:8217): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.749:8218): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.749:8219): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.749:8220): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.753:8221): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.753:8222): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.753:8223): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.757:8224): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.761:8225): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.777:8226): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.781:8227): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.781:8228): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.781:8229): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.781:8230): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.785:8231): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.785:8232): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.785:8233): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.789:8234): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.789:8235): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.789:8236): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.789:8237): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.793:8238): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.797:8239): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.809:8240): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.809:8241): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.809:8242): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.813:8243): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.813:8244): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.813:8245): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.813:8246): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.817:8247): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.817:8248): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.817:8249): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.821:8250): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.821:8251): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.825:8252): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.825:8253): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.837:8254): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.841:8255): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.841:8256): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.841:8257): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.841:8258): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.845:8259): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.845:8260): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.845:8261): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.845:8262): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.857:8263): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.857:8264): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.857:8265): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.861:8266): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.869:8267): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.869:8268): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.873:8269): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.873:8270): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.873:8271): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.873:8272): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.877:8273): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.877:8274): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.877:8275): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.877:8276): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.881:8277): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.881:8278): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.889:8279): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.889:8280): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.893:8281): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.893:8282): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.893:8283): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.901:8284): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.901:8285): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.901:8286): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.905:8287): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.905:8288): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.905:8289): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.905:8290): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.905:8291): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.909:8292): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.909:8293): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.913:8294): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.913:8295): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.929:8296): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.929:8297): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.929:8298): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.929:8299): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.929:8300): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.933:8301): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.933:8302): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.933:8303): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.937:8304): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.957:8305): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.957:8306): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.957:8307): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.961:8308): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.961:8309): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.965:8310): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.969:8311): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.969:8312): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.969:8313): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.969:8314): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.973:8315): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.973:8316): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.973:8317): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.973:8318): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.977:8319): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.977:8320): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.977:8321): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.981:8322): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.989:8323): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.997:8324): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.997:8325): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.001:8326): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.001:8327): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.001:8328): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.001:8329): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.005:8330): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.005:8331): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.005:8332): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.005:8333): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.005:8334): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.009:8335): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.057:8336): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.061:8337): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.073:8338): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.073:8339): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.073:8340): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.077:8341): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.077:8342): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.077:8343): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.077:8344): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.077:8345): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.077:8346): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.081:8347): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.081:8348): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.085:8349): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.109:8350): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.117:8351): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.133:8352): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.133:8353): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.137:8354): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.137:8355): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.137:8356): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.137:8357): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.137:8358): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.141:8359): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.141:8360): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.141:8361): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.141:8362): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.145:8363): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.145:8364): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.149:8365): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.157:8366): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.157:8367): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.157:8368): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.161:8369): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.161:8370): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.161:8371): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.161:8372): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.161:8373): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.165:8374): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.165:8375): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.169:8376): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.169:8377): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.173:8378): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.173:8379): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.181:8380): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.181:8381): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.185:8382): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.185:8383): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.185:8384): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.185:8385): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.189:8386): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.189:8387): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.189:8388): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.193:8389): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.193:8390): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.197:8391): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.197:8392): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.201:8393): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.217:8394): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.221:8395): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.221:8396): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.221:8397): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.221:8398): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.225:8399): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.225:8400): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.225:8401): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.225:8402): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.225:8403): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.229:8404): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.229:8405): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.233:8406): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.285:8407): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.297:8408): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.297:8409): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.297:8410): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.301:8411): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.301:8412): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.305:8413): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.305:8414): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.305:8415): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.305:8416): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.305:8417): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.309:8418): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.309:8419): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.309:8420): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.313:8421): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.325:8422): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.329:8423): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.329:8424): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.329:8425): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.329:8426): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.333:8427): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.333:8428): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.333:8429): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.333:8430): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.333:8431): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.337:8432): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.337:8433): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.341:8434): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.341:8435): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.357:8436): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.357:8437): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.357:8438): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.357:8439): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.361:8440): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.361:8441): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.361:8442): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.361:8443): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.365:8444): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.385:8445): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.385:8446): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.385:8447): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.389:8448): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.389:8449): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.389:8450): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.393:8451): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.393:8452): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.393:8453): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.397:8454): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.397:8455): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.401:8456): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.405:8457): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.405:8458): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.405:8459): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.413:8460): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.417:8461): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.417:8462): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.421:8463): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.421:8464): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.425:8465): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.425:8466): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.425:8467): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.425:8468): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.425:8469): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.425:8470): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.425:8471): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.425:8472): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.429:8473): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.433:8474): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.433:8475): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.433:8476): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.441:8477): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.457:8478): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.457:8479): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.461:8480): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.461:8481): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.465:8482): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.465:8483): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.465:8484): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.465:8485): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.469:8486): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.489:8487): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.489:8488): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.489:8489): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.489:8490): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.489:8491): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.493:8492): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.493:8493): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.493:8494): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.493:8495): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.493:8496): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.493:8497): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.501:8498): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.505:8499): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.517:8500): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.517:8501): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.517:8502): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.517:8503): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.517:8504): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.521:8505): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.521:8506): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.521:8507): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.521:8508): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.521:8509): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.521:8510): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.521:8511): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.521:8512): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.525:8513): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.525:8514): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.525:8515): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.525:8516): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.529:8517): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.529:8518): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.585:8519): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.605:8520): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.605:8521): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.605:8522): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.609:8523): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.609:8524): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.609:8525): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.613:8526): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.613:8527): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.613:8528): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.633:8529): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.637:8530): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.637:8531): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.637:8532): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.641:8533): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.641:8534): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.645:8535): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.645:8536): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.645:8537): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.645:8538): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.649:8539): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.649:8540): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.649:8541): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.653:8542): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.673:8543): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.673:8544): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.673:8545): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.673:8546): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.677:8547): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.677:8548): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.677:8549): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.677:8550): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.677:8551): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.677:8552): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.677:8553): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.681:8554): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.681:8555): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.681:8556): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.681:8557): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.685:8558): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.685:8559): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.689:8560): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.701:8561): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.701:8562): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.705:8563): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.705:8564): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.705:8565): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.705:8566): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.709:8567): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.709:8568): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.709:8569): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.709:8570): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.709:8571): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.713:8572): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.713:8573): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.717:8574): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.725:8575): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.733:8576): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.733:8577): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.737:8578): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.737:8579): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.741:8580): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.741:8581): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.741:8582): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.741:8583): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.745:8584): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.745:8585): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.745:8586): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.749:8587): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.753:8588): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.757:8589): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.769:8590): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.769:8591): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.769:8592): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.769:8593): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.769:8594): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.773:8595): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.773:8596): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.773:8597): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.777:8598): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.777:8599): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.782:8600): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.782:8601): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.782:8602): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.782:8603): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.798:8604): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.802:8605): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.802:8606): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.802:8607): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.802:8608): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.802:8609): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.806:8610): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.806:8611): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.806:8612): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.806:8613): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.810:8614): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.810:8615): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.814:8616): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.830:8617): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.830:8618): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.830:8619): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.830:8620): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.834:8621): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.834:8622): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.834:8623): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.834:8624): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.838:8625): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.838:8626): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.858:8627): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.858:8628): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.858:8629): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.858:8630): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.862:8631): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.862:8632): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.866:8633): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.870:8634): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.870:8635): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.870:8636): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.870:8637): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.870:8638): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.870:8639): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.870:8640): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.870:8641): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.874:8642): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.878:8643): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.878:8644): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.882:8645): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.894:8646): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.898:8647): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.898:8648): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.898:8649): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.898:8650): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.902:8651): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.902:8652): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.902:8653): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.902:8654): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.902:8655): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.902:8656): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.910:8657): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.910:8658): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.914:8659): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.922:8660): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.922:8661): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.922:8662): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.922:8663): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.926:8664): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.926:8665): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.926:8666): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.930:8667): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.930:8668): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.930:8669): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.930:8670): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.930:8671): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.934:8672): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.942:8673): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.950:8674): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.954:8675): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.954:8676): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.954:8677): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.954:8678): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.954:8679): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.954:8680): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.954:8681): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.954:8682): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.962:8683): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.962:8684): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.966:8685): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.966:8686): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.966:8687): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.986:8688): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.986:8689): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.990:8690): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.990:8691): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.990:8692): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.994:8693): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.994:8694): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.994:8695): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.994:8696): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.006:8697): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.006:8698): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.006:8699): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.010:8700): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.010:8701): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.018:8702): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.018:8703): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.018:8704): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.018:8705): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.018:8706): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.022:8707): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.022:8708): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.022:8709): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.022:8710): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.022:8711): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.026:8712): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.030:8713): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.030:8714): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.030:8715): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.034:8716): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.034:8717): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.058:8718): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.058:8719): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.058:8720): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.062:8721): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.062:8722): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.062:8723): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.066:8724): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.066:8725): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.066:8726): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.106:8727): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.146:8728): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.154:8729): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.174:8730): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.178:8731): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.178:8732): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.178:8733): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.178:8734): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.182:8735): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.182:8736): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.182:8737): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.182:8738): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.186:8739): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.186:8740): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.190:8741): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.190:8742): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.226:8743): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.242:8744): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.242:8745): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.242:8746): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.242:8747): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.242:8748): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.242:8749): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.242:8750): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.246:8751): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.246:8752): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.246:8753): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.250:8754): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.250:8755): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.266:8756): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.270:8757): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.274:8758): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.282:8759): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.282:8760): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.282:8761): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.286:8762): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.286:8763): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.286:8764): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.286:8765): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.290:8766): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.290:8767): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.290:8768): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.294:8769): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.294:8770): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.302:8771): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.310:8772): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.310:8773): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.310:8774): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.314:8775): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.314:8776): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.318:8777): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.318:8778): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.318:8779): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.322:8780): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.322:8781): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.322:8782): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.326:8783): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.326:8784): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.330:8785): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.334:8786): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.334:8787): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.334:8788): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.346:8789): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.346:8790): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.350:8791): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.350:8792): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.350:8793): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.350:8794): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.350:8795): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.354:8796): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.358:8797): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.362:8798): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.362:8799): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.370:8800): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.370:8801): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.370:8802): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.370:8803): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.370:8804): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.374:8805): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.374:8806): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.378:8807): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.378:8808): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.378:8809): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.382:8810): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.386:8811): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.386:8812): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.390:8813): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.402:8814): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.402:8815): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.402:8816): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.406:8817): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.406:8818): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.406:8819): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.406:8820): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.410:8821): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.410:8822): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.414:8823): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.414:8824): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.414:8825): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.418:8826): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.430:8827): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.446:8828): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.446:8829): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.446:8830): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.446:8831): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.450:8832): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.450:8833): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.450:8834): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.450:8835): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.450:8836): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.450:8837): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.454:8838): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.458:8839): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.462:8840): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.474:8841): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.474:8842): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.474:8843): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.478:8844): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.478:8845): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.478:8846): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.478:8847): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.478:8848): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.478:8849): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.478:8850): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.478:8851): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.482:8852): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.482:8853): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.486:8854): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.502:8855): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.518:8856): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.518:8857): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.518:8858): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.518:8859): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.522:8860): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.522:8861): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.526:8862): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.526:8863): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.526:8864): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.526:8865): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.530:8866): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.546:8867): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.546:8868): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.546:8869): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.550:8870): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.550:8871): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.550:8872): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.550:8873): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.554:8874): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.554:8875): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.554:8876): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.558:8877): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.566:8878): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.566:8879): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.570:8880): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.570:8881): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.574:8882): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.574:8883): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.578:8884): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.578:8885): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.578:8886): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.578:8887): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.578:8888): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.578:8889): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.578:8890): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.578:8891): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.582:8892): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.582:8893): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.586:8894): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.586:8895): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.590:8896): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.590:8897): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.606:8898): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.606:8899): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.610:8900): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.610:8901): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.610:8902): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.614:8903): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.614:8904): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.614:8905): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.614:8906): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.614:8907): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.618:8908): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.618:8909): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.618:8910): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.622:8911): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.634:8912): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.638:8913): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.638:8914): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.638:8915): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.638:8916): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.638:8917): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.638:8918): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.638:8919): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.642:8920): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.642:8921): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.646:8922): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.646:8923): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.690:8924): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.702:8925): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.726:8926): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.726:8927): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.726:8928): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.726:8929): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.730:8930): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.730:8931): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.730:8932): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.734:8933): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.734:8934): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.734:8935): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.734:8936): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.746:8937): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.750:8938): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.750:8939): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.750:8940): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.754:8941): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.758:8942): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.758:8943): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.758:8944): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.762:8945): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.762:8946): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.762:8947): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.762:8948): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.766:8949): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.766:8950): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.766:8951): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.770:8952): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.774:8953): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.786:8954): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.790:8955): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.790:8956): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.790:8957): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.790:8958): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.794:8959): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.794:8960): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.794:8961): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.794:8962): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.798:8963): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.798:8964): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.802:8965): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.806:8966): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.826:8967): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.830:8968): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.830:8969): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.830:8970): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.830:8971): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.830:8972): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.830:8973): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.830:8974): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.830:8975): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.834:8976): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.834:8977): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.834:8978): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.838:8979): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.838:8980): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.850:8981): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.854:8982): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.862:8983): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.862:8984): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.866:8985): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.866:8986): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.866:8987): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.866:8988): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.866:8989): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.866:8990): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.866:8991): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.870:8992): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.874:8993): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.874:8994): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.874:8995): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.894:8996): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.894:8997): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.894:8998): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.898:8999): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.898:9000): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.902:9001): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.902:9002): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.902:9003): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.902:9004): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.906:9005): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.906:9006): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.930:9007): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.930:9008): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.930:9009): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.934:9010): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.934:9011): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.934:9012): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.938:9013): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.938:9014): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.938:9015): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.938:9016): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.938:9017): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.942:9018): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.942:9019): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.942:9020): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.946:9021): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.946:9022): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.958:9023): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.974:9024): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.974:9025): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.974:9026): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.978:9027): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.978:9028): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.978:9029): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.978:9030): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.978:9031): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.978:9032): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.982:9033): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.982:9034): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.986:9035): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.990:9036): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.998:9037): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.998:9038): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.998:9039): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.002:9040): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.002:9041): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.002:9042): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.002:9043): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.006:9044): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.006:9045): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.006:9046): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.006:9047): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.010:9048): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.010:9049): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.010:9050): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.046:9051): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.062:9052): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.062:9053): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.066:9054): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.066:9055): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.066:9056): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.066:9057): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.070:9058): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.070:9059): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.070:9060): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.074:9061): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.074:9062): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.086:9063): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.086:9064): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.086:9065): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.090:9066): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.090:9067): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.090:9068): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.090:9069): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.090:9070): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.090:9071): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.090:9072): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.090:9073): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.090:9074): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.094:9075): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.098:9076): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.098:9077): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.102:9078): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.106:9079): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.118:9080): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.118:9081): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.118:9082): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.122:9083): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.122:9084): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.122:9085): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.122:9086): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.122:9087): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.122:9088): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.126:9089): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.126:9090): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.130:9091): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.130:9092): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.134:9093): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.150:9094): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.150:9095): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.150:9096): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.154:9097): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.154:9098): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.154:9099): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.154:9100): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.154:9101): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.158:9102): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.158:9103): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.158:9104): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.162:9105): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.162:9106): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.166:9107): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.194:9108): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.194:9109): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.198:9110): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.198:9111): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.198:9112): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.198:9113): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.202:9114): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.202:9115): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.206:9116): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.206:9117): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.206:9118): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.206:9119): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.210:9120): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.214:9121): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.226:9122): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.226:9123): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.226:9124): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.230:9125): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.230:9126): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.230:9127): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.230:9128): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.234:9129): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.234:9130): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.234:9131): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.246:9132): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.246:9133): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.246:9134): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.254:9135): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.254:9136): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.254:9137): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.254:9138): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.254:9139): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.254:9140): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.270:9141): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.270:9142): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.270:9143): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.270:9144): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.278:9145): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.278:9146): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.282:9147): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.286:9148): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.290:9149): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.302:9150): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.302:9151): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.302:9152): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.306:9153): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.306:9154): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.306:9155): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.306:9156): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.310:9157): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.310:9158): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.310:9159): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.310:9160): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.314:9161): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.322:9162): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.322:9163): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.334:9164): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.334:9165): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.334:9166): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.334:9167): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.338:9168): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.338:9169): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.338:9170): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.338:9171): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.342:9172): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.342:9173): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.342:9174): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.346:9175): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.350:9176): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.350:9177): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.366:9178): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.366:9179): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.366:9180): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.366:9181): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.370:9182): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.370:9183): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.370:9184): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.370:9185): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.370:9186): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.374:9187): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.374:9188): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.394:9189): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.394:9190): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.394:9191): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.398:9192): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.402:9193): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.402:9194): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.402:9195): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.406:9196): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.406:9197): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.406:9198): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.410:9199): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.410:9200): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.410:9201): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.414:9202): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.414:9203): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.418:9204): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.466:9205): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.494:9206): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.494:9207): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.498:9208): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.498:9209): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.498:9210): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.498:9211): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.502:9212): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.502:9213): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.502:9214): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.514:9215): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.518:9216): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.518:9217): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.518:9218): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.522:9219): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.522:9220): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.526:9221): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.526:9222): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.530:9223): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.530:9224): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.530:9225): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.530:9226): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.534:9227): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.534:9228): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.534:9229): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.538:9230): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.538:9231): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.542:9232): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.582:9233): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.594:9234): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.594:9235): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.594:9236): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.594:9237): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.598:9238): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.598:9239): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.598:9240): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.598:9241): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.602:9242): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.602:9243): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.602:9244): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.606:9245): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.606:9246): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.610:9247): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.626:9248): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.626:9249): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.626:9250): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.630:9251): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.630:9252): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.630:9253): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.630:9254): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.634:9255): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.638:9256): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.638:9257): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.638:9258): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.638:9259): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.638:9260): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.642:9261): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.650:9262): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.654:9263): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.654:9264): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.654:9265): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.654:9266): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.658:9267): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.658:9268): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.658:9269): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.658:9270): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.658:9271): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.662:9272): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.662:9273): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.670:9274): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.670:9275): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.682:9276): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.682:9277): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.682:9278): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.682:9279): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.686:9280): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.686:9281): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.686:9282): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.686:9283): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.690:9284): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.690:9285): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.690:9286): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.694:9287): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.694:9288): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.698:9289): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.714:9290): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.714:9291): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.714:9292): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.718:9293): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.718:9294): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.718:9295): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.718:9296): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.722:9297): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.722:9298): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.738:9299): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.738:9300): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.738:9301): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.742:9302): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.742:9303): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.746:9304): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.750:9305): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.750:9306): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.750:9307): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.750:9308): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.750:9309): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.754:9310): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.754:9311): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.754:9312): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.754:9313): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.758:9314): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.758:9315): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.758:9316): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.770:9317): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.790:9318): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.790:9319): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.790:9320): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.790:9321): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.794:9322): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.794:9323): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.794:9324): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.794:9325): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.794:9326): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.794:9327): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.798:9328): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.802:9329): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.802:9330): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.810:9331): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.826:9332): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.830:9333): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.830:9334): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.830:9335): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.834:9336): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.834:9337): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.834:9338): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.834:9339): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.838:9340): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.838:9341): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.838:9342): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.842:9343): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.846:9344): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.850:9345): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.850:9346): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.854:9347): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.854:9348): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.862:9349): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.862:9350): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.862:9351): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.862:9352): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.874:9353): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.874:9354): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.874:9355): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.878:9356): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.878:9357): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.878:9358): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.910:9359): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.910:9360): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.910:9361): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.914:9362): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.914:9363): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.914:9364): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.914:9365): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.918:9366): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.918:9367): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.918:9368): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.918:9369): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.922:9370): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.922:9371): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.926:9372): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.930:9373): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.990:9374): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.990:9375): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.990:9376): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.994:9377): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.994:9378): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.994:9379): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.998:9380): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.998:9381): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.998:9382): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.998:9383): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.010:9384): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.010:9385): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.010:9386): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.014:9387): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.018:9388): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.018:9389): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.018:9390): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.022:9391): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.026:9392): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.026:9393): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.026:9394): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.030:9395): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.030:9396): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.030:9397): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.034:9398): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.038:9399): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.038:9400): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.054:9401): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.054:9402): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.058:9403): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.058:9404): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.058:9405): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.058:9406): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.062:9407): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.062:9408): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.062:9409): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.062:9410): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.062:9411): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.066:9412): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.066:9413): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.070:9414): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.106:9415): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.122:9416): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.122:9417): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.122:9418): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.126:9419): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.126:9420): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.126:9421): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.126:9422): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.130:9423): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.130:9424): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.130:9425): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.134:9426): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.134:9427): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.138:9428): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.138:9429): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.154:9430): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.158:9431): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.158:9432): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.158:9433): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.162:9434): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.162:9435): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.162:9436): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.162:9437): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.162:9438): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.166:9439): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.166:9440): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.166:9441): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.170:9442): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.174:9443): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.186:9444): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.186:9445): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.186:9446): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.186:9447): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.190:9448): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.190:9449): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.190:9450): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.190:9451): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.190:9452): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.194:9453): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.194:9454): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.198:9455): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.202:9456): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.202:9457): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.210:9458): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.210:9459): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.210:9460): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.214:9461): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.214:9462): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.214:9463): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.214:9464): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.218:9465): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.218:9466): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.218:9467): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.222:9468): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.222:9469): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.226:9470): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.226:9471): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.238:9472): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.238:9473): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.238:9474): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.238:9475): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.238:9476): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.238:9477): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.238:9478): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.242:9479): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.242:9480): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.242:9481): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.246:9482): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.246:9483): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.250:9484): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.250:9485): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.266:9486): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.266:9487): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.266:9488): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.266:9489): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.266:9490): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.270:9491): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.274:9492): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.274:9493): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.274:9494): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.274:9495): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.278:9496): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.278:9497): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.282:9498): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.286:9499): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.294:9500): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.298:9501): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.298:9502): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.298:9503): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.298:9504): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.302:9505): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.302:9506): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.302:9507): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.302:9508): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.302:9509): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.306:9510): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.306:9511): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.314:9512): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.314:9513): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.326:9514): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.326:9515): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.326:9516): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.326:9517): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.330:9518): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.330:9519): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.330:9520): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.330:9521): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.334:9522): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.334:9523): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.334:9524): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.338:9525): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.338:9526): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.342:9527): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.354:9528): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.354:9529): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.354:9530): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.358:9531): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.358:9532): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.358:9533): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.358:9534): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.362:9535): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.366:9536): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.366:9537): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.366:9538): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.366:9539): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.370:9540): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.374:9541): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.382:9542): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.382:9543): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.382:9544): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.382:9545): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.386:9546): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.386:9547): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.386:9548): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.386:9549): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.390:9550): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.390:9551): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.394:9552): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.394:9553): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.394:9554): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.398:9555): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.410:9556): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.410:9557): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.410:9558): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.414:9559): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.414:9560): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.414:9561): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.418:9562): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.418:9563): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.418:9564): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.434:9565): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.434:9566): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.434:9567): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.434:9568): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.434:9569): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.434:9570): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.434:9571): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.442:9572): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.442:9573): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.446:9574): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.446:9575): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.446:9576): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.446:9577): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.450:9578): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.450:9579): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.450:9580): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.462:9581): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.462:9582): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.466:9583): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.466:9584): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.470:9585): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.474:9586): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.474:9587): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.474:9588): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.474:9589): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.478:9590): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.478:9591): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.478:9592): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.478:9593): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.482:9594): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.482:9595): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.486:9596): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.494:9597): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.534:9598): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.538:9599): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.538:9600): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.538:9601): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.538:9602): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.542:9603): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.542:9604): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.542:9605): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.542:9606): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.542:9607): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.546:9608): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.546:9609): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.550:9610): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.550:9611): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.566:9612): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.566:9613): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.566:9614): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.566:9615): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.570:9616): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.570:9617): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.570:9618): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.570:9619): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.574:9620): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.574:9621): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.574:9622): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.578:9623): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.578:9624): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.582:9625): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.590:9626): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.590:9627): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.590:9628): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.626:9629): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.626:9630): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.626:9631): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.626:9632): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.630:9633): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.630:9634): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.634:9635): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.634:9636): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.634:9637): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.638:9638): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.642:9639): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.650:9640): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.650:9641): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.650:9642): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.654:9643): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.654:9644): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.654:9645): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.658:9646): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.658:9647): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.658:9648): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.658:9649): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.662:9650): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.666:9651): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.666:9652): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.670:9653): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.686:9654): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.686:9655): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.686:9656): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.686:9657): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.690:9658): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.690:9659): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.690:9660): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.690:9661): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.694:9662): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.694:9663): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.694:9664): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.698:9665): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.698:9666): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.702:9667): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.714:9668): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.718:9669): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.718:9670): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.718:9671): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.718:9672): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.722:9673): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.722:9674): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.722:9675): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.722:9676): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.726:9677): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.726:9678): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.730:9679): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.730:9680): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.742:9681): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.758:9682): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.758:9683): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.758:9684): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.762:9685): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.762:9686): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.762:9687): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.762:9688): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.762:9689): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.762:9690): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.766:9691): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.766:9692): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.770:9693): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.774:9694): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.778:9695): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.786:9696): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.786:9697): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.786:9698): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.794:9699): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.794:9700): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.794:9701): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.794:9702): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.794:9703): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.798:9704): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.798:9705): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.802:9706): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.802:9707): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.826:9708): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.838:9709): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.858:9710): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.858:9711): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.858:9712): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.858:9713): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.858:9714): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.862:9715): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.862:9716): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.862:9717): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.866:9718): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.866:9719): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.866:9720): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.866:9721): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.878:9722): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.886:9723): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.906:9724): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.906:9725): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.906:9726): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.910:9727): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.910:9728): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.910:9729): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.910:9730): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.910:9731): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.910:9732): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.914:9733): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.918:9734): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.918:9735): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.918:9736): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.970:9737): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.982:9738): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.982:9739): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.982:9740): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.982:9741): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.982:9742): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.986:9743): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.986:9744): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.986:9745): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.986:9746): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.990:9747): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.990:9748): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.994:9749): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.002:9750): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.014:9751): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.038:9752): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.038:9753): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.038:9754): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.038:9755): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.038:9756): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.042:9757): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.042:9758): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.042:9759): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.042:9760): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.042:9761): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.046:9762): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.050:9763): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.050:9764): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.070:9765): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.070:9766): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.070:9767): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.070:9768): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.074:9769): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.074:9770): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.078:9771): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.078:9772): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.078:9773): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.078:9774): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.078:9775): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.086:9776): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.090:9777): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.094:9778): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.094:9779): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.094:9780): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.098:9781): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.098:9782): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.098:9783): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.102:9784): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.102:9785): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.102:9786): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.102:9787): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.102:9788): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.102:9789): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.106:9790): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.106:9791): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.110:9792): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.114:9793): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.126:9794): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.126:9795): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.130:9796): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.130:9797): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.134:9798): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.134:9799): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.134:9800): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.138:9801): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.138:9802): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.142:9803): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.142:9804): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.146:9805): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.150:9806): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.150:9807): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.154:9808): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.154:9809): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.158:9810): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.158:9811): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.158:9812): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.162:9813): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.162:9814): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.166:9815): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.166:9816): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.166:9817): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.170:9818): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.170:9819): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.178:9820): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.182:9821): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.186:9822): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.186:9823): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.186:9824): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.190:9825): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.190:9826): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.190:9827): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.190:9828): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.190:9829): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.194:9830): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.194:9831): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.198:9832): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.202:9833): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.202:9834): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.206:9835): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.222:9836): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.222:9837): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.222:9838): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.226:9839): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.230:9840): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.230:9841): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.234:9842): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.234:9843): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.234:9844): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.238:9845): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.238:9846): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.242:9847): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.242:9848): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.246:9849): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.250:9850): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.250:9851): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.254:9852): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.254:9853): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.258:9854): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.258:9855): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.258:9856): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.262:9857): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.262:9858): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.266:9859): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.270:9860): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.278:9861): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.278:9862): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.278:9863): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.282:9864): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.282:9865): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.282:9866): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.282:9867): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.282:9868): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.282:9869): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.282:9870): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.286:9871): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.286:9872): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.286:9873): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.290:9874): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.294:9875): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.294:9876): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.298:9877): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.310:9878): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.314:9879): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.314:9880): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.314:9881): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.318:9882): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.318:9883): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.318:9884): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.318:9885): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.322:9886): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.322:9887): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.326:9888): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.326:9889): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.330:9890): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.346:9891): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.346:9892): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.346:9893): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.350:9894): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.350:9895): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.350:9896): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.354:9897): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.354:9898): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.354:9899): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.354:9900): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.358:9901): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.358:9902): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.362:9903): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.362:9904): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.366:9905): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.374:9906): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.374:9907): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.374:9908): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.374:9909): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.374:9910): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.374:9911): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.374:9912): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.374:9913): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.382:9914): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.382:9915): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.386:9916): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.386:9917): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.386:9918): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.394:9919): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.406:9920): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.406:9921): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.406:9922): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.406:9923): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.410:9924): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.410:9925): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.410:9926): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.414:9927): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.414:9928): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.414:9929): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.414:9930): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.434:9931): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.434:9932): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.434:9933): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.434:9934): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.438:9935): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.438:9936): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.438:9937): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.438:9938): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.438:9939): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.442:9940): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.442:9941): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.442:9942): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.454:9943): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.454:9944): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.458:9945): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.458:9946): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.462:9947): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.462:9948): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.466:9949): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.466:9950): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.466:9951): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.470:9952): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.470:9953): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.470:9954): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.470:9955): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.474:9956): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.486:9957): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.486:9958): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.486:9959): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.486:9960): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.490:9961): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.494:9962): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.494:9963): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.494:9964): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.494:9965): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.494:9966): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.498:9967): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.498:9968): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.498:9969): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.498:9970): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.498:9971): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.502:9972): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.502:9973): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.506:9974): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.510:9975): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.514:9976): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.522:9977): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.522:9978): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.522:9979): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.522:9980): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.526:9981): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.526:9982): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.526:9983): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.526:9984): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.530:9985): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.534:9986): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.534:9987): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.538:9988): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.546:9989): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.562:9990): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.562:9991): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.562:9992): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.566:9993): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.566:9994): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.566:9995): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.566:9996): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.570:9997): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.570:9998): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.582:9999): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.586:10000): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.586:10001): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.586:10002): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.590:10003): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.590:10004): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.594:10005): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.594:10006): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.594:10007): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.598:10008): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.598:10009): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.598:10010): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.598:10011): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.598:10012): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.598:10013): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.602:10014): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.602:10015): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.606:10016): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.618:10017): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.630:10018): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.634:10019): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.634:10020): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.634:10021): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.634:10022): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.638:10023): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.638:10024): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.638:10025): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.638:10026): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.638:10027): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.642:10028): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.642:10029): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.646:10030): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.650:10031): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.662:10032): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.662:10033): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.662:10034): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.662:10035): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.666:10036): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.666:10037): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.666:10038): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.670:10039): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.670:10040): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.674:10041): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.674:10042): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.682:10043): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.686:10044): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.686:10045): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.686:10046): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.686:10047): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.686:10048): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.690:10049): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.690:10050): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.690:10051): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.690:10052): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.690:10053): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.694:10054): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.694:10055): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.698:10056): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.698:10057): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.706:10058): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.710:10059): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.726:10060): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.730:10061): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.730:10062): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.730:10063): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.730:10064): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.730:10065): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.730:10066): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.734:10067): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.734:10068): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.734:10069): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.734:10070): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.738:10071): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.738:10072): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.738:10073): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.754:10074): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.754:10075): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.758:10076): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.758:10077): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.758:10078): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.762:10079): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.762:10080): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.762:10081): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.766:10082): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.766:10083): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.770:10084): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.770:10085): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.770:10086): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.774:10087): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.794:10088): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.794:10089): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.794:10090): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.794:10091): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.794:10092): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.794:10093): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.794:10094): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.794:10095): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.798:10096): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.798:10097): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.802:10098): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.802:10099): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.802:10100): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.814:10101): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.826:10102): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.826:10103): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.826:10104): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.826:10105): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.826:10106): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.826:10107): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.826:10108): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.830:10109): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.830:10110): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.834:10111): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.834:10112): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.834:10113): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.882:10114): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.886:10115): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.902:10116): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.902:10117): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.902:10118): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.902:10119): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.902:10120): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.902:10121): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.902:10122): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.906:10123): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.906:10124): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.910:10125): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.910:10126): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.910:10127): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.922:10128): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.926:10129): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.938:10130): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.942:10131): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.942:10132): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.942:10133): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.946:10134): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.946:10135): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.946:10136): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.946:10137): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.950:10138): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.950:10139): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.950:10140): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.954:10141): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.958:10142): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.966:10143): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.970:10144): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.970:10145): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.970:10146): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.974:10147): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.974:10148): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.974:10149): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.974:10150): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.974:10151): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.974:10152): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.974:10153): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.978:10154): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.982:10155): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.982:10156): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.982:10157): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.998:10158): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.998:10159): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.998:10160): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.998:10161): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.998:10162): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.002:10163): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.002:10164): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.002:10165): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.006:10166): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.006:10167): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.006:10168): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.010:10169): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.014:10170): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.014:10171): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.026:10172): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.026:10173): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.030:10174): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.030:10175): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.030:10176): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.030:10177): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.034:10178): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.034:10179): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.034:10180): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.034:10181): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.038:10182): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.042:10183): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.042:10184): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.062:10185): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.062:10186): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.062:10187): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.066:10188): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.066:10189): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.066:10190): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.066:10191): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.070:10192): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.070:10193): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.070:10194): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.070:10195): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.070:10196): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.086:10197): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.086:10198): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.090:10199): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.090:10200): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.090:10201): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.094:10202): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.094:10203): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.094:10204): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.098:10205): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.098:10206): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.098:10207): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.098:10208): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.098:10209): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.098:10210): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.114:10211): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.114:10212): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.114:10213): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.114:10214): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.114:10215): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.122:10216): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.122:10217): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.122:10218): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.122:10219): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.126:10220): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.126:10221): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.126:10222): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.130:10223): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.130:10224): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.134:10225): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.142:10226): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.150:10227): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.162:10228): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.162:10229): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.166:10230): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.166:10231): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.166:10232): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.166:10233): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.170:10234): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.170:10235): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.170:10236): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.174:10237): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.174:10238): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.178:10239): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.202:10240): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.206:10241): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.222:10242): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.226:10243): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.226:10244): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.230:10245): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.230:10246): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.230:10247): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.230:10248): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.234:10249): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.234:10250): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.234:10251): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.238:10252): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.238:10253): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.246:10254): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.254:10255): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.266:10256): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.266:10257): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.266:10258): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.266:10259): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.274:10260): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.274:10261): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.274:10262): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.274:10263): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.274:10264): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.278:10265): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.278:10266): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.278:10267): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.282:10268): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.294:10269): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.306:10270): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.306:10271): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.306:10272): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.306:10273): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.306:10274): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.310:10275): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.310:10276): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.310:10277): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.314:10278): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.314:10279): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.314:10280): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.314:10281): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.326:10282): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.326:10283): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.342:10284): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.342:10285): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.342:10286): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.342:10287): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.342:10288): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.342:10289): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.342:10290): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.342:10291): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.342:10292): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.346:10293): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.350:10294): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.350:10295): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.350:10296): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.358:10297): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.378:10298): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.378:10299): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.378:10300): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.378:10301): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.382:10302): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.382:10303): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.382:10304): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.382:10305): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.386:10306): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.442:10307): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.442:10308): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.442:10309): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.442:10310): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.442:10311): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.446:10312): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.450:10313): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.450:10314): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.450:10315): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.454:10316): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.454:10317): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.454:10318): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.454:10319): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.454:10320): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.462:10321): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.462:10322): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.466:10323): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.466:10324): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.470:10325): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.478:10326): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.478:10327): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.482:10328): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.486:10329): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.486:10330): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.486:10331): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.490:10332): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.490:10333): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.490:10334): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.494:10335): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.494:10336): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.498:10337): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.502:10338): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.502:10339): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.514:10340): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.514:10341): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.518:10342): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.518:10343): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.518:10344): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.522:10345): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.522:10346): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.522:10347): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.522:10348): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.522:10349): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.526:10350): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.526:10351): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.534:10352): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.534:10353): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.534:10354): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.534:10355): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.542:10356): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.542:10357): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.542:10358): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.546:10359): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.546:10360): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.546:10361): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.546:10362): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.546:10363): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.550:10364): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.554:10365): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.586:10366): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.594:10367): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.602:10368): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.606:10369): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.606:10370): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.606:10371): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.606:10372): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.610:10373): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.610:10374): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.610:10375): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.610:10376): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.610:10377): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.614:10378): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.618:10379): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.618:10380): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.626:10381): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.630:10382): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.630:10383): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.630:10384): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.630:10385): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.630:10386): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.638:10387): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.638:10388): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.638:10389): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.642:10390): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.642:10391): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.642:10392): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.694:10393): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.698:10394): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.706:10395): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.722:10396): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.726:10397): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.726:10398): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.726:10399): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.730:10400): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.730:10401): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.730:10402): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.730:10403): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.730:10404): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.734:10405): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.738:10406): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.738:10407): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.738:10408): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.758:10409): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.758:10410): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.758:10411): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.758:10412): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.762:10413): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.762:10414): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.762:10415): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.762:10416): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.766:10417): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.766:10418): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.782:10419): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.782:10420): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.782:10421): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.782:10422): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.786:10423): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.786:10424): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.786:10425): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.786:10426): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.786:10427): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.790:10428): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.790:10429): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.790:10430): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.790:10431): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.850:10432): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.850:10433): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.850:10434): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.850:10435): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.850:10436): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.850:10437): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.850:10438): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.858:10439): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.858:10440): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.858:10441): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.858:10442): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.858:10443): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.866:10444): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.866:10445): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.874:10446): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.874:10447): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.874:10448): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.874:10449): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.874:10450): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.878:10451): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.878:10452): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.878:10453): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.878:10454): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.882:10455): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.886:10456): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.890:10457): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.890:10458): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.890:10459): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.890:10460): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.894:10461): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.910:10462): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.910:10463): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.910:10464): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.914:10465): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.914:10466): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.918:10467): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.918:10468): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.922:10469): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.922:10470): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.922:10471): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.922:10472): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.926:10473): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.926:10474): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.926:10475): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.926:10476): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.926:10477): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.930:10478): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.934:10479): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.946:10480): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.946:10481): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.946:10482): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.946:10483): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.946:10484): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.946:10485): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.946:10486): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.954:10487): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.954:10488): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.954:10489): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.954:10490): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.954:10491): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.954:10492): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.978:10493): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.994:10494): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.994:10495): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.994:10496): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.998:10497): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.998:10498): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.998:10499): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.002:10500): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.002:10501): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.002:10502): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.014:10503): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.014:10504): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.018:10505): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.018:10506): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.022:10507): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.022:10508): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.026:10509): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.026:10510): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.026:10511): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.030:10512): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.030:10513): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.030:10514): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.034:10515): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.034:10516): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.034:10517): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.034:10518): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.050:10519): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.050:10520): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.050:10521): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.054:10522): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.054:10523): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.054:10524): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.058:10525): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.058:10526): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.058:10527): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.058:10528): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.058:10529): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.058:10530): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.062:10531): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.062:10532): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.070:10533): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.070:10534): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.082:10535): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.086:10536): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.086:10537): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.086:10538): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.086:10539): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.090:10540): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.090:10541): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.090:10542): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.090:10543): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.090:10544): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.090:10545): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.094:10546): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.094:10547): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.098:10548): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.110:10549): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.114:10550): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.114:10551): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.114:10552): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.114:10553): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.118:10554): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.118:10555): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.118:10556): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.118:10557): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.122:10558): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.122:10559): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.122:10560): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.126:10561): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.126:10562): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.126:10563): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.138:10564): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.138:10565): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.138:10566): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.142:10567): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.142:10568): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.142:10569): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.142:10570): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.146:10571): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.146:10572): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.146:10573): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.150:10574): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.150:10575): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.154:10576): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.154:10577): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.162:10578): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.162:10579): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.166:10580): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.166:10581): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.166:10582): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.170:10583): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.170:10584): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.170:10585): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.170:10586): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.170:10587): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.174:10588): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.174:10589): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.182:10590): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.182:10591): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.194:10592): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.198:10593): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.198:10594): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.198:10595): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.198:10596): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.202:10597): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.202:10598): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.202:10599): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.206:10600): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.206:10601): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.206:10602): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.210:10603): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.210:10604): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.214:10605): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.226:10606): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.226:10607): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.226:10608): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.230:10609): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.230:10610): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.230:10611): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.230:10612): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.234:10613): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.234:10614): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.270:10615): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.270:10616): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.274:10617): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.274:10618): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.274:10619): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.274:10620): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.274:10621): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.282:10622): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.286:10623): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.286:10624): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.286:10625): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.286:10626): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.290:10627): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.290:10628): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.290:10629): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.294:10630): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.294:10631): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.298:10632): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.298:10633): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.358:10634): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.362:10635): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.362:10636): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.362:10637): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.362:10638): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.366:10639): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.366:10640): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.366:10641): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.370:10642): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.382:10643): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.382:10644): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.386:10645): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.386:10646): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.386:10647): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.390:10648): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.394:10649): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.394:10650): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.398:10651): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.398:10652): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.398:10653): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.398:10654): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.402:10655): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.402:10656): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.402:10657): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.406:10658): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.406:10659): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.410:10660): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.418:10661): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.426:10662): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.426:10663): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.426:10664): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.434:10665): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.434:10666): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.434:10667): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.434:10668): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.438:10669): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.438:10670): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.438:10671): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.438:10672): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.446:10673): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.446:10674): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.454:10675): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.470:10676): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.470:10677): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.470:10678): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.474:10679): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.474:10680): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.474:10681): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.474:10682): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.478:10683): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.478:10684): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.478:10685): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.478:10686): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.482:10687): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.482:10688): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.490:10689): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.502:10690): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.502:10691): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.502:10692): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.502:10693): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.506:10694): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.506:10695): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.506:10696): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.506:10697): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.506:10698): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.510:10699): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.510:10700): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.514:10701): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.514:10702): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.518:10703): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.526:10704): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.530:10705): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.530:10706): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.530:10707): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.534:10708): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.534:10709): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.534:10710): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.534:10711): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.534:10712): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.538:10713): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.538:10714): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.542:10715): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.542:10716): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.554:10717): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.566:10718): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.566:10719): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.570:10720): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.570:10721): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.570:10722): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.570:10723): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.570:10724): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.570:10725): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.570:10726): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.574:10727): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.578:10728): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.578:10729): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.582:10730): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.586:10731): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.602:10732): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.602:10733): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.602:10734): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.602:10735): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.606:10736): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.606:10737): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.606:10738): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.606:10739): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.610:10740): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.610:10741): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.610:10742): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.614:10743): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.614:10744): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.638:10745): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.658:10746): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.658:10747): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.658:10748): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.658:10749): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.662:10750): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.662:10751): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.662:10752): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.662:10753): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.666:10754): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.682:10755): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.682:10756): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.682:10757): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.682:10758): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.686:10759): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.686:10760): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.686:10761): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.686:10762): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.686:10763): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.690:10764): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.690:10765): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.690:10766): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.694:10767): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.714:10768): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.714:10769): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.714:10770): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.714:10771): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.714:10772): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.718:10773): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.718:10774): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.718:10775): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.718:10776): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.718:10777): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.718:10778): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.718:10779): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.730:10780): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.730:10781): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.734:10782): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.734:10783): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.738:10784): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.738:10785): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.742:10786): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.742:10787): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.742:10788): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.742:10789): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.742:10790): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.746:10791): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.754:10792): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.754:10793): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.758:10794): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.758:10795): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.758:10796): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.762:10797): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.762:10798): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.770:10799): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.770:10800): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.774:10801): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.794:10802): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.794:10803): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.794:10804): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.798:10805): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.798:10806): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.798:10807): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.798:10808): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.798:10809): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.798:10810): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.802:10811): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.806:10812): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.806:10813): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.806:10814): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.822:10815): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.822:10816): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.822:10817): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.826:10818): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.826:10819): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.826:10820): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.830:10821): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.830:10822): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.830:10823): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.830:10824): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.842:10825): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.842:10826): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.846:10827): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.846:10828): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.846:10829): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.846:10830): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.854:10831): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.854:10832): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.854:10833): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.854:10834): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.854:10835): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.858:10836): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.858:10837): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.858:10838): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.862:10839): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.862:10840): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.862:10841): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.866:10842): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.866:10843): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.878:10844): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.882:10845): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.882:10846): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.882:10847): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.882:10848): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.886:10849): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.886:10850): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.886:10851): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.886:10852): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.890:10853): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.890:10854): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.894:10855): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.894:10856): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.898:10857): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.910:10858): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.910:10859): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.910:10860): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.914:10861): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.914:10862): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.914:10863): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.918:10864): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.918:10865): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.918:10866): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.938:10867): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.942:10868): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.942:10869): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.942:10870): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.946:10871): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.946:10872): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.950:10873): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.950:10874): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.950:10875): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.950:10876): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.950:10877): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.950:10878): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.954:10879): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.954:10880): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.954:10881): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.958:10882): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.958:10883): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.962:10884): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.966:10885): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.982:10886): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.982:10887): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.982:10888): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.982:10889): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.982:10890): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.982:10891): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.986:10892): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.986:10893): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.986:10894): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.986:10895): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.990:10896): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.990:10897): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.994:10898): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.994:10899): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.002:10900): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.006:10901): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.006:10902): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.006:10903): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.006:10904): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.006:10905): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.006:10906): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.010:10907): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.010:10908): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.010:10909): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.014:10910): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.014:10911): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.022:10912): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.026:10913): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.058:10914): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.058:10915): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.058:10916): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.062:10917): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.062:10918): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.062:10919): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.066:10920): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.066:10921): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.066:10922): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.070:10923): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.070:10924): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.070:10925): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.070:10926): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.074:10927): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.090:10928): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.090:10929): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.094:10930): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.094:10931): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.094:10932): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.098:10933): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.098:10934): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.098:10935): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.098:10936): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.114:10937): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.114:10938): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.114:10939): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.114:10940): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.118:10941): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.122:10942): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.122:10943): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.122:10944): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.126:10945): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.126:10946): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.126:10947): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.126:10948): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.126:10949): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.126:10950): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.130:10951): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.130:10952): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.134:10953): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.134:10954): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.154:10955): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.174:10956): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.174:10957): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.174:10958): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.174:10959): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.174:10960): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.178:10961): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.178:10962): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.178:10963): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.178:10964): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.178:10965): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.182:10966): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.182:10967): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.186:10968): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.194:10969): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.202:10970): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.202:10971): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.202:10972): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.206:10973): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.206:10974): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.206:10975): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.206:10976): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.206:10977): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.210:10978): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.210:10979): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.214:10980): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.214:10981): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.214:10982): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.214:10983): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.230:10984): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.234:10985): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.234:10986): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.234:10987): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.234:10988): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.238:10989): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.238:10990): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.238:10991): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.238:10992): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.238:10993): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.242:10994): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.242:10995): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.246:10996): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.266:10997): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.278:10998): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.278:10999): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.282:11000): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.282:11001): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.282:11002): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.286:11003): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.286:11004): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.286:11005): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.286:11006): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.290:11007): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.290:11008): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.290:11009): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.294:11010): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.294:11011): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.306:11012): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.306:11013): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.306:11014): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.306:11015): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.306:11016): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.306:11017): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.314:11018): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.314:11019): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.314:11020): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.314:11021): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.318:11022): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.318:11023): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.322:11024): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.322:11025): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.342:11026): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.342:11027): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.342:11028): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.342:11029): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.346:11030): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.346:11031): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.346:11032): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.346:11033): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.350:11034): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.350:11035): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.350:11036): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.354:11037): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.354:11038): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.354:11039): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.366:11040): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.366:11041): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.366:11042): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.370:11043): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.370:11044): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.370:11045): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.370:11046): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.374:11047): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.374:11048): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.374:11049): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.378:11050): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.378:11051): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.382:11052): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.382:11053): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.390:11054): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.390:11055): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.394:11056): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.394:11057): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.394:11058): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.398:11059): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.398:11060): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.398:11061): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.398:11062): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.402:11063): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.402:11064): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.406:11065): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.406:11066): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.410:11067): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.422:11068): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.422:11069): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.422:11070): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.422:11071): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.426:11072): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.426:11073): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.426:11074): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.430:11075): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.430:11076): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.430:11077): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.434:11078): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.434:11079): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.434:11080): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.438:11081): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.446:11082): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.446:11083): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.446:11084): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.450:11085): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.450:11086): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.454:11087): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.454:11088): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.454:11089): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.454:11090): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.454:11091): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.458:11092): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.462:11093): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.462:11094): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.478:11095): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.490:11096): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.490:11097): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.494:11098): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.494:11099): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.494:11100): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.494:11101): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.494:11102): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.494:11103): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.498:11104): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.498:11105): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.498:11106): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.502:11107): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.502:11108): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.558:11109): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.570:11110): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.574:11111): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.574:11112): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.578:11113): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.578:11114): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.582:11115): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.582:11116): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.586:11117): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.586:11118): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.590:11119): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.590:11120): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.598:11121): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.598:11122): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.602:11123): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.602:11124): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.606:11125): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.606:11126): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.606:11127): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.606:11128): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.606:11129): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.606:11130): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.610:11131): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.610:11132): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.610:11133): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.630:11134): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.634:11135): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.634:11136): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.634:11137): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.638:11138): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.638:11139): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.642:11140): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.642:11141): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.646:11142): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.646:11143): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.646:11144): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.646:11145): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.646:11146): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.646:11147): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.650:11148): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.650:11149): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.650:11150): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.682:11151): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.698:11152): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.702:11153): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.702:11154): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.702:11155): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.702:11156): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.706:11157): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.706:11158): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.710:11159): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.710:11160): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.714:11161): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.714:11162): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.726:11163): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.726:11164): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.726:11165): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.726:11166): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.726:11167): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.726:11168): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.726:11169): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.726:11170): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.726:11171): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.726:11172): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.726:11173): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.726:11174): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.726:11175): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.738:11176): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.738:11177): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.742:11178): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.742:11179): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.758:11180): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.762:11181): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.762:11182): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.762:11183): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.766:11184): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.766:11185): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.766:11186): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.766:11187): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.770:11188): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.770:11189): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.770:11190): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.774:11191): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.782:11192): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.782:11193): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.798:11194): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.798:11195): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.798:11196): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.802:11197): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.806:11198): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.806:11199): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.810:11200): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.810:11201): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.822:11202): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.822:11203): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.822:11204): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.822:11205): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.822:11206): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.834:11207): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.834:11208): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.834:11209): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.834:11210): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.882:11211): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.882:11212): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.882:11213): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.886:11214): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.886:11215): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.886:11216): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.890:11217): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.890:11218): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.894:11219): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.894:11220): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.898:11221): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.914:11222): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.914:11223): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.918:11224): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.918:11225): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.918:11226): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.918:11227): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.918:11228): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.918:11229): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.922:11230): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.922:11231): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.922:11232): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.934:11233): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=AVC msg=audit(1163772874.970:11234): avc: denied { execute } for pid=8103 comm="dbus-daemon" name="dhcdbd" dev=dm-0 ino=9984544 scontext=staff_u:staff_r:staff_dbusd_t:s0 tcontext=system_u:object_r:dhcpc_exec_t:s0 tclass=file type=AVC msg=audit(1163772874.970:11234): avc: denied { execute_no_trans } for pid=8103 comm="dbus-daemon" name="dhcdbd" dev=dm-0 ino=9984544 scontext=staff_u:staff_r:staff_dbusd_t:s0 tcontext=system_u:object_r:dhcpc_exec_t:s0 tclass=file type=AVC msg=audit(1163772874.970:11234): avc: denied { read } for pid=8103 comm="dbus-daemon" name="dhcdbd" dev=dm-0 ino=9984544 scontext=staff_u:staff_r:staff_dbusd_t:s0 tcontext=system_u:object_r:dhcpc_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163772874.970:11234): arch=40000003 syscall=11 success=yes exit=0 a0=9222e60 a1=922b8b0 a2=9222138 a3=11 items=0 ppid=8102 pid=8103 auid=500 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) comm="dhcdbd" exe="/sbin/dhcdbd" subj=staff_u:staff_r:staff_dbusd_t:s0 key=(null) type=AVC_PATH msg=audit(1163772874.970:11234): path="/sbin/dhcdbd" type=AVC_PATH msg=audit(1163772874.970:11234): path="/sbin/dhcdbd" type=AVC msg=audit(1163772875.014:11235): avc: denied { write } for pid=8103 comm="dhcdbd" name="system_bus_socket" dev=dm-0 ino=14436971 scontext=staff_u:staff_r:staff_dbusd_t:s0 tcontext=staff_u:object_r:system_dbusd_var_run_t:s0 tclass=sock_file type=AVC msg=audit(1163772875.014:11235): avc: denied { connectto } for pid=8103 comm="dhcdbd" name="system_bus_socket" scontext=staff_u:staff_r:staff_dbusd_t:s0 tcontext=staff_u:staff_r:staff_dbusd_t:s0 tclass=unix_stream_socket type=SYSCALL msg=audit(1163772875.014:11235): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=bfb65830 a2=4d18494 a3=1f items=0 ppid=8102 pid=8103 auid=500 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) comm="dhcdbd" exe="/sbin/dhcdbd" subj=staff_u:staff_r:staff_dbusd_t:s0 key=(null) type=AVC_PATH msg=audit(1163772875.014:11235): path="/var/run/dbus/system_bus_socket" type=USER_AVC msg=audit(1163772875.022:11236): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=AVC msg=audit(1163772875.030:11237): avc: denied { write } for pid=8102 comm="dbus-daemon" name="[31337]" dev=pipefs ino=31337 scontext=staff_u:staff_r:staff_dbusd_t:s0 tcontext=staff_u:staff_r:staff_dbusd_t:s0 tclass=fifo_file type=SYSCALL msg=audit(1163772875.030:11237): arch=40000003 syscall=4 success=yes exit=1 a0=12 a1=bfcd505b a2=1 a3=b7fb1688 items=0 ppid=6659 pid=8102 auid=500 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) comm="dbus-daemon" exe="/bin/dbus-daemon" subj=staff_u:staff_r:staff_dbusd_t:s0 key=(null) type=AVC_PATH msg=audit(1163772875.030:11237): path="pipe:[31337]" type=AVC msg=audit(1163772875.030:11238): avc: denied { read } for pid=8102 comm="dbus-daemon" name="[31337]" dev=pipefs ino=31337 scontext=staff_u:staff_r:staff_dbusd_t:s0 tcontext=staff_u:staff_r:staff_dbusd_t:s0 tclass=fifo_file type=SYSCALL msg=audit(1163772875.030:11238): arch=40000003 syscall=3 success=yes exit=1 a0=10 a1=bfcd5408 a2=1 a3=13 items=0 ppid=6659 pid=8102 auid=500 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) comm="dbus-daemon" exe="/bin/dbus-daemon" subj=staff_u:staff_r:staff_dbusd_t:s0 key=(null) type=AVC_PATH msg=audit(1163772875.030:11238): path="pipe:[31337]" type=USER_AVC msg=audit(1163772875.038:11239): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772875.046:11240): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772875.050:11241): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772875.050:11242): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772875.050:11243): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772875.054:11244): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772875.130:11245): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772875.134:11246): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772875.134:11247): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772875.134:11248): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772875.138:11249): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772875.146:11250): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772875.146:11251): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772875.146:11252): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772875.146:11253): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=AVC msg=audit(1163772875.170:11254): avc: denied { dac_override } for pid=8094 comm="dhcdbd" capability=1 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=capability type=AVC msg=audit(1163772875.170:11254): avc: denied { read } for pid=8094 comm="dhcdbd" name="dhcdbd.pid" dev=dm-0 ino=14437127 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:dhcpc_var_run_t:s0 tclass=file type=SYSCALL msg=audit(1163772875.170:11254): arch=40000003 syscall=5 success=yes exit=3 a0=830d2a8 a1=8000 a2=0 a3=8000 items=0 ppid=8085 pid=8094 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="dhcdbd" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163772875.170:11255): avc: denied { ioctl } for pid=8094 comm="dhcdbd" name="dhcdbd.pid" dev=dm-0 ino=14437127 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:dhcpc_var_run_t:s0 tclass=file type=SYSCALL msg=audit(1163772875.170:11255): arch=40000003 syscall=54 success=no exit=-25 a0=0 a1=5401 a2=bf7ffd68 a3=bf7ffda8 items=0 ppid=8085 pid=8094 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="dhcdbd" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163772875.170:11255): path="/var/run/dhcdbd.pid" type=USER_AVC msg=audit(1163772875.186:11256): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772875.186:11257): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772875.186:11258): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772875.186:11259): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772875.194:11260): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772875.194:11261): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772875.194:11262): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772875.194:11263): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772875.194:11264): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=AVC msg=audit(1163772875.194:11265): avc: denied { execute } for pid=8111 comm="bash" name="dhcdbd" dev=dm-0 ino=9984544 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:dhcpc_exec_t:s0 tclass=file type=AVC msg=audit(1163772875.194:11265): avc: denied { execute_no_trans } for pid=8111 comm="bash" name="dhcdbd" dev=dm-0 ino=9984544 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:dhcpc_exec_t:s0 tclass=file type=AVC msg=audit(1163772875.194:11265): avc: denied { read } for pid=8111 comm="bash" name="dhcdbd" dev=dm-0 ino=9984544 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:dhcpc_exec_t:s0 tclass=file type=USER_AVC msg=audit(1163772875.194:11266): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=SYSCALL msg=audit(1163772875.194:11265): arch=40000003 syscall=11 success=yes exit=0 a0=99b6768 a1=99b6830 a2=99b6ab8 a3=99b6638 items=0 ppid=8108 pid=8111 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="dhcdbd" exe="/sbin/dhcdbd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163772875.194:11265): path="/sbin/dhcdbd" type=AVC_PATH msg=audit(1163772875.194:11265): path="/sbin/dhcdbd" type=USER_AVC msg=audit(1163772875.194:11267): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772875.206:11268): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772875.214:11269): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=AVC msg=audit(1163772875.214:11270): avc: denied { unlink } for pid=8112 comm="dhcdbd" name="dhcdbd.pid" dev=dm-0 ino=14437127 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:dhcpc_var_run_t:s0 tclass=file type=SYSCALL msg=audit(1163772875.214:11270): arch=40000003 syscall=10 success=yes exit=0 a0=8057e86 a1=0 a2=bfb0bbbc a3=9b16fe0 items=0 ppid=1 pid=8112 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="dhcdbd" exe="/sbin/dhcdbd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163772875.214:11271): avc: denied { add_name } for pid=8112 comm="dhcdbd" name="dhcdbd.pid" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:var_run_t:s0 tclass=dir type=USER_AVC msg=audit(1163772875.214:11272): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=AVC msg=audit(1163772875.214:11271): avc: denied { create } for pid=8112 comm="dhcdbd" name="dhcdbd.pid" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:var_run_t:s0 tclass=file type=SYSCALL msg=audit(1163772875.214:11271): arch=40000003 syscall=5 success=yes exit=5 a0=8057e86 a1=41 a2=0 a3=9b16fe0 items=0 ppid=1 pid=8112 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="dhcdbd" exe="/sbin/dhcdbd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163772875.214:11273): avc: denied { write } for pid=8112 comm="dhcdbd" name="dhcdbd.pid" dev=dm-0 ino=14437120 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:var_run_t:s0 tclass=file type=SYSCALL msg=audit(1163772875.214:11273): arch=40000003 syscall=4 success=yes exit=4 a0=5 a1=bfb0bc48 a2=4 a3=9b16fe0 items=0 ppid=1 pid=8112 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="dhcdbd" exe="/sbin/dhcdbd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163772875.214:11273): path="/var/run/dhcdbd.pid" type=USER_AVC msg=audit(1163772875.230:11274): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772875.230:11275): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772875.234:11276): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772875.234:11277): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=com.redhat.dhcp.dbus.get member=reason dest=com.redhat.dhcp spid=6687 tpid=8112 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772875.634:11278): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=error error_name=org.freedesktop.DBus.Error.UnknownMethod dest=:1.6 spid=8112 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772875.634:11279): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772875.634:11280): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772875.638:11281): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772875.638:11282): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772875.638:11283): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772875.638:11284): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772875.638:11285): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772875.642:11286): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772875.642:11287): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772875.646:11288): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772876.642:11289): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=com.redhat.dhcp member=up dest=com.redhat.dhcp spid=6687 tpid=8112 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=AVC msg=audit(1163772876.662:11290): avc: denied { signal } for pid=8112 comm="dhcdbd" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:dhcpc_t:s0 tclass=process type=SYSCALL msg=audit(1163772876.662:11290): arch=40000003 syscall=37 success=yes exit=0 a0=c34 a1=f a2=0 a3=bfb0a5c8 items=0 ppid=1 pid=8112 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="dhcdbd" exe="/sbin/dhcdbd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=USER_AVC msg=audit(1163772876.870:11291): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=com.redhat.dhcp.state member=eth0 dest=org.freedesktop.DBus spid=8112 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772876.870:11292): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return interface=com.redhat.dhcp member=up dest=:1.6 spid=8112 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=AVC msg=audit(1163772876.874:11293): avc: denied { read } for pid=8116 comm="dhclient" name="dhclient-eth0.leases" dev=dm-0 ino=14437333 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:dhcpc_state_t:s0 tclass=file type=SYSCALL msg=audit(1163772876.874:11293): arch=40000003 syscall=5 success=yes exit=4 a0=bf926f50 a1=0 a2=ffb700 a3=fef190 items=0 ppid=8112 pid=8116 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="dhclient" exe="/sbin/dhclient" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163772876.882:11294): avc: denied { write } for pid=8116 comm="dhclient" name="dhclient-eth0.leases" dev=dm-0 ino=14437333 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:dhcpc_state_t:s0 tclass=file type=SYSCALL msg=audit(1163772876.882:11294): arch=40000003 syscall=5 success=yes exit=4 a0=bf926f50 a1=241 a2=1b6 a3=9634038 items=0 ppid=8112 pid=8116 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="dhclient" exe="/sbin/dhclient" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163772876.918:11295): avc: denied { ioctl } for pid=8117 comm="dhclient-script" name="dhclient-script" dev=dm-0 ino=2848156 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:dhcpc_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163772876.918:11295): arch=40000003 syscall=54 success=no exit=-25 a0=3 a1=5401 a2=bf9d1cf8 a3=bf9d1d38 items=0 ppid=8116 pid=8117 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="dhclient-script" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163772876.918:11295): path="/sbin/dhclient-script" type=USER_AVC msg=audit(1163772876.934:11296): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=com.redhat.dhcp member=set dest=com.redhat.dhcp spid=8121 tpid=8112 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772876.938:11297): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=com.redhat.dhcp.state member=eth0 dest=org.freedesktop.DBus spid=8112 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772876.938:11298): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return interface=com.redhat.dhcp member=set dest=:1.10 spid=8112 tpid=8121 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=AVC msg=audit(1163772876.942:11299): avc: denied { create } for pid=8116 comm="dhclient" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=packet_socket type=AVC msg=audit(1163772876.942:11299): avc: denied { net_raw } for pid=8116 comm="dhclient" capability=13 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=capability type=SYSCALL msg=audit(1163772876.942:11299): arch=40000003 syscall=102 success=yes exit=6 a0=1 a1=bf924280 a2=feeb34 a3=9604620 items=0 ppid=8112 pid=8116 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="dhclient" exe="/sbin/dhclient" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163772876.942:11300): avc: denied { bind } for pid=8116 comm="dhclient" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=packet_socket type=SYSCALL msg=audit(1163772876.942:11300): arch=40000003 syscall=102 success=yes exit=0 a0=2 a1=bf924280 a2=feeb34 a3=bf9242a8 items=0 ppid=8112 pid=8116 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="dhclient" exe="/sbin/dhclient" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163772876.974:11301): avc: denied { setopt } for pid=8116 comm="dhclient" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=packet_socket type=SYSCALL msg=audit(1163772876.974:11301): arch=40000003 syscall=102 success=yes exit=0 a0=e a1=bf9242d0 a2=feeb34 a3=9604620 items=0 ppid=8112 pid=8116 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="dhclient" exe="/sbin/dhclient" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163772876.974:11302): avc: denied { name_bind } for pid=8116 comm="dhclient" src=68 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:dhcpc_port_t:s0 tclass=udp_socket type=AVC msg=audit(1163772876.974:11302): avc: denied { net_bind_service } for pid=8116 comm="dhclient" capability=10 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=capability type=SYSCALL msg=audit(1163772876.974:11302): arch=40000003 syscall=102 success=yes exit=0 a0=2 a1=bf924260 a2=feeb34 a3=5 items=0 ppid=8112 pid=8116 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="dhclient" exe="/sbin/dhclient" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163772876.974:11303): avc: denied { write } for pid=8116 comm="dhclient" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=packet_socket type=SYSCALL msg=audit(1163772876.974:11303): arch=40000003 syscall=102 success=yes exit=342 a0=b a1=bf924540 a2=feeb34 a3=bf924c14 items=0 ppid=8112 pid=8116 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="dhclient" exe="/sbin/dhclient" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163772878.022:11304): avc: denied { read } for pid=8116 comm="dhclient" name="[31406]" dev=sockfs ino=31406 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=packet_socket type=SYSCALL msg=audit(1163772878.022:11304): arch=40000003 syscall=3 success=yes exit=590 a0=6 a1=bf923428 a2=600 a3=9604620 items=0 ppid=8112 pid=8116 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="dhclient" exe="/sbin/dhclient" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163772878.022:11304): path="socket:[31406]" type=USER_AVC msg=audit(1163772878.038:11305): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=com.redhat.dhcp member=set dest=com.redhat.dhcp spid=8126 tpid=8112 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772878.038:11306): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=com.redhat.dhcp.state member=eth0 dest=org.freedesktop.DBus spid=8112 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772878.038:11307): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return interface=com.redhat.dhcp member=set dest=:1.11 spid=8112 tpid=8126 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772878.042:11308): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772878.042:11309): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=com.redhat.dhcp.dbus.get member=ip_address dest=com.redhat.dhcp spid=6687 tpid=8112 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772878.042:11310): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return interface=com.redhat.dhcp.dbus.get member=ip_address dest=:1.6 spid=8112 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772878.046:11311): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=com.redhat.dhcp.dbus.get member=subnet_mask dest=com.redhat.dhcp spid=6687 tpid=8112 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772878.046:11312): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return interface=com.redhat.dhcp.dbus.get member=subnet_mask dest=:1.6 spid=8112 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772878.046:11313): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=com.redhat.dhcp.dbus.get member=broadcast_address dest=com.redhat.dhcp spid=6687 tpid=8112 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772878.046:11314): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return interface=com.redhat.dhcp.dbus.get member=broadcast_address dest=:1.6 spid=8112 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772878.050:11315): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=com.redhat.dhcp.dbus.get member=routers dest=com.redhat.dhcp spid=6687 tpid=8112 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772878.050:11316): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return interface=com.redhat.dhcp.dbus.get member=routers dest=:1.6 spid=8112 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772878.054:11317): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=com.redhat.dhcp.dbus.get member=host_name dest=com.redhat.dhcp spid=6687 tpid=8112 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772878.054:11318): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=error error_name=org.freedesktop.DBus.Error.UnknownMethod dest=:1.6 spid=8112 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772878.058:11319): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=com.redhat.dhcp.dbus.get member=domain_name_servers dest=com.redhat.dhcp spid=6687 tpid=8112 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772878.058:11320): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return interface=com.redhat.dhcp.dbus.get member=domain_name_servers dest=:1.6 spid=8112 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772878.058:11321): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=com.redhat.dhcp.dbus.get member=domain_name dest=com.redhat.dhcp spid=6687 tpid=8112 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772878.062:11322): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return interface=com.redhat.dhcp.dbus.get member=domain_name dest=:1.6 spid=8112 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772878.062:11323): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=com.redhat.dhcp.dbus.get member=nis_domain dest=com.redhat.dhcp spid=6687 tpid=8112 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772878.062:11324): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=error error_name=org.freedesktop.DBus.Error.UnknownMethod dest=:1.6 spid=8112 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772878.066:11325): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=com.redhat.dhcp.dbus.get member=nis_servers dest=com.redhat.dhcp spid=6687 tpid=8112 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772878.066:11326): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=error error_name=org.freedesktop.DBus.Error.UnknownMethod dest=:1.6 spid=8112 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772878.066:11327): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=AVC msg=audit(1163772879.090:11328): avc: denied { ioctl } for pid=6689 comm="NetworkManager" name="[31434]" dev=sockfs ino=31434 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=packet_socket type=SYSCALL msg=audit(1163772879.090:11328): arch=40000003 syscall=54 success=yes exit=0 a0=c a1=890b a2=b7f85194 a3=84fe248 items=0 ppid=1 pid=6689 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="NetworkManager" exe="/usr/sbin/NetworkManager" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163772879.090:11328): path="socket:[31434]" type=AVC msg=audit(1163772879.102:11329): avc: denied { write } for pid=6689 comm="NetworkManager" name="etc" dev=dm-0 ino=9329761 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=dir type=AVC msg=audit(1163772879.102:11329): avc: denied { add_name } for pid=6689 comm="NetworkManager" name="resolv.conf.tmp" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=dir type=AVC msg=audit(1163772879.102:11329): avc: denied { create } for pid=6689 comm="NetworkManager" name="resolv.conf.tmp" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1163772879.102:11329): arch=40000003 syscall=5 success=yes exit=12 a0=80892c8 a1=241 a2=1b6 a3=84ff4b8 items=0 ppid=1 pid=6689 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="NetworkManager" exe="/usr/sbin/NetworkManager" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163772879.102:11330): avc: denied { write } for pid=6689 comm="NetworkManager" name="resolv.conf.tmp" dev=dm-0 ino=9330919 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1163772879.102:11330): arch=40000003 syscall=4 success=yes exit=125 a0=c a1=b7fa1000 a2=7d a3=7d items=0 ppid=1 pid=6689 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="NetworkManager" exe="/usr/sbin/NetworkManager" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163772879.102:11330): path="/etc/resolv.conf.tmp" type=AVC msg=audit(1163772879.102:11331): avc: denied { remove_name } for pid=6689 comm="NetworkManager" name="resolv.conf.tmp" dev=dm-0 ino=9330919 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=dir type=AVC msg=audit(1163772879.102:11331): avc: denied { rename } for pid=6689 comm="NetworkManager" name="resolv.conf.tmp" dev=dm-0 ino=9330919 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:etc_t:s0 tclass=file type=AVC msg=audit(1163772879.102:11331): avc: denied { unlink } for pid=6689 comm="NetworkManager" name="resolv.conf" dev=dm-0 ino=9330239 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:net_conf_t:s0 tclass=file type=SYSCALL msg=audit(1163772879.102:11331): arch=40000003 syscall=38 success=yes exit=0 a0=80892c8 a1=8089313 a2=8094374 a3=808930e items=0 ppid=1 pid=6689 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="NetworkManager" exe="/usr/sbin/NetworkManager" subj=staff_u:staff_r:staff_t:s0 key=(null) type=USER_AVC msg=audit(1163772879.118:11332): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772879.122:11333): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772879.122:11334): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceNowActive dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772879.122:11335): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772879.126:11336): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772879.126:11337): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772879.126:11338): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772881.978:11339): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManagerInfo member=UserInterfaceActivated dest=org.freedesktop.DBus spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=AVC msg=audit(1163772883.738:11340): avc: denied { read } for pid=8133 comm="nm-vpnc-auth-di" name=".ICEauthority" dev=dm-0 ino=6574784 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:staff_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163772883.738:11340): arch=40000003 syscall=33 success=yes exit=0 a0=952dcb0 a1=4 a2=df7770 a3=952dcb0 items=0 ppid=3866 pid=8133 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="nm-vpnc-auth-di" exe="/usr/libexec/nm-vpnc-auth-dialog" subj=staff_u:staff_r:staff_t:s0 key=(null) type=USER_AVC msg=audit(1163772883.750:11341): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.VPNConnections member=activateVPNConnection dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772883.750:11342): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManagerInfo member=UserInterfaceActivated dest=org.freedesktop.DBus spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772883.750:11343): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManagerInfo member=getVPNConnectionRoutes dest=org.freedesktop.NetworkManagerInfo spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772883.750:11344): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.6 spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772883.754:11345): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManagerInfo member=getVPNConnectionVPNData dest=org.freedesktop.NetworkManagerInfo spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772883.754:11346): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.6 spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=AVC msg=audit(1163772883.766:11347): avc: denied { execute } for pid=8136 comm="sh" name="modprobe" dev=dm-0 ino=9984520 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:insmod_exec_t:s0 tclass=file type=AVC msg=audit(1163772883.766:11347): avc: denied { execute_no_trans } for pid=8136 comm="sh" name="modprobe" dev=dm-0 ino=9984520 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:insmod_exec_t:s0 tclass=file type=AVC msg=audit(1163772883.766:11347): avc: denied { read } for pid=8136 comm="sh" name="modprobe" dev=dm-0 ino=9984520 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:insmod_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163772883.766:11347): arch=40000003 syscall=11 success=yes exit=0 a0=99066c0 a1=9906830 a2=9906770 a3=9906548 items=0 ppid=8135 pid=8136 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="modprobe" exe="/sbin/modprobe" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163772883.766:11347): path="/sbin/modprobe" type=AVC_PATH msg=audit(1163772883.766:11347): path="/sbin/modprobe" type=AVC msg=audit(1163772883.770:11348): avc: denied { read } for pid=8136 comm="modprobe" name="modules.dep" dev=dm-0 ino=13720574 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:modules_object_t:s0 tclass=file type=SYSCALL msg=audit(1163772883.770:11348): arch=40000003 syscall=5 success=yes exit=5 a0=8bd8118 a1=0 a2=1b6 a3=8bd8300 items=0 ppid=8135 pid=8136 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="modprobe" exe="/sbin/modprobe" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163772883.774:11349): avc: denied { read write } for pid=8136 comm="modprobe" name="tun.ko" dev=dm-0 ino=13719702 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:modules_object_t:s0 tclass=file type=SYSCALL msg=audit(1163772883.774:11349): arch=40000003 syscall=5 success=yes exit=5 a0=8bd80bc a1=2 a2=0 a3=8bd80bc items=0 ppid=8135 pid=8136 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="modprobe" exe="/sbin/modprobe" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163772883.774:11350): avc: denied { lock } for pid=8136 comm="modprobe" name="tun.ko" dev=dm-0 ino=13719702 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:modules_object_t:s0 tclass=file type=SYSCALL msg=audit(1163772883.774:11350): arch=40000003 syscall=221 success=yes exit=0 a0=5 a1=7 a2=bfcf47a0 a3=bfcf47a0 items=0 ppid=8135 pid=8136 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="modprobe" exe="/sbin/modprobe" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163772883.774:11350): path="/lib/modules/2.6.18-1.2849.fc6xen/kernel/drivers/net/tun.ko" type=USER_AVC msg=audit(1163772883.783:11351): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager.vpnc member=StateChange dest=org.freedesktop.DBus spid=8135 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772883.967:11352): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager.VPNConnections member=VPNConnectionStateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772883.967:11353): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.vpnc member=startConnection dest=org.freedesktop.NetworkManager.vpnc spid=6687 tpid=8135 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772883.967:11354): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager.vpnc member=StateChange dest=org.freedesktop.DBus spid=8135 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=AVC msg=audit(1163772883.987:11355): avc: denied { execute } for pid=8137 comm="nm-vpnc-service" name="vpnc" dev=dm-0 ino=10323010 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:vpnc_exec_t:s0 tclass=file type=AVC msg=audit(1163772883.987:11355): avc: denied { execute_no_trans } for pid=8137 comm="nm-vpnc-service" name="vpnc" dev=dm-0 ino=10323010 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:vpnc_exec_t:s0 tclass=file type=AVC msg=audit(1163772883.987:11355): avc: denied { read } for pid=8137 comm="nm-vpnc-service" name="vpnc" dev=dm-0 ino=10323010 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:vpnc_exec_t:s0 tclass=file type=USER_AVC msg=audit(1163772884.003:11356): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.6 spid=8135 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772884.003:11357): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager.VPNConnections member=VPNConnectionStateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=SYSCALL msg=audit(1163772883.987:11355): arch=40000003 syscall=11 success=yes exit=0 a0=804b8f3 a1=8bcf518 a2=bf99503c a3=0 items=0 ppid=8135 pid=8137 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vpnc" exe="/usr/sbin/vpnc" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163772883.987:11355): path="/usr/sbin/vpnc" type=AVC_PATH msg=audit(1163772883.987:11355): path="/usr/sbin/vpnc" type=AVC msg=audit(1163772884.031:11358): avc: denied { ipc_lock } for pid=8137 comm="vpnc" capability=14 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=capability type=SYSCALL msg=audit(1163772884.031:11358): arch=40000003 syscall=150 success=yes exit=0 a0=b7fc1000 a1=4000 a2=57612c4 a3=b7fc1000 items=0 ppid=8135 pid=8137 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vpnc" exe="/usr/sbin/vpnc" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163772884.031:11359): avc: denied { name_bind } for pid=8137 comm="vpnc" src=500 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:isakmp_port_t:s0 tclass=udp_socket type=SYSCALL msg=audit(1163772884.031:11359): arch=40000003 syscall=102 success=yes exit=0 a0=2 a1=bfa213a0 a2=805b6e8 a3=3 items=0 ppid=8135 pid=8137 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vpnc" exe="/usr/sbin/vpnc" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163772884.047:11360): avc: denied { read write } for pid=8137 comm="vpnc" name="tun" dev=tmpfs ino=1473 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:tun_tap_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163772884.047:11360): arch=40000003 syscall=5 success=yes exit=4 a0=8058da4 a1=2 a2=10 a3=805c4c4 items=0 ppid=8135 pid=8137 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vpnc" exe="/usr/sbin/vpnc" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163772884.047:11361): avc: denied { ioctl } for pid=8137 comm="vpnc" name="tun" dev=tmpfs ino=1473 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:tun_tap_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163772884.047:11361): arch=40000003 syscall=54 success=yes exit=0 a0=4 a1=400454ca a2=bfa213b8 a3=4 items=0 ppid=8135 pid=8137 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vpnc" exe="/usr/sbin/vpnc" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163772884.047:11361): path="/dev/net/tun" type=USER_AVC msg=audit(1163772884.735:11362): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.vpnc member=signalIP4Config dest=org.freedesktop.NetworkManager.vpnc spid=8149 tpid=8135 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772884.739:11363): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager.vpnc member=IP4Config dest=org.freedesktop.DBus spid=8135 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772884.739:11364): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager.vpnc member=StateChange dest=org.freedesktop.DBus spid=8135 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772884.739:11365): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManagerInfo member=getVPNConnectionRoutes dest=org.freedesktop.NetworkManagerInfo spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772884.743:11366): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.6 spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=AVC msg=audit(1163772884.743:11367): avc: denied { create } for pid=6687 comm="NetworkManager" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=packet_socket type=SYSCALL msg=audit(1163772884.743:11367): arch=40000003 syscall=102 success=yes exit=14 a0=1 a1=bfaf32b0 a2=84ff760 a3=2 items=0 ppid=1 pid=6687 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="NetworkManager" exe="/usr/sbin/NetworkManager" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163772884.743:11368): avc: denied { ioctl } for pid=6687 comm="NetworkManager" name="[31576]" dev=sockfs ino=31576 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=packet_socket type=SYSCALL msg=audit(1163772884.743:11368): arch=40000003 syscall=54 success=yes exit=0 a0=e a1=890b a2=bfaf3364 a3=84ff760 items=0 ppid=1 pid=6687 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="NetworkManager" exe="/usr/sbin/NetworkManager" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163772884.743:11368): path="socket:[31576]" type=USER_AVC msg=audit(1163772885.799:11369): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager.VPNConnections member=LoginBanner dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772885.799:11370): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager.VPNConnections member=VPNConnectionStateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=AVC msg=audit(1163772893.279:11371): avc: denied { append } for pid=8154 comm="yum" name="yum.log" dev=dm-0 ino=8707846 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:rpm_log_t:s0 tclass=file type=SYSCALL msg=audit(1163772893.279:11371): arch=40000003 syscall=5 success=yes exit=4 a0=89cde18 a1=8441 a2=1b6 a3=8964208 items=0 ppid=6537 pid=8154 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163772893.291:11372): avc: denied { create } for pid=8154 comm="yum" name="yum.pid" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:var_run_t:s0 tclass=file type=SYSCALL msg=audit(1163772893.291:11372): arch=40000003 syscall=5 success=yes exit=5 a0=877ef30 a1=80c1 a2=1a4 a3=80c1 items=0 ppid=6537 pid=8154 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163772893.295:11373): avc: denied { write } for pid=8154 comm="yum" name="yum.pid" dev=dm-0 ino=14437127 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:var_run_t:s0 tclass=file type=SYSCALL msg=audit(1163772893.295:11373): arch=40000003 syscall=4 success=yes exit=4 a0=5 a1=89f7934 a2=4 a3=86a71b0 items=0 ppid=6537 pid=8154 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163772893.295:11373): path="/var/run/yum.pid" type=AVC msg=audit(1163772893.443:11374): avc: denied { write } for pid=8154 comm="yum" name="repomd.xml" dev=dm-0 ino=15287718 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:var_t:s0 tclass=file type=SYSCALL msg=audit(1163772893.443:11374): arch=40000003 syscall=5 success=yes exit=6 a0=86fae70 a1=8241 a2=1b6 a3=8a32e78 items=0 ppid=6537 pid=8154 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163772893.459:11375): avc: denied { setattr } for pid=8154 comm="yum" name="repomd.xml" dev=dm-0 ino=15287718 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:var_t:s0 tclass=file type=SYSCALL msg=audit(1163772893.459:11375): arch=40000003 syscall=271 success=yes exit=0 a0=86fae70 a1=bff0df54 a2=c4eff4 a3=899be8c items=0 ppid=6537 pid=8154 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163772895.559:11376): avc: denied { write } for pid=8154 comm="yum" name="development" dev=dm-0 ino=15288131 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:var_t:s0 tclass=dir type=AVC msg=audit(1163772895.559:11376): avc: denied { add_name } for pid=8154 comm="yum" name="primary.xml.gz.sqlite-journal" scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:var_t:s0 tclass=dir type=AVC msg=audit(1163772895.559:11376): avc: denied { create } for pid=8154 comm="yum" name="primary.xml.gz.sqlite-journal" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:var_t:s0 tclass=file type=SYSCALL msg=audit(1163772895.559:11376): arch=40000003 syscall=5 success=yes exit=10 a0=8735f30 a1=80c2 a2=1a4 a3=80c2 items=0 ppid=6537 pid=8154 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163772895.559:11377): avc: denied { remove_name } for pid=8154 comm="yum" name="primary.xml.gz.sqlite-journal" dev=dm-0 ino=15288159 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:var_t:s0 tclass=dir type=AVC msg=audit(1163772895.559:11377): avc: denied { unlink } for pid=8154 comm="yum" name="primary.xml.gz.sqlite-journal" dev=dm-0 ino=15288159 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:var_t:s0 tclass=file type=SYSCALL msg=audit(1163772895.559:11377): arch=40000003 syscall=10 success=yes exit=0 a0=8735f30 a1=1 a2=2c0e2c a3=8735e08 items=0 ppid=6537 pid=8154 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163772959.055:11378): avc: denied { unlink } for pid=8154 comm="yum" name="yum.pid" dev=dm-0 ino=14437127 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:var_run_t:s0 tclass=file type=SYSCALL msg=audit(1163772959.055:11378): arch=40000003 syscall=10 success=yes exit=0 a0=cd5b368 a1=0 a2=59d1fe4 a3=86a71b0 items=0 ppid=6537 pid=8154 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163772959.287:11379): avc: denied { getattr } for pid=6507 comm="firefox-bin" name="libflashplayer.so" dev=dm-0 ino=6547382 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=user_u:object_r:user_mozilla_home_t:s0 tclass=file type=SYSCALL msg=audit(1163772959.287:11379): arch=40000003 syscall=196 success=yes exit=0 a0=bfcfcae4 a1=bfcfca48 a2=c4eff4 a3=930e3b0 items=0 ppid=1 pid=6507 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163772959.287:11379): path="/home/kmacmill/.mozilla/plugins/libflashplayer.so" type=AVC msg=audit(1163772959.883:11380): avc: denied { read } for pid=6507 comm="firefox-bin" name="libflashplayer.so" dev=dm-0 ino=6547382 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=user_u:object_r:user_mozilla_home_t:s0 tclass=file type=SYSCALL msg=audit(1163772959.883:11380): arch=40000003 syscall=5 success=yes exit=51 a0=9773e28 a1=0 a2=c50150 a3=9773e28 items=0 ppid=1 pid=6507 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163772959.899:11381): avc: denied { execute } for pid=6507 comm="firefox-bin" name="libflashplayer.so" dev=dm-0 ino=6547382 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=user_u:object_r:user_mozilla_home_t:s0 tclass=file type=SYSCALL msg=audit(1163772959.899:11381): arch=40000003 syscall=192 success=yes exit=41328640 a0=0 a1=738dbc a2=5 a3=802 items=0 ppid=1 pid=6507 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163772959.899:11381): path="/home/kmacmill/.mozilla/plugins/libflashplayer.so" type=AVC msg=audit(1163772960.231:11382): avc: denied { read } for pid=6507 comm="firefox-bin" name=".gdmV8RYIT" dev=dm-0 ino=14469571 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163772960.231:11382): arch=40000003 syscall=33 success=yes exit=0 a0=bfd00fcb a1=4 a2=da3a64 a3=bfd00fcb items=0 ppid=1 pid=6507 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163772960.231:11383): avc: denied { getattr } for pid=6507 comm="firefox-bin" name=".gdmV8RYIT" dev=dm-0 ino=14469571 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163772960.231:11383): arch=40000003 syscall=197 success=yes exit=0 a0=33 a1=bfcf964c a2=c4eff4 a3=97039c8 items=0 ppid=1 pid=6507 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163772960.231:11383): path="/tmp/.gdmV8RYIT" type=AVC msg=audit(1163773001.406:11384): avc: denied { write } for pid=8165 comm="rpm" name="gnome-python2-gnomevfs-2.16.2" dev=dm-0 ino=10412290 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=dir type=AVC msg=audit(1163773001.406:11384): avc: denied { remove_name } for pid=8165 comm="rpm" name="sync-xfer.py" dev=dm-0 ino=10412299 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=dir type=AVC msg=audit(1163773001.406:11384): avc: denied { unlink } for pid=8165 comm="rpm" name="sync-xfer.py" dev=dm-0 ino=10412299 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=file type=SYSCALL msg=audit(1163773001.406:11384): arch=40000003 syscall=10 success=yes exit=0 a0=9975238 a1=2d a2=186040 a3=9975238 items=0 ppid=6537 pid=8165 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="rpm" exe="/bin/rpm" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163773001.438:11385): avc: denied { rmdir } for pid=8165 comm="rpm" name="pygvfsmethod" dev=dm-0 ino=10412294 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=dir type=SYSCALL msg=audit(1163773001.438:11385): arch=40000003 syscall=40 success=yes exit=0 a0=9975238 a1=2d a2=186040 a3=9975238 items=0 ppid=6537 pid=8165 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="rpm" exe="/bin/rpm" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163773045.629:11386): avc: denied { read } for pid=6507 comm="firefox-bin" name="libflashplayer.so" dev=dm-0 ino=6547382 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=user_u:object_r:user_mozilla_home_t:s0 tclass=file type=SYSCALL msg=audit(1163773045.629:11386): arch=40000003 syscall=5 success=yes exit=58 a0=9bbf070 a1=0 a2=9bbf068 a3=9bbf070 items=0 ppid=1 pid=6507 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163773045.633:11387): avc: denied { getattr } for pid=6507 comm="firefox-bin" name="libflashplayer.so" dev=dm-0 ino=6547382 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=user_u:object_r:user_mozilla_home_t:s0 tclass=file type=SYSCALL msg=audit(1163773045.633:11387): arch=40000003 syscall=197 success=yes exit=0 a0=3a a1=bfcfc5d0 a2=4aafc0 a3=3b items=0 ppid=1 pid=6507 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163773045.633:11387): path="/home/kmacmill/.mozilla/plugins/libflashplayer.so" type=AVC msg=audit(1163773045.633:11388): avc: denied { execute } for pid=6507 comm="firefox-bin" name="libflashplayer.so" dev=dm-0 ino=6547382 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=user_u:object_r:user_mozilla_home_t:s0 tclass=file type=SYSCALL msg=audit(1163773045.633:11388): arch=40000003 syscall=192 success=yes exit=41328640 a0=0 a1=738dbc a2=5 a3=802 items=0 ppid=1 pid=6507 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163773045.633:11388): path="/home/kmacmill/.mozilla/plugins/libflashplayer.so" type=AVC msg=audit(1163773049.833:11389): avc: denied { execute } for pid=6507 comm="firefox-bin" name="nprhapengine.so" dev=dm-0 ino=6547712 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_mozilla_home_t:s0 tclass=file type=SYSCALL msg=audit(1163773049.833:11389): arch=40000003 syscall=192 success=yes exit=99201024 a0=0 a1=2af6e0 a2=5 a3=802 items=0 ppid=1 pid=6507 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163773049.833:11389): path="/home/kmacmill/.mozilla/plugins/nprhapengine.so" type=AVC msg=audit(1163773049.845:11390): avc: denied { execstack } for pid=6507 comm="firefox-bin" scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_mozilla_t:s0 tclass=process type=AVC msg=audit(1163773049.845:11390): avc: denied { execmem } for pid=6507 comm="firefox-bin" scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_mozilla_t:s0 tclass=process type=SYSCALL msg=audit(1163773049.845:11390): arch=40000003 syscall=125 success=yes exit=0 a0=bfcff000 a1=1000 a2=1000007 a3=fffff000 items=0 ppid=1 pid=6507 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163773049.889:11391): avc: denied { execmod } for pid=6507 comm="firefox-bin" name="nprhapengine.so" dev=dm-0 ino=6547712 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_mozilla_home_t:s0 tclass=file type=SYSCALL msg=audit(1163773049.889:11391): arch=40000003 syscall=125 success=yes exit=0 a0=5e9b000 a1=26f000 a2=5 a3=bfcfca20 items=0 ppid=1 pid=6507 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163773049.889:11391): path="/home/kmacmill/.mozilla/plugins/nprhapengine.so" type=AVC msg=audit(1163773057.641:11392): avc: denied { write } for pid=8179 comm="gnome-terminal" name="3310" dev=dm-0 ino=14567721 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:ice_tmp_t:s0 tclass=sock_file type=SYSCALL msg=audit(1163773057.641:11392): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=bfab5230 a2=df7770 a3=15 items=0 ppid=1 pid=8179 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-terminal" exe="/usr/bin/gnome-terminal" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163773132.042:11393): avc: denied { execute } for pid=8206 comm="firefox-bin" name="nprhapengine.so" dev=dm-0 ino=6547712 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_mozilla_home_t:s0 tclass=file type=SYSCALL msg=audit(1163773132.042:11393): arch=40000003 syscall=192 success=yes exit=22396928 a0=0 a1=2af6e0 a2=5 a3=802 items=0 ppid=1 pid=8206 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163773132.042:11393): path="/home/kmacmill/.mozilla/plugins/nprhapengine.so" type=AVC msg=audit(1163773132.050:11394): avc: denied { execmod } for pid=8206 comm="firefox-bin" name="nprhapengine.so" dev=dm-0 ino=6547712 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_mozilla_home_t:s0 tclass=file type=SYSCALL msg=audit(1163773132.050:11394): arch=40000003 syscall=125 success=yes exit=0 a0=155c000 a1=26f000 a2=5 a3=bf942670 items=0 ppid=1 pid=8206 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163773132.050:11394): path="/home/kmacmill/.mozilla/plugins/nprhapengine.so" type=AVC msg=audit(1163773160.768:11395): avc: denied { ioctl } for pid=8264 comm="ps" name="[32611]" dev=pipefs ino=32611 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_mozilla_t:s0 tclass=fifo_file type=SYSCALL msg=audit(1163773160.768:11395): arch=40000003 syscall=54 success=no exit=-22 a0=1 a1=5413 a2=bfa460f4 a3=bfa46138 items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163773160.768:11395): path="pipe:[32611]" type=AVC msg=audit(1163773160.768:11396): avc: denied { getattr } for pid=8264 comm="ps" name="1" dev=proc ino=65538 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=dir type=SYSCALL msg=audit(1163773160.768:11396): arch=40000003 syscall=195 success=yes exit=0 a0=892097c a1=bfa4604c a2=c4eff4 a3=bfa4604c items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163773160.768:11396): path="/proc/1" type=AVC msg=audit(1163773160.768:11397): avc: denied { search } for pid=8264 comm="ps" name="1" dev=proc ino=65538 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=dir type=AVC msg=audit(1163773160.768:11397): avc: denied { read } for pid=8264 comm="ps" name="stat" dev=proc ino=65549 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=file type=SYSCALL msg=audit(1163773160.768:11397): arch=40000003 syscall=5 success=yes exit=18 a0=c64780 a1=0 a2=0 a3=c64780 items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163773160.768:11398): avc: denied { getattr } for pid=8264 comm="ps" name="2" dev=proc ino=131074 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir type=SYSCALL msg=audit(1163773160.768:11398): arch=40000003 syscall=195 success=yes exit=0 a0=892097c a1=bfa4604c a2=c4eff4 a3=bfa4604c items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163773160.768:11398): path="/proc/2" type=AVC msg=audit(1163773160.768:11399): avc: denied { search } for pid=8264 comm="ps" name="2" dev=proc ino=131074 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir type=AVC msg=audit(1163773160.768:11399): avc: denied { read } for pid=8264 comm="ps" name="stat" dev=proc ino=131085 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=file type=SYSCALL msg=audit(1163773160.768:11399): arch=40000003 syscall=5 success=yes exit=18 a0=c64780 a1=0 a2=0 a3=c64780 items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163773160.772:11400): avc: denied { getattr } for pid=8264 comm="ps" name="436" dev=proc ino=28573698 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:udev_t:s0-s0:c0.c1023 tclass=dir type=SYSCALL msg=audit(1163773160.772:11400): arch=40000003 syscall=195 success=yes exit=0 a0=892097c a1=bfa4604c a2=c4eff4 a3=bfa4604c items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163773160.772:11400): path="/proc/436" type=AVC msg=audit(1163773160.772:11401): avc: denied { search } for pid=8264 comm="ps" name="436" dev=proc ino=28573698 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:udev_t:s0-s0:c0.c1023 tclass=dir type=AVC msg=audit(1163773160.772:11401): avc: denied { read } for pid=8264 comm="ps" name="stat" dev=proc ino=28573709 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:udev_t:s0-s0:c0.c1023 tclass=file type=SYSCALL msg=audit(1163773160.772:11401): arch=40000003 syscall=5 success=yes exit=18 a0=c64780 a1=0 a2=0 a3=c64780 items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163773160.772:11402): avc: denied { getattr } for pid=8264 comm="ps" name="1853" dev=proc ino=121438210 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:restorecond_t:s0 tclass=dir type=SYSCALL msg=audit(1163773160.772:11402): arch=40000003 syscall=195 success=yes exit=0 a0=892097c a1=bfa4604c a2=c4eff4 a3=bfa4604c items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163773160.772:11402): path="/proc/1853" type=AVC msg=audit(1163773160.772:11403): avc: denied { search } for pid=8264 comm="ps" name="1853" dev=proc ino=121438210 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:restorecond_t:s0 tclass=dir type=AVC msg=audit(1163773160.772:11403): avc: denied { read } for pid=8264 comm="ps" name="stat" dev=proc ino=121438221 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:restorecond_t:s0 tclass=file type=SYSCALL msg=audit(1163773160.772:11403): arch=40000003 syscall=5 success=yes exit=18 a0=c64780 a1=0 a2=0 a3=c64780 items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163773160.772:11404): avc: denied { getattr } for pid=8264 comm="ps" name="1865" dev=proc ino=122224642 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:auditd_t:s0 tclass=dir type=SYSCALL msg=audit(1163773160.772:11404): arch=40000003 syscall=195 success=yes exit=0 a0=892097c a1=bfa4604c a2=c4eff4 a3=bfa4604c items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163773160.772:11404): path="/proc/1865" type=AVC msg=audit(1163773160.772:11405): avc: denied { search } for pid=8264 comm="ps" name="1865" dev=proc ino=122224642 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:auditd_t:s0 tclass=dir type=AVC msg=audit(1163773160.772:11405): avc: denied { read } for pid=8264 comm="ps" name="stat" dev=proc ino=122224653 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:auditd_t:s0 tclass=file type=SYSCALL msg=audit(1163773160.772:11405): arch=40000003 syscall=5 success=yes exit=18 a0=c64780 a1=0 a2=0 a3=c64780 items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163773160.776:11406): avc: denied { getattr } for pid=8264 comm="ps" name="1881" dev=proc ino=123273218 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:syslogd_t:s0 tclass=dir type=SYSCALL msg=audit(1163773160.776:11406): arch=40000003 syscall=195 success=yes exit=0 a0=892097c a1=bfa4604c a2=c4eff4 a3=bfa4604c items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163773160.776:11406): path="/proc/1881" type=AVC msg=audit(1163773160.776:11407): avc: denied { search } for pid=8264 comm="ps" name="1881" dev=proc ino=123273218 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:syslogd_t:s0 tclass=dir type=AVC msg=audit(1163773160.776:11407): avc: denied { read } for pid=8264 comm="ps" name="stat" dev=proc ino=123273229 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:syslogd_t:s0 tclass=file type=SYSCALL msg=audit(1163773160.776:11407): arch=40000003 syscall=5 success=yes exit=18 a0=c64780 a1=0 a2=0 a3=c64780 items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163773160.776:11408): avc: denied { getattr } for pid=8264 comm="ps" name="1884" dev=proc ino=123469826 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:klogd_t:s0 tclass=dir type=SYSCALL msg=audit(1163773160.776:11408): arch=40000003 syscall=195 success=yes exit=0 a0=892097c a1=bfa4604c a2=c4eff4 a3=bfa4604c items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163773160.776:11408): path="/proc/1884" type=AVC msg=audit(1163773160.776:11409): avc: denied { search } for pid=8264 comm="ps" name="1884" dev=proc ino=123469826 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:klogd_t:s0 tclass=dir type=AVC msg=audit(1163773160.776:11409): avc: denied { read } for pid=8264 comm="ps" name="stat" dev=proc ino=123469837 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:klogd_t:s0 tclass=file type=SYSCALL msg=audit(1163773160.776:11409): arch=40000003 syscall=5 success=yes exit=18 a0=c64780 a1=0 a2=0 a3=c64780 items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163773160.776:11410): avc: denied { getattr } for pid=8264 comm="ps" name="1896" dev=proc ino=124256258 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:irqbalance_t:s0 tclass=dir type=SYSCALL msg=audit(1163773160.776:11410): arch=40000003 syscall=195 success=yes exit=0 a0=892097c a1=bfa4604c a2=c4eff4 a3=bfa4604c items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163773160.776:11410): path="/proc/1896" type=AVC msg=audit(1163773160.776:11411): avc: denied { search } for pid=8264 comm="ps" name="1896" dev=proc ino=124256258 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:irqbalance_t:s0 tclass=dir type=AVC msg=audit(1163773160.776:11411): avc: denied { read } for pid=8264 comm="ps" name="stat" dev=proc ino=124256269 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:irqbalance_t:s0 tclass=file type=SYSCALL msg=audit(1163773160.776:11411): arch=40000003 syscall=5 success=yes exit=18 a0=c64780 a1=0 a2=0 a3=c64780 items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163773160.776:11412): avc: denied { getattr } for pid=8264 comm="ps" name="1912" dev=proc ino=125304834 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:setrans_t:s0-s0:c0.c1023 tclass=dir type=SYSCALL msg=audit(1163773160.776:11412): arch=40000003 syscall=195 success=yes exit=0 a0=892097c a1=bfa4604c a2=c4eff4 a3=bfa4604c items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163773160.776:11412): path="/proc/1912" type=AVC msg=audit(1163773160.776:11413): avc: denied { search } for pid=8264 comm="ps" name="1912" dev=proc ino=125304834 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:setrans_t:s0-s0:c0.c1023 tclass=dir type=AVC msg=audit(1163773160.776:11413): avc: denied { read } for pid=8264 comm="ps" name="stat" dev=proc ino=125304845 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:setrans_t:s0-s0:c0.c1023 tclass=file type=SYSCALL msg=audit(1163773160.776:11413): arch=40000003 syscall=5 success=yes exit=18 a0=c64780 a1=0 a2=0 a3=c64780 items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163773160.776:11414): avc: denied { getattr } for pid=8264 comm="ps" name="1925" dev=proc ino=126156802 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:portmap_t:s0 tclass=dir type=SYSCALL msg=audit(1163773160.776:11414): arch=40000003 syscall=195 success=yes exit=0 a0=892097c a1=bfa4604c a2=c4eff4 a3=bfa4604c items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163773160.776:11414): path="/proc/1925" type=AVC msg=audit(1163773160.776:11415): avc: denied { search } for pid=8264 comm="ps" name="1925" dev=proc ino=126156802 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:portmap_t:s0 tclass=dir type=AVC msg=audit(1163773160.776:11415): avc: denied { read } for pid=8264 comm="ps" name="stat" dev=proc ino=126156813 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:portmap_t:s0 tclass=file type=SYSCALL msg=audit(1163773160.776:11415): arch=40000003 syscall=5 success=yes exit=18 a0=c64780 a1=0 a2=0 a3=c64780 items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163773160.776:11416): avc: denied { getattr } for pid=8264 comm="ps" name="1959" dev=proc ino=128385026 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:rpcd_t:s0 tclass=dir type=SYSCALL msg=audit(1163773160.776:11416): arch=40000003 syscall=195 success=yes exit=0 a0=892097c a1=bfa4604c a2=c4eff4 a3=bfa4604c items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163773160.776:11416): path="/proc/1959" type=AVC msg=audit(1163773160.776:11417): avc: denied { search } for pid=8264 comm="ps" name="1959" dev=proc ino=128385026 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:rpcd_t:s0 tclass=dir type=AVC msg=audit(1163773160.776:11417): avc: denied { read } for pid=8264 comm="ps" name="stat" dev=proc ino=128385037 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:rpcd_t:s0 tclass=file type=SYSCALL msg=audit(1163773160.776:11417): arch=40000003 syscall=5 success=yes exit=18 a0=c64780 a1=0 a2=0 a3=c64780 items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163773160.776:11418): avc: denied { getattr } for pid=8264 comm="ps" name="2033" dev=proc ino=133234690 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:bluetooth_t:s0 tclass=dir type=SYSCALL msg=audit(1163773160.776:11418): arch=40000003 syscall=195 success=yes exit=0 a0=892097c a1=bfa4604c a2=c4eff4 a3=bfa4604c items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163773160.776:11418): path="/proc/2033" type=AVC msg=audit(1163773160.776:11419): avc: denied { search } for pid=8264 comm="ps" name="2033" dev=proc ino=133234690 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:bluetooth_t:s0 tclass=dir type=AVC msg=audit(1163773160.776:11419): avc: denied { read } for pid=8264 comm="ps" name="stat" dev=proc ino=133234701 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:bluetooth_t:s0 tclass=file type=SYSCALL msg=audit(1163773160.776:11419): arch=40000003 syscall=5 success=yes exit=18 a0=c64780 a1=0 a2=0 a3=c64780 items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163773160.776:11420): avc: denied { read } for pid=8264 comm="ps" name="stat" dev=proc ino=135135245 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=file type=SYSCALL msg=audit(1163773160.776:11420): arch=40000003 syscall=5 success=yes exit=18 a0=c64780 a1=0 a2=0 a3=c64780 items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163773160.776:11421): avc: denied { getattr } for pid=8264 comm="ps" name="2123" dev=proc ino=139132930 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:automount_t:s0 tclass=dir type=SYSCALL msg=audit(1163773160.776:11421): arch=40000003 syscall=195 success=yes exit=0 a0=892097c a1=bfa4604c a2=c4eff4 a3=bfa4604c items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163773160.776:11421): path="/proc/2123" type=AVC msg=audit(1163773160.776:11422): avc: denied { search } for pid=8264 comm="ps" name="2123" dev=proc ino=139132930 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:automount_t:s0 tclass=dir type=AVC msg=audit(1163773160.776:11422): avc: denied { read } for pid=8264 comm="ps" name="stat" dev=proc ino=139132941 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:automount_t:s0 tclass=file type=SYSCALL msg=audit(1163773160.776:11422): arch=40000003 syscall=5 success=yes exit=18 a0=c64780 a1=0 a2=0 a3=c64780 items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163773160.776:11423): avc: denied { getattr } for pid=8264 comm="ps" name="2142" dev=proc ino=140378114 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:apmd_t:s0 tclass=dir type=SYSCALL msg=audit(1163773160.776:11423): arch=40000003 syscall=195 success=yes exit=0 a0=892097c a1=bfa4604c a2=c4eff4 a3=bfa4604c items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163773160.776:11423): path="/proc/2142" type=AVC msg=audit(1163773160.776:11424): avc: denied { search } for pid=8264 comm="ps" name="2142" dev=proc ino=140378114 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:apmd_t:s0 tclass=dir type=AVC msg=audit(1163773160.776:11424): avc: denied { read } for pid=8264 comm="ps" name="stat" dev=proc ino=140378125 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:apmd_t:s0 tclass=file type=SYSCALL msg=audit(1163773160.776:11424): arch=40000003 syscall=5 success=yes exit=18 a0=c64780 a1=0 a2=0 a3=c64780 items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163773160.776:11425): avc: denied { getattr } for pid=8264 comm="ps" name="2153" dev=proc ino=141099010 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:hplip_t:s0 tclass=dir type=SYSCALL msg=audit(1163773160.776:11425): arch=40000003 syscall=195 success=yes exit=0 a0=892097c a1=bfa4604c a2=c4eff4 a3=bfa4604c items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163773160.776:11425): path="/proc/2153" type=AVC msg=audit(1163773160.776:11426): avc: denied { search } for pid=8264 comm="ps" name="2153" dev=proc ino=141099010 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:hplip_t:s0 tclass=dir type=AVC msg=audit(1163773160.776:11426): avc: denied { read } for pid=8264 comm="ps" name="stat" dev=proc ino=141099021 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:hplip_t:s0 tclass=file type=SYSCALL msg=audit(1163773160.776:11426): arch=40000003 syscall=5 success=yes exit=18 a0=c64780 a1=0 a2=0 a3=c64780 items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163773160.776:11427): avc: denied { getattr } for pid=8264 comm="ps" name="2170" dev=proc ino=142213122 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:cupsd_t:s0-s0:c0.c1023 tclass=dir type=SYSCALL msg=audit(1163773160.776:11427): arch=40000003 syscall=195 success=yes exit=0 a0=892097c a1=bfa4604c a2=c4eff4 a3=bfa4604c items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163773160.776:11427): path="/proc/2170" type=AVC msg=audit(1163773160.776:11428): avc: denied { search } for pid=8264 comm="ps" name="2170" dev=proc ino=142213122 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:cupsd_t:s0-s0:c0.c1023 tclass=dir type=AVC msg=audit(1163773160.776:11428): avc: denied { read } for pid=8264 comm="ps" name="stat" dev=proc ino=142213133 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:cupsd_t:s0-s0:c0.c1023 tclass=file type=SYSCALL msg=audit(1163773160.776:11428): arch=40000003 syscall=5 success=yes exit=18 a0=c64780 a1=0 a2=0 a3=c64780 items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163773160.776:11429): avc: denied { getattr } for pid=8264 comm="ps" name="2184" dev=proc ino=143130626 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tclass=dir type=SYSCALL msg=audit(1163773160.776:11429): arch=40000003 syscall=195 success=yes exit=0 a0=892097c a1=bfa4604c a2=c4eff4 a3=bfa4604c items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163773160.776:11429): path="/proc/2184" type=AVC msg=audit(1163773160.776:11430): avc: denied { search } for pid=8264 comm="ps" name="2184" dev=proc ino=143130626 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tclass=dir type=AVC msg=audit(1163773160.776:11430): avc: denied { read } for pid=8264 comm="ps" name="stat" dev=proc ino=143130637 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tclass=file type=SYSCALL msg=audit(1163773160.776:11430): arch=40000003 syscall=5 success=yes exit=18 a0=c64780 a1=0 a2=0 a3=c64780 items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163773160.776:11431): avc: denied { getattr } for pid=8264 comm="ps" name="2196" dev=proc ino=143917058 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:inetd_t:s0 tclass=dir type=SYSCALL msg=audit(1163773160.776:11431): arch=40000003 syscall=195 success=yes exit=0 a0=892097c a1=bfa4604c a2=c4eff4 a3=bfa4604c items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163773160.776:11431): path="/proc/2196" type=AVC msg=audit(1163773160.776:11432): avc: denied { search } for pid=8264 comm="ps" name="2196" dev=proc ino=143917058 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:inetd_t:s0 tclass=dir type=AVC msg=audit(1163773160.776:11432): avc: denied { read } for pid=8264 comm="ps" name="stat" dev=proc ino=143917069 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:inetd_t:s0 tclass=file type=SYSCALL msg=audit(1163773160.776:11432): arch=40000003 syscall=5 success=yes exit=18 a0=c64780 a1=0 a2=0 a3=c64780 items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163773160.776:11433): avc: denied { getattr } for pid=8264 comm="ps" name="2216" dev=proc ino=145227778 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:sendmail_t:s0 tclass=dir type=SYSCALL msg=audit(1163773160.776:11433): arch=40000003 syscall=195 success=yes exit=0 a0=892097c a1=bfa4604c a2=c4eff4 a3=bfa4604c items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163773160.776:11433): path="/proc/2216" type=AVC msg=audit(1163773160.776:11434): avc: denied { search } for pid=8264 comm="ps" name="2216" dev=proc ino=145227778 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:sendmail_t:s0 tclass=dir type=AVC msg=audit(1163773160.776:11434): avc: denied { read } for pid=8264 comm="ps" name="stat" dev=proc ino=145227789 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:sendmail_t:s0 tclass=file type=SYSCALL msg=audit(1163773160.776:11434): arch=40000003 syscall=5 success=yes exit=18 a0=c64780 a1=0 a2=0 a3=c64780 items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163773160.776:11435): avc: denied { getattr } for pid=8264 comm="ps" name="2237" dev=proc ino=146604034 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:gpm_t:s0 tclass=dir type=SYSCALL msg=audit(1163773160.776:11435): arch=40000003 syscall=195 success=yes exit=0 a0=892097c a1=bfa4604c a2=c4eff4 a3=bfa4604c items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163773160.776:11435): path="/proc/2237" type=AVC msg=audit(1163773160.780:11436): avc: denied { search } for pid=8264 comm="ps" name="2237" dev=proc ino=146604034 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:gpm_t:s0 tclass=dir type=AVC msg=audit(1163773160.780:11436): avc: denied { read } for pid=8264 comm="ps" name="stat" dev=proc ino=146604045 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:gpm_t:s0 tclass=file type=SYSCALL msg=audit(1163773160.780:11436): arch=40000003 syscall=5 success=yes exit=18 a0=c64780 a1=0 a2=0 a3=c64780 items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163773160.780:11437): avc: denied { getattr } for pid=8264 comm="ps" name="2248" dev=proc ino=147324930 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tclass=dir type=SYSCALL msg=audit(1163773160.780:11437): arch=40000003 syscall=195 success=yes exit=0 a0=892097c a1=bfa4604c a2=c4eff4 a3=bfa4604c items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163773160.780:11437): path="/proc/2248" type=AVC msg=audit(1163773160.780:11438): avc: denied { search } for pid=8264 comm="ps" name="2248" dev=proc ino=147324930 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tclass=dir type=AVC msg=audit(1163773160.780:11438): avc: denied { read } for pid=8264 comm="ps" name="stat" dev=proc ino=147324941 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tclass=file type=SYSCALL msg=audit(1163773160.780:11438): arch=40000003 syscall=5 success=yes exit=18 a0=c64780 a1=0 a2=0 a3=c64780 items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163773160.780:11439): avc: denied { getattr } for pid=8264 comm="ps" name="2285" dev=proc ino=149749762 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:xfs_t:s0 tclass=dir type=SYSCALL msg=audit(1163773160.780:11439): arch=40000003 syscall=195 success=yes exit=0 a0=892097c a1=bfa4604c a2=c4eff4 a3=bfa4604c items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163773160.780:11439): path="/proc/2285" type=AVC msg=audit(1163773160.780:11440): avc: denied { search } for pid=8264 comm="ps" name="2285" dev=proc ino=149749762 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:xfs_t:s0 tclass=dir type=AVC msg=audit(1163773160.780:11440): avc: denied { read } for pid=8264 comm="ps" name="stat" dev=proc ino=149749773 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:xfs_t:s0 tclass=file type=SYSCALL msg=audit(1163773160.780:11440): arch=40000003 syscall=5 success=yes exit=18 a0=c64780 a1=0 a2=0 a3=c64780 items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163773160.780:11441): avc: denied { getattr } for pid=8264 comm="ps" name="2401" dev=proc ino=157351938 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:hald_t:s0 tclass=dir type=SYSCALL msg=audit(1163773160.780:11441): arch=40000003 syscall=195 success=yes exit=0 a0=892097c a1=bfa4604c a2=c4eff4 a3=bfa4604c items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163773160.780:11441): path="/proc/2401" type=AVC msg=audit(1163773160.780:11442): avc: denied { search } for pid=8264 comm="ps" name="2401" dev=proc ino=157351938 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:hald_t:s0 tclass=dir type=AVC msg=audit(1163773160.780:11442): avc: denied { read } for pid=8264 comm="ps" name="stat" dev=proc ino=157351949 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:hald_t:s0 tclass=file type=SYSCALL msg=audit(1163773160.780:11442): arch=40000003 syscall=5 success=yes exit=18 a0=c64780 a1=0 a2=0 a3=c64780 items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163773160.780:11443): avc: denied { getattr } for pid=8264 comm="ps" name="2723" dev=proc ino=178454530 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:xenstored_t:s0 tclass=dir type=SYSCALL msg=audit(1163773160.780:11443): arch=40000003 syscall=195 success=yes exit=0 a0=892097c a1=bfa4604c a2=c4eff4 a3=bfa4604c items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163773160.780:11443): path="/proc/2723" type=AVC msg=audit(1163773160.780:11444): avc: denied { search } for pid=8264 comm="ps" name="2723" dev=proc ino=178454530 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:xenstored_t:s0 tclass=dir type=AVC msg=audit(1163773160.780:11444): avc: denied { read } for pid=8264 comm="ps" name="stat" dev=proc ino=178454541 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:xenstored_t:s0 tclass=file type=SYSCALL msg=audit(1163773160.780:11444): arch=40000003 syscall=5 success=yes exit=18 a0=c64780 a1=0 a2=0 a3=c64780 items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163773160.780:11445): avc: denied { getattr } for pid=8264 comm="ps" name="2732" dev=proc ino=179044354 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:xenconsoled_t:s0 tclass=dir type=SYSCALL msg=audit(1163773160.780:11445): arch=40000003 syscall=195 success=yes exit=0 a0=892097c a1=bfa4604c a2=c4eff4 a3=bfa4604c items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163773160.780:11445): path="/proc/2732" type=AVC msg=audit(1163773160.780:11446): avc: denied { search } for pid=8264 comm="ps" name="2732" dev=proc ino=179044354 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:xenconsoled_t:s0 tclass=dir type=AVC msg=audit(1163773160.780:11446): avc: denied { read } for pid=8264 comm="ps" name="stat" dev=proc ino=179044365 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:xenconsoled_t:s0 tclass=file type=SYSCALL msg=audit(1163773160.780:11446): arch=40000003 syscall=5 success=yes exit=18 a0=c64780 a1=0 a2=0 a3=c64780 items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163773160.780:11447): avc: denied { getattr } for pid=8264 comm="ps" name="2735" dev=proc ino=179240962 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:xend_t:s0 tclass=dir type=SYSCALL msg=audit(1163773160.780:11447): arch=40000003 syscall=195 success=yes exit=0 a0=892097c a1=bfa4604c a2=c4eff4 a3=bfa4604c items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163773160.780:11447): path="/proc/2735" type=AVC msg=audit(1163773160.780:11448): avc: denied { search } for pid=8264 comm="ps" name="2735" dev=proc ino=179240962 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:xend_t:s0 tclass=dir type=AVC msg=audit(1163773160.780:11448): avc: denied { read } for pid=8264 comm="ps" name="stat" dev=proc ino=179240973 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:xend_t:s0 tclass=file type=SYSCALL msg=audit(1163773160.780:11448): arch=40000003 syscall=5 success=yes exit=18 a0=c64780 a1=0 a2=0 a3=c64780 items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163773160.780:11449): avc: denied { getattr } for pid=8264 comm="ps" name="3150" dev=proc ino=206438402 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:fsdaemon_t:s0 tclass=dir type=SYSCALL msg=audit(1163773160.780:11449): arch=40000003 syscall=195 success=yes exit=0 a0=892097c a1=bfa4604c a2=c4eff4 a3=bfa4604c items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163773160.780:11449): path="/proc/3150" type=AVC msg=audit(1163773160.780:11450): avc: denied { search } for pid=8264 comm="ps" name="3150" dev=proc ino=206438402 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:fsdaemon_t:s0 tclass=dir type=AVC msg=audit(1163773160.780:11450): avc: denied { read } for pid=8264 comm="ps" name="stat" dev=proc ino=206438413 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:fsdaemon_t:s0 tclass=file type=SYSCALL msg=audit(1163773160.780:11450): arch=40000003 syscall=5 success=yes exit=18 a0=c64780 a1=0 a2=0 a3=c64780 items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163773160.780:11451): avc: denied { getattr } for pid=8264 comm="ps" name="3172" dev=proc ino=207880194 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:getty_t:s0 tclass=dir type=SYSCALL msg=audit(1163773160.780:11451): arch=40000003 syscall=195 success=yes exit=0 a0=892097c a1=bfa4604c a2=c4eff4 a3=bfa4604c items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163773160.780:11451): path="/proc/3172" type=AVC msg=audit(1163773160.780:11452): avc: denied { search } for pid=8264 comm="ps" name="3172" dev=proc ino=207880194 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:getty_t:s0 tclass=dir type=AVC msg=audit(1163773160.780:11452): avc: denied { read } for pid=8264 comm="ps" name="stat" dev=proc ino=207880205 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:getty_t:s0 tclass=file type=SYSCALL msg=audit(1163773160.780:11452): arch=40000003 syscall=5 success=yes exit=18 a0=c64780 a1=0 a2=0 a3=c64780 items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163773160.780:11453): avc: denied { getattr } for pid=8264 comm="ps" name="3201" dev=proc ino=209780738 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tclass=dir type=SYSCALL msg=audit(1163773160.780:11453): arch=40000003 syscall=195 success=yes exit=0 a0=892097c a1=bfa4604c a2=c4eff4 a3=bfa4604c items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163773160.780:11453): path="/proc/3201" type=AVC msg=audit(1163773160.780:11454): avc: denied { search } for pid=8264 comm="ps" name="3201" dev=proc ino=209780738 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tclass=dir type=AVC msg=audit(1163773160.780:11454): avc: denied { read } for pid=8264 comm="ps" name="stat" dev=proc ino=209780749 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tclass=file type=SYSCALL msg=audit(1163773160.780:11454): arch=40000003 syscall=5 success=yes exit=18 a0=c64780 a1=0 a2=0 a3=c64780 items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163773160.784:11455): avc: denied { getattr } for pid=8264 comm="ps" name="3289" dev=proc ino=215547906 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:xdm_xserver_t:s0-s0:c0.c1023 tclass=dir type=SYSCALL msg=audit(1163773160.784:11455): arch=40000003 syscall=195 success=yes exit=0 a0=892097c a1=bfa4604c a2=c4eff4 a3=bfa4604c items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163773160.784:11455): path="/proc/3289" type=AVC msg=audit(1163773160.784:11456): avc: denied { search } for pid=8264 comm="ps" name="3289" dev=proc ino=215547906 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:xdm_xserver_t:s0-s0:c0.c1023 tclass=dir type=AVC msg=audit(1163773160.784:11456): avc: denied { read } for pid=8264 comm="ps" name="stat" dev=proc ino=215547917 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:xdm_xserver_t:s0-s0:c0.c1023 tclass=file type=SYSCALL msg=audit(1163773160.784:11456): arch=40000003 syscall=5 success=yes exit=18 a0=c64780 a1=0 a2=0 a3=c64780 items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163773160.784:11457): avc: denied { getattr } for pid=8264 comm="ps" name="3310" dev=proc ino=216924162 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dir type=SYSCALL msg=audit(1163773160.784:11457): arch=40000003 syscall=195 success=yes exit=0 a0=892097c a1=bfa4604c a2=c4eff4 a3=bfa4604c items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163773160.784:11457): path="/proc/3310" type=AVC msg=audit(1163773160.784:11458): avc: denied { search } for pid=8264 comm="ps" name="3310" dev=proc ino=216924162 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dir type=AVC msg=audit(1163773160.784:11458): avc: denied { read } for pid=8264 comm="ps" name="stat" dev=proc ino=216924173 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=file type=SYSCALL msg=audit(1163773160.784:11458): arch=40000003 syscall=5 success=yes exit=18 a0=c64780 a1=0 a2=0 a3=c64780 items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163773160.784:11459): avc: denied { getattr } for pid=8264 comm="ps" name="3362" dev=proc ino=220332034 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_ssh_agent_t:s0 tclass=dir type=SYSCALL msg=audit(1163773160.784:11459): arch=40000003 syscall=195 success=yes exit=0 a0=892097c a1=bfa4604c a2=c4eff4 a3=bfa4604c items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163773160.784:11459): path="/proc/3362" type=AVC msg=audit(1163773160.784:11460): avc: denied { search } for pid=8264 comm="ps" name="3362" dev=proc ino=220332034 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_ssh_agent_t:s0 tclass=dir type=AVC msg=audit(1163773160.784:11460): avc: denied { read } for pid=8264 comm="ps" name="stat" dev=proc ino=220332045 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_ssh_agent_t:s0 tclass=file type=SYSCALL msg=audit(1163773160.784:11460): arch=40000003 syscall=5 success=yes exit=18 a0=c64780 a1=0 a2=0 a3=c64780 items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163773160.784:11461): avc: denied { getattr } for pid=8264 comm="ps" name="3366" dev=proc ino=220594178 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_dbusd_t:s0 tclass=dir type=SYSCALL msg=audit(1163773160.784:11461): arch=40000003 syscall=195 success=yes exit=0 a0=892097c a1=bfa4604c a2=c4eff4 a3=bfa4604c items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163773160.784:11461): path="/proc/3366" type=AVC msg=audit(1163773160.784:11462): avc: denied { search } for pid=8264 comm="ps" name="3366" dev=proc ino=220594178 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_dbusd_t:s0 tclass=dir type=AVC msg=audit(1163773160.784:11462): avc: denied { read } for pid=8264 comm="ps" name="stat" dev=proc ino=220594189 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_dbusd_t:s0 tclass=file type=SYSCALL msg=audit(1163773160.784:11462): arch=40000003 syscall=5 success=yes exit=18 a0=c64780 a1=0 a2=0 a3=c64780 items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163773160.784:11463): avc: denied { getattr } for pid=8264 comm="ps" name="3875" dev=proc ino=253952002 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:pam_t:s0 tclass=dir type=SYSCALL msg=audit(1163773160.784:11463): arch=40000003 syscall=195 success=yes exit=0 a0=892097c a1=bfa4604c a2=c4eff4 a3=bfa4604c items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163773160.784:11463): path="/proc/3875" type=AVC msg=audit(1163773160.784:11464): avc: denied { search } for pid=8264 comm="ps" name="3875" dev=proc ino=253952002 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:pam_t:s0 tclass=dir type=AVC msg=audit(1163773160.784:11464): avc: denied { read } for pid=8264 comm="ps" name="stat" dev=proc ino=253952013 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:pam_t:s0 tclass=file type=SYSCALL msg=audit(1163773160.784:11464): arch=40000003 syscall=5 success=yes exit=18 a0=c64780 a1=0 a2=0 a3=c64780 items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163773160.784:11465): avc: denied { getattr } for pid=8264 comm="ps" name="/" dev=devpts ino=1 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:devpts_t:s0 tclass=dir type=SYSCALL msg=audit(1163773160.784:11465): arch=40000003 syscall=195 success=yes exit=0 a0=c62840 a1=bfa4385c a2=c4eff4 a3=bfa4385c items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163773160.784:11465): path="/dev/pts" type=AVC msg=audit(1163773160.784:11466): avc: denied { read } for pid=8264 comm="ps" name="2" dev=proc ino=257851394 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=lnk_file type=AVC msg=audit(1163773160.784:11466): avc: denied { ptrace } for pid=8264 comm="ps" scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=process type=SYSCALL msg=audit(1163773160.784:11466): arch=40000003 syscall=85 success=yes exit=10 a0=bfa43898 a1=c62840 a2=7f a3=bfa43898 items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163773160.784:11467): avc: denied { search } for pid=8264 comm="ps" name="/" dev=devpts ino=1 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:devpts_t:s0 tclass=dir type=AVC msg=audit(1163773160.784:11467): avc: denied { getattr } for pid=8264 comm="ps" name="1" dev=devpts ino=3 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_devpts_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163773160.784:11467): arch=40000003 syscall=195 success=yes exit=0 a0=c62840 a1=bfa4379c a2=c4eff4 a3=bfa4379c items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163773160.784:11467): path="/dev/pts/1" type=AVC msg=audit(1163773160.784:11468): avc: denied { getattr } for pid=8264 comm="ps" name="4062" dev=proc ino=266207234 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_su_t:s0 tclass=dir type=SYSCALL msg=audit(1163773160.784:11468): arch=40000003 syscall=195 success=yes exit=0 a0=892097c a1=bfa4604c a2=c4eff4 a3=bfa4604c items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163773160.784:11468): path="/proc/4062" type=AVC msg=audit(1163773160.784:11469): avc: denied { search } for pid=8264 comm="ps" name="4062" dev=proc ino=266207234 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_su_t:s0 tclass=dir type=AVC msg=audit(1163773160.784:11469): avc: denied { read } for pid=8264 comm="ps" name="stat" dev=proc ino=266207245 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_su_t:s0 tclass=file type=SYSCALL msg=audit(1163773160.784:11469): arch=40000003 syscall=5 success=yes exit=18 a0=c64780 a1=0 a2=0 a3=c64780 items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163773182.121:11470): avc: denied { dac_override } for pid=8271 comm="yum" capability=1 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=capability type=SYSCALL msg=audit(1163773182.121:11470): arch=40000003 syscall=33 success=yes exit=0 a0=8dfc308 a1=2 a2=488b44 a3=0 items=0 ppid=6537 pid=8271 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163773184.609:11471): avc: denied { write } for pid=8271 comm="yum" name="gnuchess" dev=dm-0 ino=14731267 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:games_data_t:s0 tclass=dir type=AVC msg=audit(1163773184.609:11471): avc: denied { remove_name } for pid=8271 comm="yum" name="book.dat" dev=dm-0 ino=10738969 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:games_data_t:s0 tclass=dir type=AVC msg=audit(1163773184.609:11471): avc: denied { unlink } for pid=8271 comm="yum" name="book.dat" dev=dm-0 ino=10738969 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:games_data_t:s0 tclass=file type=SYSCALL msg=audit(1163773184.609:11471): arch=40000003 syscall=10 success=yes exit=0 a0=a3e7280 a1=2d a2=d2a040 a3=a3e7280 items=0 ppid=6537 pid=8271 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163773184.637:11472): avc: denied { rmdir } for pid=8271 comm="yum" name="gnuchess" dev=dm-0 ino=14731267 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:games_data_t:s0 tclass=dir type=SYSCALL msg=audit(1163773184.637:11472): arch=40000003 syscall=40 success=yes exit=0 a0=a892d88 a1=2d a2=d2a040 a3=a892d88 items=0 ppid=6537 pid=8271 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163773184.697:11473): avc: denied { write } for pid=8271 comm="yum" name="bin" dev=dm-0 ino=10311850 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=dir type=AVC msg=audit(1163773184.697:11473): avc: denied { remove_name } for pid=8271 comm="yum" name="gnuchess" dev=dm-0 ino=10332735 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=dir type=AVC msg=audit(1163773184.697:11473): avc: denied { unlink } for pid=8271 comm="yum" name="gnuchess" dev=dm-0 ino=10332735 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1163773184.697:11473): arch=40000003 syscall=10 success=yes exit=0 a0=b210580 a1=2d a2=d2a040 a3=b210580 items=0 ppid=6537 pid=8271 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=USER_ACCT msg=audit(1163773201.786:11474): user pid=8275 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1163773201.786:11475): login pid=8275 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1163773201.786:11476): user pid=8275 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1163773201.786:11477): user pid=8275 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1163773201.790:11478): avc: denied { execute } for pid=8276 comm="sh" name="sa1" dev=dm-0 ino=13061698 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:lib_t:s0 tclass=file type=AVC msg=audit(1163773201.790:11478): avc: denied { execute_no_trans } for pid=8276 comm="sh" name="sa1" dev=dm-0 ino=13061698 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1163773201.790:11478): arch=40000003 syscall=11 success=yes exit=0 a0=982f1b0 a1=982f358 a2=982f290 a3=982f008 items=0 ppid=8275 pid=8276 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sa1" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163773201.790:11478): path="/usr/lib/sa/sa1" type=AVC msg=audit(1163773201.794:11479): avc: denied { execute } for pid=8276 comm="sa1" name="sadc" dev=dm-0 ino=11981401 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=AVC msg=audit(1163773201.794:11479): avc: denied { execute_no_trans } for pid=8276 comm="sa1" name="sadc" dev=dm-0 ino=11981401 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=AVC msg=audit(1163773201.794:11479): avc: denied { read } for pid=8276 comm="sa1" name="sadc" dev=dm-0 ino=11981401 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163773201.794:11479): arch=40000003 syscall=11 success=yes exit=0 a0=9851d48 a1=9851740 a2=9851d60 a3=9851740 items=0 ppid=8275 pid=8276 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163773201.794:11479): path="/usr/lib/sa/sadc" type=AVC_PATH msg=audit(1163773201.794:11479): path="/usr/lib/sa/sadc" type=AVC msg=audit(1163773201.798:11480): avc: denied { search } for pid=8276 comm="sadc" name="net" dev=proc ino=-268435432 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=dir type=AVC msg=audit(1163773201.798:11480): avc: denied { read } for pid=8276 comm="sadc" name="dev" dev=proc ino=-268434164 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=file type=SYSCALL msg=audit(1163773201.798:11480): arch=40000003 syscall=5 success=yes exit=3 a0=8050371 a1=0 a2=1b6 a3=97ac7f8 items=0 ppid=8275 pid=8276 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163773201.798:11481): avc: denied { getattr } for pid=8276 comm="sadc" name="dev" dev=proc ino=-268434164 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=file type=SYSCALL msg=audit(1163773201.798:11481): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bfa33b58 a2=c4eff4 a3=97ac7f8 items=0 ppid=8275 pid=8276 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163773201.798:11481): path="/proc/net/dev" type=AVC msg=audit(1163773201.798:11482): avc: denied { search } for pid=8276 comm="sadc" name="sa" dev=dm-0 ino=14607631 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=dir type=SYSCALL msg=audit(1163773201.798:11482): arch=40000003 syscall=33 success=yes exit=0 a0=bfa33f04 a1=0 a2=bfa33df8 a3=bfa33e00 items=0 ppid=8275 pid=8276 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163773201.798:11483): avc: denied { read append } for pid=8276 comm="sadc" name="sa17" dev=dm-0 ino=14600257 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=file type=SYSCALL msg=audit(1163773201.798:11483): arch=40000003 syscall=5 success=yes exit=3 a0=bfa33f04 a1=402 a2=bfa340c8 a3=bfa33e00 items=0 ppid=8275 pid=8276 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163773201.798:11484): avc: denied { search } for pid=8276 comm="sadc" name="fs" dev=proc ino=-268435428 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=dir type=AVC msg=audit(1163773201.798:11484): avc: denied { read } for pid=8276 comm="sadc" name="dentry-state" dev=proc ino=-268435230 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=file type=SYSCALL msg=audit(1163773201.798:11484): arch=40000003 syscall=5 success=yes exit=4 a0=805037f a1=0 a2=1b6 a3=97ad2f8 items=0 ppid=8275 pid=8276 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163773201.798:11485): avc: denied { getattr } for pid=8276 comm="sadc" name="dentry-state" dev=proc ino=-268435230 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=file type=SYSCALL msg=audit(1163773201.798:11485): arch=40000003 syscall=197 success=yes exit=0 a0=4 a1=bfa339b0 a2=c4eff4 a3=97ad2f8 items=0 ppid=8275 pid=8276 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163773201.798:11485): path="/proc/sys/fs/dentry-state" type=AVC msg=audit(1163773201.798:11486): avc: denied { search } for pid=8276 comm="sadc" name="rpc" dev=proc ino=-268433616 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_rpc_t:s0 tclass=dir type=SYSCALL msg=audit(1163773201.798:11486): arch=40000003 syscall=5 success=no exit=-2 a0=80502a5 a1=0 a2=1b6 a3=97ad2f8 items=0 ppid=8275 pid=8276 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163773201.802:11487): avc: denied { lock } for pid=8276 comm="sadc" name="sa17" dev=dm-0 ino=14600257 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=file type=SYSCALL msg=audit(1163773201.802:11487): arch=40000003 syscall=143 success=yes exit=0 a0=3 a1=6 a2=bfa33e00 a3=3 items=0 ppid=8275 pid=8276 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163773201.802:11487): path="/var/log/sa/sa17" type=CRED_DISP msg=audit(1163773201.862:11488): user pid=8275 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1163773201.862:11489): user pid=8275 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1163773212.595:11490): avc: denied { search } for pid=8278 comm="thunderbird" name="locale" dev=dm-0 ino=10311858 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=dir type=AVC msg=audit(1163773212.595:11490): avc: denied { read } for pid=8278 comm="thunderbird" name="locale-archive" dev=dm-0 ino=10328905 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=user_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1163773212.595:11490): arch=40000003 syscall=5 success=yes exit=3 a0=c37d80 a1=8000 a2=1 a3=bfe9f4a0 items=0 ppid=1 pid=8278 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird" exe="/bin/bash" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC msg=audit(1163773212.595:11491): avc: denied { getattr } for pid=8278 comm="thunderbird" name="locale-archive" dev=dm-0 ino=10328905 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=user_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1163773212.595:11491): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=c4faa0 a2=c4eff4 a3=bfe9f4a0 items=0 ppid=1 pid=8278 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird" exe="/bin/bash" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC_PATH msg=audit(1163773212.595:11491): path="/usr/lib/locale/locale-archive" type=AVC msg=audit(1163773212.595:11492): avc: denied { read } for pid=8278 comm="thunderbird" name="meminfo" dev=proc ino=-268435454 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:proc_t:s0 tclass=file type=SYSCALL msg=audit(1163773212.595:11492): arch=40000003 syscall=5 success=yes exit=3 a0=c36d1a a1=0 a2=1b6 a3=8852a60 items=0 ppid=1 pid=8278 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird" exe="/bin/bash" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC msg=audit(1163773212.595:11493): avc: denied { getattr } for pid=8278 comm="thunderbird" name="meminfo" dev=proc ino=-268435454 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:proc_t:s0 tclass=file type=SYSCALL msg=audit(1163773212.595:11493): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bfe9d618 a2=c4eff4 a3=8852a60 items=0 ppid=1 pid=8278 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird" exe="/bin/bash" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC_PATH msg=audit(1163773212.595:11493): path="/proc/meminfo" type=AVC msg=audit(1163773212.595:11494): avc: denied { read } for pid=8278 comm="thunderbird" name="gconv-modules.cache" dev=dm-0 ino=10387675 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=user_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1163773212.595:11494): arch=40000003 syscall=5 success=yes exit=3 a0=c37d5c a1=0 a2=0 a3=bfe9f700 items=0 ppid=1 pid=8278 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird" exe="/bin/bash" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC msg=audit(1163773212.595:11495): avc: denied { getattr } for pid=8278 comm="thunderbird" name="gconv-modules.cache" dev=dm-0 ino=10387675 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=user_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1163773212.595:11495): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bfe9f5a8 a2=c4eff4 a3=3 items=0 ppid=1 pid=8278 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird" exe="/bin/bash" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC_PATH msg=audit(1163773212.595:11495): path="/usr/lib/gconv/gconv-modules.cache" type=AVC msg=audit(1163773212.979:11496): avc: denied { read } for pid=8290 comm="thunderbird-bin" name="locale.alias" dev=dm-0 ino=10314350 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1163773212.979:11496): arch=40000003 syscall=5 success=yes exit=3 a0=bfac7f20 a1=0 a2=1b6 a3=9003398 items=0 ppid=8285 pid=8290 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird-bin" exe="/usr/lib/thunderbird-1.5.0.7/thunderbird-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC msg=audit(1163773212.979:11497): avc: denied { getattr } for pid=8290 comm="thunderbird-bin" name="locale.alias" dev=dm-0 ino=10314350 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1163773212.979:11497): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bfac7dbc a2=c4eff4 a3=9003398 items=0 ppid=8285 pid=8290 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird-bin" exe="/usr/lib/thunderbird-1.5.0.7/thunderbird-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC_PATH msg=audit(1163773212.979:11497): path="/usr/share/locale/locale.alias" type=AVC msg=audit(1163773212.979:11498): avc: denied { search } for pid=8290 comm="thunderbird-bin" name="nscd" dev=dm-0 ino=14436932 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:nscd_var_run_t:s0 tclass=dir type=SYSCALL msg=audit(1163773212.979:11498): arch=40000003 syscall=102 success=no exit=-2 a0=3 a1=bfac7e90 a2=c4eff4 a3=3 items=0 ppid=8285 pid=8290 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird-bin" exe="/usr/lib/thunderbird-1.5.0.7/thunderbird-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC msg=audit(1163773212.991:11499): avc: denied { read } for pid=8290 comm="thunderbird-bin" name=".gdmV8RYIT" dev=dm-0 ino=14469571 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163773212.991:11499): arch=40000003 syscall=33 success=yes exit=0 a0=bfacaf72 a1=4 a2=da3a64 a3=bfacaf72 items=0 ppid=8285 pid=8290 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird-bin" exe="/usr/lib/thunderbird-1.5.0.7/thunderbird-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC msg=audit(1163773212.995:11500): avc: denied { getattr } for pid=8290 comm="thunderbird-bin" name=".gdmV8RYIT" dev=dm-0 ino=14469571 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163773212.995:11500): arch=40000003 syscall=197 success=yes exit=0 a0=4 a1=bfac7c1c a2=c4eff4 a3=8ff7558 items=0 ppid=8285 pid=8290 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird-bin" exe="/usr/lib/thunderbird-1.5.0.7/thunderbird-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC_PATH msg=audit(1163773212.995:11500): path="/tmp/.gdmV8RYIT" type=AVC msg=audit(1163773213.179:11501): avc: denied { read } for pid=8278 comm="thunderbird" name="meminfo" dev=proc ino=-268435454 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:proc_t:s0 tclass=file type=SYSCALL msg=audit(1163773213.179:11501): arch=40000003 syscall=5 success=yes exit=3 a0=c36d1a a1=0 a2=1b6 a3=9b5fa60 items=0 ppid=1 pid=8278 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird" exe="/bin/bash" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC msg=audit(1163773213.179:11502): avc: denied { getattr } for pid=8278 comm="thunderbird" name="meminfo" dev=proc ino=-268435454 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:proc_t:s0 tclass=file type=SYSCALL msg=audit(1163773213.179:11502): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bf80ed68 a2=c4eff4 a3=9b5fa60 items=0 ppid=1 pid=8278 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird" exe="/bin/bash" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC_PATH msg=audit(1163773213.179:11502): path="/proc/meminfo" type=AVC msg=audit(1163773213.359:11503): avc: denied { search } for pid=8301 comm="thunderbird-bin" name=".mozilla" dev=dm-0 ino=6547337 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=staff_u:object_r:staff_mozilla_home_t:s0 tclass=dir type=SYSCALL msg=audit(1163773213.359:11503): arch=40000003 syscall=33 success=yes exit=0 a0=9903cb8 a1=0 a2=ab3bdc a3=bfe14c4c items=0 ppid=8296 pid=8301 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird-bin" exe="/usr/lib/thunderbird-1.5.0.7/thunderbird-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC msg=audit(1163773213.363:11504): avc: denied { getattr } for pid=8301 comm="thunderbird-bin" name="dom_html.xpt" dev=dm-0 ino=10737706 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1163773213.363:11504): arch=40000003 syscall=195 success=yes exit=0 a0=9907400 a1=bfe14b0c a2=c4eff4 a3=bfe14b0c items=0 ppid=8296 pid=8301 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird-bin" exe="/usr/lib/thunderbird-1.5.0.7/thunderbird-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC_PATH msg=audit(1163773213.363:11504): path="/usr/lib/thunderbird-1.5.0.7/components/dom_html.xpt" type=AVC msg=audit(1163773213.367:11505): avc: denied { read } for pid=8301 comm="thunderbird-bin" name="plugins" dev=dm-0 ino=6547805 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=staff_u:object_r:staff_mozilla_home_t:s0 tclass=dir type=SYSCALL msg=audit(1163773213.367:11505): arch=40000003 syscall=5 success=yes exit=5 a0=9903cb8 a1=18800 a2=bfe14af8 a3=bfe14b60 items=0 ppid=8296 pid=8301 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird-bin" exe="/usr/lib/thunderbird-1.5.0.7/thunderbird-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC msg=audit(1163773213.367:11506): avc: denied { getattr } for pid=8301 comm="thunderbird-bin" name="plugins" dev=dm-0 ino=6547805 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=staff_u:object_r:staff_mozilla_home_t:s0 tclass=dir type=SYSCALL msg=audit(1163773213.367:11506): arch=40000003 syscall=197 success=yes exit=0 a0=5 a1=bfe14acc a2=c4eff4 a3=5 items=0 ppid=8296 pid=8301 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird-bin" exe="/usr/lib/thunderbird-1.5.0.7/thunderbird-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC_PATH msg=audit(1163773213.367:11506): path="/home/kmacmill/.mozilla/plugins" type=AVC msg=audit(1163773213.367:11507): avc: denied { getattr } for pid=8301 comm="thunderbird-bin" name="libflashplayer.so" dev=dm-0 ino=6547382 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=user_u:object_r:user_mozilla_home_t:s0 tclass=file type=SYSCALL msg=audit(1163773213.367:11507): arch=40000003 syscall=195 success=yes exit=0 a0=990ad70 a1=bfe14b0c a2=c4eff4 a3=bfe14b0c items=0 ppid=8296 pid=8301 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird-bin" exe="/usr/lib/thunderbird-1.5.0.7/thunderbird-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC_PATH msg=audit(1163773213.367:11507): path="/home/kmacmill/.mozilla/plugins/libflashplayer.so" type=AVC msg=audit(1163773213.367:11508): avc: denied { getattr } for pid=8301 comm="thunderbird-bin" name="nprhapengine.so" dev=dm-0 ino=6547712 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=staff_u:object_r:staff_mozilla_home_t:s0 tclass=file type=SYSCALL msg=audit(1163773213.367:11508): arch=40000003 syscall=195 success=yes exit=0 a0=990ad70 a1=bfe14b0c a2=c4eff4 a3=bfe14b0c items=0 ppid=8296 pid=8301 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird-bin" exe="/usr/lib/thunderbird-1.5.0.7/thunderbird-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC_PATH msg=audit(1163773213.367:11508): path="/home/kmacmill/.mozilla/plugins/nprhapengine.so" type=AVC msg=audit(1163773213.371:11509): avc: denied { read } for pid=8301 comm="thunderbird-bin" name="msgbase.xpt" dev=dm-0 ino=10737972 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1163773213.371:11509): arch=40000003 syscall=5 success=yes exit=5 a0=9907cb8 a1=8000 a2=0 a3=8000 items=0 ppid=8296 pid=8301 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird-bin" exe="/usr/lib/thunderbird-1.5.0.7/thunderbird-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC msg=audit(1163773213.675:11510): avc: denied { read } for pid=8301 comm="thunderbird-bin" name="flashplayer.xpt" dev=dm-0 ino=6547381 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=staff_u:object_r:staff_mozilla_home_t:s0 tclass=file type=SYSCALL msg=audit(1163773213.675:11510): arch=40000003 syscall=5 success=yes exit=5 a0=990ad70 a1=8000 a2=0 a3=8000 items=0 ppid=8296 pid=8301 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird-bin" exe="/usr/lib/thunderbird-1.5.0.7/thunderbird-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC msg=audit(1163773216.487:11511): avc: denied { read } for pid=8301 comm="thunderbird-bin" name="urandom" dev=tmpfs ino=1972 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:urandom_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163773216.487:11511): arch=40000003 syscall=5 success=yes exit=18 a0=3d4880 a1=8000 a2=1b6 a3=9abb478 items=0 ppid=8296 pid=8301 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird-bin" exe="/usr/lib/thunderbird-1.5.0.7/thunderbird-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC msg=audit(1163773216.487:11512): avc: denied { getattr } for pid=8301 comm="thunderbird-bin" name="urandom" dev=tmpfs ino=1972 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:urandom_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163773216.487:11512): arch=40000003 syscall=197 success=yes exit=0 a0=12 a1=bfe12f2c a2=c4eff4 a3=9abb478 items=0 ppid=8296 pid=8301 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird-bin" exe="/usr/lib/thunderbird-1.5.0.7/thunderbird-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC_PATH msg=audit(1163773216.487:11512): path="/dev/urandom" type=AVC msg=audit(1163773216.487:11513): avc: denied { ioctl } for pid=8301 comm="thunderbird-bin" name="urandom" dev=tmpfs ino=1972 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:urandom_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163773216.487:11513): arch=40000003 syscall=54 success=no exit=-22 a0=12 a1=5401 a2=bfe12e8c a3=bfe12ecc items=0 ppid=8296 pid=8301 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird-bin" exe="/usr/lib/thunderbird-1.5.0.7/thunderbird-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC_PATH msg=audit(1163773216.487:11513): path="/dev/urandom" type=AVC msg=audit(1163773228.744:11514): avc: denied { search } for pid=8301 comm="thunderbird-bin" name="nscd" dev=dm-0 ino=14436932 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:nscd_var_run_t:s0 tclass=dir type=SYSCALL msg=audit(1163773228.744:11514): arch=40000003 syscall=102 success=no exit=-2 a0=3 a1=bf845c10 a2=c4eff4 a3=3 items=0 ppid=8296 pid=8301 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird-bin" exe="/usr/lib/thunderbird-1.5.0.7/thunderbird-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC msg=audit(1163773229.948:11515): avc: denied { read } for pid=8301 comm="thunderbird-bin" name="3830d5c3ddfd5cd38a049b759396e72e-x86.cache-2" dev=dm-0 ino=14437317 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=user_u:object_r:var_t:s0 tclass=file type=SYSCALL msg=audit(1163773229.948:11515): arch=40000003 syscall=5 success=yes exit=30 a0=a01d410 a1=0 a2=f501c600 a3=a0118b8 items=0 ppid=8296 pid=8301 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird-bin" exe="/usr/lib/thunderbird-1.5.0.7/thunderbird-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC msg=audit(1163773229.948:11516): avc: denied { getattr } for pid=8301 comm="thunderbird-bin" name="3830d5c3ddfd5cd38a049b759396e72e-x86.cache-2" dev=dm-0 ino=14437317 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=user_u:object_r:var_t:s0 tclass=file type=SYSCALL msg=audit(1163773229.948:11516): arch=40000003 syscall=197 success=yes exit=0 a0=1e a1=bf84460c a2=c4eff4 a3=bf84460c items=0 ppid=8296 pid=8301 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird-bin" exe="/usr/lib/thunderbird-1.5.0.7/thunderbird-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC_PATH msg=audit(1163773229.948:11516): path="/var/cache/fontconfig/3830d5c3ddfd5cd38a049b759396e72e-x86.cache-2" type=AVC msg=audit(1163773231.640:11517): avc: denied { search } for pid=8312 comm="netstat" name="sys" dev=proc ino=-268435429 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:sysctl_t:s0 tclass=dir type=AVC msg=audit(1163773231.640:11517): avc: denied { search } for pid=8312 comm="netstat" name="net" dev=proc ino=-268435343 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:sysctl_net_t:s0 tclass=dir type=SYSCALL msg=audit(1163773231.640:11517): arch=40000003 syscall=33 success=no exit=-2 a0=805f53c a1=4 a2=8064740 a3=8 items=0 ppid=8301 pid=8312 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="netstat" exe="/bin/netstat" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC msg=audit(1163773231.928:11518): avc: denied { create } for pid=8315 comm="thunderbird-bin" scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=staff_u:staff_r:staff_thunderbird_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1163773231.928:11518): arch=40000003 syscall=102 success=yes exit=40 a0=1 a1=b26fd1d4 a2=c4eff4 a3=0 items=0 ppid=8296 pid=8315 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird-bin" exe="/usr/lib/thunderbird-1.5.0.7/thunderbird-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC msg=audit(1163773231.928:11519): avc: denied { bind } for pid=8315 comm="thunderbird-bin" scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=staff_u:staff_r:staff_thunderbird_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1163773231.928:11519): arch=40000003 syscall=102 success=yes exit=0 a0=2 a1=b26fd1d4 a2=c4eff4 a3=28 items=0 ppid=8296 pid=8315 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird-bin" exe="/usr/lib/thunderbird-1.5.0.7/thunderbird-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC msg=audit(1163773231.928:11520): avc: denied { getattr } for pid=8315 comm="thunderbird-bin" scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=staff_u:staff_r:staff_thunderbird_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1163773231.928:11520): arch=40000003 syscall=102 success=yes exit=0 a0=6 a1=b26fd1d4 a2=c4eff4 a3=28 items=0 ppid=8296 pid=8315 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird-bin" exe="/usr/lib/thunderbird-1.5.0.7/thunderbird-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC msg=audit(1163773231.928:11521): avc: denied { write } for pid=8315 comm="thunderbird-bin" scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=staff_u:staff_r:staff_thunderbird_t:s0 tclass=netlink_route_socket type=AVC msg=audit(1163773231.928:11521): avc: denied { nlmsg_read } for pid=8315 comm="thunderbird-bin" scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=staff_u:staff_r:staff_thunderbird_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1163773231.928:11521): arch=40000003 syscall=102 success=yes exit=20 a0=b a1=b26fc10c a2=c4eff4 a3=0 items=0 ppid=8296 pid=8315 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird-bin" exe="/usr/lib/thunderbird-1.5.0.7/thunderbird-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC msg=audit(1163773231.928:11522): avc: denied { read } for pid=8315 comm="thunderbird-bin" scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=staff_u:staff_r:staff_thunderbird_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1163773231.928:11522): arch=40000003 syscall=102 success=yes exit=188 a0=11 a1=b26fc10c a2=c4eff4 a3=0 items=0 ppid=8296 pid=8315 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird-bin" exe="/usr/lib/thunderbird-1.5.0.7/thunderbird-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC msg=audit(1163773231.936:11523): avc: denied { read } for pid=8137 comm="vpnc" name="tun" dev=tmpfs ino=1473 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:tun_tap_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163773231.936:11523): arch=40000003 syscall=3 success=yes exit=69 a0=4 a1=805c5a0 a2=1000 a3=805c5a0 items=0 ppid=8135 pid=8137 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vpnc" exe="/usr/sbin/vpnc" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163773231.936:11523): path="/dev/net/tun" type=AVC msg=audit(1163773231.988:11524): avc: denied { write } for pid=8137 comm="vpnc" name="tun" dev=tmpfs ino=1473 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:tun_tap_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163773231.988:11524): arch=40000003 syscall=4 success=yes exit=117 a0=4 a1=805c570 a2=75 a3=bfa20a54 items=0 ppid=8135 pid=8137 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vpnc" exe="/usr/sbin/vpnc" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163773231.988:11524): path="/dev/net/tun" type=AVC msg=audit(1163773396.727:11525): avc: denied { read } for pid=8326 comm="gnome-font-prop" name=".gdmV8RYIT" dev=dm-0 ino=14469571 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163773396.727:11525): arch=40000003 syscall=33 success=yes exit=0 a0=bfb43de7 a1=4 a2=da3a64 a3=bfb43de7 items=0 ppid=1 pid=8326 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-font-prop" exe="/usr/bin/gnome-font-properties" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163773396.779:11526): avc: denied { read } for pid=8326 comm="gnome-font-prop" name=".ICEauthority" dev=dm-0 ino=6574784 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:staff_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163773396.779:11526): arch=40000003 syscall=33 success=yes exit=0 a0=8f0d598 a1=4 a2=df7770 a3=8f0d598 items=0 ppid=1 pid=8326 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-font-prop" exe="/usr/bin/gnome-font-properties" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163773397.655:11527): avc: denied { getattr } for pid=8301 comm="thunderbird-bin" name="localtime" dev=dm-0 ino=5466955 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1163773397.655:11527): arch=40000003 syscall=195 success=yes exit=0 a0=c36800 a1=bf844720 a2=c4eff4 a3=0 items=0 ppid=8296 pid=8301 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird-bin" exe="/usr/lib/thunderbird-1.5.0.7/thunderbird-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC_PATH msg=audit(1163773397.655:11527): path="/etc/localtime" type=AVC msg=audit(1163773695.057:11528): avc: denied { search } for pid=8345 comm="thunderbird" name="locale" dev=dm-0 ino=10311858 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=dir type=AVC msg=audit(1163773695.057:11528): avc: denied { read } for pid=8345 comm="thunderbird" name="locale-archive" dev=dm-0 ino=10328905 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=user_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1163773695.057:11528): arch=40000003 syscall=5 success=yes exit=3 a0=c37d80 a1=8000 a2=1 a3=bfbadff0 items=0 ppid=1 pid=8345 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird" exe="/bin/bash" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC msg=audit(1163773695.057:11529): avc: denied { getattr } for pid=8345 comm="thunderbird" name="locale-archive" dev=dm-0 ino=10328905 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=user_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1163773695.057:11529): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=c4faa0 a2=c4eff4 a3=bfbadff0 items=0 ppid=1 pid=8345 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird" exe="/bin/bash" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC_PATH msg=audit(1163773695.057:11529): path="/usr/lib/locale/locale-archive" type=AVC msg=audit(1163773695.057:11530): avc: denied { read } for pid=8345 comm="thunderbird" name="gconv-modules.cache" dev=dm-0 ino=10387675 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=user_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1163773695.057:11530): arch=40000003 syscall=5 success=yes exit=3 a0=c37d5c a1=0 a2=0 a3=bfbae250 items=0 ppid=1 pid=8345 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird" exe="/bin/bash" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC msg=audit(1163773695.057:11531): avc: denied { getattr } for pid=8345 comm="thunderbird" name="gconv-modules.cache" dev=dm-0 ino=10387675 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=user_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1163773695.057:11531): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bfbae0f8 a2=c4eff4 a3=3 items=0 ppid=1 pid=8345 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird" exe="/bin/bash" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC_PATH msg=audit(1163773695.057:11531): path="/usr/lib/gconv/gconv-modules.cache" type=AVC msg=audit(1163773695.125:11532): avc: denied { read } for pid=8357 comm="thunderbird-bin" name="locale.alias" dev=dm-0 ino=10314350 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1163773695.125:11532): arch=40000003 syscall=5 success=yes exit=3 a0=bfbdf030 a1=0 a2=1b6 a3=9ad3398 items=0 ppid=8352 pid=8357 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird-bin" exe="/usr/lib/thunderbird-1.5.0.7/thunderbird-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC msg=audit(1163773700.438:11533): avc: denied { read } for pid=8303 comm="yum" name="resolv.conf" dev=dm-0 ino=9330239 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:net_conf_t:s0 tclass=file type=SYSCALL msg=audit(1163773700.438:11533): arch=40000003 syscall=5 success=yes exit=9 a0=c37093 a1=0 a2=1b6 a3=8c40560 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163773705.594:11534): avc: denied { write } for pid=8303 comm="yum" name="packages" dev=dm-0 ino=15288142 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:var_t:s0 tclass=dir type=AVC msg=audit(1163773705.594:11534): avc: denied { add_name } for pid=8303 comm="yum" name="selinux-policy-devel-2.4.4-3.fc7.noarch.rpm" scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:var_t:s0 tclass=dir type=SYSCALL msg=audit(1163773705.594:11534): arch=40000003 syscall=5 success=yes exit=10 a0=c896d70 a1=8241 a2=1b6 a3=8c40560 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163773780.783:11535): avc: denied { read } for pid=8387 comm="firefox-bin" name=".gdmV8RYIT" dev=dm-0 ino=14469571 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163773780.783:11535): arch=40000003 syscall=33 success=yes exit=0 a0=bff2cfcb a1=4 a2=da3a64 a3=bff2cfcb items=0 ppid=1 pid=8387 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163773780.783:11536): avc: denied { getattr } for pid=8387 comm="firefox-bin" name=".gdmV8RYIT" dev=dm-0 ino=14469571 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163773780.783:11536): arch=40000003 syscall=197 success=yes exit=0 a0=4 a1=bff2b34c a2=c4eff4 a3=9ca2140 items=0 ppid=1 pid=8387 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163773780.783:11536): path="/tmp/.gdmV8RYIT" type=AVC msg=audit(1163773780.791:11537): avc: denied { write } for pid=8303 comm="yum" name="qt-designer-3.3.7-1.fc7.i386.rpm" dev=dm-0 ino=15288245 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:var_t:s0 tclass=file type=SYSCALL msg=audit(1163773780.791:11537): arch=40000003 syscall=4 success=yes exit=4096 a0=a a1=b7fa1000 a2=1000 a3=1000 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163773780.791:11537): path="/var/cache/yum/development/packages/qt-designer-3.3.7-1.fc7.i386.rpm" type=AVC msg=audit(1163773782.935:11538): avc: denied { setattr } for pid=8303 comm="yum" name="qt-designer-3.3.7-1.fc7.i386.rpm" dev=dm-0 ino=15288245 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:var_t:s0 tclass=file type=SYSCALL msg=audit(1163773782.935:11538): arch=40000003 syscall=271 success=yes exit=0 a0=a3ba900 a1=bf87c404 a2=c4eff4 a3=880aaec items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163773783.023:11539): avc: denied { create } for pid=8303 comm="yum" name="openssh-4.3p2-12.fc7.i386.rpm" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:var_t:s0 tclass=file type=SYSCALL msg=audit(1163773783.023:11539): arch=40000003 syscall=5 success=yes exit=10 a0=95665a8 a1=8241 a2=1b6 a3=8ecbc20 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=USER_ACCT msg=audit(1163773801.916:11540): user pid=8412 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1163773801.916:11541): login pid=8412 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1163773801.916:11542): user pid=8412 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1163773801.916:11543): user pid=8412 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1163773801.928:11544): avc: denied { search } for pid=8413 comm="sadc" name="net" dev=proc ino=-268435432 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=dir type=AVC msg=audit(1163773801.928:11544): avc: denied { read } for pid=8413 comm="sadc" name="dev" dev=proc ino=-268434164 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=file type=SYSCALL msg=audit(1163773801.928:11544): arch=40000003 syscall=5 success=yes exit=3 a0=8050371 a1=0 a2=1b6 a3=97477f8 items=0 ppid=8412 pid=8413 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163773801.928:11545): avc: denied { getattr } for pid=8413 comm="sadc" name="dev" dev=proc ino=-268434164 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=file type=SYSCALL msg=audit(1163773801.928:11545): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bfc2b558 a2=c4eff4 a3=97477f8 items=0 ppid=8412 pid=8413 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163773801.928:11545): path="/proc/net/dev" type=CRED_DISP msg=audit(1163773802.012:11546): user pid=8412 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1163773802.016:11547): user pid=8412 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1163773872.184:11548): avc: denied { read } for pid=8116 comm="dhclient" name="[31406]" dev=sockfs ino=31406 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=packet_socket type=SYSCALL msg=audit(1163773872.184:11548): arch=40000003 syscall=3 success=yes exit=590 a0=6 a1=bf923428 a2=600 a3=9604620 items=0 ppid=8112 pid=8116 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="dhclient" exe="/sbin/dhclient" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163773872.184:11548): path="socket:[31406]" type=AVC msg=audit(1163773953.097:11549): avc: denied { getattr } for pid=8434 comm="firefox-bin" name="libflashplayer.so" dev=dm-0 ino=6547382 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=user_u:object_r:user_mozilla_home_t:s0 tclass=file type=SYSCALL msg=audit(1163773953.097:11549): arch=40000003 syscall=196 success=yes exit=0 a0=bf84f9d4 a1=bf84f938 a2=c4eff4 a3=98d60f8 items=0 ppid=1 pid=8434 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163773953.097:11549): path="/home/kmacmill/.mozilla/plugins/libflashplayer.so" type=AVC msg=audit(1163774133.877:11550): avc: denied { write } for pid=8465 comm="gnome-terminal" name="3310" dev=dm-0 ino=14567721 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:ice_tmp_t:s0 tclass=sock_file type=SYSCALL msg=audit(1163774133.877:11550): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=bfd8bd10 a2=df7770 a3=15 items=0 ppid=1 pid=8465 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-terminal" exe="/usr/bin/gnome-terminal" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774169.215:11551): avc: denied { write } for pid=8303 comm="yum" name="packages" dev=dm-0 ino=15288142 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:var_t:s0 tclass=dir type=AVC msg=audit(1163774169.215:11551): avc: denied { add_name } for pid=8303 comm="yum" name="udev-103-2.i386.rpm" scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:var_t:s0 tclass=dir type=SYSCALL msg=audit(1163774169.215:11551): arch=40000003 syscall=5 success=yes exit=10 a0=c675da8 a1=8241 a2=1b6 a3=9fce418 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=USER_AUTH msg=audit(1163774197.053:11552): user pid=8520 uid=500 auid=500 subj=staff_u:staff_r:staff_su_t:s0 msg='PAM: authentication acct=root : exe="/bin/su" (hostname=?, addr=?, terminal=pts/2 res=success)' type=USER_ACCT msg=audit(1163774197.053:11553): user pid=8520 uid=500 auid=500 subj=staff_u:staff_r:staff_su_t:s0 msg='PAM: accounting acct=root : exe="/bin/su" (hostname=?, addr=?, terminal=pts/2 res=success)' type=AVC msg=audit(1163774197.069:11554): avc: denied { search } for pid=8520 comm="su" name="root" dev=dm-0 ino=13127137 scontext=staff_u:staff_r:staff_su_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=SYSCALL msg=audit(1163774197.069:11554): arch=40000003 syscall=5 success=no exit=-2 a0=bfca7178 a1=8000 a2=1b6 a3=96e49a8 items=0 ppid=8500 pid=8520 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=pts2 comm="su" exe="/bin/su" subj=staff_u:staff_r:staff_su_t:s0 key=(null) type=AVC msg=audit(1163774197.197:11555): avc: denied { write } for pid=8521 comm="xauth" name=".gdmV8RYIT" dev=dm-0 ino=14469571 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163774197.197:11555): arch=40000003 syscall=33 success=yes exit=0 a0=bfec99ba a1=2 a2=bfec9720 a3=0 items=0 ppid=8520 pid=8521 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts2 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC msg=audit(1163774197.201:11556): avc: denied { read } for pid=8521 comm="xauth" name=".gdmV8RYIT" dev=dm-0 ino=14469571 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163774197.201:11556): arch=40000003 syscall=5 success=yes exit=2 a0=bfec99ba a1=0 a2=1b6 a3=9caa008 items=0 ppid=8520 pid=8521 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts2 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC msg=audit(1163774197.201:11557): avc: denied { getattr } for pid=8521 comm="xauth" name=".gdmV8RYIT" dev=dm-0 ino=14469571 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163774197.201:11557): arch=40000003 syscall=197 success=yes exit=0 a0=2 a1=bfec946c a2=c4eff4 a3=9caa008 items=0 ppid=8520 pid=8521 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts2 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC_PATH msg=audit(1163774197.201:11557): path="/tmp/.gdmV8RYIT" type=AVC msg=audit(1163774197.201:11558): avc: denied { write } for pid=8520 comm="su" name="root" dev=dm-0 ino=13127137 scontext=staff_u:staff_r:staff_su_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1163774197.201:11558): avc: denied { add_name } for pid=8520 comm="su" name=".xauthb3Z41E" scontext=staff_u:staff_r:staff_su_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1163774197.201:11558): avc: denied { create } for pid=8520 comm="su" name=".xauthb3Z41E" scontext=staff_u:staff_r:staff_su_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163774197.201:11558): arch=40000003 syscall=5 success=yes exit=4 a0=96e4acb a1=80c2 a2=180 a3=80c2 items=0 ppid=8500 pid=8520 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=pts2 comm="su" exe="/bin/su" subj=staff_u:staff_r:staff_su_t:s0 key=(null) type=AVC msg=audit(1163774197.217:11559): avc: denied { setattr } for pid=8520 comm="su" name=".xauthb3Z41E" dev=dm-0 ino=13127384 scontext=staff_u:staff_r:staff_su_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163774197.217:11559): arch=40000003 syscall=207 success=yes exit=0 a0=4 a1=0 a2=0 a3=25869f items=0 ppid=8500 pid=8520 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=pts2 comm="su" exe="/bin/su" subj=staff_u:staff_r:staff_su_t:s0 key=(null) type=AVC msg=audit(1163774197.221:11560): avc: denied { search } for pid=8522 comm="xauth" name="root" dev=dm-0 ino=13127137 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=SYSCALL msg=audit(1163774197.221:11560): arch=40000003 syscall=195 success=no exit=-2 a0=bfbeff17 a1=bfbefa2c a2=c4eff4 a3=bfbefa2c items=0 ppid=8520 pid=8522 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC msg=audit(1163774197.221:11561): avc: denied { write } for pid=8522 comm="xauth" name="root" dev=dm-0 ino=13127137 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1163774197.221:11561): avc: denied { add_name } for pid=8522 comm="xauth" name=".xauthb3Z41E-c" scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1163774197.221:11561): avc: denied { create } for pid=8522 comm="xauth" name=".xauthb3Z41E-c" scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163774197.221:11561): arch=40000003 syscall=5 success=yes exit=2 a0=bfbeff17 a1=c1 a2=180 a3=ffffffff items=0 ppid=8520 pid=8522 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC msg=audit(1163774197.221:11562): avc: denied { link } for pid=8522 comm="xauth" name=".xauthb3Z41E-c" dev=dm-0 ino=13127385 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163774197.221:11562): arch=40000003 syscall=9 success=yes exit=0 a0=bfbeff17 a1=bfbefb16 a2=da3a64 a3=2 items=0 ppid=8520 pid=8522 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC msg=audit(1163774197.221:11563): avc: denied { write } for pid=8522 comm="xauth" name=".xauthb3Z41E" dev=dm-0 ino=13127384 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163774197.221:11563): arch=40000003 syscall=33 success=yes exit=0 a0=bfbf19b6 a1=2 a2=bfbf0440 a3=0 items=0 ppid=8520 pid=8522 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC msg=audit(1163774197.221:11564): avc: denied { read } for pid=8522 comm="xauth" name=".xauthb3Z41E" dev=dm-0 ino=13127384 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163774197.221:11564): arch=40000003 syscall=5 success=yes exit=2 a0=bfbf19b6 a1=0 a2=1b6 a3=9a31008 items=0 ppid=8520 pid=8522 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC msg=audit(1163774197.221:11565): avc: denied { getattr } for pid=8522 comm="xauth" name=".xauthb3Z41E" dev=dm-0 ino=13127384 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163774197.221:11565): arch=40000003 syscall=197 success=yes exit=0 a0=2 a1=bfbf018c a2=c4eff4 a3=9a31008 items=0 ppid=8520 pid=8522 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC_PATH msg=audit(1163774197.221:11565): path="/root/.xauthb3Z41E" type=AVC msg=audit(1163774197.229:11566): avc: denied { remove_name } for pid=8522 comm="xauth" name=".xauthb3Z41E" dev=dm-0 ino=13127384 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1163774197.229:11566): avc: denied { unlink } for pid=8522 comm="xauth" name=".xauthb3Z41E" dev=dm-0 ino=13127384 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163774197.229:11566): arch=40000003 syscall=10 success=yes exit=0 a0=9a31008 a1=1000 a2=0 a3=9a3108a items=0 ppid=8520 pid=8522 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=USER_START msg=audit(1163774197.229:11567): user pid=8520 uid=500 auid=500 subj=staff_u:staff_r:staff_su_t:s0 msg='PAM: session open acct=root : exe="/bin/su" (hostname=?, addr=?, terminal=pts/2 res=success)' type=CRED_ACQ msg=audit(1163774197.245:11568): user pid=8520 uid=500 auid=500 subj=staff_u:staff_r:staff_su_t:s0 msg='PAM: setcred acct=root : exe="/bin/su" (hostname=?, addr=?, terminal=pts/2 res=success)' type=AVC msg=audit(1163774197.257:11569): avc: denied { dac_override } for pid=8523 comm="bash" capability=1 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=capability type=SYSCALL msg=audit(1163774197.257:11569): arch=40000003 syscall=195 success=yes exit=0 a0=80d2437 a1=bfed1540 a2=c4eff4 a3=bfed15a0 items=0 ppid=8520 pid=8523 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774197.257:11570): avc: denied { read } for pid=8523 comm="bash" name=".bashrc" dev=dm-0 ino=13127142 scontext=staff_u:staff_r:staff_t:s0 tcontext=root:object_r:user_home_t:s0 tclass=file type=SYSCALL msg=audit(1163774197.257:11570): arch=40000003 syscall=5 success=yes exit=3 a0=86ac760 a1=8000 a2=0 a3=8000 items=0 ppid=8520 pid=8523 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774197.345:11571): avc: denied { read } for pid=8523 comm="bash" name=".bash_history" dev=dm-0 ino=13127151 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:user_home_t:s0 tclass=file type=SYSCALL msg=audit(1163774197.345:11571): arch=40000003 syscall=5 success=yes exit=3 a0=86ac940 a1=8000 a2=0 a3=8000 items=0 ppid=8520 pid=8523 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774199.765:11572): avc: denied { read } for pid=8543 comm="consolehelper-g" name=".xauthb3Z41E" dev=dm-0 ino=13127387 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163774199.765:11572): arch=40000003 syscall=33 success=yes exit=0 a0=bfda3f9d a1=4 a2=da3a64 a3=bfda3f9d items=0 ppid=8523 pid=8543 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="consolehelper-g" exe="/usr/bin/consolehelper-gtk" subj=staff_u:staff_r:staff_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163774199.777:11573): security_compute_sid: invalid context staff_u:staff_r:staff_userhelper_t:s0 for scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:userhelper_exec_t:s0 tclass=process type=SYSCALL msg=audit(1163774199.777:11573): arch=40000003 syscall=11 success=yes exit=0 a0=804c35f a1=9f87c28 a2=bfda35ec a3=3 items=0 ppid=8543 pid=8544 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="userhelper" exe="/usr/sbin/userhelper" subj=staff_u:staff_r:staff_userhelper_t:s0 key=(null) type=USER_AUTH msg=audit(1163774199.949:11574): user pid=8544 uid=0 auid=500 subj=staff_u:staff_r:staff_userhelper_t:s0 msg='PAM: authentication acct=root : exe="/usr/sbin/userhelper" (hostname=?, addr=?, terminal=pts/2 res=success)' type=USER_ACCT msg=audit(1163774199.949:11575): user pid=8544 uid=0 auid=500 subj=staff_u:staff_r:staff_userhelper_t:s0 msg='PAM: accounting acct=root : exe="/usr/sbin/userhelper" (hostname=?, addr=?, terminal=pts/2 res=success)' type=AVC msg=audit(1163774199.949:11576): avc: denied { search } for pid=8544 comm="userhelper" name="root" dev=dm-0 ino=13127137 scontext=staff_u:staff_r:staff_userhelper_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=SYSCALL msg=audit(1163774199.949:11576): arch=40000003 syscall=5 success=no exit=-2 a0=bfeeab38 a1=8000 a2=1b6 a3=90963e8 items=0 ppid=8543 pid=8544 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="userhelper" exe="/usr/sbin/userhelper" subj=staff_u:staff_r:staff_userhelper_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163774199.949:11577): security_compute_sid: invalid context staff_u:staff_r:staff_userhelper_t:s0 for scontext=staff_u:staff_r:staff_userhelper_t:s0 tcontext=system_u:object_r:xauth_exec_t:s0 tclass=process type=AVC msg=audit(1163774199.949:11577): avc: denied { execute_no_trans } for pid=8545 comm="userhelper" name="xauth" dev=dm-0 ino=10326959 scontext=staff_u:staff_r:staff_userhelper_t:s0 tcontext=system_u:object_r:xauth_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163774199.949:11577): arch=40000003 syscall=11 success=yes exit=0 a0=31c761 a1=bfeebafc a2=9092568 a3=4 items=0 ppid=8544 pid=8545 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_userhelper_t:s0 key=(null) type=AVC_PATH msg=audit(1163774199.949:11577): path="/usr/bin/xauth" type=AVC msg=audit(1163774199.953:11578): avc: denied { write } for pid=8545 comm="xauth" name="root" dev=dm-0 ino=13127137 scontext=staff_u:staff_r:staff_userhelper_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1163774199.953:11578): avc: denied { add_name } for pid=8545 comm="xauth" name=".xauthb3Z41E-c" scontext=staff_u:staff_r:staff_userhelper_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1163774199.953:11578): avc: denied { create } for pid=8545 comm="xauth" name=".xauthb3Z41E-c" scontext=staff_u:staff_r:staff_userhelper_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163774199.953:11578): arch=40000003 syscall=5 success=yes exit=2 a0=bfa3d337 a1=c1 a2=180 a3=ffffffff items=0 ppid=8544 pid=8545 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_userhelper_t:s0 key=(null) type=AVC msg=audit(1163774199.953:11579): avc: denied { link } for pid=8545 comm="xauth" name=".xauthb3Z41E-c" dev=dm-0 ino=13127384 scontext=staff_u:staff_r:staff_userhelper_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163774199.953:11579): arch=40000003 syscall=9 success=yes exit=0 a0=bfa3d337 a1=bfa3cf36 a2=da3a64 a3=2 items=0 ppid=8544 pid=8545 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_userhelper_t:s0 key=(null) type=AVC msg=audit(1163774199.953:11580): avc: denied { write } for pid=8545 comm="xauth" name=".xauthb3Z41E" dev=dm-0 ino=13127387 scontext=staff_u:staff_r:staff_userhelper_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163774199.953:11580): arch=40000003 syscall=33 success=yes exit=0 a0=bfa3df09 a1=2 a2=bfa3d860 a3=0 items=0 ppid=8544 pid=8545 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_userhelper_t:s0 key=(null) type=AVC msg=audit(1163774199.953:11581): avc: denied { read } for pid=8545 comm="xauth" name=".xauthb3Z41E" dev=dm-0 ino=13127387 scontext=staff_u:staff_r:staff_userhelper_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163774199.953:11581): arch=40000003 syscall=5 success=yes exit=2 a0=bfa3df09 a1=0 a2=1b6 a3=9312008 items=0 ppid=8544 pid=8545 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_userhelper_t:s0 key=(null) type=AVC msg=audit(1163774199.953:11582): avc: denied { getattr } for pid=8545 comm="xauth" name=".xauthb3Z41E" dev=dm-0 ino=13127387 scontext=staff_u:staff_r:staff_userhelper_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163774199.953:11582): arch=40000003 syscall=197 success=yes exit=0 a0=2 a1=bfa3d5ac a2=c4eff4 a3=9312008 items=0 ppid=8544 pid=8545 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_userhelper_t:s0 key=(null) type=AVC_PATH msg=audit(1163774199.953:11582): path="/root/.xauthb3Z41E" type=AVC msg=audit(1163774199.953:11583): avc: denied { remove_name } for pid=8545 comm="xauth" name=".xauthb3Z41E-c" dev=dm-0 ino=13127384 scontext=staff_u:staff_r:staff_userhelper_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1163774199.953:11583): avc: denied { unlink } for pid=8545 comm="xauth" name=".xauthb3Z41E-c" dev=dm-0 ino=13127384 scontext=staff_u:staff_r:staff_userhelper_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163774199.953:11583): arch=40000003 syscall=10 success=yes exit=0 a0=bfa3cf27 a1=bfa3cb39 a2=da3a64 a3=bfa3cb26 items=0 ppid=8544 pid=8545 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_userhelper_t:s0 key=(null) type=AVC msg=audit(1163774199.953:11584): avc: denied { setattr } for pid=8544 comm="userhelper" name=".xauthTAYBaF" dev=dm-0 ino=13127384 scontext=staff_u:staff_r:staff_userhelper_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163774199.953:11584): arch=40000003 syscall=207 success=yes exit=0 a0=5 a1=0 a2=0 a3=31c69f items=0 ppid=8543 pid=8544 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="userhelper" exe="/usr/sbin/userhelper" subj=staff_u:staff_r:staff_userhelper_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163774199.953:11585): security_compute_sid: invalid context staff_u:staff_r:staff_userhelper_t:s0 for scontext=staff_u:staff_r:staff_userhelper_t:s0 tcontext=system_u:object_r:xauth_exec_t:s0 tclass=process type=SYSCALL msg=audit(1163774199.953:11585): arch=40000003 syscall=11 success=yes exit=0 a0=31c761 a1=bfeebafc a2=9092568 a3=4 items=0 ppid=8544 pid=8546 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_userhelper_t:s0 key=(null) type=USER_START msg=audit(1163774200.085:11586): user pid=8544 uid=0 auid=500 subj=staff_u:staff_r:staff_userhelper_t:s0 msg='PAM: session open acct=root : exe="/usr/sbin/userhelper" (hostname=?, addr=?, terminal=pts/2 res=success)' type=AVC msg=audit(1163774201.129:11587): avc: denied { write } for pid=8547 comm="python" name=".virt-manager" dev=dm-0 ino=13127378 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=dir type=SYSCALL msg=audit(1163774201.129:11587): arch=40000003 syscall=33 success=yes exit=0 a0=8690ca0 a1=2 a2=59d1fe4 a3=b7ec754c items=0 ppid=8544 pid=8547 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="python" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774201.129:11588): avc: denied { write } for pid=8547 comm="python" name="virt-manager.log" dev=dm-0 ino=13127380 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163774201.129:11588): arch=40000003 syscall=5 success=yes exit=3 a0=869c970 a1=8241 a2=1b6 a3=8699b60 items=0 ppid=8544 pid=8547 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="python" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774202.241:11589): avc: denied { search } for pid=8547 comm="python" name="xen" dev=proc ino=-268434186 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:proc_xen_t:s0 tclass=dir type=AVC msg=audit(1163774202.241:11589): avc: denied { read write } for pid=8547 comm="python" name="privcmd" dev=proc ino=-268433970 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:proc_xen_t:s0 tclass=file type=SYSCALL msg=audit(1163774202.241:11589): arch=40000003 syscall=5 success=yes exit=10 a0=90fd8b a1=2 a2=6040e01 a3=bfcc1be7 items=0 ppid=8544 pid=8547 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="python" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774202.241:11590): avc: denied { ioctl } for pid=8547 comm="python" name="privcmd" dev=proc ino=-268433970 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:proc_xen_t:s0 tclass=file type=SYSCALL msg=audit(1163774202.241:11590): arch=40000003 syscall=54 success=yes exit=196608 a0=a a1=305000 a2=bfcc0a1c a3=a items=0 ppid=8544 pid=8547 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="python" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163774202.241:11590): path="/proc/xen/privcmd" type=AVC msg=audit(1163774202.241:11591): avc: denied { ipc_lock } for pid=8547 comm="python" capability=14 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=capability type=SYSCALL msg=audit(1163774202.241:11591): arch=40000003 syscall=150 success=yes exit=0 a0=bfcc09c0 a1=44 a2=91324c a3=1 items=0 ppid=8544 pid=8547 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="python" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774203.361:11592): avc: denied { write } for pid=8549 comm="gconfd-2" name=".gconf" dev=dm-0 ino=13127147 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:user_home_t:s0 tclass=dir type=AVC msg=audit(1163774203.361:11592): avc: denied { add_name } for pid=8549 comm="gconfd-2" name=".testing.writeability" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:user_home_t:s0 tclass=dir type=AVC msg=audit(1163774203.361:11592): avc: denied { create } for pid=8549 comm="gconfd-2" name=".testing.writeability" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:user_home_t:s0 tclass=file type=SYSCALL msg=audit(1163774203.361:11592): arch=40000003 syscall=5 success=yes exit=14 a0=9649fe8 a1=41 a2=1c0 a3=9649fe8 items=0 ppid=1 pid=8549 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774203.489:11593): avc: denied { remove_name } for pid=8549 comm="gconfd-2" name=".testing.writeability" dev=dm-0 ino=13127384 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:user_home_t:s0 tclass=dir type=AVC msg=audit(1163774203.489:11593): avc: denied { unlink } for pid=8549 comm="gconfd-2" name=".testing.writeability" dev=dm-0 ino=13127384 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:user_home_t:s0 tclass=file type=SYSCALL msg=audit(1163774203.489:11593): arch=40000003 syscall=10 success=yes exit=0 a0=9649fe8 a1=41 a2=412708 a3=9649fe8 items=0 ppid=1 pid=8549 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774203.493:11594): avc: denied { read } for pid=8549 comm="gconfd-2" name="saved_state" dev=dm-0 ino=13127383 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:user_home_t:s0 tclass=file type=SYSCALL msg=audit(1163774203.493:11594): arch=40000003 syscall=5 success=yes exit=8 a0=964a460 a1=0 a2=1b6 a3=964a488 items=0 ppid=1 pid=8549 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774203.521:11595): avc: denied { append } for pid=8549 comm="gconfd-2" name="saved_state" dev=dm-0 ino=13127383 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:user_home_t:s0 tclass=file type=SYSCALL msg=audit(1163774203.521:11595): arch=40000003 syscall=5 success=yes exit=15 a0=964bff8 a1=441 a2=1b6 a3=964c020 items=0 ppid=1 pid=8549 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774204.769:11596): avc: denied { write } for pid=8137 comm="vpnc" name="tun" dev=tmpfs ino=1473 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:tun_tap_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163774204.769:11596): arch=40000003 syscall=4 success=yes exit=1412 a0=4 a1=805c570 a2=584 a3=bfa20a54 items=0 ppid=8135 pid=8137 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vpnc" exe="/usr/sbin/vpnc" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163774204.769:11596): path="/dev/net/tun" type=AVC msg=audit(1163774204.769:11597): avc: denied { read } for pid=8137 comm="vpnc" name="tun" dev=tmpfs ino=1473 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:tun_tap_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163774204.769:11597): arch=40000003 syscall=3 success=yes exit=52 a0=4 a1=805c5a0 a2=1000 a3=805c5a0 items=0 ppid=8135 pid=8137 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vpnc" exe="/usr/sbin/vpnc" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163774204.769:11597): path="/dev/net/tun" type=AVC msg=audit(1163774207.325:11598): avc: denied { write } for pid=8547 comm="python" name="xend-socket" dev=dm-0 ino=14567713 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xend_var_lib_t:s0 tclass=sock_file type=AVC msg=audit(1163774207.325:11598): avc: denied { connectto } for pid=8547 comm="python" name="xend-socket" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:xend_t:s0 tclass=unix_stream_socket type=SYSCALL msg=audit(1163774207.325:11598): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=bfcc5630 a2=91324c a3=89da860 items=0 ppid=8544 pid=8547 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="python" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163774207.325:11598): path="/var/lib/xend/xend-socket" type=AVC msg=audit(1163774207.333:11599): avc: denied { write } for pid=8547 comm="python" name="socket" dev=dm-0 ino=14534849 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xenstored_var_run_t:s0 tclass=sock_file type=AVC msg=audit(1163774207.333:11599): avc: denied { connectto } for pid=8547 comm="python" name="socket" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:xenstored_t:s0 tclass=unix_stream_socket type=SYSCALL msg=audit(1163774207.333:11599): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=bfcc6a10 a2=4c0590 a3=bfcc6a8a items=0 ppid=8544 pid=8547 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="python" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163774207.333:11599): path="/var/run/xenstored/socket" type=AVC msg=audit(1163774207.673:11600): avc: denied { read } for pid=8547 comm="python" name="resolv.conf" dev=dm-0 ino=9330239 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:net_conf_t:s0 tclass=file type=SYSCALL msg=audit(1163774207.673:11600): arch=40000003 syscall=5 success=yes exit=16 a0=c37093 a1=0 a2=1b6 a3=8a3d080 items=0 ppid=8544 pid=8547 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="python" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774211.105:11601): avc: denied { setuid } for pid=8547 comm="python" capability=7 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=capability type=SYSCALL msg=audit(1163774211.105:11601): arch=40000003 syscall=208 success=yes exit=0 a0=ffffffff a1=0 a2=ffffffff a3=bfcc740c items=0 ppid=8544 pid=8547 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="python" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774211.157:11602): avc: denied { read write } for pid=8552 comm="dbus-daemon" name="2" dev=devpts ino=4 scontext=staff_u:staff_r:staff_dbusd_t:s0 tcontext=staff_u:object_r:staff_devpts_t:s0 tclass=chr_file type=AVC msg=audit(1163774211.157:11602): avc: denied { write } for pid=8552 comm="dbus-daemon" name="virt-manager.log" dev=dm-0 ino=13127380 scontext=staff_u:staff_r:staff_dbusd_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=AVC msg=audit(1163774211.157:11602): avc: denied { read write } for pid=8552 comm="dbus-daemon" name="privcmd" dev=proc ino=-268433970 scontext=staff_u:staff_r:staff_dbusd_t:s0 tcontext=system_u:object_r:proc_xen_t:s0 tclass=file type=SYSCALL msg=audit(1163774211.157:11602): arch=40000003 syscall=11 success=yes exit=0 a0=804cc28 a1=bf9c48e8 a2=bf9c5fa8 a3=400 items=0 ppid=8551 pid=8552 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="dbus-daemon" exe="/bin/dbus-daemon" subj=staff_u:staff_r:staff_dbusd_t:s0 key=(null) type=AVC_PATH msg=audit(1163774211.157:11602): path="/proc/xen/privcmd" type=AVC_PATH msg=audit(1163774211.157:11602): path="/root/.virt-manager/virt-manager.log" type=AVC msg=audit(1163774211.217:11603): avc: denied { getattr } for pid=8552 comm="dbus-daemon" name="/" dev=dm-0 ino=2 scontext=staff_u:staff_r:staff_dbusd_t:s0 tcontext=system_u:object_r:fs_t:s0 tclass=filesystem type=SYSCALL msg=audit(1163774211.217:11603): arch=40000003 syscall=100 success=yes exit=0 a0=7 a1=bfccce5c a2=39cff4 a3=ffffffb8 items=0 ppid=8551 pid=8552 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="dbus-daemon" exe="/bin/dbus-daemon" subj=staff_u:staff_r:staff_dbusd_t:s0 key=(null) type=AVC msg=audit(1163774211.545:11604): avc: denied { search } for pid=8552 comm="dbus-daemon" name="root" dev=dm-0 ino=13127137 scontext=staff_u:staff_r:staff_dbusd_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=SYSCALL msg=audit(1163774211.545:11604): arch=40000003 syscall=5 success=no exit=-2 a0=9aee6b0 a1=18800 a2=9af0b80 a3=bfcccf98 items=0 ppid=8551 pid=8552 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="dbus-daemon" exe="/bin/dbus-daemon" subj=staff_u:staff_r:staff_dbusd_t:s0 key=(null) type=AVC msg=audit(1163774211.549:11605): avc: denied { write } for pid=8550 comm="dbus-launch" name="root" dev=dm-0 ino=13127137 scontext=staff_u:staff_r:staff_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1163774211.549:11605): avc: denied { add_name } for pid=8550 comm="dbus-launch" name=".dbus" scontext=staff_u:staff_r:staff_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1163774211.549:11605): avc: denied { create } for pid=8550 comm="dbus-launch" name=".dbus" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=dir type=SYSCALL msg=audit(1163774211.549:11605): arch=40000003 syscall=39 success=yes exit=0 a0=912d400 a1=1c0 a2=804e38c a3=912d400 items=0 ppid=8547 pid=8550 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="dbus-launch" exe="/usr/bin/dbus-launch" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774211.549:11606): avc: denied { add_name } for pid=8550 comm="dbus-launch" name="session-bus" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=dir type=SYSCALL msg=audit(1163774211.549:11606): arch=40000003 syscall=39 success=yes exit=0 a0=912d400 a1=1c0 a2=804e38c a3=912d400 items=0 ppid=8547 pid=8550 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="dbus-launch" exe="/usr/bin/dbus-launch" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774211.549:11607): avc: denied { create } for pid=8550 comm="dbus-launch" name="9dc35d453761bffef33db47122b61900-0" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163774211.549:11607): arch=40000003 syscall=5 success=yes exit=7 a0=912d420 a1=241 a2=1b6 a3=912d460 items=0 ppid=8547 pid=8550 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="dbus-launch" exe="/usr/bin/dbus-launch" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774211.669:11608): avc: denied { read write } for pid=8557 comm="gnome-vfs-daemo" name="[34416]" dev=sockfs ino=34416 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_dbusd_t:s0 tclass=netlink_selinux_socket type=SYSCALL msg=audit(1163774211.669:11608): arch=40000003 syscall=11 success=yes exit=0 a0=9af86f0 a1=9af8670 a2=9af86a8 a3=13 items=0 ppid=8556 pid=8557 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="gnome-vfs-daemo" exe="/usr/libexec/gnome-vfs-daemon" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163774211.669:11608): path="socket:[34416]" type=USER_AVC msg=audit(1163774211.833:11609): user pid=8554 uid=0 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.gnome.GnomeVFS.Daemon member=GetDrives dest=org.gnome.GnomeVFS.Daemon spid=8547 tpid=8557 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=0, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163774212.006:11610): user pid=8554 uid=0 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.0 spid=8557 tpid=8547 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=0, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163774212.006:11611): user pid=8554 uid=0 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.gnome.GnomeVFS.Daemon member=GetVolumes dest=org.gnome.GnomeVFS.Daemon spid=8547 tpid=8557 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=0, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163774212.006:11612): user pid=8554 uid=0 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.0 spid=8557 tpid=8547 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=0, hostname=?, addr=?, terminal=?)' type=AVC msg=audit(1163774212.210:11613): avc: denied { write } for pid=8547 comm="python" name="xend-socket" dev=dm-0 ino=14567713 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xend_var_lib_t:s0 tclass=sock_file type=SYSCALL msg=audit(1163774212.210:11613): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=bfcc61f0 a2=91324c a3=0 items=0 ppid=8544 pid=8547 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="python" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774212.642:11614): avc: denied { read } for pid=8561 comm="python" name=".mcoprc" dev=dm-0 ino=6574117 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:staff_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163774212.642:11614): arch=40000003 syscall=5 success=yes exit=20 a0=8a890e0 a1=8000 a2=1b6 a3=8a8aca0 items=0 ppid=8544 pid=8561 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="python" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774229.731:11615): avc: denied { remove_name } for pid=8547 comm="python" name="gtkfilechooser.B4AWIT" dev=dm-0 ino=13127392 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1163774229.731:11615): avc: denied { rename } for pid=8547 comm="python" name="gtkfilechooser.B4AWIT" dev=dm-0 ino=13127392 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163774229.731:11615): arch=40000003 syscall=38 success=yes exit=0 a0=8b2b8e8 a1=8b2b9d0 a2=412708 a3=b7f0f68c items=0 ppid=8544 pid=8547 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="python" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774229.763:11616): avc: denied { search } for pid=8569 comm="python" name="home" dev=dm-0 ino=6547201 scontext=system_u:system_r:xend_t:s0 tcontext=system_u:object_r:home_root_t:s0 tclass=dir type=AVC msg=audit(1163774229.763:11616): avc: denied { search } for pid=8569 comm="python" name="kmacmill" dev=dm-0 ino=6547202 scontext=system_u:system_r:xend_t:s0 tcontext=staff_u:object_r:staff_home_dir_t:s0 tclass=dir type=AVC msg=audit(1163774229.763:11616): avc: denied { search } for pid=8569 comm="python" name="vm" dev=dm-0 ino=9100619 scontext=system_u:system_r:xend_t:s0 tcontext=staff_u:object_r:staff_home_t:s0 tclass=dir type=AVC msg=audit(1163774229.763:11616): avc: denied { read } for pid=8569 comm="python" name="rawhide.state" dev=dm-0 ino=6547920 scontext=system_u:system_r:xend_t:s0 tcontext=staff_u:object_r:staff_home_t:s0 tclass=file type=SYSCALL msg=audit(1163774229.763:11616): arch=40000003 syscall=5 success=yes exit=21 a0=972fa48 a1=8000 a2=0 a3=8000 items=0 ppid=2735 pid=8569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="python" exe="/usr/bin/python" subj=system_u:system_r:xend_t:s0 key=(null) type=AVC msg=audit(1163774230.579:11617): avc: denied { search } for pid=8578 comm="block" name="xen" dev=dm-0 ino=14567524 scontext=system_u:system_r:udev_t:s0-s0:c0.c1023 tcontext=system_u:object_r:xend_var_log_t:s0 tclass=dir type=AVC msg=audit(1163774230.579:11617): avc: denied { write } for pid=8578 comm="block" name="xen" dev=dm-0 ino=14567524 scontext=system_u:system_r:udev_t:s0-s0:c0.c1023 tcontext=system_u:object_r:xend_var_log_t:s0 tclass=dir type=AVC msg=audit(1163774230.579:11617): avc: denied { add_name } for pid=8578 comm="block" name="xen-hotplug.log" scontext=system_u:system_r:udev_t:s0-s0:c0.c1023 tcontext=system_u:object_r:xend_var_log_t:s0 tclass=dir type=AVC msg=audit(1163774230.579:11617): avc: denied { create } for pid=8578 comm="block" name="xen-hotplug.log" scontext=system_u:system_r:udev_t:s0-s0:c0.c1023 tcontext=system_u:object_r:xend_var_log_t:s0 tclass=file type=AVC msg=audit(1163774230.583:11618): avc: denied { append } for pid=8580 comm="vif-bridge" name="xen-hotplug.log" dev=dm-0 ino=14567775 scontext=system_u:system_r:udev_t:s0-s0:c0.c1023 tcontext=system_u:object_r:xend_var_log_t:s0 tclass=file type=SYSCALL msg=audit(1163774230.579:11617): arch=40000003 syscall=5 success=yes exit=3 a0=9b54580 a1=8441 a2=1b6 a3=8441 items=0 ppid=8574 pid=8578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="block" exe="/bin/bash" subj=system_u:system_r:udev_t:s0-s0:c0.c1023 key=(null) type=SYSCALL msg=audit(1163774230.583:11618): arch=40000003 syscall=5 success=yes exit=3 a0=8940740 a1=8441 a2=1b6 a3=8441 items=0 ppid=8579 pid=8580 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vif-bridge" exe="/bin/bash" subj=system_u:system_r:udev_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163774230.891:11619): avc: denied { search } for pid=8631 comm="xenstore-read" name="xen" dev=proc ino=-268434186 scontext=system_u:system_r:udev_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_xen_t:s0 tclass=dir type=AVC msg=audit(1163774230.891:11620): avc: denied { search } for pid=8632 comm="xenstore-read" name="xen" dev=proc ino=-268434186 scontext=system_u:system_r:udev_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_xen_t:s0 tclass=dir type=AVC msg=audit(1163774230.891:11620): avc: denied { getattr } for pid=8632 comm="xenstore-read" name="xenbus" dev=proc ino=-268434183 scontext=system_u:system_r:udev_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_xen_t:s0 tclass=file type=SYSCALL msg=audit(1163774230.891:11620): arch=40000003 syscall=195 success=yes exit=0 a0=cc5d0c a1=bf88d36c a2=c4eff4 a3=bf88d36c items=0 ppid=8630 pid=8632 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="xenstore-read" exe="/usr/bin/xenstore-read" subj=system_u:system_r:udev_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163774230.891:11620): path="/proc/xen/xenbus" type=AVC msg=audit(1163774230.891:11621): avc: denied { read write } for pid=8632 comm="xenstore-read" name="xenbus" dev=proc ino=-268434183 scontext=system_u:system_r:udev_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_xen_t:s0 tclass=file type=SYSCALL msg=audit(1163774230.891:11621): arch=40000003 syscall=5 success=yes exit=3 a0=cc5d0c a1=2 a2=bf88d400 a3=cc5d0c items=0 ppid=8630 pid=8632 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="xenstore-read" exe="/usr/bin/xenstore-read" subj=system_u:system_r:udev_t:s0-s0:c0.c1023 key=(null) type=SYSCALL msg=audit(1163774230.891:11619): arch=40000003 syscall=195 success=yes exit=0 a0=cc5d0c a1=bfbd0efc a2=c4eff4 a3=bfbd0efc items=0 ppid=8629 pid=8631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="xenstore-read" exe="/usr/bin/xenstore-read" subj=system_u:system_r:udev_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163774230.967:11622): avc: denied { getattr } for pid=8646 comm="readlink" name="home" dev=dm-0 ino=6547201 scontext=system_u:system_r:udev_t:s0-s0:c0.c1023 tcontext=system_u:object_r:home_root_t:s0 tclass=dir type=SYSCALL msg=audit(1163774230.967:11622): arch=40000003 syscall=196 success=yes exit=0 a0=9fd9038 a1=bfdc09e0 a2=c4eff4 a3=bfdc09e0 items=0 ppid=8578 pid=8646 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="readlink" exe="/usr/bin/readlink" subj=system_u:system_r:udev_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163774230.967:11622): path="/home" type=AVC msg=audit(1163774230.967:11623): avc: denied { search } for pid=8646 comm="readlink" name="home" dev=dm-0 ino=6547201 scontext=system_u:system_r:udev_t:s0-s0:c0.c1023 tcontext=system_u:object_r:home_root_t:s0 tclass=dir type=SYSCALL msg=audit(1163774230.967:11623): arch=40000003 syscall=196 success=yes exit=0 a0=9fd9038 a1=bfdc09e0 a2=c4eff4 a3=bfdc09e0 items=0 ppid=8578 pid=8646 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="readlink" exe="/usr/bin/readlink" subj=system_u:system_r:udev_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163774231.155:11624): avc: denied { read } for pid=8658 comm="brctl" name="net" dev=proc ino=-268435432 scontext=system_u:system_r:udev_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=dir type=SYSCALL msg=audit(1163774231.155:11624): arch=40000003 syscall=33 success=yes exit=0 a0=c36d7e a1=4 a2=c4eff4 a3=c33980 items=0 ppid=8580 pid=8658 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="brctl" exe="/usr/sbin/brctl" subj=system_u:system_r:udev_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163774231.155:11625): avc: denied { search } for pid=8658 comm="brctl" name="net" dev=proc ino=-268435432 scontext=system_u:system_r:udev_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=dir type=AVC msg=audit(1163774231.155:11625): avc: denied { read } for pid=8658 comm="brctl" name="unix" dev=proc ino=-268433932 scontext=system_u:system_r:udev_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=file type=SYSCALL msg=audit(1163774231.155:11625): arch=40000003 syscall=33 success=yes exit=0 a0=bff71b13 a1=4 a2=c4eff4 a3=c33980 items=0 ppid=8580 pid=8658 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="brctl" exe="/usr/sbin/brctl" subj=system_u:system_r:udev_t:s0-s0:c0.c1023 key=(null) type=ANOM_PROMISCUOUS msg=audit(1163774231.155:11626): dev=vif1.0 prom=256 old_prom=0 auid=4294967295 type=SYSCALL msg=audit(1163774231.155:11626): arch=40000003 syscall=54 success=yes exit=0 a0=3 a1=89a2 a2=bff71bb0 a3=1 items=0 ppid=8580 pid=8658 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="brctl" exe="/usr/sbin/brctl" subj=system_u:system_r:udev_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163774231.159:11627): avc: denied { getattr } for pid=8580 comm="vif-bridge" name="iptables" dev=dm-0 ino=9984709 scontext=system_u:system_r:udev_t:s0-s0:c0.c1023 tcontext=system_u:object_r:iptables_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163774231.159:11627): arch=40000003 syscall=195 success=yes exit=0 a0=893e740 a1=bf907eb0 a2=c4eff4 a3=893e740 items=0 ppid=8579 pid=8580 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vif-bridge" exe="/bin/bash" subj=system_u:system_r:udev_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163774231.159:11627): path="/sbin/iptables" type=AVC msg=audit(1163774231.179:11628): avc: denied { execute } for pid=8580 comm="vif-bridge" name="iptables" dev=dm-0 ino=9984709 scontext=system_u:system_r:udev_t:s0-s0:c0.c1023 tcontext=system_u:object_r:iptables_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163774231.179:11628): arch=40000003 syscall=33 success=yes exit=0 a0=893e740 a1=1 a2=11 a3=893e740 items=0 ppid=8579 pid=8580 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vif-bridge" exe="/bin/bash" subj=system_u:system_r:udev_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163774231.183:11629): avc: denied { read } for pid=8580 comm="vif-bridge" name="iptables" dev=dm-0 ino=9984709 scontext=system_u:system_r:udev_t:s0-s0:c0.c1023 tcontext=system_u:object_r:iptables_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163774231.183:11629): arch=40000003 syscall=33 success=yes exit=0 a0=893e740 a1=4 a2=ffffffff a3=893e740 items=0 ppid=8579 pid=8580 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vif-bridge" exe="/bin/bash" subj=system_u:system_r:udev_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163774231.183:11630): avc: denied { execute_no_trans } for pid=8660 comm="vif-bridge" name="iptables" dev=dm-0 ino=9984709 scontext=system_u:system_r:udev_t:s0-s0:c0.c1023 tcontext=system_u:object_r:iptables_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163774231.183:11630): arch=40000003 syscall=11 success=yes exit=0 a0=893e740 a1=89448c8 a2=8945318 a3=893e0a0 items=0 ppid=8580 pid=8660 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="iptables" exe="/sbin/iptables" subj=system_u:system_r:udev_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163774231.183:11630): path="/sbin/iptables" type=AVC msg=audit(1163774233.527:11631): avc: denied { write } for pid=8549 comm="gconfd-2" name=".gconfd" dev=dm-0 ino=13127148 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:user_home_t:s0 tclass=dir type=AVC msg=audit(1163774233.527:11631): avc: denied { add_name } for pid=8549 comm="gconfd-2" name="saved_state.tmp" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:user_home_t:s0 tclass=dir type=AVC msg=audit(1163774233.527:11631): avc: denied { create } for pid=8549 comm="gconfd-2" name="saved_state.tmp" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:user_home_t:s0 tclass=file type=SYSCALL msg=audit(1163774233.527:11631): arch=40000003 syscall=5 success=yes exit=15 a0=9824658 a1=241 a2=1c0 a3=9648330 items=0 ppid=1 pid=8549 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774233.647:11632): avc: denied { write } for pid=8549 comm="gconfd-2" name="saved_state.tmp" dev=dm-0 ino=13127393 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:user_home_t:s0 tclass=file type=SYSCALL msg=audit(1163774233.647:11632): arch=40000003 syscall=4 success=yes exit=2546 a0=f a1=982ab28 a2=9f2 a3=9648330 items=0 ppid=1 pid=8549 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163774233.647:11632): path="/root/.gconfd/saved_state.tmp" type=AVC msg=audit(1163774233.647:11633): avc: denied { remove_name } for pid=8549 comm="gconfd-2" name="saved_state" dev=dm-0 ino=13127383 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:user_home_t:s0 tclass=dir type=AVC msg=audit(1163774233.647:11633): avc: denied { rename } for pid=8549 comm="gconfd-2" name="saved_state" dev=dm-0 ino=13127383 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:user_home_t:s0 tclass=file type=SYSCALL msg=audit(1163774233.647:11633): arch=40000003 syscall=38 success=yes exit=0 a0=964b2a0 a1=98298e8 a2=0 a3=9648330 items=0 ppid=1 pid=8549 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774233.647:11634): avc: denied { unlink } for pid=8549 comm="gconfd-2" name="saved_state.orig" dev=dm-0 ino=13127383 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:user_home_t:s0 tclass=file type=SYSCALL msg=audit(1163774233.647:11634): arch=40000003 syscall=10 success=yes exit=0 a0=98298e8 a1=964b2a0 a2=412708 a3=9648330 items=0 ppid=1 pid=8549 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=staff_u:staff_r:staff_t:s0 key=(null) type=ANOM_PROMISCUOUS msg=audit(1163774238.875:11635): dev=vif1.0 prom=0 old_prom=256 auid=4294967295 type=AVC msg=audit(1163774239.051:11636): avc: denied { connectto } for pid=8547 comm="python" name="xend-socket" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:xend_t:s0 tclass=unix_stream_socket type=SYSCALL msg=audit(1163774239.051:11636): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=bfcc6020 a2=91324c a3=0 items=0 ppid=8544 pid=8547 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="python" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163774239.051:11636): path="/var/lib/xend/xend-socket" type=AVC msg=audit(1163774239.519:11637): avc: denied { sys_module } for pid=8734 comm="brctl" capability=16 scontext=system_u:system_r:udev_t:s0-s0:c0.c1023 tcontext=system_u:system_r:udev_t:s0-s0:c0.c1023 tclass=capability type=SYSCALL msg=audit(1163774239.519:11637): arch=40000003 syscall=54 success=no exit=-19 a0=4 a1=8933 a2=bfd1a0ec a3=bfd1a0ec items=0 ppid=8673 pid=8734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="brctl" exe="/usr/sbin/brctl" subj=system_u:system_r:udev_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163774239.803:11638): avc: denied { create } for pid=8757 comm="mkdir" name="block" scontext=system_u:system_r:udev_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_run_t:s0 tclass=dir type=SYSCALL msg=audit(1163774239.803:11638): arch=40000003 syscall=39 success=yes exit=0 a0=bf89be9f a1=1ff a2=804f258 a3=bf89be9f items=0 ppid=8742 pid=8757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="mkdir" exe="/bin/mkdir" subj=system_u:system_r:udev_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163774240.011:11639): avc: denied { rmdir } for pid=8788 comm="rm" name="block" dev=dm-0 ino=14567776 scontext=system_u:system_r:udev_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_run_t:s0 tclass=dir type=SYSCALL msg=audit(1163774240.011:11639): arch=40000003 syscall=40 success=yes exit=0 a0=9d30140 a1=bff8b474 a2=805277c a3=2 items=0 ppid=8742 pid=8788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="rm" exe="/bin/rm" subj=system_u:system_r:udev_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163774258.076:11640): avc: denied { read } for pid=8547 comm="python" name="gtkfilechooser" dev=dm-0 ino=13127392 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163774258.076:11640): arch=40000003 syscall=5 success=yes exit=20 a0=8b4b3c0 a1=8000 a2=0 a3=8000 items=0 ppid=8544 pid=8547 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="python" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774259.836:11641): avc: denied { write } for pid=8547 comm="python" name="gtk-2.0" dev=dm-0 ino=13127391 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1163774259.836:11641): avc: denied { add_name } for pid=8547 comm="python" name="gtkfilechooser.3C2NIT" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1163774259.836:11641): avc: denied { create } for pid=8547 comm="python" name="gtkfilechooser.3C2NIT" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163774259.836:11641): arch=40000003 syscall=5 success=yes exit=20 a0=8a72740 a1=80c2 a2=1b6 a3=80c2 items=0 ppid=8544 pid=8547 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="python" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774259.836:11642): avc: denied { write } for pid=8547 comm="python" name="gtkfilechooser.3C2NIT" dev=dm-0 ino=13127383 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163774259.836:11642): arch=40000003 syscall=4 success=yes exit=96 a0=14 a1=b7f2f000 a2=60 a3=60 items=0 ppid=8544 pid=8547 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="python" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163774259.836:11642): path="/root/.config/gtk-2.0/gtkfilechooser.3C2NIT" type=AVC msg=audit(1163774259.836:11643): avc: denied { remove_name } for pid=8547 comm="python" name="gtkfilechooser.3C2NIT" dev=dm-0 ino=13127383 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1163774259.836:11643): avc: denied { rename } for pid=8547 comm="python" name="gtkfilechooser.3C2NIT" dev=dm-0 ino=13127383 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=AVC msg=audit(1163774259.836:11643): avc: denied { unlink } for pid=8547 comm="python" name="gtkfilechooser" dev=dm-0 ino=13127392 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163774259.836:11643): arch=40000003 syscall=38 success=yes exit=0 a0=8a72b08 a1=8a72ac0 a2=412708 a3=b7f0f68c items=0 ppid=8544 pid=8547 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="python" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774295.471:11644): avc: denied { getattr } for pid=8368 comm="thunderbird-bin" name="necko_file.xpt" dev=dm-0 ino=10737989 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1163774295.471:11644): arch=40000003 syscall=195 success=yes exit=0 a0=a9831b8 a1=bfae6ce8 a2=c4eff4 a3=bfae6ce8 items=0 ppid=8363 pid=8368 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird-bin" exe="/usr/lib/thunderbird-1.5.0.7/thunderbird-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC_PATH msg=audit(1163774295.471:11644): path="/usr/lib/thunderbird-1.5.0.7/components/necko_file.xpt" type=AVC msg=audit(1163774295.511:11645): avc: denied { read } for pid=8368 comm="thunderbird-bin" name="necko_file.xpt" dev=dm-0 ino=10737989 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1163774295.511:11645): arch=40000003 syscall=5 success=yes exit=41 a0=a9831b8 a1=8000 a2=0 a3=8000 items=0 ppid=8363 pid=8368 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird-bin" exe="/usr/lib/thunderbird-1.5.0.7/thunderbird-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC msg=audit(1163774296.723:11646): avc: denied { getattr } for pid=8368 comm="thunderbird-bin" name="localtime" dev=dm-0 ino=5466955 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1163774296.723:11646): arch=40000003 syscall=195 success=yes exit=0 a0=c36800 a1=bfae855c a2=c4eff4 a3=0 items=0 ppid=8363 pid=8368 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird-bin" exe="/usr/lib/thunderbird-1.5.0.7/thunderbird-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC_PATH msg=audit(1163774296.723:11646): path="/etc/localtime" type=AVC msg=audit(1163774327.793:11647): avc: denied { write } for pid=8549 comm="gconfd-2" name="apps" dev=dm-0 ino=13127161 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:user_home_t:s0 tclass=dir type=AVC msg=audit(1163774327.793:11647): avc: denied { add_name } for pid=8549 comm="gconfd-2" name="virt-manager" scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:user_home_t:s0 tclass=dir type=AVC msg=audit(1163774327.793:11647): avc: denied { create } for pid=8549 comm="gconfd-2" name="virt-manager" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:user_home_t:s0 tclass=dir type=SYSCALL msg=audit(1163774327.793:11647): arch=40000003 syscall=39 success=yes exit=0 a0=9829a88 a1=1c0 a2=879820 a3=964b2a0 items=0 ppid=1 pid=8549 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774327.813:11648): avc: denied { write } for pid=8549 comm="gconfd-2" name="virt-manager" dev=dm-0 ino=13127392 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:user_home_t:s0 tclass=dir type=AVC msg=audit(1163774327.813:11648): avc: denied { add_name } for pid=8549 comm="gconfd-2" name="%gconf.xml.new" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:user_home_t:s0 tclass=dir type=SYSCALL msg=audit(1163774327.813:11648): arch=40000003 syscall=5 success=yes exit=15 a0=9826048 a1=41 a2=180 a3=964b2a0 items=0 ppid=1 pid=8549 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774327.813:11649): avc: denied { remove_name } for pid=8549 comm="gconfd-2" name="%gconf.xml.new" dev=dm-0 ino=13127394 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:user_home_t:s0 tclass=dir type=SYSCALL msg=audit(1163774327.813:11649): arch=40000003 syscall=38 success=yes exit=0 a0=9826048 a1=9829300 a2=879820 a3=0 items=0 ppid=1 pid=8549 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=staff_u:staff_r:staff_t:s0 key=(null) type=USER_ACCT msg=audit(1163774401.437:11650): user pid=8807 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1163774401.437:11651): login pid=8807 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1163774401.477:11652): user pid=8807 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1163774401.477:11653): user pid=8807 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1163774401.501:11654): avc: denied { execute } for pid=8808 comm="sh" name="sa1" dev=dm-0 ino=13061698 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:lib_t:s0 tclass=file type=AVC msg=audit(1163774401.501:11654): avc: denied { execute_no_trans } for pid=8808 comm="sh" name="sa1" dev=dm-0 ino=13061698 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1163774401.501:11654): arch=40000003 syscall=11 success=yes exit=0 a0=a0661b0 a1=a066358 a2=a066290 a3=a066008 items=0 ppid=8807 pid=8808 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sa1" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163774401.501:11654): path="/usr/lib/sa/sa1" type=AVC msg=audit(1163774401.557:11655): avc: denied { execute } for pid=8808 comm="sa1" name="sadc" dev=dm-0 ino=11981401 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=AVC msg=audit(1163774401.557:11655): avc: denied { execute_no_trans } for pid=8808 comm="sa1" name="sadc" dev=dm-0 ino=11981401 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=AVC msg=audit(1163774401.557:11655): avc: denied { read } for pid=8808 comm="sa1" name="sadc" dev=dm-0 ino=11981401 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163774401.557:11655): arch=40000003 syscall=11 success=yes exit=0 a0=972bd48 a1=972b740 a2=972bd60 a3=972b740 items=0 ppid=8807 pid=8808 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163774401.557:11655): path="/usr/lib/sa/sadc" type=AVC_PATH msg=audit(1163774401.557:11655): path="/usr/lib/sa/sadc" type=AVC msg=audit(1163774401.605:11656): avc: denied { search } for pid=8808 comm="sadc" name="net" dev=proc ino=-268435432 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=dir type=AVC msg=audit(1163774401.605:11656): avc: denied { read } for pid=8808 comm="sadc" name="dev" dev=proc ino=-268434164 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=file type=SYSCALL msg=audit(1163774401.605:11656): arch=40000003 syscall=5 success=yes exit=3 a0=8050371 a1=0 a2=1b6 a3=84397f8 items=0 ppid=8807 pid=8808 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163774401.605:11657): avc: denied { getattr } for pid=8808 comm="sadc" name="dev" dev=proc ino=-268434164 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=file type=SYSCALL msg=audit(1163774401.605:11657): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bff58088 a2=24bff4 a3=84397f8 items=0 ppid=8807 pid=8808 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163774401.605:11657): path="/proc/net/dev" type=AVC msg=audit(1163774401.605:11658): avc: denied { search } for pid=8808 comm="sadc" name="sa" dev=dm-0 ino=14607631 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=dir type=SYSCALL msg=audit(1163774401.605:11658): arch=40000003 syscall=33 success=yes exit=0 a0=bff58434 a1=0 a2=bff58328 a3=bff58330 items=0 ppid=8807 pid=8808 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163774401.653:11659): avc: denied { read append } for pid=8808 comm="sadc" name="sa17" dev=dm-0 ino=14600257 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=file type=SYSCALL msg=audit(1163774401.653:11659): arch=40000003 syscall=5 success=yes exit=3 a0=bff58434 a1=402 a2=bff585f8 a3=bff58330 items=0 ppid=8807 pid=8808 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163774401.661:11660): avc: denied { search } for pid=8808 comm="sadc" name="fs" dev=proc ino=-268435428 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=dir type=AVC msg=audit(1163774401.661:11660): avc: denied { read } for pid=8808 comm="sadc" name="dentry-state" dev=proc ino=-268435230 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=file type=SYSCALL msg=audit(1163774401.661:11660): arch=40000003 syscall=5 success=yes exit=4 a0=805037f a1=0 a2=1b6 a3=843a2f8 items=0 ppid=8807 pid=8808 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163774401.661:11661): avc: denied { getattr } for pid=8808 comm="sadc" name="dentry-state" dev=proc ino=-268435230 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=file type=SYSCALL msg=audit(1163774401.661:11661): arch=40000003 syscall=197 success=yes exit=0 a0=4 a1=bff57ee0 a2=24bff4 a3=843a2f8 items=0 ppid=8807 pid=8808 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163774401.661:11661): path="/proc/sys/fs/dentry-state" type=AVC msg=audit(1163774401.661:11662): avc: denied { search } for pid=8808 comm="sadc" name="rpc" dev=proc ino=-268433616 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_rpc_t:s0 tclass=dir type=SYSCALL msg=audit(1163774401.661:11662): arch=40000003 syscall=5 success=no exit=-2 a0=80502a5 a1=0 a2=1b6 a3=843a2f8 items=0 ppid=8807 pid=8808 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163774401.661:11663): avc: denied { lock } for pid=8808 comm="sadc" name="sa17" dev=dm-0 ino=14600257 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=file type=SYSCALL msg=audit(1163774401.661:11663): arch=40000003 syscall=143 success=yes exit=0 a0=3 a1=6 a2=bff58330 a3=3 items=0 ppid=8807 pid=8808 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163774401.661:11663): path="/var/log/sa/sa17" type=CRED_DISP msg=audit(1163774401.761:11664): user pid=8807 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1163774401.761:11665): user pid=8807 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1163774538.766:11666): avc: denied { write } for pid=8303 comm="yum" name="packages" dev=dm-0 ino=15288142 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:var_t:s0 tclass=dir type=AVC msg=audit(1163774538.766:11666): avc: denied { add_name } for pid=8303 comm="yum" name="openssh-clients-4.3p2-12.fc7.i386.rpm" scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:var_t:s0 tclass=dir type=SYSCALL msg=audit(1163774538.766:11666): arch=40000003 syscall=5 success=yes exit=10 a0=c675da8 a1=8241 a2=1b6 a3=8ecbc20 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774644.333:11667): avc: denied { ipc_lock } for pid=8547 comm="python" capability=14 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=capability type=SYSCALL msg=audit(1163774644.333:11667): arch=40000003 syscall=150 success=yes exit=0 a0=8c60e18 a1=84d0 a2=91324c a3=1f4 items=0 ppid=8544 pid=8547 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="python" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774670.742:11668): avc: denied { dac_override } for pid=8303 comm="yum" capability=1 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=capability type=SYSCALL msg=audit(1163774670.742:11668): arch=40000003 syscall=33 success=yes exit=0 a0=de62ed8 a1=2 a2=488b44 a3=0 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774685.187:11669): avc: denied { read } for pid=8303 comm="yum" name="dhcpd.conf" dev=dm-0 ino=9331955 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:dhcp_etc_t:s0 tclass=file type=SYSCALL msg=audit(1163774685.187:11669): arch=40000003 syscall=5 success=yes exit=15 a0=de7e588 a1=8000 a2=0 a3=8000 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774685.315:11670): avc: denied { read } for pid=8303 comm="yum" name="dhcpd" dev=dm-0 ino=9331480 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163774685.315:11670): arch=40000003 syscall=5 success=yes exit=15 a0=de7e588 a1=8000 a2=0 a3=8000 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774685.379:11671): avc: denied { read } for pid=8303 comm="yum" name="dhcpd.leases" dev=dm-0 ino=14600286 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:dhcpd_state_t:s0 tclass=file type=SYSCALL msg=audit(1163774685.379:11671): arch=40000003 syscall=5 success=yes exit=15 a0=de7e588 a1=8000 a2=0 a3=8000 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774685.567:11672): avc: denied { read } for pid=8303 comm="yum" name="session.conf" dev=dm-0 ino=9330291 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:dbusd_etc_t:s0 tclass=file type=SYSCALL msg=audit(1163774685.567:11672): arch=40000003 syscall=5 success=yes exit=15 a0=de7e730 a1=8000 a2=0 a3=8000 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774712.025:11673): avc: denied { read } for pid=8303 comm="yum" name="yumex" dev=dm-0 ino=9331890 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:userhelper_conf_t:s0 tclass=file type=SYSCALL msg=audit(1163774712.025:11673): arch=40000003 syscall=5 success=yes exit=15 a0=dea5638 a1=8000 a2=0 a3=8000 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774751.795:11674): avc: denied { read } for pid=8303 comm="yum" name="sysstat" dev=dm-0 ino=9330372 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:system_cron_spool_t:s0 tclass=file type=SYSCALL msg=audit(1163774751.795:11674): arch=40000003 syscall=5 success=yes exit=15 a0=de7bd10 a1=8000 a2=0 a3=8000 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774761.820:11675): avc: denied { read } for pid=8303 comm="yum" name="proxy_ajp.conf" dev=dm-0 ino=9330410 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:httpd_config_t:s0 tclass=file type=SYSCALL msg=audit(1163774761.820:11675): arch=40000003 syscall=5 success=yes exit=15 a0=de87b00 a1=8000 a2=0 a3=8000 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774761.904:11676): avc: denied { read } for pid=8303 comm="yum" name="HTTP_BAD_GATEWAY.html.var" dev=dm-0 ino=14437217 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:httpd_sys_content_t:s0 tclass=file type=SYSCALL msg=audit(1163774761.904:11676): arch=40000003 syscall=5 success=yes exit=15 a0=de87b00 a1=8000 a2=0 a3=8000 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774762.652:11677): avc: denied { read } for pid=8303 comm="yum" name="auto.master" dev=dm-0 ino=9331354 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:automount_etc_t:s0 tclass=file type=SYSCALL msg=audit(1163774762.652:11677): arch=40000003 syscall=5 success=yes exit=15 a0=debb1f8 a1=8000 a2=0 a3=8000 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774767.344:11678): avc: denied { read } for pid=8303 comm="yum" name="lvm.conf" dev=dm-0 ino=9331271 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lvm_etc_t:s0 tclass=file type=SYSCALL msg=audit(1163774767.344:11678): arch=40000003 syscall=5 success=yes exit=15 a0=deb6488 a1=8000 a2=0 a3=8000 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774767.860:11679): avc: denied { read } for pid=8303 comm="yum" name="etab" dev=dm-0 ino=14438235 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:var_lib_nfs_t:s0 tclass=file type=SYSCALL msg=audit(1163774767.860:11679): arch=40000003 syscall=5 success=yes exit=15 a0=dea4970 a1=8000 a2=0 a3=8000 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774774.257:11680): avc: denied { read } for pid=8303 comm="yum" name="glines.Large.scores" dev=dm-0 ino=14436943 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:games_data_t:s0 tclass=file type=SYSCALL msg=audit(1163774774.257:11680): arch=40000003 syscall=5 success=yes exit=15 a0=de88c98 a1=8000 a2=0 a3=8000 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774774.941:11681): avc: denied { read } for pid=8303 comm="yum" name="ioptions" dev=dm-0 ino=9331000 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:pppd_etc_rw_t:s0 tclass=file type=SYSCALL msg=audit(1163774774.941:11681): arch=40000003 syscall=5 success=yes exit=15 a0=de870d8 a1=8000 a2=0 a3=8000 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774776.045:11682): avc: denied { read } for pid=8303 comm="yum" name="adjtime" dev=dm-0 ino=9330626 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:adjtime_t:s0 tclass=file type=SYSCALL msg=audit(1163774776.045:11682): arch=40000003 syscall=5 success=yes exit=15 a0=deb6280 a1=8000 a2=0 a3=8000 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774776.073:11683): avc: denied { read } for pid=8303 comm="yum" name="ip-down" dev=dm-0 ino=9331766 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:pppd_script_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163774776.073:11683): arch=40000003 syscall=5 success=yes exit=15 a0=deb6280 a1=8000 a2=0 a3=8000 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774786.425:11684): avc: denied { read } for pid=8303 comm="yum" name="aliases" dev=dm-0 ino=9329982 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_aliases_t:s0 tclass=file type=SYSCALL msg=audit(1163774786.425:11684): arch=40000003 syscall=5 success=yes exit=15 a0=de7f900 a1=8000 a2=0 a3=8000 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774786.441:11685): avc: denied { read } for pid=8303 comm="yum" name="exports" dev=dm-0 ino=9329773 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:exports_t:s0 tclass=file type=SYSCALL msg=audit(1163774786.441:11685): arch=40000003 syscall=5 success=yes exit=15 a0=de7f900 a1=8000 a2=0 a3=8000 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774851.769:11686): avc: denied { search } for pid=8544 comm="userhelper" name="root" dev=dm-0 ino=13127137 scontext=staff_u:staff_r:staff_userhelper_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1163774851.769:11686): avc: denied { write } for pid=8544 comm="userhelper" name="root" dev=dm-0 ino=13127137 scontext=staff_u:staff_r:staff_userhelper_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1163774851.769:11686): avc: denied { remove_name } for pid=8544 comm="userhelper" name=".xauthTAYBaF" dev=dm-0 ino=13127388 scontext=staff_u:staff_r:staff_userhelper_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1163774851.769:11686): avc: denied { unlink } for pid=8544 comm="userhelper" name=".xauthTAYBaF" dev=dm-0 ino=13127388 scontext=staff_u:staff_r:staff_userhelper_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163774851.769:11686): arch=40000003 syscall=10 success=yes exit=0 a0=90929d8 a1=90965ee a2=31dbc8 a3=9095bf8 items=0 ppid=8543 pid=8544 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="userhelper" exe="/usr/sbin/userhelper" subj=staff_u:staff_r:staff_userhelper_t:s0 key=(null) type=USER_END msg=audit(1163774851.805:11687): user pid=8544 uid=0 auid=500 subj=staff_u:staff_r:staff_userhelper_t:s0 msg='PAM: session close acct=root : exe="/usr/sbin/userhelper" (hostname=?, addr=?, terminal=? res=success)' type=AVC msg=audit(1163774861.786:11688): avc: denied { write } for pid=8303 comm="yum" name="lib" dev=dm-0 ino=13716385 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=dir type=AVC msg=audit(1163774861.786:11688): avc: denied { add_name } for pid=8303 comm="yum" name="libgcc_s-4.1.1-20061116.so.1;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=dir type=AVC msg=audit(1163774861.786:11688): avc: denied { create } for pid=8303 comm="yum" name="libgcc_s-4.1.1-20061116.so.1;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1163774861.786:11688): arch=40000003 syscall=5 success=yes exit=18 a0=deb2050 a1=8241 a2=1b6 a3=8241 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774861.810:11689): avc: denied { write } for pid=8303 comm="yum" name="libgcc_s-4.1.1-20061116.so.1;455dcb57" dev=dm-0 ino=13716392 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1163774861.810:11689): arch=40000003 syscall=4 success=yes exit=40960 a0=12 a1=e919f68 a2=a000 a3=e8f92b8 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163774861.810:11689): path="/lib/libgcc_s-4.1.1-20061116.so.1;455dcb57" type=AVC msg=audit(1163774861.818:11690): avc: denied { remove_name } for pid=8303 comm="yum" name="libgcc_s-4.1.1-20061116.so.1;455dcb57" dev=dm-0 ino=13716392 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=dir type=AVC msg=audit(1163774861.818:11690): avc: denied { rename } for pid=8303 comm="yum" name="libgcc_s-4.1.1-20061116.so.1;455dcb57" dev=dm-0 ino=13716392 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1163774861.818:11690): arch=40000003 syscall=38 success=yes exit=0 a0=deb2050 a1=b843910 a2=d2a040 a3=deb2050 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774861.830:11691): avc: denied { relabelfrom } for pid=8303 comm="yum" name="libgcc_s-4.1.1-20061116.so.1" dev=dm-0 ino=13716392 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:lib_t:s0 tclass=file type=AVC msg=audit(1163774861.830:11691): avc: denied { relabelto } for pid=8303 comm="yum" name="libgcc_s-4.1.1-20061116.so.1" dev=dm-0 ino=13716392 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:shlib_t:s0 tclass=file type=SYSCALL msg=audit(1163774861.830:11691): arch=40000003 syscall=227 success=yes exit=0 a0=b843910 a1=a2f0d3 a2=e84a0f8 a3=1d items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774861.830:11692): avc: denied { setattr } for pid=8303 comm="yum" name="libgcc_s-4.1.1-20061116.so.1" dev=dm-0 ino=13716392 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:shlib_t:s0 tclass=file type=SYSCALL msg=audit(1163774861.830:11692): arch=40000003 syscall=212 success=yes exit=0 a0=b843910 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774861.830:11693): avc: denied { create } for pid=8303 comm="yum" name="libgcc_s.so.1;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:lib_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163774861.830:11693): arch=40000003 syscall=83 success=yes exit=0 a0=e919f68 a1=e6c5990 a2=508a38 a3=602c items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774861.830:11694): avc: denied { rename } for pid=8303 comm="yum" name="libgcc_s.so.1;455dcb57" dev=dm-0 ino=13716398 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:lib_t:s0 tclass=lnk_file type=AVC msg=audit(1163774861.830:11694): avc: denied { unlink } for pid=8303 comm="yum" name="libgcc_s.so.1" dev=dm-0 ino=13717262 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163774861.830:11694): arch=40000003 syscall=38 success=yes exit=0 a0=e6c5990 a1=e850608 a2=d2a040 a3=e6c5990 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774861.850:11695): avc: denied { relabelfrom } for pid=8303 comm="yum" name="libgcc_s.so.1" dev=dm-0 ino=13716398 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:lib_t:s0 tclass=lnk_file type=AVC msg=audit(1163774861.850:11695): avc: denied { relabelto } for pid=8303 comm="yum" name="libgcc_s.so.1" dev=dm-0 ino=13716398 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163774861.850:11695): arch=40000003 syscall=227 success=yes exit=0 a0=e850608 a1=a2f0d3 a2=e6c5948 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774861.850:11696): avc: denied { setattr } for pid=8303 comm="yum" name="libgcc_s.so.1" dev=dm-0 ino=13716398 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163774861.850:11696): arch=40000003 syscall=198 success=yes exit=0 a0=e850608 a1=0 a2=0 a3=e8fd684 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774861.850:11697): avc: denied { write } for pid=8303 comm="yum" name="sbin" dev=dm-0 ino=10311842 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:sbin_t:s0 tclass=dir type=AVC msg=audit(1163774861.850:11697): avc: denied { add_name } for pid=8303 comm="yum" name="libgcc_post_upgrade;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:sbin_t:s0 tclass=dir type=AVC msg=audit(1163774861.850:11697): avc: denied { create } for pid=8303 comm="yum" name="libgcc_post_upgrade;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:sbin_t:s0 tclass=file type=SYSCALL msg=audit(1163774861.850:11697): arch=40000003 syscall=5 success=yes exit=18 a0=e85bde8 a1=8241 a2=1b6 a3=8241 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774861.890:11698): avc: denied { write } for pid=8303 comm="yum" name="libgcc_post_upgrade;455dcb57" dev=dm-0 ino=10324310 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:sbin_t:s0 tclass=file type=SYSCALL msg=audit(1163774861.890:11698): arch=40000003 syscall=4 success=yes exit=1508 a0=12 a1=b6f50000 a2=5e4 a3=e85be18 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163774861.890:11698): path="/usr/sbin/libgcc_post_upgrade;455dcb57" type=AVC msg=audit(1163774861.890:11699): avc: denied { remove_name } for pid=8303 comm="yum" name="libgcc_post_upgrade;455dcb57" dev=dm-0 ino=10324310 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:sbin_t:s0 tclass=dir type=AVC msg=audit(1163774861.890:11699): avc: denied { rename } for pid=8303 comm="yum" name="libgcc_post_upgrade;455dcb57" dev=dm-0 ino=10324310 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:sbin_t:s0 tclass=file type=AVC msg=audit(1163774861.890:11699): avc: denied { unlink } for pid=8303 comm="yum" name="libgcc_post_upgrade" dev=dm-0 ino=10316014 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:sbin_t:s0 tclass=file type=SYSCALL msg=audit(1163774861.890:11699): arch=40000003 syscall=38 success=yes exit=0 a0=e85bde8 a1=e6c5968 a2=d2a040 a3=e85bde8 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774861.922:11700): avc: denied { relabelfrom } for pid=8303 comm="yum" name="libgcc_post_upgrade" dev=dm-0 ino=10324310 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:sbin_t:s0 tclass=file type=AVC msg=audit(1163774861.922:11700): avc: denied { relabelto } for pid=8303 comm="yum" name="libgcc_post_upgrade" dev=dm-0 ino=10324310 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:sbin_t:s0 tclass=file type=SYSCALL msg=audit(1163774861.922:11700): arch=40000003 syscall=227 success=yes exit=0 a0=e6c5968 a1=a2f0d3 a2=e85bdc8 a3=1c items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774861.922:11701): avc: denied { setattr } for pid=8303 comm="yum" name="libgcc_post_upgrade" dev=dm-0 ino=10324310 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:sbin_t:s0 tclass=file type=SYSCALL msg=audit(1163774861.922:11701): arch=40000003 syscall=212 success=yes exit=0 a0=e6c5968 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774861.926:11702): avc: denied { relabelfrom } for pid=8303 comm="yum" name="libgcc-4.1.1" dev=dm-0 ino=10608329 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=dir type=AVC msg=audit(1163774861.926:11702): avc: denied { relabelto } for pid=8303 comm="yum" name="libgcc-4.1.1" dev=dm-0 ino=10608329 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=dir type=SYSCALL msg=audit(1163774861.926:11702): arch=40000003 syscall=227 success=yes exit=0 a0=e85bdc8 a1=a2f0d3 a2=e096d70 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774861.926:11703): avc: denied { setattr } for pid=8303 comm="yum" name="libgcc-4.1.1" dev=dm-0 ino=10608329 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=dir type=SYSCALL msg=audit(1163774861.926:11703): arch=40000003 syscall=212 success=yes exit=0 a0=e85bdc8 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774861.926:11704): avc: denied { write } for pid=8303 comm="yum" name="libgcc-4.1.1" dev=dm-0 ino=10608329 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=dir type=AVC msg=audit(1163774861.926:11704): avc: denied { add_name } for pid=8303 comm="yum" name="COPYING.LIB;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=dir type=AVC msg=audit(1163774861.926:11704): avc: denied { create } for pid=8303 comm="yum" name="COPYING.LIB;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:usr_t:s0 tclass=file type=SYSCALL msg=audit(1163774861.926:11704): arch=40000003 syscall=5 success=yes exit=18 a0=e0cbb50 a1=8241 a2=1b6 a3=8241 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774861.942:11705): avc: denied { write } for pid=8303 comm="yum" name="COPYING.LIB;455dcb57" dev=dm-0 ino=10609081 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:usr_t:s0 tclass=file type=SYSCALL msg=audit(1163774861.942:11705): arch=40000003 syscall=4 success=yes exit=24576 a0=12 a1=e919f68 a2=6000 a3=e0cbb88 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163774861.942:11705): path="/usr/share/doc/libgcc-4.1.1/COPYING.LIB;455dcb57" type=AVC msg=audit(1163774861.950:11706): avc: denied { remove_name } for pid=8303 comm="yum" name="COPYING.LIB;455dcb57" dev=dm-0 ino=10609081 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=dir type=AVC msg=audit(1163774861.950:11706): avc: denied { rename } for pid=8303 comm="yum" name="COPYING.LIB;455dcb57" dev=dm-0 ino=10609081 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:usr_t:s0 tclass=file type=AVC msg=audit(1163774861.950:11706): avc: denied { unlink } for pid=8303 comm="yum" name="COPYING.LIB" dev=dm-0 ino=10609151 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=file type=SYSCALL msg=audit(1163774861.950:11706): arch=40000003 syscall=38 success=yes exit=0 a0=e0cbb50 a1=e0cbb20 a2=d2a040 a3=e0cbb50 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774861.966:11707): avc: denied { relabelfrom } for pid=8303 comm="yum" name="COPYING.LIB" dev=dm-0 ino=10609081 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:usr_t:s0 tclass=file type=AVC msg=audit(1163774861.966:11707): avc: denied { relabelto } for pid=8303 comm="yum" name="COPYING.LIB" dev=dm-0 ino=10609081 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=file type=SYSCALL msg=audit(1163774861.966:11707): arch=40000003 syscall=227 success=yes exit=0 a0=e0cbb20 a1=a2f0d3 a2=c1f0820 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774861.966:11708): avc: denied { setattr } for pid=8303 comm="yum" name="COPYING.LIB" dev=dm-0 ino=10609081 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=file type=SYSCALL msg=audit(1163774861.966:11708): arch=40000003 syscall=212 success=yes exit=0 a0=e0cbb20 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774863.270:11709): avc: denied { setexec } for pid=8825 comm="yum" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=process type=SYSCALL msg=audit(1163774863.270:11709): arch=40000003 syscall=4 success=no exit=-22 a0=1c a1=e91ca10 a2=20 a3=a2f751 items=0 ppid=8303 pid=8825 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774863.282:11710): avc: denied { execute } for pid=8825 comm="libgcc_post_upg" name="ldconfig" dev=dm-0 ino=9984594 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:ldconfig_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163774863.282:11710): arch=40000003 syscall=33 success=yes exit=0 a0=80482e0 a1=1 a2=bff661f4 a3=1 items=0 ppid=8303 pid=8825 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="libgcc_post_upg" exe="/usr/sbin/libgcc_post_upgrade" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774863.330:11711): avc: denied { execute_no_trans } for pid=8825 comm="libgcc_post_upg" name="ldconfig" dev=dm-0 ino=9984594 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:ldconfig_exec_t:s0 tclass=file type=AVC msg=audit(1163774863.330:11711): avc: denied { read } for pid=8825 comm="libgcc_post_upg" name="ldconfig" dev=dm-0 ino=9984594 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:ldconfig_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163774863.330:11711): arch=40000003 syscall=11 success=yes exit=0 a0=80482e0 a1=bff66184 a2=bff661fc a3=1 items=0 ppid=8303 pid=8825 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="ldconfig" exe="/sbin/ldconfig" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163774863.330:11711): path="/sbin/ldconfig" type=AVC_PATH msg=audit(1163774863.330:11711): path="/sbin/ldconfig" type=AVC msg=audit(1163774863.614:11712): avc: denied { append } for pid=8549 comm="gconfd-2" name="saved_state" dev=dm-0 ino=13127393 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:user_home_t:s0 tclass=file type=SYSCALL msg=audit(1163774863.614:11712): arch=40000003 syscall=5 success=yes exit=8 a0=96418f0 a1=441 a2=1b6 a3=964c020 items=0 ppid=1 pid=8549 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774899.060:11713): avc: denied { write } for pid=8825 comm="ldconfig" name="etc" dev=dm-0 ino=9329761 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=dir type=AVC msg=audit(1163774899.060:11713): avc: denied { add_name } for pid=8825 comm="ldconfig" name="ld.so.cache~" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=dir type=AVC msg=audit(1163774899.060:11713): avc: denied { create } for pid=8825 comm="ldconfig" name="ld.so.cache~" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1163774899.060:11713): arch=40000003 syscall=5 success=yes exit=3 a0=9b9eb20 a1=20241 a2=1a4 a3=9b9eb20 items=0 ppid=8303 pid=8825 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="ldconfig" exe="/sbin/ldconfig" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774899.084:11714): avc: denied { write } for pid=8825 comm="ldconfig" name="ld.so.cache~" dev=dm-0 ino=9330919 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1163774899.084:11714): arch=40000003 syscall=4 success=yes exit=17824 a0=3 a1=9bb3030 a2=45a0 a3=9b9eb20 items=0 ppid=8303 pid=8825 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="ldconfig" exe="/sbin/ldconfig" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163774899.084:11714): path="/etc/ld.so.cache~" type=AVC msg=audit(1163774899.084:11715): avc: denied { setattr } for pid=8825 comm="ldconfig" name="ld.so.cache~" dev=dm-0 ino=9330919 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1163774899.084:11715): arch=40000003 syscall=15 success=yes exit=0 a0=9b9eb20 a1=1a4 a2=bfcb9ce0 a3=9b9eb20 items=0 ppid=8303 pid=8825 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="ldconfig" exe="/sbin/ldconfig" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774899.084:11716): avc: denied { remove_name } for pid=8825 comm="ldconfig" name="ld.so.cache~" dev=dm-0 ino=9330919 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=dir type=AVC msg=audit(1163774899.084:11716): avc: denied { rename } for pid=8825 comm="ldconfig" name="ld.so.cache~" dev=dm-0 ino=9330919 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:etc_t:s0 tclass=file type=AVC msg=audit(1163774899.084:11716): avc: denied { unlink } for pid=8825 comm="ldconfig" name="ld.so.cache" dev=dm-0 ino=9330329 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:ld_so_cache_t:s0 tclass=file type=SYSCALL msg=audit(1163774899.084:11716): arch=40000003 syscall=38 success=yes exit=0 a0=9b9eb20 a1=bfcb9d60 a2=bfcb9ce0 a3=9b9eb20 items=0 ppid=8303 pid=8825 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="ldconfig" exe="/sbin/ldconfig" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774899.128:11717): avc: denied { append } for pid=8303 comm="yum" name="yum.log" dev=dm-0 ino=8707846 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:rpm_log_t:s0 tclass=file type=SYSCALL msg=audit(1163774899.128:11717): arch=40000003 syscall=4 success=yes exit=46 a0=4 a1=b7bd1000 a2=2e a3=2e items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163774899.128:11717): path="/var/log/yum.log" type=AVC msg=audit(1163774899.232:11718): avc: denied { relabelfrom } for pid=8303 comm="yum" name="xdg" dev=dm-0 ino=9329898 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=dir type=AVC msg=audit(1163774899.232:11718): avc: denied { relabelto } for pid=8303 comm="yum" name="xdg" dev=dm-0 ino=9329898 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=dir type=SYSCALL msg=audit(1163774899.232:11718): arch=40000003 syscall=227 success=yes exit=0 a0=dea5808 a1=a2f0d3 a2=e0cb6e0 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774899.232:11719): avc: denied { setattr } for pid=8303 comm="yum" name="xdg" dev=dm-0 ino=9329898 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=dir type=SYSCALL msg=audit(1163774899.232:11719): arch=40000003 syscall=212 success=yes exit=0 a0=dea5808 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774899.236:11720): avc: denied { unlink } for pid=8303 comm="yum" name="applications.menu" dev=dm-0 ino=9330099 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1163774899.236:11720): arch=40000003 syscall=38 success=yes exit=0 a0=c287538 a1=c287568 a2=d2a040 a3=c287538 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774899.236:11721): avc: denied { relabelfrom } for pid=8303 comm="yum" name="applications.menu" dev=dm-0 ino=9330329 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:etc_t:s0 tclass=file type=AVC msg=audit(1163774899.236:11721): avc: denied { relabelto } for pid=8303 comm="yum" name="applications.menu" dev=dm-0 ino=9330329 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1163774899.236:11721): arch=40000003 syscall=227 success=yes exit=0 a0=c287568 a1=a2f0d3 a2=c287538 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774899.236:11722): avc: denied { setattr } for pid=8303 comm="yum" name="applications.menu" dev=dm-0 ino=9330329 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1163774899.236:11722): arch=40000003 syscall=212 success=yes exit=0 a0=c287568 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774899.480:11723): avc: denied { write } for pid=8303 comm="yum" name="LC_MESSAGES" dev=dm-0 ino=10311907 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=dir type=AVC msg=audit(1163774899.480:11723): avc: denied { add_name } for pid=8303 comm="yum" name="redhat-menus.mo;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=dir type=AVC msg=audit(1163774899.480:11723): avc: denied { create } for pid=8303 comm="yum" name="redhat-menus.mo;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1163774899.480:11723): arch=40000003 syscall=5 success=yes exit=29 a0=d7acf80 a1=8241 a2=1b6 a3=8241 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774899.488:11724): avc: denied { write } for pid=8303 comm="yum" name="redhat-menus.mo;455dcb57" dev=dm-0 ino=10316014 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1163774899.488:11724): arch=40000003 syscall=4 success=yes exit=6092 a0=1d a1=b6f50000 a2=17cc a3=d7acfc0 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163774899.488:11724): path="/usr/share/locale/af/LC_MESSAGES/redhat-menus.mo;455dcb57" type=AVC msg=audit(1163774899.488:11725): avc: denied { remove_name } for pid=8303 comm="yum" name="redhat-menus.mo;455dcb57" dev=dm-0 ino=10316014 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=dir type=AVC msg=audit(1163774899.488:11725): avc: denied { rename } for pid=8303 comm="yum" name="redhat-menus.mo;455dcb57" dev=dm-0 ino=10316014 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:locale_t:s0 tclass=file type=AVC msg=audit(1163774899.488:11725): avc: denied { unlink } for pid=8303 comm="yum" name="redhat-menus.mo" dev=dm-0 ino=10339841 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1163774899.488:11725): arch=40000003 syscall=38 success=yes exit=0 a0=d7acf80 a1=d7acf48 a2=d2a040 a3=d7acf80 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774899.504:11726): avc: denied { relabelfrom } for pid=8303 comm="yum" name="redhat-menus.mo" dev=dm-0 ino=10316014 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:locale_t:s0 tclass=file type=AVC msg=audit(1163774899.504:11726): avc: denied { relabelto } for pid=8303 comm="yum" name="redhat-menus.mo" dev=dm-0 ino=10316014 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1163774899.504:11726): arch=40000003 syscall=227 success=yes exit=0 a0=d7acf48 a1=a2f0d3 a2=d7ae9b0 a3=1e items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774899.504:11727): avc: denied { setattr } for pid=8303 comm="yum" name="redhat-menus.mo" dev=dm-0 ino=10316014 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1163774899.504:11727): arch=40000003 syscall=212 success=yes exit=0 a0=d7acf48 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774912.713:11728): avc: denied { setattr } for pid=8827 comm="update-desktop-" name=".mimeinfo.cache.6JNWIT" dev=dm-0 ino=10316943 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:usr_t:s0 tclass=file type=SYSCALL msg=audit(1163774912.713:11728): arch=40000003 syscall=94 success=yes exit=0 a0=3 a1=1a4 a2=1a4 a3=9fbdf50 items=0 ppid=8826 pid=8827 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="update-desktop-" exe="/usr/bin/update-desktop-database" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774912.713:11729): avc: denied { unlink } for pid=8827 comm="update-desktop-" name="mimeinfo.cache" dev=dm-0 ino=10323600 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:usr_t:s0 tclass=file type=SYSCALL msg=audit(1163774912.713:11729): arch=40000003 syscall=38 success=yes exit=0 a0=9fcc528 a1=9fcccc0 a2=1a4 a3=9fbdf50 items=0 ppid=8826 pid=8827 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="update-desktop-" exe="/usr/bin/update-desktop-database" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774912.737:11730): avc: denied { read } for pid=8434 comm="firefox-bin" name="inotify" dev=inotifyfs ino=340 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:inotifyfs_t:s0 tclass=dir type=SYSCALL msg=audit(1163774912.737:11730): arch=40000003 syscall=3 success=yes exit=416 a0=21 a1=9c76020 a2=400 a3=400 items=0 ppid=1 pid=8434 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163774912.737:11730): path="inotify" type=AVC msg=audit(1163774912.825:11731): avc: denied { write } for pid=8303 comm="yum" name="bin" dev=dm-0 ino=10311850 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=dir type=AVC msg=audit(1163774912.825:11731): avc: denied { add_name } for pid=8303 comm="yum" name="urlgrabber;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=dir type=AVC msg=audit(1163774912.825:11731): avc: denied { create } for pid=8303 comm="yum" name="urlgrabber;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1163774912.825:11731): arch=40000003 syscall=5 success=yes exit=30 a0=e928150 a1=8241 a2=1b6 a3=8241 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774912.853:11732): avc: denied { write } for pid=8303 comm="yum" name="urlgrabber;455dcb57" dev=dm-0 ino=10323600 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1163774912.853:11732): arch=40000003 syscall=4 success=yes exit=4868 a0=1e a1=b6f50000 a2=1304 a3=c255100 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163774912.853:11732): path="/usr/bin/urlgrabber;455dcb57" type=AVC msg=audit(1163774912.853:11733): avc: denied { remove_name } for pid=8303 comm="yum" name="urlgrabber;455dcb57" dev=dm-0 ino=10323600 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=dir type=AVC msg=audit(1163774912.853:11733): avc: denied { rename } for pid=8303 comm="yum" name="urlgrabber;455dcb57" dev=dm-0 ino=10323600 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:bin_t:s0 tclass=file type=AVC msg=audit(1163774912.853:11733): avc: denied { unlink } for pid=8303 comm="yum" name="urlgrabber" dev=dm-0 ino=10324363 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1163774912.853:11733): arch=40000003 syscall=38 success=yes exit=0 a0=e928150 a1=c255328 a2=d2a040 a3=e928150 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774912.885:11734): avc: denied { relabelfrom } for pid=8303 comm="yum" name="urlgrabber" dev=dm-0 ino=10323600 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:bin_t:s0 tclass=file type=AVC msg=audit(1163774912.885:11734): avc: denied { relabelto } for pid=8303 comm="yum" name="urlgrabber" dev=dm-0 ino=10323600 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1163774912.885:11734): arch=40000003 syscall=227 success=yes exit=0 a0=c255328 a1=a2f0d3 a2=c287558 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774912.889:11735): avc: denied { setattr } for pid=8303 comm="yum" name="urlgrabber" dev=dm-0 ino=10323600 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1163774912.889:11735): arch=40000003 syscall=212 success=yes exit=0 a0=c255328 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774912.889:11736): avc: denied { relabelfrom } for pid=8303 comm="yum" name="urlgrabber" dev=dm-0 ino=10609112 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=dir type=AVC msg=audit(1163774912.889:11736): avc: denied { relabelto } for pid=8303 comm="yum" name="urlgrabber" dev=dm-0 ino=10609112 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=dir type=SYSCALL msg=audit(1163774912.889:11736): arch=40000003 syscall=227 success=yes exit=0 a0=e255cd8 a1=a2f0d3 a2=e254fe0 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774912.889:11737): avc: denied { setattr } for pid=8303 comm="yum" name="urlgrabber" dev=dm-0 ino=10609112 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=dir type=SYSCALL msg=audit(1163774912.889:11737): arch=40000003 syscall=212 success=yes exit=0 a0=e255cd8 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774912.897:11738): avc: denied { unlink } for pid=8303 comm="yum" name="__init__.py" dev=dm-0 ino=10608633 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1163774912.897:11738): arch=40000003 syscall=38 success=yes exit=0 a0=e279690 a1=e278050 a2=d2a040 a3=e279690 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774912.905:11739): avc: denied { relabelto } for pid=8303 comm="yum" name="__init__.py" dev=dm-0 ino=10609082 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1163774912.905:11739): arch=40000003 syscall=227 success=yes exit=0 a0=e278050 a1=a2f0d3 a2=db63178 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774912.905:11740): avc: denied { setattr } for pid=8303 comm="yum" name="__init__.py" dev=dm-0 ino=10609082 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1163774912.905:11740): arch=40000003 syscall=212 success=yes exit=0 a0=e278050 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774913.941:11741): avc: denied { unlink } for pid=8303 comm="yum" name="yum" dev=dm-0 ino=10321123 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:rpm_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163774913.941:11741): arch=40000003 syscall=38 success=yes exit=0 a0=c254478 a1=c22e658 a2=d2a040 a3=c254478 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774913.985:11742): avc: denied { relabelto } for pid=8303 comm="yum" name="yum" dev=dm-0 ino=10324363 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:rpm_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163774913.985:11742): arch=40000003 syscall=227 success=yes exit=0 a0=c22e658 a1=a2f0d3 a2=c254f90 a3=20 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774913.985:11743): avc: denied { setattr } for pid=8303 comm="yum" name="yum" dev=dm-0 ino=10324363 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:rpm_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163774913.985:11743): arch=40000003 syscall=212 success=yes exit=0 a0=c22e658 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774914.765:11744): avc: denied { write } for pid=8303 comm="yum" name="man5" dev=dm-0 ino=10311893 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:man_t:s0 tclass=dir type=AVC msg=audit(1163774914.765:11744): avc: denied { add_name } for pid=8303 comm="yum" name="yum.conf.5.gz;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:man_t:s0 tclass=dir type=AVC msg=audit(1163774914.765:11744): avc: denied { create } for pid=8303 comm="yum" name="yum.conf.5.gz;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:man_t:s0 tclass=file type=SYSCALL msg=audit(1163774914.765:11744): arch=40000003 syscall=5 success=yes exit=30 a0=c2044e0 a1=8241 a2=1b6 a3=8241 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774914.785:11745): avc: denied { write } for pid=8303 comm="yum" name="yum.conf.5.gz;455dcb57" dev=dm-0 ino=10321123 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:man_t:s0 tclass=file type=SYSCALL msg=audit(1163774914.785:11745): arch=40000003 syscall=4 success=yes exit=5173 a0=1e a1=b6f50000 a2=1435 a3=c205528 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163774914.785:11745): path="/usr/share/man/man5/yum.conf.5.gz;455dcb57" type=AVC msg=audit(1163774914.785:11746): avc: denied { remove_name } for pid=8303 comm="yum" name="yum.conf.5.gz;455dcb57" dev=dm-0 ino=10321123 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:man_t:s0 tclass=dir type=AVC msg=audit(1163774914.785:11746): avc: denied { rename } for pid=8303 comm="yum" name="yum.conf.5.gz;455dcb57" dev=dm-0 ino=10321123 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:man_t:s0 tclass=file type=AVC msg=audit(1163774914.785:11746): avc: denied { unlink } for pid=8303 comm="yum" name="yum.conf.5.gz" dev=dm-0 ino=10321857 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:man_t:s0 tclass=file type=SYSCALL msg=audit(1163774914.785:11746): arch=40000003 syscall=38 success=yes exit=0 a0=c2044e0 a1=c205430 a2=d2a040 a3=c2044e0 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774914.785:11747): avc: denied { relabelfrom } for pid=8303 comm="yum" name="yum.conf.5.gz" dev=dm-0 ino=10321123 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:man_t:s0 tclass=file type=AVC msg=audit(1163774914.785:11747): avc: denied { relabelto } for pid=8303 comm="yum" name="yum.conf.5.gz" dev=dm-0 ino=10321123 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:man_t:s0 tclass=file type=SYSCALL msg=audit(1163774914.785:11747): arch=40000003 syscall=227 success=yes exit=0 a0=c205430 a1=a2f0d3 a2=c205468 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774914.785:11748): avc: denied { setattr } for pid=8303 comm="yum" name="yum.conf.5.gz" dev=dm-0 ino=10321123 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:man_t:s0 tclass=file type=SYSCALL msg=audit(1163774914.785:11748): arch=40000003 syscall=212 success=yes exit=0 a0=c205430 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774914.929:11749): avc: denied { relabelfrom } for pid=8303 comm="yum" name="yum" dev=dm-0 ino=14436582 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:var_t:s0 tclass=dir type=AVC msg=audit(1163774914.929:11749): avc: denied { relabelto } for pid=8303 comm="yum" name="yum" dev=dm-0 ino=14436582 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:var_t:s0 tclass=dir type=SYSCALL msg=audit(1163774914.929:11749): arch=40000003 syscall=227 success=yes exit=0 a0=c207f60 a1=a2f0d3 a2=c206e60 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774914.957:11750): avc: denied { setattr } for pid=8303 comm="yum" name="yum" dev=dm-0 ino=14436582 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:var_t:s0 tclass=dir type=SYSCALL msg=audit(1163774914.957:11750): arch=40000003 syscall=212 success=yes exit=0 a0=c207f60 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774927.238:11751): avc: denied { create } for pid=8303 comm="yum" name="tzdata-2006o" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:usr_t:s0 tclass=dir type=SYSCALL msg=audit(1163774927.238:11751): arch=40000003 syscall=39 success=yes exit=0 a0=d7da450 a1=1c0 a2=d2a040 a3=d7da450 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774927.298:11752): avc: denied { relabelfrom } for pid=8303 comm="yum" name="tzdata-2006o" dev=dm-0 ino=11098958 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:usr_t:s0 tclass=dir type=SYSCALL msg=audit(1163774927.298:11752): arch=40000003 syscall=227 success=yes exit=0 a0=d7da450 a1=a2f0d3 a2=ccc2bc0 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774927.330:11753): avc: denied { relabelfrom } for pid=8303 comm="yum" name="zoneinfo" dev=dm-0 ino=10312131 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=dir type=AVC msg=audit(1163774927.330:11753): avc: denied { relabelto } for pid=8303 comm="yum" name="zoneinfo" dev=dm-0 ino=10312131 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=dir type=SYSCALL msg=audit(1163774927.330:11753): arch=40000003 syscall=227 success=yes exit=0 a0=ccc2be0 a1=a2f0d3 a2=c227a70 a3=1e items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774927.358:11754): avc: denied { setattr } for pid=8303 comm="yum" name="zoneinfo" dev=dm-0 ino=10312131 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=dir type=SYSCALL msg=audit(1163774927.358:11754): arch=40000003 syscall=212 success=yes exit=0 a0=ccc2be0 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774930.114:11755): avc: denied { link } for pid=8303 comm="yum" name="Yap;455dcb57" dev=dm-0 ino=10313177 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1163774930.114:11755): arch=40000003 syscall=9 success=yes exit=0 a0=e402dd8 a1=e402e10 a2=d2a040 a3=0 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774930.118:11756): avc: denied { rename } for pid=8303 comm="yum" name="Yap;455dcb57" dev=dm-0 ino=10313177 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1163774930.118:11756): arch=40000003 syscall=38 success=yes exit=0 a0=e402dd8 a1=e4029b8 a2=d2a040 a3=e402dd8 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774930.118:11757): avc: denied { relabelfrom } for pid=8303 comm="yum" name="Yap" dev=dm-0 ino=10313177 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1163774930.118:11757): arch=40000003 syscall=227 success=yes exit=0 a0=e4029b8 a1=a2f0d3 a2=e402cf8 a3=1e items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=USER_ACCT msg=audit(1163775002.259:11758): user pid=8837 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1163775002.259:11759): login pid=8837 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1163775002.279:11760): user pid=8837 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1163775002.283:11761): user pid=8837 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1163775002.291:11762): avc: denied { execute } for pid=8839 comm="sh" name="sa1" dev=dm-0 ino=13061698 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:lib_t:s0 tclass=file type=AVC msg=audit(1163775002.291:11762): avc: denied { execute_no_trans } for pid=8839 comm="sh" name="sa1" dev=dm-0 ino=13061698 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1163775002.291:11762): arch=40000003 syscall=11 success=yes exit=0 a0=91971b0 a1=9197358 a2=9197290 a3=9197008 items=0 ppid=8837 pid=8839 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sa1" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163775002.291:11762): path="/usr/lib/sa/sa1" type=AVC msg=audit(1163775002.355:11763): avc: denied { execute } for pid=8839 comm="sa1" name="sadc" dev=dm-0 ino=11981401 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=AVC msg=audit(1163775002.355:11763): avc: denied { execute_no_trans } for pid=8839 comm="sa1" name="sadc" dev=dm-0 ino=11981401 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=AVC msg=audit(1163775002.355:11763): avc: denied { read } for pid=8839 comm="sa1" name="sadc" dev=dm-0 ino=11981401 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775002.355:11763): arch=40000003 syscall=11 success=yes exit=0 a0=89d9d48 a1=89d9740 a2=89d9d60 a3=89d9740 items=0 ppid=8837 pid=8839 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163775002.355:11763): path="/usr/lib/sa/sadc" type=AVC_PATH msg=audit(1163775002.355:11763): path="/usr/lib/sa/sadc" type=AVC msg=audit(1163775002.423:11764): avc: denied { search } for pid=8839 comm="sadc" name="sa" dev=dm-0 ino=14607631 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=dir type=SYSCALL msg=audit(1163775002.423:11764): arch=40000003 syscall=33 success=yes exit=0 a0=bfc260f4 a1=0 a2=bfc25fe8 a3=bfc25ff0 items=0 ppid=8837 pid=8839 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163775002.531:11765): avc: denied { read append } for pid=8839 comm="sadc" name="sa17" dev=dm-0 ino=14600257 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=file type=SYSCALL msg=audit(1163775002.531:11765): arch=40000003 syscall=5 success=yes exit=3 a0=bfc260f4 a1=402 a2=bfc262b8 a3=bfc25ff0 items=0 ppid=8837 pid=8839 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163775002.539:11766): avc: denied { search } for pid=8839 comm="sadc" name="fs" dev=proc ino=-268435428 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=dir type=SYSCALL msg=audit(1163775002.539:11766): arch=40000003 syscall=5 success=yes exit=4 a0=805037f a1=0 a2=1b6 a3=84232f8 items=0 ppid=8837 pid=8839 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163775002.539:11767): avc: denied { search } for pid=8839 comm="sadc" name="rpc" dev=proc ino=-268433616 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_rpc_t:s0 tclass=dir type=SYSCALL msg=audit(1163775002.539:11767): arch=40000003 syscall=5 success=no exit=-2 a0=80502a5 a1=0 a2=1b6 a3=84232f8 items=0 ppid=8837 pid=8839 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163775002.539:11768): avc: denied { lock } for pid=8839 comm="sadc" name="sa17" dev=dm-0 ino=14600257 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=file type=SYSCALL msg=audit(1163775002.539:11768): arch=40000003 syscall=143 success=yes exit=0 a0=3 a1=6 a2=bfc25ff0 a3=3 items=0 ppid=8837 pid=8839 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163775002.539:11768): path="/var/log/sa/sa17" type=CRED_DISP msg=audit(1163775003.011:11769): user pid=8837 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1163775003.011:11770): user pid=8837 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1163775034.029:11771): avc: denied { unlink } for pid=8840 comm="build-locale-ar" name="locale-archive" dev=dm-0 ino=10328905 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1163775034.029:11771): arch=40000003 syscall=10 success=yes exit=0 a0=80a5a29 a1=bfb61bb0 a2=0 a3=20612 items=0 ppid=8303 pid=8840 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="build-locale-ar" exe="/usr/sbin/build-locale-archive" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775034.033:11772): avc: denied { unlink } for pid=8840 comm="build-locale-ar" name="locale-archive.4nRZQd" dev=dm-0 ino=10314302 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1163775034.033:11772): arch=40000003 syscall=10 success=yes exit=0 a0=bfb506d0 a1=bfb50780 a2=bfb50714 a3=3 items=0 ppid=8303 pid=8840 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="build-locale-ar" exe="/usr/sbin/build-locale-archive" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775034.033:11773): avc: denied { setattr } for pid=8840 comm="build-locale-ar" name="locale-archive.4nRZQd" dev=dm-0 ino=10314302 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1163775034.033:11773): arch=40000003 syscall=94 success=yes exit=0 a0=3 a1=1a4 a2=bfb50714 a3=3 items=0 ppid=8303 pid=8840 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="build-locale-ar" exe="/usr/sbin/build-locale-archive" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775049.950:11774): avc: denied { unlink } for pid=8303 comm="yum" name="libc-2.5.90.so" dev=dm-0 ino=13716387 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:shlib_t:s0 tclass=file type=SYSCALL msg=audit(1163775049.950:11774): arch=40000003 syscall=38 success=yes exit=0 a0=c1f8440 a1=e5b3590 a2=d2a040 a3=c1f8440 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775049.970:11775): avc: denied { unlink } for pid=8303 comm="yum" name="ld-2.5.90.so" dev=dm-0 ino=13716438 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:ld_so_t:s0 tclass=file type=SYSCALL msg=audit(1163775049.970:11775): arch=40000003 syscall=38 success=yes exit=0 a0=e5aad20 a1=e593780 a2=d2a040 a3=e5aad20 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775049.970:11776): avc: denied { relabelto } for pid=8303 comm="yum" name="ld-2.5.90.so" dev=dm-0 ino=13716553 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:ld_so_t:s0 tclass=file type=SYSCALL msg=audit(1163775049.970:11776): arch=40000003 syscall=227 success=yes exit=0 a0=e593780 a1=a2f0d3 a2=e5b7f88 a3=1d items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775049.970:11777): avc: denied { setattr } for pid=8303 comm="yum" name="ld-2.5.90.so" dev=dm-0 ino=13716553 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:ld_so_t:s0 tclass=file type=SYSCALL msg=audit(1163775049.970:11777): arch=40000003 syscall=212 success=yes exit=0 a0=e593780 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775050.510:11778): avc: denied { unlink } for pid=8303 comm="yum" name="ldconfig" dev=dm-0 ino=9984594 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:ldconfig_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775050.510:11778): arch=40000003 syscall=38 success=yes exit=0 a0=e5acd30 a1=e593780 a2=d2a040 a3=e5acd30 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775050.534:11779): avc: denied { relabelto } for pid=8303 comm="yum" name="ldconfig" dev=dm-0 ino=9984490 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:ldconfig_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775050.534:11779): arch=40000003 syscall=227 success=yes exit=0 a0=e593780 a1=a2f0d3 a2=db631a8 a3=25 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775050.534:11780): avc: denied { setattr } for pid=8303 comm="yum" name="ldconfig" dev=dm-0 ino=9984490 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:ldconfig_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775050.534:11780): arch=40000003 syscall=212 success=yes exit=0 a0=e593780 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775051.746:11781): avc: denied { unlink } for pid=8303 comm="yum" name="gconv-modules.cache" dev=dm-0 ino=10387675 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1163775051.746:11781): arch=40000003 syscall=38 success=yes exit=0 a0=e59f300 a1=e5b1170 a2=d2a040 a3=e59f300 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775051.906:11782): avc: denied { relabelfrom } for pid=8303 comm="yum" name="getconf" dev=dm-0 ino=10377557 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=dir type=AVC msg=audit(1163775051.906:11782): avc: denied { relabelto } for pid=8303 comm="yum" name="getconf" dev=dm-0 ino=10377557 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=dir type=SYSCALL msg=audit(1163775051.906:11782): arch=40000003 syscall=227 success=yes exit=0 a0=e5b4328 a1=a2f0d3 a2=e59beb0 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775051.906:11783): avc: denied { setattr } for pid=8303 comm="yum" name="getconf" dev=dm-0 ino=10377557 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=dir type=SYSCALL msg=audit(1163775051.906:11783): arch=40000003 syscall=212 success=yes exit=0 a0=e5b4328 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775052.094:11784): avc: denied { link } for pid=8303 comm="yum" name="iconvconfig.i686;455dcb57" dev=dm-0 ino=10314303 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:sbin_t:s0 tclass=file type=SYSCALL msg=audit(1163775052.094:11784): arch=40000003 syscall=9 success=yes exit=0 a0=e5b6ff0 a1=e5b7018 a2=d2a040 a3=0 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775052.098:11785): avc: denied { rename } for pid=8303 comm="yum" name="iconvconfig.i686;455dcb57" dev=dm-0 ino=10314303 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:sbin_t:s0 tclass=file type=SYSCALL msg=audit(1163775052.098:11785): arch=40000003 syscall=38 success=yes exit=0 a0=e5b7540 a1=e5b4af0 a2=d2a040 a3=e5b7540 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775052.102:11786): avc: denied { relabelfrom } for pid=8303 comm="yum" name="iconvconfig.i686" dev=dm-0 ino=10314303 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:sbin_t:s0 tclass=file type=SYSCALL msg=audit(1163775052.102:11786): arch=40000003 syscall=227 success=yes exit=0 a0=e5b4af0 a1=a2f0d3 a2=e5b7568 a3=1c items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775060.051:11787): avc: denied { unlink } for pid=8845 comm="ldconfig" name="ld.so.cache" dev=dm-0 ino=9330919 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1163775060.051:11787): arch=40000003 syscall=38 success=yes exit=0 a0=821bb20 a1=bfcaace0 a2=bfcaac60 a3=821bb20 items=0 ppid=8844 pid=8845 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="ldconfig" exe="/sbin/ldconfig" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775060.115:11788): avc: denied { write } for pid=8844 comm="glibc_post_upgr" name="gconv-modules.cache" dev=dm-0 ino=10386338 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1163775060.115:11788): arch=40000003 syscall=271 success=yes exit=0 a0=809f933 a1=0 a2=0 a3=bf9bd020 items=0 ppid=8303 pid=8844 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="glibc_post_upgr" exe="/usr/sbin/glibc_post_upgrade.i686" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775060.155:11789): avc: denied { setattr } for pid=8846 comm="iconvconfig.i68" name="gconv-modules.cache.RsaIv0" dev=dm-0 ino=10386358 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1163775060.155:11789): arch=40000003 syscall=94 success=yes exit=0 a0=3 a1=1a4 a2=6374 a3=bff33014 items=0 ppid=8844 pid=8846 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="iconvconfig.i68" exe="/usr/sbin/iconvconfig.i686" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775060.155:11790): avc: denied { execute } for pid=8844 comm="glibc_post_upgr" name="init" dev=dm-0 ino=9984714 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:init_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775060.155:11790): arch=40000003 syscall=33 success=yes exit=0 a0=809f956 a1=1 a2=3 a3=bf9bd020 items=0 ppid=8303 pid=8844 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="glibc_post_upgr" exe="/usr/sbin/glibc_post_upgrade.i686" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775060.183:11791): avc: denied { sys_ptrace } for pid=8844 comm="glibc_post_upgr" capability=19 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=capability type=AVC msg=audit(1163775060.183:11791): avc: denied { ptrace } for pid=8844 comm="glibc_post_upgr" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=process type=SYSCALL msg=audit(1163775060.183:11791): arch=40000003 syscall=85 success=yes exit=10 a0=809f971 a1=bf9be038 a2=100 a3=bf9bd020 items=0 ppid=8303 pid=8844 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="glibc_post_upgr" exe="/usr/sbin/glibc_post_upgrade.i686" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775060.183:11792): avc: denied { read } for pid=8844 comm="glibc_post_upgr" name="init" dev=dm-0 ino=9984714 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:init_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775060.183:11792): arch=40000003 syscall=5 success=yes exit=3 a0=809f971 a1=0 a2=bf9bcfe3 a3=1 items=0 ppid=8303 pid=8844 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="glibc_post_upgr" exe="/usr/sbin/glibc_post_upgrade.i686" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775060.187:11793): avc: denied { execute_no_trans } for pid=8847 comm="glibc_post_upgr" name="init" dev=dm-0 ino=9984714 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:init_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775060.187:11793): arch=40000003 syscall=11 success=yes exit=0 a0=809f956 a1=809fa98 a2=bf9be44c a3=bf9bd020 items=0 ppid=8844 pid=8847 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="telinit" exe="/sbin/init" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775060.187:11793): path="/sbin/init" type=AVC msg=audit(1163775060.331:11794): avc: denied { write } for pid=8847 comm="telinit" name="initctl" dev=tmpfs ino=1148 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:initctl_t:s0 tclass=fifo_file type=SYSCALL msg=audit(1163775060.331:11794): arch=40000003 syscall=5 success=yes exit=3 a0=804f07f a1=1 a2=0 a3=bffc9bdd items=0 ppid=8844 pid=8847 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="telinit" exe="/sbin/init" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775060.427:11795): avc: denied { execute } for pid=8844 comm="glibc_post_upgr" name="sshd" dev=dm-0 ino=10315312 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:sshd_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775060.427:11795): arch=40000003 syscall=33 success=yes exit=0 a0=809f998 a1=1 a2=bf9be038 a3=bf9bd020 items=0 ppid=8303 pid=8844 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="glibc_post_upgr" exe="/usr/sbin/glibc_post_upgrade.i686" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775060.427:11796): avc: denied { read } for pid=8844 comm="glibc_post_upgr" name="sshd" dev=dm-0 ino=10315312 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:sshd_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775060.427:11796): arch=40000003 syscall=5 success=yes exit=3 a0=809f998 a1=0 a2=14 a3=1 items=0 ppid=8303 pid=8844 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="glibc_post_upgr" exe="/usr/sbin/glibc_post_upgrade.i686" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775061.075:11797): avc: denied { execute } for pid=8849 comm="service" name="sshd" dev=dm-0 ino=9331582 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775061.075:11797): arch=40000003 syscall=33 success=yes exit=0 a0=8696c30 a1=1 a2=1 a3=86932b0 items=0 ppid=8844 pid=8849 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="service" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775061.131:11798): avc: denied { execute_no_trans } for pid=8856 comm="env" name="sshd" dev=dm-0 ino=9331582 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775061.131:11798): arch=40000003 syscall=11 success=yes exit=0 a0=bfefbbf3 a1=bfefb978 a2=98f4858 a3=5 items=0 ppid=8849 pid=8856 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="sshd" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775061.131:11798): path="/etc/rc.d/init.d/sshd" type=AVC msg=audit(1163775061.151:11799): avc: denied { ioctl } for pid=8856 comm="sshd" name="sshd" dev=dm-0 ino=9331582 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775061.151:11799): arch=40000003 syscall=54 success=no exit=-25 a0=3 a1=5401 a2=bf9c0d08 a3=bf9c0d48 items=0 ppid=8849 pid=8856 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="sshd" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775061.151:11799): path="/etc/rc.d/init.d/sshd" type=AVC msg=audit(1163775061.275:11800): avc: denied { execute_no_trans } for pid=8864 comm="sshd" name="sshd" dev=dm-0 ino=10315312 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:sshd_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775061.275:11800): arch=40000003 syscall=11 success=yes exit=0 a0=81761d0 a1=81761e8 a2=81658e0 a3=8176070 items=0 ppid=8856 pid=8864 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="sshd" exe="/usr/sbin/sshd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775061.275:11800): path="/usr/sbin/sshd" type=AVC msg=audit(1163775061.483:11801): avc: denied { read } for pid=8864 comm="sshd" name="ssh_host_rsa_key" dev=dm-0 ino=9331557 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:sshd_key_t:s0 tclass=file type=SYSCALL msg=audit(1163775061.483:11801): arch=40000003 syscall=5 success=yes exit=3 a0=62e425 a1=8000 a2=0 a3=8000 items=0 ppid=8856 pid=8864 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="sshd" exe="/usr/sbin/sshd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775061.579:11802): avc: denied { read } for pid=8865 comm="sshd" name="sshd.pid" dev=dm-0 ino=14436996 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:sshd_var_run_t:s0 tclass=file type=SYSCALL msg=audit(1163775061.579:11802): arch=40000003 syscall=5 success=yes exit=3 a0=8177b90 a1=8000 a2=0 a3=8000 items=0 ppid=8856 pid=8865 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="sshd" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775061.599:11803): avc: denied { ioctl } for pid=8865 comm="sshd" name="sshd.pid" dev=dm-0 ino=14436996 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:sshd_var_run_t:s0 tclass=file type=SYSCALL msg=audit(1163775061.599:11803): arch=40000003 syscall=54 success=no exit=-25 a0=0 a1=5401 a2=bf9bd1d8 a3=bf9bd218 items=0 ppid=8856 pid=8865 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="sshd" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775061.599:11803): path="/var/run/sshd.pid" type=AVC msg=audit(1163775061.611:11804): avc: denied { signal } for pid=8856 comm="sshd" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tclass=process type=SYSCALL msg=audit(1163775061.611:11804): arch=40000003 syscall=37 success=yes exit=0 a0=888 a1=f a2=888 a3=888 items=0 ppid=8849 pid=8856 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="sshd" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775061.811:11805): avc: denied { write } for pid=8868 comm="rm" name="subsys" dev=dm-0 ino=14436611 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:var_lock_t:s0 tclass=dir type=AVC msg=audit(1163775061.811:11805): avc: denied { remove_name } for pid=8868 comm="rm" name="sshd" dev=dm-0 ino=14436998 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:var_lock_t:s0 tclass=dir type=AVC msg=audit(1163775061.811:11805): avc: denied { unlink } for pid=8868 comm="rm" name="sshd" dev=dm-0 ino=14436998 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:var_lock_t:s0 tclass=file type=SYSCALL msg=audit(1163775061.811:11805): arch=40000003 syscall=10 success=yes exit=0 a0=bf9f2f87 a1=0 a2=805277c a3=bf9f0fe4 items=0 ppid=8856 pid=8868 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="rm" exe="/bin/rm" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775064.915:11806): avc: denied { write } for pid=8870 comm="cp" name="localtime" dev=dm-0 ino=14537075 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1163775064.915:11806): arch=40000003 syscall=5 success=yes exit=4 a0=9be2060 a1=8201 a2=0 a3=8201 items=0 ppid=8856 pid=8870 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="cp" exe="/bin/cp" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775064.931:11807): avc: denied { node_bind } for pid=8872 comm="sshd" src=22 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:unspec_node_t:s0 tclass=tcp_socket type=AVC msg=audit(1163775064.931:11807): avc: denied { net_bind_service } for pid=8872 comm="sshd" capability=10 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=capability type=SYSCALL msg=audit(1163775064.931:11807): arch=40000003 syscall=102 success=yes exit=0 a0=2 a1=bf895ed0 a2=dec7ac a3=9f1f3e8 items=0 ppid=8871 pid=8872 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sshd" exe="/usr/sbin/sshd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775064.931:11808): avc: denied { node_bind } for pid=8872 comm="sshd" src=22 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:inaddr_any_node_t:s0 tclass=tcp_socket type=SYSCALL msg=audit(1163775064.931:11808): arch=40000003 syscall=102 success=no exit=-98 a0=2 a1=bf895ed0 a2=dec7ac a3=9f1f428 items=0 ppid=8871 pid=8872 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sshd" exe="/usr/sbin/sshd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775064.931:11809): avc: denied { write } for pid=8872 comm="sshd" name="run" dev=dm-0 ino=14436616 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:var_run_t:s0 tclass=dir type=AVC msg=audit(1163775064.931:11809): avc: denied { add_name } for pid=8872 comm="sshd" name="sshd.pid" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:var_run_t:s0 tclass=dir type=AVC msg=audit(1163775064.931:11809): avc: denied { create } for pid=8872 comm="sshd" name="sshd.pid" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:var_run_t:s0 tclass=file type=SYSCALL msg=audit(1163775064.931:11809): arch=40000003 syscall=5 success=yes exit=4 a0=dd8459 a1=8241 a2=1b6 a3=9f20f10 items=0 ppid=8871 pid=8872 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sshd" exe="/usr/sbin/sshd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775064.931:11810): avc: denied { write } for pid=8872 comm="sshd" name="sshd.pid" dev=dm-0 ino=14436996 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:var_run_t:s0 tclass=file type=SYSCALL msg=audit(1163775064.931:11810): arch=40000003 syscall=4 success=yes exit=5 a0=4 a1=b7fe4000 a2=5 a3=5 items=0 ppid=8871 pid=8872 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sshd" exe="/usr/sbin/sshd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775064.931:11810): path="/var/run/sshd.pid" type=AVC msg=audit(1163775064.947:11811): avc: denied { add_name } for pid=8873 comm="touch" name="sshd" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:var_lock_t:s0 tclass=dir type=AVC msg=audit(1163775064.947:11811): avc: denied { create } for pid=8873 comm="touch" name="sshd" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:var_lock_t:s0 tclass=file type=SYSCALL msg=audit(1163775064.947:11811): arch=40000003 syscall=5 success=yes exit=0 a0=bfb21f81 a1=8941 a2=1b6 a3=8941 items=0 ppid=8856 pid=8873 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="touch" exe="/bin/touch" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775064.947:11812): avc: denied { write } for pid=8873 comm="touch" name="sshd" dev=dm-0 ino=14436998 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:var_lock_t:s0 tclass=file type=SYSCALL msg=audit(1163775064.947:11812): arch=40000003 syscall=271 success=yes exit=0 a0=bfb1ffa4 a1=0 a2=f9fff4 a3=0 items=0 ppid=8856 pid=8873 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="touch" exe="/bin/touch" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775068.911:11813): avc: denied { execute } for pid=8874 comm="yum" name="ldconfig" dev=dm-0 ino=9984490 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:ldconfig_exec_t:s0 tclass=file type=AVC msg=audit(1163775068.911:11813): avc: denied { execute_no_trans } for pid=8874 comm="yum" name="ldconfig" dev=dm-0 ino=9984490 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:ldconfig_exec_t:s0 tclass=file type=AVC msg=audit(1163775068.911:11813): avc: denied { read } for pid=8874 comm="yum" name="ldconfig" dev=dm-0 ino=9984490 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:ldconfig_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775068.911:11813): arch=40000003 syscall=11 success=yes exit=0 a0=e531ba9 a1=bf87ad90 a2=892c7d0 a3=ffffffff items=0 ppid=8303 pid=8874 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="ldconfig" exe="/sbin/ldconfig" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775068.911:11813): path="/sbin/ldconfig" type=AVC_PATH msg=audit(1163775068.911:11813): path="/sbin/ldconfig" type=AVC msg=audit(1163775072.343:11814): avc: denied { write } for pid=8879 comm="install-info" name="dir" dev=dm-0 ino=10318269 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:usr_t:s0 tclass=file type=SYSCALL msg=audit(1163775072.343:11814): arch=40000003 syscall=5 success=yes exit=3 a0=bffe1be2 a1=241 a2=1b6 a3=98d61c0 items=0 ppid=8878 pid=8879 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="install-info" exe="/sbin/install-info" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775073.899:11815): avc: denied { read } for pid=8137 comm="vpnc" name="tun" dev=tmpfs ino=1473 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:tun_tap_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163775073.899:11815): arch=40000003 syscall=3 success=yes exit=60 a0=4 a1=805c5a0 a2=1000 a3=805c5a0 items=0 ppid=8135 pid=8137 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vpnc" exe="/usr/sbin/vpnc" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775073.899:11815): path="/dev/net/tun" type=AVC msg=audit(1163775073.987:11816): avc: denied { write } for pid=8137 comm="vpnc" name="tun" dev=tmpfs ino=1473 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:tun_tap_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163775073.987:11816): arch=40000003 syscall=4 success=yes exit=52 a0=4 a1=805c570 a2=34 a3=bfa20a54 items=0 ppid=8135 pid=8137 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vpnc" exe="/usr/sbin/vpnc" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775073.987:11816): path="/dev/net/tun" type=AVC msg=audit(1163775079.260:11817): avc: denied { unlink } for pid=8303 comm="yum" name="ls" dev=dm-0 ino=13683777 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:ls_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775079.260:11817): arch=40000003 syscall=38 success=yes exit=0 a0=e4cbd80 a1=d7d49b0 a2=d2a040 a3=e4cbd80 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775079.272:11818): avc: denied { relabelto } for pid=8303 comm="yum" name="ls" dev=dm-0 ino=13683768 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:ls_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775079.272:11818): arch=40000003 syscall=227 success=yes exit=0 a0=d7d49b0 a1=a2f0d3 a2=b4ae160 a3=1f items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775079.272:11819): avc: denied { setattr } for pid=8303 comm="yum" name="ls" dev=dm-0 ino=13683768 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:ls_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775079.272:11819): arch=40000003 syscall=212 success=yes exit=0 a0=d7d49b0 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775079.400:11820): avc: denied { unlink } for pid=8303 comm="yum" name="su" dev=dm-0 ino=13683660 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:su_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775079.400:11820): arch=40000003 syscall=38 success=yes exit=0 a0=e4cc770 a1=d7d49b0 a2=d2a040 a3=e4cc770 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775079.408:11821): avc: denied { relabelto } for pid=8303 comm="yum" name="su" dev=dm-0 ino=13683691 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:su_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775079.408:11821): arch=40000003 syscall=227 success=yes exit=0 a0=d7d49b0 a1=a2f0d3 a2=b4ae160 a3=1f items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775079.408:11822): avc: denied { setattr } for pid=8303 comm="yum" name="su" dev=dm-0 ino=13683691 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:su_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775079.408:11822): arch=40000003 syscall=212 success=yes exit=0 a0=d7d49b0 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775079.728:11823): avc: denied { create } for pid=8303 comm="yum" name="cut;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:bin_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775079.728:11823): arch=40000003 syscall=83 success=yes exit=0 a0=e5e2e98 a1=e629fc0 a2=508a38 a3=602c items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775079.728:11824): avc: denied { rename } for pid=8303 comm="yum" name="cut;455dcb57" dev=dm-0 ino=10314339 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:bin_t:s0 tclass=lnk_file type=AVC msg=audit(1163775079.728:11824): avc: denied { unlink } for pid=8303 comm="yum" name="cut" dev=dm-0 ino=654845 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775079.728:11824): arch=40000003 syscall=38 success=yes exit=0 a0=e629fc0 a1=e6255e0 a2=d2a040 a3=e629fc0 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775079.768:11825): avc: denied { relabelfrom } for pid=8303 comm="yum" name="cut" dev=dm-0 ino=10314339 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:bin_t:s0 tclass=lnk_file type=AVC msg=audit(1163775079.768:11825): avc: denied { relabelto } for pid=8303 comm="yum" name="cut" dev=dm-0 ino=10314339 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775079.768:11825): arch=40000003 syscall=227 success=yes exit=0 a0=e6255e0 a1=a2f0d3 a2=e629fe0 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775079.768:11826): avc: denied { setattr } for pid=8303 comm="yum" name="cut" dev=dm-0 ino=10314339 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775079.768:11826): arch=40000003 syscall=198 success=yes exit=0 a0=e6255e0 a1=0 a2=0 a3=e9184bc items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775080.896:11827): avc: denied { write } for pid=8303 comm="yum" name="LC_MESSAGES" dev=dm-0 ino=10311907 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=dir type=AVC msg=audit(1163775080.896:11827): avc: denied { add_name } for pid=8303 comm="yum" name="coreutils.mo;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=dir type=SYSCALL msg=audit(1163775080.896:11827): arch=40000003 syscall=5 success=yes exit=30 a0=e6425b0 a1=8241 a2=1b6 a3=8241 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775080.896:11828): avc: denied { remove_name } for pid=8303 comm="yum" name="coreutils.mo;455dcb57" dev=dm-0 ino=10318523 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=dir type=SYSCALL msg=audit(1163775080.896:11828): arch=40000003 syscall=38 success=yes exit=0 a0=e6425b0 a1=e642478 a2=d2a040 a3=e6425b0 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775080.900:11829): avc: denied { relabelfrom } for pid=8303 comm="yum" name="LC_TIME" dev=dm-0 ino=10543998 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=dir type=AVC msg=audit(1163775080.900:11829): avc: denied { relabelto } for pid=8303 comm="yum" name="LC_TIME" dev=dm-0 ino=10543998 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=dir type=SYSCALL msg=audit(1163775080.900:11829): arch=40000003 syscall=227 success=yes exit=0 a0=e642538 a1=a2f0d3 a2=e642588 a3=1e items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775080.900:11830): avc: denied { setattr } for pid=8303 comm="yum" name="LC_TIME" dev=dm-0 ino=10543998 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=dir type=SYSCALL msg=audit(1163775080.900:11830): arch=40000003 syscall=212 success=yes exit=0 a0=e642538 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775080.900:11831): avc: denied { create } for pid=8303 comm="yum" name="coreutils.mo;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:locale_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775080.900:11831): arch=40000003 syscall=83 success=yes exit=0 a0=e5e2e98 a1=e642620 a2=508a38 a3=602c items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775080.916:11832): avc: denied { rename } for pid=8303 comm="yum" name="coreutils.mo;455dcb57" dev=dm-0 ino=10542613 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:locale_t:s0 tclass=lnk_file type=AVC msg=audit(1163775080.916:11832): avc: denied { unlink } for pid=8303 comm="yum" name="coreutils.mo" dev=dm-0 ino=10548217 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775080.916:11832): arch=40000003 syscall=38 success=yes exit=0 a0=e642620 a1=e6425f0 a2=d2a040 a3=e642620 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775080.924:11833): avc: denied { relabelfrom } for pid=8303 comm="yum" name="coreutils.mo" dev=dm-0 ino=10542613 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:locale_t:s0 tclass=lnk_file type=AVC msg=audit(1163775080.924:11833): avc: denied { relabelto } for pid=8303 comm="yum" name="coreutils.mo" dev=dm-0 ino=10542613 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775080.924:11833): arch=40000003 syscall=227 success=yes exit=0 a0=e6425f0 a1=a2f0d3 a2=e642538 a3=1e items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775080.924:11834): avc: denied { setattr } for pid=8303 comm="yum" name="coreutils.mo" dev=dm-0 ino=10542613 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775080.924:11834): arch=40000003 syscall=198 success=yes exit=0 a0=e6425f0 a1=0 a2=0 a3=e9184bc items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775086.344:11835): avc: denied { unlink } for pid=8885 comm="mv" name="dir" dev=dm-0 ino=10318269 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:usr_t:s0 tclass=file type=SYSCALL msg=audit(1163775086.344:11835): arch=40000003 syscall=38 success=yes exit=0 a0=bff70bda a1=bff70bf8 a2=805a75c a3=bff706ec items=0 ppid=8883 pid=8885 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="mv" exe="/bin/mv" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775087.908:11836): avc: denied { rmdir } for pid=8889 comm="rm" name="ro" dev=dm-0 ino=10672443 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=dir type=SYSCALL msg=audit(1163775087.908:11836): arch=40000003 syscall=40 success=yes exit=0 a0=9937960 a1=bfa45c34 a2=805277c a3=2 items=0 ppid=8888 pid=8889 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="rm" exe="/bin/rm" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775088.528:11837): avc: denied { relabelfrom } for pid=8303 comm="yum" name="scrollkeeper" dev=dm-0 ino=14438155 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:var_lib_t:s0 tclass=dir type=AVC msg=audit(1163775088.528:11837): avc: denied { relabelto } for pid=8303 comm="yum" name="scrollkeeper" dev=dm-0 ino=14438155 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:var_lib_t:s0 tclass=dir type=SYSCALL msg=audit(1163775088.528:11837): arch=40000003 syscall=227 success=yes exit=0 a0=e9aff48 a1=a2f0d3 a2=ea04d08 a3=1f items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775088.528:11838): avc: denied { setattr } for pid=8303 comm="yum" name="scrollkeeper" dev=dm-0 ino=14438155 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:var_lib_t:s0 tclass=dir type=SYSCALL msg=audit(1163775088.528:11838): arch=40000003 syscall=212 success=yes exit=0 a0=e9aff48 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775090.380:11839): avc: denied { append } for pid=8891 comm="sh" name="scrollkeeper.log" dev=dm-0 ino=14436937 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:var_log_t:s0 tclass=file type=SYSCALL msg=audit(1163775090.380:11839): arch=40000003 syscall=5 success=yes exit=3 a0=93a7168 a1=8441 a2=1b6 a3=8441 items=0 ppid=8890 pid=8891 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="sh" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775090.416:11840): avc: denied { write } for pid=8895 comm="rm" name="lib" dev=dm-0 ino=14436578 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:var_lib_t:s0 tclass=dir type=SYSCALL msg=audit(1163775090.416:11840): arch=40000003 syscall=10 success=no exit=-21 a0=bf9d5bf6 a1=0 a2=805277c a3=bf9d43d4 items=0 ppid=8891 pid=8895 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="rm" exe="/bin/rm" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775090.440:11841): avc: denied { write } for pid=8895 comm="rm" name="ro" dev=dm-0 ino=14438156 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:var_lib_t:s0 tclass=dir type=AVC msg=audit(1163775090.440:11841): avc: denied { remove_name } for pid=8895 comm="rm" name="scrollkeeper_cl.xml" dev=dm-0 ino=2618897 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:var_lib_t:s0 tclass=dir type=AVC msg=audit(1163775090.440:11841): avc: denied { unlink } for pid=8895 comm="rm" name="scrollkeeper_cl.xml" dev=dm-0 ino=2618897 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:var_lib_t:s0 tclass=file type=SYSCALL msg=audit(1163775090.440:11841): arch=40000003 syscall=10 success=yes exit=0 a0=853898f a1=853897c a2=805277c a3=bf9d43d4 items=0 ppid=8891 pid=8895 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="rm" exe="/bin/rm" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775090.480:11842): avc: denied { remove_name } for pid=8895 comm="rm" name="ro" dev=dm-0 ino=14438156 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:var_lib_t:s0 tclass=dir type=AVC msg=audit(1163775090.480:11842): avc: denied { rmdir } for pid=8895 comm="rm" name="ro" dev=dm-0 ino=14438156 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:var_lib_t:s0 tclass=dir type=SYSCALL msg=audit(1163775090.480:11842): arch=40000003 syscall=40 success=yes exit=0 a0=8538960 a1=bf9d43d4 a2=805277c a3=2 items=0 ppid=8891 pid=8895 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="rm" exe="/bin/rm" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775091.320:11843): avc: denied { rmdir } for pid=8895 comm="rm" name="scrollkeeper" dev=dm-0 ino=14438155 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:var_lib_t:s0 tclass=dir type=SYSCALL msg=audit(1163775091.320:11843): arch=40000003 syscall=40 success=yes exit=0 a0=8538960 a1=bf9d43d4 a2=805277c a3=2 items=0 ppid=8891 pid=8895 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="rm" exe="/bin/rm" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775091.460:11844): avc: denied { add_name } for pid=8896 comm="scrollkeeper-up" name="scrollkeeper" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:var_lib_t:s0 tclass=dir type=AVC msg=audit(1163775091.460:11844): avc: denied { create } for pid=8896 comm="scrollkeeper-up" name="scrollkeeper" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:var_lib_t:s0 tclass=dir type=SYSCALL msg=audit(1163775091.460:11844): arch=40000003 syscall=39 success=yes exit=0 a0=bfb32548 a1=1ed a2=658338 a3=9642869 items=0 ppid=8891 pid=8896 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="scrollkeeper-up" exe="/usr/bin/scrollkeeper-update" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775091.480:11845): avc: denied { write } for pid=8896 comm="scrollkeeper-up" name="scrollkeeper" dev=dm-0 ino=14567773 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:var_lib_t:s0 tclass=dir type=AVC msg=audit(1163775091.480:11845): avc: denied { add_name } for pid=8896 comm="scrollkeeper-up" name="ro" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:var_lib_t:s0 tclass=dir type=SYSCALL msg=audit(1163775091.480:11845): arch=40000003 syscall=39 success=yes exit=0 a0=bfb33008 a1=1ed a2=658338 a3=1 items=0 ppid=8891 pid=8896 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="scrollkeeper-up" exe="/usr/bin/scrollkeeper-update" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775091.480:11846): avc: denied { create } for pid=8896 comm="scrollkeeper-up" name="scrollkeeper_cl.xml" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:var_lib_t:s0 tclass=file type=SYSCALL msg=audit(1163775091.480:11846): arch=40000003 syscall=5 success=yes exit=5 a0=bfb32e08 a1=241 a2=1b6 a3=9643a30 items=0 ppid=8891 pid=8896 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="scrollkeeper-up" exe="/usr/bin/scrollkeeper-update" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775091.480:11847): avc: denied { write } for pid=8896 comm="scrollkeeper-up" name="scrollkeeper_cl.xml" dev=dm-0 ino=14567777 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:var_lib_t:s0 tclass=file type=SYSCALL msg=audit(1163775091.480:11847): arch=40000003 syscall=4 success=yes exit=4096 a0=5 a1=b7f09000 a2=1000 a3=1000 items=0 ppid=8891 pid=8896 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="scrollkeeper-up" exe="/usr/bin/scrollkeeper-update" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775091.480:11847): path="/var/lib/scrollkeeper/ro/scrollkeeper_cl.xml" type=AVC msg=audit(1163775092.981:11848): avc: denied { append } for pid=8896 comm="scrollkeeper-up" name="scrollkeeper_docs" dev=dm-0 ino=14567874 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:var_lib_t:s0 tclass=file type=SYSCALL msg=audit(1163775092.981:11848): arch=40000003 syscall=4 success=yes exit=181 a0=3 a1=b7f0a000 a2=b5 a3=b5 items=0 ppid=8891 pid=8896 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="scrollkeeper-up" exe="/usr/bin/scrollkeeper-update" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775092.981:11848): path="/var/lib/scrollkeeper/scrollkeeper_docs" type=AVC msg=audit(1163775124.923:11849): avc: denied { write } for pid=10895 comm="xmlcatalog" name="catalog" dev=dm-0 ino=9330418 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1163775124.923:11849): arch=40000003 syscall=5 success=yes exit=3 a0=bfb80be3 a1=8241 a2=1b6 a3=89a9d50 items=0 ppid=8890 pid=10895 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="xmlcatalog" exe="/usr/bin/xmlcatalog" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775125.199:11850): avc: denied { relabelfrom } for pid=8303 comm="yum" name="console.apps" dev=dm-0 ino=9330284 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:userhelper_conf_t:s0 tclass=dir type=AVC msg=audit(1163775125.199:11850): avc: denied { relabelto } for pid=8303 comm="yum" name="console.apps" dev=dm-0 ino=9330284 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:userhelper_conf_t:s0 tclass=dir type=SYSCALL msg=audit(1163775125.199:11850): arch=40000003 syscall=227 success=yes exit=0 a0=dc6c850 a1=a2f0d3 a2=e5f2e70 a3=27 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775125.207:11851): avc: denied { setattr } for pid=8303 comm="yum" name="console.apps" dev=dm-0 ino=9330284 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:userhelper_conf_t:s0 tclass=dir type=SYSCALL msg=audit(1163775125.207:11851): arch=40000003 syscall=212 success=yes exit=0 a0=dc6c850 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775125.463:11852): avc: denied { unlink } for pid=8303 comm="yum" name="pam_console_apply" dev=dm-0 ino=9984687 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:pam_console_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775125.463:11852): arch=40000003 syscall=38 success=yes exit=0 a0=ea2e4b0 a1=ea2f750 a2=d2a040 a3=ea2e4b0 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775125.535:11853): avc: denied { relabelto } for pid=8303 comm="yum" name="pam_console_apply" dev=dm-0 ino=9984592 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:pam_console_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775125.535:11853): arch=40000003 syscall=227 success=yes exit=0 a0=ea2f750 a1=a2f0d3 a2=ea352e0 a3=28 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775125.535:11854): avc: denied { setattr } for pid=8303 comm="yum" name="pam_console_apply" dev=dm-0 ino=9984592 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:pam_console_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775125.535:11854): arch=40000003 syscall=212 success=yes exit=0 a0=ea2f750 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775125.547:11855): avc: denied { unlink } for pid=8303 comm="yum" name="pam_timestamp_check" dev=dm-0 ino=9984596 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:pam_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775125.547:11855): arch=40000003 syscall=38 success=yes exit=0 a0=ea35320 a1=ea35300 a2=d2a040 a3=ea35320 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775125.547:11856): avc: denied { relabelto } for pid=8303 comm="yum" name="pam_timestamp_check" dev=dm-0 ino=9984614 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:pam_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775125.547:11856): arch=40000003 syscall=227 success=yes exit=0 a0=ea35300 a1=a2f0d3 a2=ea36290 a3=20 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775125.547:11857): avc: denied { setattr } for pid=8303 comm="yum" name="pam_timestamp_check" dev=dm-0 ino=9984614 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:pam_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775125.547:11857): arch=40000003 syscall=212 success=yes exit=0 a0=ea35300 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775125.551:11858): avc: denied { unlink } for pid=8303 comm="yum" name="unix_chkpwd" dev=dm-0 ino=9984659 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:chkpwd_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775125.551:11858): arch=40000003 syscall=38 success=yes exit=0 a0=ea35300 a1=ea2e4b0 a2=d2a040 a3=ea35300 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775125.591:11859): avc: denied { relabelto } for pid=8303 comm="yum" name="unix_chkpwd" dev=dm-0 ino=9984687 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:chkpwd_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775125.591:11859): arch=40000003 syscall=227 success=yes exit=0 a0=ea2e4b0 a1=a2f0d3 a2=ea3ded8 a3=23 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775125.591:11860): avc: denied { setattr } for pid=8303 comm="yum" name="unix_chkpwd" dev=dm-0 ino=9984687 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:chkpwd_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775125.591:11860): arch=40000003 syscall=212 success=yes exit=0 a0=ea2e4b0 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775125.651:11861): avc: denied { unlink } for pid=8303 comm="yum" name="Copyright" dev=dm-0 ino=10738705 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=file type=SYSCALL msg=audit(1163775125.651:11861): arch=40000003 syscall=38 success=yes exit=0 a0=ea427f0 a1=ea352b0 a2=d2a040 a3=ea427f0 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775125.671:11862): avc: denied { relabelto } for pid=8303 comm="yum" name="Copyright" dev=dm-0 ino=14731258 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=file type=SYSCALL msg=audit(1163775125.671:11862): arch=40000003 syscall=227 success=yes exit=0 a0=ea352b0 a1=a2f0d3 a2=ea42790 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775125.671:11863): avc: denied { setattr } for pid=8303 comm="yum" name="Copyright" dev=dm-0 ino=14731258 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=file type=SYSCALL msg=audit(1163775125.671:11863): arch=40000003 syscall=212 success=yes exit=0 a0=ea352b0 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775126.023:11864): avc: denied { unlink } for pid=8303 comm="yum" name="Linux-PAM.mo" dev=dm-0 ino=3109965 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1163775126.023:11864): arch=40000003 syscall=38 success=yes exit=0 a0=ea42828 a1=ea427f0 a2=d2a040 a3=ea42828 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775126.027:11865): avc: denied { relabelto } for pid=8303 comm="yum" name="Linux-PAM.mo" dev=dm-0 ino=10321235 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1163775126.027:11865): arch=40000003 syscall=227 success=yes exit=0 a0=ea427f0 a1=a2f0d3 a2=e64eac0 a3=1e items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775126.027:11866): avc: denied { setattr } for pid=8303 comm="yum" name="Linux-PAM.mo" dev=dm-0 ino=10321235 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1163775126.027:11866): arch=40000003 syscall=212 success=yes exit=0 a0=ea427f0 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775126.295:11867): avc: denied { write } for pid=8303 comm="yum" name="log" dev=dm-0 ino=14436604 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:var_log_t:s0 tclass=dir type=AVC msg=audit(1163775126.295:11867): avc: denied { add_name } for pid=8303 comm="yum" name="faillog;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:var_log_t:s0 tclass=dir type=AVC msg=audit(1163775126.295:11867): avc: denied { create } for pid=8303 comm="yum" name="faillog;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:var_log_t:s0 tclass=file type=SYSCALL msg=audit(1163775126.295:11867): arch=40000003 syscall=5 success=yes exit=30 a0=ea43e90 a1=8241 a2=1b6 a3=8241 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775126.295:11868): avc: denied { remove_name } for pid=8303 comm="yum" name="faillog;455dcb57" dev=dm-0 ino=14437882 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:var_log_t:s0 tclass=dir type=AVC msg=audit(1163775126.295:11868): avc: denied { rename } for pid=8303 comm="yum" name="faillog;455dcb57" dev=dm-0 ino=14437882 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:var_log_t:s0 tclass=file type=SYSCALL msg=audit(1163775126.295:11868): arch=40000003 syscall=38 success=yes exit=0 a0=ea43e90 a1=ea2e4b0 a2=d2a040 a3=ea43e90 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775126.299:11869): avc: denied { relabelfrom } for pid=8303 comm="yum" name="faillog" dev=dm-0 ino=14437882 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:var_log_t:s0 tclass=file type=AVC msg=audit(1163775126.299:11869): avc: denied { relabelto } for pid=8303 comm="yum" name="faillog" dev=dm-0 ino=14437882 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:faillog_t:s0 tclass=file type=SYSCALL msg=audit(1163775126.299:11869): arch=40000003 syscall=227 success=yes exit=0 a0=ea2e4b0 a1=a2f0d3 a2=eab52b8 a3=1f items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775126.299:11870): avc: denied { setattr } for pid=8303 comm="yum" name="faillog" dev=dm-0 ino=14437882 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:faillog_t:s0 tclass=file type=SYSCALL msg=audit(1163775126.299:11870): arch=40000003 syscall=212 success=yes exit=0 a0=ea2e4b0 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775126.323:11871): avc: denied { relabelfrom } for pid=8303 comm="yum" name="console" dev=dm-0 ino=14436665 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:pam_var_console_t:s0 tclass=dir type=AVC msg=audit(1163775126.323:11871): avc: denied { relabelto } for pid=8303 comm="yum" name="console" dev=dm-0 ino=14436665 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:pam_var_console_t:s0 tclass=dir type=SYSCALL msg=audit(1163775126.323:11871): arch=40000003 syscall=227 success=yes exit=0 a0=ea2e4b0 a1=a2f0d3 a2=ead9858 a3=27 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775126.323:11872): avc: denied { setattr } for pid=8303 comm="yum" name="console" dev=dm-0 ino=14436665 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:pam_var_console_t:s0 tclass=dir type=SYSCALL msg=audit(1163775126.323:11872): arch=40000003 syscall=212 success=yes exit=0 a0=ea2e4b0 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775129.171:11873): avc: denied { unlink } for pid=8303 comm="yum" name="liblber-2.3.so.0" dev=dm-0 ino=10314788 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:lib_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775129.171:11873): arch=40000003 syscall=38 success=yes exit=0 a0=ea3de88 a1=e658000 a2=d2a040 a3=ea3de88 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775129.251:11874): avc: denied { write } for pid=8303 comm="yum" name="doc" dev=dm-0 ino=10311844 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=dir type=AVC msg=audit(1163775129.251:11874): avc: denied { add_name } for pid=8303 comm="yum" name="openldap-2.3.30" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=dir type=SYSCALL msg=audit(1163775129.251:11874): arch=40000003 syscall=39 success=yes exit=0 a0=e6582a0 a1=1c0 a2=d2a040 a3=e6582a0 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775129.251:11875): avc: denied { relabelto } for pid=8303 comm="yum" name="openldap-2.3.30" dev=dm-0 ino=11099061 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=dir type=SYSCALL msg=audit(1163775129.251:11875): arch=40000003 syscall=227 success=yes exit=0 a0=e6582a0 a1=a2f0d3 a2=e658148 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775129.251:11876): avc: denied { setattr } for pid=8303 comm="yum" name="openldap-2.3.30" dev=dm-0 ino=11099061 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=dir type=SYSCALL msg=audit(1163775129.251:11876): arch=40000003 syscall=212 success=yes exit=0 a0=e6582a0 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775129.251:11877): avc: denied { remove_name } for pid=8303 comm="yum" name="ANNOUNCEMENT;455dcb57" dev=dm-0 ino=11099062 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=dir type=SYSCALL msg=audit(1163775129.251:11877): arch=40000003 syscall=38 success=yes exit=0 a0=e6581c0 a1=ead9888 a2=d2a040 a3=e6581c0 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775129.303:11878): avc: denied { relabelfrom } for pid=8303 comm="yum" name="openldap" dev=dm-0 ino=10574715 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=dir type=SYSCALL msg=audit(1163775129.303:11878): arch=40000003 syscall=227 success=yes exit=0 a0=e65bce8 a1=a2f0d3 a2=e52c110 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775148.900:11879): avc: denied { unlink } for pid=8303 comm="yum" name="gappletviewer" dev=dm-0 ino=10319685 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:java_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775148.900:11879): arch=40000003 syscall=38 success=yes exit=0 a0=e5f1d08 a1=e6a6140 a2=d2a040 a3=e5f1d08 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775148.996:11880): avc: denied { relabelto } for pid=8303 comm="yum" name="gappletviewer" dev=dm-0 ino=10317587 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:java_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775148.996:11880): arch=40000003 syscall=227 success=yes exit=0 a0=e6a6140 a1=a2f0d3 a2=e679d38 a3=21 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775148.996:11881): avc: denied { setattr } for pid=8303 comm="yum" name="gappletviewer" dev=dm-0 ino=10317587 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:java_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775148.996:11881): arch=40000003 syscall=212 success=yes exit=0 a0=e6a6140 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775155.072:11882): avc: denied { read } for pid=10924 comm="gij" name="[59846]" dev=pipefs ino=59846 scontext=staff_u:staff_r:staff_javaplugin_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=fifo_file type=AVC msg=audit(1163775155.072:11882): avc: denied { write } for pid=10924 comm="gij" name="[59868]" dev=pipefs ino=59868 scontext=staff_u:staff_r:staff_javaplugin_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=fifo_file type=SYSCALL msg=audit(1163775155.072:11882): arch=40000003 syscall=11 success=yes exit=0 a0=9c5b768 a1=9c5b838 a2=9c5d8d8 a3=9c5b670 items=0 ppid=10923 pid=10924 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="gij" exe="/usr/bin/gij" subj=staff_u:staff_r:staff_javaplugin_t:s0 key=(null) type=AVC_PATH msg=audit(1163775155.072:11882): path="pipe:[59868]" type=AVC_PATH msg=audit(1163775155.072:11882): path="pipe:[59846]" type=AVC msg=audit(1163775155.112:11883): avc: denied { sigchld } for pid=10923 comm="sh" scontext=staff_u:staff_r:staff_javaplugin_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=process type=AVC msg=audit(1163775155.236:11884): avc: denied { getattr } for pid=10924 comm="gij" name="[59868]" dev=pipefs ino=59868 scontext=staff_u:staff_r:staff_javaplugin_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=fifo_file type=SYSCALL msg=audit(1163775155.236:11884): arch=40000003 syscall=197 success=yes exit=0 a0=1 a1=bf9fc2a0 a2=262ff4 a3=2634c0 items=0 ppid=10923 pid=10924 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="gij" exe="/usr/bin/gij" subj=staff_u:staff_r:staff_javaplugin_t:s0 key=(null) type=AVC_PATH msg=audit(1163775155.236:11884): path="pipe:[59868]" type=SYSCALL msg=audit(1163775155.112:11883): arch=40000003 syscall=7 success=yes exit=10924 a0=ffffffff a1=bf98d6e8 a2=0 a3=9c5d5f0 items=0 ppid=10922 pid=10923 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="sh" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775155.916:11885): avc: denied { unlink } for pid=10958 comm="update-alternat" name="jaxp_parser_impl" dev=dm-0 ino=9329800 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:etc_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775155.916:11885): arch=40000003 syscall=10 success=yes exit=0 a0=bfb69870 a1=0 a2=81b2b40 a3=804c7f6 items=0 ppid=10922 pid=10958 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="update-alternat" exe="/usr/sbin/alternatives" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775155.916:11886): avc: denied { create } for pid=10958 comm="update-alternat" name="jaxp_parser_impl" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:etc_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775155.916:11886): arch=40000003 syscall=83 success=yes exit=0 a0=81b2a90 a1=bfb69870 a2=81b2b40 a3=804c7f6 items=0 ppid=10922 pid=10958 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="update-alternat" exe="/usr/sbin/alternatives" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775156.741:11887): avc: denied { unlink } for pid=8303 comm="yum" name="chage" dev=dm-0 ino=10321438 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:passwd_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775156.741:11887): arch=40000003 syscall=38 success=yes exit=0 a0=dc651c8 a1=eb14e48 a2=d2a040 a3=dc651c8 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775156.761:11888): avc: denied { relabelto } for pid=8303 comm="yum" name="chage" dev=dm-0 ino=10320806 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:passwd_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775156.761:11888): arch=40000003 syscall=227 success=yes exit=0 a0=eb14e48 a1=a2f0d3 a2=bc898f8 a3=23 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775156.761:11889): avc: denied { setattr } for pid=8303 comm="yum" name="chage" dev=dm-0 ino=10320806 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:passwd_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775156.761:11889): arch=40000003 syscall=212 success=yes exit=0 a0=eb14e48 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775156.777:11890): avc: denied { unlink } for pid=8303 comm="yum" name="gpasswd" dev=dm-0 ino=10325925 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:groupadd_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775156.777:11890): arch=40000003 syscall=38 success=yes exit=0 a0=eb15308 a1=eb14e48 a2=d2a040 a3=eb15308 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775156.781:11891): avc: denied { relabelto } for pid=8303 comm="yum" name="gpasswd" dev=dm-0 ino=10321799 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:groupadd_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775156.781:11891): arch=40000003 syscall=227 success=yes exit=0 a0=eb14e48 a1=a2f0d3 a2=ea7d7b0 a3=25 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775156.781:11892): avc: denied { setattr } for pid=8303 comm="yum" name="gpasswd" dev=dm-0 ino=10321799 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:groupadd_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775156.781:11892): arch=40000003 syscall=212 success=yes exit=0 a0=eb14e48 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775156.857:11893): avc: denied { create } for pid=8303 comm="yum" name="adduser;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:sbin_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775156.857:11893): arch=40000003 syscall=83 success=yes exit=0 a0=eb15ef8 a1=e5f0b10 a2=508a38 a3=602c items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775156.857:11894): avc: denied { rename } for pid=8303 comm="yum" name="adduser;455dcb57" dev=dm-0 ino=10317247 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:sbin_t:s0 tclass=lnk_file type=AVC msg=audit(1163775156.857:11894): avc: denied { unlink } for pid=8303 comm="yum" name="adduser" dev=dm-0 ino=10330001 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:sbin_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775156.857:11894): arch=40000003 syscall=38 success=yes exit=0 a0=e5f0b10 a1=eb14e48 a2=d2a040 a3=e5f0b10 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775156.857:11895): avc: denied { relabelfrom } for pid=8303 comm="yum" name="adduser" dev=dm-0 ino=10317247 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:sbin_t:s0 tclass=lnk_file type=AVC msg=audit(1163775156.857:11895): avc: denied { relabelto } for pid=8303 comm="yum" name="adduser" dev=dm-0 ino=10317247 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:sbin_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775156.857:11895): arch=40000003 syscall=227 success=yes exit=0 a0=eb14e48 a1=a2f0d3 a2=ea7da60 a3=1c items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775156.857:11896): avc: denied { setattr } for pid=8303 comm="yum" name="adduser" dev=dm-0 ino=10317247 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:sbin_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775156.857:11896): arch=40000003 syscall=198 success=yes exit=0 a0=eb14e48 a1=0 a2=0 a3=e5d8d4c items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775156.889:11897): avc: denied { unlink } for pid=8303 comm="yum" name="grpconv" dev=dm-0 ino=10333815 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:admin_passwd_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775156.889:11897): arch=40000003 syscall=38 success=yes exit=0 a0=eb33fa0 a1=eb14e48 a2=d2a040 a3=eb33fa0 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775156.889:11898): avc: denied { relabelto } for pid=8303 comm="yum" name="grpconv" dev=dm-0 ino=10321538 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:admin_passwd_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775156.889:11898): arch=40000003 syscall=227 success=yes exit=0 a0=eb14e48 a1=a2f0d3 a2=eb34a30 a3=29 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775156.889:11899): avc: denied { setattr } for pid=8303 comm="yum" name="grpconv" dev=dm-0 ino=10321538 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:admin_passwd_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775156.889:11899): arch=40000003 syscall=212 success=yes exit=0 a0=eb14e48 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775156.901:11900): avc: denied { unlink } for pid=8303 comm="yum" name="useradd" dev=dm-0 ino=10322649 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:useradd_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775156.901:11900): arch=40000003 syscall=38 success=yes exit=0 a0=eb41178 a1=e5f1540 a2=d2a040 a3=eb41178 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775156.921:11901): avc: denied { relabelto } for pid=8303 comm="yum" name="useradd" dev=dm-0 ino=10321811 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:useradd_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775156.921:11901): arch=40000003 syscall=227 success=yes exit=0 a0=e5f1540 a1=a2f0d3 a2=eb49f08 a3=24 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775156.921:11902): avc: denied { setattr } for pid=8303 comm="yum" name="useradd" dev=dm-0 ino=10321811 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:useradd_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775156.921:11902): arch=40000003 syscall=212 success=yes exit=0 a0=e5f1540 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775157.709:11903): avc: denied { create } for pid=8303 comm="yum" name="adduser.8.gz;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:man_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775157.709:11903): arch=40000003 syscall=83 success=yes exit=0 a0=eb15ef8 a1=eb4c5d0 a2=508a38 a3=602c items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775157.709:11904): avc: denied { rename } for pid=8303 comm="yum" name="adduser.8.gz;455dcb57" dev=dm-0 ino=10317994 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:man_t:s0 tclass=lnk_file type=AVC msg=audit(1163775157.709:11904): avc: denied { unlink } for pid=8303 comm="yum" name="adduser.8.gz" dev=dm-0 ino=10317995 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:man_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775157.709:11904): arch=40000003 syscall=38 success=yes exit=0 a0=eb4c5d0 a1=eb4c460 a2=d2a040 a3=eb4c5d0 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775157.709:11905): avc: denied { relabelfrom } for pid=8303 comm="yum" name="adduser.8.gz" dev=dm-0 ino=10317994 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:man_t:s0 tclass=lnk_file type=AVC msg=audit(1163775157.709:11905): avc: denied { relabelto } for pid=8303 comm="yum" name="adduser.8.gz" dev=dm-0 ino=10317994 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:man_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775157.709:11905): arch=40000003 syscall=227 success=yes exit=0 a0=eb4c460 a1=a2f0d3 a2=eb4c720 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775157.709:11906): avc: denied { setattr } for pid=8303 comm="yum" name="adduser.8.gz" dev=dm-0 ino=10317994 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:man_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775157.709:11906): arch=40000003 syscall=198 success=yes exit=0 a0=eb4c460 a1=0 a2=0 a3=e5d8d4c items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775157.853:11907): avc: denied { write } for pid=8303 comm="yum" name="man3" dev=dm-0 ino=10542601 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:man_t:s0 tclass=dir type=AVC msg=audit(1163775157.853:11907): avc: denied { add_name } for pid=8303 comm="yum" name="getspnam.3.gz;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:man_t:s0 tclass=dir type=SYSCALL msg=audit(1163775157.853:11907): arch=40000003 syscall=5 success=yes exit=30 a0=eb4d1c0 a1=8241 a2=1b6 a3=8241 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775157.861:11908): avc: denied { remove_name } for pid=8303 comm="yum" name="getspnam.3.gz;455dcb57" dev=dm-0 ino=10543859 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:man_t:s0 tclass=dir type=SYSCALL msg=audit(1163775157.861:11908): arch=40000003 syscall=38 success=yes exit=0 a0=eb4d1c0 a1=eb4d168 a2=d2a040 a3=eb4d1c0 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775160.805:11909): avc: denied { execute } for pid=10978 comm="sh" name="useradd" dev=dm-0 ino=10321811 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:useradd_exec_t:s0 tclass=file type=AVC msg=audit(1163775160.805:11909): avc: denied { execute_no_trans } for pid=10978 comm="sh" name="useradd" dev=dm-0 ino=10321811 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:useradd_exec_t:s0 tclass=file type=AVC msg=audit(1163775160.805:11909): avc: denied { read } for pid=10978 comm="sh" name="useradd" dev=dm-0 ino=10321811 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:useradd_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775160.805:11909): arch=40000003 syscall=11 success=yes exit=0 a0=9aa9278 a1=9aa8ae8 a2=9aa94b0 a3=9aa8e10 items=0 ppid=10977 pid=10978 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="useradd" exe="/usr/sbin/useradd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775160.805:11909): path="/usr/sbin/useradd" type=AVC_PATH msg=audit(1163775160.805:11909): path="/usr/sbin/useradd" type=AVC msg=audit(1163775160.901:11910): avc: denied { audit_write } for pid=10978 comm="useradd" capability=29 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=capability type=USER_CHAUTHTOK msg=audit(1163775160.901:11911): user pid=10978 uid=0 auid=500 subj=staff_u:staff_r:staff_t:s0 msg='op=adding user acct=dbus exe="/usr/sbin/useradd" (hostname=?, addr=?, terminal=pts/1 res=failed)' type=SYSCALL msg=audit(1163775160.901:11910): arch=40000003 syscall=102 success=yes exit=116 a0=b a1=bffa7ed0 a2=a47ff4 a3=bffae920 items=0 ppid=10977 pid=10978 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="useradd" exe="/usr/sbin/useradd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775160.913:11912): avc: denied { create } for pid=8303 comm="yum" name="dbus-cleanup-sockets;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1163775160.913:11912): arch=40000003 syscall=5 success=yes exit=30 a0=eb4d550 a1=8241 a2=1b6 a3=8241 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775160.921:11913): avc: denied { write } for pid=8303 comm="yum" name="dbus-cleanup-sockets;455dcb57" dev=dm-0 ino=13683789 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1163775160.921:11913): arch=40000003 syscall=4 success=yes exit=7800 a0=1e a1=b6f50000 a2=1e78 a3=e6a5630 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775160.921:11913): path="/bin/dbus-cleanup-sockets;455dcb57" type=AVC msg=audit(1163775160.921:11914): avc: denied { rename } for pid=8303 comm="yum" name="dbus-cleanup-sockets;455dcb57" dev=dm-0 ino=13683789 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1163775160.921:11914): arch=40000003 syscall=38 success=yes exit=0 a0=eb4d550 a1=e5f1ce8 a2=d2a040 a3=eb4d550 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775160.941:11915): avc: denied { relabelfrom } for pid=8303 comm="yum" name="dbus-cleanup-sockets" dev=dm-0 ino=13683789 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1163775160.941:11915): arch=40000003 syscall=227 success=yes exit=0 a0=e5f1ce8 a1=a2f0d3 a2=eb4b930 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775160.981:11916): avc: denied { unlink } for pid=8303 comm="yum" name="dbus-daemon" dev=dm-0 ino=13683713 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:system_dbusd_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775160.981:11916): arch=40000003 syscall=38 success=yes exit=0 a0=e5f1ce8 a1=eb4d0d0 a2=d2a040 a3=e5f1ce8 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775160.981:11917): avc: denied { relabelto } for pid=8303 comm="yum" name="dbus-daemon" dev=dm-0 ino=13683727 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:system_dbusd_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775160.981:11917): arch=40000003 syscall=227 success=yes exit=0 a0=eb4d0d0 a1=a2f0d3 a2=e6a5840 a3=29 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775160.981:11918): avc: denied { setattr } for pid=8303 comm="yum" name="dbus-daemon" dev=dm-0 ino=13683727 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:system_dbusd_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775160.981:11918): arch=40000003 syscall=212 success=yes exit=0 a0=eb4d0d0 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775161.057:11919): avc: denied { relabelfrom } for pid=8303 comm="yum" name="dbus-1" dev=dm-0 ino=9329778 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:dbusd_etc_t:s0 tclass=dir type=AVC msg=audit(1163775161.057:11919): avc: denied { relabelto } for pid=8303 comm="yum" name="dbus-1" dev=dm-0 ino=9329778 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:dbusd_etc_t:s0 tclass=dir type=SYSCALL msg=audit(1163775161.057:11919): arch=40000003 syscall=227 success=yes exit=0 a0=e11dfc8 a1=a2f0d3 a2=ea73908 a3=21 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775161.077:11920): avc: denied { setattr } for pid=8303 comm="yum" name="dbus-1" dev=dm-0 ino=9329778 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:dbusd_etc_t:s0 tclass=dir type=SYSCALL msg=audit(1163775161.077:11920): arch=40000003 syscall=212 success=yes exit=0 a0=e11dfc8 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775161.077:11921): avc: denied { write } for pid=8303 comm="yum" name="dbus-1" dev=dm-0 ino=9329778 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:dbusd_etc_t:s0 tclass=dir type=AVC msg=audit(1163775161.077:11921): avc: denied { add_name } for pid=8303 comm="yum" name="session.conf;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:dbusd_etc_t:s0 tclass=dir type=AVC msg=audit(1163775161.077:11921): avc: denied { create } for pid=8303 comm="yum" name="session.conf;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:dbusd_etc_t:s0 tclass=file type=SYSCALL msg=audit(1163775161.077:11921): arch=40000003 syscall=5 success=yes exit=30 a0=ea73908 a1=8241 a2=1b6 a3=8241 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775161.081:11922): avc: denied { write } for pid=8303 comm="yum" name="session.conf;455dcb57" dev=dm-0 ino=9329933 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:dbusd_etc_t:s0 tclass=file type=SYSCALL msg=audit(1163775161.081:11922): arch=40000003 syscall=4 success=yes exit=1016 a0=1e a1=b6f50000 a2=3f8 a3=ea73980 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775161.081:11922): path="/etc/dbus-1/session.conf;455dcb57" type=AVC msg=audit(1163775161.081:11923): avc: denied { remove_name } for pid=8303 comm="yum" name="session.conf;455dcb57" dev=dm-0 ino=9329933 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:dbusd_etc_t:s0 tclass=dir type=AVC msg=audit(1163775161.081:11923): avc: denied { rename } for pid=8303 comm="yum" name="session.conf;455dcb57" dev=dm-0 ino=9329933 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:dbusd_etc_t:s0 tclass=file type=AVC msg=audit(1163775161.081:11923): avc: denied { unlink } for pid=8303 comm="yum" name="session.conf" dev=dm-0 ino=9330291 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:dbusd_etc_t:s0 tclass=file type=SYSCALL msg=audit(1163775161.081:11923): arch=40000003 syscall=38 success=yes exit=0 a0=ea73908 a1=eb4b930 a2=d2a040 a3=ea73908 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775161.085:11924): avc: denied { relabelfrom } for pid=8303 comm="yum" name="session.conf" dev=dm-0 ino=9329933 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:dbusd_etc_t:s0 tclass=file type=AVC msg=audit(1163775161.085:11924): avc: denied { relabelto } for pid=8303 comm="yum" name="session.conf" dev=dm-0 ino=9329933 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:dbusd_etc_t:s0 tclass=file type=SYSCALL msg=audit(1163775161.085:11924): arch=40000003 syscall=227 success=yes exit=0 a0=eb4b930 a1=a2f0d3 a2=ea73908 a3=21 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775161.085:11925): avc: denied { setattr } for pid=8303 comm="yum" name="session.conf" dev=dm-0 ino=9329933 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:dbusd_etc_t:s0 tclass=file type=SYSCALL msg=audit(1163775161.085:11925): arch=40000003 syscall=212 success=yes exit=0 a0=eb4b930 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775161.097:11926): avc: denied { unlink } for pid=8303 comm="yum" name="messagebus" dev=dm-0 ino=9331033 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775161.097:11926): arch=40000003 syscall=38 success=yes exit=0 a0=e6a5808 a1=eb4b930 a2=d2a040 a3=e6a5808 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775161.101:11927): avc: denied { relabelto } for pid=8303 comm="yum" name="messagebus" dev=dm-0 ino=9330223 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775161.101:11927): arch=40000003 syscall=227 success=yes exit=0 a0=eb4b930 a1=a2f0d3 a2=ea73958 a3=23 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775161.101:11928): avc: denied { setattr } for pid=8303 comm="yum" name="messagebus" dev=dm-0 ino=9330223 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775161.101:11928): arch=40000003 syscall=212 success=yes exit=0 a0=eb4b930 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775161.157:11929): avc: denied { create } for pid=8303 comm="yum" name="dbus-1.0.0" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:usr_t:s0 tclass=dir type=SYSCALL msg=audit(1163775161.157:11929): arch=40000003 syscall=39 success=yes exit=0 a0=ea7cf00 a1=1c0 a2=d2a040 a3=ea7cf00 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775161.157:11930): avc: denied { relabelfrom } for pid=8303 comm="yum" name="dbus-1.0.0" dev=dm-0 ino=11099077 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:usr_t:s0 tclass=dir type=SYSCALL msg=audit(1163775161.157:11930): arch=40000003 syscall=227 success=yes exit=0 a0=ea7cf00 a1=a2f0d3 a2=eb5e6a0 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775161.157:11931): avc: denied { create } for pid=8303 comm="yum" name="COPYING;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:usr_t:s0 tclass=file type=SYSCALL msg=audit(1163775161.157:11931): arch=40000003 syscall=5 success=yes exit=30 a0=eb5e6c0 a1=8241 a2=1b6 a3=8241 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775161.157:11932): avc: denied { write } for pid=8303 comm="yum" name="COPYING;455dcb57" dev=dm-0 ino=11099078 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:usr_t:s0 tclass=file type=SYSCALL msg=audit(1163775161.157:11932): arch=40000003 syscall=4 success=yes exit=24576 a0=1e a1=eb4d890 a2=6000 a3=eb5e6f0 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775161.157:11932): path="/usr/share/doc/dbus-1.0.0/COPYING;455dcb57" type=AVC msg=audit(1163775161.157:11933): avc: denied { rename } for pid=8303 comm="yum" name="COPYING;455dcb57" dev=dm-0 ino=11099078 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:usr_t:s0 tclass=file type=SYSCALL msg=audit(1163775161.157:11933): arch=40000003 syscall=38 success=yes exit=0 a0=eb5e6c0 a1=ea73930 a2=d2a040 a3=eb5e6c0 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775161.165:11934): avc: denied { relabelfrom } for pid=8303 comm="yum" name="COPYING" dev=dm-0 ino=11099078 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:usr_t:s0 tclass=file type=SYSCALL msg=audit(1163775161.165:11934): arch=40000003 syscall=227 success=yes exit=0 a0=ea73930 a1=a2f0d3 a2=ea7cf00 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775161.213:11935): avc: denied { relabelfrom } for pid=8303 comm="yum" name="dbus" dev=dm-0 ino=14567750 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:var_lib_t:s0 tclass=dir type=SYSCALL msg=audit(1163775161.213:11935): arch=40000003 syscall=227 success=yes exit=0 a0=eb5e9f8 a1=a2f0d3 a2=ea73930 a3=1f items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775161.221:11936): avc: denied { relabelfrom } for pid=8303 comm="yum" name="dbus" dev=dm-0 ino=14436623 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:system_dbusd_var_run_t:s0 tclass=dir type=AVC msg=audit(1163775161.221:11936): avc: denied { relabelto } for pid=8303 comm="yum" name="dbus" dev=dm-0 ino=14436623 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:system_dbusd_var_run_t:s0 tclass=dir type=SYSCALL msg=audit(1163775161.221:11936): arch=40000003 syscall=227 success=yes exit=0 a0=eb5e9f8 a1=a2f0d3 a2=eb7a868 a3=2c items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775161.221:11937): avc: denied { setattr } for pid=8303 comm="yum" name="dbus" dev=dm-0 ino=14436623 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:system_dbusd_var_run_t:s0 tclass=dir type=SYSCALL msg=audit(1163775161.221:11937): arch=40000003 syscall=212 success=yes exit=0 a0=eb5e9f8 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775163.505:11938): avc: denied { create } for pid=8303 comm="yum" name="xfce-mcs-manager.mo;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1163775163.505:11938): arch=40000003 syscall=5 success=yes exit=30 a0=e690328 a1=8241 a2=1b6 a3=8241 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775163.505:11939): avc: denied { write } for pid=8303 comm="yum" name="xfce-mcs-manager.mo;455dcb57" dev=dm-0 ino=10321875 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1163775163.505:11939): arch=40000003 syscall=4 success=yes exit=560 a0=1e a1=b6f50000 a2=230 a3=eb2dc88 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775163.505:11939): path="/usr/share/locale/ar/LC_MESSAGES/xfce-mcs-manager.mo;455dcb57" type=AVC msg=audit(1163775163.509:11940): avc: denied { rename } for pid=8303 comm="yum" name="xfce-mcs-manager.mo;455dcb57" dev=dm-0 ino=10321875 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1163775163.509:11940): arch=40000003 syscall=38 success=yes exit=0 a0=e690328 a1=eb2ddf0 a2=d2a040 a3=e690328 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775163.517:11941): avc: denied { relabelfrom } for pid=8303 comm="yum" name="xfce-mcs-manager.mo" dev=dm-0 ino=10321875 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1163775163.517:11941): arch=40000003 syscall=227 success=yes exit=0 a0=eb2ddf0 a1=a2f0d3 a2=eb2ddc8 a3=1e items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775164.965:11942): avc: denied { create } for pid=8303 comm="yum" name="add.png;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:usr_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775164.965:11942): arch=40000003 syscall=83 success=yes exit=0 a0=ebc2888 a1=dc65200 a2=508a38 a3=602c items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775164.965:11943): avc: denied { rename } for pid=8303 comm="yum" name="add.png;455dcb57" dev=dm-0 ino=13061670 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:usr_t:s0 tclass=lnk_file type=AVC msg=audit(1163775164.965:11943): avc: denied { unlink } for pid=8303 comm="yum" name="add.png" dev=dm-0 ino=13063759 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775164.965:11943): arch=40000003 syscall=38 success=yes exit=0 a0=dc65200 a1=e6a53d8 a2=d2a040 a3=dc65200 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775164.977:11944): avc: denied { relabelfrom } for pid=8303 comm="yum" name="add.png" dev=dm-0 ino=13061670 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:usr_t:s0 tclass=lnk_file type=AVC msg=audit(1163775164.977:11944): avc: denied { relabelto } for pid=8303 comm="yum" name="add.png" dev=dm-0 ino=13061670 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775164.977:11944): arch=40000003 syscall=227 success=yes exit=0 a0=e6a53d8 a1=a2f0d3 a2=dc65240 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775164.977:11945): avc: denied { setattr } for pid=8303 comm="yum" name="add.png" dev=dm-0 ino=13061670 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775164.977:11945): arch=40000003 syscall=198 success=yes exit=0 a0=e6a53d8 a1=0 a2=0 a3=e5d7a34 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775188.875:11946): avc: denied { unlink } for pid=10990 comm="gtk-update-icon" name=".icon-theme.cache" dev=dm-0 ino=10378011 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:usr_t:s0 tclass=file type=SYSCALL msg=audit(1163775188.875:11946): arch=40000003 syscall=10 success=yes exit=0 a0=9f37be0 a1=1 a2=412708 a3=0 items=0 ppid=10984 pid=10990 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="gtk-update-icon" exe="/usr/bin/gtk-update-icon-cache" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775197.651:11947): avc: denied { getattr } for pid=8368 comm="thunderbird-bin" name="localtime" dev=dm-0 ino=9331954 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1163775197.651:11947): arch=40000003 syscall=195 success=yes exit=0 a0=c36800 a1=bfae855c a2=c4eff4 a3=0 items=0 ppid=8363 pid=8368 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird-bin" exe="/usr/lib/thunderbird-1.5.0.7/thunderbird-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC_PATH msg=audit(1163775197.651:11947): path="/etc/localtime" type=AVC msg=audit(1163775197.655:11948): avc: denied { read } for pid=8368 comm="thunderbird-bin" name="localtime" dev=dm-0 ino=9331954 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1163775197.655:11948): arch=40000003 syscall=5 success=yes exit=43 a0=c36800 a1=0 a2=1b6 a3=ac8bf48 items=0 ppid=8363 pid=8368 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird-bin" exe="/usr/lib/thunderbird-1.5.0.7/thunderbird-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC msg=audit(1163775219.792:11949): avc: denied { read } for pid=11018 comm="mozilla-xremote" name=".gdmV8RYIT" dev=dm-0 ino=14469571 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163775219.792:11949): arch=40000003 syscall=33 success=yes exit=0 a0=bfd34f92 a1=4 a2=252a64 a3=bfd34f92 items=0 ppid=11017 pid=11018 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="mozilla-xremote" exe="/usr/lib/firefox-2.0/mozilla-xremote-client" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775221.509:11950): avc: denied { read } for pid=11015 comm="firefox-bin" name=".gdmV8RYIT" dev=dm-0 ino=14469571 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163775221.509:11950): arch=40000003 syscall=33 success=yes exit=0 a0=bf969fcb a1=4 a2=83ea64 a3=bf969fcb items=0 ppid=1 pid=11015 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163775221.509:11951): avc: denied { getattr } for pid=11015 comm="firefox-bin" name=".gdmV8RYIT" dev=dm-0 ino=14469571 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163775221.509:11951): arch=40000003 syscall=197 success=yes exit=0 a0=4 a1=bf96758c a2=c4cff4 a3=8f41140 items=0 ppid=1 pid=11015 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163775221.509:11951): path="/tmp/.gdmV8RYIT" type=AVC msg=audit(1163775228.225:11952): avc: denied { append } for pid=8303 comm="yum" name="yum.log" dev=dm-0 ino=8707846 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:rpm_log_t:s0 tclass=file type=SYSCALL msg=audit(1163775228.225:11952): arch=40000003 syscall=4 success=yes exit=55 a0=4 a1=b7bd1000 a2=37 a3=37 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775228.225:11952): path="/var/log/yum.log" type=AVC msg=audit(1163775228.409:11953): avc: denied { write } for pid=8303 comm="yum" name="lib" dev=dm-0 ino=10311854 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=dir type=AVC msg=audit(1163775228.409:11953): avc: denied { add_name } for pid=8303 comm="yum" name="libsoup-2.2.so.8;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=dir type=SYSCALL msg=audit(1163775228.409:11953): arch=40000003 syscall=83 success=yes exit=0 a0=ebefb20 a1=eb04ab8 a2=508a38 a3=602c items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775228.409:11954): avc: denied { remove_name } for pid=8303 comm="yum" name="libsoup-2.2.so.8;455dcb57" dev=dm-0 ino=10333004 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=dir type=SYSCALL msg=audit(1163775228.409:11954): arch=40000003 syscall=38 success=yes exit=0 a0=eb04ab8 a1=e69bed0 a2=d2a040 a3=eb04ab8 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775228.445:11955): avc: denied { relabelto } for pid=8303 comm="yum" name="libsoup-2.2.so.8.5.0" dev=dm-0 ino=10333007 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:shlib_t:s0 tclass=file type=SYSCALL msg=audit(1163775228.445:11955): arch=40000003 syscall=227 success=yes exit=0 a0=eb04ab8 a1=a2f0d3 a2=ea5f800 a3=1d items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775228.445:11956): avc: denied { setattr } for pid=8303 comm="yum" name="libsoup-2.2.so.8.5.0" dev=dm-0 ino=10333007 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:shlib_t:s0 tclass=file type=SYSCALL msg=audit(1163775228.445:11956): arch=40000003 syscall=212 success=yes exit=0 a0=eb04ab8 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775231.461:11957): avc: denied { write } for pid=11030 comm="ldconfig" name="etc" dev=dm-0 ino=9329761 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=dir type=AVC msg=audit(1163775231.461:11957): avc: denied { add_name } for pid=11030 comm="ldconfig" name="ld.so.cache~" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=dir type=SYSCALL msg=audit(1163775231.461:11957): arch=40000003 syscall=5 success=yes exit=3 a0=8c60b20 a1=20241 a2=1a4 a3=8c60b20 items=0 ppid=8303 pid=11030 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="ldconfig" exe="/sbin/ldconfig" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775231.461:11958): avc: denied { remove_name } for pid=11030 comm="ldconfig" name="ld.so.cache~" dev=dm-0 ino=9331033 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=dir type=SYSCALL msg=audit(1163775231.461:11958): arch=40000003 syscall=38 success=yes exit=0 a0=8c60b20 a1=bfc904d0 a2=bfc90450 a3=8c60b20 items=0 ppid=8303 pid=11030 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="ldconfig" exe="/sbin/ldconfig" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775234.185:11959): avc: denied { unlink } for pid=8303 comm="yum" name="helpers.rc" dev=dm-0 ino=9334371 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1163775234.185:11959): arch=40000003 syscall=38 success=yes exit=0 a0=ea5eca0 a1=eb040f8 a2=d2a040 a3=ea5eca0 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775234.197:11960): avc: denied { relabelto } for pid=8303 comm="yum" name="helpers.rc" dev=dm-0 ino=9330558 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1163775234.197:11960): arch=40000003 syscall=227 success=yes exit=0 a0=eb040f8 a1=a2f0d3 a2=ebeebb8 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775234.197:11961): avc: denied { setattr } for pid=8303 comm="yum" name="helpers.rc" dev=dm-0 ino=9330558 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1163775234.197:11961): arch=40000003 syscall=212 success=yes exit=0 a0=eb040f8 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775236.106:11962): avc: denied { write } for pid=8303 comm="yum" name="exo-0.3" dev=dm-0 ino=10344948 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:usr_t:s0 tclass=dir type=AVC msg=audit(1163775236.106:11962): avc: denied { add_name } for pid=8303 comm="yum" name="exo-thumbnail-frame.png;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:usr_t:s0 tclass=dir type=SYSCALL msg=audit(1163775236.106:11962): arch=40000003 syscall=5 success=yes exit=30 a0=ebb21b8 a1=8241 a2=1b6 a3=8241 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775236.118:11963): avc: denied { remove_name } for pid=8303 comm="yum" name="exo-thumbnail-frame.png;455dcb57" dev=dm-0 ino=10344947 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:usr_t:s0 tclass=dir type=SYSCALL msg=audit(1163775236.118:11963): arch=40000003 syscall=38 success=yes exit=0 a0=ebb21b8 a1=ebb2060 a2=d2a040 a3=ebb21b8 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775239.770:11964): avc: denied { unlink } for pid=8303 comm="yum" name="libaprutil-1.so.0.2.7" dev=dm-0 ino=10321183 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:shlib_t:s0 tclass=file type=SYSCALL msg=audit(1163775239.770:11964): arch=40000003 syscall=38 success=yes exit=0 a0=ebcbe48 a1=e6598f8 a2=d2a040 a3=ebcbe48 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775240.926:11965): avc: denied { relabelfrom } for pid=8303 comm="yum" name="dev.d" dev=dm-0 ino=9330472 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=dir type=AVC msg=audit(1163775240.926:11965): avc: denied { relabelto } for pid=8303 comm="yum" name="dev.d" dev=dm-0 ino=9330472 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=dir type=SYSCALL msg=audit(1163775240.926:11965): arch=40000003 syscall=227 success=yes exit=0 a0=e68d5f0 a1=a2f0d3 a2=ebcbec8 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775240.926:11966): avc: denied { setattr } for pid=8303 comm="yum" name="dev.d" dev=dm-0 ino=9330472 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=dir type=SYSCALL msg=audit(1163775240.926:11966): arch=40000003 syscall=212 success=yes exit=0 a0=e68d5f0 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775241.090:11967): avc: denied { relabelfrom } for pid=8303 comm="yum" name="firmware" dev=dm-0 ino=13716612 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=dir type=AVC msg=audit(1163775241.090:11967): avc: denied { relabelto } for pid=8303 comm="yum" name="firmware" dev=dm-0 ino=13716612 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=dir type=SYSCALL msg=audit(1163775241.090:11967): arch=40000003 syscall=227 success=yes exit=0 a0=e68d5f0 a1=a2f0d3 a2=ebcbee8 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775241.090:11968): avc: denied { setattr } for pid=8303 comm="yum" name="firmware" dev=dm-0 ino=13716612 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=dir type=SYSCALL msg=audit(1163775241.090:11968): arch=40000003 syscall=212 success=yes exit=0 a0=e68d5f0 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775241.262:11969): avc: denied { unlink } for pid=8303 comm="yum" name="scsi_id" dev=dm-0 ino=13717608 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:sbin_t:s0 tclass=file type=SYSCALL msg=audit(1163775241.262:11969): arch=40000003 syscall=38 success=yes exit=0 a0=eb863d8 a1=eb858f8 a2=d2a040 a3=eb863d8 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775241.310:11970): avc: denied { relabelto } for pid=8303 comm="yum" name="scsi_id" dev=dm-0 ino=13717607 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:sbin_t:s0 tclass=file type=SYSCALL msg=audit(1163775241.310:11970): arch=40000003 syscall=227 success=yes exit=0 a0=eb858f8 a1=a2f0d3 a2=eb86398 a3=1c items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775241.310:11971): avc: denied { setattr } for pid=8303 comm="yum" name="scsi_id" dev=dm-0 ino=13717607 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:sbin_t:s0 tclass=file type=SYSCALL msg=audit(1163775241.310:11971): arch=40000003 syscall=212 success=yes exit=0 a0=eb858f8 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775241.386:11972): avc: denied { create } for pid=8303 comm="yum" name="firmware_helper;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:sbin_t:s0 tclass=file type=SYSCALL msg=audit(1163775241.386:11972): arch=40000003 syscall=5 success=yes exit=30 a0=eb81dd0 a1=8241 a2=1b6 a3=8241 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775241.386:11973): avc: denied { write } for pid=8303 comm="yum" name="firmware_helper;455dcb57" dev=dm-0 ino=9984659 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:sbin_t:s0 tclass=file type=SYSCALL msg=audit(1163775241.386:11973): arch=40000003 syscall=4 success=yes exit=5824 a0=1e a1=b6ebb000 a2=16c0 a3=eb880b8 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775241.386:11973): path="/sbin/firmware_helper;455dcb57" type=AVC msg=audit(1163775241.386:11974): avc: denied { rename } for pid=8303 comm="yum" name="firmware_helper;455dcb57" dev=dm-0 ino=9984659 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:sbin_t:s0 tclass=file type=SYSCALL msg=audit(1163775241.386:11974): arch=40000003 syscall=38 success=yes exit=0 a0=eb81dd0 a1=eb88098 a2=d2a040 a3=eb81dd0 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775241.414:11975): avc: denied { relabelfrom } for pid=8303 comm="yum" name="firmware_helper" dev=dm-0 ino=9984659 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:sbin_t:s0 tclass=file type=SYSCALL msg=audit(1163775241.414:11975): arch=40000003 syscall=227 success=yes exit=0 a0=eb88098 a1=a2f0d3 a2=eb88008 a3=1c items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775241.426:11976): avc: denied { unlink } for pid=8303 comm="yum" name="start_udev" dev=dm-0 ino=9984548 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:udev_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775241.426:11976): arch=40000003 syscall=38 success=yes exit=0 a0=eb88008 a1=eb858f8 a2=d2a040 a3=eb88008 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775241.434:11977): avc: denied { relabelto } for pid=8303 comm="yum" name="start_udev" dev=dm-0 ino=9984710 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:udev_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775241.434:11977): arch=40000003 syscall=227 success=yes exit=0 a0=eb858f8 a1=a2f0d3 a2=eb9ec48 a3=21 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775241.434:11978): avc: denied { setattr } for pid=8303 comm="yum" name="start_udev" dev=dm-0 ino=9984710 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:udev_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775241.434:11978): arch=40000003 syscall=212 success=yes exit=0 a0=eb858f8 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775242.826:11979): avc: denied { write } for pid=11015 comm="firefox-bin" name="tmp" dev=dm-0 ino=14469313 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:tmp_t:s0 tclass=dir type=AVC msg=audit(1163775242.826:11979): avc: denied { add_name } for pid=11015 comm="firefox-bin" name="tmp.xpi" scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:tmp_t:s0 tclass=dir type=AVC msg=audit(1163775242.826:11979): avc: denied { create } for pid=11015 comm="firefox-bin" name="tmp.xpi" scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163775242.826:11979): arch=40000003 syscall=5 success=yes exit=28 a0=94c3270 a1=82c1 a2=180 a3=82c1 items=0 ppid=1 pid=11015 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163775243.254:11980): avc: denied { ptrace } for pid=11047 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=process type=SYSCALL msg=audit(1163775243.254:11980): arch=40000003 syscall=85 success=yes exit=10 a0=bfbc5178 a1=8c6a1e0 a2=1000 a3=8c6a028 items=0 ppid=11046 pid=11047 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775243.254:11981): avc: denied { ptrace } for pid=11047 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process type=SYSCALL msg=audit(1163775243.254:11981): arch=40000003 syscall=85 success=no exit=-2 a0=bfbc5178 a1=8c6b1e8 a2=1000 a3=8c6a058 items=0 ppid=11046 pid=11047 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775243.254:11982): avc: denied { ptrace } for pid=11047 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:udev_t:s0-s0:c0.c1023 tclass=process type=SYSCALL msg=audit(1163775243.254:11982): arch=40000003 syscall=85 success=yes exit=30 a0=bfbc5178 a1=8c8bb08 a2=1000 a3=8c8a988 items=0 ppid=11046 pid=11047 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775243.254:11983): avc: denied { ptrace } for pid=11047 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:restorecond_t:s0 tclass=process type=SYSCALL msg=audit(1163775243.254:11983): arch=40000003 syscall=85 success=yes exit=21 a0=bfbc5178 a1=8c8eb20 a2=1000 a3=8c8aa58 items=0 ppid=11046 pid=11047 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775243.254:11984): avc: denied { ptrace } for pid=11047 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:auditd_t:s0 tclass=process type=SYSCALL msg=audit(1163775243.254:11984): arch=40000003 syscall=85 success=yes exit=12 a0=bfbc5178 a1=8c8fcb0 a2=1000 a3=8c8aab8 items=0 ppid=11046 pid=11047 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775243.262:11985): avc: denied { ptrace } for pid=11047 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:syslogd_t:s0 tclass=process type=SYSCALL msg=audit(1163775243.262:11985): arch=40000003 syscall=85 success=yes exit=13 a0=bfbc5178 a1=8c91cc0 a2=1000 a3=8c8fb90 items=0 ppid=11046 pid=11047 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775243.262:11986): avc: denied { ptrace } for pid=11047 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:klogd_t:s0 tclass=process type=SYSCALL msg=audit(1163775243.262:11986): arch=40000003 syscall=85 success=yes exit=11 a0=bfbc5178 a1=8c92cc8 a2=1000 a3=8c8fbf0 items=0 ppid=11046 pid=11047 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775243.262:11987): avc: denied { ptrace } for pid=11047 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:irqbalance_t:s0 tclass=process type=SYSCALL msg=audit(1163775243.262:11987): arch=40000003 syscall=85 success=yes exit=20 a0=bfbc5178 a1=8c93cd0 a2=1000 a3=8c8fc40 items=0 ppid=11046 pid=11047 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775243.262:11988): avc: denied { ptrace } for pid=11047 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:setrans_t:s0-s0:c0.c1023 tclass=process type=SYSCALL msg=audit(1163775243.262:11988): arch=40000003 syscall=85 success=yes exit=15 a0=bfbc5178 a1=8c94e90 a2=1000 a3=8c94cd8 items=0 ppid=11046 pid=11047 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775243.262:11989): avc: denied { ptrace } for pid=11047 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:portmap_t:s0 tclass=process type=SYSCALL msg=audit(1163775243.262:11989): arch=40000003 syscall=85 success=yes exit=13 a0=bfbc5178 a1=8c95e98 a2=1000 a3=8c94d08 items=0 ppid=11046 pid=11047 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775243.262:11990): avc: denied { ptrace } for pid=11047 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:rpcd_t:s0 tclass=process type=SYSCALL msg=audit(1163775243.262:11990): arch=40000003 syscall=85 success=yes exit=15 a0=bfbc5178 a1=8c96ea0 a2=1000 a3=8c94d58 items=0 ppid=11046 pid=11047 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775243.262:11991): avc: denied { ptrace } for pid=11047 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:bluetooth_t:s0 tclass=process type=SYSCALL msg=audit(1163775243.262:11991): arch=40000003 syscall=85 success=yes exit=14 a0=bfbc5178 a1=8c98eb0 a2=1000 a3=8c94df8 items=0 ppid=11046 pid=11047 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775243.262:11992): avc: denied { ptrace } for pid=11047 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process type=SYSCALL msg=audit(1163775243.262:11992): arch=40000003 syscall=85 success=no exit=-2 a0=bfbc5178 a1=8c9b070 a2=1000 a3=8c99ee8 items=0 ppid=11046 pid=11047 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775243.262:11993): avc: denied { ptrace } for pid=11047 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:automount_t:s0 tclass=process type=SYSCALL msg=audit(1163775243.262:11993): arch=40000003 syscall=85 success=yes exit=19 a0=bfbc5178 a1=8c9d080 a2=1000 a3=8c99f70 items=0 ppid=11046 pid=11047 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775243.262:11994): avc: denied { ptrace } for pid=11047 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:apmd_t:s0 tclass=process type=SYSCALL msg=audit(1163775243.262:11994): arch=40000003 syscall=85 success=yes exit=15 a0=bfbc5178 a1=8c9e088 a2=1000 a3=8c99fc0 items=0 ppid=11046 pid=11047 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775243.262:11995): avc: denied { ptrace } for pid=11047 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:hplip_t:s0 tclass=process type=SYSCALL msg=audit(1163775243.262:11995): arch=40000003 syscall=85 success=yes exit=15 a0=bfbc5178 a1=8c9f218 a2=1000 a3=8c9a018 items=0 ppid=11046 pid=11047 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775243.262:11996): avc: denied { ptrace } for pid=11047 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:cupsd_t:s0-s0:c0.c1023 tclass=process type=SYSCALL msg=audit(1163775243.262:11996): arch=40000003 syscall=85 success=yes exit=15 a0=bfbc5178 a1=8ca1228 a2=1000 a3=8c9f0f0 items=0 ppid=11046 pid=11047 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775243.262:11997): avc: denied { ptrace } for pid=11047 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:inetd_t:s0 tclass=process type=SYSCALL msg=audit(1163775243.262:11997): arch=40000003 syscall=85 success=yes exit=16 a0=bfbc5178 a1=8ca2230 a2=1000 a3=8c9f140 items=0 ppid=11046 pid=11047 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775243.262:11998): avc: denied { ptrace } for pid=11047 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:sendmail_t:s0 tclass=process type=SYSCALL msg=audit(1163775243.262:11998): arch=40000003 syscall=85 success=yes exit=27 a0=bfbc5178 a1=8ca33c8 a2=1000 a3=8c9f1a8 items=0 ppid=11046 pid=11047 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775243.262:11999): avc: denied { ptrace } for pid=11047 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:gpm_t:s0 tclass=process type=SYSCALL msg=audit(1163775243.262:11999): arch=40000003 syscall=85 success=yes exit=13 a0=bfbc5178 a1=8ca53d8 a2=1000 a3=8ca32a8 items=0 ppid=11046 pid=11047 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775243.262:12000): avc: denied { ptrace } for pid=11047 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tclass=process type=SYSCALL msg=audit(1163775243.262:12000): arch=40000003 syscall=85 success=yes exit=15 a0=bfbc5178 a1=8ca63e0 a2=1000 a3=8ca3310 items=0 ppid=11046 pid=11047 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775243.262:12001): avc: denied { sys_ptrace } for pid=11047 comm="pidof" capability=19 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=capability type=AVC msg=audit(1163775243.262:12001): avc: denied { ptrace } for pid=11047 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:xfs_t:s0 tclass=process type=SYSCALL msg=audit(1163775243.262:12001): arch=40000003 syscall=85 success=yes exit=12 a0=bfbc5178 a1=8ca7560 a2=1000 a3=8ca3360 items=0 ppid=11046 pid=11047 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775243.262:12002): avc: denied { ptrace } for pid=11047 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:hald_t:s0 tclass=process type=SYSCALL msg=audit(1163775243.262:12002): arch=40000003 syscall=85 success=yes exit=14 a0=bfbc5178 a1=8ca9570 a2=1000 a3=8ca7440 items=0 ppid=11046 pid=11047 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775243.262:12003): avc: denied { ptrace } for pid=11047 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:xenstored_t:s0 tclass=process type=SYSCALL msg=audit(1163775243.262:12003): arch=40000003 syscall=85 success=yes exit=19 a0=bfbc5178 a1=8caf918 a2=1000 a3=8caf750 items=0 ppid=11046 pid=11047 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775243.262:12004): avc: denied { ptrace } for pid=11047 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:xenconsoled_t:s0 tclass=process type=SYSCALL msg=audit(1163775243.262:12004): arch=40000003 syscall=85 success=yes exit=21 a0=bfbc5178 a1=8cb0920 a2=1000 a3=8caf780 items=0 ppid=11046 pid=11047 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775243.262:12005): avc: denied { ptrace } for pid=11047 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:xend_t:s0 tclass=process type=SYSCALL msg=audit(1163775243.262:12005): arch=40000003 syscall=85 success=yes exit=15 a0=bfbc5178 a1=8cb1928 a2=1000 a3=8caf7d0 items=0 ppid=11046 pid=11047 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775243.262:12006): avc: denied { ptrace } for pid=11047 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:fsdaemon_t:s0 tclass=process type=SYSCALL msg=audit(1163775243.262:12006): arch=40000003 syscall=85 success=yes exit=16 a0=bfbc5178 a1=8cb4ab8 a2=1000 a3=8cb3938 items=0 ppid=11046 pid=11047 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775243.262:12007): avc: denied { ptrace } for pid=11047 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:getty_t:s0 tclass=process type=SYSCALL msg=audit(1163775243.262:12007): arch=40000003 syscall=85 success=yes exit=14 a0=bfbc5178 a1=8cb5ac0 a2=1000 a3=8cb39a0 items=0 ppid=11046 pid=11047 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775243.274:12008): avc: denied { ptrace } for pid=11047 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tclass=process type=SYSCALL msg=audit(1163775243.274:12008): arch=40000003 syscall=85 success=yes exit=20 a0=bfbc5178 a1=8cbbe28 a2=1000 a3=8cb7c08 items=0 ppid=11046 pid=11047 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775243.274:12009): avc: denied { ptrace } for pid=11047 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:xdm_xserver_t:s0-s0:c0.c1023 tclass=process type=SYSCALL msg=audit(1163775243.274:12009): arch=40000003 syscall=85 success=yes exit=13 a0=bfbc5178 a1=8cbde38 a2=1000 a3=8cbbcf0 items=0 ppid=11046 pid=11047 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775243.274:12010): avc: denied { ptrace } for pid=11047 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_ssh_agent_t:s0 tclass=process type=SYSCALL msg=audit(1163775243.274:12010): arch=40000003 syscall=85 success=yes exit=18 a0=bfbc5178 a1=8cbffe8 a2=1000 a3=8cbbdb8 items=0 ppid=11046 pid=11047 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775243.274:12011): avc: denied { ptrace } for pid=11047 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_dbusd_t:s0 tclass=process type=SYSCALL msg=audit(1163775243.274:12011): arch=40000003 syscall=85 success=yes exit=35 a0=bfbc5178 a1=8cc1ff8 a2=1000 a3=8cbfec0 items=0 ppid=11046 pid=11047 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775243.282:12012): avc: denied { ptrace } for pid=11047 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:pam_t:s0 tclass=process type=SYSCALL msg=audit(1163775243.282:12012): arch=40000003 syscall=85 success=yes exit=44 a0=bfbc5178 a1=8ccd550 a2=1000 a3=8ccc3a0 items=0 ppid=11046 pid=11047 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775243.282:12013): avc: denied { ptrace } for pid=11047 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_su_t:s0 tclass=process type=SYSCALL msg=audit(1163775243.282:12013): arch=40000003 syscall=85 success=yes exit=26 a0=bfbc5178 a1=8cd88f8 a2=1000 a3=8cd4850 items=0 ppid=11046 pid=11047 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775243.282:12014): avc: denied { ptrace } for pid=11047 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_thunderbird_t:s0 tclass=process type=SYSCALL msg=audit(1163775243.282:12014): arch=40000003 syscall=85 success=yes exit=9 a0=bfbc5178 a1=8ce8000 a2=1000 a3=8ce5ed0 items=0 ppid=11046 pid=11047 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775243.294:12015): avc: denied { ptrace } for pid=11047 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_mozilla_t:s0 tclass=process type=SYSCALL msg=audit(1163775243.294:12015): arch=40000003 syscall=85 success=yes exit=32 a0=bfbc5178 a1=8cf45a8 a2=1000 a3=8cf3420 items=0 ppid=11046 pid=11047 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775243.294:12016): avc: denied { signal } for pid=11046 comm="sh" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:udev_t:s0-s0:c0.c1023 tclass=process type=SYSCALL msg=audit(1163775243.294:12016): arch=40000003 syscall=37 success=yes exit=0 a0=1b4 a1=f a2=1b4 a3=1b4 items=0 ppid=8303 pid=11046 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="sh" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775243.294:12017): avc: denied { execute } for pid=11048 comm="sh" name="udevd" dev=dm-0 ino=9984584 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:udev_exec_t:s0 tclass=file type=AVC msg=audit(1163775243.294:12017): avc: denied { execute_no_trans } for pid=11048 comm="sh" name="udevd" dev=dm-0 ino=9984584 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:udev_exec_t:s0 tclass=file type=AVC msg=audit(1163775243.294:12017): avc: denied { read } for pid=11048 comm="sh" name="udevd" dev=dm-0 ino=9984584 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:udev_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775243.294:12017): arch=40000003 syscall=11 success=yes exit=0 a0=94e7658 a1=94e76f0 a2=94e7528 a3=94e6850 items=0 ppid=11046 pid=11048 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="udevd" exe="/sbin/udevd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775243.294:12017): path="/sbin/udevd" type=AVC_PATH msg=audit(1163775243.294:12017): path="/sbin/udevd" type=AVC msg=audit(1163775243.330:12018): avc: denied { write } for pid=11015 comm="firefox-bin" name="tmp.xpi" dev=dm-0 ino=14469458 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163775243.330:12018): arch=40000003 syscall=5 success=yes exit=33 a0=94c3270 a1=8241 a2=180 a3=8241 items=0 ppid=1 pid=11015 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163775243.382:12019): avc: denied { create } for pid=11048 comm="udevd" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=netlink_kobject_uevent_socket type=SYSCALL msg=audit(1163775243.382:12019): arch=40000003 syscall=102 success=yes exit=4 a0=1 a1=bfedb4d0 a2=791234 a3=17 items=0 ppid=11046 pid=11048 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="udevd" exe="/sbin/udevd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775243.382:12020): avc: denied { setopt } for pid=11048 comm="udevd" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=netlink_kobject_uevent_socket type=AVC msg=audit(1163775243.382:12020): avc: denied { net_admin } for pid=11048 comm="udevd" capability=12 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=capability type=SYSCALL msg=audit(1163775243.382:12020): arch=40000003 syscall=102 success=yes exit=0 a0=e a1=bfedb4c0 a2=791234 a3=17 items=0 ppid=11046 pid=11048 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="udevd" exe="/sbin/udevd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775243.386:12021): avc: denied { bind } for pid=11048 comm="udevd" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=netlink_kobject_uevent_socket type=SYSCALL msg=audit(1163775243.386:12021): arch=40000003 syscall=102 success=yes exit=0 a0=2 a1=bfedb4d0 a2=791234 a3=17 items=0 ppid=11046 pid=11048 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="udevd" exe="/sbin/udevd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775243.394:12022): avc: denied { write } for pid=11048 comm="udevd" name="uevent_seqnum" dev=tmpfs ino=1522 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:udev_tbl_t:s0 tclass=file type=SYSCALL msg=audit(1163775243.394:12022): arch=40000003 syscall=5 success=yes exit=6 a0=bfee5668 a1=8241 a2=1a4 a3=8241 items=0 ppid=11046 pid=11048 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="udevd" exe="/sbin/udevd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775243.394:12023): avc: denied { sys_resource } for pid=11049 comm="udevd" capability=24 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=capability type=SYSCALL msg=audit(1163775243.394:12023): arch=40000003 syscall=4 success=yes exit=3 a0=6 a1=78b03d a2=3 a3=6 items=0 ppid=11048 pid=11049 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="udevd" exe="/sbin/udevd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775243.470:12024): avc: denied { create } for pid=8303 comm="yum" name="libgd.so.2;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:lib_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775243.470:12024): arch=40000003 syscall=83 success=yes exit=0 a0=ec28238 a1=eb20198 a2=508a38 a3=602c items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775243.470:12025): avc: denied { rename } for pid=8303 comm="yum" name="libgd.so.2;455dcb57" dev=dm-0 ino=10333143 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:lib_t:s0 tclass=lnk_file type=AVC msg=audit(1163775243.470:12025): avc: denied { unlink } for pid=8303 comm="yum" name="libgd.so.2" dev=dm-0 ino=10335526 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775243.470:12025): arch=40000003 syscall=38 success=yes exit=0 a0=eb20198 a1=a1cca30 a2=d2a040 a3=eb20198 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775243.490:12026): avc: denied { relabelfrom } for pid=8303 comm="yum" name="libgd.so.2" dev=dm-0 ino=10333143 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:lib_t:s0 tclass=lnk_file type=AVC msg=audit(1163775243.490:12026): avc: denied { relabelto } for pid=8303 comm="yum" name="libgd.so.2" dev=dm-0 ino=10333143 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775243.490:12026): arch=40000003 syscall=227 success=yes exit=0 a0=a1cca30 a1=a2f0d3 a2=eba7ce8 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775243.490:12027): avc: denied { setattr } for pid=8303 comm="yum" name="libgd.so.2" dev=dm-0 ino=10333143 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775243.490:12027): arch=40000003 syscall=198 success=yes exit=0 a0=a1cca30 a1=0 a2=0 a3=eb5428c items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775244.138:12028): avc: denied { read } for pid=11015 comm="firefox-bin" name="tmp.xpi" dev=dm-0 ino=14469458 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163775244.138:12028): arch=40000003 syscall=5 success=yes exit=33 a0=94c3270 a1=8000 a2=0 a3=8000 items=0 ppid=1 pid=11015 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163775244.174:12029): avc: denied { getattr } for pid=11015 comm="firefox-bin" name="tmp.xpi" dev=dm-0 ino=14469458 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163775244.174:12029): arch=40000003 syscall=195 success=yes exit=0 a0=94c3270 a1=bf9667b0 a2=c4cff4 a3=bf9667b0 items=0 ppid=1 pid=11015 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163775244.174:12029): path="/tmp/tmp.xpi" type=AVC msg=audit(1163775244.302:12030): avc: denied { write } for pid=11015 comm="firefox-bin" name="tmp" dev=dm-0 ino=14469313 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:tmp_t:s0 tclass=dir type=AVC msg=audit(1163775244.302:12030): avc: denied { add_name } for pid=11015 comm="firefox-bin" name="install-6x3..rdf" scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:tmp_t:s0 tclass=dir type=AVC msg=audit(1163775244.302:12030): avc: denied { create } for pid=11015 comm="firefox-bin" name="install-6x3..rdf" scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163775244.302:12030): arch=40000003 syscall=5 success=yes exit=35 a0=964b2f0 a1=8041 a2=1a4 a3=8041 items=0 ppid=1 pid=11015 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163775244.310:12031): avc: denied { setattr } for pid=11015 comm="firefox-bin" name="install-6x3..rdf" dev=dm-0 ino=14469575 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163775244.310:12031): arch=40000003 syscall=30 success=yes exit=0 a0=964b2f0 a1=bf9661f0 a2=4a4e304 a3=de9a3ce0 items=0 ppid=1 pid=11015 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163775244.474:12032): avc: denied { setexec } for pid=11051 comm="yum" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=process type=SYSCALL msg=audit(1163775244.474:12032): arch=40000003 syscall=4 success=no exit=-22 a0=1e a1=eb9ebf8 a2=20 a3=a2f751 items=0 ppid=8303 pid=11051 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775244.806:12033): avc: denied { remove_name } for pid=11015 comm="firefox-bin" name="install-6x3..rdf" dev=dm-0 ino=14469575 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:tmp_t:s0 tclass=dir type=AVC msg=audit(1163775244.806:12033): avc: denied { unlink } for pid=11015 comm="firefox-bin" name="install-6x3..rdf" dev=dm-0 ino=14469575 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163775244.806:12033): arch=40000003 syscall=10 success=yes exit=0 a0=964b2f0 a1=0 a2=4a4e304 a3=0 items=0 ppid=1 pid=11015 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163775245.174:12034): avc: denied { create } for pid=8303 comm="yum" name="X;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:bin_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775245.174:12034): arch=40000003 syscall=83 success=yes exit=0 a0=ec38240 a1=a1cca30 a2=508a38 a3=602c items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775245.174:12035): avc: denied { rename } for pid=8303 comm="yum" name="X;455dcb57" dev=dm-0 ino=10324349 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:bin_t:s0 tclass=lnk_file type=AVC msg=audit(1163775245.174:12035): avc: denied { unlink } for pid=8303 comm="yum" name="X" dev=dm-0 ino=10314705 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775245.174:12035): arch=40000003 syscall=38 success=yes exit=0 a0=a1cca30 a1=ebac1e0 a2=d2a040 a3=a1cca30 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775245.210:12036): avc: denied { relabelfrom } for pid=8303 comm="yum" name="X" dev=dm-0 ino=10324349 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:bin_t:s0 tclass=lnk_file type=AVC msg=audit(1163775245.210:12036): avc: denied { relabelto } for pid=8303 comm="yum" name="X" dev=dm-0 ino=10324349 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775245.210:12036): arch=40000003 syscall=227 success=yes exit=0 a0=ebac1e0 a1=a2f0d3 a2=e68d5c0 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775245.214:12037): avc: denied { setattr } for pid=8303 comm="yum" name="X" dev=dm-0 ino=10324349 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775245.214:12037): arch=40000003 syscall=198 success=yes exit=0 a0=ebac1e0 a1=0 a2=0 a3=eb5448c items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775245.294:12038): avc: denied { unlink } for pid=8303 comm="yum" name="Xorg" dev=dm-0 ino=10334312 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xserver_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775245.294:12038): arch=40000003 syscall=38 success=yes exit=0 a0=e68d5c0 a1=a1cca30 a2=d2a040 a3=e68d5c0 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775245.298:12039): avc: denied { relabelto } for pid=8303 comm="yum" name="Xorg" dev=dm-0 ino=10314705 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xserver_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775245.298:12039): arch=40000003 syscall=227 success=yes exit=0 a0=a1cca30 a1=a2f0d3 a2=ebac700 a3=24 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775245.298:12040): avc: denied { setattr } for pid=8303 comm="yum" name="Xorg" dev=dm-0 ino=10314705 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xserver_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775245.298:12040): arch=40000003 syscall=212 success=yes exit=0 a0=a1cca30 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775245.606:12041): avc: denied { unlink } for pid=8303 comm="yum" name="libglx.so" dev=dm-0 ino=11002042 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:textrel_shlib_t:s0 tclass=file type=SYSCALL msg=audit(1163775245.606:12041): arch=40000003 syscall=38 success=yes exit=0 a0=ebcb0c0 a1=ec5b4c8 a2=d2a040 a3=ebcb0c0 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775245.610:12042): avc: denied { relabelto } for pid=8303 comm="yum" name="libglx.so" dev=dm-0 ino=9722652 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:textrel_shlib_t:s0 tclass=file type=SYSCALL msg=audit(1163775245.610:12042): arch=40000003 syscall=227 success=yes exit=0 a0=ec5b4c8 a1=a2f0d3 a2=ec5cd20 a3=25 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775245.610:12043): avc: denied { setattr } for pid=8303 comm="yum" name="libglx.so" dev=dm-0 ino=9722652 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:textrel_shlib_t:s0 tclass=file type=SYSCALL msg=audit(1163775245.610:12043): arch=40000003 syscall=212 success=yes exit=0 a0=ec5b4c8 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775246.194:12044): avc: denied { unlink } for pid=8303 comm="yum" name="SecurityPolicy" dev=dm-0 ino=10999522 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1163775246.194:12044): arch=40000003 syscall=38 success=yes exit=0 a0=ec5d7e0 a1=ec5d758 a2=d2a040 a3=ec5d7e0 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775246.194:12045): avc: denied { relabelto } for pid=8303 comm="yum" name="SecurityPolicy" dev=dm-0 ino=163682 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1163775246.194:12045): arch=40000003 syscall=227 success=yes exit=0 a0=ec5d758 a1=a2f0d3 a2=ec5ce00 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775246.198:12046): avc: denied { setattr } for pid=8303 comm="yum" name="SecurityPolicy" dev=dm-0 ino=163682 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1163775246.198:12046): arch=40000003 syscall=212 success=yes exit=0 a0=ec5d758 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775246.302:12047): avc: denied { relabelfrom } for pid=8303 comm="yum" name="xkb" dev=dm-0 ino=14437298 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xkb_var_lib_t:s0 tclass=dir type=AVC msg=audit(1163775246.302:12047): avc: denied { relabelto } for pid=8303 comm="yum" name="xkb" dev=dm-0 ino=14437298 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xkb_var_lib_t:s0 tclass=dir type=SYSCALL msg=audit(1163775246.302:12047): arch=40000003 syscall=227 success=yes exit=0 a0=ebcb0e0 a1=a2f0d3 a2=ec5f060 a3=23 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775246.302:12048): avc: denied { setattr } for pid=8303 comm="yum" name="xkb" dev=dm-0 ino=14437298 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xkb_var_lib_t:s0 tclass=dir type=SYSCALL msg=audit(1163775246.302:12048): arch=40000003 syscall=212 success=yes exit=0 a0=ebcb0e0 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775246.306:12049): avc: denied { write } for pid=8303 comm="yum" name="xkb" dev=dm-0 ino=14437298 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xkb_var_lib_t:s0 tclass=dir type=AVC msg=audit(1163775246.306:12049): avc: denied { add_name } for pid=8303 comm="yum" name="README.compiled;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xkb_var_lib_t:s0 tclass=dir type=AVC msg=audit(1163775246.306:12049): avc: denied { create } for pid=8303 comm="yum" name="README.compiled;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:xkb_var_lib_t:s0 tclass=file type=SYSCALL msg=audit(1163775246.306:12049): arch=40000003 syscall=5 success=yes exit=30 a0=c336540 a1=8241 a2=1b6 a3=8241 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775246.310:12050): avc: denied { write } for pid=8303 comm="yum" name="README.compiled;455dcb57" dev=dm-0 ino=14437971 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:xkb_var_lib_t:s0 tclass=file type=SYSCALL msg=audit(1163775246.310:12050): arch=40000003 syscall=4 success=yes exit=644 a0=1e a1=b6ebb000 a2=284 a3=ec5f0d8 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775246.310:12050): path="/var/lib/xkb/README.compiled;455dcb57" type=AVC msg=audit(1163775246.310:12051): avc: denied { remove_name } for pid=8303 comm="yum" name="README.compiled;455dcb57" dev=dm-0 ino=14437971 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xkb_var_lib_t:s0 tclass=dir type=AVC msg=audit(1163775246.310:12051): avc: denied { rename } for pid=8303 comm="yum" name="README.compiled;455dcb57" dev=dm-0 ino=14437971 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:xkb_var_lib_t:s0 tclass=file type=AVC msg=audit(1163775246.310:12051): avc: denied { unlink } for pid=8303 comm="yum" name="README.compiled" dev=dm-0 ino=14437875 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xkb_var_lib_t:s0 tclass=file type=SYSCALL msg=audit(1163775246.310:12051): arch=40000003 syscall=38 success=yes exit=0 a0=c336540 a1=ec5f060 a2=d2a040 a3=c336540 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775246.318:12052): avc: denied { relabelfrom } for pid=8303 comm="yum" name="README.compiled" dev=dm-0 ino=14437971 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:xkb_var_lib_t:s0 tclass=file type=AVC msg=audit(1163775246.318:12052): avc: denied { relabelto } for pid=8303 comm="yum" name="README.compiled" dev=dm-0 ino=14437971 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xkb_var_lib_t:s0 tclass=file type=SYSCALL msg=audit(1163775246.318:12052): arch=40000003 syscall=227 success=yes exit=0 a0=ec5f060 a1=a2f0d3 a2=ecf2e30 a3=23 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775246.318:12053): avc: denied { setattr } for pid=8303 comm="yum" name="README.compiled" dev=dm-0 ino=14437971 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xkb_var_lib_t:s0 tclass=file type=SYSCALL msg=audit(1163775246.318:12053): arch=40000003 syscall=212 success=yes exit=0 a0=ec5f060 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775255.799:12054): avc: denied { write } for pid=8303 comm="yum" name="xfce4-session" dev=dm-0 ino=9334423 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:etc_t:s0 tclass=dir type=AVC msg=audit(1163775255.799:12054): avc: denied { add_name } for pid=8303 comm="yum" name="xfce4-session.rc;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:etc_t:s0 tclass=dir type=SYSCALL msg=audit(1163775255.799:12054): arch=40000003 syscall=5 success=yes exit=30 a0=ebab930 a1=8241 a2=1b6 a3=8241 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775255.807:12055): avc: denied { remove_name } for pid=8303 comm="yum" name="xfce4-session.rc;455dcb57" dev=dm-0 ino=9334424 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:etc_t:s0 tclass=dir type=SYSCALL msg=audit(1163775255.807:12055): arch=40000003 syscall=38 success=yes exit=0 a0=ebab930 a1=ec4cd28 a2=d2a040 a3=ebab930 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775255.919:12056): avc: denied { write } for pid=8303 comm="yum" name="engines" dev=dm-0 ino=10345936 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:lib_t:s0 tclass=dir type=AVC msg=audit(1163775255.919:12056): avc: denied { add_name } for pid=8303 comm="yum" name="libmice.so;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:lib_t:s0 tclass=dir type=SYSCALL msg=audit(1163775255.919:12056): arch=40000003 syscall=5 success=yes exit=30 a0=ebab930 a1=8241 a2=1b6 a3=8241 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775255.959:12057): avc: denied { remove_name } for pid=8303 comm="yum" name="libmice.so;455dcb57" dev=dm-0 ino=10344644 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:lib_t:s0 tclass=dir type=SYSCALL msg=audit(1163775255.959:12057): arch=40000003 syscall=38 success=yes exit=0 a0=ebab930 a1=ec4cd28 a2=d2a040 a3=ebab930 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775267.847:12058): avc: denied { write } for pid=8303 comm="yum" name="qt-devel-3.3.7" dev=dm-0 ino=12048172 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:usr_t:s0 tclass=dir type=AVC msg=audit(1163775267.847:12058): avc: denied { add_name } for pid=8303 comm="yum" name="html" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:usr_t:s0 tclass=dir type=SYSCALL msg=audit(1163775267.847:12058): arch=40000003 syscall=39 success=yes exit=0 a0=ea5daa8 a1=1c0 a2=d2a040 a3=ea5daa8 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775270.820:12059): avc: denied { read } for pid=11015 comm="firefox-bin" name=".gdmV8RYIT" dev=dm-0 ino=14469571 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163775270.820:12059): arch=40000003 syscall=33 success=yes exit=0 a0=bf8b9f1c a1=4 a2=5a6a64 a3=bf8b9f1c items=0 ppid=1 pid=11015 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163775270.828:12060): avc: denied { getattr } for pid=11015 comm="firefox-bin" name=".gdmV8RYIT" dev=dm-0 ino=14469571 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163775270.828:12060): arch=40000003 syscall=197 success=yes exit=0 a0=9 a1=bf8b7c1c a2=104aff4 a3=9cb40c0 items=0 ppid=1 pid=11015 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163775270.828:12060): path="/tmp/.gdmV8RYIT" type=AVC msg=audit(1163775271.260:12061): avc: denied { getattr } for pid=11015 comm="firefox-bin" name="libflashplayer.so" dev=dm-0 ino=6547382 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=user_u:object_r:user_mozilla_home_t:s0 tclass=file type=SYSCALL msg=audit(1163775271.260:12061): arch=40000003 syscall=195 success=yes exit=0 a0=9cf3b18 a1=bf8b7fac a2=104aff4 a3=bf8b7fac items=0 ppid=1 pid=11015 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163775271.260:12061): path="/home/kmacmill/.mozilla/plugins/libflashplayer.so" type=AVC msg=audit(1163775291.741:12062): avc: denied { read } for pid=11015 comm="firefox-bin" name="inotify" dev=inotifyfs ino=340 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:inotifyfs_t:s0 tclass=dir type=SYSCALL msg=audit(1163775291.741:12062): arch=40000003 syscall=3 success=yes exit=992 a0=23 a1=ac830388 a2=400 a3=400 items=0 ppid=1 pid=11015 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163775291.741:12062): path="inotify" type=AVC msg=audit(1163775300.834:12063): avc: denied { relabelfrom } for pid=8303 comm="yum" name="settings" dev=dm-0 ino=10575168 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xdm_var_run_t:s0 tclass=dir type=AVC msg=audit(1163775300.834:12063): avc: denied { relabelto } for pid=8303 comm="yum" name="settings" dev=dm-0 ino=10575168 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xdm_var_run_t:s0 tclass=dir type=SYSCALL msg=audit(1163775300.834:12063): arch=40000003 syscall=227 success=yes exit=0 a0=cd1c498 a1=a2f0d3 a2=ede56b8 a3=23 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775300.834:12064): avc: denied { setattr } for pid=8303 comm="yum" name="settings" dev=dm-0 ino=10575168 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xdm_var_run_t:s0 tclass=dir type=SYSCALL msg=audit(1163775300.834:12064): arch=40000003 syscall=212 success=yes exit=0 a0=cd1c498 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775300.834:12065): avc: denied { write } for pid=8303 comm="yum" name="settings" dev=dm-0 ino=10575168 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xdm_var_run_t:s0 tclass=dir type=AVC msg=audit(1163775300.834:12065): avc: denied { add_name } for pid=8303 comm="yum" name="kstylerc;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xdm_var_run_t:s0 tclass=dir type=AVC msg=audit(1163775300.834:12065): avc: denied { create } for pid=8303 comm="yum" name="kstylerc;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:xdm_var_run_t:s0 tclass=file type=SYSCALL msg=audit(1163775300.834:12065): arch=40000003 syscall=5 success=yes exit=30 a0=ede5730 a1=8241 a2=1b6 a3=8241 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775300.834:12066): avc: denied { remove_name } for pid=8303 comm="yum" name="kstylerc;455dcb57" dev=dm-0 ino=11523091 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xdm_var_run_t:s0 tclass=dir type=AVC msg=audit(1163775300.834:12066): avc: denied { rename } for pid=8303 comm="yum" name="kstylerc;455dcb57" dev=dm-0 ino=11523091 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:xdm_var_run_t:s0 tclass=file type=AVC msg=audit(1163775300.834:12066): avc: denied { unlink } for pid=8303 comm="yum" name="kstylerc" dev=dm-0 ino=10574748 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xdm_var_run_t:s0 tclass=file type=SYSCALL msg=audit(1163775300.834:12066): arch=40000003 syscall=38 success=yes exit=0 a0=ede5730 a1=ecb7060 a2=d2a040 a3=ede5730 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775300.846:12067): avc: denied { relabelfrom } for pid=8303 comm="yum" name="kstylerc" dev=dm-0 ino=11523091 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:xdm_var_run_t:s0 tclass=file type=AVC msg=audit(1163775300.846:12067): avc: denied { relabelto } for pid=8303 comm="yum" name="kstylerc" dev=dm-0 ino=11523091 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xdm_var_run_t:s0 tclass=file type=SYSCALL msg=audit(1163775300.846:12067): arch=40000003 syscall=227 success=yes exit=0 a0=ecb7060 a1=a2f0d3 a2=edebf48 a3=23 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775300.846:12068): avc: denied { setattr } for pid=8303 comm="yum" name="kstylerc" dev=dm-0 ino=11523091 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xdm_var_run_t:s0 tclass=file type=SYSCALL msg=audit(1163775300.846:12068): arch=40000003 syscall=212 success=yes exit=0 a0=ecb7060 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775300.858:12069): avc: denied { write } for pid=8303 comm="yum" name="qtrc;455dcb57" dev=dm-0 ino=11523295 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:xdm_var_run_t:s0 tclass=file type=SYSCALL msg=audit(1163775300.858:12069): arch=40000003 syscall=4 success=yes exit=1292 a0=1e a1=b6dcb000 a2=50c a3=edebf70 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775300.858:12069): path="/usr/lib/qt-3.3/etc/settings/qtrc;455dcb57" type=AVC msg=audit(1163775301.458:12070): avc: denied { create } for pid=8303 comm="yum" name="08e8e1c95fe2fc01f976f1e063a24ccd;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:usr_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775301.458:12070): arch=40000003 syscall=83 success=yes exit=0 a0=eef78b8 a1=ec7bbf0 a2=508a38 a3=602c items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775301.458:12071): avc: denied { rename } for pid=8303 comm="yum" name="08e8e1c95fe2fc01f976f1e063a24ccd;455dcb57" dev=dm-0 ino=12210965 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:usr_t:s0 tclass=lnk_file type=AVC msg=audit(1163775301.458:12071): avc: denied { unlink } for pid=8303 comm="yum" name="08e8e1c95fe2fc01f976f1e063a24ccd" dev=dm-0 ino=10574325 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775301.458:12071): arch=40000003 syscall=38 success=yes exit=0 a0=ec7bbf0 a1=ec7bc50 a2=d2a040 a3=ec7bbf0 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775301.458:12072): avc: denied { relabelfrom } for pid=8303 comm="yum" name="08e8e1c95fe2fc01f976f1e063a24ccd" dev=dm-0 ino=12210965 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:usr_t:s0 tclass=lnk_file type=AVC msg=audit(1163775301.458:12072): avc: denied { relabelto } for pid=8303 comm="yum" name="08e8e1c95fe2fc01f976f1e063a24ccd" dev=dm-0 ino=12210965 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775301.458:12072): arch=40000003 syscall=227 success=yes exit=0 a0=ec7bc50 a1=a2f0d3 a2=ec7bbf0 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775301.458:12073): avc: denied { setattr } for pid=8303 comm="yum" name="08e8e1c95fe2fc01f976f1e063a24ccd" dev=dm-0 ino=12210965 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775301.458:12073): arch=40000003 syscall=198 success=yes exit=0 a0=ec7bc50 a1=0 a2=0 a3=ecb54a4 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775327.275:12074): avc: denied { read } for pid=11015 comm="firefox-bin" name="libflashplayer.so" dev=dm-0 ino=6547382 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=user_u:object_r:user_mozilla_home_t:s0 tclass=file type=SYSCALL msg=audit(1163775327.275:12074): arch=40000003 syscall=5 success=yes exit=58 a0=acb3c538 a1=0 a2=bf8b5174 a3=acb3c538 items=0 ppid=1 pid=11015 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163775327.383:12075): avc: denied { execute } for pid=11015 comm="firefox-bin" name="libflashplayer.so" dev=dm-0 ino=6547382 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=user_u:object_r:user_mozilla_home_t:s0 tclass=file type=SYSCALL msg=audit(1163775327.383:12075): arch=40000003 syscall=192 success=yes exit=134664192 a0=0 a1=738dbc a2=5 a3=802 items=0 ppid=1 pid=11015 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163775327.383:12075): path="/home/kmacmill/.mozilla/plugins/libflashplayer.so" type=AVC msg=audit(1163775357.749:12076): avc: denied { setattr } for pid=11129 comm="update-desktop-" name=".mimeinfo.cache.FYVVIT" dev=dm-0 ino=10937683 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:usr_t:s0 tclass=file type=SYSCALL msg=audit(1163775357.749:12076): arch=40000003 syscall=94 success=yes exit=0 a0=3 a1=1a4 a2=1a4 a3=9caef44 items=0 ppid=11124 pid=11129 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="update-desktop-" exe="/usr/bin/update-desktop-database" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775361.813:12077): avc: denied { read } for pid=3838 comm="nautilus" name=".gdmV8RYIT" dev=dm-0 ino=14469571 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163775361.813:12077): arch=40000003 syscall=33 success=yes exit=0 a0=bf97ae55 a1=4 a2=da3a64 a3=bf97ae55 items=0 ppid=1 pid=3838 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="nautilus" exe="/usr/bin/nautilus" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775366.318:12078): avc: denied { append } for pid=8549 comm="gconfd-2" name="saved_state" dev=dm-0 ino=13127388 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:user_home_t:s0 tclass=file type=SYSCALL msg=audit(1163775366.318:12078): arch=40000003 syscall=5 success=yes exit=15 a0=964bc70 a1=441 a2=1b6 a3=964c020 items=0 ppid=1 pid=8549 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775366.338:12079): avc: denied { create } for pid=8549 comm="gconfd-2" name="saved_state.tmp" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:user_home_t:s0 tclass=file type=SYSCALL msg=audit(1163775366.338:12079): arch=40000003 syscall=5 success=yes exit=15 a0=9829600 a1=241 a2=1c0 a3=0 items=0 ppid=1 pid=8549 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775366.346:12080): avc: denied { write } for pid=8549 comm="gconfd-2" name="saved_state.tmp" dev=dm-0 ino=13127397 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:user_home_t:s0 tclass=file type=SYSCALL msg=audit(1163775366.346:12080): arch=40000003 syscall=4 success=yes exit=1897 a0=f a1=9829bf8 a2=769 a3=0 items=0 ppid=1 pid=8549 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775366.346:12080): path="/root/.gconfd/saved_state.tmp" type=AVC msg=audit(1163775366.346:12081): avc: denied { rename } for pid=8549 comm="gconfd-2" name="saved_state" dev=dm-0 ino=13127388 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:user_home_t:s0 tclass=file type=SYSCALL msg=audit(1163775366.346:12081): arch=40000003 syscall=38 success=yes exit=0 a0=96418f0 a1=9828f58 a2=0 a3=0 items=0 ppid=1 pid=8549 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775366.346:12082): avc: denied { unlink } for pid=8549 comm="gconfd-2" name="saved_state.orig" dev=dm-0 ino=13127388 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:user_home_t:s0 tclass=file type=SYSCALL msg=audit(1163775366.346:12082): arch=40000003 syscall=10 success=yes exit=0 a0=9828f58 a1=96418f0 a2=412708 a3=0 items=0 ppid=1 pid=8549 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775368.578:12083): avc: denied { read } for pid=8116 comm="dhclient" name="[31406]" dev=sockfs ino=31406 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=packet_socket type=SYSCALL msg=audit(1163775368.578:12083): arch=40000003 syscall=3 success=yes exit=590 a0=6 a1=bf923428 a2=600 a3=9604620 items=0 ppid=8112 pid=8116 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="dhclient" exe="/sbin/dhclient" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775368.578:12083): path="socket:[31406]" type=AVC msg=audit(1163775373.374:12084): avc: denied { ptrace } for pid=11138 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:restorecond_t:s0 tclass=process type=SYSCALL msg=audit(1163775373.374:12084): arch=40000003 syscall=195 success=yes exit=0 a0=9194088 a1=bfed26f4 a2=6d1ff4 a3=bfed1a6c items=0 ppid=11135 pid=11138 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775373.378:12085): avc: denied { ptrace } for pid=11138 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:auditd_t:s0 tclass=process type=SYSCALL msg=audit(1163775373.378:12085): arch=40000003 syscall=195 success=yes exit=0 a0=9194088 a1=bfed26f4 a2=6d1ff4 a3=bfed1a6c items=0 ppid=11135 pid=11138 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775373.378:12086): avc: denied { ptrace } for pid=11138 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:syslogd_t:s0 tclass=process type=SYSCALL msg=audit(1163775373.378:12086): arch=40000003 syscall=195 success=yes exit=0 a0=9194088 a1=bfed26f4 a2=6d1ff4 a3=bfed1a6c items=0 ppid=11135 pid=11138 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775373.378:12087): avc: denied { ptrace } for pid=11138 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:setrans_t:s0-s0:c0.c1023 tclass=process type=SYSCALL msg=audit(1163775373.378:12087): arch=40000003 syscall=195 success=yes exit=0 a0=9194088 a1=bfed26f4 a2=6d1ff4 a3=bfed1a6c items=0 ppid=11135 pid=11138 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775373.378:12088): avc: denied { ptrace } for pid=11138 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:portmap_t:s0 tclass=process type=SYSCALL msg=audit(1163775373.378:12088): arch=40000003 syscall=195 success=yes exit=0 a0=9194088 a1=bfed26f4 a2=6d1ff4 a3=bfed1a6c items=0 ppid=11135 pid=11138 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775373.378:12089): avc: denied { ptrace } for pid=11138 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:rpcd_t:s0 tclass=process type=SYSCALL msg=audit(1163775373.378:12089): arch=40000003 syscall=195 success=yes exit=0 a0=9194088 a1=bfed26f4 a2=6d1ff4 a3=bfed1a6c items=0 ppid=11135 pid=11138 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775373.378:12090): avc: denied { ptrace } for pid=11138 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tclass=process type=SYSCALL msg=audit(1163775373.378:12090): arch=40000003 syscall=195 success=yes exit=0 a0=9194088 a1=bfed26f4 a2=6d1ff4 a3=bfed1a6c items=0 ppid=11135 pid=11138 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775373.382:12091): avc: denied { ptrace } for pid=11138 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:xenstored_t:s0 tclass=process type=SYSCALL msg=audit(1163775373.382:12091): arch=40000003 syscall=195 success=yes exit=0 a0=9194088 a1=bfed26f4 a2=6d1ff4 a3=bfed1a6c items=0 ppid=11135 pid=11138 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775373.382:12092): avc: denied { ptrace } for pid=11138 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:xenconsoled_t:s0 tclass=process type=SYSCALL msg=audit(1163775373.382:12092): arch=40000003 syscall=195 success=yes exit=0 a0=9194088 a1=bfed26f4 a2=6d1ff4 a3=bfed1a6c items=0 ppid=11135 pid=11138 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775373.382:12093): avc: denied { ptrace } for pid=11138 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:xend_t:s0 tclass=process type=SYSCALL msg=audit(1163775373.382:12093): arch=40000003 syscall=195 success=yes exit=0 a0=9194088 a1=bfed26f4 a2=6d1ff4 a3=bfed1a6c items=0 ppid=11135 pid=11138 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775373.382:12094): avc: denied { ptrace } for pid=11138 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:fsdaemon_t:s0 tclass=process type=SYSCALL msg=audit(1163775373.382:12094): arch=40000003 syscall=195 success=yes exit=0 a0=9194088 a1=bfed26f4 a2=6d1ff4 a3=bfed1a6c items=0 ppid=11135 pid=11138 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775373.382:12095): avc: denied { ptrace } for pid=11138 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:getty_t:s0 tclass=process type=AVC msg=audit(1163775373.382:12096): avc: denied { write } for pid=8137 comm="vpnc" name="tun" dev=tmpfs ino=1473 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:tun_tap_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163775373.382:12096): arch=40000003 syscall=4 success=yes exit=52 a0=4 a1=805c570 a2=34 a3=bfa20a54 items=0 ppid=8135 pid=8137 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vpnc" exe="/usr/sbin/vpnc" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775373.382:12096): path="/dev/net/tun" type=AVC msg=audit(1163775373.382:12097): avc: denied { read } for pid=8137 comm="vpnc" name="tun" dev=tmpfs ino=1473 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:tun_tap_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163775373.382:12097): arch=40000003 syscall=3 success=yes exit=40 a0=4 a1=805c5a0 a2=1000 a3=805c5a0 items=0 ppid=8135 pid=8137 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vpnc" exe="/usr/sbin/vpnc" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775373.382:12097): path="/dev/net/tun" type=SYSCALL msg=audit(1163775373.382:12095): arch=40000003 syscall=195 success=yes exit=0 a0=9194088 a1=bfed26f4 a2=6d1ff4 a3=bfed1a6c items=0 ppid=11135 pid=11138 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775373.382:12098): avc: denied { ptrace } for pid=11138 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tclass=process type=SYSCALL msg=audit(1163775373.382:12098): arch=40000003 syscall=195 success=yes exit=0 a0=9194088 a1=bfed26f4 a2=6d1ff4 a3=bfed1a6c items=0 ppid=11135 pid=11138 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775373.382:12099): avc: denied { ptrace } for pid=11138 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:xdm_xserver_t:s0-s0:c0.c1023 tclass=process type=SYSCALL msg=audit(1163775373.382:12099): arch=40000003 syscall=195 success=yes exit=0 a0=9194088 a1=bfed26f4 a2=6d1ff4 a3=bfed1a6c items=0 ppid=11135 pid=11138 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775373.386:12100): avc: denied { kill } for pid=11138 comm="killall" capability=5 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=capability type=SYSCALL msg=audit(1163775373.386:12100): arch=40000003 syscall=37 success=yes exit=0 a0=1042 a1=f a2=0 a3=1042 items=0 ppid=11135 pid=11138 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775373.394:12101): avc: denied { ptrace } for pid=11138 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_thunderbird_t:s0 tclass=process type=SYSCALL msg=audit(1163775373.394:12101): arch=40000003 syscall=195 success=yes exit=0 a0=9194088 a1=bfed26f4 a2=6d1ff4 a3=bfed1a6c items=0 ppid=11135 pid=11138 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775373.638:12102): avc: denied { unlink } for pid=11135 comm="gconftool-2" name="%gconf-tree-th.xml" dev=dm-0 ino=9331348 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1163775373.638:12102): arch=40000003 syscall=38 success=yes exit=0 a0=9717650 a1=94ac4e8 a2=14d820 a3=0 items=0 ppid=11133 pid=11135 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="gconftool-2" exe="/usr/bin/gconftool-2" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775374.162:12103): avc: denied { read } for pid=8116 comm="dhclient" name="[31406]" dev=sockfs ino=31406 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=packet_socket type=SYSCALL msg=audit(1163775374.162:12103): arch=40000003 syscall=3 success=yes exit=590 a0=6 a1=bf923428 a2=600 a3=9604620 items=0 ppid=8112 pid=8116 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="dhclient" exe="/sbin/dhclient" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775374.162:12103): path="socket:[31406]" type=AVC msg=audit(1163775376.486:12104): avc: denied { unlink } for pid=8303 comm="yum" name="boxes.h" dev=dm-0 ino=10607191 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=file type=SYSCALL msg=audit(1163775376.486:12104): arch=40000003 syscall=38 success=yes exit=0 a0=ecc78b0 a1=effad30 a2=d2a040 a3=ecc78b0 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775376.486:12105): avc: denied { relabelto } for pid=8303 comm="yum" name="boxes.h" dev=dm-0 ino=5368786 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=file type=SYSCALL msg=audit(1163775376.486:12105): arch=40000003 syscall=227 success=yes exit=0 a0=effad30 a1=a2f0d3 a2=ecc7a58 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775376.486:12106): avc: denied { setattr } for pid=8303 comm="yum" name="boxes.h" dev=dm-0 ino=5368786 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=file type=SYSCALL msg=audit(1163775376.486:12106): arch=40000003 syscall=212 success=yes exit=0 a0=effad30 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775376.866:12107): avc: denied { write } for pid=8303 comm="yum" name="LC_MESSAGES" dev=dm-0 ino=10311909 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=dir type=AVC msg=audit(1163775376.866:12107): avc: denied { add_name } for pid=8303 comm="yum" name="metacity.mo;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=dir type=SYSCALL msg=audit(1163775376.866:12107): arch=40000003 syscall=5 success=yes exit=30 a0=ecc7cf8 a1=8241 a2=1b6 a3=8241 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775376.866:12108): avc: denied { remove_name } for pid=8303 comm="yum" name="metacity.mo;455dcb57" dev=dm-0 ino=10316951 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=dir type=AVC msg=audit(1163775376.866:12108): avc: denied { unlink } for pid=8303 comm="yum" name="metacity.mo" dev=dm-0 ino=10325162 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1163775376.866:12108): arch=40000003 syscall=38 success=yes exit=0 a0=ecc7cf8 a1=ecc7c20 a2=d2a040 a3=ecc7cf8 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775376.870:12109): avc: denied { relabelto } for pid=8303 comm="yum" name="metacity.mo" dev=dm-0 ino=10316951 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1163775376.870:12109): arch=40000003 syscall=227 success=yes exit=0 a0=ecc7c20 a1=a2f0d3 a2=ebfe948 a3=1e items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775376.870:12110): avc: denied { setattr } for pid=8303 comm="yum" name="metacity.mo" dev=dm-0 ino=10316951 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1163775376.870:12110): arch=40000003 syscall=212 success=yes exit=0 a0=ecc7c20 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775380.527:12111): avc: denied { write } for pid=8303 comm="yum" name="man1" dev=dm-0 ino=10311889 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:man_t:s0 tclass=dir type=AVC msg=audit(1163775380.527:12111): avc: denied { add_name } for pid=8303 comm="yum" name="metacity-theme-viewer.1.gz;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:man_t:s0 tclass=dir type=SYSCALL msg=audit(1163775380.527:12111): arch=40000003 syscall=5 success=yes exit=30 a0=ecc7cf8 a1=8241 a2=1b6 a3=8241 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775380.539:12112): avc: denied { remove_name } for pid=8303 comm="yum" name="metacity-theme-viewer.1.gz;455dcb57" dev=dm-0 ino=10319617 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:man_t:s0 tclass=dir type=AVC msg=audit(1163775380.539:12112): avc: denied { unlink } for pid=8303 comm="yum" name="metacity-theme-viewer.1.gz" dev=dm-0 ino=10319618 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:man_t:s0 tclass=file type=SYSCALL msg=audit(1163775380.539:12112): arch=40000003 syscall=38 success=yes exit=0 a0=ecc7cf8 a1=ecc7c20 a2=d2a040 a3=ecc7cf8 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775380.571:12113): avc: denied { relabelto } for pid=8303 comm="yum" name="metacity-theme-viewer.1.gz" dev=dm-0 ino=10319617 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:man_t:s0 tclass=file type=SYSCALL msg=audit(1163775380.571:12113): arch=40000003 syscall=227 success=yes exit=0 a0=ecc7c20 a1=a2f0d3 a2=ebfe928 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775380.571:12114): avc: denied { setattr } for pid=8303 comm="yum" name="metacity-theme-viewer.1.gz" dev=dm-0 ino=10319617 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:man_t:s0 tclass=file type=SYSCALL msg=audit(1163775380.571:12114): arch=40000003 syscall=212 success=yes exit=0 a0=ecc7c20 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775389.011:12115): avc: denied { execute } for pid=11140 comm="sh" name="ldconfig" dev=dm-0 ino=9984490 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:ldconfig_exec_t:s0 tclass=file type=AVC msg=audit(1163775389.011:12115): avc: denied { execute_no_trans } for pid=11140 comm="sh" name="ldconfig" dev=dm-0 ino=9984490 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:ldconfig_exec_t:s0 tclass=file type=AVC msg=audit(1163775389.011:12115): avc: denied { read } for pid=11140 comm="sh" name="ldconfig" dev=dm-0 ino=9984490 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:ldconfig_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775389.011:12115): arch=40000003 syscall=11 success=yes exit=0 a0=951ebb8 a1=951e220 a2=951ec38 a3=951e120 items=0 ppid=11139 pid=11140 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="ldconfig" exe="/sbin/ldconfig" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775389.011:12115): path="/sbin/ldconfig" type=AVC_PATH msg=audit(1163775389.011:12115): path="/sbin/ldconfig" type=AVC msg=audit(1163775396.440:12116): avc: denied { ptrace } for pid=11143 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:hplip_t:s0 tclass=process type=SYSCALL msg=audit(1163775396.440:12116): arch=40000003 syscall=195 success=yes exit=0 a0=81c0088 a1=bfd375d4 a2=39dff4 a3=bfd3694c items=0 ppid=11142 pid=11143 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775396.440:12117): avc: denied { ptrace } for pid=11143 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:gpm_t:s0 tclass=process type=SYSCALL msg=audit(1163775396.440:12117): arch=40000003 syscall=195 success=yes exit=0 a0=81c0088 a1=bfd375d4 a2=39dff4 a3=bfd3694c items=0 ppid=11142 pid=11143 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775396.440:12118): avc: denied { ptrace } for pid=11143 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:xfs_t:s0 tclass=process type=SYSCALL msg=audit(1163775396.440:12118): arch=40000003 syscall=195 success=yes exit=0 a0=81c0088 a1=bfd375d4 a2=39dff4 a3=bfd3694c items=0 ppid=11142 pid=11143 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775396.440:12119): avc: denied { ptrace } for pid=11143 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:hald_t:s0 tclass=process type=SYSCALL msg=audit(1163775396.440:12119): arch=40000003 syscall=195 success=yes exit=0 a0=81c0088 a1=bfd375d4 a2=39dff4 a3=bfd3694c items=0 ppid=11142 pid=11143 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775400.248:12120): avc: denied { write } for pid=8303 comm="yum" name="/" dev=sda1 ino=2 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:boot_t:s0 tclass=dir type=AVC msg=audit(1163775400.248:12120): avc: denied { add_name } for pid=8303 comm="yum" name="System.map-2.6.18-1.2849.fc6;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:boot_t:s0 tclass=dir type=AVC msg=audit(1163775400.248:12120): avc: denied { create } for pid=8303 comm="yum" name="System.map-2.6.18-1.2849.fc6;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:boot_t:s0 tclass=file type=SYSCALL msg=audit(1163775400.248:12120): arch=40000003 syscall=5 success=yes exit=30 a0=ecc7c20 a1=8241 a2=1b6 a3=8241 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775400.356:12121): avc: denied { write } for pid=8303 comm="yum" name="System.map-2.6.18-1.2849.fc6;455dcb57" dev=sda1 ino=10046 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:boot_t:s0 tclass=file type=SYSCALL msg=audit(1163775400.356:12121): arch=40000003 syscall=4 success=yes exit=65536 a0=1e a1=ef9fd28 a2=10000 a3=bef75f0 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775400.356:12121): path="/boot/System.map-2.6.18-1.2849.fc6;455dcb57" type=AVC msg=audit(1163775400.436:12122): avc: denied { remove_name } for pid=8303 comm="yum" name="System.map-2.6.18-1.2849.fc6;455dcb57" dev=sda1 ino=10046 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:boot_t:s0 tclass=dir type=AVC msg=audit(1163775400.436:12122): avc: denied { rename } for pid=8303 comm="yum" name="System.map-2.6.18-1.2849.fc6;455dcb57" dev=sda1 ino=10046 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:boot_t:s0 tclass=file type=SYSCALL msg=audit(1163775400.436:12122): arch=40000003 syscall=38 success=yes exit=0 a0=ecc7c20 a1=ebfe948 a2=d2a040 a3=ecc7c20 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775400.500:12123): avc: denied { relabelfrom } for pid=8303 comm="yum" name="System.map-2.6.18-1.2849.fc6" dev=sda1 ino=10046 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:boot_t:s0 tclass=file type=AVC msg=audit(1163775400.500:12123): avc: denied { relabelto } for pid=8303 comm="yum" name="System.map-2.6.18-1.2849.fc6" dev=sda1 ino=10046 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:system_map_t:s0 tclass=file type=SYSCALL msg=audit(1163775400.500:12123): arch=40000003 syscall=227 success=yes exit=0 a0=ebfe948 a1=a2f0d3 a2=ecc7c20 a3=22 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775400.500:12124): avc: denied { setattr } for pid=8303 comm="yum" name="System.map-2.6.18-1.2849.fc6" dev=sda1 ino=10046 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:system_map_t:s0 tclass=file type=SYSCALL msg=audit(1163775400.500:12124): arch=40000003 syscall=212 success=yes exit=0 a0=ebfe948 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775400.508:12125): avc: denied { relabelto } for pid=8303 comm="yum" name="config-2.6.18-1.2849.fc6" dev=sda1 ino=10047 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:boot_t:s0 tclass=file type=SYSCALL msg=audit(1163775400.508:12125): arch=40000003 syscall=227 success=yes exit=0 a0=ebfe948 a1=a2f0d3 a2=ec35ac8 a3=1c items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775400.508:12126): avc: denied { setattr } for pid=8303 comm="yum" name="config-2.6.18-1.2849.fc6" dev=sda1 ino=10047 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:boot_t:s0 tclass=file type=SYSCALL msg=audit(1163775400.508:12126): arch=40000003 syscall=212 success=yes exit=0 a0=ebfe948 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775400.712:12127): avc: denied { write } for pid=8303 comm="yum" name="modules" dev=dm-0 ino=13716388 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:modules_object_t:s0 tclass=dir type=AVC msg=audit(1163775400.712:12127): avc: denied { add_name } for pid=8303 comm="yum" name="2.6.18-1.2849.fc6" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:modules_object_t:s0 tclass=dir type=AVC msg=audit(1163775400.712:12127): avc: denied { create } for pid=8303 comm="yum" name="2.6.18-1.2849.fc6" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:modules_object_t:s0 tclass=dir type=SYSCALL msg=audit(1163775400.712:12127): arch=40000003 syscall=39 success=yes exit=0 a0=ebfe948 a1=1c0 a2=d2a040 a3=ebfe948 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775400.736:12128): avc: denied { relabelfrom } for pid=8303 comm="yum" name="2.6.18-1.2849.fc6" dev=dm-0 ino=13717306 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:modules_object_t:s0 tclass=dir type=AVC msg=audit(1163775400.736:12128): avc: denied { relabelto } for pid=8303 comm="yum" name="2.6.18-1.2849.fc6" dev=dm-0 ino=13717306 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:modules_object_t:s0 tclass=dir type=SYSCALL msg=audit(1163775400.736:12128): arch=40000003 syscall=227 success=yes exit=0 a0=ebfe948 a1=a2f0d3 a2=eee8910 a3=26 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775400.740:12129): avc: denied { setattr } for pid=8303 comm="yum" name="2.6.18-1.2849.fc6" dev=dm-0 ino=13717306 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:modules_object_t:s0 tclass=dir type=SYSCALL msg=audit(1163775400.740:12129): arch=40000003 syscall=212 success=yes exit=0 a0=ebfe948 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775400.740:12130): avc: denied { create } for pid=8303 comm="yum" name="build;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:modules_object_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775400.740:12130): arch=40000003 syscall=83 success=yes exit=0 a0=ef9fd28 a1=eee8910 a2=508a38 a3=602c items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775400.740:12131): avc: denied { remove_name } for pid=8303 comm="yum" name="build;455dcb57" dev=dm-0 ino=13720656 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:modules_object_t:s0 tclass=dir type=AVC msg=audit(1163775400.740:12131): avc: denied { rename } for pid=8303 comm="yum" name="build;455dcb57" dev=dm-0 ino=13720656 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:modules_object_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775400.740:12131): arch=40000003 syscall=38 success=yes exit=0 a0=eee8910 a1=ec0e4c8 a2=d2a040 a3=eee8910 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775400.740:12132): avc: denied { relabelfrom } for pid=8303 comm="yum" name="build" dev=dm-0 ino=13720656 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:modules_object_t:s0 tclass=lnk_file type=AVC msg=audit(1163775400.740:12132): avc: denied { relabelto } for pid=8303 comm="yum" name="build" dev=dm-0 ino=13720656 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:modules_object_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775400.740:12132): arch=40000003 syscall=227 success=yes exit=0 a0=ec0e4c8 a1=a2f0d3 a2=ec0e4f8 a3=26 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775400.740:12133): avc: denied { setattr } for pid=8303 comm="yum" name="build" dev=dm-0 ino=13720656 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:modules_object_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775400.740:12133): arch=40000003 syscall=198 success=yes exit=0 a0=ec0e4c8 a1=0 a2=0 a3=ec1460c items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775400.744:12134): avc: denied { create } for pid=8303 comm="yum" name="aes-i586.ko;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:modules_object_t:s0 tclass=file type=SYSCALL msg=audit(1163775400.744:12134): arch=40000003 syscall=5 success=yes exit=30 a0=ec0e630 a1=8241 a2=1b6 a3=8241 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775400.744:12135): avc: denied { write } for pid=8303 comm="yum" name="aes-i586.ko;455dcb57" dev=dm-0 ino=13720662 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:modules_object_t:s0 tclass=file type=SYSCALL msg=audit(1163775400.744:12135): arch=40000003 syscall=4 success=yes exit=16384 a0=1e a1=ef9fd28 a2=4000 a3=ec0e680 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775400.744:12135): path="/lib/modules/2.6.18-1.2849.fc6/kernel/arch/i386/crypto/aes-i586.ko;455dcb57" type=AVC msg=audit(1163775400.744:12136): avc: denied { rename } for pid=8303 comm="yum" name="aes-i586.ko;455dcb57" dev=dm-0 ino=13720662 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:modules_object_t:s0 tclass=file type=SYSCALL msg=audit(1163775400.744:12136): arch=40000003 syscall=38 success=yes exit=0 a0=ec0e630 a1=ec0e680 a2=d2a040 a3=ec0e630 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775400.760:12137): avc: denied { relabelfrom } for pid=8303 comm="yum" name="aes-i586.ko" dev=dm-0 ino=13720662 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:modules_object_t:s0 tclass=file type=AVC msg=audit(1163775400.760:12137): avc: denied { relabelto } for pid=8303 comm="yum" name="aes-i586.ko" dev=dm-0 ino=13720662 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:modules_object_t:s0 tclass=file type=SYSCALL msg=audit(1163775400.760:12137): arch=40000003 syscall=227 success=yes exit=0 a0=ec0e680 a1=a2f0d3 a2=eee8910 a3=26 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775400.760:12138): avc: denied { setattr } for pid=8303 comm="yum" name="aes-i586.ko" dev=dm-0 ino=13720662 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:modules_object_t:s0 tclass=file type=SYSCALL msg=audit(1163775400.760:12138): arch=40000003 syscall=212 success=yes exit=0 a0=ec0e680 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775422.877:12139): avc: denied { execute } for pid=11148 comm="new-kernel-pkg" name="depmod" dev=dm-0 ino=9984676 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:depmod_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775422.877:12139): arch=40000003 syscall=33 success=yes exit=0 a0=97f4298 a1=1 a2=11 a3=97f4298 items=0 ppid=11144 pid=11148 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="new-kernel-pkg" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775422.877:12140): avc: denied { read } for pid=11148 comm="new-kernel-pkg" name="depmod" dev=dm-0 ino=9984676 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:depmod_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775422.877:12140): arch=40000003 syscall=33 success=yes exit=0 a0=97f4298 a1=4 a2=ffffffff a3=97f4298 items=0 ppid=11144 pid=11148 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="new-kernel-pkg" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775422.877:12141): avc: denied { execute_no_trans } for pid=11156 comm="new-kernel-pkg" name="depmod" dev=dm-0 ino=9984676 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:depmod_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775422.877:12141): arch=40000003 syscall=11 success=yes exit=0 a0=97f4298 a1=97e60a0 a2=97e98a8 a3=97f45c8 items=0 ppid=11148 pid=11156 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="depmod" exe="/sbin/depmod" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775422.877:12141): path="/sbin/depmod" type=AVC msg=audit(1163775422.965:12142): avc: denied { read } for pid=11156 comm="depmod" name="anubis.ko" dev=dm-0 ino=13720675 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:modules_object_t:s0 tclass=file type=SYSCALL msg=audit(1163775422.965:12142): arch=40000003 syscall=5 success=yes exit=7 a0=9d7475c a1=0 a2=1b6 a3=9d7cf10 items=0 ppid=11148 pid=11156 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="depmod" exe="/sbin/depmod" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775423.421:12143): avc: denied { execute } for pid=11157 comm="new-kernel-pkg" name="mkinitrd" dev=dm-0 ino=9984521 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:bootloader_exec_t:s0 tclass=file type=AVC msg=audit(1163775423.421:12143): avc: denied { execute_no_trans } for pid=11157 comm="new-kernel-pkg" name="mkinitrd" dev=dm-0 ino=9984521 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:bootloader_exec_t:s0 tclass=file type=AVC msg=audit(1163775423.421:12143): avc: denied { read } for pid=11157 comm="new-kernel-pkg" name="mkinitrd" dev=dm-0 ino=9984521 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:bootloader_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775423.421:12143): arch=40000003 syscall=11 success=yes exit=0 a0=97f3dc0 a1=97e60a0 a2=97e98a8 a3=97f42d8 items=0 ppid=11148 pid=11157 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="mkinitrd" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775423.421:12143): path="/sbin/mkinitrd" type=AVC_PATH msg=audit(1163775423.421:12143): path="/sbin/mkinitrd" type=AVC msg=audit(1163775423.445:12144): avc: denied { ioctl } for pid=11157 comm="mkinitrd" name="mkinitrd" dev=dm-0 ino=9984521 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:bootloader_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775423.445:12144): arch=40000003 syscall=54 success=no exit=-25 a0=3 a1=5401 a2=bf930808 a3=bf930848 items=0 ppid=11148 pid=11157 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="mkinitrd" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775423.445:12144): path="/sbin/mkinitrd" type=AVC msg=audit(1163775423.725:12145): avc: denied { execute } for pid=11165 comm="mkinitrd" name="modprobe" dev=dm-0 ino=9984520 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:insmod_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775423.725:12145): arch=40000003 syscall=33 success=yes exit=0 a0=99ec890 a1=1 a2=11 a3=99ec890 items=0 ppid=11164 pid=11165 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="mkinitrd" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775423.725:12146): avc: denied { read } for pid=11165 comm="mkinitrd" name="modprobe" dev=dm-0 ino=9984520 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:insmod_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775423.725:12146): arch=40000003 syscall=33 success=yes exit=0 a0=99ec890 a1=4 a2=ffffffff a3=99ec890 items=0 ppid=11164 pid=11165 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="mkinitrd" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775423.725:12147): avc: denied { execute_no_trans } for pid=11165 comm="mkinitrd" name="modprobe" dev=dm-0 ino=9984520 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:insmod_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775423.725:12147): arch=40000003 syscall=11 success=yes exit=0 a0=99ec890 a1=99ecaa8 a2=99c4170 a3=99ec908 items=0 ppid=11164 pid=11165 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="modprobe" exe="/sbin/modprobe" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775423.725:12147): path="/sbin/modprobe" type=AVC msg=audit(1163775423.809:12148): avc: denied { read } for pid=11165 comm="modprobe" name="modules.dep" dev=dm-0 ino=13722566 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:modules_object_t:s0 tclass=file type=SYSCALL msg=audit(1163775423.809:12148): arch=40000003 syscall=5 success=yes exit=3 a0=822d1d0 a1=0 a2=1b6 a3=822d3b8 items=0 ppid=11164 pid=11165 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="modprobe" exe="/sbin/modprobe" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775423.813:12149): avc: denied { write } for pid=11165 comm="modprobe" name="uhci-hcd.ko" dev=dm-0 ino=13721860 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:modules_object_t:s0 tclass=file type=SYSCALL msg=audit(1163775423.813:12149): arch=40000003 syscall=5 success=yes exit=3 a0=822d174 a1=2 a2=0 a3=822d174 items=0 ppid=11164 pid=11165 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="modprobe" exe="/sbin/modprobe" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775423.813:12150): avc: denied { lock } for pid=11165 comm="modprobe" name="uhci-hcd.ko" dev=dm-0 ino=13721860 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:modules_object_t:s0 tclass=file type=SYSCALL msg=audit(1163775423.813:12150): arch=40000003 syscall=221 success=yes exit=0 a0=3 a1=7 a2=bfb99a20 a3=bfb99a20 items=0 ppid=11164 pid=11165 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="modprobe" exe="/sbin/modprobe" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775423.813:12150): path="/lib/modules/2.6.18-1.2849.fc6/kernel/drivers/usb/host/uhci-hcd.ko" type=AVC msg=audit(1163775424.821:12151): avc: denied { execute } for pid=11318 comm="mkinitrd" name="lvm.static" dev=dm-0 ino=9984644 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lvm_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775424.821:12151): arch=40000003 syscall=33 success=yes exit=0 a0=99ebea8 a1=1 a2=11 a3=99ebea8 items=0 ppid=11157 pid=11318 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="mkinitrd" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775424.825:12152): avc: denied { read } for pid=11318 comm="mkinitrd" name="lvm.static" dev=dm-0 ino=9984644 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lvm_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775424.825:12152): arch=40000003 syscall=33 success=yes exit=0 a0=99ebea8 a1=4 a2=ffffffff a3=99ebea8 items=0 ppid=11157 pid=11318 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="mkinitrd" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775424.825:12153): avc: denied { execute_no_trans } for pid=11319 comm="mkinitrd" name="lvm.static" dev=dm-0 ino=9984644 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lvm_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775424.825:12153): arch=40000003 syscall=11 success=yes exit=0 a0=99ebea8 a1=99eba60 a2=99c4170 a3=99ebf60 items=0 ppid=11318 pid=11319 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="lvm.static" exe="/sbin/lvm.static" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775424.825:12153): path="/sbin/lvm.static" type=AVC msg=audit(1163775425.329:12154): avc: denied { read } for pid=11319 comm="lvm.static" name="lvm.conf" dev=dm-0 ino=9331271 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lvm_etc_t:s0 tclass=file type=SYSCALL msg=audit(1163775425.329:12154): arch=40000003 syscall=5 success=yes exit=3 a0=8578d00 a1=8000 a2=0 a3=0 items=0 ppid=11318 pid=11319 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="lvm.static" exe="/sbin/lvm.static" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775425.341:12155): avc: denied { read } for pid=11319 comm="lvm.static" name=".cache" dev=dm-0 ino=9331107 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lvm_metadata_t:s0 tclass=file type=SYSCALL msg=audit(1163775425.341:12155): arch=40000003 syscall=5 success=yes exit=3 a0=8585c70 a1=8000 a2=0 a3=0 items=0 ppid=11318 pid=11319 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="lvm.static" exe="/sbin/lvm.static" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775425.349:12156): avc: denied { getattr } for pid=11319 comm="lvm.static" name="001" dev=tmpfs ino=4880 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:usb_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163775425.349:12156): arch=40000003 syscall=195 success=yes exit=0 a0=858e330 a1=bf83d63c a2=1 a3=858e330 items=0 ppid=11318 pid=11319 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="lvm.static" exe="/sbin/lvm.static" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775425.349:12156): path="/dev/bus/usb/001/001" type=AVC msg=audit(1163775425.353:12157): avc: denied { getattr } for pid=11319 comm="lvm.static" name="kcore" dev=proc ino=-268435434 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:proc_kcore_t:s0 tclass=file type=SYSCALL msg=audit(1163775425.353:12157): arch=40000003 syscall=195 success=yes exit=0 a0=8586188 a1=bf83d93c a2=1 a3=8586188 items=0 ppid=11318 pid=11319 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="lvm.static" exe="/sbin/lvm.static" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775425.353:12157): path="/proc/kcore" type=AVC msg=audit(1163775425.353:12158): avc: denied { getattr } for pid=11319 comm="lvm.static" name="microcode" dev=tmpfs ino=3250 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:cpu_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163775425.353:12158): arch=40000003 syscall=195 success=yes exit=0 a0=858c210 a1=bf83d83c a2=1 a3=858c210 items=0 ppid=11318 pid=11319 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="lvm.static" exe="/sbin/lvm.static" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775425.353:12158): path="/dev/cpu/microcode" type=AVC msg=audit(1163775425.353:12159): avc: denied { getattr } for pid=11319 comm="lvm.static" name="mice" dev=tmpfs ino=3191 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:mouse_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163775425.353:12159): arch=40000003 syscall=195 success=yes exit=0 a0=858ae90 a1=bf83d83c a2=1 a3=858ae90 items=0 ppid=11318 pid=11319 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="lvm.static" exe="/sbin/lvm.static" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775425.353:12159): path="/dev/input/mice" type=AVC msg=audit(1163775425.353:12160): avc: denied { getattr } for pid=11319 comm="lvm.static" name="lp0" dev=tmpfs ino=5586 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:printer_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163775425.353:12160): arch=40000003 syscall=195 success=yes exit=0 a0=8586188 a1=bf83d93c a2=1 a3=8586188 items=0 ppid=11318 pid=11319 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="lvm.static" exe="/sbin/lvm.static" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775425.353:12160): path="/dev/lp0" type=AVC msg=audit(1163775425.361:12161): avc: denied { getattr } for pid=11319 comm="lvm.static" name="control" dev=tmpfs ino=965 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lvm_control_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163775425.361:12161): arch=40000003 syscall=195 success=yes exit=0 a0=8585c60 a1=bf83d83c a2=1 a3=8585c60 items=0 ppid=11318 pid=11319 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="lvm.static" exe="/sbin/lvm.static" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775425.361:12161): path="/dev/mapper/control" type=AVC msg=audit(1163775425.361:12162): avc: denied { getattr } for pid=11319 comm="lvm.static" name="mem" dev=tmpfs ino=2000 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:memory_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163775425.361:12162): arch=40000003 syscall=195 success=yes exit=0 a0=8586188 a1=bf83d93c a2=1 a3=8586188 items=0 ppid=11318 pid=11319 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="lvm.static" exe="/sbin/lvm.static" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775425.361:12162): path="/dev/mem" type=AVC msg=audit(1163775425.361:12163): avc: denied { getattr } for pid=11319 comm="lvm.static" name="tun" dev=tmpfs ino=1473 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:tun_tap_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163775425.361:12163): arch=40000003 syscall=195 success=yes exit=0 a0=8585c60 a1=bf83d83c a2=1 a3=8585c60 items=0 ppid=11318 pid=11319 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="lvm.static" exe="/sbin/lvm.static" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775425.361:12163): path="/dev/net/tun" type=AVC msg=audit(1163775425.361:12164): avc: denied { getattr } for pid=11319 comm="lvm.static" name="nvram" dev=tmpfs ino=3204 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:nvram_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163775425.361:12164): arch=40000003 syscall=195 success=yes exit=0 a0=8586188 a1=bf83d93c a2=1 a3=8586188 items=0 ppid=11318 pid=11319 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="lvm.static" exe="/sbin/lvm.static" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775425.361:12164): path="/dev/nvram" type=AVC msg=audit(1163775425.361:12165): avc: denied { getattr } for pid=11319 comm="lvm.static" name="ppp" dev=tmpfs ino=1477 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:ppp_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163775425.361:12165): arch=40000003 syscall=195 success=yes exit=0 a0=8586188 a1=bf83d93c a2=1 a3=8586188 items=0 ppid=11318 pid=11319 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="lvm.static" exe="/sbin/lvm.static" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775425.361:12165): path="/dev/ppp" type=AVC msg=audit(1163775425.365:12166): avc: denied { getattr } for pid=11319 comm="lvm.static" name="rtc" dev=tmpfs ino=744 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:clock_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163775425.365:12166): arch=40000003 syscall=195 success=yes exit=0 a0=8586188 a1=bf83d93c a2=1 a3=8586188 items=0 ppid=11318 pid=11319 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="lvm.static" exe="/sbin/lvm.static" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775425.365:12166): path="/dev/rtc" type=AVC msg=audit(1163775425.365:12167): avc: denied { getattr } for pid=11319 comm="lvm.static" name="sg0" dev=tmpfs ino=4865 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163775425.365:12167): arch=40000003 syscall=195 success=yes exit=0 a0=8586188 a1=bf83d93c a2=1 a3=8586188 items=0 ppid=11318 pid=11319 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="lvm.static" exe="/sbin/lvm.static" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775425.365:12167): path="/dev/sg0" type=AVC msg=audit(1163775425.365:12168): avc: denied { getattr } for pid=11319 comm="lvm.static" name="systty" dev=tmpfs ino=740 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:tty_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163775425.365:12168): arch=40000003 syscall=195 success=yes exit=0 a0=8586188 a1=bf83d93c a2=1 a3=8586188 items=0 ppid=11318 pid=11319 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="lvm.static" exe="/sbin/lvm.static" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775425.365:12168): path="/dev/systty" type=AVC msg=audit(1163775425.365:12169): avc: denied { getattr } for pid=11319 comm="lvm.static" name="blktap0" dev=tmpfs ino=10081 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xen_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163775425.365:12169): arch=40000003 syscall=195 success=yes exit=0 a0=8585c60 a1=bf83d83c a2=1 a3=8585c60 items=0 ppid=11318 pid=11319 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="lvm.static" exe="/sbin/lvm.static" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775425.365:12169): path="/dev/xen/blktap0" type=AVC msg=audit(1163775425.425:12170): avc: denied { read write search } for pid=11319 comm="lvm.static" name="lvm" dev=dm-0 ino=14436627 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lvm_lock_t:s0 tclass=dir type=SYSCALL msg=audit(1163775425.425:12170): arch=40000003 syscall=33 success=yes exit=0 a0=81deb60 a1=7 a2=81d2a28 a3=81deb60 items=0 ppid=11318 pid=11319 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="lvm.static" exe="/sbin/lvm.static" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775425.425:12171): avc: denied { add_name } for pid=11319 comm="lvm.static" name="V_VolGroup00" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lvm_lock_t:s0 tclass=dir type=AVC msg=audit(1163775425.425:12171): avc: denied { create } for pid=11319 comm="lvm.static" name="V_VolGroup00" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:lvm_lock_t:s0 tclass=file type=SYSCALL msg=audit(1163775425.425:12171): arch=40000003 syscall=5 success=yes exit=3 a0=bf83e3a8 a1=8442 a2=1ff a3=1ff items=0 ppid=11318 pid=11319 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="lvm.static" exe="/sbin/lvm.static" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775425.437:12172): avc: denied { lock } for pid=11319 comm="lvm.static" name="V_VolGroup00" dev=dm-0 ino=14438001 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:lvm_lock_t:s0 tclass=file type=SYSCALL msg=audit(1163775425.437:12172): arch=40000003 syscall=143 success=yes exit=0 a0=3 a1=1 a2=81d2a28 a3=0 items=0 ppid=11318 pid=11319 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="lvm.static" exe="/sbin/lvm.static" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775425.437:12172): path="/var/lock/lvm/V_VolGroup00" type=AVC msg=audit(1163775425.437:12173): avc: denied { read } for pid=11319 comm="lvm.static" name="ram0" dev=tmpfs ino=790 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file type=SYSCALL msg=audit(1163775425.437:12173): arch=40000003 syscall=5 success=no exit=-22 a0=857f7f8 a1=4c000 a2=0 a3=0 items=0 ppid=11318 pid=11319 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="lvm.static" exe="/sbin/lvm.static" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775425.437:12174): avc: denied { ioctl } for pid=11319 comm="lvm.static" name="ram0" dev=tmpfs ino=790 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file type=SYSCALL msg=audit(1163775425.437:12174): arch=40000003 syscall=54 success=yes exit=0 a0=4 a1=80041270 a2=857f008 a3=857eff0 items=0 ppid=11318 pid=11319 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="lvm.static" exe="/sbin/lvm.static" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775425.437:12174): path="/dev/ram0" type=AVC msg=audit(1163775425.465:12175): avc: denied { dac_override } for pid=11319 comm="lvm.static" capability=1 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=capability type=SYSCALL msg=audit(1163775425.465:12175): arch=40000003 syscall=5 success=yes exit=4 a0=857d6f8 a1=4c000 a2=0 a3=0 items=0 ppid=11318 pid=11319 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="lvm.static" exe="/sbin/lvm.static" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775427.045:12176): avc: denied { remove_name } for pid=11319 comm="lvm.static" name="V_VolGroup00" dev=dm-0 ino=14438001 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lvm_lock_t:s0 tclass=dir type=AVC msg=audit(1163775427.045:12176): avc: denied { unlink } for pid=11319 comm="lvm.static" name="V_VolGroup00" dev=dm-0 ino=14438001 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:lvm_lock_t:s0 tclass=file type=SYSCALL msg=audit(1163775427.045:12176): arch=40000003 syscall=10 success=yes exit=0 a0=858d878 a1=0 a2=81d2a28 a3=bf83e28c items=0 ppid=11318 pid=11319 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="lvm.static" exe="/sbin/lvm.static" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775427.045:12177): avc: denied { write } for pid=11319 comm="lvm.static" name=".cache" dev=dm-0 ino=9331107 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lvm_metadata_t:s0 tclass=file type=SYSCALL msg=audit(1163775427.045:12177): arch=40000003 syscall=5 success=yes exit=3 a0=8586198 a1=8241 a2=1b6 a3=4 items=0 ppid=11318 pid=11319 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="lvm.static" exe="/sbin/lvm.static" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775427.137:12178): avc: denied { read write } for pid=11322 comm="lvm.static" name="control" dev=tmpfs ino=965 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lvm_control_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163775427.137:12178): arch=40000003 syscall=5 success=yes exit=5 a0=bf9142d4 a1=8002 a2=0 a3=0 items=0 ppid=11321 pid=11322 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="lvm.static" exe="/sbin/lvm.static" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775427.137:12179): avc: denied { ioctl } for pid=11322 comm="lvm.static" name="control" dev=tmpfs ino=965 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lvm_control_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163775427.137:12179): arch=40000003 syscall=54 success=yes exit=0 a0=5 a1=c134fd00 a2=8d312b0 a3=81d6b60 items=0 ppid=11321 pid=11322 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="lvm.static" exe="/sbin/lvm.static" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775427.137:12179): path="/dev/mapper/control" type=AVC msg=audit(1163775428.994:12180): avc: denied { create } for pid=11620 comm="dmraid" name=".lock" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:var_lock_t:s0 tclass=file type=SYSCALL msg=audit(1163775428.994:12180): arch=40000003 syscall=5 success=yes exit=3 a0=ca36cc a1=442 a2=1ff a3=81b73e0 items=0 ppid=11619 pid=11620 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="dmraid" exe="/sbin/dmraid" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775429.014:12181): avc: denied { lock } for pid=11620 comm="dmraid" name=".lock" dev=dm-0 ino=14469449 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:var_lock_t:s0 tclass=file type=SYSCALL msg=audit(1163775429.014:12181): arch=40000003 syscall=143 success=yes exit=0 a0=3 a1=2 a2=cac650 a3=81b73e0 items=0 ppid=11619 pid=11620 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="dmraid" exe="/sbin/dmraid" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775429.014:12181): path="/var/lock/dmraid/.lock" type=AVC msg=audit(1163775429.014:12182): avc: denied { sys_rawio } for pid=11620 comm="dmraid" capability=17 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=capability type=SYSCALL msg=audit(1163775429.014:12182): arch=40000003 syscall=54 success=yes exit=0 a0=5 a1=31f a2=81b9708 a3=81b9708 items=0 ppid=11619 pid=11620 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="dmraid" exe="/sbin/dmraid" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775429.110:12183): avc: denied { unlink } for pid=11620 comm="dmraid" name=".lock" dev=dm-0 ino=14469449 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:var_lock_t:s0 tclass=file type=SYSCALL msg=audit(1163775429.110:12183): arch=40000003 syscall=10 success=yes exit=0 a0=ca36cc a1=81b73e0 a2=cac650 a3=ca36cc items=0 ppid=11619 pid=11620 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="dmraid" exe="/sbin/dmraid" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775430.234:12184): avc: denied { mknod } for pid=11693 comm="mknod" capability=27 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=capability type=AVC msg=audit(1163775430.234:12184): avc: denied { create } for pid=11693 comm="mknod" name="ram0" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=blk_file type=SYSCALL msg=audit(1163775430.234:12184): arch=40000003 syscall=14 success=yes exit=0 a0=bfe88bb3 a1=61b6 a2=100 a3=0 items=0 ppid=11157 pid=11693 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="mknod" exe="/bin/mknod" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775430.246:12185): avc: denied { create } for pid=11696 comm="mknod" name="null" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163775430.246:12185): arch=40000003 syscall=14 success=yes exit=0 a0=bfde5bb3 a1=21b6 a2=103 a3=0 items=0 ppid=11157 pid=11696 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="mknod" exe="/bin/mknod" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775430.882:12186): avc: denied { ioctl } for pid=11835 comm="gzip" name="initrd-2.6.18-1.2849.fc6.img" dev=sda1 ino=10050 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:boot_t:s0 tclass=file type=SYSCALL msg=audit(1163775430.882:12186): arch=40000003 syscall=54 success=no exit=-25 a0=1 a1=5401 a2=bfcd9728 a3=bfcd9768 items=0 ppid=11157 pid=11835 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="gzip" exe="/bin/gzip" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775430.882:12186): path="/boot/initrd-2.6.18-1.2849.fc6.img" type=AVC msg=audit(1163775433.094:12187): avc: denied { unlink } for pid=11836 comm="rm" name="ram1" dev=dm-0 ino=14568121 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=blk_file type=SYSCALL msg=audit(1163775433.094:12187): arch=40000003 syscall=10 success=yes exit=0 a0=80b198f a1=80b197c a2=805277c a3=bfc2fde4 items=0 ppid=11157 pid=11836 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="rm" exe="/bin/rm" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775433.094:12188): avc: denied { unlink } for pid=11836 comm="rm" name="ttyS1" dev=dm-0 ino=14568140 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163775433.094:12188): arch=40000003 syscall=10 success=yes exit=0 a0=80b19a7 a1=80b1994 a2=805277c a3=bfc2fde4 items=0 ppid=11157 pid=11836 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="rm" exe="/bin/rm" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775433.346:12189): avc: denied { write } for pid=11843 comm="grubby" name="fd0" dev=tmpfs ino=4597 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:removable_device_t:s0 tclass=blk_file type=SYSCALL msg=audit(1163775433.346:12189): arch=40000003 syscall=5 success=no exit=-6 a0=9651970 a1=0 a2=0 a3=3 items=0 ppid=11148 pid=11843 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="grubby" exe="/sbin/grubby" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775433.590:12190): avc: denied { write } for pid=11843 comm="grubby" name="blkid.tab" dev=dm-0 ino=9331364 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_runtime_t:s0 tclass=file type=SYSCALL msg=audit(1163775433.590:12190): arch=40000003 syscall=33 success=yes exit=0 a0=96536c0 a1=2 a2=96518f8 a3=3 items=0 ppid=11148 pid=11843 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="grubby" exe="/sbin/grubby" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775433.590:12191): avc: denied { write } for pid=11843 comm="grubby" name="blkid" dev=dm-0 ino=9330183 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_runtime_t:s0 tclass=dir type=AVC msg=audit(1163775433.590:12191): avc: denied { add_name } for pid=11843 comm="grubby" name="blkid.tab-lm5AcU" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_runtime_t:s0 tclass=dir type=AVC msg=audit(1163775433.590:12191): avc: denied { create } for pid=11843 comm="grubby" name="blkid.tab-lm5AcU" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:etc_runtime_t:s0 tclass=file type=SYSCALL msg=audit(1163775433.590:12191): arch=40000003 syscall=5 success=yes exit=3 a0=96532c0 a1=c2 a2=180 a3=62a46a items=0 ppid=11148 pid=11843 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="grubby" exe="/sbin/grubby" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775433.590:12192): avc: denied { setattr } for pid=11843 comm="grubby" name="blkid.tab-lm5AcU" dev=dm-0 ino=9331792 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:etc_runtime_t:s0 tclass=file type=SYSCALL msg=audit(1163775433.590:12192): arch=40000003 syscall=94 success=yes exit=0 a0=3 a1=1a4 a2=3 a3=3 items=0 ppid=11148 pid=11843 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="grubby" exe="/sbin/grubby" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775433.590:12193): avc: denied { write } for pid=11843 comm="grubby" name="blkid.tab-lm5AcU" dev=dm-0 ino=9331792 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:etc_runtime_t:s0 tclass=file type=SYSCALL msg=audit(1163775433.590:12193): arch=40000003 syscall=4 success=yes exit=1160 a0=3 a1=b7fa8000 a2=488 a3=488 items=0 ppid=11148 pid=11843 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="grubby" exe="/sbin/grubby" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775433.590:12193): path="/etc/blkid/blkid.tab-lm5AcU" type=AVC msg=audit(1163775433.594:12194): avc: denied { remove_name } for pid=11843 comm="grubby" name="blkid.tab.old" dev=dm-0 ino=9330705 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_runtime_t:s0 tclass=dir type=AVC msg=audit(1163775433.594:12194): avc: denied { unlink } for pid=11843 comm="grubby" name="blkid.tab.old" dev=dm-0 ino=9330705 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_runtime_t:s0 tclass=file type=SYSCALL msg=audit(1163775433.594:12194): arch=40000003 syscall=10 success=yes exit=0 a0=9651920 a1=0 a2=9651920 a3=96518f8 items=0 ppid=11148 pid=11843 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="grubby" exe="/sbin/grubby" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775433.594:12195): avc: denied { link } for pid=11843 comm="grubby" name="blkid.tab" dev=dm-0 ino=9331364 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_runtime_t:s0 tclass=file type=SYSCALL msg=audit(1163775433.594:12195): arch=40000003 syscall=9 success=yes exit=0 a0=96536c0 a1=9651920 a2=9651920 a3=96518f8 items=0 ppid=11148 pid=11843 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="grubby" exe="/sbin/grubby" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775433.594:12196): avc: denied { rename } for pid=11843 comm="grubby" name="blkid.tab-lm5AcU" dev=dm-0 ino=9331792 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:etc_runtime_t:s0 tclass=file type=SYSCALL msg=audit(1163775433.594:12196): arch=40000003 syscall=38 success=yes exit=0 a0=96532c0 a1=96536c0 a2=9651920 a3=96518f8 items=0 ppid=11148 pid=11843 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="grubby" exe="/sbin/grubby" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775433.626:12197): avc: denied { setattr } for pid=11843 comm="grubby" name="grub.conf-" dev=sda1 ino=2011 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:boot_t:s0 tclass=file type=SYSCALL msg=audit(1163775433.626:12197): arch=40000003 syscall=15 success=yes exit=0 a0=bffadda0 a1=180 a2=80efd04 a3=9651660 items=0 ppid=11148 pid=11843 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="grubby" exe="/sbin/grubby" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775433.626:12198): avc: denied { unlink } for pid=11843 comm="grubby" name="grub.conf" dev=sda1 ino=2010 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:boot_t:s0 tclass=file type=SYSCALL msg=audit(1163775433.626:12198): arch=40000003 syscall=38 success=yes exit=0 a0=bffadda0 a1=80d08b1 a2=80efd04 a3=0 items=0 ppid=11148 pid=11843 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="grubby" exe="/sbin/grubby" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775434.530:12199): avc: denied { append } for pid=8303 comm="yum" name="yum.log" dev=dm-0 ino=8707846 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:rpm_log_t:s0 tclass=file type=SYSCALL msg=audit(1163775434.530:12199): arch=40000003 syscall=4 success=yes exit=57 a0=4 a1=b7bd1000 a2=39 a3=39 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775434.530:12199): path="/var/log/yum.log" type=AVC msg=audit(1163775434.590:12200): avc: denied { write } for pid=8303 comm="yum" name="bin" dev=dm-0 ino=10311850 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=dir type=AVC msg=audit(1163775434.590:12200): avc: denied { add_name } for pid=8303 comm="yum" name="update-mime-database;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=dir type=AVC msg=audit(1163775434.590:12200): avc: denied { create } for pid=8303 comm="yum" name="update-mime-database;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1163775434.590:12200): arch=40000003 syscall=5 success=yes exit=30 a0=ec35558 a1=8241 a2=1b6 a3=8241 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775434.590:12201): avc: denied { write } for pid=8303 comm="yum" name="update-mime-database;455dcb57" dev=dm-0 ino=10319620 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1163775434.590:12201): arch=40000003 syscall=4 success=yes exit=32768 a0=1e a1=ef73980 a2=8000 a3=9c6ab30 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775434.590:12201): path="/usr/bin/update-mime-database;455dcb57" type=AVC msg=audit(1163775434.590:12202): avc: denied { remove_name } for pid=8303 comm="yum" name="update-mime-database;455dcb57" dev=dm-0 ino=10319620 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=dir type=AVC msg=audit(1163775434.590:12202): avc: denied { rename } for pid=8303 comm="yum" name="update-mime-database;455dcb57" dev=dm-0 ino=10319620 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:bin_t:s0 tclass=file type=AVC msg=audit(1163775434.590:12202): avc: denied { unlink } for pid=8303 comm="yum" name="update-mime-database" dev=dm-0 ino=10325206 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1163775434.590:12202): arch=40000003 syscall=38 success=yes exit=0 a0=ec35558 a1=edeae48 a2=d2a040 a3=ec35558 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775434.646:12203): avc: denied { relabelfrom } for pid=8303 comm="yum" name="update-mime-database" dev=dm-0 ino=10319620 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:bin_t:s0 tclass=file type=AVC msg=audit(1163775434.646:12203): avc: denied { relabelto } for pid=8303 comm="yum" name="update-mime-database" dev=dm-0 ino=10319620 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1163775434.646:12203): arch=40000003 syscall=227 success=yes exit=0 a0=edeae48 a1=a2f0d3 a2=efba528 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775434.646:12204): avc: denied { setattr } for pid=8303 comm="yum" name="update-mime-database" dev=dm-0 ino=10319620 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1163775434.646:12204): arch=40000003 syscall=212 success=yes exit=0 a0=edeae48 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775434.646:12205): avc: denied { create } for pid=8303 comm="yum" name="shared-mime-info.pc;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1163775434.646:12205): arch=40000003 syscall=5 success=yes exit=30 a0=f03cde8 a1=8241 a2=1b6 a3=8241 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775434.646:12206): avc: denied { write } for pid=8303 comm="yum" name="shared-mime-info.pc;455dcb57" dev=dm-0 ino=10325206 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1163775434.646:12206): arch=40000003 syscall=4 success=yes exit=177 a0=1e a1=b6dcb000 a2=b1 a3=9c6ab30 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775434.646:12206): path="/usr/lib/pkgconfig/shared-mime-info.pc;455dcb57" type=AVC msg=audit(1163775434.646:12207): avc: denied { rename } for pid=8303 comm="yum" name="shared-mime-info.pc;455dcb57" dev=dm-0 ino=10325206 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:lib_t:s0 tclass=file type=AVC msg=audit(1163775434.646:12207): avc: denied { unlink } for pid=8303 comm="yum" name="shared-mime-info.pc" dev=dm-0 ino=10319316 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1163775434.646:12207): arch=40000003 syscall=38 success=yes exit=0 a0=f03cde8 a1=ec0e498 a2=d2a040 a3=f03cde8 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775434.662:12208): avc: denied { relabelfrom } for pid=8303 comm="yum" name="shared-mime-info.pc" dev=dm-0 ino=10325206 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:lib_t:s0 tclass=file type=AVC msg=audit(1163775434.662:12208): avc: denied { relabelto } for pid=8303 comm="yum" name="shared-mime-info.pc" dev=dm-0 ino=10325206 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1163775434.662:12208): arch=40000003 syscall=227 success=yes exit=0 a0=ec0e498 a1=a2f0d3 a2=efba660 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775434.666:12209): avc: denied { setattr } for pid=8303 comm="yum" name="shared-mime-info.pc" dev=dm-0 ino=10325206 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1163775434.666:12209): arch=40000003 syscall=212 success=yes exit=0 a0=ec0e498 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775434.666:12210): avc: denied { write } for pid=8303 comm="yum" name="applications" dev=dm-0 ino=10311883 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=dir type=AVC msg=audit(1163775434.666:12210): avc: denied { add_name } for pid=8303 comm="yum" name="defaults.list;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=dir type=SYSCALL msg=audit(1163775434.666:12210): arch=40000003 syscall=5 success=yes exit=30 a0=f03cde8 a1=8241 a2=1b6 a3=8241 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775434.666:12211): avc: denied { remove_name } for pid=8303 comm="yum" name="defaults.list;455dcb57" dev=dm-0 ino=10319316 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=dir type=SYSCALL msg=audit(1163775434.666:12211): arch=40000003 syscall=38 success=yes exit=0 a0=f03cde8 a1=ec0e498 a2=d2a040 a3=f03cde8 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775434.690:12212): avc: denied { read } for pid=11015 comm="firefox-bin" name="inotify" dev=inotifyfs ino=340 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:inotifyfs_t:s0 tclass=dir type=SYSCALL msg=audit(1163775434.690:12212): arch=40000003 syscall=3 success=yes exit=304 a0=23 a1=acbc0110 a2=400 a3=400 items=0 ppid=1 pid=11015 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163775434.690:12212): path="inotify" type=AVC msg=audit(1163775434.690:12213): avc: denied { relabelfrom } for pid=8303 comm="yum" name="shared-mime-info-0.19" dev=dm-0 ino=10968927 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=dir type=AVC msg=audit(1163775434.690:12213): avc: denied { relabelto } for pid=8303 comm="yum" name="shared-mime-info-0.19" dev=dm-0 ino=10968927 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=dir type=SYSCALL msg=audit(1163775434.690:12213): arch=40000003 syscall=227 success=yes exit=0 a0=ec0e498 a1=a2f0d3 a2=efba8d0 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775434.690:12214): avc: denied { setattr } for pid=8303 comm="yum" name="shared-mime-info-0.19" dev=dm-0 ino=10968927 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=dir type=SYSCALL msg=audit(1163775434.690:12214): arch=40000003 syscall=212 success=yes exit=0 a0=ec0e498 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775436.302:12215): avc: denied { unlink } for pid=12108 comm="update-mime-dat" name="x-kodak-dcr.xml" dev=dm-0 ino=10216297 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:usr_t:s0 tclass=file type=SYSCALL msg=audit(1163775436.302:12215): arch=40000003 syscall=38 success=yes exit=0 a0=95cf988 a1=95e7190 a2=95cf988 a3=95e7190 items=0 ppid=12107 pid=12108 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="update-mime-dat" exe="/usr/bin/update-mime-database" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775437.202:12216): avc: denied { write } for pid=8303 comm="yum" name="schemas" dev=dm-0 ino=9330176 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=dir type=AVC msg=audit(1163775437.202:12216): avc: denied { add_name } for pid=8303 comm="yum" name="gsf-office-thumbnailer.schemas;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=dir type=SYSCALL msg=audit(1163775437.202:12216): arch=40000003 syscall=5 success=yes exit=30 a0=f03d5b8 a1=8241 a2=1b6 a3=8241 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775437.254:12217): avc: denied { remove_name } for pid=8303 comm="yum" name="gsf-office-thumbnailer.schemas;455dcb57" dev=dm-0 ino=9330705 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=dir type=SYSCALL msg=audit(1163775437.254:12217): arch=40000003 syscall=38 success=yes exit=0 a0=f03d5b8 a1=f03d4e0 a2=d2a040 a3=f03d5b8 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775437.342:12218): avc: denied { create } for pid=8303 comm="yum" name="libgsf-1.14.3" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:usr_t:s0 tclass=dir type=SYSCALL msg=audit(1163775437.342:12218): arch=40000003 syscall=39 success=yes exit=0 a0=edeae60 a1=1c0 a2=d2a040 a3=edeae60 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775437.346:12219): avc: denied { relabelfrom } for pid=8303 comm="yum" name="libgsf-1.14.3" dev=dm-0 ino=12050786 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:usr_t:s0 tclass=dir type=SYSCALL msg=audit(1163775437.346:12219): arch=40000003 syscall=227 success=yes exit=0 a0=edeae60 a1=a2f0d3 a2=f034840 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775437.354:12220): avc: denied { create } for pid=8303 comm="yum" name="libgsf.mo;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1163775437.354:12220): arch=40000003 syscall=5 success=yes exit=30 a0=f03d4e0 a1=8241 a2=1b6 a3=8241 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775437.362:12221): avc: denied { write } for pid=8303 comm="yum" name="libgsf.mo;455dcb57" dev=dm-0 ino=10333883 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1163775437.362:12221): arch=40000003 syscall=4 success=yes exit=1933 a0=1e a1=b6dcb000 a2=78d a3=9c6ae78 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775437.362:12221): path="/usr/share/locale/es/LC_MESSAGES/libgsf.mo;455dcb57" type=AVC msg=audit(1163775437.362:12222): avc: denied { rename } for pid=8303 comm="yum" name="libgsf.mo;455dcb57" dev=dm-0 ino=10333883 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1163775437.362:12222): arch=40000003 syscall=38 success=yes exit=0 a0=f03d4e0 a1=ec14750 a2=d2a040 a3=f03d4e0 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775437.390:12223): avc: denied { relabelfrom } for pid=8303 comm="yum" name="libgsf.mo" dev=dm-0 ino=10333883 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1163775437.390:12223): arch=40000003 syscall=227 success=yes exit=0 a0=ec14750 a1=a2f0d3 a2=edeae60 a3=1e items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775438.722:12224): avc: denied { write } for pid=8303 comm="yum" name="lib" dev=dm-0 ino=10311854 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=dir type=AVC msg=audit(1163775438.722:12224): avc: denied { add_name } for pid=8303 comm="yum" name="libboost_date_time.so.1.33.1;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=dir type=SYSCALL msg=audit(1163775438.722:12224): arch=40000003 syscall=5 success=yes exit=30 a0=f03d4e0 a1=8241 a2=1b6 a3=8241 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775438.722:12225): avc: denied { remove_name } for pid=8303 comm="yum" name="libboost_date_time.so.1.33.1;455dcb57" dev=dm-0 ino=10333915 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=dir type=SYSCALL msg=audit(1163775438.722:12225): arch=40000003 syscall=38 success=yes exit=0 a0=f03d4e0 a1=ec8dab0 a2=d2a040 a3=f03d4e0 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775442.898:12226): avc: denied { relabelfrom } for pid=8303 comm="yum" name="subversion" dev=dm-0 ino=13063900 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=dir type=AVC msg=audit(1163775442.898:12226): avc: denied { relabelto } for pid=8303 comm="yum" name="subversion" dev=dm-0 ino=13063900 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=dir type=SYSCALL msg=audit(1163775442.898:12226): arch=40000003 syscall=227 success=yes exit=0 a0=efc2ac8 a1=a2f0d3 a2=f03b0c0 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775442.898:12227): avc: denied { setattr } for pid=8303 comm="yum" name="subversion" dev=dm-0 ino=13063900 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=dir type=SYSCALL msg=audit(1163775442.898:12227): arch=40000003 syscall=212 success=yes exit=0 a0=efc2ac8 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775443.238:12228): avc: denied { relabelfrom } for pid=8303 comm="yum" name="libsvn" dev=dm-0 ino=11690863 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=dir type=AVC msg=audit(1163775443.238:12228): avc: denied { relabelto } for pid=8303 comm="yum" name="libsvn" dev=dm-0 ino=11690863 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=dir type=SYSCALL msg=audit(1163775443.238:12228): arch=40000003 syscall=227 success=yes exit=0 a0=eeea900 a1=a2f0d3 a2=eee9460 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775443.238:12229): avc: denied { setattr } for pid=8303 comm="yum" name="libsvn" dev=dm-0 ino=11690863 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=dir type=SYSCALL msg=audit(1163775443.238:12229): arch=40000003 syscall=212 success=yes exit=0 a0=eeea900 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775449.427:12230): avc: denied { unlink } for pid=8303 comm="yum" name="virsh" dev=dm-0 ino=10317042 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xm_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775449.427:12230): arch=40000003 syscall=38 success=yes exit=0 a0=eee9688 a1=f0383b0 a2=d2a040 a3=eee9688 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775449.471:12231): avc: denied { relabelto } for pid=8303 comm="yum" name="virsh" dev=dm-0 ino=10321258 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xm_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775449.471:12231): arch=40000003 syscall=227 success=yes exit=0 a0=f0383b0 a1=a2f0d3 a2=eee9688 a3=1f items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775449.471:12232): avc: denied { setattr } for pid=8303 comm="yum" name="virsh" dev=dm-0 ino=10321258 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xm_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775449.471:12232): arch=40000003 syscall=212 success=yes exit=0 a0=f0383b0 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775467.036:12233): avc: denied { write } for pid=8303 comm="yum" name="model" dev=dm-0 ino=10738101 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:cupsd_etc_t:s0 tclass=dir type=AVC msg=audit(1163775467.036:12233): avc: denied { add_name } for pid=8303 comm="yum" name="pxlcolor.ppd;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:cupsd_etc_t:s0 tclass=dir type=AVC msg=audit(1163775467.036:12233): avc: denied { create } for pid=8303 comm="yum" name="pxlcolor.ppd;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:cupsd_etc_t:s0 tclass=file type=SYSCALL msg=audit(1163775467.036:12233): arch=40000003 syscall=5 success=yes exit=30 a0=eda4c40 a1=8241 a2=1b6 a3=8241 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775467.048:12234): avc: denied { write } for pid=8303 comm="yum" name="pxlcolor.ppd;455dcb57" dev=dm-0 ino=10738705 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:cupsd_etc_t:s0 tclass=file type=SYSCALL msg=audit(1163775467.048:12234): arch=40000003 syscall=4 success=yes exit=8192 a0=1e a1=ef4a310 a2=2000 a3=eda4d10 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775467.048:12234): path="/usr/share/cups/model/pxlcolor.ppd;455dcb57" type=AVC msg=audit(1163775467.048:12235): avc: denied { remove_name } for pid=8303 comm="yum" name="pxlcolor.ppd;455dcb57" dev=dm-0 ino=10738705 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:cupsd_etc_t:s0 tclass=dir type=AVC msg=audit(1163775467.048:12235): avc: denied { rename } for pid=8303 comm="yum" name="pxlcolor.ppd;455dcb57" dev=dm-0 ino=10738705 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:cupsd_etc_t:s0 tclass=file type=AVC msg=audit(1163775467.048:12235): avc: denied { unlink } for pid=8303 comm="yum" name="pxlcolor.ppd" dev=dm-0 ino=10738344 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:cupsd_etc_t:s0 tclass=file type=SYSCALL msg=audit(1163775467.048:12235): arch=40000003 syscall=38 success=yes exit=0 a0=eda4c40 a1=ef83438 a2=d2a040 a3=eda4c40 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775467.064:12236): avc: denied { relabelfrom } for pid=8303 comm="yum" name="pxlcolor.ppd" dev=dm-0 ino=10738705 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:cupsd_etc_t:s0 tclass=file type=AVC msg=audit(1163775467.064:12236): avc: denied { relabelto } for pid=8303 comm="yum" name="pxlcolor.ppd" dev=dm-0 ino=10738705 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:cupsd_etc_t:s0 tclass=file type=SYSCALL msg=audit(1163775467.064:12236): arch=40000003 syscall=227 success=yes exit=0 a0=ef83438 a1=a2f0d3 a2=eda4c40 a3=21 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775467.064:12237): avc: denied { setattr } for pid=8303 comm="yum" name="pxlcolor.ppd" dev=dm-0 ino=10738705 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:cupsd_etc_t:s0 tclass=file type=SYSCALL msg=audit(1163775467.064:12237): arch=40000003 syscall=212 success=yes exit=0 a0=ef83438 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775469.972:12238): avc: denied { write } for pid=8303 comm="yum" name="cjkv" dev=dm-0 ino=10836419 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:usr_t:s0 tclass=dir type=AVC msg=audit(1163775469.972:12238): avc: denied { add_name } for pid=8303 comm="yum" name="baseutil.ps;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:usr_t:s0 tclass=dir type=SYSCALL msg=audit(1163775469.972:12238): arch=40000003 syscall=5 success=yes exit=30 a0=eda9710 a1=8241 a2=1b6 a3=8241 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775469.992:12239): avc: denied { remove_name } for pid=8303 comm="yum" name="baseutil.ps;455dcb57" dev=dm-0 ino=10835826 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:usr_t:s0 tclass=dir type=SYSCALL msg=audit(1163775469.992:12239): arch=40000003 syscall=38 success=yes exit=0 a0=eda9710 a1=eda6060 a2=d2a040 a3=eda9710 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775470.412:12240): avc: denied { relabelfrom } for pid=8303 comm="yum" name="man1" dev=dm-0 ino=10543757 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:man_t:s0 tclass=dir type=AVC msg=audit(1163775470.412:12240): avc: denied { relabelto } for pid=8303 comm="yum" name="man1" dev=dm-0 ino=10543757 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:man_t:s0 tclass=dir type=SYSCALL msg=audit(1163775470.412:12240): arch=40000003 syscall=227 success=yes exit=0 a0=efa1e38 a1=a2f0d3 a2=eda6040 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775470.412:12241): avc: denied { setattr } for pid=8303 comm="yum" name="man1" dev=dm-0 ino=10543757 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:man_t:s0 tclass=dir type=SYSCALL msg=audit(1163775470.412:12241): arch=40000003 syscall=212 success=yes exit=0 a0=efa1e38 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775470.508:12242): avc: denied { create } for pid=8303 comm="yum" name="eps2eps.1.gz;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:man_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775470.508:12242): arch=40000003 syscall=83 success=yes exit=0 a0=ef4a310 a1=eda96a0 a2=508a38 a3=602c items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775470.508:12243): avc: denied { rename } for pid=8303 comm="yum" name="eps2eps.1.gz;455dcb57" dev=dm-0 ino=10331611 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:man_t:s0 tclass=lnk_file type=AVC msg=audit(1163775470.508:12243): avc: denied { unlink } for pid=8303 comm="yum" name="eps2eps.1.gz" dev=dm-0 ino=10321889 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:man_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775470.508:12243): arch=40000003 syscall=38 success=yes exit=0 a0=eda96a0 a1=ef83438 a2=d2a040 a3=eda96a0 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775470.512:12244): avc: denied { relabelfrom } for pid=8303 comm="yum" name="eps2eps.1.gz" dev=dm-0 ino=10331611 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:man_t:s0 tclass=lnk_file type=AVC msg=audit(1163775470.512:12244): avc: denied { relabelto } for pid=8303 comm="yum" name="eps2eps.1.gz" dev=dm-0 ino=10331611 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:man_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775470.512:12244): arch=40000003 syscall=227 success=yes exit=0 a0=ef83438 a1=a2f0d3 a2=efa1ff8 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775470.512:12245): avc: denied { setattr } for pid=8303 comm="yum" name="eps2eps.1.gz" dev=dm-0 ino=10331611 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:man_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775470.512:12245): arch=40000003 syscall=198 success=yes exit=0 a0=ef83438 a1=0 a2=0 a3=f030f04 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775475.524:12246): avc: denied { create } for pid=8303 comm="yum" name="2.17.0" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:lib_t:s0 tclass=dir type=SYSCALL msg=audit(1163775475.524:12246): arch=40000003 syscall=39 success=yes exit=0 a0=eda97b0 a1=1c0 a2=d2a040 a3=eda97b0 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775475.528:12247): avc: denied { relabelfrom } for pid=8303 comm="yum" name="2.17.0" dev=dm-0 ino=12051054 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:lib_t:s0 tclass=dir type=SYSCALL msg=audit(1163775475.528:12247): arch=40000003 syscall=227 success=yes exit=0 a0=eda97b0 a1=a2f0d3 a2=eda9710 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775485.721:12248): avc: denied { unlink } for pid=8303 comm="yum" name="checkpolicy" dev=dm-0 ino=10325702 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:checkpolicy_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775485.721:12248): arch=40000003 syscall=38 success=yes exit=0 a0=eed1500 a1=ef7c388 a2=d2a040 a3=eed1500 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775486.109:12249): avc: denied { relabelto } for pid=8303 comm="yum" name="checkpolicy" dev=dm-0 ino=10320741 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:checkpolicy_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775486.109:12249): arch=40000003 syscall=227 success=yes exit=0 a0=ef7c388 a1=a2f0d3 a2=ea06aa0 a3=28 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775486.109:12250): avc: denied { setattr } for pid=8303 comm="yum" name="checkpolicy" dev=dm-0 ino=10320741 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:checkpolicy_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775486.109:12250): arch=40000003 syscall=212 success=yes exit=0 a0=ef7c388 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775497.898:12251): avc: denied { getattr } for pid=8368 comm="thunderbird-bin" name="localtime" dev=dm-0 ino=9331954 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1163775497.898:12251): arch=40000003 syscall=195 success=yes exit=0 a0=c36800 a1=bfae855c a2=c4eff4 a3=0 items=0 ppid=8363 pid=8368 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird-bin" exe="/usr/lib/thunderbird-1.5.0.7/thunderbird-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC_PATH msg=audit(1163775497.898:12251): path="/etc/localtime" type=AVC msg=audit(1163775526.272:12252): avc: denied { write } for pid=8303 comm="yum" name="panel" dev=dm-0 ino=9331729 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:etc_t:s0 tclass=dir type=AVC msg=audit(1163775526.272:12252): avc: denied { add_name } for pid=8303 comm="yum" name="clock-14.rc;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:etc_t:s0 tclass=dir type=SYSCALL msg=audit(1163775526.272:12252): arch=40000003 syscall=5 success=yes exit=30 a0=f05f818 a1=8241 a2=1b6 a3=8241 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775526.292:12253): avc: denied { remove_name } for pid=8303 comm="yum" name="clock-14.rc;455dcb57" dev=dm-0 ino=9331515 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:etc_t:s0 tclass=dir type=AVC msg=audit(1163775526.292:12253): avc: denied { unlink } for pid=8303 comm="yum" name="clock-14.rc" dev=dm-0 ino=9334405 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1163775526.292:12253): arch=40000003 syscall=38 success=yes exit=0 a0=f05f818 a1=f00ac58 a2=d2a040 a3=f05f818 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775526.296:12254): avc: denied { relabelto } for pid=8303 comm="yum" name="clock-14.rc" dev=dm-0 ino=9331515 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1163775526.296:12254): arch=40000003 syscall=227 success=yes exit=0 a0=f00ac58 a1=a2f0d3 a2=f05ec38 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775526.296:12255): avc: denied { setattr } for pid=8303 comm="yum" name="clock-14.rc" dev=dm-0 ino=9331515 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1163775526.296:12255): arch=40000003 syscall=212 success=yes exit=0 a0=f00ac58 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775526.364:12256): avc: denied { unlink } for pid=8303 comm="yum" name="libxfce4panel.so.1" dev=dm-0 ino=10338329 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775526.364:12256): arch=40000003 syscall=38 success=yes exit=0 a0=f05f818 a1=f05cec8 a2=d2a040 a3=f05f818 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775526.364:12257): avc: denied { relabelto } for pid=8303 comm="yum" name="libxfce4panel.so.1" dev=dm-0 ino=10337831 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775526.364:12257): arch=40000003 syscall=227 success=yes exit=0 a0=f05cec8 a1=a2f0d3 a2=f05ce88 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775526.364:12258): avc: denied { setattr } for pid=8303 comm="yum" name="libxfce4panel.so.1" dev=dm-0 ino=10337831 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775526.364:12258): arch=40000003 syscall=198 success=yes exit=0 a0=f05cec8 a1=0 a2=0 a3=e8ffb94 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775526.472:12259): avc: denied { relabelfrom } for pid=8303 comm="yum" name="panel-plugins" dev=dm-0 ino=10345319 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=dir type=AVC msg=audit(1163775526.472:12259): avc: denied { relabelto } for pid=8303 comm="yum" name="panel-plugins" dev=dm-0 ino=10345319 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=dir type=SYSCALL msg=audit(1163775526.472:12259): arch=40000003 syscall=227 success=yes exit=0 a0=f05cf28 a1=a2f0d3 a2=f05cff0 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775526.472:12260): avc: denied { setattr } for pid=8303 comm="yum" name="panel-plugins" dev=dm-0 ino=10345319 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=dir type=SYSCALL msg=audit(1163775526.472:12260): arch=40000003 syscall=212 success=yes exit=0 a0=f05cf28 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775546.857:12261): avc: denied { write } for pid=8303 comm="yum" name="sbin" dev=dm-0 ino=9984481 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:sbin_t:s0 tclass=dir type=AVC msg=audit(1163775546.857:12261): avc: denied { add_name } for pid=8303 comm="yum" name="cbq;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:sbin_t:s0 tclass=dir type=AVC msg=audit(1163775546.857:12261): avc: denied { create } for pid=8303 comm="yum" name="cbq;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:sbin_t:s0 tclass=file type=SYSCALL msg=audit(1163775546.857:12261): arch=40000003 syscall=5 success=yes exit=30 a0=f0fb368 a1=8241 a2=1b6 a3=8241 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775546.881:12262): avc: denied { write } for pid=8303 comm="yum" name="cbq;455dcb57" dev=dm-0 ino=9984600 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:sbin_t:s0 tclass=file type=SYSCALL msg=audit(1163775546.881:12262): arch=40000003 syscall=4 success=yes exit=32768 a0=1e a1=f15f550 a2=8000 a3=f0061e8 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775546.881:12262): path="/sbin/cbq;455dcb57" type=AVC msg=audit(1163775546.881:12263): avc: denied { remove_name } for pid=8303 comm="yum" name="cbq;455dcb57" dev=dm-0 ino=9984600 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:sbin_t:s0 tclass=dir type=AVC msg=audit(1163775546.881:12263): avc: denied { rename } for pid=8303 comm="yum" name="cbq;455dcb57" dev=dm-0 ino=9984600 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:sbin_t:s0 tclass=file type=AVC msg=audit(1163775546.881:12263): avc: denied { unlink } for pid=8303 comm="yum" name="cbq" dev=dm-0 ino=9984551 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:sbin_t:s0 tclass=file type=SYSCALL msg=audit(1163775546.881:12263): arch=40000003 syscall=38 success=yes exit=0 a0=f0fb368 a1=af6f3f8 a2=d2a040 a3=f0fb368 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775546.889:12264): avc: denied { relabelfrom } for pid=8303 comm="yum" name="cbq" dev=dm-0 ino=9984600 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:sbin_t:s0 tclass=file type=AVC msg=audit(1163775546.889:12264): avc: denied { relabelto } for pid=8303 comm="yum" name="cbq" dev=dm-0 ino=9984600 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:sbin_t:s0 tclass=file type=SYSCALL msg=audit(1163775546.889:12264): arch=40000003 syscall=227 success=yes exit=0 a0=af6f3f8 a1=a2f0d3 a2=f0f3720 a3=1c items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775546.889:12265): avc: denied { setattr } for pid=8303 comm="yum" name="cbq" dev=dm-0 ino=9984600 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:sbin_t:s0 tclass=file type=SYSCALL msg=audit(1163775546.889:12265): arch=40000003 syscall=212 success=yes exit=0 a0=af6f3f8 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775546.917:12266): avc: denied { unlink } for pid=8303 comm="yum" name="ip" dev=dm-0 ino=9984625 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:ifconfig_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775546.917:12266): arch=40000003 syscall=38 success=yes exit=0 a0=f0f3810 a1=af6f3f8 a2=d2a040 a3=f0f3810 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775546.945:12267): avc: denied { relabelto } for pid=8303 comm="yum" name="ip" dev=dm-0 ino=9984563 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:ifconfig_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775546.945:12267): arch=40000003 syscall=227 success=yes exit=0 a0=af6f3f8 a1=a2f0d3 a2=f0080e0 a3=25 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775546.945:12268): avc: denied { setattr } for pid=8303 comm="yum" name="ip" dev=dm-0 ino=9984563 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:ifconfig_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775546.945:12268): arch=40000003 syscall=212 success=yes exit=0 a0=af6f3f8 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775547.253:12269): avc: denied { create } for pid=12153 comm="thunderbird-bin" scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=staff_u:staff_r:staff_thunderbird_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1163775547.253:12269): arch=40000003 syscall=102 success=yes exit=20 a0=1 a1=adf061d4 a2=c4eff4 a3=0 items=0 ppid=8363 pid=12153 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird-bin" exe="/usr/lib/thunderbird-1.5.0.7/thunderbird-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC msg=audit(1163775547.253:12270): avc: denied { bind } for pid=12153 comm="thunderbird-bin" scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=staff_u:staff_r:staff_thunderbird_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1163775547.253:12270): arch=40000003 syscall=102 success=yes exit=0 a0=2 a1=adf061d4 a2=c4eff4 a3=14 items=0 ppid=8363 pid=12153 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird-bin" exe="/usr/lib/thunderbird-1.5.0.7/thunderbird-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC msg=audit(1163775547.253:12271): avc: denied { getattr } for pid=12153 comm="thunderbird-bin" scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=staff_u:staff_r:staff_thunderbird_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1163775547.253:12271): arch=40000003 syscall=102 success=yes exit=0 a0=6 a1=adf061d4 a2=c4eff4 a3=14 items=0 ppid=8363 pid=12153 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird-bin" exe="/usr/lib/thunderbird-1.5.0.7/thunderbird-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC msg=audit(1163775547.253:12272): avc: denied { write } for pid=12153 comm="thunderbird-bin" scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=staff_u:staff_r:staff_thunderbird_t:s0 tclass=netlink_route_socket type=AVC msg=audit(1163775547.253:12272): avc: denied { nlmsg_read } for pid=12153 comm="thunderbird-bin" scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=staff_u:staff_r:staff_thunderbird_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1163775547.253:12272): arch=40000003 syscall=102 success=yes exit=20 a0=b a1=adf0510c a2=c4eff4 a3=0 items=0 ppid=8363 pid=12153 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird-bin" exe="/usr/lib/thunderbird-1.5.0.7/thunderbird-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC msg=audit(1163775547.253:12273): avc: denied { read } for pid=12153 comm="thunderbird-bin" scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=staff_u:staff_r:staff_thunderbird_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1163775547.253:12273): arch=40000003 syscall=102 success=yes exit=188 a0=11 a1=adf0510c a2=c4eff4 a3=0 items=0 ppid=8363 pid=12153 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird-bin" exe="/usr/lib/thunderbird-1.5.0.7/thunderbird-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC msg=audit(1163775548.961:12274): avc: denied { execute } for pid=12155 comm="sh" name="groupadd" dev=dm-0 ino=10321803 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:groupadd_exec_t:s0 tclass=file type=AVC msg=audit(1163775548.961:12274): avc: denied { execute_no_trans } for pid=12155 comm="sh" name="groupadd" dev=dm-0 ino=10321803 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:groupadd_exec_t:s0 tclass=file type=AVC msg=audit(1163775548.961:12274): avc: denied { read } for pid=12155 comm="sh" name="groupadd" dev=dm-0 ino=10321803 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:groupadd_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775548.961:12274): arch=40000003 syscall=11 success=yes exit=0 a0=9129d48 a1=9129168 a2=9129ea8 a3=9129b40 items=0 ppid=12154 pid=12155 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="groupadd" exe="/usr/sbin/groupadd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775548.961:12274): path="/usr/sbin/groupadd" type=AVC_PATH msg=audit(1163775548.961:12274): path="/usr/sbin/groupadd" type=AVC msg=audit(1163775549.293:12275): avc: denied { unlink } for pid=8303 comm="yum" name="prefdm" dev=dm-0 ino=9330912 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775549.293:12275): arch=40000003 syscall=38 success=yes exit=0 a0=f110f18 a1=f0f8690 a2=d2a040 a3=f110f18 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775549.309:12276): avc: denied { relabelto } for pid=8303 comm="yum" name="prefdm" dev=dm-0 ino=9329924 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775549.309:12276): arch=40000003 syscall=227 success=yes exit=0 a0=f0f8690 a1=a2f0d3 a2=f002208 a3=23 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775549.313:12277): avc: denied { setattr } for pid=8303 comm="yum" name="prefdm" dev=dm-0 ino=9329924 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775549.313:12277): arch=40000003 syscall=212 success=yes exit=0 a0=f0f8690 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775549.317:12278): avc: denied { relabelfrom } for pid=8303 comm="yum" name="ppp" dev=dm-0 ino=9330491 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:pppd_etc_t:s0 tclass=dir type=AVC msg=audit(1163775549.317:12278): avc: denied { relabelto } for pid=8303 comm="yum" name="ppp" dev=dm-0 ino=9330491 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:pppd_etc_t:s0 tclass=dir type=SYSCALL msg=audit(1163775549.317:12278): arch=40000003 syscall=227 success=yes exit=0 a0=f16f548 a1=a2f0d3 a2=f002208 a3=20 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775549.321:12279): avc: denied { setattr } for pid=8303 comm="yum" name="ppp" dev=dm-0 ino=9330491 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:pppd_etc_t:s0 tclass=dir type=SYSCALL msg=audit(1163775549.321:12279): arch=40000003 syscall=212 success=yes exit=0 a0=f16f548 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775549.321:12280): avc: denied { write } for pid=8303 comm="yum" name="ppp" dev=dm-0 ino=9330491 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:pppd_etc_t:s0 tclass=dir type=AVC msg=audit(1163775549.321:12280): avc: denied { add_name } for pid=8303 comm="yum" name="ip-down;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:pppd_etc_t:s0 tclass=dir type=AVC msg=audit(1163775549.321:12280): avc: denied { create } for pid=8303 comm="yum" name="ip-down;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:pppd_etc_t:s0 tclass=file type=SYSCALL msg=audit(1163775549.321:12280): arch=40000003 syscall=5 success=yes exit=30 a0=ea06a70 a1=8241 a2=1b6 a3=8241 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775549.325:12281): avc: denied { write } for pid=8303 comm="yum" name="ip-down;455dcb57" dev=dm-0 ino=9331157 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:pppd_etc_t:s0 tclass=file type=SYSCALL msg=audit(1163775549.325:12281): arch=40000003 syscall=4 success=yes exit=386 a0=1e a1=b6dcb000 a2=182 a3=f0dd100 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775549.325:12281): path="/etc/ppp/ip-down;455dcb57" type=AVC msg=audit(1163775549.329:12282): avc: denied { remove_name } for pid=8303 comm="yum" name="ip-down;455dcb57" dev=dm-0 ino=9331157 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:pppd_etc_t:s0 tclass=dir type=AVC msg=audit(1163775549.329:12282): avc: denied { rename } for pid=8303 comm="yum" name="ip-down;455dcb57" dev=dm-0 ino=9331157 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:pppd_etc_t:s0 tclass=file type=AVC msg=audit(1163775549.329:12282): avc: denied { unlink } for pid=8303 comm="yum" name="ip-down" dev=dm-0 ino=9331766 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:pppd_script_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775549.329:12282): arch=40000003 syscall=38 success=yes exit=0 a0=ea06a70 a1=f0f8690 a2=d2a040 a3=ea06a70 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775549.329:12283): avc: denied { relabelfrom } for pid=8303 comm="yum" name="ip-down" dev=dm-0 ino=9331157 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:pppd_etc_t:s0 tclass=file type=AVC msg=audit(1163775549.329:12283): avc: denied { relabelto } for pid=8303 comm="yum" name="ip-down" dev=dm-0 ino=9331157 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:pppd_script_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775549.329:12283): arch=40000003 syscall=227 success=yes exit=0 a0=f0f8690 a1=a2f0d3 a2=f1a9ca8 a3=28 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775549.329:12284): avc: denied { setattr } for pid=8303 comm="yum" name="ip-down" dev=dm-0 ino=9331157 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:pppd_script_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775549.329:12284): arch=40000003 syscall=212 success=yes exit=0 a0=f0f8690 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775549.373:12285): avc: denied { relabelfrom } for pid=8303 comm="yum" name="peers" dev=dm-0 ino=9330497 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:pppd_etc_rw_t:s0 tclass=dir type=AVC msg=audit(1163775549.373:12285): avc: denied { relabelto } for pid=8303 comm="yum" name="peers" dev=dm-0 ino=9330497 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:pppd_etc_rw_t:s0 tclass=dir type=SYSCALL msg=audit(1163775549.373:12285): arch=40000003 syscall=227 success=yes exit=0 a0=f1ab5f0 a1=a2f0d3 a2=f1b0670 a3=23 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775549.373:12286): avc: denied { setattr } for pid=8303 comm="yum" name="peers" dev=dm-0 ino=9330497 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:pppd_etc_rw_t:s0 tclass=dir type=SYSCALL msg=audit(1163775549.373:12286): arch=40000003 syscall=212 success=yes exit=0 a0=f1ab5f0 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775549.377:12287): avc: denied { create } for pid=8303 comm="yum" name="rc;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:etc_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775549.377:12287): arch=40000003 syscall=83 success=yes exit=0 a0=f194088 a1=f1ab5f0 a2=508a38 a3=602c items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775549.377:12288): avc: denied { rename } for pid=8303 comm="yum" name="rc;455dcb57" dev=dm-0 ino=9331705 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:etc_t:s0 tclass=lnk_file type=AVC msg=audit(1163775549.377:12288): avc: denied { unlink } for pid=8303 comm="yum" name="rc" dev=dm-0 ino=9331516 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775549.377:12288): arch=40000003 syscall=38 success=yes exit=0 a0=f1ab5f0 a1=ea06a80 a2=d2a040 a3=f1ab5f0 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775549.385:12289): avc: denied { relabelfrom } for pid=8303 comm="yum" name="rc" dev=dm-0 ino=9331705 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:etc_t:s0 tclass=lnk_file type=AVC msg=audit(1163775549.385:12289): avc: denied { relabelto } for pid=8303 comm="yum" name="rc" dev=dm-0 ino=9331705 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775549.385:12289): arch=40000003 syscall=227 success=yes exit=0 a0=ea06a80 a1=a2f0d3 a2=f1aea08 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775549.385:12290): avc: denied { setattr } for pid=8303 comm="yum" name="rc" dev=dm-0 ino=9331705 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775549.385:12290): arch=40000003 syscall=198 success=yes exit=0 a0=ea06a80 a1=0 a2=0 a3=f11055c items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775549.641:12291): avc: denied { unlink } for pid=8303 comm="yum" name="consoletype" dev=dm-0 ino=9984704 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:consoletype_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775549.641:12291): arch=40000003 syscall=38 success=yes exit=0 a0=f21aa78 a1=f21a418 a2=d2a040 a3=f21aa78 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775549.653:12292): avc: denied { relabelto } for pid=8303 comm="yum" name="consoletype" dev=dm-0 ino=9984625 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:consoletype_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775549.653:12292): arch=40000003 syscall=227 success=yes exit=0 a0=f21a418 a1=a2f0d3 a2=f21d4c0 a3=28 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775549.653:12293): avc: denied { setattr } for pid=8303 comm="yum" name="consoletype" dev=dm-0 ino=9984625 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:consoletype_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775549.653:12293): arch=40000003 syscall=212 success=yes exit=0 a0=f21a418 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775549.869:12294): avc: denied { unlink } for pid=8303 comm="yum" name="ppp-watch" dev=dm-0 ino=9984662 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:pppd_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775549.869:12294): arch=40000003 syscall=38 success=yes exit=0 a0=f220838 a1=f21a418 a2=d2a040 a3=f220838 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775549.889:12295): avc: denied { relabelto } for pid=8303 comm="yum" name="ppp-watch" dev=dm-0 ino=9984568 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:pppd_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775549.889:12295): arch=40000003 syscall=227 success=yes exit=0 a0=f21a418 a1=a2f0d3 a2=f222918 a3=21 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775549.889:12296): avc: denied { setattr } for pid=8303 comm="yum" name="ppp-watch" dev=dm-0 ino=9984568 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:pppd_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775549.889:12296): arch=40000003 syscall=212 success=yes exit=0 a0=f21a418 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775549.937:12297): avc: denied { unlink } for pid=8303 comm="yum" name="usernetctl" dev=dm-0 ino=10318051 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:usernetctl_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775549.937:12297): arch=40000003 syscall=38 success=yes exit=0 a0=f224d18 a1=f223ae0 a2=d2a040 a3=f224d18 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775549.953:12298): avc: denied { relabelto } for pid=8303 comm="yum" name="usernetctl" dev=dm-0 ino=10337895 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:usernetctl_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775549.953:12298): arch=40000003 syscall=227 success=yes exit=0 a0=f223ae0 a1=a2f0d3 a2=f227488 a3=27 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775549.953:12299): avc: denied { setattr } for pid=8303 comm="yum" name="usernetctl" dev=dm-0 ino=10337895 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:usernetctl_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775549.953:12299): arch=40000003 syscall=212 success=yes exit=0 a0=f223ae0 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775551.453:12300): avc: denied { relabelfrom } for pid=8303 comm="yum" name="stateless" dev=dm-0 ino=15648201 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:var_lib_t:s0 tclass=dir type=SYSCALL msg=audit(1163775551.453:12300): arch=40000003 syscall=227 success=yes exit=0 a0=f2267b8 a1=a2f0d3 a2=f226480 a3=1f items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775551.473:12301): avc: denied { relabelfrom } for pid=8303 comm="yum" name="netreport" dev=dm-0 ino=14437051 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:var_run_t:s0 tclass=dir type=AVC msg=audit(1163775551.473:12301): avc: denied { relabelto } for pid=8303 comm="yum" name="netreport" dev=dm-0 ino=14437051 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:var_run_t:s0 tclass=dir type=SYSCALL msg=audit(1163775551.473:12301): arch=40000003 syscall=227 success=yes exit=0 a0=f2267b8 a1=a2f0d3 a2=f2264d8 a3=1f items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775551.473:12302): avc: denied { setattr } for pid=8303 comm="yum" name="netreport" dev=dm-0 ino=14437051 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:var_run_t:s0 tclass=dir type=SYSCALL msg=audit(1163775551.473:12302): arch=40000003 syscall=212 success=yes exit=0 a0=f2267b8 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775553.909:12303): avc: denied { setexec } for pid=12156 comm="yum" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=process type=SYSCALL msg=audit(1163775553.909:12303): arch=40000003 syscall=4 success=no exit=-22 a0=1e a1=f16f4d8 a2=20 a3=a2f751 items=0 ppid=8303 pid=12156 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775553.981:12304): avc: denied { write } for pid=12157 comm="touch" name="btmp" dev=dm-0 ino=14437055 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:faillog_t:s0 tclass=file type=SYSCALL msg=audit(1163775553.981:12304): arch=40000003 syscall=5 success=yes exit=0 a0=bf8a6bf8 a1=8941 a2=1b6 a3=8941 items=0 ppid=12156 pid=12157 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="touch" exe="/bin/touch" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775554.025:12305): avc: denied { setattr } for pid=12158 comm="chown" name="wtmp" dev=dm-0 ino=6422812 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:wtmp_t:s0 tclass=file type=SYSCALL msg=audit(1163775554.025:12305): arch=40000003 syscall=212 success=yes exit=0 a0=889c9d0 a1=0 a2=16 a3=0 items=0 ppid=12156 pid=12158 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="chown" exe="/bin/chown" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775554.029:12306): avc: denied { setattr } for pid=12158 comm="chown" name="utmp" dev=dm-0 ino=14436583 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:initrc_var_run_t:s0 tclass=file type=SYSCALL msg=audit(1163775554.029:12306): arch=40000003 syscall=212 success=yes exit=0 a0=889c9d0 a1=0 a2=16 a3=1 items=0 ppid=12156 pid=12158 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="chown" exe="/bin/chown" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775554.029:12307): avc: denied { setattr } for pid=12158 comm="chown" name="btmp" dev=dm-0 ino=14437055 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:faillog_t:s0 tclass=file type=SYSCALL msg=audit(1163775554.029:12307): arch=40000003 syscall=212 success=yes exit=0 a0=889c9d0 a1=0 a2=16 a3=1 items=0 ppid=12156 pid=12158 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="chown" exe="/bin/chown" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775554.057:12308): avc: denied { read } for pid=12161 comm="chkconfig" name="netfs" dev=dm-0 ino=9330630 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775554.057:12308): arch=40000003 syscall=5 success=yes exit=3 a0=bfa3d930 a1=0 a2=ffffffff a3=bfa3dbb4 items=0 ppid=12156 pid=12161 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="chkconfig" exe="/sbin/chkconfig" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775554.781:12309): avc: denied { unlink } for pid=12161 comm="chkconfig" name="K75netfs" dev=dm-0 ino=9330687 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:etc_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775554.781:12309): arch=40000003 syscall=10 success=yes exit=0 a0=8c33078 a1=8c33068 a2=1 a3=0 items=0 ppid=12156 pid=12161 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="chkconfig" exe="/sbin/chkconfig" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775554.953:12310): avc: denied { execute } for pid=12165 comm="sh" name="useradd" dev=dm-0 ino=10321811 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:useradd_exec_t:s0 tclass=file type=AVC msg=audit(1163775554.953:12310): avc: denied { execute_no_trans } for pid=12165 comm="sh" name="useradd" dev=dm-0 ino=10321811 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:useradd_exec_t:s0 tclass=file type=AVC msg=audit(1163775554.953:12310): avc: denied { read } for pid=12165 comm="sh" name="useradd" dev=dm-0 ino=10321811 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:useradd_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775554.953:12310): arch=40000003 syscall=11 success=yes exit=0 a0=9007f90 a1=9007ae0 a2=90084b0 a3=9007e40 items=0 ppid=12164 pid=12165 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="useradd" exe="/usr/sbin/useradd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775554.953:12310): path="/usr/sbin/useradd" type=AVC_PATH msg=audit(1163775554.953:12310): path="/usr/sbin/useradd" type=AVC msg=audit(1163775555.041:12311): avc: denied { audit_write } for pid=12165 comm="useradd" capability=29 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=capability type=USER_CHAUTHTOK msg=audit(1163775555.041:12312): user pid=12165 uid=0 auid=500 subj=staff_u:staff_r:staff_t:s0 msg='op=adding user acct=haldaemon exe="/usr/sbin/useradd" (hostname=?, addr=?, terminal=pts/1 res=failed)' type=SYSCALL msg=audit(1163775555.041:12311): arch=40000003 syscall=102 success=yes exit=120 a0=b a1=bf93d650 a2=a47ff4 a3=bf9440a0 items=0 ppid=12164 pid=12165 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="useradd" exe="/usr/sbin/useradd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775555.073:12313): avc: denied { relabelfrom } for pid=8303 comm="yum" name="system.d" dev=dm-0 ino=9330036 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:dbusd_etc_t:s0 tclass=dir type=AVC msg=audit(1163775555.073:12313): avc: denied { relabelto } for pid=8303 comm="yum" name="system.d" dev=dm-0 ino=9330036 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:dbusd_etc_t:s0 tclass=dir type=SYSCALL msg=audit(1163775555.073:12313): arch=40000003 syscall=227 success=yes exit=0 a0=f121e30 a1=a2f0d3 a2=f231150 a3=21 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775555.073:12314): avc: denied { setattr } for pid=8303 comm="yum" name="system.d" dev=dm-0 ino=9330036 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:dbusd_etc_t:s0 tclass=dir type=SYSCALL msg=audit(1163775555.073:12314): arch=40000003 syscall=212 success=yes exit=0 a0=f121e30 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775555.073:12315): avc: denied { write } for pid=8303 comm="yum" name="system.d" dev=dm-0 ino=9330036 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:dbusd_etc_t:s0 tclass=dir type=AVC msg=audit(1163775555.073:12315): avc: denied { add_name } for pid=8303 comm="yum" name="hal.conf;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:dbusd_etc_t:s0 tclass=dir type=AVC msg=audit(1163775555.073:12315): avc: denied { create } for pid=8303 comm="yum" name="hal.conf;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:dbusd_etc_t:s0 tclass=file type=SYSCALL msg=audit(1163775555.073:12315): arch=40000003 syscall=5 success=yes exit=30 a0=e906748 a1=8241 a2=1b6 a3=8241 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775555.089:12316): avc: denied { write } for pid=8303 comm="yum" name="hal.conf;455dcb57" dev=dm-0 ino=9330704 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:dbusd_etc_t:s0 tclass=file type=SYSCALL msg=audit(1163775555.089:12316): arch=40000003 syscall=4 success=yes exit=2992 a0=1e a1=b6dcb000 a2=bb0 a3=f0facb0 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775555.089:12316): path="/etc/dbus-1/system.d/hal.conf;455dcb57" type=AVC msg=audit(1163775555.089:12317): avc: denied { remove_name } for pid=8303 comm="yum" name="hal.conf;455dcb57" dev=dm-0 ino=9330704 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:dbusd_etc_t:s0 tclass=dir type=AVC msg=audit(1163775555.089:12317): avc: denied { rename } for pid=8303 comm="yum" name="hal.conf;455dcb57" dev=dm-0 ino=9330704 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:dbusd_etc_t:s0 tclass=file type=AVC msg=audit(1163775555.089:12317): avc: denied { unlink } for pid=8303 comm="yum" name="hal.conf" dev=dm-0 ino=9331851 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:dbusd_etc_t:s0 tclass=file type=SYSCALL msg=audit(1163775555.089:12317): arch=40000003 syscall=38 success=yes exit=0 a0=e906748 a1=f231150 a2=d2a040 a3=e906748 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775555.097:12318): avc: denied { relabelfrom } for pid=8303 comm="yum" name="hal.conf" dev=dm-0 ino=9330704 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:dbusd_etc_t:s0 tclass=file type=AVC msg=audit(1163775555.097:12318): avc: denied { relabelto } for pid=8303 comm="yum" name="hal.conf" dev=dm-0 ino=9330704 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:dbusd_etc_t:s0 tclass=file type=SYSCALL msg=audit(1163775555.097:12318): arch=40000003 syscall=227 success=yes exit=0 a0=f231150 a1=a2f0d3 a2=e9067a0 a3=21 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775555.097:12319): avc: denied { setattr } for pid=8303 comm="yum" name="hal.conf" dev=dm-0 ino=9330704 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:dbusd_etc_t:s0 tclass=file type=SYSCALL msg=audit(1163775555.097:12319): arch=40000003 syscall=212 success=yes exit=0 a0=f231150 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775555.145:12320): avc: denied { getattr } for pid=6659 comm="dbus-daemon" name="/" dev=dm-0 ino=2 scontext=staff_u:staff_r:staff_dbusd_t:s0 tcontext=system_u:object_r:fs_t:s0 tclass=filesystem type=SYSCALL msg=audit(1163775555.145:12320): arch=40000003 syscall=100 success=yes exit=0 a0=12 a1=bfcd50ac a2=c4eff4 a3=ffffffb8 items=0 ppid=1 pid=6659 auid=500 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) comm="dbus-daemon" exe="/bin/dbus-daemon" subj=staff_u:staff_r:staff_dbusd_t:s0 key=(null) type=AVC msg=audit(1163775555.954:12321): avc: denied { create } for pid=8303 comm="yum" name="libhal-storage.so.1;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:lib_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775555.954:12321): arch=40000003 syscall=83 success=yes exit=0 a0=ef8fd20 a1=efa0e48 a2=508a38 a3=602c items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775555.958:12322): avc: denied { rename } for pid=8303 comm="yum" name="libhal-storage.so.1;455dcb57" dev=dm-0 ino=10337394 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:lib_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775555.958:12322): arch=40000003 syscall=38 success=yes exit=0 a0=efa0e48 a1=efffb00 a2=d2a040 a3=efa0e48 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775555.958:12323): avc: denied { relabelfrom } for pid=8303 comm="yum" name="libhal-storage.so.1" dev=dm-0 ino=10337394 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:lib_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775555.958:12323): arch=40000003 syscall=227 success=yes exit=0 a0=efffb00 a1=a2f0d3 a2=efffbc0 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775556.262:12324): avc: denied { unlink } for pid=8303 comm="yum" name="hald" dev=dm-0 ino=10321480 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:hald_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775556.262:12324): arch=40000003 syscall=38 success=yes exit=0 a0=f0d5ed8 a1=f0d5e60 a2=d2a040 a3=f0d5ed8 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775556.266:12325): avc: denied { relabelto } for pid=8303 comm="yum" name="hald" dev=dm-0 ino=10337903 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:hald_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775556.266:12325): arch=40000003 syscall=227 success=yes exit=0 a0=f0d5e60 a1=a2f0d3 a2=f1a3e78 a3=21 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775556.266:12326): avc: denied { setattr } for pid=8303 comm="yum" name="hald" dev=dm-0 ino=10337903 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:hald_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775556.266:12326): arch=40000003 syscall=212 success=yes exit=0 a0=f0d5e60 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775556.626:12327): avc: denied { relabelfrom } for pid=8303 comm="yum" name="ca" dev=dm-0 ino=10311922 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=dir type=AVC msg=audit(1163775556.626:12327): avc: denied { relabelto } for pid=8303 comm="yum" name="ca" dev=dm-0 ino=10311922 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=dir type=SYSCALL msg=audit(1163775556.626:12327): arch=40000003 syscall=227 success=yes exit=0 a0=f13f128 a1=a2f0d3 a2=f13f018 a3=1e items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775556.638:12328): avc: denied { setattr } for pid=8303 comm="yum" name="ca" dev=dm-0 ino=10311922 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=dir type=SYSCALL msg=audit(1163775556.638:12328): arch=40000003 syscall=212 success=yes exit=0 a0=f13f128 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775559.642:12329): avc: denied { write } for pid=8303 comm="yum" name="selinux" dev=dm-0 ino=9330337 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:selinux_config_t:s0 tclass=dir type=AVC msg=audit(1163775559.642:12329): avc: denied { add_name } for pid=8303 comm="yum" name="restorecond.conf;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:selinux_config_t:s0 tclass=dir type=AVC msg=audit(1163775559.642:12329): avc: denied { create } for pid=8303 comm="yum" name="restorecond.conf;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:selinux_config_t:s0 tclass=file type=SYSCALL msg=audit(1163775559.642:12329): arch=40000003 syscall=5 success=yes exit=30 a0=abaa280 a1=8241 a2=1b6 a3=8241 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775559.662:12330): avc: denied { write } for pid=8303 comm="yum" name="restorecond.conf;455dcb57" dev=dm-0 ino=9330709 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:selinux_config_t:s0 tclass=file type=SYSCALL msg=audit(1163775559.662:12330): arch=40000003 syscall=4 success=yes exit=129 a0=1e a1=b6dcb000 a2=81 a3=e8ff550 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775559.662:12330): path="/etc/selinux/restorecond.conf;455dcb57" type=AVC msg=audit(1163775559.662:12331): avc: denied { remove_name } for pid=8303 comm="yum" name="restorecond.conf;455dcb57" dev=dm-0 ino=9330709 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:selinux_config_t:s0 tclass=dir type=AVC msg=audit(1163775559.662:12331): avc: denied { rename } for pid=8303 comm="yum" name="restorecond.conf;455dcb57" dev=dm-0 ino=9330709 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:selinux_config_t:s0 tclass=file type=AVC msg=audit(1163775559.662:12331): avc: denied { unlink } for pid=8303 comm="yum" name="restorecond.conf" dev=dm-0 ino=9330199 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:selinux_config_t:s0 tclass=file type=SYSCALL msg=audit(1163775559.662:12331): arch=40000003 syscall=38 success=yes exit=0 a0=abaa280 a1=f13f168 a2=d2a040 a3=abaa280 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775559.670:12332): avc: denied { relabelfrom } for pid=8303 comm="yum" name="restorecond.conf" dev=dm-0 ino=9330709 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:selinux_config_t:s0 tclass=file type=AVC msg=audit(1163775559.670:12332): avc: denied { relabelto } for pid=8303 comm="yum" name="restorecond.conf" dev=dm-0 ino=9330709 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:selinux_config_t:s0 tclass=file type=SYSCALL msg=audit(1163775559.670:12332): arch=40000003 syscall=227 success=yes exit=0 a0=f13f168 a1=a2f0d3 a2=cb09b88 a3=26 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775559.670:12333): avc: denied { setattr } for pid=8303 comm="yum" name="restorecond.conf" dev=dm-0 ino=9330709 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:selinux_config_t:s0 tclass=file type=SYSCALL msg=audit(1163775559.670:12333): arch=40000003 syscall=212 success=yes exit=0 a0=f13f168 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775559.762:12334): avc: denied { unlink } for pid=8303 comm="yum" name="restorecon" dev=dm-0 ino=9984601 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:restorecon_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775559.762:12334): arch=40000003 syscall=38 success=yes exit=0 a0=f1d9690 a1=f1d98b0 a2=d2a040 a3=f1d9690 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775559.762:12335): avc: denied { relabelto } for pid=8303 comm="yum" name="restorecon" dev=dm-0 ino=9984525 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:restorecon_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775559.762:12335): arch=40000003 syscall=227 success=yes exit=0 a0=f1d98b0 a1=a2f0d3 a2=cb09b88 a3=27 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775559.762:12336): avc: denied { setattr } for pid=8303 comm="yum" name="restorecon" dev=dm-0 ino=9984525 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:restorecon_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775559.762:12336): arch=40000003 syscall=212 success=yes exit=0 a0=f1d98b0 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775559.766:12337): avc: denied { unlink } for pid=8303 comm="yum" name="setfiles" dev=dm-0 ino=9984633 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:setfiles_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775559.766:12337): arch=40000003 syscall=38 success=yes exit=0 a0=f1d9670 a1=f1d98b0 a2=d2a040 a3=f1d9670 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775559.770:12338): avc: denied { relabelto } for pid=8303 comm="yum" name="setfiles" dev=dm-0 ino=9984601 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:setfiles_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775559.770:12338): arch=40000003 syscall=227 success=yes exit=0 a0=f1d98b0 a1=a2f0d3 a2=c789798 a3=25 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775559.770:12339): avc: denied { setattr } for pid=8303 comm="yum" name="setfiles" dev=dm-0 ino=9984601 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:setfiles_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775559.770:12339): arch=40000003 syscall=212 success=yes exit=0 a0=f1d98b0 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775559.986:12340): avc: denied { unlink } for pid=8303 comm="yum" name="load_policy" dev=dm-0 ino=10316125 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:load_policy_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775559.986:12340): arch=40000003 syscall=38 success=yes exit=0 a0=f1de218 a1=f1dcfa0 a2=d2a040 a3=f1de218 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775559.990:12341): avc: denied { relabelto } for pid=8303 comm="yum" name="load_policy" dev=dm-0 ino=10325048 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:load_policy_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775559.990:12341): arch=40000003 syscall=227 success=yes exit=0 a0=f1dcfa0 a1=a2f0d3 a2=f1e0bc8 a3=28 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775559.990:12342): avc: denied { setattr } for pid=8303 comm="yum" name="load_policy" dev=dm-0 ino=10325048 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:load_policy_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775559.990:12342): arch=40000003 syscall=212 success=yes exit=0 a0=f1dcfa0 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775559.990:12343): avc: denied { unlink } for pid=8303 comm="yum" name="restorecond" dev=dm-0 ino=10329701 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:restorecond_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775559.990:12343): arch=40000003 syscall=38 success=yes exit=0 a0=f1e5540 a1=f1e1b80 a2=d2a040 a3=f1e5540 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775559.994:12344): avc: denied { relabelto } for pid=8303 comm="yum" name="restorecond" dev=dm-0 ino=10326222 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:restorecond_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775559.994:12344): arch=40000003 syscall=227 success=yes exit=0 a0=f1e1b80 a1=a2f0d3 a2=f1e7e70 a3=28 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775559.994:12345): avc: denied { setattr } for pid=8303 comm="yum" name="restorecond" dev=dm-0 ino=10326222 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:restorecond_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775559.994:12345): arch=40000003 syscall=212 success=yes exit=0 a0=f1e1b80 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775559.994:12346): avc: denied { unlink } for pid=8303 comm="yum" name="run_init" dev=dm-0 ino=10337318 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:run_init_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775559.994:12346): arch=40000003 syscall=38 success=yes exit=0 a0=f1e1b80 a1=f1dc8a8 a2=d2a040 a3=f1e1b80 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775560.006:12347): avc: denied { relabelto } for pid=8303 comm="yum" name="run_init" dev=dm-0 ino=10337905 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:run_init_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775560.006:12347): arch=40000003 syscall=227 success=yes exit=0 a0=f1dc8a8 a1=a2f0d3 a2=f1e7ed0 a3=25 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775560.006:12348): avc: denied { setattr } for pid=8303 comm="yum" name="run_init" dev=dm-0 ino=10337905 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:run_init_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775560.006:12348): arch=40000003 syscall=212 success=yes exit=0 a0=f1dc8a8 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775560.006:12349): avc: denied { unlink } for pid=8303 comm="yum" name="semanage" dev=dm-0 ino=10325888 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:semanage_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775560.006:12349): arch=40000003 syscall=38 success=yes exit=0 a0=f1e1b80 a1=f1dc8a8 a2=d2a040 a3=f1e1b80 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775560.014:12350): avc: denied { relabelto } for pid=8303 comm="yum" name="semanage" dev=dm-0 ino=10337318 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:semanage_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775560.014:12350): arch=40000003 syscall=227 success=yes exit=0 a0=f1dc8a8 a1=a2f0d3 a2=f1e7ea0 a3=25 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775560.014:12351): avc: denied { setattr } for pid=8303 comm="yum" name="semanage" dev=dm-0 ino=10337318 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:semanage_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775560.014:12351): arch=40000003 syscall=212 success=yes exit=0 a0=f1dc8a8 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775562.182:12352): avc: denied { execute } for pid=12171 comm="service" name="restorecond" dev=dm-0 ino=9330750 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775562.182:12352): arch=40000003 syscall=33 success=yes exit=0 a0=87b0b10 a1=1 a2=1 a3=87b02c0 items=0 ppid=12169 pid=12171 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="service" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775562.222:12353): avc: denied { execute_no_trans } for pid=12178 comm="env" name="restorecond" dev=dm-0 ino=9330750 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775562.222:12353): arch=40000003 syscall=11 success=yes exit=0 a0=bfa2bbec a1=bfa29ca8 a2=952b858 a3=5 items=0 ppid=12171 pid=12178 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="restorecond" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775562.222:12353): path="/etc/rc.d/init.d/restorecond" type=AVC msg=audit(1163775562.222:12354): avc: denied { ioctl } for pid=12178 comm="restorecond" name="restorecond" dev=dm-0 ino=9330750 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775562.222:12354): arch=40000003 syscall=54 success=no exit=-25 a0=3 a1=5401 a2=bfa29d68 a3=bfa29da8 items=0 ppid=12171 pid=12178 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="restorecond" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775562.222:12354): path="/etc/rc.d/init.d/restorecond" type=AVC msg=audit(1163775562.342:12355): avc: denied { read } for pid=12178 comm="restorecond" name="restorecond.pid" dev=dm-0 ino=14436927 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:restorecond_var_run_t:s0 tclass=file type=SYSCALL msg=audit(1163775562.342:12355): arch=40000003 syscall=5 success=yes exit=3 a0=95fa0e0 a1=8000 a2=0 a3=8000 items=0 ppid=12171 pid=12178 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="restorecond" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775562.342:12356): avc: denied { ioctl } for pid=12178 comm="restorecond" name="restorecond.pid" dev=dm-0 ino=14436927 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:restorecond_var_run_t:s0 tclass=file type=SYSCALL msg=audit(1163775562.342:12356): arch=40000003 syscall=54 success=no exit=-25 a0=0 a1=5401 a2=bfa268b8 a3=bfa268f8 items=0 ppid=12171 pid=12178 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="restorecond" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775562.342:12356): path="/var/run/restorecond.pid" type=AVC msg=audit(1163775562.406:12357): avc: denied { signal } for pid=12178 comm="restorecond" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:restorecond_t:s0 tclass=process type=SYSCALL msg=audit(1163775562.406:12357): arch=40000003 syscall=37 success=yes exit=0 a0=73d a1=f a2=73d a3=73d items=0 ppid=12171 pid=12178 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="restorecond" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775562.518:12358): avc: denied { write } for pid=12186 comm="rm" name="subsys" dev=dm-0 ino=14436611 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:var_lock_t:s0 tclass=dir type=AVC msg=audit(1163775562.518:12358): avc: denied { remove_name } for pid=12186 comm="rm" name="restorecond" dev=dm-0 ino=14436931 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:var_lock_t:s0 tclass=dir type=AVC msg=audit(1163775562.518:12358): avc: denied { unlink } for pid=12186 comm="rm" name="restorecond" dev=dm-0 ino=14436931 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:var_lock_t:s0 tclass=file type=SYSCALL msg=audit(1163775562.518:12358): arch=40000003 syscall=10 success=yes exit=0 a0=bf816f80 a1=0 a2=805277c a3=bf815604 items=0 ppid=12178 pid=12186 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="rm" exe="/bin/rm" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775562.526:12359): avc: denied { execute } for pid=12188 comm="bash" name="restorecond" dev=dm-0 ino=10326222 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:restorecond_exec_t:s0 tclass=file type=AVC msg=audit(1163775562.526:12359): avc: denied { execute_no_trans } for pid=12188 comm="bash" name="restorecond" dev=dm-0 ino=10326222 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:restorecond_exec_t:s0 tclass=file type=AVC msg=audit(1163775562.526:12359): avc: denied { read } for pid=12188 comm="bash" name="restorecond" dev=dm-0 ino=10326222 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:restorecond_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775562.526:12359): arch=40000003 syscall=11 success=yes exit=0 a0=94ee878 a1=94ee808 a2=94eea90 a3=94ee610 items=0 ppid=12187 pid=12188 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="restorecond" exe="/usr/sbin/restorecond" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775562.526:12359): path="/usr/sbin/restorecond" type=AVC_PATH msg=audit(1163775562.526:12359): path="/usr/sbin/restorecond" type=AVC msg=audit(1163775562.526:12360): avc: denied { read } for pid=12188 comm="restorecond" name="resolv.conf" dev=dm-0 ino=9330239 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:net_conf_t:s0 tclass=file type=SYSCALL msg=audit(1163775562.526:12360): arch=40000003 syscall=5 success=yes exit=5 a0=8385548 a1=28000 a2=0 a3=28000 items=0 ppid=12187 pid=12188 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="restorecond" exe="/usr/sbin/restorecond" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775562.762:12361): avc: denied { read } for pid=12188 comm="restorecond" name="secrets.tdb" dev=dm-0 ino=9330306 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:samba_secrets_t:s0 tclass=file type=SYSCALL msg=audit(1163775562.762:12361): arch=40000003 syscall=5 success=yes exit=5 a0=8385548 a1=28000 a2=0 a3=28000 items=0 ppid=12187 pid=12188 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="restorecond" exe="/usr/sbin/restorecond" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775562.786:12362): avc: denied { write } for pid=12189 comm="restorecond" name="run" dev=dm-0 ino=14436616 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:var_run_t:s0 tclass=dir type=AVC msg=audit(1163775562.786:12362): avc: denied { add_name } for pid=12189 comm="restorecond" name="restorecond.pid" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:var_run_t:s0 tclass=dir type=AVC msg=audit(1163775562.786:12362): avc: denied { create } for pid=12189 comm="restorecond" name="restorecond.pid" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:var_run_t:s0 tclass=file type=SYSCALL msg=audit(1163775562.786:12362): arch=40000003 syscall=5 success=yes exit=4 a0=6842e8 a1=28241 a2=1a4 a3=28241 items=0 ppid=12188 pid=12189 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="restorecond" exe="/usr/sbin/restorecond" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775562.786:12363): avc: denied { write } for pid=12189 comm="restorecond" name="restorecond.pid" dev=dm-0 ino=14436927 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:var_run_t:s0 tclass=file type=SYSCALL msg=audit(1163775562.786:12363): arch=40000003 syscall=4 success=yes exit=6 a0=4 a1=bfedd4c4 a2=6 a3=4 items=0 ppid=12188 pid=12189 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="restorecond" exe="/usr/sbin/restorecond" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775562.786:12363): path="/var/run/restorecond.pid" type=AVC msg=audit(1163775562.794:12364): avc: denied { add_name } for pid=12190 comm="touch" name="restorecond" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:var_lock_t:s0 tclass=dir type=SYSCALL msg=audit(1163775562.794:12364): arch=40000003 syscall=5 success=yes exit=0 a0=bfacef7a a1=8941 a2=1b6 a3=8941 items=0 ppid=12178 pid=12190 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="touch" exe="/bin/touch" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775562.794:12365): avc: denied { write } for pid=12190 comm="touch" name="restorecond" dev=dm-0 ino=14436931 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:var_lock_t:s0 tclass=file type=SYSCALL msg=audit(1163775562.794:12365): arch=40000003 syscall=271 success=yes exit=0 a0=bfacd754 a1=0 a2=7a1ff4 a3=0 items=0 ppid=12178 pid=12190 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="touch" exe="/bin/touch" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775563.302:12366): avc: denied { unlink } for pid=8303 comm="yum" name="Xreset" dev=dm-0 ino=9362698 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xsession_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775563.302:12366): arch=40000003 syscall=38 success=yes exit=0 a0=f0a3908 a1=f1a1568 a2=d2a040 a3=f0a3908 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775563.310:12367): avc: denied { relabelto } for pid=8303 comm="yum" name="Xreset" dev=dm-0 ino=9362552 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xsession_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775563.310:12367): arch=40000003 syscall=227 success=yes exit=0 a0=f1a1568 a1=a2f0d3 a2=f13a800 a3=25 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775563.310:12368): avc: denied { setattr } for pid=8303 comm="yum" name="Xreset" dev=dm-0 ino=9362552 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xsession_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775563.310:12368): arch=40000003 syscall=212 success=yes exit=0 a0=f1a1568 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775563.710:12369): avc: denied { unlink } for pid=8303 comm="yum" name="kdesu" dev=dm-0 ino=10317497 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:su_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775563.710:12369): arch=40000003 syscall=38 success=yes exit=0 a0=f26a548 a1=f267d90 a2=d2a040 a3=f26a548 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775563.770:12370): avc: denied { relabelto } for pid=8303 comm="yum" name="kdesu" dev=dm-0 ino=10334290 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:su_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775563.770:12370): arch=40000003 syscall=227 success=yes exit=0 a0=f267d90 a1=a2f0d3 a2=f269f28 a3=1f items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775563.770:12371): avc: denied { setattr } for pid=8303 comm="yum" name="kdesu" dev=dm-0 ino=10334290 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:su_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775563.770:12371): arch=40000003 syscall=212 success=yes exit=0 a0=f267d90 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775563.810:12372): avc: denied { unlink } for pid=8303 comm="yum" name="kdm" dev=dm-0 ino=10324938 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xdm_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775563.810:12372): arch=40000003 syscall=38 success=yes exit=0 a0=f26a608 a1=f267d90 a2=d2a040 a3=f26a608 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775563.878:12373): avc: denied { relabelto } for pid=8303 comm="yum" name="kdm" dev=dm-0 ino=10315462 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xdm_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775563.878:12373): arch=40000003 syscall=227 success=yes exit=0 a0=f267d90 a1=a2f0d3 a2=c35a930 a3=20 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775563.878:12374): avc: denied { setattr } for pid=8303 comm="yum" name="kdm" dev=dm-0 ino=10315462 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xdm_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775563.878:12374): arch=40000003 syscall=212 success=yes exit=0 a0=f267d90 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775564.098:12375): avc: denied { create } for pid=8303 comm="yum" name="kinfocenter;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:bin_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775564.098:12375): arch=40000003 syscall=83 success=yes exit=0 a0=f37c3a0 a1=f26af08 a2=508a38 a3=602c items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775564.098:12376): avc: denied { rename } for pid=8303 comm="yum" name="kinfocenter;455dcb57" dev=dm-0 ino=10337328 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:bin_t:s0 tclass=lnk_file type=AVC msg=audit(1163775564.098:12376): avc: denied { unlink } for pid=8303 comm="yum" name="kinfocenter" dev=dm-0 ino=10334341 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775564.098:12376): arch=40000003 syscall=38 success=yes exit=0 a0=f26af08 a1=f26b4f8 a2=d2a040 a3=f26af08 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775564.110:12377): avc: denied { relabelfrom } for pid=8303 comm="yum" name="kinfocenter" dev=dm-0 ino=10337328 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:bin_t:s0 tclass=lnk_file type=AVC msg=audit(1163775564.110:12377): avc: denied { relabelto } for pid=8303 comm="yum" name="kinfocenter" dev=dm-0 ino=10337328 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775564.110:12377): arch=40000003 syscall=227 success=yes exit=0 a0=f26b4f8 a1=a2f0d3 a2=f26b538 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775564.110:12378): avc: denied { setattr } for pid=8303 comm="yum" name="kinfocenter" dev=dm-0 ino=10337328 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775564.110:12378): arch=40000003 syscall=198 success=yes exit=0 a0=f26b4f8 a1=0 a2=0 a3=e90651c items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775581.927:12379): avc: denied { create } for pid=8303 comm="yum" name="kdm;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:usr_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775581.927:12379): arch=40000003 syscall=83 success=yes exit=0 a0=f37c3a0 a1=f39eb68 a2=508a38 a3=602c items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775581.931:12380): avc: denied { rename } for pid=8303 comm="yum" name="kdm;455dcb57" dev=dm-0 ino=11036166 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:usr_t:s0 tclass=lnk_file type=AVC msg=audit(1163775581.931:12380): avc: denied { unlink } for pid=8303 comm="yum" name="kdm" dev=dm-0 ino=11036193 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775581.931:12380): arch=40000003 syscall=38 success=yes exit=0 a0=f39eb68 a1=f39ebd0 a2=d2a040 a3=f39eb68 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775581.939:12381): avc: denied { relabelfrom } for pid=8303 comm="yum" name="kdm" dev=dm-0 ino=11036166 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:usr_t:s0 tclass=lnk_file type=AVC msg=audit(1163775581.939:12381): avc: denied { relabelto } for pid=8303 comm="yum" name="kdm" dev=dm-0 ino=11036166 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775581.939:12381): arch=40000003 syscall=227 success=yes exit=0 a0=f39ebd0 a1=a2f0d3 a2=f39ec10 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775581.939:12382): avc: denied { setattr } for pid=8303 comm="yum" name="kdm" dev=dm-0 ino=11036166 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775581.939:12382): arch=40000003 syscall=198 success=yes exit=0 a0=f39ebd0 a1=0 a2=0 a3=e90651c items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=USER_ACCT msg=audit(1163775602.316:12383): user pid=12195 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1163775602.316:12384): login pid=12195 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1163775602.440:12385): user pid=12195 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1163775602.440:12386): user pid=12195 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1163775602.440:12387): avc: denied { execute } for pid=12196 comm="sh" name="sa1" dev=dm-0 ino=13061698 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:lib_t:s0 tclass=file type=AVC msg=audit(1163775602.440:12387): avc: denied { execute_no_trans } for pid=12196 comm="sh" name="sa1" dev=dm-0 ino=13061698 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1163775602.440:12387): arch=40000003 syscall=11 success=yes exit=0 a0=8f9a1b0 a1=8f9a358 a2=8f9a290 a3=8f9a008 items=0 ppid=12195 pid=12196 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sa1" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163775602.440:12387): path="/usr/lib/sa/sa1" type=AVC msg=audit(1163775602.580:12388): avc: denied { execute } for pid=12196 comm="sa1" name="sadc" dev=dm-0 ino=11981401 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=AVC msg=audit(1163775602.580:12388): avc: denied { execute_no_trans } for pid=12196 comm="sa1" name="sadc" dev=dm-0 ino=11981401 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=AVC msg=audit(1163775602.580:12388): avc: denied { read } for pid=12196 comm="sa1" name="sadc" dev=dm-0 ino=11981401 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775602.580:12388): arch=40000003 syscall=11 success=yes exit=0 a0=94a6d48 a1=94a6740 a2=94a6d60 a3=94a6740 items=0 ppid=12195 pid=12196 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163775602.580:12388): path="/usr/lib/sa/sadc" type=AVC_PATH msg=audit(1163775602.580:12388): path="/usr/lib/sa/sadc" type=AVC msg=audit(1163775602.728:12389): avc: denied { search } for pid=12196 comm="sadc" name="net" dev=proc ino=-268435432 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=dir type=AVC msg=audit(1163775602.728:12389): avc: denied { read } for pid=12196 comm="sadc" name="dev" dev=proc ino=-268434164 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=file type=SYSCALL msg=audit(1163775602.728:12389): arch=40000003 syscall=5 success=yes exit=3 a0=8050371 a1=0 a2=1b6 a3=817e7f8 items=0 ppid=12195 pid=12196 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163775602.728:12390): avc: denied { getattr } for pid=12196 comm="sadc" name="dev" dev=proc ino=-268434164 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=file type=SYSCALL msg=audit(1163775602.728:12390): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bfedd808 a2=dd0ff4 a3=817e7f8 items=0 ppid=12195 pid=12196 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163775602.728:12390): path="/proc/net/dev" type=AVC msg=audit(1163775602.728:12391): avc: denied { search } for pid=12196 comm="sadc" name="sa" dev=dm-0 ino=14607631 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=dir type=SYSCALL msg=audit(1163775602.728:12391): arch=40000003 syscall=33 success=yes exit=0 a0=bfeddbb4 a1=0 a2=bfeddaa8 a3=bfeddab0 items=0 ppid=12195 pid=12196 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163775602.832:12392): avc: denied { read append } for pid=12196 comm="sadc" name="sa17" dev=dm-0 ino=14600257 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=file type=SYSCALL msg=audit(1163775602.832:12392): arch=40000003 syscall=5 success=yes exit=3 a0=bfeddbb4 a1=402 a2=bfeddd78 a3=bfeddab0 items=0 ppid=12195 pid=12196 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163775602.840:12393): avc: denied { search } for pid=12196 comm="sadc" name="fs" dev=proc ino=-268435428 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=dir type=AVC msg=audit(1163775602.840:12393): avc: denied { read } for pid=12196 comm="sadc" name="dentry-state" dev=proc ino=-268435230 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=file type=SYSCALL msg=audit(1163775602.840:12393): arch=40000003 syscall=5 success=yes exit=4 a0=805037f a1=0 a2=1b6 a3=817f348 items=0 ppid=12195 pid=12196 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163775602.840:12394): avc: denied { getattr } for pid=12196 comm="sadc" name="dentry-state" dev=proc ino=-268435230 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=file type=SYSCALL msg=audit(1163775602.840:12394): arch=40000003 syscall=197 success=yes exit=0 a0=4 a1=bfedd660 a2=dd0ff4 a3=817f348 items=0 ppid=12195 pid=12196 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163775602.840:12394): path="/proc/sys/fs/dentry-state" type=AVC msg=audit(1163775602.840:12395): avc: denied { search } for pid=12196 comm="sadc" name="rpc" dev=proc ino=-268433616 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_rpc_t:s0 tclass=dir type=SYSCALL msg=audit(1163775602.840:12395): arch=40000003 syscall=5 success=no exit=-2 a0=80502a5 a1=0 a2=1b6 a3=817f348 items=0 ppid=12195 pid=12196 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163775602.840:12396): avc: denied { lock } for pid=12196 comm="sadc" name="sa17" dev=dm-0 ino=14600257 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=file type=SYSCALL msg=audit(1163775602.840:12396): arch=40000003 syscall=143 success=yes exit=0 a0=3 a1=6 a2=bfeddab0 a3=3 items=0 ppid=12195 pid=12196 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163775602.840:12396): path="/var/log/sa/sa17" type=CRED_DISP msg=audit(1163775603.168:12397): user pid=12195 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1163775603.168:12398): user pid=12195 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1163775603.212:12399): avc: denied { getattr } for pid=8368 comm="thunderbird-bin" name="nsCloseAllWindows.js" dev=dm-0 ino=10738025 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1163775603.212:12399): arch=40000003 syscall=195 success=yes exit=0 a0=b5eb1ff8 a1=bfae865c a2=c4eff4 a3=bfae865c items=0 ppid=8363 pid=8368 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird-bin" exe="/usr/lib/thunderbird-1.5.0.7/thunderbird-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC_PATH msg=audit(1163775603.212:12399): path="/usr/lib/thunderbird-1.5.0.7/components/nsCloseAllWindows.js" type=AVC msg=audit(1163775603.256:12400): avc: denied { read } for pid=8368 comm="thunderbird-bin" name="nsCloseAllWindows.js" dev=dm-0 ino=10738025 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1163775603.256:12400): arch=40000003 syscall=5 success=yes exit=20 a0=b5eb1ff8 a1=0 a2=1b6 a3=b52b9800 items=0 ppid=8363 pid=8368 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird-bin" exe="/usr/lib/thunderbird-1.5.0.7/thunderbird-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC msg=audit(1163775614.593:12401): avc: denied { read } for pid=3838 comm="nautilus" name=".gdmV8RYIT" dev=dm-0 ino=14469571 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163775614.593:12401): arch=40000003 syscall=33 success=yes exit=0 a0=bf97ae55 a1=4 a2=da3a64 a3=bf97ae55 items=0 ppid=1 pid=3838 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="nautilus" exe="/usr/bin/nautilus" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775623.350:12402): avc: denied { write } for pid=12202 comm="kbuildsycoca" name=".qtrc.lock" dev=dm-0 ino=10574414 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:xdm_var_run_t:s0 tclass=file type=SYSCALL msg=audit(1163775623.350:12402): arch=40000003 syscall=5 success=yes exit=3 a0=9943270 a1=8042 a2=180 a3=8042 items=0 ppid=12197 pid=12202 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="kbuildsycoca" exe="/usr/bin/kbuildsycoca" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775623.438:12403): avc: denied { write } for pid=12202 comm="kbuildsycoca" name="kdeglobals" dev=dm-0 ino=11036161 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=file type=SYSCALL msg=audit(1163775623.438:12403): arch=40000003 syscall=33 success=yes exit=0 a0=994c2a8 a1=2 a2=af76dc a3=bfecb290 items=0 ppid=12197 pid=12202 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="kbuildsycoca" exe="/usr/bin/kbuildsycoca" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775623.450:12404): avc: denied { write } for pid=12202 comm="kbuildsycoca" name="ksycoca" dev=dm-0 ino=11036830 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:usr_t:s0 tclass=file type=SYSCALL msg=audit(1163775623.450:12404): arch=40000003 syscall=33 success=yes exit=0 a0=994c1e8 a1=2 a2=af76dc a3=bfecb410 items=0 ppid=12197 pid=12202 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="kbuildsycoca" exe="/usr/bin/kbuildsycoca" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775630.574:12405): avc: denied { rmdir } for pid=12202 comm="kbuildsycoca" name="applnk" dev=dm-0 ino=11036154 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=dir type=SYSCALL msg=audit(1163775630.574:12405): arch=40000003 syscall=40 success=no exit=-39 a0=9949b78 a1=9949b78 a2=d73958 a3=bfecb724 items=0 ppid=12197 pid=12202 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="kbuildsycoca" exe="/usr/bin/kbuildsycoca" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775630.906:12406): avc: denied { relabelfrom } for pid=8303 comm="yum" name="cups" dev=dm-0 ino=9330715 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:cupsd_etc_t:s0 tclass=dir type=AVC msg=audit(1163775630.906:12406): avc: denied { relabelto } for pid=8303 comm="yum" name="cups" dev=dm-0 ino=9330715 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:cupsd_etc_t:s0 tclass=dir type=SYSCALL msg=audit(1163775630.906:12406): arch=40000003 syscall=227 success=yes exit=0 a0=f39c518 a1=a2f0d3 a2=f3a6fe8 a3=21 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775630.910:12407): avc: denied { setattr } for pid=8303 comm="yum" name="cups" dev=dm-0 ino=9330715 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:cupsd_etc_t:s0 tclass=dir type=SYSCALL msg=audit(1163775630.910:12407): arch=40000003 syscall=212 success=yes exit=0 a0=f39c518 a1=0 a2=7 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775630.910:12408): avc: denied { create } for pid=8303 comm="yum" name="client.conf;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:cupsd_etc_t:s0 tclass=file type=SYSCALL msg=audit(1163775630.910:12408): arch=40000003 syscall=5 success=yes exit=30 a0=f3a6fe8 a1=8241 a2=1b6 a3=8241 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775630.918:12409): avc: denied { rename } for pid=8303 comm="yum" name="client.conf;455dcb57" dev=dm-0 ino=9329957 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:cupsd_etc_t:s0 tclass=file type=SYSCALL msg=audit(1163775630.918:12409): arch=40000003 syscall=38 success=yes exit=0 a0=f3a6fe8 a1=f3af5e8 a2=d2a040 a3=f3a6fe8 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775630.926:12410): avc: denied { relabelfrom } for pid=8303 comm="yum" name="client.conf" dev=dm-0 ino=9329957 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:cupsd_etc_t:s0 tclass=file type=SYSCALL msg=audit(1163775630.926:12410): arch=40000003 syscall=227 success=yes exit=0 a0=f3af5e8 a1=a2f0d3 a2=f3a6bc8 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775630.926:12411): avc: denied { write } for pid=8303 comm="yum" name="cupsd.conf.default;455dcb57" dev=dm-0 ino=9330232 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:cupsd_etc_t:s0 tclass=file type=SYSCALL msg=audit(1163775630.926:12411): arch=40000003 syscall=4 success=yes exit=2472 a0=1e a1=b6dcb000 a2=9a8 a3=f2a44a8 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775630.926:12411): path="/etc/cups/cupsd.conf.default;455dcb57" type=AVC msg=audit(1163775630.926:12412): avc: denied { unlink } for pid=8303 comm="yum" name="cupsd.conf.default" dev=dm-0 ino=9330707 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:cupsd_rw_etc_t:s0 tclass=file type=SYSCALL msg=audit(1163775630.926:12412): arch=40000003 syscall=38 success=yes exit=0 a0=f2a4478 a1=f154640 a2=d2a040 a3=f2a4478 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775630.934:12413): avc: denied { relabelto } for pid=8303 comm="yum" name="cupsd.conf.default" dev=dm-0 ino=9330232 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:cupsd_rw_etc_t:s0 tclass=file type=SYSCALL msg=audit(1163775630.934:12413): arch=40000003 syscall=227 success=yes exit=0 a0=f154640 a1=a2f0d3 a2=c353758 a3=24 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775630.934:12414): avc: denied { setattr } for pid=8303 comm="yum" name="cupsd.conf.default" dev=dm-0 ino=9330232 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:cupsd_rw_etc_t:s0 tclass=file type=SYSCALL msg=audit(1163775630.934:12414): arch=40000003 syscall=212 success=yes exit=0 a0=f154640 a1=0 a2=7 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775630.954:12415): avc: denied { create } for pid=8303 comm="yum" name="cups.conf;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:dbusd_etc_t:s0 tclass=file type=SYSCALL msg=audit(1163775630.954:12415): arch=40000003 syscall=5 success=yes exit=30 a0=f3f8a90 a1=8241 a2=1b6 a3=8241 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775630.954:12416): avc: denied { write } for pid=8303 comm="yum" name="cups.conf;455dcb57" dev=dm-0 ino=9331412 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:dbusd_etc_t:s0 tclass=file type=SYSCALL msg=audit(1163775630.954:12416): arch=40000003 syscall=4 success=yes exit=460 a0=1e a1=b6dcb000 a2=1cc a3=f3f8ac0 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775630.954:12416): path="/etc/dbus-1/system.d/cups.conf;455dcb57" type=AVC msg=audit(1163775630.958:12417): avc: denied { rename } for pid=8303 comm="yum" name="cups.conf;455dcb57" dev=dm-0 ino=9331412 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:dbusd_etc_t:s0 tclass=file type=SYSCALL msg=audit(1163775630.958:12417): arch=40000003 syscall=38 success=yes exit=0 a0=f3f8a90 a1=f3f8a68 a2=d2a040 a3=f3f8a90 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775630.958:12418): avc: denied { relabelfrom } for pid=8303 comm="yum" name="cups.conf" dev=dm-0 ino=9331412 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:dbusd_etc_t:s0 tclass=file type=SYSCALL msg=audit(1163775630.958:12418): arch=40000003 syscall=227 success=yes exit=0 a0=f3f8a68 a1=a2f0d3 a2=f3f4718 a3=21 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775630.962:12419): avc: denied { unlink } for pid=8303 comm="yum" name="cancel.cups" dev=dm-0 ino=10334670 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lpr_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775630.962:12419): arch=40000003 syscall=38 success=yes exit=0 a0=f3f46f0 a1=f3f8a68 a2=d2a040 a3=f3f46f0 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775630.978:12420): avc: denied { relabelto } for pid=8303 comm="yum" name="cancel.cups" dev=dm-0 ino=10327946 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lpr_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775630.978:12420): arch=40000003 syscall=227 success=yes exit=0 a0=f3f8a68 a1=a2f0d3 a2=f3f8b50 a3=20 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775630.982:12421): avc: denied { setattr } for pid=8303 comm="yum" name="cancel.cups" dev=dm-0 ino=10327946 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lpr_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775630.982:12421): arch=40000003 syscall=212 success=yes exit=0 a0=f3f8a68 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775631.102:12422): avc: denied { unlink } for pid=8303 comm="yum" name="ipp" dev=dm-0 ino=4583583 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:cupsd_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775631.102:12422): arch=40000003 syscall=38 success=yes exit=0 a0=f3ffda0 a1=f3ffd78 a2=d2a040 a3=f3ffda0 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775631.122:12423): avc: denied { relabelto } for pid=8303 comm="yum" name="ipp" dev=dm-0 ino=10705026 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:cupsd_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775631.122:12423): arch=40000003 syscall=227 success=yes exit=0 a0=f3ffd78 a1=a2f0d3 a2=f406ff0 a3=22 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775631.122:12424): avc: denied { setattr } for pid=8303 comm="yum" name="ipp" dev=dm-0 ino=10705026 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:cupsd_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775631.122:12424): arch=40000003 syscall=212 success=yes exit=0 a0=f3ffd78 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775631.470:12425): avc: denied { write } for pid=8303 comm="yum" name="modules" dev=dm-0 ino=12345321 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:lib_t:s0 tclass=dir type=AVC msg=audit(1163775631.470:12425): avc: denied { add_name } for pid=8303 comm="yum" name="phpcups.so;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:lib_t:s0 tclass=dir type=SYSCALL msg=audit(1163775631.470:12425): arch=40000003 syscall=5 success=yes exit=30 a0=f40f438 a1=8241 a2=1b6 a3=8241 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775631.474:12426): avc: denied { remove_name } for pid=8303 comm="yum" name="phpcups.so;455dcb57" dev=dm-0 ino=12343179 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:lib_t:s0 tclass=dir type=SYSCALL msg=audit(1163775631.474:12426): arch=40000003 syscall=38 success=yes exit=0 a0=f40f438 a1=b51acc8 a2=d2a040 a3=f40f438 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775631.514:12427): avc: denied { create } for pid=8303 comm="yum" name="cupsdisable;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:sbin_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775631.514:12427): arch=40000003 syscall=83 success=yes exit=0 a0=f27c828 a1=f4147f8 a2=508a38 a3=602c items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775631.514:12428): avc: denied { rename } for pid=8303 comm="yum" name="cupsdisable;455dcb57" dev=dm-0 ino=10337772 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:sbin_t:s0 tclass=lnk_file type=AVC msg=audit(1163775631.514:12428): avc: denied { unlink } for pid=8303 comm="yum" name="cupsdisable" dev=dm-0 ino=10334675 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:sbin_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775631.514:12428): arch=40000003 syscall=38 success=yes exit=0 a0=f4147f8 a1=f4156e0 a2=d2a040 a3=f4147f8 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775631.518:12429): avc: denied { relabelfrom } for pid=8303 comm="yum" name="cupsdisable" dev=dm-0 ino=10337772 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:sbin_t:s0 tclass=lnk_file type=AVC msg=audit(1163775631.518:12429): avc: denied { relabelto } for pid=8303 comm="yum" name="cupsdisable" dev=dm-0 ino=10337772 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:sbin_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775631.518:12429): arch=40000003 syscall=227 success=yes exit=0 a0=f4156e0 a1=a2f0d3 a2=f40f3f8 a3=1c items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775631.518:12430): avc: denied { setattr } for pid=8303 comm="yum" name="cupsdisable" dev=dm-0 ino=10337772 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:sbin_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775631.518:12430): arch=40000003 syscall=198 success=yes exit=0 a0=f4156e0 a1=0 a2=0 a3=f19fdfc items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775632.498:12431): avc: denied { create } for pid=8303 comm="yum" name="doc;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:cupsd_etc_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775632.498:12431): arch=40000003 syscall=83 success=yes exit=0 a0=f27c828 a1=f41c358 a2=508a38 a3=602c items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775632.498:12432): avc: denied { rename } for pid=8303 comm="yum" name="doc;455dcb57" dev=dm-0 ino=10738075 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:cupsd_etc_t:s0 tclass=lnk_file type=AVC msg=audit(1163775632.498:12432): avc: denied { unlink } for pid=8303 comm="yum" name="doc" dev=dm-0 ino=10738076 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:cupsd_etc_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775632.498:12432): arch=40000003 syscall=38 success=yes exit=0 a0=f41c358 a1=f4147f8 a2=d2a040 a3=f41c358 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775632.502:12433): avc: denied { relabelfrom } for pid=8303 comm="yum" name="doc" dev=dm-0 ino=10738075 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:cupsd_etc_t:s0 tclass=lnk_file type=AVC msg=audit(1163775632.502:12433): avc: denied { relabelto } for pid=8303 comm="yum" name="doc" dev=dm-0 ino=10738075 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:cupsd_etc_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775632.502:12433): arch=40000003 syscall=227 success=yes exit=0 a0=f4147f8 a1=a2f0d3 a2=f41c570 a3=21 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775632.502:12434): avc: denied { setattr } for pid=8303 comm="yum" name="doc" dev=dm-0 ino=10738075 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:cupsd_etc_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775632.502:12434): arch=40000003 syscall=198 success=yes exit=0 a0=f4147f8 a1=0 a2=0 a3=f19fdfc items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775633.462:12435): avc: denied { create } for pid=8303 comm="yum" name="it" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:cupsd_etc_t:s0 tclass=dir type=SYSCALL msg=audit(1163775633.462:12435): arch=40000003 syscall=39 success=yes exit=0 a0=f41ec98 a1=1c0 a2=d2a040 a3=f41ec98 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775633.462:12436): avc: denied { relabelfrom } for pid=8303 comm="yum" name="it" dev=dm-0 ino=12177867 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:cupsd_etc_t:s0 tclass=dir type=SYSCALL msg=audit(1163775633.462:12436): arch=40000003 syscall=227 success=yes exit=0 a0=f41ec98 a1=a2f0d3 a2=f41ed80 a3=21 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775636.155:12437): avc: denied { write } for pid=8303 comm="yum" name="man1" dev=dm-0 ino=10311889 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:man_t:s0 tclass=dir type=AVC msg=audit(1163775636.155:12437): avc: denied { add_name } for pid=8303 comm="yum" name="cancel-cups.1.gz;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:man_t:s0 tclass=dir type=SYSCALL msg=audit(1163775636.155:12437): arch=40000003 syscall=83 success=yes exit=0 a0=f27c828 a1=f4262e0 a2=508a38 a3=602c items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775636.163:12438): avc: denied { remove_name } for pid=8303 comm="yum" name="cancel-cups.1.gz;455dcb57" dev=dm-0 ino=10319625 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:man_t:s0 tclass=dir type=SYSCALL msg=audit(1163775636.163:12438): arch=40000003 syscall=38 success=yes exit=0 a0=f4262e0 a1=f426170 a2=d2a040 a3=f4262e0 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775636.167:12439): avc: denied { create } for pid=8303 comm="yum" name="cups-config.1.gz;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:man_t:s0 tclass=file type=SYSCALL msg=audit(1163775636.167:12439): arch=40000003 syscall=5 success=yes exit=30 a0=f4262e0 a1=8241 a2=1b6 a3=8241 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775636.167:12440): avc: denied { write } for pid=8303 comm="yum" name="cups-config.1.gz;455dcb57" dev=dm-0 ino=10319627 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:man_t:s0 tclass=file type=SYSCALL msg=audit(1163775636.167:12440): arch=40000003 syscall=4 success=yes exit=1126 a0=1e a1=b6dcb000 a2=466 a3=f426378 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775636.167:12440): path="/usr/share/man/man1/cups-config.1.gz;455dcb57" type=AVC msg=audit(1163775636.167:12441): avc: denied { rename } for pid=8303 comm="yum" name="cups-config.1.gz;455dcb57" dev=dm-0 ino=10319627 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:man_t:s0 tclass=file type=SYSCALL msg=audit(1163775636.167:12441): arch=40000003 syscall=38 success=yes exit=0 a0=f4262e0 a1=f426170 a2=d2a040 a3=f4262e0 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775636.167:12442): avc: denied { relabelfrom } for pid=8303 comm="yum" name="cups-config.1.gz" dev=dm-0 ino=10319627 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:man_t:s0 tclass=file type=SYSCALL msg=audit(1163775636.167:12442): arch=40000003 syscall=227 success=yes exit=0 a0=f426170 a1=a2f0d3 a2=f4262b8 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775636.283:12443): avc: denied { relabelfrom } for pid=8303 comm="yum" name="cups" dev=dm-0 ino=14437052 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:cupsd_log_t:s0 tclass=dir type=AVC msg=audit(1163775636.283:12443): avc: denied { relabelto } for pid=8303 comm="yum" name="cups" dev=dm-0 ino=14437052 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:cupsd_log_t:s0 tclass=dir type=SYSCALL msg=audit(1163775636.283:12443): arch=40000003 syscall=227 success=yes exit=0 a0=f421458 a1=a2f0d3 a2=f4478b8 a3=21 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775636.315:12444): avc: denied { setattr } for pid=8303 comm="yum" name="cups" dev=dm-0 ino=14437052 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:cupsd_log_t:s0 tclass=dir type=SYSCALL msg=audit(1163775636.315:12444): arch=40000003 syscall=212 success=yes exit=0 a0=f421458 a1=4 a2=3 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775636.331:12445): avc: denied { relabelfrom } for pid=8303 comm="yum" name="cups" dev=dm-0 ino=14534808 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:cupsd_var_run_t:s0 tclass=dir type=AVC msg=audit(1163775636.331:12445): avc: denied { relabelto } for pid=8303 comm="yum" name="cups" dev=dm-0 ino=14534808 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:cupsd_var_run_t:s0 tclass=dir type=SYSCALL msg=audit(1163775636.331:12445): arch=40000003 syscall=227 success=yes exit=0 a0=f421458 a1=a2f0d3 a2=f448c88 a3=25 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775636.331:12446): avc: denied { setattr } for pid=8303 comm="yum" name="cups" dev=dm-0 ino=14534808 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:cupsd_var_run_t:s0 tclass=dir type=SYSCALL msg=audit(1163775636.331:12446): arch=40000003 syscall=212 success=yes exit=0 a0=f421458 a1=0 a2=7 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775636.355:12447): avc: denied { relabelfrom } for pid=8303 comm="yum" name="cups" dev=dm-0 ino=14437056 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:print_spool_t:s0 tclass=dir type=AVC msg=audit(1163775636.355:12447): avc: denied { relabelto } for pid=8303 comm="yum" name="cups" dev=dm-0 ino=14437056 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:print_spool_t:s0 tclass=dir type=SYSCALL msg=audit(1163775636.355:12447): arch=40000003 syscall=227 success=yes exit=0 a0=f421458 a1=a2f0d3 a2=f447908 a3=23 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775636.355:12448): avc: denied { setattr } for pid=8303 comm="yum" name="cups" dev=dm-0 ino=14437056 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:print_spool_t:s0 tclass=dir type=SYSCALL msg=audit(1163775636.355:12448): arch=40000003 syscall=212 success=yes exit=0 a0=f421458 a1=0 a2=7 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775640.143:12449): avc: denied { unlink } for pid=12210 comm="ln" name="smb" dev=dm-0 ino=10704859 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:lib_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775640.143:12449): arch=40000003 syscall=10 success=yes exit=0 a0=bfb7dbf2 a1=34aff4 a2=804f42c a3=1 items=0 ppid=12209 pid=12210 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="ln" exe="/bin/ln" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775640.811:12450): avc: denied { unlink } for pid=8303 comm="yum" name="beh" dev=dm-0 ino=15451397 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:cupsd_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775640.811:12450): arch=40000003 syscall=38 success=yes exit=0 a0=f1a0110 a1=ab82440 a2=d2a040 a3=f1a0110 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775640.859:12451): avc: denied { relabelto } for pid=8303 comm="yum" name="beh" dev=dm-0 ino=10705042 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:cupsd_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775640.859:12451): arch=40000003 syscall=227 success=yes exit=0 a0=ab82440 a1=a2f0d3 a2=f3853e8 a3=22 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775640.859:12452): avc: denied { setattr } for pid=8303 comm="yum" name="beh" dev=dm-0 ino=10705042 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:cupsd_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775640.859:12452): arch=40000003 syscall=212 success=yes exit=0 a0=ab82440 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775656.092:12453): avc: denied { relabelfrom } for pid=8303 comm="yum" name="foomatic" dev=dm-0 ino=14437080 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:cupsd_rw_etc_t:s0 tclass=dir type=AVC msg=audit(1163775656.092:12453): avc: denied { relabelto } for pid=8303 comm="yum" name="foomatic" dev=dm-0 ino=14437080 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:cupsd_rw_etc_t:s0 tclass=dir type=SYSCALL msg=audit(1163775656.092:12453): arch=40000003 syscall=227 success=yes exit=0 a0=f5832b0 a1=a2f0d3 a2=f591e68 a3=24 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775656.092:12454): avc: denied { setattr } for pid=8303 comm="yum" name="foomatic" dev=dm-0 ino=14437080 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:cupsd_rw_etc_t:s0 tclass=dir type=SYSCALL msg=audit(1163775656.092:12454): arch=40000003 syscall=212 success=yes exit=0 a0=f5832b0 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=USER_ACCT msg=audit(1163775661.176:12455): user pid=12211 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1163775661.176:12456): login pid=12211 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1163775661.176:12457): user pid=12211 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1163775661.176:12458): user pid=12211 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1163775661.180:12459): avc: denied { getattr } for pid=12212 comm="bash" name="run-parts" dev=dm-0 ino=10331890 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1163775661.180:12459): arch=40000003 syscall=195 success=yes exit=0 a0=886d120 a1=bfb4c400 a2=bdaff4 a3=886d120 items=0 ppid=12211 pid=12212 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="bash" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163775661.180:12459): path="/usr/bin/run-parts" type=AVC msg=audit(1163775661.264:12460): avc: denied { execute } for pid=12212 comm="bash" name="run-parts" dev=dm-0 ino=10331890 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1163775661.264:12460): arch=40000003 syscall=33 success=yes exit=0 a0=886d120 a1=1 a2=11 a3=886d120 items=0 ppid=12211 pid=12212 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="bash" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163775661.264:12461): avc: denied { read } for pid=12212 comm="bash" name="run-parts" dev=dm-0 ino=10331890 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1163775661.264:12461): arch=40000003 syscall=33 success=yes exit=0 a0=886d120 a1=4 a2=ffffffff a3=886d120 items=0 ppid=12211 pid=12212 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="bash" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163775661.264:12462): avc: denied { execute_no_trans } for pid=12212 comm="bash" name="run-parts" dev=dm-0 ino=10331890 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1163775661.264:12462): arch=40000003 syscall=11 success=yes exit=0 a0=886d120 a1=886d3d8 a2=886d2f8 a3=886cf98 items=0 ppid=12211 pid=12212 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="run-parts" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163775661.264:12462): path="/usr/bin/run-parts" type=AVC msg=audit(1163775661.272:12463): avc: denied { ioctl } for pid=12212 comm="run-parts" name="run-parts" dev=dm-0 ino=10331890 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1163775661.272:12463): arch=40000003 syscall=54 success=no exit=-25 a0=3 a1=5401 a2=bfcd5fb8 a3=bfcd5ff8 items=0 ppid=12211 pid=12212 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="run-parts" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163775661.272:12463): path="/usr/bin/run-parts" type=AVC msg=audit(1163775661.288:12464): avc: denied { execute } for pid=12212 comm="run-parts" name="inn-cron-nntpsend" dev=dm-0 ino=9331477 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1163775661.288:12464): arch=40000003 syscall=33 success=yes exit=0 a0=a01a990 a1=1 a2=1 a3=a01ac98 items=0 ppid=12211 pid=12212 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="run-parts" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163775661.288:12465): avc: denied { execute_no_trans } for pid=12213 comm="run-parts" name="inn-cron-nntpsend" dev=dm-0 ino=9331477 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1163775661.288:12465): arch=40000003 syscall=11 success=yes exit=0 a0=a01aa10 a1=a01aad8 a2=a01aae8 a3=a01a758 items=0 ppid=12212 pid=12213 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="inn-cron-nntpse" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163775661.288:12465): path="/etc/cron.hourly/inn-cron-nntpsend" type=AVC msg=audit(1163775661.388:12466): avc: denied { execute } for pid=12215 comm="inn-cron-nntpse" name="chkconfig" dev=dm-0 ino=9984485 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sbin_t:s0 tclass=file type=AVC msg=audit(1163775661.388:12466): avc: denied { execute_no_trans } for pid=12215 comm="inn-cron-nntpse" name="chkconfig" dev=dm-0 ino=9984485 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sbin_t:s0 tclass=file type=AVC msg=audit(1163775661.388:12466): avc: denied { read } for pid=12215 comm="inn-cron-nntpse" name="chkconfig" dev=dm-0 ino=9984485 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sbin_t:s0 tclass=file type=SYSCALL msg=audit(1163775661.388:12466): arch=40000003 syscall=11 success=yes exit=0 a0=9392678 a1=9392808 a2=9392720 a3=9392508 items=0 ppid=12213 pid=12215 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="chkconfig" exe="/sbin/chkconfig" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163775661.388:12466): path="/sbin/chkconfig" type=AVC_PATH msg=audit(1163775661.388:12466): path="/sbin/chkconfig" type=AVC msg=audit(1163775661.392:12467): avc: denied { read } for pid=12215 comm="chkconfig" name="innd" dev=dm-0 ino=9331492 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775661.392:12467): arch=40000003 syscall=5 success=yes exit=3 a0=bf82eaf0 a1=0 a2=ffffffff a3=8ba7038 items=0 ppid=12213 pid=12215 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="chkconfig" exe="/sbin/chkconfig" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163775661.392:12468): avc: denied { getattr } for pid=12215 comm="chkconfig" name="innd" dev=dm-0 ino=9331492 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775661.392:12468): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bf82ea5c a2=24bff4 a3=bf82ea5c items=0 ppid=12213 pid=12215 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="chkconfig" exe="/sbin/chkconfig" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163775661.392:12468): path="/etc/rc.d/init.d/innd" type=CRED_DISP msg=audit(1163775661.672:12469): user pid=12211 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1163775661.672:12470): user pid=12211 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1163775663.072:12471): avc: denied { read } for pid=12237 comm="cups" name="cupsd.pid" dev=dm-0 ino=14436994 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:cupsd_var_run_t:s0 tclass=file type=SYSCALL msg=audit(1163775663.072:12471): arch=40000003 syscall=5 success=yes exit=3 a0=9beee18 a1=8000 a2=0 a3=8000 items=0 ppid=12230 pid=12237 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="cups" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775663.072:12472): avc: denied { ioctl } for pid=12237 comm="cups" name="cupsd.pid" dev=dm-0 ino=14436994 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:cupsd_var_run_t:s0 tclass=file type=SYSCALL msg=audit(1163775663.072:12472): arch=40000003 syscall=54 success=no exit=-25 a0=0 a1=5401 a2=bffb0478 a3=bffb04b8 items=0 ppid=12230 pid=12237 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="cups" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775663.072:12472): path="/var/run/cupsd.pid" type=AVC msg=audit(1163775663.076:12473): avc: denied { signal } for pid=12237 comm="cups" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:cupsd_t:s0-s0:c0.c1023 tclass=process type=SYSCALL msg=audit(1163775663.076:12473): arch=40000003 syscall=37 success=yes exit=0 a0=87a a1=f a2=87a a3=87a items=0 ppid=12230 pid=12237 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="cups" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775664.304:12474): avc: denied { remove_name } for pid=12244 comm="rm" name="cupsd.pid" dev=dm-0 ino=14436994 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:var_run_t:s0 tclass=dir type=AVC msg=audit(1163775664.304:12474): avc: denied { unlink } for pid=12244 comm="rm" name="cupsd.pid" dev=dm-0 ino=14436994 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:cupsd_var_run_t:s0 tclass=file type=SYSCALL msg=audit(1163775664.304:12474): arch=40000003 syscall=10 success=yes exit=0 a0=bfc86f8a a1=0 a2=805277c a3=bfc85274 items=0 ppid=12237 pid=12244 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="rm" exe="/bin/rm" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775664.316:12475): avc: denied { execute } for pid=12246 comm="bash" name="cupsd" dev=dm-0 ino=10311849 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:cupsd_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775664.316:12475): arch=40000003 syscall=33 success=yes exit=0 a0=8746808 a1=1 a2=11 a3=8746808 items=0 ppid=12237 pid=12246 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775664.316:12476): avc: denied { read } for pid=12246 comm="bash" name="cupsd" dev=dm-0 ino=10311849 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:cupsd_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775664.316:12476): arch=40000003 syscall=33 success=yes exit=0 a0=8746808 a1=4 a2=ffffffff a3=8746808 items=0 ppid=12237 pid=12246 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775664.316:12477): avc: denied { execute_no_trans } for pid=12247 comm="bash" name="cupsd" dev=dm-0 ino=10311849 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:cupsd_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775664.316:12477): arch=40000003 syscall=11 success=yes exit=0 a0=8746808 a1=8746bf0 a2=8746b48 a3=87465a0 items=0 ppid=12246 pid=12247 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="cupsd" exe="/usr/sbin/cupsd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775664.316:12477): path="/usr/sbin/cupsd" type=AVC msg=audit(1163775664.780:12478): avc: denied { read append } for pid=12248 comm="cupsd" name="error_log" dev=dm-0 ino=14438248 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:cupsd_log_t:s0 tclass=file type=SYSCALL msg=audit(1163775664.780:12478): arch=40000003 syscall=5 success=yes exit=2 a0=bfb130b4 a1=8442 a2=1b6 a3=8442 items=0 ppid=12247 pid=12248 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="cupsd" exe="/usr/sbin/cupsd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775664.780:12479): avc: denied { setattr } for pid=12248 comm="cupsd" name="error_log" dev=dm-0 ino=14438248 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:cupsd_log_t:s0 tclass=file type=SYSCALL msg=audit(1163775664.780:12479): arch=40000003 syscall=207 success=yes exit=0 a0=2 a1=0 a2=7 a3=0 items=0 ppid=12247 pid=12248 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="cupsd" exe="/usr/sbin/cupsd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775664.928:12480): avc: denied { ioctl } for pid=12248 comm="cupsd" name="printers.conf" dev=dm-0 ino=9329769 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:cupsd_rw_etc_t:s0 tclass=file type=SYSCALL msg=audit(1163775664.928:12480): arch=40000003 syscall=54 success=no exit=-25 a0=1 a1=5401 a2=bfb1088c a3=bfb108cc items=0 ppid=12247 pid=12248 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="cupsd" exe="/usr/sbin/cupsd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775664.928:12480): path="/etc/cups/printers.conf" type=AVC msg=audit(1163775664.932:12481): avc: denied { ioctl } for pid=12248 comm="cupsd" name="error_log" dev=dm-0 ino=14438248 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:cupsd_log_t:s0 tclass=file type=SYSCALL msg=audit(1163775664.932:12481): arch=40000003 syscall=54 success=no exit=-25 a0=2 a1=5401 a2=bfb1088c a3=bfb108cc items=0 ppid=12247 pid=12248 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="cupsd" exe="/usr/sbin/cupsd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775664.932:12481): path="/var/log/cups/error_log" type=LABEL_LEVEL_CHANGE msg=audit(1163775664.932:12482): user pid=12248 uid=0 auid=500 subj=staff_u:staff_r:staff_t:s0 msg='printer=ML-1740 uri=hal:///org/freedesktop/Hal/devices/usb_device_4e8_324c_2W61BKCX911232K0_if0_printer_noserial banners=none,none range=unknown: exe="/usr/sbin/cupsd" (hostname=localhost.localdomain, addr=127.0.0.1, terminal=? res=success)' type=AVC msg=audit(1163775665.052:12483): avc: denied { write } for pid=12248 comm="cupsd" name="printcap" dev=dm-0 ino=9329785 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:cupsd_rw_etc_t:s0 tclass=file type=SYSCALL msg=audit(1163775665.052:12483): arch=40000003 syscall=5 success=yes exit=1 a0=9108640 a1=8241 a2=1b6 a3=8241 items=0 ppid=12247 pid=12248 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="cupsd" exe="/usr/sbin/cupsd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775665.076:12484): avc: denied { read } for pid=12248 comm="cupsd" name="c00026" dev=dm-0 ino=14437207 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:print_spool_t:s0 tclass=file type=SYSCALL msg=audit(1163775665.076:12484): arch=40000003 syscall=5 success=yes exit=3 a0=bfb14e38 a1=8000 a2=0 a3=8000 items=0 ppid=12247 pid=12248 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="cupsd" exe="/usr/sbin/cupsd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775665.104:12485): avc: denied { node_bind } for pid=12248 comm="cupsd" saddr=127.0.0.1 src=631 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lo_node_t:s0 tclass=tcp_socket type=AVC msg=audit(1163775665.104:12485): avc: denied { net_bind_service } for pid=12248 comm="cupsd" capability=10 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=capability type=SYSCALL msg=audit(1163775665.104:12485): arch=40000003 syscall=102 success=yes exit=0 a0=2 a1=bfb16a60 a2=927ff4 a3=bfb16a94 items=0 ppid=12247 pid=12248 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="cupsd" exe="/usr/sbin/cupsd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775665.104:12486): avc: denied { name_bind } for pid=12248 comm="cupsd" src=631 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:ipp_port_t:s0 tclass=udp_socket type=SYSCALL msg=audit(1163775665.104:12486): arch=40000003 syscall=102 success=yes exit=0 a0=2 a1=bfb16b50 a2=927ff4 a3=928964 items=0 ppid=12247 pid=12248 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="cupsd" exe="/usr/sbin/cupsd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775665.108:12487): avc: denied { write } for pid=12248 comm="cupsd" name="certs" dev=dm-0 ino=14534810 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:cupsd_var_run_t:s0 tclass=dir type=AVC msg=audit(1163775665.108:12487): avc: denied { add_name } for pid=12248 comm="cupsd" name="0" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:cupsd_var_run_t:s0 tclass=dir type=AVC msg=audit(1163775665.108:12487): avc: denied { create } for pid=12248 comm="cupsd" name="0" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:cupsd_var_run_t:s0 tclass=file type=SYSCALL msg=audit(1163775665.108:12487): arch=40000003 syscall=5 success=yes exit=7 a0=bfb16788 a1=80c1 a2=100 a3=80c1 items=0 ppid=12247 pid=12248 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="cupsd" exe="/usr/sbin/cupsd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775665.108:12488): avc: denied { setattr } for pid=12248 comm="cupsd" name="0" dev=dm-0 ino=14534809 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:cupsd_var_run_t:s0 tclass=file type=SYSCALL msg=audit(1163775665.108:12488): arch=40000003 syscall=94 success=yes exit=0 a0=7 a1=120 a2=927ff4 a3=21 items=0 ppid=12247 pid=12248 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="cupsd" exe="/usr/sbin/cupsd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775665.108:12489): avc: denied { write } for pid=12248 comm="cupsd" name="0" dev=dm-0 ino=14534809 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:cupsd_var_run_t:s0 tclass=file type=SYSCALL msg=audit(1163775665.108:12489): arch=40000003 syscall=4 success=yes exit=32 a0=7 a1=9139578 a2=20 a3=9139578 items=0 ppid=12247 pid=12248 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="cupsd" exe="/usr/sbin/cupsd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775665.108:12489): path="/var/run/cups/certs/0" type=AVC msg=audit(1163775666.252:12490): avc: denied { unlink } for pid=8303 comm="yum" name="hal_lpadmin" dev=dm-0 ino=10327522 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:cupsd_config_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775666.252:12490): arch=40000003 syscall=38 success=yes exit=0 a0=f27fe68 a1=f280838 a2=d2a040 a3=f27fe68 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775666.276:12491): avc: denied { relabelto } for pid=8303 comm="yum" name="hal_lpadmin" dev=dm-0 ino=10326729 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:cupsd_config_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775666.276:12491): arch=40000003 syscall=227 success=yes exit=0 a0=f280838 a1=a2f0d3 a2=f147e60 a3=29 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775666.276:12492): avc: denied { setattr } for pid=8303 comm="yum" name="hal_lpadmin" dev=dm-0 ino=10326729 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:cupsd_config_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775666.276:12492): arch=40000003 syscall=212 success=yes exit=0 a0=f280838 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775693.654:12493): avc: denied { relabelfrom } for pid=8303 comm="yum" name="selinux" dev=dm-0 ino=9330337 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:selinux_config_t:s0 tclass=dir type=AVC msg=audit(1163775693.654:12493): avc: denied { relabelto } for pid=8303 comm="yum" name="selinux" dev=dm-0 ino=9330337 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:selinux_config_t:s0 tclass=dir type=SYSCALL msg=audit(1163775693.654:12493): arch=40000003 syscall=227 success=yes exit=0 a0=f494f10 a1=a2f0d3 a2=f148140 a3=26 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775693.702:12494): avc: denied { setattr } for pid=8303 comm="yum" name="selinux" dev=dm-0 ino=9330337 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:selinux_config_t:s0 tclass=dir type=SYSCALL msg=audit(1163775693.702:12494): arch=40000003 syscall=212 success=yes exit=0 a0=f494f10 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775696.138:12495): avc: denied { write } for pid=12273 comm="cp" name="seusers" dev=dm-0 ino=9334717 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:semanage_store_t:s0 tclass=file type=SYSCALL msg=audit(1163775696.138:12495): arch=40000003 syscall=5 success=yes exit=4 a0=bfe4dbe1 a1=8201 a2=0 a3=8201 items=0 ppid=12272 pid=12273 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="cp" exe="/bin/cp" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775696.378:12496): avc: denied { unlink } for pid=8303 comm="yum" name="ssh-keygen" dev=dm-0 ino=10330013 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:ssh_keygen_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775696.378:12496): arch=40000003 syscall=38 success=yes exit=0 a0=f57c240 a1=f0a1860 a2=d2a040 a3=f57c240 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775696.402:12497): avc: denied { relabelto } for pid=8303 comm="yum" name="ssh-keygen" dev=dm-0 ino=10316656 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:ssh_keygen_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775696.402:12497): arch=40000003 syscall=227 success=yes exit=0 a0=f0a1860 a1=a2f0d3 a2=f3761f0 a3=27 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775696.402:12498): avc: denied { setattr } for pid=8303 comm="yum" name="ssh-keygen" dev=dm-0 ino=10316656 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:ssh_keygen_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775696.402:12498): arch=40000003 syscall=212 success=yes exit=0 a0=f0a1860 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775696.434:12499): avc: denied { unlink } for pid=8303 comm="yum" name="ssh-keysign" dev=dm-0 ino=1014851 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:ssh_keysign_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775696.434:12499): arch=40000003 syscall=38 success=yes exit=0 a0=f147e00 a1=f54c580 a2=d2a040 a3=f147e00 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775696.486:12500): avc: denied { relabelto } for pid=8303 comm="yum" name="ssh-keysign" dev=dm-0 ino=10802910 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:ssh_keysign_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775696.486:12500): arch=40000003 syscall=227 success=yes exit=0 a0=f54c580 a1=a2f0d3 a2=f147e00 a3=28 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775696.486:12501): avc: denied { setattr } for pid=8303 comm="yum" name="ssh-keysign" dev=dm-0 ino=10802910 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:ssh_keysign_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775696.486:12501): arch=40000003 syscall=212 success=yes exit=0 a0=f54c580 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775707.375:12502): avc: denied { unlink } for pid=8303 comm="yum" name="newrole" dev=dm-0 ino=10318603 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:newrole_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775707.375:12502): arch=40000003 syscall=38 success=yes exit=0 a0=f375a98 a1=f4909b8 a2=d2a040 a3=f375a98 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775707.403:12503): avc: denied { relabelto } for pid=8303 comm="yum" name="newrole" dev=dm-0 ino=10325592 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:newrole_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775707.403:12503): arch=40000003 syscall=227 success=yes exit=0 a0=f4909b8 a1=a2f0d3 a2=f4b8e20 a3=24 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775707.403:12504): avc: denied { setattr } for pid=8303 comm="yum" name="newrole" dev=dm-0 ino=10325592 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:newrole_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775707.403:12504): arch=40000003 syscall=212 success=yes exit=0 a0=f4909b8 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775708.535:12505): avc: denied { write } for pid=8303 comm="yum" name="ppp" dev=dm-0 ino=9330491 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:pppd_etc_t:s0 tclass=dir type=AVC msg=audit(1163775708.535:12505): avc: denied { add_name } for pid=8303 comm="yum" name="ioptions;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:pppd_etc_t:s0 tclass=dir type=AVC msg=audit(1163775708.535:12505): avc: denied { create } for pid=8303 comm="yum" name="ioptions;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:pppd_etc_t:s0 tclass=file type=SYSCALL msg=audit(1163775708.535:12505): arch=40000003 syscall=5 success=yes exit=30 a0=f27c7a0 a1=8241 a2=1b6 a3=8241 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775708.535:12506): avc: denied { remove_name } for pid=8303 comm="yum" name="ioptions;455dcb57" dev=dm-0 ino=9330999 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:pppd_etc_t:s0 tclass=dir type=AVC msg=audit(1163775708.535:12506): avc: denied { rename } for pid=8303 comm="yum" name="ioptions;455dcb57" dev=dm-0 ino=9330999 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:pppd_etc_t:s0 tclass=file type=AVC msg=audit(1163775708.535:12506): avc: denied { unlink } for pid=8303 comm="yum" name="ioptions" dev=dm-0 ino=9331000 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:pppd_etc_rw_t:s0 tclass=file type=SYSCALL msg=audit(1163775708.535:12506): arch=40000003 syscall=38 success=yes exit=0 a0=f27c7a0 a1=f4b0458 a2=d2a040 a3=f27c7a0 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775708.535:12507): avc: denied { relabelfrom } for pid=8303 comm="yum" name="ioptions" dev=dm-0 ino=9330999 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:pppd_etc_t:s0 tclass=file type=AVC msg=audit(1163775708.535:12507): avc: denied { relabelto } for pid=8303 comm="yum" name="ioptions" dev=dm-0 ino=9330999 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:pppd_etc_rw_t:s0 tclass=file type=SYSCALL msg=audit(1163775708.535:12507): arch=40000003 syscall=227 success=yes exit=0 a0=f4b0458 a1=a2f0d3 a2=eeffe80 a3=23 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775708.535:12508): avc: denied { setattr } for pid=8303 comm="yum" name="ioptions" dev=dm-0 ino=9330999 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:pppd_etc_rw_t:s0 tclass=file type=SYSCALL msg=audit(1163775708.535:12508): arch=40000003 syscall=212 success=yes exit=0 a0=f4b0458 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775708.551:12509): avc: denied { relabelfrom } for pid=8303 comm="yum" name="isdn" dev=dm-0 ino=9331005 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:pppd_etc_rw_t:s0 tclass=dir type=AVC msg=audit(1163775708.551:12509): avc: denied { relabelto } for pid=8303 comm="yum" name="isdn" dev=dm-0 ino=9331005 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:pppd_etc_rw_t:s0 tclass=dir type=SYSCALL msg=audit(1163775708.551:12509): arch=40000003 syscall=227 success=yes exit=0 a0=f4b0458 a1=a2f0d3 a2=f4b3278 a3=23 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775708.551:12510): avc: denied { setattr } for pid=8303 comm="yum" name="isdn" dev=dm-0 ino=9331005 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:pppd_etc_rw_t:s0 tclass=dir type=SYSCALL msg=audit(1163775708.551:12510): arch=40000003 syscall=212 success=yes exit=0 a0=f4b0458 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775708.555:12511): avc: denied { write } for pid=8303 comm="yum" name="isdn" dev=dm-0 ino=9331005 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:pppd_etc_rw_t:s0 tclass=dir type=AVC msg=audit(1163775708.555:12511): avc: denied { add_name } for pid=8303 comm="yum" name="arcor;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:pppd_etc_rw_t:s0 tclass=dir type=AVC msg=audit(1163775708.555:12511): avc: denied { create } for pid=8303 comm="yum" name="arcor;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:pppd_etc_rw_t:s0 tclass=file type=SYSCALL msg=audit(1163775708.555:12511): arch=40000003 syscall=5 success=yes exit=30 a0=ef000c0 a1=8241 a2=1b6 a3=8241 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775708.555:12512): avc: denied { write } for pid=8303 comm="yum" name="arcor;455dcb57" dev=dm-0 ino=9331000 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:pppd_etc_rw_t:s0 tclass=file type=SYSCALL msg=audit(1163775708.555:12512): arch=40000003 syscall=4 success=yes exit=180 a0=1e a1=b6dcb000 a2=b4 a3=f55d720 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775708.555:12512): path="/etc/ppp/peers/isdn/arcor;455dcb57" type=AVC msg=audit(1163775708.555:12513): avc: denied { remove_name } for pid=8303 comm="yum" name="arcor;455dcb57" dev=dm-0 ino=9331000 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:pppd_etc_rw_t:s0 tclass=dir type=AVC msg=audit(1163775708.555:12513): avc: denied { rename } for pid=8303 comm="yum" name="arcor;455dcb57" dev=dm-0 ino=9331000 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:pppd_etc_rw_t:s0 tclass=file type=SYSCALL msg=audit(1163775708.555:12513): arch=40000003 syscall=38 success=yes exit=0 a0=ef000c0 a1=f375a98 a2=d2a040 a3=ef000c0 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775708.559:12514): avc: denied { relabelfrom } for pid=8303 comm="yum" name="arcor" dev=dm-0 ino=9331000 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:pppd_etc_rw_t:s0 tclass=file type=SYSCALL msg=audit(1163775708.559:12514): arch=40000003 syscall=227 success=yes exit=0 a0=f375a98 a1=a2f0d3 a2=f4b3278 a3=23 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775710.859:12515): avc: denied { relabelfrom } for pid=8303 comm="yum" name="vbox" dev=dm-0 ino=14437085 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:var_log_t:s0 tclass=dir type=AVC msg=audit(1163775710.859:12515): avc: denied { relabelto } for pid=8303 comm="yum" name="vbox" dev=dm-0 ino=14437085 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:var_log_t:s0 tclass=dir type=SYSCALL msg=audit(1163775710.859:12515): arch=40000003 syscall=227 success=yes exit=0 a0=f641240 a1=a2f0d3 a2=f6411e0 a3=1f items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775710.863:12516): avc: denied { setattr } for pid=8303 comm="yum" name="vbox" dev=dm-0 ino=14437085 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:var_log_t:s0 tclass=dir type=SYSCALL msg=audit(1163775710.863:12516): arch=40000003 syscall=212 success=yes exit=0 a0=f641240 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775710.863:12517): avc: denied { relabelfrom } for pid=8303 comm="yum" name="vbox" dev=dm-0 ino=14437086 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:var_spool_t:s0 tclass=dir type=AVC msg=audit(1163775710.863:12517): avc: denied { relabelto } for pid=8303 comm="yum" name="vbox" dev=dm-0 ino=14437086 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:var_spool_t:s0 tclass=dir type=SYSCALL msg=audit(1163775710.863:12517): arch=40000003 syscall=227 success=yes exit=0 a0=f641240 a1=a2f0d3 a2=b4ef810 a3=21 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775710.863:12518): avc: denied { setattr } for pid=8303 comm="yum" name="vbox" dev=dm-0 ino=14437086 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:var_spool_t:s0 tclass=dir type=SYSCALL msg=audit(1163775710.863:12518): arch=40000003 syscall=212 success=yes exit=0 a0=f641240 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775713.747:12519): avc: denied { unlink } for pid=12284 comm="chkconfig" name="K91capi" dev=dm-0 ino=7365619 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:etc_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775713.747:12519): arch=40000003 syscall=10 success=yes exit=0 a0=946aba0 a1=946ab90 a2=1 a3=946aa38 items=0 ppid=12280 pid=12284 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="chkconfig" exe="/sbin/chkconfig" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775721.816:12520): avc: denied { ptrace } for pid=12289 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process type=SYSCALL msg=audit(1163775721.816:12520): arch=40000003 syscall=195 success=no exit=-2 a0=9b280a0 a1=bfb8cbb4 a2=385ff4 a3=bfb8bf2c items=0 ppid=12288 pid=12289 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775721.816:12521): avc: denied { ptrace } for pid=12289 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:auditd_t:s0 tclass=process type=SYSCALL msg=audit(1163775721.816:12521): arch=40000003 syscall=195 success=yes exit=0 a0=9b28088 a1=bfb8cbb4 a2=385ff4 a3=bfb8bf2c items=0 ppid=12288 pid=12289 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775721.816:12522): avc: denied { ptrace } for pid=12289 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:syslogd_t:s0 tclass=process type=SYSCALL msg=audit(1163775721.816:12522): arch=40000003 syscall=195 success=yes exit=0 a0=9b28088 a1=bfb8cbb4 a2=385ff4 a3=bfb8bf2c items=0 ppid=12288 pid=12289 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775721.816:12523): avc: denied { ptrace } for pid=12289 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:irqbalance_t:s0 tclass=process type=SYSCALL msg=audit(1163775721.816:12523): arch=40000003 syscall=195 success=yes exit=0 a0=9b28088 a1=bfb8cbb4 a2=385ff4 a3=bfb8bf2c items=0 ppid=12288 pid=12289 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775721.820:12524): avc: denied { ptrace } for pid=12289 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:setrans_t:s0-s0:c0.c1023 tclass=process type=SYSCALL msg=audit(1163775721.820:12524): arch=40000003 syscall=195 success=yes exit=0 a0=9b28088 a1=bfb8cbb4 a2=385ff4 a3=bfb8bf2c items=0 ppid=12288 pid=12289 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775721.820:12525): avc: denied { ptrace } for pid=12289 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:portmap_t:s0 tclass=process type=SYSCALL msg=audit(1163775721.820:12525): arch=40000003 syscall=195 success=yes exit=0 a0=9b28088 a1=bfb8cbb4 a2=385ff4 a3=bfb8bf2c items=0 ppid=12288 pid=12289 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775721.820:12526): avc: denied { ptrace } for pid=12289 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:rpcd_t:s0 tclass=process type=SYSCALL msg=audit(1163775721.820:12526): arch=40000003 syscall=195 success=yes exit=0 a0=9b28088 a1=bfb8cbb4 a2=385ff4 a3=bfb8bf2c items=0 ppid=12288 pid=12289 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775721.820:12527): avc: denied { ptrace } for pid=12289 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:bluetooth_t:s0 tclass=process type=SYSCALL msg=audit(1163775721.820:12527): arch=40000003 syscall=195 success=yes exit=0 a0=9b28088 a1=bfb8cbb4 a2=385ff4 a3=bfb8bf2c items=0 ppid=12288 pid=12289 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775721.820:12528): avc: denied { ptrace } for pid=12289 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:automount_t:s0 tclass=process type=SYSCALL msg=audit(1163775721.820:12528): arch=40000003 syscall=195 success=yes exit=0 a0=9b28088 a1=bfb8cbb4 a2=385ff4 a3=bfb8bf2c items=0 ppid=12288 pid=12289 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775721.820:12529): avc: denied { ptrace } for pid=12289 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:inetd_t:s0 tclass=process type=SYSCALL msg=audit(1163775721.820:12529): arch=40000003 syscall=195 success=yes exit=0 a0=9b28088 a1=bfb8cbb4 a2=385ff4 a3=bfb8bf2c items=0 ppid=12288 pid=12289 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775721.820:12530): avc: denied { ptrace } for pid=12289 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:sendmail_t:s0 tclass=process type=SYSCALL msg=audit(1163775721.820:12530): arch=40000003 syscall=195 success=yes exit=0 a0=9b28088 a1=bfb8cbb4 a2=385ff4 a3=bfb8bf2c items=0 ppid=12288 pid=12289 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775721.820:12531): avc: denied { ptrace } for pid=12289 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:gpm_t:s0 tclass=process type=SYSCALL msg=audit(1163775721.820:12531): arch=40000003 syscall=195 success=yes exit=0 a0=9b28088 a1=bfb8cbb4 a2=385ff4 a3=bfb8bf2c items=0 ppid=12288 pid=12289 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775721.820:12532): avc: denied { ptrace } for pid=12289 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tclass=process type=SYSCALL msg=audit(1163775721.820:12532): arch=40000003 syscall=195 success=yes exit=0 a0=9b28088 a1=bfb8cbb4 a2=385ff4 a3=bfb8bf2c items=0 ppid=12288 pid=12289 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775721.820:12533): avc: denied { ptrace } for pid=12289 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:xfs_t:s0 tclass=process type=SYSCALL msg=audit(1163775721.820:12533): arch=40000003 syscall=195 success=yes exit=0 a0=9b28088 a1=bfb8cbb4 a2=385ff4 a3=bfb8bf2c items=0 ppid=12288 pid=12289 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775721.820:12534): avc: denied { ptrace } for pid=12289 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:hald_t:s0 tclass=process type=SYSCALL msg=audit(1163775721.820:12534): arch=40000003 syscall=195 success=yes exit=0 a0=9b28088 a1=bfb8cbb4 a2=385ff4 a3=bfb8bf2c items=0 ppid=12288 pid=12289 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775721.820:12535): avc: denied { ptrace } for pid=12289 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:xenstored_t:s0 tclass=process type=SYSCALL msg=audit(1163775721.820:12535): arch=40000003 syscall=195 success=yes exit=0 a0=9b28088 a1=bfb8cbb4 a2=385ff4 a3=bfb8bf2c items=0 ppid=12288 pid=12289 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775721.820:12536): avc: denied { ptrace } for pid=12289 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:xenconsoled_t:s0 tclass=process type=SYSCALL msg=audit(1163775721.820:12536): arch=40000003 syscall=195 success=yes exit=0 a0=9b28088 a1=bfb8cbb4 a2=385ff4 a3=bfb8bf2c items=0 ppid=12288 pid=12289 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775721.820:12537): avc: denied { ptrace } for pid=12289 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:xend_t:s0 tclass=process type=SYSCALL msg=audit(1163775721.820:12537): arch=40000003 syscall=195 success=yes exit=0 a0=9b28088 a1=bfb8cbb4 a2=385ff4 a3=bfb8bf2c items=0 ppid=12288 pid=12289 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775721.820:12538): avc: denied { ptrace } for pid=12289 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:getty_t:s0 tclass=process type=SYSCALL msg=audit(1163775721.820:12538): arch=40000003 syscall=195 success=yes exit=0 a0=9b28088 a1=bfb8cbb4 a2=385ff4 a3=bfb8bf2c items=0 ppid=12288 pid=12289 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775721.824:12539): avc: denied { ptrace } for pid=12289 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tclass=process type=SYSCALL msg=audit(1163775721.824:12539): arch=40000003 syscall=195 success=yes exit=0 a0=9b28088 a1=bfb8cbb4 a2=385ff4 a3=bfb8bf2c items=0 ppid=12288 pid=12289 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775721.824:12540): avc: denied { ptrace } for pid=12289 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:xdm_xserver_t:s0-s0:c0.c1023 tclass=process type=SYSCALL msg=audit(1163775721.824:12540): arch=40000003 syscall=195 success=yes exit=0 a0=9b28088 a1=bfb8cbb4 a2=385ff4 a3=bfb8bf2c items=0 ppid=12288 pid=12289 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775721.824:12541): avc: denied { ptrace } for pid=12289 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_ssh_agent_t:s0 tclass=process type=SYSCALL msg=audit(1163775721.824:12541): arch=40000003 syscall=195 success=yes exit=0 a0=9b28088 a1=bfb8cbb4 a2=385ff4 a3=bfb8bf2c items=0 ppid=12288 pid=12289 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775721.824:12542): avc: denied { ptrace } for pid=12289 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_dbusd_t:s0 tclass=process type=SYSCALL msg=audit(1163775721.824:12542): arch=40000003 syscall=195 success=yes exit=0 a0=9b28088 a1=bfb8cbb4 a2=385ff4 a3=bfb8bf2c items=0 ppid=12288 pid=12289 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775721.824:12543): avc: denied { ptrace } for pid=12289 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:pam_t:s0 tclass=process type=SYSCALL msg=audit(1163775721.824:12543): arch=40000003 syscall=195 success=yes exit=0 a0=9b28088 a1=bfb8cbb4 a2=385ff4 a3=bfb8bf2c items=0 ppid=12288 pid=12289 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775721.824:12544): avc: denied { ptrace } for pid=12289 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_su_t:s0 tclass=process type=SYSCALL msg=audit(1163775721.824:12544): arch=40000003 syscall=195 success=yes exit=0 a0=9b28088 a1=bfb8cbb4 a2=385ff4 a3=bfb8bf2c items=0 ppid=12288 pid=12289 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775724.280:12545): avc: denied { write } for pid=8303 comm="yum" name="bin" dev=dm-0 ino=10311850 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=dir type=AVC msg=audit(1163775724.280:12545): avc: denied { add_name } for pid=8303 comm="yum" name="gnomevfs-cat;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=dir type=AVC msg=audit(1163775724.280:12545): avc: denied { create } for pid=8303 comm="yum" name="gnomevfs-cat;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1163775724.280:12545): arch=40000003 syscall=5 success=yes exit=30 a0=f5a3320 a1=8241 a2=1b6 a3=8241 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775724.280:12546): avc: denied { write } for pid=8303 comm="yum" name="gnomevfs-cat;455dcb57" dev=dm-0 ino=10312124 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1163775724.280:12546): arch=40000003 syscall=4 success=yes exit=8192 a0=1e a1=f4965d8 a2=2000 a3=ef7b798 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775724.280:12546): path="/usr/bin/gnomevfs-cat;455dcb57" type=AVC msg=audit(1163775724.280:12547): avc: denied { remove_name } for pid=8303 comm="yum" name="gnomevfs-cat;455dcb57" dev=dm-0 ino=10312124 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=dir type=AVC msg=audit(1163775724.280:12547): avc: denied { rename } for pid=8303 comm="yum" name="gnomevfs-cat;455dcb57" dev=dm-0 ino=10312124 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:bin_t:s0 tclass=file type=AVC msg=audit(1163775724.280:12547): avc: denied { unlink } for pid=8303 comm="yum" name="gnomevfs-cat" dev=dm-0 ino=10333891 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1163775724.280:12547): arch=40000003 syscall=38 success=yes exit=0 a0=f5a3320 a1=f384878 a2=d2a040 a3=f5a3320 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775724.288:12548): avc: denied { relabelfrom } for pid=8303 comm="yum" name="gnomevfs-cat" dev=dm-0 ino=10312124 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:bin_t:s0 tclass=file type=AVC msg=audit(1163775724.288:12548): avc: denied { relabelto } for pid=8303 comm="yum" name="gnomevfs-cat" dev=dm-0 ino=10312124 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1163775724.288:12548): arch=40000003 syscall=227 success=yes exit=0 a0=f384878 a1=a2f0d3 a2=f57c2e8 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775724.288:12549): avc: denied { setattr } for pid=8303 comm="yum" name="gnomevfs-cat" dev=dm-0 ino=10312124 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1163775724.288:12549): arch=40000003 syscall=212 success=yes exit=0 a0=f384878 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775725.040:12550): avc: denied { write } for pid=8303 comm="yum" name="services" dev=dm-0 ino=10543975 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=dir type=AVC msg=audit(1163775725.040:12550): avc: denied { add_name } for pid=8303 comm="yum" name="gnome-vfs-daemon.service;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=dir type=SYSCALL msg=audit(1163775725.040:12550): arch=40000003 syscall=5 success=yes exit=30 a0=ef7b8e0 a1=8241 a2=1b6 a3=8241 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775725.120:12551): avc: denied { remove_name } for pid=8303 comm="yum" name="gnome-vfs-daemon.service;455dcb57" dev=dm-0 ino=15648912 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=dir type=SYSCALL msg=audit(1163775725.120:12551): arch=40000003 syscall=38 success=yes exit=0 a0=ef7b8e0 a1=f5cd730 a2=d2a040 a3=ef7b8e0 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775725.120:12552): avc: denied { relabelto } for pid=8303 comm="yum" name="gnome-vfs2-2.16.2" dev=dm-0 ino=12179053 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=dir type=SYSCALL msg=audit(1163775725.120:12552): arch=40000003 syscall=227 success=yes exit=0 a0=f2c8e90 a1=a2f0d3 a2=ef7b948 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775725.120:12553): avc: denied { setattr } for pid=8303 comm="yum" name="gnome-vfs2-2.16.2" dev=dm-0 ino=12179053 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=dir type=SYSCALL msg=audit(1163775725.120:12553): arch=40000003 syscall=212 success=yes exit=0 a0=f2c8e90 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775725.208:12554): avc: denied { unlink } for pid=8303 comm="yum" name="gnome-vfs-2.0.mo" dev=dm-0 ino=10338227 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1163775725.208:12554): arch=40000003 syscall=38 success=yes exit=0 a0=f5cd768 a1=f5cd730 a2=d2a040 a3=f5cd768 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775725.252:12555): avc: denied { relabelto } for pid=8303 comm="yum" name="gnome-vfs-2.0.mo" dev=dm-0 ino=10337938 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1163775725.252:12555): arch=40000003 syscall=227 success=yes exit=0 a0=f5cd730 a1=a2f0d3 a2=f2c8e90 a3=1e items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775725.252:12556): avc: denied { setattr } for pid=8303 comm="yum" name="gnome-vfs-2.0.mo" dev=dm-0 ino=10337938 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1163775725.252:12556): arch=40000003 syscall=212 success=yes exit=0 a0=f5cd730 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775733.685:12557): avc: denied { ptrace } for pid=12294 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:bluetooth_t:s0 tclass=process type=SYSCALL msg=audit(1163775733.685:12557): arch=40000003 syscall=195 success=yes exit=0 a0=8874088 a1=bfaefb14 a2=24bff4 a3=bfaeee8c items=0 ppid=12293 pid=12294 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775733.685:12558): avc: denied { ptrace } for pid=12294 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:automount_t:s0 tclass=process type=SYSCALL msg=audit(1163775733.685:12558): arch=40000003 syscall=195 success=yes exit=0 a0=8874088 a1=bfaefb14 a2=24bff4 a3=bfaeee8c items=0 ppid=12293 pid=12294 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775733.685:12559): avc: denied { ptrace } for pid=12294 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:apmd_t:s0 tclass=process type=SYSCALL msg=audit(1163775733.685:12559): arch=40000003 syscall=195 success=yes exit=0 a0=8874088 a1=bfaefb14 a2=24bff4 a3=bfaeee8c items=0 ppid=12293 pid=12294 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775733.685:12560): avc: denied { ptrace } for pid=12294 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:hplip_t:s0 tclass=process type=SYSCALL msg=audit(1163775733.685:12560): arch=40000003 syscall=195 success=yes exit=0 a0=8874088 a1=bfaefb14 a2=24bff4 a3=bfaeee8c items=0 ppid=12293 pid=12294 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775733.685:12561): avc: denied { ptrace } for pid=12294 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:sendmail_t:s0 tclass=process type=SYSCALL msg=audit(1163775733.685:12561): arch=40000003 syscall=195 success=yes exit=0 a0=8874088 a1=bfaefb14 a2=24bff4 a3=bfaeee8c items=0 ppid=12293 pid=12294 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775735.625:12562): avc: denied { append } for pid=8303 comm="yum" name="yum.log" dev=dm-0 ino=8707846 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:rpm_log_t:s0 tclass=file type=SYSCALL msg=audit(1163775735.625:12562): arch=40000003 syscall=4 success=yes exit=54 a0=4 a1=b7bd1000 a2=36 a3=36 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775735.625:12562): path="/var/log/yum.log" type=AVC msg=audit(1163775742.197:12563): avc: denied { ptrace } for pid=12298 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=process type=SYSCALL msg=audit(1163775742.197:12563): arch=40000003 syscall=195 success=yes exit=0 a0=81890a0 a1=bf9b3284 a2=69eff4 a3=bf9b25fc items=0 ppid=12297 pid=12298 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775744.637:12564): avc: denied { create } for pid=8303 comm="yum" name="libmoniker_extra_2.so;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1163775744.637:12564): arch=40000003 syscall=5 success=yes exit=30 a0=bd495a0 a1=8241 a2=1b6 a3=8241 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775744.645:12565): avc: denied { write } for pid=8303 comm="yum" name="libmoniker_extra_2.so;455dcb57" dev=dm-0 ino=10455193 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1163775744.645:12565): arch=40000003 syscall=4 success=yes exit=16384 a0=1e a1=f55fe88 a2=4000 a3=f144cc0 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775744.645:12565): path="/usr/lib/bonobo/monikers/libmoniker_extra_2.so;455dcb57" type=AVC msg=audit(1163775744.645:12566): avc: denied { rename } for pid=8303 comm="yum" name="libmoniker_extra_2.so;455dcb57" dev=dm-0 ino=10455193 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:lib_t:s0 tclass=file type=AVC msg=audit(1163775744.645:12566): avc: denied { unlink } for pid=8303 comm="yum" name="libmoniker_extra_2.so" dev=dm-0 ino=10446408 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:shlib_t:s0 tclass=file type=SYSCALL msg=audit(1163775744.645:12566): arch=40000003 syscall=38 success=yes exit=0 a0=bd495a0 a1=f145010 a2=d2a040 a3=bd495a0 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775744.649:12567): avc: denied { relabelfrom } for pid=8303 comm="yum" name="libmoniker_extra_2.so" dev=dm-0 ino=10455193 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:lib_t:s0 tclass=file type=AVC msg=audit(1163775744.649:12567): avc: denied { relabelto } for pid=8303 comm="yum" name="libmoniker_extra_2.so" dev=dm-0 ino=10455193 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:shlib_t:s0 tclass=file type=SYSCALL msg=audit(1163775744.649:12567): arch=40000003 syscall=227 success=yes exit=0 a0=f145010 a1=a2f0d3 a2=f279f88 a3=1d items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775744.649:12568): avc: denied { setattr } for pid=8303 comm="yum" name="libmoniker_extra_2.so" dev=dm-0 ino=10455193 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:shlib_t:s0 tclass=file type=SYSCALL msg=audit(1163775744.649:12568): arch=40000003 syscall=212 success=yes exit=0 a0=f145010 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775744.729:12569): avc: denied { unlink } for pid=8303 comm="yum" name="GNOME_Moniker_std.server" dev=dm-0 ino=10447004 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1163775744.729:12569): arch=40000003 syscall=38 success=yes exit=0 a0=bd495a0 a1=f145010 a2=d2a040 a3=bd495a0 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775744.729:12570): avc: denied { relabelto } for pid=8303 comm="yum" name="GNOME_Moniker_std.server" dev=dm-0 ino=10446408 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1163775744.729:12570): arch=40000003 syscall=227 success=yes exit=0 a0=f145010 a1=a2f0d3 a2=f5ccec8 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775744.729:12571): avc: denied { setattr } for pid=8303 comm="yum" name="GNOME_Moniker_std.server" dev=dm-0 ino=10446408 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1163775744.729:12571): arch=40000003 syscall=212 success=yes exit=0 a0=f145010 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775753.778:12572): avc: denied { relabelfrom } for pid=8303 comm="yum" name="gnome-about" dev=dm-0 ino=10803023 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=dir type=SYSCALL msg=audit(1163775753.778:12572): arch=40000003 syscall=227 success=yes exit=0 a0=f0f83f0 a1=a2f0d3 a2=f0f8430 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775758.842:12573): avc: denied { create } for pid=8303 comm="yum" name="openoffice.org2.1" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:lib_t:s0 tclass=dir type=SYSCALL msg=audit(1163775758.842:12573): arch=40000003 syscall=39 success=yes exit=0 a0=f3847d0 a1=1c0 a2=d2a040 a3=f3847d0 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775758.846:12574): avc: denied { relabelfrom } for pid=8303 comm="yum" name="openoffice.org2.1" dev=dm-0 ino=12179071 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:lib_t:s0 tclass=dir type=SYSCALL msg=audit(1163775758.846:12574): arch=40000003 syscall=227 success=yes exit=0 a0=f3847d0 a1=a2f0d3 a2=f570790 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775759.542:12575): avc: denied { relabelto } for pid=8303 comm="yum" name="program" dev=dm-0 ino=12179293 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=dir type=SYSCALL msg=audit(1163775759.542:12575): arch=40000003 syscall=227 success=yes exit=0 a0=ef7b898 a1=a2f0d3 a2=eef2670 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775759.546:12576): avc: denied { setattr } for pid=8303 comm="yum" name="program" dev=dm-0 ino=12179293 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=dir type=SYSCALL msg=audit(1163775759.546:12576): arch=40000003 syscall=212 success=yes exit=0 a0=ef7b898 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775759.558:12577): avc: denied { create } for pid=8303 comm="yum" name="addin" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:bin_t:s0 tclass=dir type=SYSCALL msg=audit(1163775759.558:12577): arch=40000003 syscall=39 success=yes exit=0 a0=f5ca2d8 a1=1c0 a2=d2a040 a3=f5ca2d8 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775759.558:12578): avc: denied { relabelfrom } for pid=8303 comm="yum" name="addin" dev=dm-0 ino=12179296 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:bin_t:s0 tclass=dir type=SYSCALL msg=audit(1163775759.558:12578): arch=40000003 syscall=227 success=yes exit=0 a0=f5ca2d8 a1=a2f0d3 a2=f5ca308 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775832.227:12579): avc: denied { unlink } for pid=8303 comm="yum" name="evolution-data-server-1.10" dev=dm-0 ino=10326685 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:evolution_server_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775832.227:12579): arch=40000003 syscall=38 success=yes exit=0 a0=f5dfc50 a1=f629e78 a2=d2a040 a3=f5dfc50 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775832.271:12580): avc: denied { relabelto } for pid=8303 comm="yum" name="evolution-data-server-1.10" dev=dm-0 ino=10318123 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:evolution_server_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775832.271:12580): arch=40000003 syscall=227 success=yes exit=0 a0=f629e78 a1=a2f0d3 a2=f5dfc50 a3=2d items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775832.271:12581): avc: denied { setattr } for pid=8303 comm="yum" name="evolution-data-server-1.10" dev=dm-0 ino=10318123 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:evolution_server_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775832.271:12581): arch=40000003 syscall=212 success=yes exit=0 a0=f629e78 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775843.035:12582): avc: denied { write } for pid=12315 comm="ldconfig" name="etc" dev=dm-0 ino=9329761 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=dir type=AVC msg=audit(1163775843.035:12582): avc: denied { add_name } for pid=12315 comm="ldconfig" name="ld.so.cache~" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=dir type=SYSCALL msg=audit(1163775843.035:12582): arch=40000003 syscall=5 success=yes exit=3 a0=8aeeb20 a1=20241 a2=1a4 a3=8aeeb20 items=0 ppid=8303 pid=12315 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="ldconfig" exe="/sbin/ldconfig" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775843.043:12583): avc: denied { remove_name } for pid=12315 comm="ldconfig" name="ld.so.cache~" dev=dm-0 ino=9331027 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=dir type=SYSCALL msg=audit(1163775843.043:12583): arch=40000003 syscall=38 success=yes exit=0 a0=8aeeb20 a1=bf949180 a2=bf949100 a3=8aeeb20 items=0 ppid=8303 pid=12315 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="ldconfig" exe="/sbin/ldconfig" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775905.011:12584): avc: denied { append } for pid=12351 comm="scrollkeeper-up" name="scrollkeeper.log" dev=dm-0 ino=14436937 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:var_log_t:s0 tclass=file type=SYSCALL msg=audit(1163775905.011:12584): arch=40000003 syscall=5 success=yes exit=3 a0=7385d0 a1=441 a2=1b6 a3=8acd250 items=0 ppid=12346 pid=12351 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="scrollkeeper-up" exe="/usr/bin/scrollkeeper-update" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775906.575:12585): avc: denied { write } for pid=12351 comm="scrollkeeper-up" name="scrollkeeper" dev=dm-0 ino=14567773 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:var_lib_t:s0 tclass=dir type=AVC msg=audit(1163775906.575:12585): avc: denied { add_name } for pid=12351 comm="scrollkeeper-up" name="scrollkeeper_docs.tmp" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:var_lib_t:s0 tclass=dir type=AVC msg=audit(1163775906.575:12585): avc: denied { create } for pid=12351 comm="scrollkeeper-up" name="scrollkeeper_docs.tmp" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:var_lib_t:s0 tclass=file type=SYSCALL msg=audit(1163775906.575:12585): arch=40000003 syscall=5 success=yes exit=4 a0=bfbe2e13 a1=241 a2=1b6 a3=8b06d18 items=0 ppid=12346 pid=12351 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="scrollkeeper-up" exe="/usr/bin/scrollkeeper-update" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775906.591:12586): avc: denied { write } for pid=12351 comm="scrollkeeper-up" name="scrollkeeper_docs.tmp" dev=dm-0 ino=14567525 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:var_lib_t:s0 tclass=file type=SYSCALL msg=audit(1163775906.591:12586): arch=40000003 syscall=4 success=yes exit=4096 a0=4 a1=b7ff1000 a2=1000 a3=1000 items=0 ppid=12346 pid=12351 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="scrollkeeper-up" exe="/usr/bin/scrollkeeper-update" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775906.591:12586): path="/var/lib/scrollkeeper/scrollkeeper_docs.tmp" type=AVC msg=audit(1163775906.591:12587): avc: denied { remove_name } for pid=12351 comm="scrollkeeper-up" name="scrollkeeper_docs" dev=dm-0 ino=14567874 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:var_lib_t:s0 tclass=dir type=AVC msg=audit(1163775906.591:12587): avc: denied { unlink } for pid=12351 comm="scrollkeeper-up" name="scrollkeeper_docs" dev=dm-0 ino=14567874 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:var_lib_t:s0 tclass=file type=SYSCALL msg=audit(1163775906.591:12587): arch=40000003 syscall=10 success=yes exit=0 a0=bfbe2d13 a1=1 a2=73a338 a3=bfbe2f33 items=0 ppid=12346 pid=12351 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="scrollkeeper-up" exe="/usr/bin/scrollkeeper-update" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775906.591:12588): avc: denied { rename } for pid=12351 comm="scrollkeeper-up" name="scrollkeeper_docs.tmp" dev=dm-0 ino=14567525 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:var_lib_t:s0 tclass=file type=SYSCALL msg=audit(1163775906.591:12588): arch=40000003 syscall=38 success=yes exit=0 a0=bfbe2e13 a1=bfbe2d13 a2=73a338 a3=bfbe2f33 items=0 ppid=12346 pid=12351 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="scrollkeeper-up" exe="/usr/bin/scrollkeeper-update" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775906.903:12589): avc: denied { append } for pid=12351 comm="scrollkeeper-up" name="scrollkeeper_docs" dev=dm-0 ino=14567525 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:var_lib_t:s0 tclass=file type=SYSCALL msg=audit(1163775906.903:12589): arch=40000003 syscall=5 success=yes exit=3 a0=bfbe2a38 a1=441 a2=1b6 a3=8adbfb8 items=0 ppid=12346 pid=12351 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="scrollkeeper-up" exe="/usr/bin/scrollkeeper-update" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775915.816:12590): avc: denied { ptrace } for pid=12737 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:inetd_t:s0 tclass=process type=SYSCALL msg=audit(1163775915.816:12590): arch=40000003 syscall=195 success=yes exit=0 a0=9839088 a1=bffbd904 a2=fb6ff4 a3=bffbcc7c items=0 ppid=12736 pid=12737 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775918.492:12591): avc: denied { write } for pid=8303 comm="yum" name="modules" dev=dm-0 ino=10802956 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=dir type=AVC msg=audit(1163775918.492:12591): avc: denied { add_name } for pid=8303 comm="yum" name="libmapping.so;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=dir type=SYSCALL msg=audit(1163775918.492:12591): arch=40000003 syscall=5 success=yes exit=30 a0=f70a6b8 a1=8241 a2=1b6 a3=8241 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775918.500:12592): avc: denied { remove_name } for pid=8303 comm="yum" name="libmapping.so;455dcb57" dev=dm-0 ino=10802957 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=dir type=SYSCALL msg=audit(1163775918.500:12592): arch=40000003 syscall=38 success=yes exit=0 a0=f70a6b8 a1=f7ec010 a2=d2a040 a3=f70a6b8 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775941.518:12593): avc: denied { write } for pid=12789 comm="update-desktop-" name="applications" dev=dm-0 ino=10936389 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:usr_t:s0 tclass=dir type=AVC msg=audit(1163775941.518:12593): avc: denied { add_name } for pid=12789 comm="update-desktop-" name=".mimeinfo.cache.EF10IT" scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:usr_t:s0 tclass=dir type=SYSCALL msg=audit(1163775941.518:12593): arch=40000003 syscall=5 success=yes exit=3 a0=9f4ae20 a1=80c2 a2=180 a3=80c2 items=0 ppid=12749 pid=12789 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="update-desktop-" exe="/usr/bin/update-desktop-database" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775941.518:12594): avc: denied { remove_name } for pid=12789 comm="update-desktop-" name=".mimeinfo.cache.EF10IT" dev=dm-0 ino=10937705 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:usr_t:s0 tclass=dir type=SYSCALL msg=audit(1163775941.518:12594): arch=40000003 syscall=38 success=yes exit=0 a0=9f4ae20 a1=9f4bba8 a2=1a4 a3=9f4815c items=0 ppid=12749 pid=12789 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="update-desktop-" exe="/usr/bin/update-desktop-database" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775949.386:12595): avc: denied { relabelfrom } for pid=8303 comm="yum" name="gaim" dev=dm-0 ino=9362524 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=dir type=AVC msg=audit(1163775949.386:12595): avc: denied { relabelto } for pid=8303 comm="yum" name="gaim" dev=dm-0 ino=9362524 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=dir type=SYSCALL msg=audit(1163775949.386:12595): arch=40000003 syscall=227 success=yes exit=0 a0=f569c18 a1=a2f0d3 a2=f569898 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775949.386:12596): avc: denied { setattr } for pid=8303 comm="yum" name="gaim" dev=dm-0 ino=9362524 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=dir type=SYSCALL msg=audit(1163775949.386:12596): arch=40000003 syscall=212 success=yes exit=0 a0=f569c18 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775949.542:12597): avc: denied { relabelfrom } for pid=8303 comm="yum" name="gaim" dev=dm-0 ino=10902116 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=dir type=AVC msg=audit(1163775949.542:12597): avc: denied { relabelto } for pid=8303 comm="yum" name="gaim" dev=dm-0 ino=10902116 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=dir type=SYSCALL msg=audit(1163775949.542:12597): arch=40000003 syscall=227 success=yes exit=0 a0=f70a620 a1=a2f0d3 a2=f73eaf8 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775949.542:12598): avc: denied { setattr } for pid=8303 comm="yum" name="gaim" dev=dm-0 ino=10902116 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=dir type=SYSCALL msg=audit(1163775949.542:12598): arch=40000003 syscall=212 success=yes exit=0 a0=f70a620 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775950.890:12599): avc: denied { write } for pid=8303 comm="yum" name="LC_MESSAGES" dev=dm-0 ino=10382818 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:locale_t:s0 tclass=dir type=AVC msg=audit(1163775950.890:12599): avc: denied { add_name } for pid=8303 comm="yum" name="gaim.mo;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:locale_t:s0 tclass=dir type=SYSCALL msg=audit(1163775950.890:12599): arch=40000003 syscall=5 success=yes exit=30 a0=f2aea08 a1=8241 a2=1b6 a3=8241 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775950.934:12600): avc: denied { remove_name } for pid=8303 comm="yum" name="gaim.mo;455dcb57" dev=dm-0 ino=10379674 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:locale_t:s0 tclass=dir type=SYSCALL msg=audit(1163775950.934:12600): arch=40000003 syscall=38 success=yes exit=0 a0=f2aea08 a1=f2b0398 a2=d2a040 a3=f2aea08 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775963.323:12601): avc: denied { read } for pid=12798 comm="gcj-dbtool" name="[120769]" dev=pipefs ino=120769 scontext=staff_u:staff_r:staff_javaplugin_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=fifo_file type=AVC msg=audit(1163775963.323:12601): avc: denied { write } for pid=12798 comm="gcj-dbtool" name="[120790]" dev=pipefs ino=120790 scontext=staff_u:staff_r:staff_javaplugin_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=fifo_file type=SYSCALL msg=audit(1163775963.323:12601): arch=40000003 syscall=11 success=yes exit=0 a0=9e7a200 a1=9e79ea0 a2=9e79938 a3=9e78238 items=0 ppid=12797 pid=12798 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="gcj-dbtool" exe="/usr/bin/gcj-dbtool" subj=staff_u:staff_r:staff_javaplugin_t:s0 key=(null) type=AVC_PATH msg=audit(1163775963.323:12601): path="pipe:[120790]" type=AVC_PATH msg=audit(1163775963.323:12601): path="pipe:[120769]" type=AVC msg=audit(1163775965.247:12602): avc: denied { sigchld } for pid=12797 comm="rebuild-gcj-db" scontext=staff_u:staff_r:staff_javaplugin_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=process type=SYSCALL msg=audit(1163775965.247:12602): arch=40000003 syscall=7 success=yes exit=12798 a0=ffffffff a1=bf8c8768 a2=0 a3=9e79a40 items=0 ppid=8303 pid=12797 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="rebuild-gcj-db" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775965.531:12603): avc: denied { write } for pid=12803 comm="gcj-dbtool" name="classmap.db" dev=dm-0 ino=949382 scontext=staff_u:staff_r:staff_javaplugin_t:s0 tcontext=user_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1163775965.531:12603): arch=40000003 syscall=5 success=yes exit=5 a0=194e60 a1=8042 a2=1b6 a3=8042 items=0 ppid=12797 pid=12803 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="gcj-dbtool" exe="/usr/bin/gcj-dbtool" subj=staff_u:staff_r:staff_javaplugin_t:s0 key=(null) type=AVC msg=audit(1163775966.595:12604): avc: denied { write } for pid=12807 comm="gcj-dbtool" name="gcj-4.1.1" dev=dm-0 ino=11001132 scontext=staff_u:staff_r:staff_javaplugin_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=dir type=AVC msg=audit(1163775966.595:12604): avc: denied { add_name } for pid=12807 comm="gcj-dbtool" name="classmap.db70c2ys" scontext=staff_u:staff_r:staff_javaplugin_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=dir type=AVC msg=audit(1163775966.595:12604): avc: denied { create } for pid=12807 comm="gcj-dbtool" name="classmap.db70c2ys" scontext=staff_u:staff_r:staff_javaplugin_t:s0 tcontext=staff_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1163775966.595:12604): arch=40000003 syscall=5 success=yes exit=5 a0=bfc3aea0 a1=80c0 a2=1a4 a3=80c0 items=0 ppid=12806 pid=12807 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="gcj-dbtool" exe="/usr/bin/gcj-dbtool" subj=staff_u:staff_r:staff_javaplugin_t:s0 key=(null) type=AVC msg=audit(1163775968.391:12605): avc: denied { write } for pid=12807 comm="gcj-dbtool" name="classmap.db70c2ys" dev=dm-0 ino=10999442 scontext=staff_u:staff_r:staff_javaplugin_t:s0 tcontext=staff_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1163775968.391:12605): arch=40000003 syscall=5 success=yes exit=136 a0=195cf8 a1=8042 a2=1b6 a3=8042 items=0 ppid=12806 pid=12807 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="gcj-dbtool" exe="/usr/bin/gcj-dbtool" subj=staff_u:staff_r:staff_javaplugin_t:s0 key=(null) type=AVC msg=audit(1163775968.771:12606): avc: denied { remove_name } for pid=12807 comm="gcj-dbtool" name="classmap.db70c2ys" dev=dm-0 ino=10999442 scontext=staff_u:staff_r:staff_javaplugin_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=dir type=AVC msg=audit(1163775968.771:12606): avc: denied { rename } for pid=12807 comm="gcj-dbtool" name="classmap.db70c2ys" dev=dm-0 ino=10999442 scontext=staff_u:staff_r:staff_javaplugin_t:s0 tcontext=staff_u:object_r:lib_t:s0 tclass=file type=AVC msg=audit(1163775968.771:12606): avc: denied { unlink } for pid=12807 comm="gcj-dbtool" name="classmap.db" dev=dm-0 ino=949382 scontext=staff_u:staff_r:staff_javaplugin_t:s0 tcontext=user_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1163775968.771:12606): arch=40000003 syscall=38 success=yes exit=0 a0=bfc3aeb0 a1=bfc3ae80 a2=227e5f4 a3=bfc3ae80 items=0 ppid=12806 pid=12807 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="gcj-dbtool" exe="/usr/bin/gcj-dbtool" subj=staff_u:staff_r:staff_javaplugin_t:s0 key=(null) type=AVC msg=audit(1163775969.307:12607): avc: denied { unlink } for pid=8303 comm="yum" name="libgtkhtml-3.8.so.15" dev=dm-0 ino=10333524 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775969.307:12607): arch=40000003 syscall=38 success=yes exit=0 a0=f568398 a1=f565df8 a2=d2a040 a3=f568398 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775969.311:12608): avc: denied { relabelto } for pid=8303 comm="yum" name="libgtkhtml-3.8.so.15" dev=dm-0 ino=10333827 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775969.311:12608): arch=40000003 syscall=227 success=yes exit=0 a0=f565df8 a1=a2f0d3 a2=f568580 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775969.311:12609): avc: denied { setattr } for pid=8303 comm="yum" name="libgtkhtml-3.8.so.15" dev=dm-0 ino=10333827 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775969.311:12609): arch=40000003 syscall=198 success=yes exit=0 a0=f565df8 a1=0 a2=0 a3=f5632bc items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775976.504:12610): avc: denied { ptrace } for pid=12820 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:klogd_t:s0 tclass=process type=SYSCALL msg=audit(1163775976.504:12610): arch=40000003 syscall=195 success=yes exit=0 a0=9c25088 a1=bfe64934 a2=b82ff4 a3=bfe63cac items=0 ppid=12819 pid=12820 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775976.504:12611): avc: denied { ptrace } for pid=12820 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:irqbalance_t:s0 tclass=process type=SYSCALL msg=audit(1163775976.504:12611): arch=40000003 syscall=195 success=yes exit=0 a0=9c25088 a1=bfe64934 a2=b82ff4 a3=bfe63cac items=0 ppid=12819 pid=12820 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775976.508:12612): avc: denied { ptrace } for pid=12820 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_ssh_agent_t:s0 tclass=process type=SYSCALL msg=audit(1163775976.508:12612): arch=40000003 syscall=195 success=yes exit=0 a0=9c25088 a1=bfe64934 a2=b82ff4 a3=bfe63cac items=0 ppid=12819 pid=12820 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775976.512:12613): avc: denied { ptrace } for pid=12820 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:pam_t:s0 tclass=process type=SYSCALL msg=audit(1163775976.512:12613): arch=40000003 syscall=195 success=yes exit=0 a0=9c25088 a1=bfe64934 a2=b82ff4 a3=bfe63cac items=0 ppid=12819 pid=12820 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775989.425:12614): avc: denied { setexec } for pid=12823 comm="yum" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=process type=SYSCALL msg=audit(1163775989.425:12614): arch=40000003 syscall=4 success=no exit=-22 a0=1e a1=f5f08a0 a2=20 a3=a2f751 items=0 ppid=8303 pid=12823 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776017.614:12615): avc: denied { write } for pid=8303 comm="yum" name="console.apps" dev=dm-0 ino=9330284 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:userhelper_conf_t:s0 tclass=dir type=AVC msg=audit(1163776017.614:12615): avc: denied { add_name } for pid=8303 comm="yum" name="gnome-system-log;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:userhelper_conf_t:s0 tclass=dir type=AVC msg=audit(1163776017.614:12615): avc: denied { create } for pid=8303 comm="yum" name="gnome-system-log;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:userhelper_conf_t:s0 tclass=file type=SYSCALL msg=audit(1163776017.614:12615): arch=40000003 syscall=5 success=yes exit=30 a0=f5fca38 a1=8241 a2=1b6 a3=8241 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776017.674:12616): avc: denied { write } for pid=8303 comm="yum" name="gnome-system-log;455dcb57" dev=dm-0 ino=9331047 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:userhelper_conf_t:s0 tclass=file type=SYSCALL msg=audit(1163776017.674:12616): arch=40000003 syscall=4 success=yes exit=73 a0=1e a1=b6dcb000 a2=49 a3=f762860 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163776017.674:12616): path="/etc/security/console.apps/gnome-system-log;455dcb57" type=AVC msg=audit(1163776017.674:12617): avc: denied { remove_name } for pid=8303 comm="yum" name="gnome-system-log;455dcb57" dev=dm-0 ino=9331047 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:userhelper_conf_t:s0 tclass=dir type=AVC msg=audit(1163776017.674:12617): avc: denied { rename } for pid=8303 comm="yum" name="gnome-system-log;455dcb57" dev=dm-0 ino=9331047 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:userhelper_conf_t:s0 tclass=file type=AVC msg=audit(1163776017.674:12617): avc: denied { unlink } for pid=8303 comm="yum" name="gnome-system-log" dev=dm-0 ino=9331034 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:userhelper_conf_t:s0 tclass=file type=SYSCALL msg=audit(1163776017.674:12617): arch=40000003 syscall=38 success=yes exit=0 a0=f5fca38 a1=f7d9d78 a2=d2a040 a3=f5fca38 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776017.682:12618): avc: denied { relabelfrom } for pid=8303 comm="yum" name="gnome-system-log" dev=dm-0 ino=9331047 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:userhelper_conf_t:s0 tclass=file type=AVC msg=audit(1163776017.682:12618): avc: denied { relabelto } for pid=8303 comm="yum" name="gnome-system-log" dev=dm-0 ino=9331047 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:userhelper_conf_t:s0 tclass=file type=SYSCALL msg=audit(1163776017.682:12618): arch=40000003 syscall=227 success=yes exit=0 a0=f7d9d78 a1=a2f0d3 a2=f5fe1a8 a3=27 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776017.682:12619): avc: denied { setattr } for pid=8303 comm="yum" name="gnome-system-log" dev=dm-0 ino=9331047 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:userhelper_conf_t:s0 tclass=file type=SYSCALL msg=audit(1163776017.682:12619): arch=40000003 syscall=212 success=yes exit=0 a0=f7d9d78 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776018.162:12620): avc: denied { create } for pid=8303 comm="yum" name="libgdict-1.0.so.5;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:lib_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163776018.162:12620): arch=40000003 syscall=83 success=yes exit=0 a0=f829fb8 a1=f776c70 a2=508a38 a3=602c items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776018.162:12621): avc: denied { rename } for pid=8303 comm="yum" name="libgdict-1.0.so.5;455dcb57" dev=dm-0 ino=10329922 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:lib_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163776018.162:12621): arch=40000003 syscall=38 success=yes exit=0 a0=f776c70 a1=f56ecb8 a2=d2a040 a3=f776c70 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776018.166:12622): avc: denied { relabelfrom } for pid=8303 comm="yum" name="libgdict-1.0.so.5" dev=dm-0 ino=10329922 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:lib_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163776018.166:12622): arch=40000003 syscall=227 success=yes exit=0 a0=f56ecb8 a1=a2f0d3 a2=f83a060 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776018.314:12623): avc: denied { write } for pid=8303 comm="yum" name="sbin" dev=dm-0 ino=10311842 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:sbin_t:s0 tclass=dir type=AVC msg=audit(1163776018.314:12623): avc: denied { add_name } for pid=8303 comm="yum" name="gnome-system-log;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:sbin_t:s0 tclass=dir type=AVC msg=audit(1163776018.314:12623): avc: denied { create } for pid=8303 comm="yum" name="gnome-system-log;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:sbin_t:s0 tclass=file type=SYSCALL msg=audit(1163776018.314:12623): arch=40000003 syscall=5 success=yes exit=30 a0=f7628a8 a1=8241 a2=1b6 a3=8241 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776018.314:12624): avc: denied { write } for pid=8303 comm="yum" name="gnome-system-log;455dcb57" dev=dm-0 ino=10324825 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:sbin_t:s0 tclass=file type=SYSCALL msg=audit(1163776018.314:12624): arch=40000003 syscall=4 success=yes exit=65536 a0=1e a1=f829fb8 a2=10000 a3=f763d00 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163776018.314:12624): path="/usr/sbin/gnome-system-log;455dcb57" type=AVC msg=audit(1163776018.314:12625): avc: denied { remove_name } for pid=8303 comm="yum" name="gnome-system-log;455dcb57" dev=dm-0 ino=10324825 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:sbin_t:s0 tclass=dir type=AVC msg=audit(1163776018.314:12625): avc: denied { rename } for pid=8303 comm="yum" name="gnome-system-log;455dcb57" dev=dm-0 ino=10324825 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:sbin_t:s0 tclass=file type=AVC msg=audit(1163776018.314:12625): avc: denied { unlink } for pid=8303 comm="yum" name="gnome-system-log" dev=dm-0 ino=10318824 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:sbin_t:s0 tclass=file type=SYSCALL msg=audit(1163776018.314:12625): arch=40000003 syscall=38 success=yes exit=0 a0=f7628a8 a1=f839fe0 a2=d2a040 a3=f7628a8 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776018.474:12626): avc: denied { relabelfrom } for pid=8303 comm="yum" name="gnome-system-log" dev=dm-0 ino=10324825 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:sbin_t:s0 tclass=file type=AVC msg=audit(1163776018.474:12626): avc: denied { relabelto } for pid=8303 comm="yum" name="gnome-system-log" dev=dm-0 ino=10324825 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:sbin_t:s0 tclass=file type=SYSCALL msg=audit(1163776018.474:12626): arch=40000003 syscall=227 success=yes exit=0 a0=f839fe0 a1=a2f0d3 a2=f7628d0 a3=1c items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776018.474:12627): avc: denied { setattr } for pid=8303 comm="yum" name="gnome-system-log" dev=dm-0 ino=10324825 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:sbin_t:s0 tclass=file type=SYSCALL msg=audit(1163776018.474:12627): arch=40000003 syscall=212 success=yes exit=0 a0=f839fe0 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776031.787:12628): avc: denied { ptrace } for pid=12970 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_dbusd_t:s0 tclass=process type=SYSCALL msg=audit(1163776031.787:12628): arch=40000003 syscall=195 success=yes exit=0 a0=9701088 a1=bfadb304 a2=cceff4 a3=bfada67c items=0 ppid=12969 pid=12970 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776035.996:12629): avc: denied { relabelfrom } for pid=8303 comm="yum" name="program" dev=dm-0 ino=12179293 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=dir type=SYSCALL msg=audit(1163776035.996:12629): arch=40000003 syscall=227 success=yes exit=0 a0=f83a000 a1=a2f0d3 a2=f7d9d78 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776048.764:12630): avc: denied { write } for pid=8303 comm="yum" name="thunarx-1" dev=dm-0 ino=10352019 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:lib_t:s0 tclass=dir type=AVC msg=audit(1163776048.764:12630): avc: denied { add_name } for pid=8303 comm="yum" name="thunar-apr.so;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:lib_t:s0 tclass=dir type=SYSCALL msg=audit(1163776048.764:12630): arch=40000003 syscall=5 success=yes exit=30 a0=f794a10 a1=8241 a2=1b6 a3=8241 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776048.804:12631): avc: denied { remove_name } for pid=8303 comm="yum" name="thunar-apr.so;455dcb57" dev=dm-0 ino=16237115 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:lib_t:s0 tclass=dir type=SYSCALL msg=audit(1163776048.804:12631): arch=40000003 syscall=38 success=yes exit=0 a0=f794a10 a1=f4a3688 a2=d2a040 a3=f794a10 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776058.997:12632): avc: denied { unlink } for pid=8303 comm="yum" name="evolution-2.10" dev=dm-0 ino=10326966 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:evolution_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163776058.997:12632): arch=40000003 syscall=38 success=yes exit=0 a0=f5faa60 a1=f7980f0 a2=d2a040 a3=f5faa60 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776059.045:12633): avc: denied { relabelto } for pid=8303 comm="yum" name="evolution-2.10" dev=dm-0 ino=10329292 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:evolution_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163776059.045:12633): arch=40000003 syscall=227 success=yes exit=0 a0=f7980f0 a1=a2f0d3 a2=de0ed50 a3=26 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776059.045:12634): avc: denied { setattr } for pid=8303 comm="yum" name="evolution-2.10" dev=dm-0 ino=10329292 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:evolution_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163776059.045:12634): arch=40000003 syscall=212 success=yes exit=0 a0=f7980f0 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776060.261:12635): avc: denied { unlink } for pid=8303 comm="yum" name="evolution-alarm-notify" dev=dm-0 ino=10870027 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:evolution_alarm_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163776060.261:12635): arch=40000003 syscall=38 success=yes exit=0 a0=f7ac8e8 a1=f86c688 a2=d2a040 a3=f7ac8e8 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776060.273:12636): avc: denied { relabelto } for pid=8303 comm="yum" name="evolution-alarm-notify" dev=dm-0 ino=10868468 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:evolution_alarm_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163776060.273:12636): arch=40000003 syscall=227 success=yes exit=0 a0=f86c688 a1=a2f0d3 a2=f8727a0 a3=2c items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776060.273:12637): avc: denied { setattr } for pid=8303 comm="yum" name="evolution-alarm-notify" dev=dm-0 ino=10868468 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:evolution_alarm_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163776060.273:12637): arch=40000003 syscall=212 success=yes exit=0 a0=f86c688 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776101.364:12638): avc: denied { unlink } for pid=8303 comm="yum" name="neat-tui" dev=dm-0 ino=10320377 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:sbin_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163776101.364:12638): arch=40000003 syscall=38 success=yes exit=0 a0=f7c6ab8 a1=f873c68 a2=d2a040 a3=f7c6ab8 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776101.364:12639): avc: denied { relabelto } for pid=8303 comm="yum" name="neat-tui" dev=dm-0 ino=10315508 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:sbin_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163776101.364:12639): arch=40000003 syscall=227 success=yes exit=0 a0=f873c68 a1=a2f0d3 a2=f7c6a98 a3=1c items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776101.364:12640): avc: denied { setattr } for pid=8303 comm="yum" name="neat-tui" dev=dm-0 ino=10315508 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:sbin_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163776101.364:12640): arch=40000003 syscall=198 success=yes exit=0 a0=f873c68 a1=0 a2=0 a3=f7c2914 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776114.724:12641): avc: denied { write } for pid=8303 comm="yum" name="videoaliases" dev=dm-0 ino=10607880 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:hwdata_t:s0 tclass=dir type=AVC msg=audit(1163776114.724:12641): avc: denied { add_name } for pid=8303 comm="yum" name="i810.xinf;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:hwdata_t:s0 tclass=dir type=AVC msg=audit(1163776114.724:12641): avc: denied { create } for pid=8303 comm="yum" name="i810.xinf;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:hwdata_t:s0 tclass=file type=SYSCALL msg=audit(1163776114.724:12641): arch=40000003 syscall=5 success=yes exit=30 a0=f8c7f18 a1=8241 a2=1b6 a3=8241 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776114.736:12642): avc: denied { write } for pid=8303 comm="yum" name="i810.xinf;455dcb57" dev=dm-0 ino=10607197 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:hwdata_t:s0 tclass=file type=SYSCALL msg=audit(1163776114.736:12642): arch=40000003 syscall=4 success=yes exit=1823 a0=1e a1=b6dcb000 a2=71f a3=f9b4f88 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163776114.736:12642): path="/usr/share/hwdata/videoaliases/i810.xinf;455dcb57" type=AVC msg=audit(1163776114.736:12643): avc: denied { remove_name } for pid=8303 comm="yum" name="i810.xinf;455dcb57" dev=dm-0 ino=10607197 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:hwdata_t:s0 tclass=dir type=AVC msg=audit(1163776114.736:12643): avc: denied { rename } for pid=8303 comm="yum" name="i810.xinf;455dcb57" dev=dm-0 ino=10607197 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:hwdata_t:s0 tclass=file type=AVC msg=audit(1163776114.736:12643): avc: denied { unlink } for pid=8303 comm="yum" name="i810.xinf" dev=dm-0 ino=10607411 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:hwdata_t:s0 tclass=file type=SYSCALL msg=audit(1163776114.736:12643): arch=40000003 syscall=38 success=yes exit=0 a0=f8c7f18 a1=f7c1588 a2=d2a040 a3=f8c7f18 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776114.748:12644): avc: denied { relabelfrom } for pid=8303 comm="yum" name="i810.xinf" dev=dm-0 ino=10607197 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:hwdata_t:s0 tclass=file type=AVC msg=audit(1163776114.748:12644): avc: denied { relabelto } for pid=8303 comm="yum" name="i810.xinf" dev=dm-0 ino=10607197 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:hwdata_t:s0 tclass=file type=SYSCALL msg=audit(1163776114.748:12644): arch=40000003 syscall=227 success=yes exit=0 a0=f7c1588 a1=a2f0d3 a2=f8c7e20 a3=1e items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776114.752:12645): avc: denied { setattr } for pid=8303 comm="yum" name="i810.xinf" dev=dm-0 ino=10607197 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:hwdata_t:s0 tclass=file type=SYSCALL msg=audit(1163776114.752:12645): arch=40000003 syscall=212 success=yes exit=0 a0=f7c1588 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776116.961:12646): avc: denied { write } for pid=13022 comm="update-gdk-pixb" name="gdk-pixbuf.loaders" dev=dm-0 ino=9362549 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1163776116.961:12646): arch=40000003 syscall=5 success=yes exit=3 a0=9ff0378 a1=8241 a2=1b6 a3=8241 items=0 ppid=13018 pid=13022 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="update-gdk-pixb" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776144.918:12647): avc: denied { link } for pid=8303 comm="yum" name="i386-redhat-linux-gcc;455dcb57" dev=dm-0 ino=10318121 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1163776144.918:12647): arch=40000003 syscall=9 success=yes exit=0 a0=f5c4aa0 a1=f5c4a00 a2=d2a040 a3=0 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776144.930:12648): avc: denied { rename } for pid=8303 comm="yum" name="i386-redhat-linux-gcc;455dcb57" dev=dm-0 ino=10318121 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1163776144.930:12648): arch=40000003 syscall=38 success=yes exit=0 a0=f5c4aa0 a1=f7b7480 a2=d2a040 a3=f5c4aa0 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776144.950:12649): avc: denied { relabelfrom } for pid=8303 comm="yum" name="i386-redhat-linux-gcc" dev=dm-0 ino=10318121 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1163776144.950:12649): arch=40000003 syscall=227 success=yes exit=0 a0=f7b7480 a1=a2f0d3 a2=f5c4af0 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776160.135:12650): avc: denied { unlink } for pid=8303 comm="yum" name="libImlib2.so.1.3.0" dev=dm-0 ino=10334610 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:textrel_shlib_t:s0 tclass=file type=SYSCALL msg=audit(1163776160.135:12650): arch=40000003 syscall=38 success=yes exit=0 a0=923ea10 a1=f9f43b0 a2=d2a040 a3=923ea10 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776160.167:12651): avc: denied { relabelto } for pid=8303 comm="yum" name="libImlib2.so.1.3.0" dev=dm-0 ino=10323377 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:textrel_shlib_t:s0 tclass=file type=SYSCALL msg=audit(1163776160.167:12651): arch=40000003 syscall=227 success=yes exit=0 a0=f9f43b0 a1=a2f0d3 a2=f9eb320 a3=25 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776160.167:12652): avc: denied { setattr } for pid=8303 comm="yum" name="libImlib2.so.1.3.0" dev=dm-0 ino=10323377 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:textrel_shlib_t:s0 tclass=file type=SYSCALL msg=audit(1163776160.167:12652): arch=40000003 syscall=212 success=yes exit=0 a0=f9f43b0 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776162.579:12653): avc: denied { relabelfrom } for pid=8303 comm="yum" name="fr" dev=dm-0 ino=10541414 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:man_t:s0 tclass=dir type=AVC msg=audit(1163776162.579:12653): avc: denied { relabelto } for pid=8303 comm="yum" name="fr" dev=dm-0 ino=10541414 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:man_t:s0 tclass=dir type=SYSCALL msg=audit(1163776162.579:12653): arch=40000003 syscall=227 success=yes exit=0 a0=f8c1bc0 a1=a2f0d3 a2=af72d20 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776162.579:12654): avc: denied { setattr } for pid=8303 comm="yum" name="fr" dev=dm-0 ino=10541414 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:man_t:s0 tclass=dir type=SYSCALL msg=audit(1163776162.579:12654): arch=40000003 syscall=212 success=yes exit=0 a0=f8c1bc0 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776173.620:12655): avc: denied { rmdir } for pid=8303 comm="yum" name="libgnomeprint" dev=dm-0 ino=12049646 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=dir type=SYSCALL msg=audit(1163776173.620:12655): arch=40000003 syscall=40 success=yes exit=0 a0=b8f1fc8 a1=2d a2=d2a040 a3=b8f1fc8 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776175.940:12656): avc: denied { unlink } for pid=13044 comm="ln" name="gcc" dev=dm-0 ino=12407052 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:lib_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163776175.940:12656): arch=40000003 syscall=10 success=yes exit=0 a0=bf9e7bf8 a1=3b2ff4 a2=804f42c a3=1 items=0 ppid=13043 pid=13044 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="ln" exe="/bin/ln" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776200.670:12657): avc: denied { execmem } for pid=13074 comm="gnome-screensav" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=process type=SYSCALL msg=audit(1163776200.670:12657): arch=40000003 syscall=192 success=yes exit=81354752 a0=4d96000 a1=1a000 a2=7 a3=812 items=0 ppid=3928 pid=13074 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-screensav" exe="/usr/libexec/gnome-screensaver-gl-helper" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776200.670:12658): avc: denied { execstack } for pid=13074 comm="gnome-screensav" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=process type=SYSCALL msg=audit(1163776200.670:12658): arch=40000003 syscall=125 success=yes exit=0 a0=bfa8a000 a1=1000 a2=1000007 a3=fffff000 items=0 ppid=3928 pid=13074 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-screensav" exe="/usr/libexec/gnome-screensaver-gl-helper" subj=staff_u:staff_r:staff_t:s0 key=(null) type=USER_ACCT msg=audit(1163776203.186:12659): user pid=13075 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1163776203.186:12660): login pid=13075 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1163776203.430:12661): user pid=13075 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1163776203.430:12662): user pid=13075 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1163776203.694:12663): avc: denied { execute } for pid=13076 comm="sh" name="sa1" dev=dm-0 ino=13061698 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:lib_t:s0 tclass=file type=AVC msg=audit(1163776203.694:12663): avc: denied { execute_no_trans } for pid=13076 comm="sh" name="sa1" dev=dm-0 ino=13061698 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1163776203.694:12663): arch=40000003 syscall=11 success=yes exit=0 a0=9cf31b0 a1=9cf3358 a2=9cf3290 a3=9cf3008 items=0 ppid=13075 pid=13076 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sa1" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163776203.694:12663): path="/usr/lib/sa/sa1" type=AVC msg=audit(1163776204.326:12664): avc: denied { execute } for pid=13074 comm="gnome-screensav" name="zero" dev=tmpfs ino=1493 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:zero_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163776204.326:12664): arch=40000003 syscall=192 success=yes exit=2637824 a0=0 a1=2000 a2=7 a3=2 items=0 ppid=3928 pid=13074 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-screensav" exe="/usr/libexec/gnome-screensaver-gl-helper" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163776204.326:12664): path="/dev/zero" type=AVC msg=audit(1163776204.410:12665): avc: denied { search } for pid=13076 comm="sadc" name="net" dev=proc ino=-268435432 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=dir type=AVC msg=audit(1163776204.410:12665): avc: denied { read } for pid=13076 comm="sadc" name="dev" dev=proc ino=-268434164 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=file type=SYSCALL msg=audit(1163776204.410:12665): arch=40000003 syscall=5 success=yes exit=3 a0=8050371 a1=0 a2=1b6 a3=9d087f8 items=0 ppid=13075 pid=13076 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163776204.410:12666): avc: denied { getattr } for pid=13076 comm="sadc" name="dev" dev=proc ino=-268434164 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=file type=SYSCALL msg=audit(1163776204.410:12666): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bf8184d8 a2=faaff4 a3=9d087f8 items=0 ppid=13075 pid=13076 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163776204.410:12666): path="/proc/net/dev" type=AVC msg=audit(1163776204.758:12667): avc: denied { read } for pid=13076 comm="sadc" name="dentry-state" dev=proc ino=-268435230 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=file type=SYSCALL msg=audit(1163776204.758:12667): arch=40000003 syscall=5 success=yes exit=4 a0=805037f a1=0 a2=1b6 a3=9d09348 items=0 ppid=13075 pid=13076 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163776204.758:12668): avc: denied { getattr } for pid=13076 comm="sadc" name="dentry-state" dev=proc ino=-268435230 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=file type=SYSCALL msg=audit(1163776204.758:12668): arch=40000003 syscall=197 success=yes exit=0 a0=4 a1=bf818330 a2=faaff4 a3=9d09348 items=0 ppid=13075 pid=13076 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163776204.758:12668): path="/proc/sys/fs/dentry-state" type=AVC msg=audit(1163776204.758:12669): avc: denied { search } for pid=13076 comm="sadc" name="rpc" dev=proc ino=-268433616 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_rpc_t:s0 tclass=dir type=SYSCALL msg=audit(1163776204.758:12669): arch=40000003 syscall=5 success=no exit=-2 a0=80502a5 a1=0 a2=1b6 a3=9d09348 items=0 ppid=13075 pid=13076 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=CRED_DISP msg=audit(1163776207.066:12670): user pid=13075 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1163776207.526:12671): user pid=13075 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1163776216.279:12672): avc: denied { ptrace } for pid=13085 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:setrans_t:s0-s0:c0.c1023 tclass=process type=SYSCALL msg=audit(1163776216.279:12672): arch=40000003 syscall=195 success=yes exit=0 a0=867d088 a1=bfba1bc4 a2=50aff4 a3=bfba0f3c items=0 ppid=13084 pid=13085 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776216.283:12673): avc: denied { ptrace } for pid=13085 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:portmap_t:s0 tclass=process type=SYSCALL msg=audit(1163776216.283:12673): arch=40000003 syscall=195 success=yes exit=0 a0=867d088 a1=bfba1bc4 a2=50aff4 a3=bfba0f3c items=0 ppid=13084 pid=13085 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776216.283:12674): avc: denied { ptrace } for pid=13085 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:rpcd_t:s0 tclass=process type=SYSCALL msg=audit(1163776216.283:12674): arch=40000003 syscall=195 success=yes exit=0 a0=867d088 a1=bfba1bc4 a2=50aff4 a3=bfba0f3c items=0 ppid=13084 pid=13085 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776221.295:12675): avc: denied { read } for pid=13087 comm="firefox-bin" name=".gdmV8RYIT" dev=dm-0 ino=14469571 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163776221.295:12675): arch=40000003 syscall=33 success=yes exit=0 a0=bfd24fcb a1=4 a2=842a64 a3=bfd24fcb items=0 ppid=1 pid=13087 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163776221.295:12676): avc: denied { getattr } for pid=13087 comm="firefox-bin" name=".gdmV8RYIT" dev=dm-0 ino=14469571 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163776221.295:12676): arch=40000003 syscall=197 success=yes exit=0 a0=4 a1=bfd2294c a2=fb0ff4 a3=9555140 items=0 ppid=1 pid=13087 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163776221.295:12676): path="/tmp/.gdmV8RYIT" type=AVC msg=audit(1163776232.044:12677): avc: denied { append } for pid=8523 comm="bash" name=".bash_history" dev=dm-0 ino=13127151 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:user_home_t:s0 tclass=file type=SYSCALL msg=audit(1163776232.044:12677): arch=40000003 syscall=5 success=yes exit=3 a0=86c00e0 a1=8401 a2=0 a3=8401 items=0 ppid=8520 pid=8523 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776232.064:12678): avc: denied { read } for pid=8523 comm="bash" name=".bash_history" dev=dm-0 ino=13127151 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:user_home_t:s0 tclass=file type=SYSCALL msg=audit(1163776232.064:12678): arch=40000003 syscall=5 success=yes exit=3 a0=86c00e0 a1=8000 a2=0 a3=8000 items=0 ppid=8520 pid=8523 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776232.072:12679): avc: denied { write } for pid=8523 comm="bash" name=".bash_history" dev=dm-0 ino=13127151 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:user_home_t:s0 tclass=file type=SYSCALL msg=audit(1163776232.072:12679): arch=40000003 syscall=5 success=yes exit=3 a0=86c00e0 a1=8201 a2=0 a3=8201 items=0 ppid=8520 pid=8523 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=CRED_DISP msg=audit(1163776232.412:12680): user pid=8520 uid=500 auid=500 subj=staff_u:staff_r:staff_su_t:s0 msg='PAM: setcred acct=root : exe="/bin/su" (hostname=?, addr=?, terminal=pts/2 res=success)' type=AVC msg=audit(1163776232.416:12681): avc: denied { search } for pid=8520 comm="su" name="root" dev=dm-0 ino=13127137 scontext=staff_u:staff_r:staff_su_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1163776232.416:12681): avc: denied { write } for pid=8520 comm="su" name="root" dev=dm-0 ino=13127137 scontext=staff_u:staff_r:staff_su_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1163776232.416:12681): avc: denied { remove_name } for pid=8520 comm="su" name=".xauthb3Z41E" dev=dm-0 ino=13127387 scontext=staff_u:staff_r:staff_su_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1163776232.416:12681): avc: denied { unlink } for pid=8520 comm="su" name=".xauthb3Z41E" dev=dm-0 ino=13127387 scontext=staff_u:staff_r:staff_su_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163776232.416:12681): arch=40000003 syscall=10 success=yes exit=0 a0=96e49a8 a1=96e4a86 a2=259bc8 a3=96e1008 items=0 ppid=8500 pid=8520 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=pts2 comm="su" exe="/bin/su" subj=staff_u:staff_r:staff_su_t:s0 key=(null) type=USER_END msg=audit(1163776232.440:12682): user pid=8520 uid=500 auid=500 subj=staff_u:staff_r:staff_su_t:s0 msg='PAM: session close acct=root : exe="/bin/su" (hostname=?, addr=?, terminal=pts/2 res=success)' type=AVC msg=audit(1163776236.944:12683): avc: denied { ptrace } for pid=13109 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:xenstored_t:s0 tclass=process type=SYSCALL msg=audit(1163776236.944:12683): arch=40000003 syscall=195 success=yes exit=0 a0=9be6088 a1=bfb70394 a2=6a3ff4 a3=bfb6f70c items=0 ppid=13105 pid=13109 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776236.944:12684): avc: denied { ptrace } for pid=13109 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:xenconsoled_t:s0 tclass=process type=SYSCALL msg=audit(1163776236.944:12684): arch=40000003 syscall=195 success=yes exit=0 a0=9be6088 a1=bfb70394 a2=6a3ff4 a3=bfb6f70c items=0 ppid=13105 pid=13109 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776236.948:12685): avc: denied { ptrace } for pid=13109 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:xend_t:s0 tclass=process type=SYSCALL msg=audit(1163776236.948:12685): arch=40000003 syscall=195 success=yes exit=0 a0=9be6088 a1=bfb70394 a2=6a3ff4 a3=bfb6f70c items=0 ppid=13105 pid=13109 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776236.948:12686): avc: denied { ptrace } for pid=13109 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:fsdaemon_t:s0 tclass=process type=SYSCALL msg=audit(1163776236.948:12686): arch=40000003 syscall=195 success=yes exit=0 a0=9be6088 a1=bfb70394 a2=6a3ff4 a3=bfb6f70c items=0 ppid=13105 pid=13109 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776236.948:12687): avc: denied { ptrace } for pid=13109 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:getty_t:s0 tclass=process type=SYSCALL msg=audit(1163776236.948:12687): arch=40000003 syscall=195 success=yes exit=0 a0=9be6088 a1=bfb70394 a2=6a3ff4 a3=bfb6f70c items=0 ppid=13105 pid=13109 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776236.948:12688): avc: denied { ptrace } for pid=13109 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tclass=process type=SYSCALL msg=audit(1163776236.948:12688): arch=40000003 syscall=195 success=yes exit=0 a0=9be6088 a1=bfb70394 a2=6a3ff4 a3=bfb6f70c items=0 ppid=13105 pid=13109 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776236.948:12689): avc: denied { ptrace } for pid=13109 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:xdm_xserver_t:s0-s0:c0.c1023 tclass=process type=SYSCALL msg=audit(1163776236.948:12689): arch=40000003 syscall=195 success=yes exit=0 a0=9be6088 a1=bfb70394 a2=6a3ff4 a3=bfb6f70c items=0 ppid=13105 pid=13109 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776236.952:12690): avc: denied { ptrace } for pid=13109 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_mozilla_t:s0 tclass=process type=SYSCALL msg=audit(1163776236.952:12690): arch=40000003 syscall=195 success=yes exit=0 a0=9be6088 a1=bfb70394 a2=6a3ff4 a3=bfb6f70c items=0 ppid=13105 pid=13109 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776239.168:12691): avc: denied { read } for pid=3838 comm="nautilus" name=".gdmV8RYIT" dev=dm-0 ino=14469571 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163776239.168:12691): arch=40000003 syscall=33 success=yes exit=0 a0=bf97ae55 a1=4 a2=da3a64 a3=bf97ae55 items=0 ppid=1 pid=3838 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="nautilus" exe="/usr/bin/nautilus" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776265.914:12692): avc: denied { ptrace } for pid=13126 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:gpm_t:s0 tclass=process type=SYSCALL msg=audit(1163776265.914:12692): arch=40000003 syscall=195 success=yes exit=0 a0=850d088 a1=bfbdac04 a2=dcaff4 a3=bfbd9f7c items=0 ppid=13125 pid=13126 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776265.914:12693): avc: denied { ptrace } for pid=13126 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:hald_t:s0 tclass=process type=SYSCALL msg=audit(1163776265.914:12693): arch=40000003 syscall=195 success=yes exit=0 a0=850d088 a1=bfbdac04 a2=dcaff4 a3=bfbd9f7c items=0 ppid=13125 pid=13126 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776270.686:12694): avc: denied { read } for pid=13129 comm="gcj-dbtool" name="[135348]" dev=pipefs ino=135348 scontext=staff_u:staff_r:staff_javaplugin_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=fifo_file type=AVC msg=audit(1163776270.686:12694): avc: denied { write } for pid=13129 comm="gcj-dbtool" name="[135369]" dev=pipefs ino=135369 scontext=staff_u:staff_r:staff_javaplugin_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=fifo_file type=SYSCALL msg=audit(1163776270.686:12694): arch=40000003 syscall=11 success=yes exit=0 a0=9eab218 a1=9eab250 a2=9eaa958 a3=9ea9258 items=0 ppid=13128 pid=13129 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="gcj-dbtool" exe="/usr/bin/gcj-dbtool" subj=staff_u:staff_r:staff_javaplugin_t:s0 key=(null) type=AVC_PATH msg=audit(1163776270.686:12694): path="pipe:[135369]" type=AVC_PATH msg=audit(1163776270.686:12694): path="pipe:[135348]" type=AVC msg=audit(1163776270.966:12695): avc: denied { sigchld } for pid=13128 comm="rebuild-gcj-db" scontext=staff_u:staff_r:staff_javaplugin_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=process type=SYSCALL msg=audit(1163776270.966:12695): arch=40000003 syscall=7 success=yes exit=13129 a0=ffffffff a1=bfde7cb8 a2=0 a3=9eaaa60 items=0 ppid=13127 pid=13128 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="rebuild-gcj-db" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776271.154:12696): avc: denied { write } for pid=13135 comm="gcj-dbtool" name="classmap.db" dev=dm-0 ino=10999442 scontext=staff_u:staff_r:staff_javaplugin_t:s0 tcontext=staff_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1163776271.154:12696): arch=40000003 syscall=5 success=yes exit=5 a0=2e0e60 a1=8042 a2=1b6 a3=8042 items=0 ppid=13128 pid=13135 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="gcj-dbtool" exe="/usr/bin/gcj-dbtool" subj=staff_u:staff_r:staff_javaplugin_t:s0 key=(null) type=AVC msg=audit(1163776271.394:12697): avc: denied { write } for pid=13139 comm="gcj-dbtool" name="gcj-4.1.1" dev=dm-0 ino=11001132 scontext=staff_u:staff_r:staff_javaplugin_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=dir type=AVC msg=audit(1163776271.394:12697): avc: denied { add_name } for pid=13139 comm="gcj-dbtool" name="classmap.dbchwmlp" scontext=staff_u:staff_r:staff_javaplugin_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=dir type=AVC msg=audit(1163776271.394:12697): avc: denied { create } for pid=13139 comm="gcj-dbtool" name="classmap.dbchwmlp" scontext=staff_u:staff_r:staff_javaplugin_t:s0 tcontext=staff_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1163776271.394:12697): arch=40000003 syscall=5 success=yes exit=5 a0=bfba7610 a1=80c0 a2=1a4 a3=80c0 items=0 ppid=13138 pid=13139 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="gcj-dbtool" exe="/usr/bin/gcj-dbtool" subj=staff_u:staff_r:staff_javaplugin_t:s0 key=(null) type=AVC msg=audit(1163776273.046:12698): avc: denied { remove_name } for pid=13139 comm="gcj-dbtool" name="classmap.dbchwmlp" dev=dm-0 ino=11000703 scontext=staff_u:staff_r:staff_javaplugin_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=dir type=AVC msg=audit(1163776273.046:12698): avc: denied { rename } for pid=13139 comm="gcj-dbtool" name="classmap.dbchwmlp" dev=dm-0 ino=11000703 scontext=staff_u:staff_r:staff_javaplugin_t:s0 tcontext=staff_u:object_r:lib_t:s0 tclass=file type=AVC msg=audit(1163776273.046:12698): avc: denied { unlink } for pid=13139 comm="gcj-dbtool" name="classmap.db" dev=dm-0 ino=10999442 scontext=staff_u:staff_r:staff_javaplugin_t:s0 tcontext=staff_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1163776273.046:12698): arch=40000003 syscall=38 success=yes exit=0 a0=bfba7620 a1=bfba75f0 a2=23dd5f4 a3=bfba75f0 items=0 ppid=13138 pid=13139 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="gcj-dbtool" exe="/usr/bin/gcj-dbtool" subj=staff_u:staff_r:staff_javaplugin_t:s0 key=(null) type=AVC msg=audit(1163776273.414:12699): avc: denied { write } for pid=13146 comm="update-desktop-" name="applications" dev=dm-0 ino=10311883 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=dir type=AVC msg=audit(1163776273.414:12699): avc: denied { add_name } for pid=13146 comm="update-desktop-" name=".mimeinfo.cache.ED02IT" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=dir type=SYSCALL msg=audit(1163776273.414:12699): arch=40000003 syscall=5 success=yes exit=3 a0=8cf6450 a1=80c2 a2=180 a3=80c2 items=0 ppid=13127 pid=13146 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="update-desktop-" exe="/usr/bin/update-desktop-database" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776273.422:12700): avc: denied { remove_name } for pid=13146 comm="update-desktop-" name=".mimeinfo.cache.ED02IT" dev=dm-0 ino=10314902 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=dir type=SYSCALL msg=audit(1163776273.422:12700): arch=40000003 syscall=38 success=yes exit=0 a0=8cf6450 a1=8cf5cc0 a2=1a4 a3=8ce7f50 items=0 ppid=13127 pid=13146 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="update-desktop-" exe="/usr/bin/update-desktop-database" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776274.138:12701): avc: denied { setattr } for pid=13148 comm="gtk-update-icon" name="hicolor" dev=dm-0 ino=10444975 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=dir type=SYSCALL msg=audit(1163776274.138:12701): arch=40000003 syscall=30 success=yes exit=0 a0=bfdb2bc5 a1=bfdb0f44 a2=1 a3=8a4bc28 items=0 ppid=13127 pid=13148 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="gtk-update-icon" exe="/usr/bin/gtk-update-icon-cache" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776276.719:12702): avc: denied { unlink } for pid=8303 comm="yum" name=".eclipseproduct" dev=dm-0 ino=10704855 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=file type=SYSCALL msg=audit(1163776276.719:12702): arch=40000003 syscall=38 success=yes exit=0 a0=fb15cb8 a1=fa744e0 a2=d2a040 a3=fb15cb8 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776276.723:12703): avc: denied { relabelto } for pid=8303 comm="yum" name=".eclipseproduct" dev=dm-0 ino=12177802 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=file type=SYSCALL msg=audit(1163776276.723:12703): arch=40000003 syscall=227 success=yes exit=0 a0=fa744e0 a1=a2f0d3 a2=fb43f98 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776276.723:12704): avc: denied { setattr } for pid=8303 comm="yum" name=".eclipseproduct" dev=dm-0 ino=12177802 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=file type=SYSCALL msg=audit(1163776276.723:12704): arch=40000003 syscall=212 success=yes exit=0 a0=fa744e0 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776276.731:12705): avc: denied { relabelfrom } for pid=8303 comm="yum" name="features" dev=dm-0 ino=10707976 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=dir type=AVC msg=audit(1163776276.731:12705): avc: denied { relabelto } for pid=8303 comm="yum" name="features" dev=dm-0 ino=10707976 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=dir type=SYSCALL msg=audit(1163776276.731:12705): arch=40000003 syscall=227 success=yes exit=0 a0=fb44018 a1=a2f0d3 a2=f9e40b8 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776284.727:12706): avc: denied { read } for pid=8116 comm="dhclient" name="[31406]" dev=sockfs ino=31406 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=packet_socket type=SYSCALL msg=audit(1163776284.727:12706): arch=40000003 syscall=3 success=yes exit=590 a0=6 a1=bf923428 a2=600 a3=9604620 items=0 ppid=8112 pid=8116 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="dhclient" exe="/sbin/dhclient" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163776284.727:12706): path="socket:[31406]" type=AVC msg=audit(1163776285.791:12707): avc: denied { ptrace } for pid=13168 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:hplip_t:s0 tclass=process type=SYSCALL msg=audit(1163776285.791:12707): arch=40000003 syscall=195 success=yes exit=0 a0=8ca0088 a1=bfde0604 a2=24bff4 a3=bfddf97c items=0 ppid=13167 pid=13168 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776285.795:12708): avc: denied { ptrace } for pid=13168 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:xfs_t:s0 tclass=process type=SYSCALL msg=audit(1163776285.795:12708): arch=40000003 syscall=195 success=yes exit=0 a0=8ca0088 a1=bfde0604 a2=24bff4 a3=bfddf97c items=0 ppid=13167 pid=13168 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776288.239:12709): avc: denied { write } for pid=8303 comm="yum" name="bin" dev=dm-0 ino=10311850 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=dir type=AVC msg=audit(1163776288.239:12709): avc: denied { add_name } for pid=8303 comm="yum" name="nautilus-sendto;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=dir type=AVC msg=audit(1163776288.239:12709): avc: denied { create } for pid=8303 comm="yum" name="nautilus-sendto;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1163776288.239:12709): arch=40000003 syscall=5 success=yes exit=30 a0=f986a18 a1=8241 a2=1b6 a3=8241 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776288.239:12710): avc: denied { write } for pid=8303 comm="yum" name="nautilus-sendto;455dcb57" dev=dm-0 ino=10321655 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1163776288.239:12710): arch=40000003 syscall=4 success=yes exit=16384 a0=1e a1=faac280 a2=4000 a3=f9c7408 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163776288.239:12710): path="/usr/bin/nautilus-sendto;455dcb57" type=AVC msg=audit(1163776288.239:12711): avc: denied { remove_name } for pid=8303 comm="yum" name="nautilus-sendto;455dcb57" dev=dm-0 ino=10321655 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=dir type=AVC msg=audit(1163776288.239:12711): avc: denied { rename } for pid=8303 comm="yum" name="nautilus-sendto;455dcb57" dev=dm-0 ino=10321655 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:bin_t:s0 tclass=file type=AVC msg=audit(1163776288.239:12711): avc: denied { unlink } for pid=8303 comm="yum" name="nautilus-sendto" dev=dm-0 ino=10317618 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1163776288.239:12711): arch=40000003 syscall=38 success=yes exit=0 a0=f986a18 a1=fb43fd8 a2=d2a040 a3=f986a18 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776288.367:12712): avc: denied { relabelfrom } for pid=8303 comm="yum" name="nautilus-sendto" dev=dm-0 ino=10321655 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:bin_t:s0 tclass=file type=AVC msg=audit(1163776288.367:12712): avc: denied { relabelto } for pid=8303 comm="yum" name="nautilus-sendto" dev=dm-0 ino=10321655 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1163776288.367:12712): arch=40000003 syscall=227 success=yes exit=0 a0=fb43fd8 a1=a2f0d3 a2=fb43fb8 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776288.367:12713): avc: denied { setattr } for pid=8303 comm="yum" name="nautilus-sendto" dev=dm-0 ino=10321655 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1163776288.367:12713): arch=40000003 syscall=212 success=yes exit=0 a0=fb43fd8 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776288.947:12714): avc: denied { write } for pid=8303 comm="yum" name="LC_MESSAGES" dev=dm-0 ino=10311917 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=dir type=AVC msg=audit(1163776288.947:12714): avc: denied { add_name } for pid=8303 comm="yum" name="nautilus-sendto.mo;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=dir type=SYSCALL msg=audit(1163776288.947:12714): arch=40000003 syscall=5 success=yes exit=30 a0=f934028 a1=8241 a2=1b6 a3=8241 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776288.951:12715): avc: denied { remove_name } for pid=8303 comm="yum" name="nautilus-sendto.mo;455dcb57" dev=dm-0 ino=10317618 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=dir type=SYSCALL msg=audit(1163776288.951:12715): arch=40000003 syscall=38 success=yes exit=0 a0=f934028 a1=f9e4978 a2=d2a040 a3=f934028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776289.203:12716): avc: denied { write } for pid=8303 comm="yum" name="man1" dev=dm-0 ino=10311889 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:man_t:s0 tclass=dir type=AVC msg=audit(1163776289.203:12716): avc: denied { add_name } for pid=8303 comm="yum" name="nautilus-sendto.1.gz;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:man_t:s0 tclass=dir type=AVC msg=audit(1163776289.203:12716): avc: denied { create } for pid=8303 comm="yum" name="nautilus-sendto.1.gz;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:man_t:s0 tclass=file type=SYSCALL msg=audit(1163776289.203:12716): arch=40000003 syscall=5 success=yes exit=30 a0=f9e4978 a1=8241 a2=1b6 a3=8241 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776289.283:12717): avc: denied { write } for pid=8303 comm="yum" name="nautilus-sendto.1.gz;455dcb57" dev=dm-0 ino=10331542 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:man_t:s0 tclass=file type=SYSCALL msg=audit(1163776289.283:12717): arch=40000003 syscall=4 success=yes exit=648 a0=1e a1=b6dcb000 a2=288 a3=f9c79c8 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163776289.283:12717): path="/usr/share/man/man1/nautilus-sendto.1.gz;455dcb57" type=AVC msg=audit(1163776289.283:12718): avc: denied { remove_name } for pid=8303 comm="yum" name="nautilus-sendto.1.gz;455dcb57" dev=dm-0 ino=10331542 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:man_t:s0 tclass=dir type=AVC msg=audit(1163776289.283:12718): avc: denied { rename } for pid=8303 comm="yum" name="nautilus-sendto.1.gz;455dcb57" dev=dm-0 ino=10331542 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:man_t:s0 tclass=file type=AVC msg=audit(1163776289.283:12718): avc: denied { unlink } for pid=8303 comm="yum" name="nautilus-sendto.1.gz" dev=dm-0 ino=10331547 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:man_t:s0 tclass=file type=SYSCALL msg=audit(1163776289.283:12718): arch=40000003 syscall=38 success=yes exit=0 a0=f9e4978 a1=fb43ab8 a2=d2a040 a3=f9e4978 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776289.295:12719): avc: denied { relabelfrom } for pid=8303 comm="yum" name="nautilus-sendto.1.gz" dev=dm-0 ino=10331542 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:man_t:s0 tclass=file type=AVC msg=audit(1163776289.295:12719): avc: denied { relabelto } for pid=8303 comm="yum" name="nautilus-sendto.1.gz" dev=dm-0 ino=10331542 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:man_t:s0 tclass=file type=SYSCALL msg=audit(1163776289.295:12719): arch=40000003 syscall=227 success=yes exit=0 a0=fb43ab8 a1=a2f0d3 a2=f9c7428 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776289.295:12720): avc: denied { setattr } for pid=8303 comm="yum" name="nautilus-sendto.1.gz" dev=dm-0 ino=10331542 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:man_t:s0 tclass=file type=SYSCALL msg=audit(1163776289.295:12720): arch=40000003 syscall=212 success=yes exit=0 a0=fb43ab8 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776290.935:12721): avc: denied { ptrace } for pid=13172 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:bluetooth_t:s0 tclass=process type=SYSCALL msg=audit(1163776290.935:12721): arch=40000003 syscall=195 success=yes exit=0 a0=9d6d088 a1=bfde8614 a2=d8aff4 a3=bfde798c items=0 ppid=13171 pid=13172 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776290.935:12722): avc: denied { ptrace } for pid=13172 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:automount_t:s0 tclass=process type=SYSCALL msg=audit(1163776290.935:12722): arch=40000003 syscall=195 success=yes exit=0 a0=9d6d088 a1=bfde8614 a2=d8aff4 a3=bfde798c items=0 ppid=13171 pid=13172 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776290.943:12723): avc: denied { ptrace } for pid=13172 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_su_t:s0 tclass=process type=SYSCALL msg=audit(1163776290.943:12723): arch=40000003 syscall=195 success=yes exit=0 a0=9d6d088 a1=bfde8614 a2=d8aff4 a3=bfde798c items=0 ppid=13171 pid=13172 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776296.688:12724): avc: denied { execute } for pid=13174 comm="sh" name="ldconfig" dev=dm-0 ino=9984490 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:ldconfig_exec_t:s0 tclass=file type=AVC msg=audit(1163776296.688:12724): avc: denied { execute_no_trans } for pid=13174 comm="sh" name="ldconfig" dev=dm-0 ino=9984490 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:ldconfig_exec_t:s0 tclass=file type=AVC msg=audit(1163776296.688:12724): avc: denied { read } for pid=13174 comm="sh" name="ldconfig" dev=dm-0 ino=9984490 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:ldconfig_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163776296.688:12724): arch=40000003 syscall=11 success=yes exit=0 a0=87a4c70 a1=87a4e00 a2=87a4cf0 a3=87a4120 items=0 ppid=13173 pid=13174 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="ldconfig" exe="/sbin/ldconfig" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163776296.688:12724): path="/sbin/ldconfig" type=AVC_PATH msg=audit(1163776296.688:12724): path="/sbin/ldconfig" type=AVC msg=audit(1163776297.520:12725): avc: denied { write } for pid=13178 comm="update-desktop-" name="applications" dev=dm-0 ino=10936389 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:usr_t:s0 tclass=dir type=AVC msg=audit(1163776297.520:12725): avc: denied { add_name } for pid=13178 comm="update-desktop-" name=".mimeinfo.cache.GETUIT" scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:usr_t:s0 tclass=dir type=SYSCALL msg=audit(1163776297.520:12725): arch=40000003 syscall=5 success=yes exit=3 a0=9803e20 a1=80c2 a2=180 a3=80c2 items=0 ppid=13173 pid=13178 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="update-desktop-" exe="/usr/bin/update-desktop-database" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776297.524:12726): avc: denied { remove_name } for pid=13178 comm="update-desktop-" name=".mimeinfo.cache.GETUIT" dev=dm-0 ino=10935284 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:usr_t:s0 tclass=dir type=SYSCALL msg=audit(1163776297.524:12726): arch=40000003 syscall=38 success=yes exit=0 a0=9803e20 a1=9804ba8 a2=1a4 a3=980115c items=0 ppid=13173 pid=13178 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="update-desktop-" exe="/usr/bin/update-desktop-database" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776297.716:12727): avc: denied { append } for pid=13179 comm="scrollkeeper-up" name="scrollkeeper.log" dev=dm-0 ino=14436937 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:var_log_t:s0 tclass=file type=SYSCALL msg=audit(1163776297.716:12727): arch=40000003 syscall=5 success=yes exit=3 a0=87c5d0 a1=441 a2=1b6 a3=9de1638 items=0 ppid=13173 pid=13179 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="scrollkeeper-up" exe="/usr/bin/scrollkeeper-update" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776297.760:12728): avc: denied { write } for pid=13179 comm="scrollkeeper-up" name="scrollkeeper" dev=dm-0 ino=14567773 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:var_lib_t:s0 tclass=dir type=AVC msg=audit(1163776297.760:12728): avc: denied { add_name } for pid=13179 comm="scrollkeeper-up" name="scrollkeeper_docs.tmp" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:var_lib_t:s0 tclass=dir type=AVC msg=audit(1163776297.760:12728): avc: denied { create } for pid=13179 comm="scrollkeeper-up" name="scrollkeeper_docs.tmp" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:var_lib_t:s0 tclass=file type=SYSCALL msg=audit(1163776297.760:12728): arch=40000003 syscall=5 success=yes exit=4 a0=bf8146a3 a1=241 a2=1b6 a3=9e1bcf8 items=0 ppid=13173 pid=13179 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="scrollkeeper-up" exe="/usr/bin/scrollkeeper-update" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776297.784:12729): avc: denied { write } for pid=13179 comm="scrollkeeper-up" name="scrollkeeper_docs.tmp" dev=dm-0 ino=14567669 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:var_lib_t:s0 tclass=file type=SYSCALL msg=audit(1163776297.784:12729): arch=40000003 syscall=4 success=yes exit=4096 a0=4 a1=b7f70000 a2=1000 a3=1000 items=0 ppid=13173 pid=13179 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="scrollkeeper-up" exe="/usr/bin/scrollkeeper-update" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163776297.784:12729): path="/var/lib/scrollkeeper/scrollkeeper_docs.tmp" type=AVC msg=audit(1163776297.788:12730): avc: denied { remove_name } for pid=13179 comm="scrollkeeper-up" name="scrollkeeper_docs" dev=dm-0 ino=14567553 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:var_lib_t:s0 tclass=dir type=AVC msg=audit(1163776297.788:12730): avc: denied { unlink } for pid=13179 comm="scrollkeeper-up" name="scrollkeeper_docs" dev=dm-0 ino=14567553 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:var_lib_t:s0 tclass=file type=SYSCALL msg=audit(1163776297.788:12730): arch=40000003 syscall=10 success=yes exit=0 a0=bf8145a3 a1=1 a2=87e338 a3=bf8147c3 items=0 ppid=13173 pid=13179 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="scrollkeeper-up" exe="/usr/bin/scrollkeeper-update" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776297.796:12731): avc: denied { rename } for pid=13179 comm="scrollkeeper-up" name="scrollkeeper_docs.tmp" dev=dm-0 ino=14567669 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:var_lib_t:s0 tclass=file type=SYSCALL msg=audit(1163776297.796:12731): arch=40000003 syscall=38 success=yes exit=0 a0=bf8146a3 a1=bf8145a3 a2=87e338 a3=bf8147c3 items=0 ppid=13173 pid=13179 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="scrollkeeper-up" exe="/usr/bin/scrollkeeper-update" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776297.944:12732): avc: denied { append } for pid=13179 comm="scrollkeeper-up" name="scrollkeeper_docs" dev=dm-0 ino=14567669 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:var_lib_t:s0 tclass=file type=SYSCALL msg=audit(1163776297.944:12732): arch=40000003 syscall=5 success=yes exit=3 a0=bf8142c8 a1=441 a2=1b6 a3=9de2320 items=0 ppid=13173 pid=13179 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="scrollkeeper-up" exe="/usr/bin/scrollkeeper-update" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776313.553:12733): avc: denied { relabelto } for pid=8303 comm="yum" name="file-roller" dev=dm-0 ino=12343447 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=dir type=SYSCALL msg=audit(1163776313.553:12733): arch=40000003 syscall=227 success=yes exit=0 a0=fb40618 a1=a2f0d3 a2=fa942a8 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776313.553:12734): avc: denied { setattr } for pid=8303 comm="yum" name="file-roller" dev=dm-0 ino=12343447 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=dir type=SYSCALL msg=audit(1163776313.553:12734): arch=40000003 syscall=212 success=yes exit=0 a0=fb40618 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776313.581:12735): avc: denied { create } for pid=8303 comm="yum" name="file-roller-2.17.2" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:usr_t:s0 tclass=dir type=SYSCALL msg=audit(1163776313.581:12735): arch=40000003 syscall=39 success=yes exit=0 a0=fa93118 a1=1c0 a2=d2a040 a3=fa93118 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776313.585:12736): avc: denied { relabelfrom } for pid=8303 comm="yum" name="file-roller-2.17.2" dev=dm-0 ino=12343560 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:usr_t:s0 tclass=dir type=SYSCALL msg=audit(1163776313.585:12736): arch=40000003 syscall=227 success=yes exit=0 a0=fa93118 a1=a2f0d3 a2=fa92ff0 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776314.381:12737): avc: denied { create } for pid=8303 comm="yum" name="file-roller.mo;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1163776314.381:12737): arch=40000003 syscall=5 success=yes exit=30 a0=faa23d0 a1=8241 a2=1b6 a3=8241 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776314.381:12738): avc: denied { write } for pid=8303 comm="yum" name="file-roller.mo;455dcb57" dev=dm-0 ino=10327037 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1163776314.381:12738): arch=40000003 syscall=4 success=yes exit=4015 a0=1e a1=b6dcb000 a2=faf a3=faaaaf8 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163776314.381:12738): path="/usr/share/locale/am/LC_MESSAGES/file-roller.mo;455dcb57" type=AVC msg=audit(1163776314.381:12739): avc: denied { rename } for pid=8303 comm="yum" name="file-roller.mo;455dcb57" dev=dm-0 ino=10327037 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1163776314.381:12739): arch=40000003 syscall=38 success=yes exit=0 a0=faa23d0 a1=fa95f90 a2=d2a040 a3=faa23d0 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776314.397:12740): avc: denied { relabelfrom } for pid=8303 comm="yum" name="file-roller.mo" dev=dm-0 ino=10327037 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1163776314.397:12740): arch=40000003 syscall=227 success=yes exit=0 a0=fa95f90 a1=a2f0d3 a2=fb0e208 a3=1e items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776321.953:12741): avc: denied { relabelfrom } for pid=8303 comm="yum" name="program" dev=dm-0 ino=12179293 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=dir type=SYSCALL msg=audit(1163776321.953:12741): arch=40000003 syscall=227 success=yes exit=0 a0=fa92168 a1=a2f0d3 a2=fb15500 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776346.791:12742): avc: denied { read } for pid=8137 comm="vpnc" name="tun" dev=tmpfs ino=1473 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:tun_tap_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163776346.791:12742): arch=40000003 syscall=3 success=yes exit=59 a0=4 a1=805c5a0 a2=1000 a3=805c5a0 items=0 ppid=8135 pid=8137 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vpnc" exe="/usr/sbin/vpnc" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163776346.791:12742): path="/dev/net/tun" type=AVC msg=audit(1163776346.839:12743): avc: denied { write } for pid=8137 comm="vpnc" name="tun" dev=tmpfs ino=1473 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:tun_tap_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163776346.839:12743): arch=40000003 syscall=4 success=yes exit=127 a0=4 a1=805c570 a2=7f a3=bfa20a54 items=0 ppid=8135 pid=8137 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vpnc" exe="/usr/sbin/vpnc" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163776346.839:12743): path="/dev/net/tun" type=AVC msg=audit(1163776347.947:12744): avc: denied { write } for pid=13312 comm="gconftool-2" name="gconf.xml.defaults" dev=dm-0 ino=9330097 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=dir type=AVC msg=audit(1163776347.947:12744): avc: denied { add_name } for pid=13312 comm="gconftool-2" name=".testing.writeability" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=dir type=SYSCALL msg=audit(1163776347.947:12744): arch=40000003 syscall=5 success=yes exit=3 a0=80b2ce0 a1=41 a2=1c0 a3=80b2ce0 items=0 ppid=13309 pid=13312 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="gconftool-2" exe="/usr/bin/gconftool-2" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776347.947:12745): avc: denied { remove_name } for pid=13312 comm="gconftool-2" name=".testing.writeability" dev=dm-0 ino=9330048 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=dir type=SYSCALL msg=audit(1163776347.947:12745): arch=40000003 syscall=10 success=yes exit=0 a0=80b2ce0 a1=41 a2=412708 a3=80b2ce0 items=0 ppid=13309 pid=13312 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="gconftool-2" exe="/usr/bin/gconftool-2" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776350.943:12746): avc: denied { ptrace } for pid=13314 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=process type=SYSCALL msg=audit(1163776350.943:12746): arch=40000003 syscall=195 success=yes exit=0 a0=9f6b0a0 a1=bf8890b4 a2=3b8ff4 a3=bf88842c items=0 ppid=13312 pid=13314 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776350.943:12747): avc: denied { ptrace } for pid=13314 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:inetd_t:s0 tclass=process type=SYSCALL msg=audit(1163776350.943:12747): arch=40000003 syscall=195 success=yes exit=0 a0=9f6b088 a1=bf8890b4 a2=3b8ff4 a3=bf88842c items=0 ppid=13312 pid=13314 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776350.947:12748): avc: denied { ptrace } for pid=13314 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:sendmail_t:s0 tclass=process type=SYSCALL msg=audit(1163776350.947:12748): arch=40000003 syscall=195 success=yes exit=0 a0=9f6b088 a1=bf8890b4 a2=3b8ff4 a3=bf88842c items=0 ppid=13312 pid=13314 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776350.947:12749): avc: denied { ptrace } for pid=13314 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:pam_t:s0 tclass=process type=SYSCALL msg=audit(1163776350.947:12749): arch=40000003 syscall=195 success=yes exit=0 a0=9f6b088 a1=bf8890b4 a2=3b8ff4 a3=bf88842c items=0 ppid=13312 pid=13314 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776350.951:12750): avc: denied { ptrace } for pid=13314 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_ssh_t:s0 tclass=process type=SYSCALL msg=audit(1163776350.951:12750): arch=40000003 syscall=195 success=yes exit=0 a0=9f6b088 a1=bf8890b4 a2=3b8ff4 a3=bf88842c items=0 ppid=13312 pid=13314 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776354.243:12751): avc: denied { append } for pid=8303 comm="yum" name="yum.log" dev=dm-0 ino=8707846 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:rpm_log_t:s0 tclass=file type=SYSCALL msg=audit(1163776354.243:12751): arch=40000003 syscall=4 success=yes exit=52 a0=4 a1=b7bd1000 a2=34 a3=34 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163776354.243:12751): path="/var/log/yum.log" type=AVC msg=audit(1163776357.444:12752): avc: denied { ptrace } for pid=13368 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:klogd_t:s0 tclass=process type=SYSCALL msg=audit(1163776357.444:12752): arch=40000003 syscall=195 success=yes exit=0 a0=8ac1088 a1=bf970994 a2=364ff4 a3=bf96fd0c items=0 ppid=13367 pid=13368 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776357.444:12753): avc: denied { ptrace } for pid=13368 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:irqbalance_t:s0 tclass=process type=SYSCALL msg=audit(1163776357.444:12753): arch=40000003 syscall=195 success=yes exit=0 a0=8ac1088 a1=bf970994 a2=364ff4 a3=bf96fd0c items=0 ppid=13367 pid=13368 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776357.452:12754): avc: denied { ptrace } for pid=13368 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process type=SYSCALL msg=audit(1163776357.452:12754): arch=40000003 syscall=195 success=no exit=-2 a0=8ac1088 a1=bf970994 a2=364ff4 a3=bf96fd0c items=0 ppid=13367 pid=13368 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776357.620:12755): avc: denied { write } for pid=8303 comm="yum" name="servers" dev=dm-0 ino=10443133 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=dir type=AVC msg=audit(1163776357.620:12755): avc: denied { add_name } for pid=8303 comm="yum" name="GNOME_RemoteDesktop.server;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=dir type=AVC msg=audit(1163776357.620:12755): avc: denied { create } for pid=8303 comm="yum" name="GNOME_RemoteDesktop.server;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1163776357.620:12755): arch=40000003 syscall=5 success=yes exit=30 a0=f928fe8 a1=8241 a2=1b6 a3=8241 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776357.620:12756): avc: denied { write } for pid=8303 comm="yum" name="GNOME_RemoteDesktop.server;455dcb57" dev=dm-0 ino=18103017 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1163776357.620:12756): arch=40000003 syscall=4 success=yes exit=507 a0=1e a1=b6dcb000 a2=1fb a3=f929178 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163776357.620:12756): path="/usr/lib/bonobo/servers/GNOME_RemoteDesktop.server;455dcb57" type=AVC msg=audit(1163776357.624:12757): avc: denied { remove_name } for pid=8303 comm="yum" name="GNOME_RemoteDesktop.server;455dcb57" dev=dm-0 ino=18103017 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=dir type=AVC msg=audit(1163776357.624:12757): avc: denied { rename } for pid=8303 comm="yum" name="GNOME_RemoteDesktop.server;455dcb57" dev=dm-0 ino=18103017 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:lib_t:s0 tclass=file type=AVC msg=audit(1163776357.624:12757): avc: denied { unlink } for pid=8303 comm="yum" name="GNOME_RemoteDesktop.server" dev=dm-0 ino=10446189 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1163776357.624:12757): arch=40000003 syscall=38 success=yes exit=0 a0=f928fe8 a1=fbbfa10 a2=d2a040 a3=f928fe8 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776357.644:12758): avc: denied { relabelfrom } for pid=8303 comm="yum" name="GNOME_RemoteDesktop.server" dev=dm-0 ino=18103017 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:lib_t:s0 tclass=file type=AVC msg=audit(1163776357.644:12758): avc: denied { relabelto } for pid=8303 comm="yum" name="GNOME_RemoteDesktop.server" dev=dm-0 ino=18103017 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1163776357.644:12758): arch=40000003 syscall=227 success=yes exit=0 a0=fbbfa10 a1=a2f0d3 a2=b700d48 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776357.644:12759): avc: denied { setattr } for pid=8303 comm="yum" name="GNOME_RemoteDesktop.server" dev=dm-0 ino=18103017 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1163776357.644:12759): arch=40000003 syscall=212 success=yes exit=0 a0=fbbfa10 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776362.156:12760): avc: denied { ptrace } for pid=13373 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:auditd_t:s0 tclass=process type=SYSCALL msg=audit(1163776362.156:12760): arch=40000003 syscall=195 success=yes exit=0 a0=9977088 a1=bfca9cd4 a2=ef4ff4 a3=bfca904c items=0 ppid=13371 pid=13373 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776366.224:12761): avc: denied { write } for pid=8303 comm="yum" name="system.d" dev=dm-0 ino=9330036 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:dbusd_etc_t:s0 tclass=dir type=AVC msg=audit(1163776366.224:12761): avc: denied { add_name } for pid=8303 comm="yum" name="printdriverselector.conf;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:dbusd_etc_t:s0 tclass=dir type=AVC msg=audit(1163776366.224:12761): avc: denied { create } for pid=8303 comm="yum" name="printdriverselector.conf;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:dbusd_etc_t:s0 tclass=file type=SYSCALL msg=audit(1163776366.224:12761): arch=40000003 syscall=5 success=yes exit=30 a0=faa7098 a1=8241 a2=1b6 a3=8241 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776366.248:12762): avc: denied { write } for pid=8303 comm="yum" name="printdriverselector.conf;455dcb57" dev=dm-0 ino=9331097 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:dbusd_etc_t:s0 tclass=file type=SYSCALL msg=audit(1163776366.248:12762): arch=40000003 syscall=4 success=yes exit=783 a0=1e a1=b6dcb000 a2=30f a3=fb0b740 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163776366.248:12762): path="/etc/dbus-1/system.d/printdriverselector.conf;455dcb57" type=AVC msg=audit(1163776366.248:12763): avc: denied { remove_name } for pid=8303 comm="yum" name="printdriverselector.conf;455dcb57" dev=dm-0 ino=9331097 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:dbusd_etc_t:s0 tclass=dir type=AVC msg=audit(1163776366.248:12763): avc: denied { rename } for pid=8303 comm="yum" name="printdriverselector.conf;455dcb57" dev=dm-0 ino=9331097 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:dbusd_etc_t:s0 tclass=file type=AVC msg=audit(1163776366.248:12763): avc: denied { unlink } for pid=8303 comm="yum" name="printdriverselector.conf" dev=dm-0 ino=9331681 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:dbusd_etc_t:s0 tclass=file type=SYSCALL msg=audit(1163776366.248:12763): arch=40000003 syscall=38 success=yes exit=0 a0=faa7098 a1=fac6400 a2=d2a040 a3=faa7098 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776366.256:12764): avc: denied { relabelfrom } for pid=8303 comm="yum" name="printdriverselector.conf" dev=dm-0 ino=9331097 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:dbusd_etc_t:s0 tclass=file type=AVC msg=audit(1163776366.256:12764): avc: denied { relabelto } for pid=8303 comm="yum" name="printdriverselector.conf" dev=dm-0 ino=9331097 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:dbusd_etc_t:s0 tclass=file type=SYSCALL msg=audit(1163776366.256:12764): arch=40000003 syscall=227 success=yes exit=0 a0=fac6400 a1=a2f0d3 a2=b033890 a3=21 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776366.256:12765): avc: denied { setattr } for pid=8303 comm="yum" name="printdriverselector.conf" dev=dm-0 ino=9331097 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:dbusd_etc_t:s0 tclass=file type=SYSCALL msg=audit(1163776366.256:12765): arch=40000003 syscall=212 success=yes exit=0 a0=fac6400 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776366.260:12766): avc: denied { relabelfrom } for pid=8303 comm="yum" name="schemas" dev=dm-0 ino=9330176 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=dir type=AVC msg=audit(1163776366.260:12766): avc: denied { relabelto } for pid=8303 comm="yum" name="schemas" dev=dm-0 ino=9330176 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=dir type=SYSCALL msg=audit(1163776366.260:12766): arch=40000003 syscall=227 success=yes exit=0 a0=f928380 a1=a2f0d3 a2=fa92f60 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776366.260:12767): avc: denied { setattr } for pid=8303 comm="yum" name="schemas" dev=dm-0 ino=9330176 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=dir type=SYSCALL msg=audit(1163776366.260:12767): arch=40000003 syscall=212 success=yes exit=0 a0=f928380 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776366.272:12768): avc: denied { getattr } for pid=6659 comm="dbus-daemon" name="/" dev=dm-0 ino=2 scontext=staff_u:staff_r:staff_dbusd_t:s0 tcontext=system_u:object_r:fs_t:s0 tclass=filesystem type=SYSCALL msg=audit(1163776366.272:12768): arch=40000003 syscall=100 success=yes exit=0 a0=12 a1=bfcd50ac a2=c4eff4 a3=ffffffb8 items=0 ppid=1 pid=6659 auid=500 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) comm="dbus-daemon" exe="/bin/dbus-daemon" subj=staff_u:staff_r:staff_dbusd_t:s0 key=(null) type=AVC msg=audit(1163776372.853:12769): avc: denied { ptrace } for pid=13382 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:syslogd_t:s0 tclass=process type=SYSCALL msg=audit(1163776372.853:12769): arch=40000003 syscall=195 success=yes exit=0 a0=9ae8088 a1=bfade7a4 a2=24bff4 a3=bfaddb1c items=0 ppid=13381 pid=13382 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776372.857:12770): avc: denied { ptrace } for pid=13382 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_ssh_agent_t:s0 tclass=process type=SYSCALL msg=audit(1163776372.857:12770): arch=40000003 syscall=195 success=yes exit=0 a0=9ae8088 a1=bfade7a4 a2=24bff4 a3=bfaddb1c items=0 ppid=13381 pid=13382 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776387.505:12771): avc: denied { write } for pid=13401 comm="gnome-backgroun" name="3310" dev=dm-0 ino=14567721 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:ice_tmp_t:s0 tclass=sock_file type=SYSCALL msg=audit(1163776387.505:12771): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=bf98f200 a2=254770 a3=15 items=0 ppid=1 pid=13401 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-backgroun" exe="/usr/bin/gnome-background-properties" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776387.505:12772): avc: denied { read } for pid=13401 comm="gnome-backgroun" name=".ICEauthority" dev=dm-0 ino=6574784 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:staff_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163776387.505:12772): arch=40000003 syscall=33 success=yes exit=0 a0=99afcd8 a1=4 a2=254770 a3=99afcd8 items=0 ppid=1 pid=13401 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-backgroun" exe="/usr/bin/gnome-background-properties" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776389.002:12773): avc: denied { ptrace } for pid=13408 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_dbusd_t:s0 tclass=process type=SYSCALL msg=audit(1163776389.002:12773): arch=40000003 syscall=195 success=yes exit=0 a0=805f088 a1=bf862874 a2=dbcff4 a3=bf861bec items=0 ppid=13399 pid=13408 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776389.002:12774): avc: denied { sys_ptrace } for pid=13408 comm="killall" capability=19 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=capability type=SYSCALL msg=audit(1163776389.002:12774): arch=40000003 syscall=195 success=yes exit=0 a0=805f088 a1=bf862874 a2=dbcff4 a3=bf861bec items=0 ppid=13399 pid=13408 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776389.006:12775): avc: denied { kill } for pid=13408 comm="killall" capability=5 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=capability type=SYSCALL msg=audit(1163776389.006:12775): arch=40000003 syscall=37 success=yes exit=0 a0=345b a1=f a2=0 a3=345b items=0 ppid=13399 pid=13408 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776391.938:12776): avc: denied { unlink } for pid=8303 comm="yum" name="blackjack" dev=dm-0 ino=10326957 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:games_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163776391.938:12776): arch=40000003 syscall=38 success=yes exit=0 a0=fb09ff8 a1=f99df40 a2=d2a040 a3=fb09ff8 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776391.990:12777): avc: denied { relabelto } for pid=8303 comm="yum" name="blackjack" dev=dm-0 ino=10331034 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:games_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163776391.990:12777): arch=40000003 syscall=227 success=yes exit=0 a0=f99df40 a1=a2f0d3 a2=fbbfa30 a3=22 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776391.990:12778): avc: denied { setattr } for pid=8303 comm="yum" name="blackjack" dev=dm-0 ino=10331034 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:games_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163776391.990:12778): arch=40000003 syscall=212 success=yes exit=0 a0=f99df40 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776392.402:12779): avc: denied { create } for pid=8303 comm="yum" name="glchess" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:lib_t:s0 tclass=dir type=SYSCALL msg=audit(1163776392.402:12779): arch=40000003 syscall=39 success=yes exit=0 a0=b50e4d8 a1=1c0 a2=d2a040 a3=b50e4d8 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776392.402:12780): avc: denied { relabelfrom } for pid=8303 comm="yum" name="glchess" dev=dm-0 ino=12343648 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:lib_t:s0 tclass=dir type=AVC msg=audit(1163776392.402:12780): avc: denied { relabelto } for pid=8303 comm="yum" name="glchess" dev=dm-0 ino=12343648 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=dir type=SYSCALL msg=audit(1163776392.402:12780): arch=40000003 syscall=227 success=yes exit=0 a0=b50e4d8 a1=a2f0d3 a2=fc50df8 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776392.402:12781): avc: denied { setattr } for pid=8303 comm="yum" name="glchess" dev=dm-0 ino=12343648 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=dir type=SYSCALL msg=audit(1163776392.402:12781): arch=40000003 syscall=212 success=yes exit=0 a0=b50e4d8 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776393.742:12782): avc: denied { read } for pid=13464 comm="firefox-bin" name=".gdmV8RYIT" dev=dm-0 ino=14469571 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163776393.742:12782): arch=40000003 syscall=33 success=yes exit=0 a0=bf800fcb a1=4 a2=da3a64 a3=bf800fcb items=0 ppid=1 pid=13464 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163776393.742:12783): avc: denied { getattr } for pid=13464 comm="firefox-bin" name=".gdmV8RYIT" dev=dm-0 ino=14469571 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163776393.742:12783): arch=40000003 syscall=197 success=yes exit=0 a0=4 a1=bf7fec1c a2=d94ff4 a3=9546140 items=0 ppid=1 pid=13464 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163776393.742:12783): path="/tmp/.gdmV8RYIT" type=AVC msg=audit(1163776406.931:12784): avc: denied { write } for pid=8303 comm="yum" name="games" dev=dm-0 ino=14436607 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:games_data_t:s0 tclass=dir type=AVC msg=audit(1163776406.931:12784): avc: denied { add_name } for pid=8303 comm="yum" name="glines.Large.scores;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:games_data_t:s0 tclass=dir type=AVC msg=audit(1163776406.931:12784): avc: denied { create } for pid=8303 comm="yum" name="glines.Large.scores;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:games_data_t:s0 tclass=file type=SYSCALL msg=audit(1163776406.931:12784): arch=40000003 syscall=5 success=yes exit=30 a0=fc58818 a1=8241 a2=1b6 a3=8241 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776406.971:12785): avc: denied { remove_name } for pid=8303 comm="yum" name="glines.Large.scores;455dcb57" dev=dm-0 ino=14438005 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:games_data_t:s0 tclass=dir type=AVC msg=audit(1163776406.971:12785): avc: denied { rename } for pid=8303 comm="yum" name="glines.Large.scores;455dcb57" dev=dm-0 ino=14438005 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:games_data_t:s0 tclass=file type=AVC msg=audit(1163776406.971:12785): avc: denied { unlink } for pid=8303 comm="yum" name="glines.Large.scores" dev=dm-0 ino=14436943 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:games_data_t:s0 tclass=file type=SYSCALL msg=audit(1163776406.971:12785): arch=40000003 syscall=38 success=yes exit=0 a0=fc58818 a1=fc588e8 a2=d2a040 a3=fc58818 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776406.975:12786): avc: denied { relabelfrom } for pid=8303 comm="yum" name="glines.Large.scores" dev=dm-0 ino=14438005 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:games_data_t:s0 tclass=file type=AVC msg=audit(1163776406.975:12786): avc: denied { relabelto } for pid=8303 comm="yum" name="glines.Large.scores" dev=dm-0 ino=14438005 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:games_data_t:s0 tclass=file type=SYSCALL msg=audit(1163776406.975:12786): arch=40000003 syscall=227 success=yes exit=0 a0=fc588e8 a1=a2f0d3 a2=fc5a588 a3=22 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776406.975:12787): avc: denied { setattr } for pid=8303 comm="yum" name="glines.Large.scores" dev=dm-0 ino=14438005 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:games_data_t:s0 tclass=file type=SYSCALL msg=audit(1163776406.975:12787): arch=40000003 syscall=212 success=yes exit=0 a0=fc588e8 a1=c a2=14 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776406.975:12788): avc: denied { unlink } for pid=8303 comm="yum" name="glines.Medium.scores" dev=dm-0 ino=14437124 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:games_data_t:s0 tclass=file type=SYSCALL msg=audit(1163776406.975:12788): arch=40000003 syscall=38 success=yes exit=0 a0=fc5a600 a1=fc5a588 a2=d2a040 a3=fc5a600 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776421.060:12789): avc: denied { create } for pid=13541 comm="scrollkeeper-up" name="553" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:var_lib_t:s0 tclass=file type=SYSCALL msg=audit(1163776421.060:12789): arch=40000003 syscall=5 success=yes exit=3 a0=92ac138 a1=241 a2=1b6 a3=920fd20 items=0 ppid=13540 pid=13541 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="scrollkeeper-up" exe="/usr/bin/scrollkeeper-update" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776421.064:12790): avc: denied { write } for pid=13541 comm="scrollkeeper-up" name="553" dev=dm-0 ino=14567911 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:var_lib_t:s0 tclass=file type=SYSCALL msg=audit(1163776421.064:12790): arch=40000003 syscall=4 success=yes exit=808 a0=3 a1=b7f76000 a2=328 a3=328 items=0 ppid=13540 pid=13541 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="scrollkeeper-up" exe="/usr/bin/scrollkeeper-update" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163776421.064:12790): path="/var/lib/scrollkeeper/TOC/553" type=AVC msg=audit(1163776421.124:12791): avc: denied { unlink } for pid=13541 comm="scrollkeeper-up" name="scrollkeeper_docs" dev=dm-0 ino=14567910 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:var_lib_t:s0 tclass=file type=SYSCALL msg=audit(1163776421.124:12791): arch=40000003 syscall=10 success=yes exit=0 a0=bfe62443 a1=1 a2=50c338 a3=bfe62663 items=0 ppid=13540 pid=13541 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="scrollkeeper-up" exe="/usr/bin/scrollkeeper-update" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776421.124:12792): avc: denied { rename } for pid=13541 comm="scrollkeeper-up" name="scrollkeeper_docs.tmp" dev=dm-0 ino=14568138 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:var_lib_t:s0 tclass=file type=SYSCALL msg=audit(1163776421.124:12792): arch=40000003 syscall=38 success=yes exit=0 a0=bfe62543 a1=bfe62443 a2=50c338 a3=bfe62663 items=0 ppid=13540 pid=13541 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="scrollkeeper-up" exe="/usr/bin/scrollkeeper-update" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776421.152:12793): avc: denied { append } for pid=13541 comm="scrollkeeper-up" name="scrollkeeper_docs" dev=dm-0 ino=14568138 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:var_lib_t:s0 tclass=file type=SYSCALL msg=audit(1163776421.152:12793): arch=40000003 syscall=5 success=yes exit=3 a0=bfe62168 a1=441 a2=1b6 a3=920fd20 items=0 ppid=13540 pid=13541 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="scrollkeeper-up" exe="/usr/bin/scrollkeeper-update" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776422.896:12794): avc: denied { create } for pid=13617 comm="gconftool-2" name=".testing.writeability" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1163776422.896:12794): arch=40000003 syscall=5 success=yes exit=3 a0=966e1a8 a1=41 a2=1c0 a3=966e1a8 items=0 ppid=13616 pid=13617 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="gconftool-2" exe="/usr/bin/gconftool-2" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776422.896:12795): avc: denied { unlink } for pid=13617 comm="gconftool-2" name=".testing.writeability" dev=dm-0 ino=9331998 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1163776422.896:12795): arch=40000003 syscall=10 success=yes exit=0 a0=966e1a8 a1=41 a2=412708 a3=966e1a8 items=0 ppid=13616 pid=13617 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="gconftool-2" exe="/usr/bin/gconftool-2" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776425.956:12796): avc: denied { ptrace } for pid=13619 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:setrans_t:s0-s0:c0.c1023 tclass=process type=SYSCALL msg=audit(1163776425.956:12796): arch=40000003 syscall=195 success=yes exit=0 a0=8a24088 a1=bfffa804 a2=3b1ff4 a3=bfff9b7c items=0 ppid=13617 pid=13619 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776425.956:12797): avc: denied { ptrace } for pid=13619 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:portmap_t:s0 tclass=process type=SYSCALL msg=audit(1163776425.956:12797): arch=40000003 syscall=195 success=yes exit=0 a0=8a24088 a1=bfffa804 a2=3b1ff4 a3=bfff9b7c items=0 ppid=13617 pid=13619 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776425.956:12798): avc: denied { ptrace } for pid=13619 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:rpcd_t:s0 tclass=process type=SYSCALL msg=audit(1163776425.956:12798): arch=40000003 syscall=195 success=yes exit=0 a0=8a24088 a1=bfffa804 a2=3b1ff4 a3=bfff9b7c items=0 ppid=13617 pid=13619 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776425.960:12799): avc: denied { ptrace } for pid=13619 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:xenstored_t:s0 tclass=process type=SYSCALL msg=audit(1163776425.960:12799): arch=40000003 syscall=195 success=yes exit=0 a0=8a24088 a1=bfffa804 a2=3b1ff4 a3=bfff9b7c items=0 ppid=13617 pid=13619 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776425.960:12800): avc: denied { ptrace } for pid=13619 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:xenconsoled_t:s0 tclass=process type=SYSCALL msg=audit(1163776425.960:12800): arch=40000003 syscall=195 success=yes exit=0 a0=8a24088 a1=bfffa804 a2=3b1ff4 a3=bfff9b7c items=0 ppid=13617 pid=13619 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776425.960:12801): avc: denied { ptrace } for pid=13619 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:fsdaemon_t:s0 tclass=process type=SYSCALL msg=audit(1163776425.960:12801): arch=40000003 syscall=195 success=yes exit=0 a0=8a24088 a1=bfffa804 a2=3b1ff4 a3=bfff9b7c items=0 ppid=13617 pid=13619 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776425.960:12802): avc: denied { ptrace } for pid=13619 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:getty_t:s0 tclass=process type=SYSCALL msg=audit(1163776425.960:12802): arch=40000003 syscall=195 success=yes exit=0 a0=8a24088 a1=bfffa804 a2=3b1ff4 a3=bfff9b7c items=0 ppid=13617 pid=13619 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776425.960:12803): avc: denied { ptrace } for pid=13619 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tclass=process type=SYSCALL msg=audit(1163776425.960:12803): arch=40000003 syscall=195 success=yes exit=0 a0=8a24088 a1=bfffa804 a2=3b1ff4 a3=bfff9b7c items=0 ppid=13617 pid=13619 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776426.020:12804): avc: denied { write } for pid=13617 comm="gconftool-2" name="%gconf-tree.xml.new" dev=dm-0 ino=9331998 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1163776426.020:12804): arch=40000003 syscall=4 success=yes exit=4096 a0=3 a1=b7fec000 a2=1000 a3=1000 items=0 ppid=13616 pid=13617 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="gconftool-2" exe="/usr/bin/gconftool-2" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163776426.020:12804): path="/etc/gconf/gconf.xml.defaults/%gconf-tree.xml.new" type=AVC msg=audit(1163776426.144:12805): avc: denied { rename } for pid=13617 comm="gconftool-2" name="%gconf-tree.xml.new" dev=dm-0 ino=9331998 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1163776426.144:12805): arch=40000003 syscall=38 success=yes exit=0 a0=b38d1c8 a1=b38b750 a2=122820 a3=0 items=0 ppid=13616 pid=13617 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="gconftool-2" exe="/usr/bin/gconftool-2" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776431.552:12806): avc: denied { write } for pid=13623 comm="cp" name="files" dev=dm-0 ino=9334527 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:file_context_t:s0 tclass=dir type=AVC msg=audit(1163776431.552:12806): avc: denied { add_name } for pid=13623 comm="cp" name="file_contexts.pre" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:file_context_t:s0 tclass=dir type=AVC msg=audit(1163776431.552:12806): avc: denied { create } for pid=13623 comm="cp" name="file_contexts.pre" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:file_context_t:s0 tclass=file type=SYSCALL msg=audit(1163776431.552:12806): arch=40000003 syscall=5 success=yes exit=4 a0=bfab7bd7 a1=8041 a2=81a4 a3=8041 items=0 ppid=13622 pid=13623 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="cp" exe="/bin/cp" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776431.572:12807): avc: denied { write } for pid=13623 comm="cp" name="file_contexts.pre" dev=dm-0 ino=9330913 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:file_context_t:s0 tclass=file type=SYSCALL msg=audit(1163776431.572:12807): arch=40000003 syscall=4 success=yes exit=4096 a0=4 a1=bfab4000 a2=1000 a3=1000 items=0 ppid=13622 pid=13623 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="cp" exe="/bin/cp" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163776431.572:12807): path="/etc/selinux/strict/contexts/files/file_contexts.pre" type=AVC msg=audit(1163776431.580:12808): avc: denied { relabelfrom } for pid=8303 comm="yum" name="strict" dev=dm-0 ino=9331930 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:selinux_config_t:s0 tclass=dir type=AVC msg=audit(1163776431.580:12808): avc: denied { relabelto } for pid=8303 comm="yum" name="strict" dev=dm-0 ino=9331930 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:selinux_config_t:s0 tclass=dir type=SYSCALL msg=audit(1163776431.580:12808): arch=40000003 syscall=227 success=yes exit=0 a0=f99e4c8 a1=a2f0d3 a2=faf3e68 a3=26 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776431.624:12809): avc: denied { setattr } for pid=8303 comm="yum" name="strict" dev=dm-0 ino=9331930 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:selinux_config_t:s0 tclass=dir type=SYSCALL msg=audit(1163776431.624:12809): arch=40000003 syscall=212 success=yes exit=0 a0=f99e4c8 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776431.624:12810): avc: denied { relabelfrom } for pid=8303 comm="yum" name="contexts" dev=dm-0 ino=9334400 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:default_context_t:s0 tclass=dir type=AVC msg=audit(1163776431.624:12810): avc: denied { relabelto } for pid=8303 comm="yum" name="contexts" dev=dm-0 ino=9334400 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:default_context_t:s0 tclass=dir type=SYSCALL msg=audit(1163776431.624:12810): arch=40000003 syscall=227 success=yes exit=0 a0=fc5a5b0 a1=a2f0d3 a2=faeaea8 a3=27 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776431.628:12811): avc: denied { setattr } for pid=8303 comm="yum" name="contexts" dev=dm-0 ino=9334400 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:default_context_t:s0 tclass=dir type=SYSCALL msg=audit(1163776431.628:12811): arch=40000003 syscall=212 success=yes exit=0 a0=fc5a5b0 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776431.628:12812): avc: denied { write } for pid=8303 comm="yum" name="contexts" dev=dm-0 ino=9334400 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:default_context_t:s0 tclass=dir type=AVC msg=audit(1163776431.628:12812): avc: denied { add_name } for pid=8303 comm="yum" name="customizable_types;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:default_context_t:s0 tclass=dir type=AVC msg=audit(1163776431.628:12812): avc: denied { create } for pid=8303 comm="yum" name="customizable_types;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:default_context_t:s0 tclass=file type=SYSCALL msg=audit(1163776431.628:12812): arch=40000003 syscall=5 success=yes exit=30 a0=fb96de0 a1=8241 a2=1b6 a3=8241 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776431.628:12813): avc: denied { write } for pid=8303 comm="yum" name="customizable_types;455dcb57" dev=dm-0 ino=9334567 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:default_context_t:s0 tclass=file type=SYSCALL msg=audit(1163776431.628:12813): arch=40000003 syscall=4 success=yes exit=233 a0=1e a1=b6dcb000 a2=e9 a3=fb96e20 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163776431.628:12813): path="/etc/selinux/strict/contexts/customizable_types;455dcb57" type=AVC msg=audit(1163776431.628:12814): avc: denied { remove_name } for pid=8303 comm="yum" name="customizable_types;455dcb57" dev=dm-0 ino=9334567 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:default_context_t:s0 tclass=dir type=AVC msg=audit(1163776431.628:12814): avc: denied { rename } for pid=8303 comm="yum" name="customizable_types;455dcb57" dev=dm-0 ino=9334567 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:default_context_t:s0 tclass=file type=AVC msg=audit(1163776431.628:12814): avc: denied { unlink } for pid=8303 comm="yum" name="customizable_types" dev=dm-0 ino=9334401 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:default_context_t:s0 tclass=file type=SYSCALL msg=audit(1163776431.628:12814): arch=40000003 syscall=38 success=yes exit=0 a0=fb96de0 a1=faa64f8 a2=d2a040 a3=fb96de0 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776431.628:12815): avc: denied { relabelfrom } for pid=8303 comm="yum" name="customizable_types" dev=dm-0 ino=9334567 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:default_context_t:s0 tclass=file type=AVC msg=audit(1163776431.628:12815): avc: denied { relabelto } for pid=8303 comm="yum" name="customizable_types" dev=dm-0 ino=9334567 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:default_context_t:s0 tclass=file type=SYSCALL msg=audit(1163776431.628:12815): arch=40000003 syscall=227 success=yes exit=0 a0=faa64f8 a1=a2f0d3 a2=faeaea8 a3=27 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776431.628:12816): avc: denied { setattr } for pid=8303 comm="yum" name="customizable_types" dev=dm-0 ino=9334567 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:default_context_t:s0 tclass=file type=SYSCALL msg=audit(1163776431.628:12816): arch=40000003 syscall=212 success=yes exit=0 a0=faa64f8 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776431.640:12817): avc: denied { relabelfrom } for pid=8303 comm="yum" name="files" dev=dm-0 ino=9334527 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:file_context_t:s0 tclass=dir type=AVC msg=audit(1163776431.640:12817): avc: denied { relabelto } for pid=8303 comm="yum" name="files" dev=dm-0 ino=9334527 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:file_context_t:s0 tclass=dir type=SYSCALL msg=audit(1163776431.640:12817): arch=40000003 syscall=227 success=yes exit=0 a0=fb96fa0 a1=a2f0d3 a2=fc5a5d8 a3=24 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776431.640:12818): avc: denied { setattr } for pid=8303 comm="yum" name="files" dev=dm-0 ino=9334527 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:file_context_t:s0 tclass=dir type=SYSCALL msg=audit(1163776431.640:12818): arch=40000003 syscall=212 success=yes exit=0 a0=fb96fa0 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776431.640:12819): avc: denied { remove_name } for pid=8303 comm="yum" name="media;455dcb57" dev=dm-0 ino=9334434 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:file_context_t:s0 tclass=dir type=AVC msg=audit(1163776431.640:12819): avc: denied { rename } for pid=8303 comm="yum" name="media;455dcb57" dev=dm-0 ino=9334434 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:file_context_t:s0 tclass=file type=AVC msg=audit(1163776431.640:12819): avc: denied { unlink } for pid=8303 comm="yum" name="media" dev=dm-0 ino=9334528 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:file_context_t:s0 tclass=file type=SYSCALL msg=audit(1163776431.640:12819): arch=40000003 syscall=38 success=yes exit=0 a0=f78a080 a1=fb96db0 a2=d2a040 a3=f78a080 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776431.640:12820): avc: denied { relabelfrom } for pid=8303 comm="yum" name="media" dev=dm-0 ino=9334434 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:file_context_t:s0 tclass=file type=AVC msg=audit(1163776431.640:12820): avc: denied { relabelto } for pid=8303 comm="yum" name="media" dev=dm-0 ino=9334434 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:file_context_t:s0 tclass=file type=SYSCALL msg=audit(1163776431.640:12820): arch=40000003 syscall=227 success=yes exit=0 a0=fb96db0 a1=a2f0d3 a2=fc5a5d8 a3=24 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776431.640:12821): avc: denied { setattr } for pid=8303 comm="yum" name="media" dev=dm-0 ino=9334434 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:file_context_t:s0 tclass=file type=SYSCALL msg=audit(1163776431.640:12821): arch=40000003 syscall=212 success=yes exit=0 a0=fb96db0 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776431.664:12822): avc: denied { relabelfrom } for pid=8303 comm="yum" name="active" dev=dm-0 ino=9334708 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:semanage_store_t:s0 tclass=dir type=AVC msg=audit(1163776431.664:12822): avc: denied { relabelto } for pid=8303 comm="yum" name="active" dev=dm-0 ino=9334708 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:semanage_store_t:s0 tclass=dir type=SYSCALL msg=audit(1163776431.664:12822): arch=40000003 syscall=227 success=yes exit=0 a0=f78a080 a1=a2f0d3 a2=cb51b80 a3=26 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776431.664:12823): avc: denied { setattr } for pid=8303 comm="yum" name="active" dev=dm-0 ino=9334708 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:semanage_store_t:s0 tclass=dir type=SYSCALL msg=audit(1163776431.664:12823): arch=40000003 syscall=212 success=yes exit=0 a0=f78a080 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776431.664:12824): avc: denied { write } for pid=8303 comm="yum" name="modules" dev=dm-0 ino=9334534 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:selinux_config_t:s0 tclass=dir type=AVC msg=audit(1163776431.664:12824): avc: denied { add_name } for pid=8303 comm="yum" name="semanage.read.LOCK;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:selinux_config_t:s0 tclass=dir type=AVC msg=audit(1163776431.664:12824): avc: denied { create } for pid=8303 comm="yum" name="semanage.read.LOCK;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:selinux_config_t:s0 tclass=file type=SYSCALL msg=audit(1163776431.664:12824): arch=40000003 syscall=5 success=yes exit=30 a0=fb91c18 a1=8241 a2=1b6 a3=8241 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776431.664:12825): avc: denied { remove_name } for pid=8303 comm="yum" name="semanage.read.LOCK;455dcb57" dev=dm-0 ino=9334533 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:selinux_config_t:s0 tclass=dir type=AVC msg=audit(1163776431.664:12825): avc: denied { rename } for pid=8303 comm="yum" name="semanage.read.LOCK;455dcb57" dev=dm-0 ino=9334533 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:selinux_config_t:s0 tclass=file type=AVC msg=audit(1163776431.664:12825): avc: denied { unlink } for pid=8303 comm="yum" name="semanage.read.LOCK" dev=dm-0 ino=9334536 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:semanage_read_lock_t:s0 tclass=file type=SYSCALL msg=audit(1163776431.664:12825): arch=40000003 syscall=38 success=yes exit=0 a0=fb91c18 a1=fb915c8 a2=d2a040 a3=fb91c18 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776431.668:12826): avc: denied { relabelfrom } for pid=8303 comm="yum" name="semanage.read.LOCK" dev=dm-0 ino=9334533 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:selinux_config_t:s0 tclass=file type=AVC msg=audit(1163776431.668:12826): avc: denied { relabelto } for pid=8303 comm="yum" name="semanage.read.LOCK" dev=dm-0 ino=9334533 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:semanage_read_lock_t:s0 tclass=file type=SYSCALL msg=audit(1163776431.668:12826): arch=40000003 syscall=227 success=yes exit=0 a0=fb915c8 a1=a2f0d3 a2=cb56428 a3=2a items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776431.668:12827): avc: denied { setattr } for pid=8303 comm="yum" name="semanage.read.LOCK" dev=dm-0 ino=9334533 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:semanage_read_lock_t:s0 tclass=file type=SYSCALL msg=audit(1163776431.668:12827): arch=40000003 syscall=212 success=yes exit=0 a0=fb915c8 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776431.668:12828): avc: denied { unlink } for pid=8303 comm="yum" name="semanage.trans.LOCK" dev=dm-0 ino=9334537 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:semanage_trans_lock_t:s0 tclass=file type=SYSCALL msg=audit(1163776431.668:12828): arch=40000003 syscall=38 success=yes exit=0 a0=fc75d08 a1=fb915c8 a2=d2a040 a3=fc75d08 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776431.676:12829): avc: denied { relabelto } for pid=8303 comm="yum" name="semanage.trans.LOCK" dev=dm-0 ino=9334536 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:semanage_trans_lock_t:s0 tclass=file type=SYSCALL msg=audit(1163776431.676:12829): arch=40000003 syscall=227 success=yes exit=0 a0=fb915c8 a1=a2f0d3 a2=fc75cd8 a3=2b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776431.676:12830): avc: denied { setattr } for pid=8303 comm="yum" name="semanage.trans.LOCK" dev=dm-0 ino=9334536 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:semanage_trans_lock_t:s0 tclass=file type=SYSCALL msg=audit(1163776431.676:12830): arch=40000003 syscall=212 success=yes exit=0 a0=fb915c8 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776431.688:12831): avc: denied { relabelfrom } for pid=8303 comm="yum" name="policy" dev=dm-0 ino=9334538 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:policy_config_t:s0 tclass=dir type=AVC msg=audit(1163776431.688:12831): avc: denied { relabelto } for pid=8303 comm="yum" name="policy" dev=dm-0 ino=9334538 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:policy_config_t:s0 tclass=dir type=SYSCALL msg=audit(1163776431.688:12831): arch=40000003 syscall=227 success=yes exit=0 a0=fc785f8 a1=a2f0d3 a2=fc785c8 a3=25 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776431.688:12832): avc: denied { setattr } for pid=8303 comm="yum" name="policy" dev=dm-0 ino=9334538 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:policy_config_t:s0 tclass=dir type=SYSCALL msg=audit(1163776431.688:12832): arch=40000003 syscall=212 success=yes exit=0 a0=fc785f8 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776431.688:12833): avc: denied { write } for pid=8303 comm="yum" name="setrans.conf;455dcb57" dev=dm-0 ino=9334537 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:selinux_config_t:s0 tclass=file type=SYSCALL msg=audit(1163776431.688:12833): arch=40000003 syscall=4 success=yes exit=598 a0=1e a1=b6dcb000 a2=256 a3=fc79e88 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163776431.688:12833): path="/etc/selinux/strict/setrans.conf;455dcb57" type=AVC msg=audit(1163776431.688:12834): avc: denied { unlink } for pid=8303 comm="yum" name="setrans.conf" dev=dm-0 ino=9334539 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:selinux_config_t:s0 tclass=file type=SYSCALL msg=audit(1163776431.688:12834): arch=40000003 syscall=38 success=yes exit=0 a0=fc785c8 a1=fc79e60 a2=d2a040 a3=fc785c8 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776431.688:12835): avc: denied { relabelto } for pid=8303 comm="yum" name="setrans.conf" dev=dm-0 ino=9334537 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:selinux_config_t:s0 tclass=file type=SYSCALL msg=audit(1163776431.688:12835): arch=40000003 syscall=227 success=yes exit=0 a0=fc79e60 a1=a2f0d3 a2=fc75ca8 a3=26 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776431.688:12836): avc: denied { setattr } for pid=8303 comm="yum" name="setrans.conf" dev=dm-0 ino=9334537 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:selinux_config_t:s0 tclass=file type=SYSCALL msg=audit(1163776431.688:12836): arch=40000003 syscall=212 success=yes exit=0 a0=fc79e60 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776432.620:12837): avc: denied { create } for pid=8303 comm="yum" name="include;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:usr_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163776432.620:12837): arch=40000003 syscall=83 success=yes exit=0 a0=fc5b370 a1=cb50098 a2=508a38 a3=602c items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776432.620:12838): avc: denied { rename } for pid=8303 comm="yum" name="include;455dcb57" dev=dm-0 ino=11982828 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:usr_t:s0 tclass=lnk_file type=AVC msg=audit(1163776432.620:12838): avc: denied { unlink } for pid=8303 comm="yum" name="include" dev=dm-0 ino=11982840 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163776432.620:12838): arch=40000003 syscall=38 success=yes exit=0 a0=cb50098 a1=fc7fb30 a2=d2a040 a3=cb50098 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776432.620:12839): avc: denied { relabelfrom } for pid=8303 comm="yum" name="include" dev=dm-0 ino=11982828 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:usr_t:s0 tclass=lnk_file type=AVC msg=audit(1163776432.620:12839): avc: denied { relabelto } for pid=8303 comm="yum" name="include" dev=dm-0 ino=11982828 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163776432.620:12839): arch=40000003 syscall=227 success=yes exit=0 a0=fc7fb30 a1=a2f0d3 a2=fc7fff0 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776432.620:12840): avc: denied { setattr } for pid=8303 comm="yum" name="include" dev=dm-0 ino=11982828 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163776432.620:12840): arch=40000003 syscall=198 success=yes exit=0 a0=fc7fb30 a1=0 a2=0 a3=a1f7554 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776437.513:12841): avc: denied { execute } for pid=13625 comm="sh" name="semodule" dev=dm-0 ino=10325888 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:semanage_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163776437.513:12841): arch=40000003 syscall=33 success=yes exit=0 a0=963cd40 a1=1 a2=11 a3=963cd40 items=0 ppid=13624 pid=13625 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="sh" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776437.513:12842): avc: denied { read } for pid=13625 comm="sh" name="semodule" dev=dm-0 ino=10325888 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:semanage_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163776437.513:12842): arch=40000003 syscall=33 success=yes exit=0 a0=963cd40 a1=4 a2=ffffffff a3=963cd40 items=0 ppid=13624 pid=13625 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="sh" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776437.513:12843): avc: denied { execute_no_trans } for pid=13626 comm="sh" name="semodule" dev=dm-0 ino=10325888 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:semanage_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163776437.513:12843): arch=40000003 syscall=11 success=yes exit=0 a0=963cd40 a1=963dcc8 a2=963f410 a3=9637b48 items=0 ppid=13625 pid=13626 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="semodule" exe="/usr/sbin/semodule" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163776437.513:12843): path="/usr/sbin/semodule" type=AVC msg=audit(1163776437.553:12844): avc: denied { execute } for pid=13626 comm="semodule" name="setfiles" dev=dm-0 ino=9984601 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:setfiles_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163776437.553:12844): arch=40000003 syscall=33 success=yes exit=0 a0=c75905 a1=1 a2=c7b21c a3=9988f00 items=0 ppid=13625 pid=13626 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="semodule" exe="/usr/sbin/semodule" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776437.605:12845): avc: denied { read write search } for pid=13626 comm="semodule" name="active" dev=dm-0 ino=9334708 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:semanage_store_t:s0 tclass=dir type=SYSCALL msg=audit(1163776437.605:12845): arch=40000003 syscall=33 success=yes exit=0 a0=9989578 a1=7 a2=c7b21c a3=9989578 items=0 ppid=13625 pid=13626 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="semodule" exe="/usr/sbin/semodule" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776437.625:12846): avc: denied { read write search } for pid=13626 comm="semodule" name="modules" dev=dm-0 ino=9334945 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:semanage_store_t:s0 tclass=dir type=SYSCALL msg=audit(1163776437.625:12846): arch=40000003 syscall=33 success=yes exit=0 a0=99895a0 a1=7 a2=c7b21c a3=99895a0 items=0 ppid=13625 pid=13626 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="semodule" exe="/usr/sbin/semodule" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776437.625:12847): avc: denied { read write } for pid=13626 comm="semodule" name="semanage.read.LOCK" dev=dm-0 ino=9334533 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:semanage_read_lock_t:s0 tclass=file type=SYSCALL msg=audit(1163776437.625:12847): arch=40000003 syscall=33 success=yes exit=0 a0=9989500 a1=6 a2=c7b21c a3=9989500 items=0 ppid=13625 pid=13626 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="semodule" exe="/usr/sbin/semodule" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776437.625:12848): avc: denied { read } for pid=13626 comm="semodule" name="semanage.trans.LOCK" dev=dm-0 ino=9334536 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:semanage_trans_lock_t:s0 tclass=file type=SYSCALL msg=audit(1163776437.625:12848): arch=40000003 syscall=5 success=yes exit=3 a0=9989020 a1=0 a2=24d120 a3=9988dd0 items=0 ppid=13625 pid=13626 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="semodule" exe="/usr/sbin/semodule" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776437.625:12849): avc: denied { lock } for pid=13626 comm="semodule" name="semanage.trans.LOCK" dev=dm-0 ino=9334536 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:semanage_trans_lock_t:s0 tclass=file type=SYSCALL msg=audit(1163776437.625:12849): arch=40000003 syscall=143 success=yes exit=0 a0=3 a1=6 a2=c7b21c a3=5 items=0 ppid=13625 pid=13626 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="semodule" exe="/usr/sbin/semodule" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163776437.625:12849): path="/etc/selinux/strict/modules/semanage.trans.LOCK" type=AVC msg=audit(1163776437.625:12850): avc: denied { create } for pid=13626 comm="semodule" name="tmp" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:selinux_config_t:s0 tclass=dir type=SYSCALL msg=audit(1163776437.625:12850): arch=40000003 syscall=39 success=yes exit=0 a0=998de60 a1=1c0 a2=c7b21c a3=998de60 items=0 ppid=13625 pid=13626 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="semodule" exe="/usr/sbin/semodule" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776437.637:12851): avc: denied { read } for pid=13626 comm="semodule" name="base.linked" dev=dm-0 ino=9334715 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:semanage_store_t:s0 tclass=file type=SYSCALL msg=audit(1163776437.637:12851): arch=40000003 syscall=5 success=yes exit=4 a0=bfe11248 a1=0 a2=1 a3=81a4 items=0 ppid=13625 pid=13626 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="semodule" exe="/usr/sbin/semodule" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776437.637:12852): avc: denied { write } for pid=13626 comm="semodule" name="tmp" dev=dm-0 ino=9395239 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:selinux_config_t:s0 tclass=dir type=AVC msg=audit(1163776437.637:12852): avc: denied { add_name } for pid=13626 comm="semodule" name="base.linked.tmp" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:selinux_config_t:s0 tclass=dir type=SYSCALL msg=audit(1163776437.637:12852): arch=40000003 syscall=5 success=yes exit=5 a0=bfe0f198 a1=241 a2=81a4 a3=81a4 items=0 ppid=13625 pid=13626 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="semodule" exe="/usr/sbin/semodule" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776437.941:12853): avc: denied { remove_name } for pid=13626 comm="semodule" name="base.linked.tmp" dev=dm-0 ino=9395240 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:selinux_config_t:s0 tclass=dir type=SYSCALL msg=audit(1163776437.941:12853): arch=40000003 syscall=38 success=yes exit=0 a0=bfe0f198 a1=bfe10248 a2=c7b21c a3=0 items=0 ppid=13625 pid=13626 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="semodule" exe="/usr/sbin/semodule" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776446.341:12854): avc: denied { read } for pid=13628 comm="gnome-backgroun" name=".gdmV8RYIT" dev=dm-0 ino=14469571 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163776446.341:12854): arch=40000003 syscall=33 success=yes exit=0 a0=bfdbde42 a1=4 a2=da3a64 a3=bfdbde42 items=0 ppid=1 pid=13628 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-backgroun" exe="/usr/bin/gnome-background-properties" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776446.349:12855): avc: denied { read } for pid=13628 comm="gnome-backgroun" name=".ICEauthority" dev=dm-0 ino=6574784 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:staff_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163776446.349:12855): arch=40000003 syscall=33 success=yes exit=0 a0=9f23cd8 a1=4 a2=df7770 a3=9f23cd8 items=0 ppid=1 pid=13628 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-backgroun" exe="/usr/bin/gnome-background-properties" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776448.069:12856): avc: denied { lock } for pid=13626 comm="semodule" name="semanage.read.LOCK" dev=dm-0 ino=9334533 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:semanage_read_lock_t:s0 tclass=file type=SYSCALL msg=audit(1163776448.069:12856): arch=40000003 syscall=143 success=yes exit=0 a0=4 a1=6 a2=c7b21c a3=5 items=0 ppid=13625 pid=13626 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="semodule" exe="/usr/sbin/semodule" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163776448.069:12856): path="/etc/selinux/strict/modules/semanage.read.LOCK" type=AVC msg=audit(1163776448.089:12857): avc: denied { remove_name } for pid=13626 comm="semodule" name="base.linked" dev=dm-0 ino=9334718 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:semanage_store_t:s0 tclass=dir type=AVC msg=audit(1163776448.089:12857): avc: denied { unlink } for pid=13626 comm="semodule" name="base.linked" dev=dm-0 ino=9334718 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:semanage_store_t:s0 tclass=file type=SYSCALL msg=audit(1163776448.089:12857): arch=40000003 syscall=10 success=yes exit=0 a0=bfe12099 a1=0 a2=24bff4 a3=bfe12099 items=0 ppid=13625 pid=13626 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="semodule" exe="/usr/sbin/semodule" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776448.497:12858): avc: denied { rmdir } for pid=13626 comm="semodule" name="modules" dev=dm-0 ino=9334726 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:semanage_store_t:s0 tclass=dir type=SYSCALL msg=audit(1163776448.497:12858): arch=40000003 syscall=40 success=yes exit=0 a0=bfe12099 a1=b7fa4688 a2=24bff4 a3=bfe12099 items=0 ppid=13625 pid=13626 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="semodule" exe="/usr/sbin/semodule" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776448.513:12859): avc: denied { rename } for pid=13626 comm="semodule" name="active" dev=dm-0 ino=9334708 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:semanage_store_t:s0 tclass=dir type=SYSCALL msg=audit(1163776448.513:12859): arch=40000003 syscall=38 success=yes exit=0 a0=9989578 a1=998d9d8 a2=c7b21c a3=bfe12248 items=0 ppid=13625 pid=13626 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="semodule" exe="/usr/sbin/semodule" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776448.513:12860): avc: denied { rename } for pid=13626 comm="semodule" name="tmp" dev=dm-0 ino=9395239 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:selinux_config_t:s0 tclass=dir type=SYSCALL msg=audit(1163776448.513:12860): arch=40000003 syscall=38 success=yes exit=0 a0=998de60 a1=9989578 a2=c7b21c a3=bfe12248 items=0 ppid=13625 pid=13626 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="semodule" exe="/usr/sbin/semodule" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776448.513:12861): avc: denied { write } for pid=13626 comm="semodule" name="policy" dev=dm-0 ino=9334538 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:policy_config_t:s0 tclass=dir type=AVC msg=audit(1163776448.513:12861): avc: denied { add_name } for pid=13626 comm="semodule" name="policy.21.tmp" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:policy_config_t:s0 tclass=dir type=AVC msg=audit(1163776448.513:12861): avc: denied { create } for pid=13626 comm="semodule" name="policy.21.tmp" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:policy_config_t:s0 tclass=file type=SYSCALL msg=audit(1163776448.513:12861): arch=40000003 syscall=5 success=yes exit=6 a0=bfe0b058 a1=241 a2=1a4 a3=1a4 items=0 ppid=13625 pid=13626 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="semodule" exe="/usr/sbin/semodule" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776448.521:12862): avc: denied { write } for pid=13626 comm="semodule" name="policy.21.tmp" dev=dm-0 ino=9331805 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:policy_config_t:s0 tclass=file type=SYSCALL msg=audit(1163776448.521:12862): arch=40000003 syscall=4 success=yes exit=4192 a0=6 a1=bfe09ff8 a2=1060 a3=1060 items=0 ppid=13625 pid=13626 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="semodule" exe="/usr/sbin/semodule" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163776448.521:12862): path="/etc/selinux/strict/policy/policy.21.tmp" type=AVC msg=audit(1163776448.537:12863): avc: denied { remove_name } for pid=13626 comm="semodule" name="policy.21.tmp" dev=dm-0 ino=9331805 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:policy_config_t:s0 tclass=dir type=AVC msg=audit(1163776448.537:12863): avc: denied { rename } for pid=13626 comm="semodule" name="policy.21.tmp" dev=dm-0 ino=9331805 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:policy_config_t:s0 tclass=file type=AVC msg=audit(1163776448.537:12863): avc: denied { unlink } for pid=13626 comm="semodule" name="policy.21" dev=dm-0 ino=9330752 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:policy_config_t:s0 tclass=file type=SYSCALL msg=audit(1163776448.537:12863): arch=40000003 syscall=38 success=yes exit=0 a0=bfe0b058 a1=bfe0e198 a2=c7b21c a3=0 items=0 ppid=13625 pid=13626 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="semodule" exe="/usr/sbin/semodule" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776448.593:12864): avc: denied { unlink } for pid=13626 comm="semodule" name="homedir_template" dev=dm-0 ino=9331333 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:file_context_t:s0 tclass=file type=SYSCALL msg=audit(1163776448.593:12864): arch=40000003 syscall=38 success=yes exit=0 a0=bfe0b058 a1=bfe0f198 a2=c7b21c a3=0 items=0 ppid=13625 pid=13626 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="semodule" exe="/usr/sbin/semodule" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776448.593:12865): avc: denied { unlink } for pid=13626 comm="semodule" name="seusers" dev=dm-0 ino=9334535 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:selinux_config_t:s0 tclass=file type=SYSCALL msg=audit(1163776448.593:12865): arch=40000003 syscall=38 success=yes exit=0 a0=bfe0b058 a1=bfe0d198 a2=c7b21c a3=0 items=0 ppid=13625 pid=13626 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="semodule" exe="/usr/sbin/semodule" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776448.665:12866): avc: denied { unlink } for pid=13626 comm="semodule" name="netfilter_contexts" dev=dm-0 ino=9334540 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:default_context_t:s0 tclass=file type=SYSCALL msg=audit(1163776448.665:12866): arch=40000003 syscall=38 success=yes exit=0 a0=bfe0b058 a1=bfe0c198 a2=c7b21c a3=0 items=0 ppid=13625 pid=13626 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="semodule" exe="/usr/sbin/semodule" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776448.749:12867): avc: denied { execute } for pid=13658 comm="semodule" name="load_policy" dev=dm-0 ino=10325048 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:load_policy_exec_t:s0 tclass=file type=AVC msg=audit(1163776448.749:12867): avc: denied { execute_no_trans } for pid=13658 comm="semodule" name="load_policy" dev=dm-0 ino=10325048 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:load_policy_exec_t:s0 tclass=file type=AVC msg=audit(1163776448.749:12867): avc: denied { read } for pid=13658 comm="semodule" name="load_policy" dev=dm-0 ino=10325048 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:load_policy_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163776448.749:12867): arch=40000003 syscall=11 success=yes exit=0 a0=9988f10 a1=dba7c68 a2=0 a3=0 items=0 ppid=13626 pid=13658 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="load_policy" exe="/usr/sbin/load_policy" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163776448.749:12867): path="/usr/sbin/load_policy" type=AVC_PATH msg=audit(1163776448.749:12867): path="/usr/sbin/load_policy" type=AVC msg=audit(1163776448.829:12868): avc: denied { read } for pid=13658 comm="load_policy" name="policy.21" dev=dm-0 ino=9331805 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:policy_config_t:s0 tclass=file type=SYSCALL msg=audit(1163776448.829:12868): arch=40000003 syscall=5 success=yes exit=3 a0=bfb09148 a1=8000 a2=0 a3=8000 items=0 ppid=13626 pid=13658 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="load_policy" exe="/usr/sbin/load_policy" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776448.949:12869): avc: denied { load_policy } for pid=13658 comm="load_policy" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:security_t:s0 tclass=security type=AVC msg=audit(1163776449.073:12870): avc: denied { read } for pid=13663 comm="gnome_segv2" name=".gdmV8RYIT" dev=dm-0 ino=14469571 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163776449.073:12870): arch=40000003 syscall=33 success=yes exit=0 a0=bfe4de4e a1=4 a2=843a64 a3=bfe4de4e items=0 ppid=13662 pid=13663 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome_segv2" exe="/usr/libexec/gnome_segv2" subj=staff_u:staff_r:staff_t:s0 key=(null) type=MAC_POLICY_LOAD msg=audit(1163776448.949:12869): policy loaded auid=500 type=AVC msg=audit(1163776449.089:12871): avc: denied { ptrace } for pid=3367 comm="dbus-daemon" scontext=staff_u:staff_r:staff_dbusd_t:s0 tcontext=staff_u:staff_r:staff_dbusd_t:s0 tclass=process type=SYSCALL msg=audit(1163776449.089:12871): arch=40000003 syscall=85 success=yes exit=35 a0=a45fce a1=b7fd1b58 a2=fff a3=b7fd4eba items=0 ppid=1 pid=3367 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="dbus-daemon" exe="/bin/dbus-daemon" subj=staff_u:staff_r:staff_dbusd_t:s0 key=(null) type=SYSCALL msg=audit(1163776448.949:12869): arch=40000003 syscall=4 success=yes exit=2109187 a0=4 a1=b7da3000 a2=202f03 a3=bfb08078 items=0 ppid=13626 pid=13658 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="load_policy" exe="/usr/sbin/load_policy" subj=staff_u:staff_r:staff_t:s0 key=(null) type=USER_AVC msg=audit(1163776449.097:12872): user pid=8554 uid=0 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: received policyload notice (seqno=2) : exe="/bin/dbus-daemon" (sauid=0, hostname=?, addr=?, terminal=?)' type=AVC msg=audit(1163776449.109:12873): avc: denied { getattr } for pid=6659 comm="dbus-daemon" name="/" dev=dm-0 ino=2 scontext=staff_u:staff_r:staff_dbusd_t:s0 tcontext=system_u:object_r:fs_t:s0 tclass=filesystem type=AVC msg=audit(1163776449.109:12874): avc: denied { execute } for pid=13665 comm="semodule" name="setfiles" dev=dm-0 ino=9984601 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:setfiles_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163776449.109:12873): arch=40000003 syscall=100 success=yes exit=0 a0=13 a1=bfcd50ac a2=c4eff4 a3=ffffffb8 items=0 ppid=1 pid=6659 auid=500 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) comm="dbus-daemon" exe="/bin/dbus-daemon" subj=staff_u:staff_r:staff_dbusd_t:s0 key=(null) type=AVC msg=audit(1163776449.109:12874): avc: denied { execute_no_trans } for pid=13665 comm="semodule" name="setfiles" dev=dm-0 ino=9984601 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:setfiles_exec_t:s0 tclass=file type=AVC msg=audit(1163776449.109:12874): avc: denied { read } for pid=13665 comm="semodule" name="setfiles" dev=dm-0 ino=9984601 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:setfiles_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163776449.109:12874): arch=40000003 syscall=11 success=yes exit=0 a0=9988f40 a1=dbe0260 a2=0 a3=0 items=0 ppid=13626 pid=13665 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="setfiles" exe="/sbin/setfiles" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163776449.109:12874): path="/sbin/setfiles" type=AVC_PATH msg=audit(1163776449.109:12874): path="/sbin/setfiles" type=AVC msg=audit(1163776449.357:12875): avc: denied { read } for pid=13665 comm="setfiles" name="policy.21" dev=dm-0 ino=9331805 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:policy_config_t:s0 tclass=file type=SYSCALL msg=audit(1163776449.357:12875): arch=40000003 syscall=5 success=yes exit=3 a0=bf81af97 a1=8000 a2=1b6 a3=8cad3e0 items=0 ppid=13626 pid=13665 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="setfiles" exe="/sbin/setfiles" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776449.689:12876): avc: denied { lock } for pid=13626 comm="semodule" name="semanage.read.LOCK" dev=dm-0 ino=9334533 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:semanage_read_lock_t:s0 tclass=file type=SYSCALL msg=audit(1163776449.689:12876): arch=40000003 syscall=143 success=yes exit=0 a0=4 a1=8 a2=c7b21c a3=9988dd0 items=0 ppid=13625 pid=13626 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="semodule" exe="/usr/sbin/semodule" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163776449.689:12876): path="/etc/selinux/strict/modules/semanage.read.LOCK" type=AVC msg=audit(1163776449.689:12877): avc: denied { search } for pid=8554 comm="dbus-daemon" name="root" dev=dm-0 ino=13127137 scontext=staff_u:staff_r:staff_dbusd_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1163776449.689:12878): avc: denied { search } for pid=3366 comm="dbus-daemon" name="kmacmill" dev=dm-0 ino=6547202 scontext=staff_u:staff_r:staff_dbusd_t:s0 tcontext=staff_u:object_r:staff_home_dir_t:s0 tclass=dir type=AVC msg=audit(1163776449.689:12878): avc: denied { search } for pid=3366 comm="dbus-daemon" name=".local" dev=dm-0 ino=6815703 scontext=staff_u:staff_r:staff_dbusd_t:s0 tcontext=staff_u:object_r:staff_home_t:s0 tclass=dir type=SYSCALL msg=audit(1163776449.689:12878): arch=40000003 syscall=5 success=no exit=-2 a0=87ef658 a1=18800 a2=0 a3=bfaf9f38 items=0 ppid=1 pid=3366 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="dbus-daemon" exe="/bin/dbus-daemon" subj=staff_u:staff_r:staff_dbusd_t:s0 key=(null) type=SYSCALL msg=audit(1163776449.689:12877): arch=40000003 syscall=5 success=no exit=-2 a0=9af01c0 a1=18800 a2=39e1d8 a3=bfcccb98 items=0 ppid=1 pid=8554 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="dbus-daemon" exe="/bin/dbus-daemon" subj=staff_u:staff_r:staff_dbusd_t:s0 key=(null) type=AVC msg=audit(1163776450.389:12879): avc: denied { read } for pid=13676 comm="genhomedircon" name="semanage.read.LOCK" dev=dm-0 ino=9334533 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:semanage_read_lock_t:s0 tclass=file type=SYSCALL msg=audit(1163776450.389:12879): arch=40000003 syscall=33 success=yes exit=0 a0=8952d10 a1=4 a2=c7b21c a3=8952d10 items=0 ppid=13626 pid=13676 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="genhomedircon" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776450.389:12880): avc: denied { write } for pid=13676 comm="genhomedircon" name="modules" dev=dm-0 ino=9395255 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:selinux_config_t:s0 tclass=dir type=SYSCALL msg=audit(1163776450.389:12880): arch=40000003 syscall=33 success=yes exit=0 a0=8951598 a1=7 a2=c7b21c a3=8952d10 items=0 ppid=13626 pid=13676 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="genhomedircon" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776450.465:12881): avc: denied { write } for pid=13676 comm="genhomedircon" name="file_contexts.homedirs" dev=dm-0 ino=9334712 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:file_context_t:s0 tclass=file type=SYSCALL msg=audit(1163776450.465:12881): arch=40000003 syscall=5 success=yes exit=3 a0=8966508 a1=8241 a2=1b6 a3=8966548 items=0 ppid=13626 pid=13676 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="genhomedircon" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776450.701:12882): avc: denied { lock } for pid=13626 comm="semodule" name="semanage.trans.LOCK" dev=dm-0 ino=9334536 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:semanage_trans_lock_t:s0 tclass=file type=SYSCALL msg=audit(1163776450.701:12882): arch=40000003 syscall=143 success=yes exit=0 a0=3 a1=8 a2=c7b21c a3=9988dd0 items=0 ppid=13625 pid=13626 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="semodule" exe="/usr/sbin/semodule" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163776450.701:12882): path="/etc/selinux/strict/modules/semanage.trans.LOCK" type=AVC msg=audit(1163776451.141:12883): avc: denied { write } for pid=13713 comm="mktemp" name="files" dev=dm-0 ino=9334527 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:file_context_t:s0 tclass=dir type=AVC msg=audit(1163776451.141:12883): avc: denied { add_name } for pid=13713 comm="mktemp" name="file_contexts.ProyZ13713" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:file_context_t:s0 tclass=dir type=AVC msg=audit(1163776451.141:12883): avc: denied { create } for pid=13713 comm="mktemp" name="file_contexts.ProyZ13713" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:file_context_t:s0 tclass=file type=SYSCALL msg=audit(1163776451.141:12883): arch=40000003 syscall=5 success=yes exit=3 a0=8bc8008 a1=c2 a2=180 a3=8bc8008 items=0 ppid=13695 pid=13713 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="mktemp" exe="/bin/mktemp" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776451.229:12884): avc: denied { write } for pid=13716 comm="fixfiles" name="file_contexts.pre.rVudp13714" dev=dm-0 ino=9334541 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:file_context_t:s0 tclass=file type=SYSCALL msg=audit(1163776451.229:12884): arch=40000003 syscall=5 success=yes exit=3 a0=95f59a8 a1=8241 a2=1b6 a3=8241 items=0 ppid=13695 pid=13716 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="fixfiles" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776451.357:12885): avc: denied { execute } for pid=13732 comm="fixfiles" name="restorecon" dev=dm-0 ino=9984525 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:restorecon_exec_t:s0 tclass=file type=AVC msg=audit(1163776451.357:12885): avc: denied { execute_no_trans } for pid=13732 comm="fixfiles" name="restorecon" dev=dm-0 ino=9984525 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:restorecon_exec_t:s0 tclass=file type=AVC msg=audit(1163776451.357:12885): avc: denied { read } for pid=13732 comm="fixfiles" name="restorecon" dev=dm-0 ino=9984525 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:restorecon_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163776451.357:12885): arch=40000003 syscall=11 success=yes exit=0 a0=95f5910 a1=95f5b88 a2=95ea7a0 a3=95f5808 items=0 ppid=13695 pid=13732 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="restorecon" exe="/sbin/restorecon" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163776451.357:12885): path="/sbin/restorecon" type=AVC_PATH msg=audit(1163776451.357:12885): path="/sbin/restorecon" type=AVC msg=audit(1163776451.449:12886): avc: denied { append } for pid=13738 comm="fixfiles" name="file_contexts.ProyZ13713" dev=dm-0 ino=9334540 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:file_context_t:s0 tclass=file type=SYSCALL msg=audit(1163776451.449:12886): arch=40000003 syscall=5 success=yes exit=3 a0=95f5e38 a1=8441 a2=1b6 a3=8441 items=0 ppid=13730 pid=13738 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="fixfiles" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=USER_AVC msg=audit(1163776459.950:12887): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManagerInfo member=UserInterfaceActivated dest=org.freedesktop.DBus spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163776461.782:12888): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.VPNConnections member=deactivateVPNConnection dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163776461.782:12889): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManagerInfo member=UserInterfaceActivated dest=org.freedesktop.DBus spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=AVC msg=audit(1163776461.782:12890): avc: denied { net_admin } for pid=6687 comm="NetworkManager" capability=12 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=capability type=SYSCALL msg=audit(1163776461.782:12890): arch=40000003 syscall=102 success=yes exit=32 a0=10 a1=bfaf3350 a2=cd036c a3=0 items=0 ppid=1 pid=6687 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="NetworkManager" exe="/usr/sbin/NetworkManager" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776461.806:12891): avc: denied { execute } for pid=13819 comm="NetworkManager" name="ip" dev=dm-0 ino=9984563 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:ifconfig_exec_t:s0 tclass=file type=AVC msg=audit(1163776461.806:12891): avc: denied { execute_no_trans } for pid=13819 comm="NetworkManager" name="ip" dev=dm-0 ino=9984563 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:ifconfig_exec_t:s0 tclass=file type=AVC msg=audit(1163776461.806:12891): avc: denied { read } for pid=13819 comm="NetworkManager" name="ip" dev=dm-0 ino=9984563 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:ifconfig_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163776461.806:12891): arch=40000003 syscall=11 success=yes exit=0 a0=84fe3a8 a1=8502440 a2=bfaf4160 a3=400 items=0 ppid=6687 pid=13819 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="ip" exe="/sbin/ip" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163776461.806:12891): path="/sbin/ip" type=AVC_PATH msg=audit(1163776461.806:12891): path="/sbin/ip" type=AVC msg=audit(1163776461.854:12892): avc: denied { write } for pid=6687 comm="NetworkManager" name="etc" dev=dm-0 ino=9329761 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=dir type=AVC msg=audit(1163776461.854:12892): avc: denied { add_name } for pid=6687 comm="NetworkManager" name="resolv.conf.tmp" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=dir type=AVC msg=audit(1163776461.854:12892): avc: denied { create } for pid=6687 comm="NetworkManager" name="resolv.conf.tmp" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1163776461.854:12892): arch=40000003 syscall=5 success=yes exit=14 a0=80892c8 a1=241 a2=1b6 a3=8503678 items=0 ppid=1 pid=6687 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="NetworkManager" exe="/usr/sbin/NetworkManager" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776461.854:12893): avc: denied { write } for pid=6687 comm="NetworkManager" name="resolv.conf.tmp" dev=dm-0 ino=9334568 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1163776461.854:12893): arch=40000003 syscall=4 success=yes exit=125 a0=e a1=b7fa1000 a2=7d a3=7d items=0 ppid=1 pid=6687 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="NetworkManager" exe="/usr/sbin/NetworkManager" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163776461.854:12893): path="/etc/resolv.conf.tmp" type=AVC msg=audit(1163776461.854:12894): avc: denied { remove_name } for pid=6687 comm="NetworkManager" name="resolv.conf.tmp" dev=dm-0 ino=9334568 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=dir type=AVC msg=audit(1163776461.854:12894): avc: denied { rename } for pid=6687 comm="NetworkManager" name="resolv.conf.tmp" dev=dm-0 ino=9334568 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:etc_t:s0 tclass=file type=AVC msg=audit(1163776461.854:12894): avc: denied { unlink } for pid=6687 comm="NetworkManager" name="resolv.conf" dev=dm-0 ino=9330239 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:net_conf_t:s0 tclass=file type=SYSCALL msg=audit(1163776461.854:12894): arch=40000003 syscall=38 success=yes exit=0 a0=80892c8 a1=8089313 a2=8094374 a3=808930e items=0 ppid=1 pid=6687 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="NetworkManager" exe="/usr/sbin/NetworkManager" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776461.970:12895): avc: denied { relabelfrom } for pid=12189 comm="restorecond" name="resolv.conf" dev=dm-0 ino=9334568 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:etc_t:s0 tclass=file type=AVC msg=audit(1163776461.970:12895): avc: denied { relabelto } for pid=12189 comm="restorecond" name="resolv.conf" dev=dm-0 ino=9334568 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:net_conf_t:s0 tclass=file type=SYSCALL msg=audit(1163776461.970:12895): arch=40000003 syscall=228 success=yes exit=0 a0=4 a1=ba70d3 a2=8385568 a3=20 items=0 ppid=1 pid=12189 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="restorecond" exe="/usr/sbin/restorecond" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776463.010:12896): avc: denied { create } for pid=6687 comm="NetworkManager" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=packet_socket type=AVC msg=audit(1163776463.010:12896): avc: denied { net_raw } for pid=6687 comm="NetworkManager" capability=13 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=capability type=SYSCALL msg=audit(1163776463.010:12896): arch=40000003 syscall=102 success=yes exit=14 a0=1 a1=bfaf32f0 a2=84fed00 a3=2 items=0 ppid=1 pid=6687 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="NetworkManager" exe="/usr/sbin/NetworkManager" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776463.010:12897): avc: denied { ioctl } for pid=6687 comm="NetworkManager" name="[146272]" dev=sockfs ino=146272 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=packet_socket type=SYSCALL msg=audit(1163776463.010:12897): arch=40000003 syscall=54 success=yes exit=0 a0=e a1=890b a2=bfaf33a4 a3=84fed00 items=0 ppid=1 pid=6687 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="NetworkManager" exe="/usr/sbin/NetworkManager" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163776463.010:12897): path="socket:[146272]" type=USER_AVC msg=audit(1163776463.022:12898): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager.VPNConnections member=VPNConnectionStateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163776463.022:12899): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.vpnc member=stopConnection dest=org.freedesktop.NetworkManager.vpnc spid=6687 tpid=8135 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163776463.022:12900): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager.vpnc member=StateChange dest=org.freedesktop.DBus spid=8135 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163776463.022:12901): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager.vpnc member=StateChange dest=org.freedesktop.DBus spid=8135 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163776463.022:12902): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.6 spid=8135 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=AVC msg=audit(1163776463.050:12903): avc: denied { read } for pid=11049 comm="udevd" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=netlink_kobject_uevent_socket type=SYSCALL msg=audit(1163776463.050:12903): arch=40000003 syscall=102 success=yes exit=101 a0=a a1=bfedb480 a2=791234 a3=0 items=0 ppid=1 pid=11049 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="udevd" exe="/sbin/udevd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776463.050:12904): avc: denied { write } for pid=11049 comm="udevd" name="uevent_seqnum" dev=tmpfs ino=1522 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:udev_tbl_t:s0 tclass=file type=SYSCALL msg=audit(1163776463.050:12904): arch=40000003 syscall=5 success=yes exit=9 a0=bfee5668 a1=8241 a2=1a4 a3=8241 items=0 ppid=1 pid=11049 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="udevd" exe="/sbin/udevd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776463.050:12905): avc: denied { write } for pid=11049 comm="udevd" name=".udev" dev=tmpfs ino=1521 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:device_t:s0 tclass=dir type=AVC msg=audit(1163776463.050:12905): avc: denied { remove_name } for pid=11049 comm="udevd" name="failed" dev=tmpfs ino=3876 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:device_t:s0 tclass=dir type=AVC msg=audit(1163776463.050:12905): avc: denied { rmdir } for pid=11049 comm="udevd" name="failed" dev=tmpfs ino=3876 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:device_t:s0 tclass=dir type=SYSCALL msg=audit(1163776463.050:12905): arch=40000003 syscall=40 success=no exit=-39 a0=bfedae88 a1=2f2f2f2f a2=791234 a3=bfedae92 items=0 ppid=1 pid=11049 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="udevd" exe="/sbin/udevd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776463.050:12906): avc: denied { add_name } for pid=11049 comm="udevd" name="queue" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:device_t:s0 tclass=dir type=AVC msg=audit(1163776463.050:12906): avc: denied { create } for pid=11049 comm="udevd" name="queue" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:device_t:s0 tclass=dir type=SYSCALL msg=audit(1163776463.050:12906): arch=40000003 syscall=39 success=yes exit=0 a0=bfedae8c a1=1ed a2=791234 a3=bfedae8c items=0 ppid=1 pid=11049 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="udevd" exe="/sbin/udevd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776463.050:12907): avc: denied { write } for pid=11049 comm="udevd" name="queue" dev=tmpfs ino=146273 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:device_t:s0 tclass=dir type=AVC msg=audit(1163776463.050:12907): avc: denied { add_name } for pid=11049 comm="udevd" name="class@net@tun0" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:device_t:s0 tclass=dir type=AVC msg=audit(1163776463.050:12907): avc: denied { create } for pid=11049 comm="udevd" name="class@net@tun0" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:device_t:s0 tclass=file type=SYSCALL msg=audit(1163776463.050:12907): arch=40000003 syscall=5 success=yes exit=9 a0=bfedb2c8 a1=8241 a2=1a4 a3=8241 items=0 ppid=1 pid=11049 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="udevd" exe="/sbin/udevd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776463.930:12908): avc: denied { sendto } for pid=13826 comm="udevd" path=002F6F72672F667265656465736B746F702F68616C2F756465765F6576656E74 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:hald_t:s0 tclass=unix_dgram_socket type=SYSCALL msg=audit(1163776463.930:12908): arch=40000003 syscall=102 success=yes exit=126 a0=b a1=bfed27a0 a2=791234 a3=7e items=0 ppid=11049 pid=13826 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="udevd" exe="/sbin/udevd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776463.930:12909): avc: denied { remove_name } for pid=11049 comm="udevd" name="class@net@tun0" dev=tmpfs ino=146274 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:device_t:s0 tclass=dir type=AVC msg=audit(1163776463.930:12909): avc: denied { unlink } for pid=11049 comm="udevd" name="class@net@tun0" dev=tmpfs ino=146274 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:device_t:s0 tclass=file type=SYSCALL msg=audit(1163776463.930:12909): arch=40000003 syscall=10 success=yes exit=0 a0=bfedb2b8 a1=24bff4 a2=791234 a3=791418 items=0 ppid=1 pid=11049 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="udevd" exe="/sbin/udevd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776463.930:12910): avc: denied { rmdir } for pid=11049 comm="udevd" name="queue" dev=tmpfs ino=146273 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:device_t:s0 tclass=dir type=SYSCALL msg=audit(1163776463.930:12910): arch=40000003 syscall=40 success=yes exit=0 a0=bfedae78 a1=2f2f2f2f a2=791234 a3=bfedae82 items=0 ppid=1 pid=11049 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="udevd" exe="/sbin/udevd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776467.522:12911): avc: denied { write } for pid=13836 comm="gnome-backgroun" name="3310" dev=dm-0 ino=14567721 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:ice_tmp_t:s0 tclass=sock_file type=SYSCALL msg=audit(1163776467.522:12911): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=bfc324a0 a2=df7770 a3=15 items=0 ppid=1 pid=13836 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-backgroun" exe="/usr/bin/gnome-background-properties" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776467.530:12912): avc: denied { read } for pid=13836 comm="gnome-backgroun" name=".ICEauthority" dev=dm-0 ino=6574784 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:staff_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163776467.530:12912): arch=40000003 syscall=33 success=yes exit=0 a0=8a14cd8 a1=4 a2=df7770 a3=8a14cd8 items=0 ppid=1 pid=13836 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-backgroun" exe="/usr/bin/gnome-background-properties" subj=staff_u:staff_r:staff_t:s0 key=(null) type=USER_AVC msg=audit(1163776480.779:12913): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManagerInfo member=UserInterfaceActivated dest=org.freedesktop.DBus spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=AVC msg=audit(1163776486.176:12914): avc: denied { read } for pid=14002 comm="firefox-bin" name=".gdmV8RYIT" dev=dm-0 ino=14469571 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163776486.176:12914): arch=40000003 syscall=33 success=yes exit=0 a0=bff20fcb a1=4 a2=da3a64 a3=bff20fcb items=0 ppid=1 pid=14002 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163776486.176:12915): avc: denied { getattr } for pid=14002 comm="firefox-bin" name=".gdmV8RYIT" dev=dm-0 ino=14469571 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163776486.176:12915): arch=40000003 syscall=197 success=yes exit=0 a0=4 a1=bff1e33c a2=ef3ff4 a3=8311140 items=0 ppid=1 pid=14002 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163776486.176:12915): path="/tmp/.gdmV8RYIT" type=USER_AVC msg=audit(1163776489.432:12916): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManagerInfo member=UserInterfaceActivated dest=org.freedesktop.DBus spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=AVC msg=audit(1163776688.156:12917): avc: denied { remove_name } for pid=14116 comm="rm" name="file_contexts.ProyZ13713" dev=dm-0 ino=9334540 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:file_context_t:s0 tclass=dir type=AVC msg=audit(1163776688.156:12917): avc: denied { unlink } for pid=14116 comm="rm" name="file_contexts.ProyZ13713" dev=dm-0 ino=9334540 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:file_context_t:s0 tclass=file type=SYSCALL msg=audit(1163776688.156:12917): arch=40000003 syscall=10 success=yes exit=0 a0=bff52b90 a1=0 a2=805277c a3=bff518e4 items=0 ppid=13695 pid=14116 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="rm" exe="/bin/rm" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776688.268:12918): avc: denied { dac_override } for pid=8303 comm="yum" capability=1 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=capability type=SYSCALL msg=audit(1163776688.268:12918): arch=40000003 syscall=5 success=yes exit=12 a0=f642ce0 a1=8002 a2=0 a3=8002 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776695.277:12919): avc: denied { read } for pid=6537 comm="bash" name=".bash_logout" dev=dm-0 ino=13061690 scontext=staff_u:staff_r:staff_t:s0 tcontext=root:object_r:user_home_t:s0 tclass=file type=SYSCALL msg=audit(1163776695.277:12919): arch=40000003 syscall=5 success=yes exit=3 a0=884c360 a1=8000 a2=0 a3=8000 items=0 ppid=6534 pid=6537 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776695.737:12920): avc: denied { append } for pid=6537 comm="bash" name=".bash_history" dev=dm-0 ino=13127151 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:user_home_t:s0 tclass=file type=SYSCALL msg=audit(1163776695.737:12920): arch=40000003 syscall=5 success=yes exit=3 a0=882b640 a1=8401 a2=0 a3=8401 items=0 ppid=6534 pid=6537 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776695.757:12921): avc: denied { read } for pid=6537 comm="bash" name=".bash_history" dev=dm-0 ino=13127151 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:user_home_t:s0 tclass=file type=SYSCALL msg=audit(1163776695.757:12921): arch=40000003 syscall=5 success=yes exit=3 a0=882b640 a1=8000 a2=0 a3=8000 items=0 ppid=6534 pid=6537 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776695.765:12922): avc: denied { write } for pid=6537 comm="bash" name=".bash_history" dev=dm-0 ino=13127151 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:user_home_t:s0 tclass=file type=SYSCALL msg=audit(1163776695.765:12922): arch=40000003 syscall=5 success=yes exit=3 a0=882b640 a1=8201 a2=0 a3=8201 items=0 ppid=6534 pid=6537 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=CRED_DISP msg=audit(1163776695.773:12923): user pid=6534 uid=0 auid=500 subj=staff_u:staff_r:staff_su_t:s0 msg='PAM: setcred acct=root : exe="/bin/su" (hostname=?, addr=?, terminal=pts/1 res=success)' type=AVC msg=audit(1163776695.777:12924): avc: denied { search } for pid=6534 comm="su" scontext=staff_u:staff_r:staff_su_t:s0 tcontext=staff_u:staff_r:staff_su_t:s0 tclass=key type=AVC msg=audit(1163776695.777:12924): avc: denied { search } for pid=6534 comm="su" scontext=staff_u:staff_r:staff_su_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=key type=AVC msg=audit(1163776695.777:12924): avc: denied { write } for pid=6534 comm="su" scontext=staff_u:staff_r:staff_su_t:s0 tcontext=staff_u:staff_r:staff_su_t:s0 tclass=key type=SYSCALL msg=audit(1163776695.777:12924): arch=40000003 syscall=288 success=yes exit=0 a0=3 a1=1b14edbb a2=0 a3=0 items=0 ppid=4071 pid=6534 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="su" exe="/bin/su" subj=staff_u:staff_r:staff_su_t:s0 key=(null) type=AVC msg=audit(1163776695.777:12925): avc: denied { search } for pid=6534 comm="su" name="root" dev=dm-0 ino=13127137 scontext=staff_u:staff_r:staff_su_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1163776695.777:12925): avc: denied { write } for pid=6534 comm="su" name="root" dev=dm-0 ino=13127137 scontext=staff_u:staff_r:staff_su_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1163776695.777:12925): avc: denied { remove_name } for pid=6534 comm="su" name=".xauthZUyRWj" dev=dm-0 ino=13127386 scontext=staff_u:staff_r:staff_su_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1163776695.777:12925): avc: denied { unlink } for pid=6534 comm="su" name=".xauthZUyRWj" dev=dm-0 ino=13127386 scontext=staff_u:staff_r:staff_su_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163776695.777:12925): arch=40000003 syscall=10 success=yes exit=0 a0=9a8eb48 a1=9a8ec26 a2=140bc8 a3=9a8c798 items=0 ppid=4071 pid=6534 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="su" exe="/bin/su" subj=staff_u:staff_r:staff_su_t:s0 key=(null) type=USER_END msg=audit(1163776695.825:12926): user pid=6534 uid=0 auid=500 subj=staff_u:staff_r:staff_su_t:s0 msg='PAM: session close acct=root : exe="/bin/su" (hostname=?, addr=?, terminal=pts/1 res=success)' type=CRED_DISP msg=audit(1163776696.381:12927): user pid=4062 uid=500 auid=500 subj=staff_u:staff_r:staff_su_t:s0 msg='PAM: setcred acct=root : exe="/bin/su" (hostname=?, addr=?, terminal=pts/1 res=success)' type=USER_END msg=audit(1163776696.381:12928): user pid=4062 uid=500 auid=500 subj=staff_u:staff_r:staff_su_t:s0 msg='PAM: session close acct=root : exe="/bin/su" (hostname=?, addr=?, terminal=pts/1 res=success)' type=AVC msg=audit(1163776701.257:12929): avc: denied { read } for pid=3836 comm="gnome-panel" name="resolv.conf" dev=dm-0 ino=9334568 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:net_conf_t:s0 tclass=file type=SYSCALL msg=audit(1163776701.257:12929): arch=40000003 syscall=5 success=yes exit=28 a0=c37093 a1=0 a2=1b6 a3=9493400 items=0 ppid=1 pid=3836 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-panel" exe="/usr/bin/gnome-panel" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776701.433:12930): avc: denied { read } for pid=14120 comm="esd" name="default.conf" dev=dm-0 ino=9330152 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:alsa_etc_rw_t:s0 tclass=file type=SYSCALL msg=audit(1163776701.433:12930): arch=40000003 syscall=5 success=yes exit=12 a0=97a6258 a1=0 a2=1b6 a3=97a6278 items=0 ppid=1 pid=14120 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="esd" exe="/usr/bin/esd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776701.645:12931): avc: denied { execheap } for pid=3852 comm="beagle-search" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=process type=AVC msg=audit(1163776701.645:12931): avc: denied { execmem } for pid=3852 comm="beagle-search" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=process type=SYSCALL msg=audit(1163776701.645:12931): arch=40000003 syscall=125 success=yes exit=0 a0=8c4e000 a1=1000 a2=7 a3=1 items=0 ppid=1 pid=3852 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="beagle-search" exe="/usr/bin/mono" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776701.817:12932): avc: denied { read } for pid=12189 comm="restorecond" name="secrets.tdb" dev=dm-0 ino=9330306 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:samba_secrets_t:s0 tclass=file type=SYSCALL msg=audit(1163776701.817:12932): arch=40000003 syscall=5 success=yes exit=6 a0=8385460 a1=28000 a2=0 a3=28000 items=0 ppid=1 pid=12189 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="restorecond" exe="/usr/sbin/restorecond" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776709.838:12933): avc: denied { write } for pid=3310 comm="gnome-session" name=".ICEauthority" dev=dm-0 ino=6574784 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:staff_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163776709.838:12933): arch=40000003 syscall=5 success=yes exit=4 a0=8602c00 a1=241 a2=1b6 a3=86279b8 items=0 ppid=3285 pid=3310 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-session" exe="/usr/bin/gnome-session" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776709.878:12934): avc: denied { write } for pid=3310 comm="gnome-session" name=".ICE-unix" dev=dm-0 ino=14567572 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:ice_tmp_t:s0 tclass=dir type=AVC msg=audit(1163776709.878:12934): avc: denied { remove_name } for pid=3310 comm="gnome-session" name="3310" dev=dm-0 ino=14567721 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:ice_tmp_t:s0 tclass=dir type=AVC msg=audit(1163776709.878:12934): avc: denied { unlink } for pid=3310 comm="gnome-session" name="3310" dev=dm-0 ino=14567721 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:ice_tmp_t:s0 tclass=sock_file type=SYSCALL msg=audit(1163776709.878:12934): arch=40000003 syscall=10 success=yes exit=0 a0=8602d72 a1=1 a2=df7770 a3=8602cc8 items=0 ppid=3285 pid=3310 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-session" exe="/usr/bin/gnome-session" subj=staff_u:staff_r:staff_t:s0 key=(null) type=USER_END msg=audit(1163776710.834:12935): user pid=3285 uid=0 auid=500 subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 msg='PAM: session close acct=kmacmill : exe="/usr/sbin/gdm-binary" (hostname=?, addr=?, terminal=:0 res=success)' type=CRED_DISP msg=audit(1163776710.838:12936): user pid=3285 uid=0 auid=500 subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 msg='PAM: setcred acct=kmacmill : exe="/usr/sbin/gdm-binary" (hostname=?, addr=?, terminal=:0 res=success)' type=AVC msg=audit(1163776712.422:12937): avc: denied { read } for pid=11049 comm="udevd" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=netlink_kobject_uevent_socket type=SYSCALL msg=audit(1163776712.422:12937): arch=40000003 syscall=102 success=yes exit=99 a0=a a1=bfedb480 a2=791234 a3=0 items=0 ppid=1 pid=11049 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="udevd" exe="/sbin/udevd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776712.454:12938): avc: denied { getattr } for pid=14246 comm="udevd" name="vcs7" dev=tmpfs ino=12075 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:tty_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163776712.454:12938): arch=40000003 syscall=195 success=yes exit=0 a0=bfed2dc8 a1=bfed2b68 a2=24bff4 a3=bfed2dc8 items=0 ppid=11049 pid=14246 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="udevd" exe="/sbin/udevd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163776712.454:12938): path="/dev/vcs7" type=AVC msg=audit(1163776712.454:12939): avc: denied { setattr } for pid=14246 comm="udevd" name="vcs7" dev=tmpfs ino=12075 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:tty_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163776712.454:12939): arch=40000003 syscall=212 success=yes exit=0 a0=bfed2dc8 a1=0 a2=0 a3=bfed2dc8 items=0 ppid=11049 pid=14246 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="udevd" exe="/sbin/udevd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776712.454:12940): avc: denied { unlink } for pid=14246 comm="udevd" name="vcs7" dev=tmpfs ino=12075 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:tty_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163776712.454:12940): arch=40000003 syscall=10 success=yes exit=0 a0=bfed2dc8 a1=0 a2=791234 a3=bfed2dc8 items=0 ppid=11049 pid=14246 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="udevd" exe="/sbin/udevd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776712.494:12941): avc: denied { sendto } for pid=14246 comm="udevd" path=002F6F72672F667265656465736B746F702F68616C2F756465765F6576656E74 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:hald_t:s0 tclass=unix_dgram_socket type=SYSCALL msg=audit(1163776712.494:12941): arch=40000003 syscall=102 success=yes exit=142 a0=b a1=bfed27a0 a2=791234 a3=8e items=0 ppid=11049 pid=14246 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="udevd" exe="/sbin/udevd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776713.642:12942): avc: denied { mknod } for pid=14253 comm="udevd" capability=27 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=capability type=AVC msg=audit(1163776713.642:12942): avc: denied { create } for pid=14253 comm="udevd" name="vcs7" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:tty_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163776713.642:12942): arch=40000003 syscall=14 success=yes exit=0 a0=bfed2dc4 a1=2180 a2=707 a3=180 items=0 ppid=11049 pid=14253 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="udevd" exe="/sbin/udevd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776713.642:12943): avc: denied { create } for pid=14253 comm="udevd" name="class@vc@vcs7" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:device_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163776713.642:12943): arch=40000003 syscall=83 success=yes exit=0 a0=9526ccc a1=bfed2dc8 a2=791234 a3=bfed2dc8 items=0 ppid=11049 pid=14253 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="udevd" exe="/sbin/udevd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776713.998:12944): avc: denied { unlink } for pid=14255 comm="udevd" name="class@vc@vcs7" dev=tmpfs ino=154201 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:device_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163776713.998:12944): arch=40000003 syscall=10 success=yes exit=0 a0=bfed2dcc a1=1b a2=791234 a3=bfed2dcc items=0 ppid=11049 pid=14255 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="udevd" exe="/sbin/udevd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=USER_ACCT msg=audit(1163776801.991:12945): user pid=14278 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1163776801.991:12946): login pid=14278 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1163776801.995:12947): user pid=14278 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1163776801.995:12948): user pid=14278 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1163776802.003:12949): avc: denied { execute } for pid=14279 comm="sh" name="sa1" dev=dm-0 ino=13061698 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:lib_t:s0 tclass=file type=AVC msg=audit(1163776802.003:12949): avc: denied { execute_no_trans } for pid=14279 comm="sh" name="sa1" dev=dm-0 ino=13061698 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1163776802.003:12949): arch=40000003 syscall=11 success=yes exit=0 a0=9d6a1b0 a1=9d6a358 a2=9d6a290 a3=9d6a008 items=0 ppid=14278 pid=14279 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sa1" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163776802.003:12949): path="/usr/lib/sa/sa1" type=AVC msg=audit(1163776802.019:12950): avc: denied { execute } for pid=14279 comm="sa1" name="sadc" dev=dm-0 ino=11981401 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=AVC msg=audit(1163776802.019:12950): avc: denied { execute_no_trans } for pid=14279 comm="sa1" name="sadc" dev=dm-0 ino=11981401 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=AVC msg=audit(1163776802.019:12950): avc: denied { read } for pid=14279 comm="sa1" name="sadc" dev=dm-0 ino=11981401 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163776802.019:12950): arch=40000003 syscall=11 success=yes exit=0 a0=886cd48 a1=886c740 a2=886cd60 a3=886c740 items=0 ppid=14278 pid=14279 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163776802.019:12950): path="/usr/lib/sa/sadc" type=AVC_PATH msg=audit(1163776802.019:12950): path="/usr/lib/sa/sadc" type=AVC msg=audit(1163776802.035:12951): avc: denied { search } for pid=14279 comm="sadc" name="net" dev=proc ino=-268435432 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=dir type=AVC msg=audit(1163776802.035:12951): avc: denied { read } for pid=14279 comm="sadc" name="dev" dev=proc ino=-268434164 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=file type=SYSCALL msg=audit(1163776802.035:12951): arch=40000003 syscall=5 success=yes exit=3 a0=8050371 a1=0 a2=1b6 a3=9abc7f8 items=0 ppid=14278 pid=14279 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163776802.035:12952): avc: denied { getattr } for pid=14279 comm="sadc" name="dev" dev=proc ino=-268434164 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=file type=SYSCALL msg=audit(1163776802.035:12952): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bfec7ff8 a2=24bff4 a3=9abc7f8 items=0 ppid=14278 pid=14279 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163776802.035:12952): path="/proc/net/dev" type=AVC msg=audit(1163776802.039:12953): avc: denied { search } for pid=14279 comm="sadc" name="sa" dev=dm-0 ino=14607631 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=dir type=SYSCALL msg=audit(1163776802.039:12953): arch=40000003 syscall=33 success=yes exit=0 a0=bfec83a4 a1=0 a2=bfec8298 a3=bfec82a0 items=0 ppid=14278 pid=14279 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163776802.111:12954): avc: denied { read append } for pid=14279 comm="sadc" name="sa17" dev=dm-0 ino=14600257 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=file type=SYSCALL msg=audit(1163776802.111:12954): arch=40000003 syscall=5 success=yes exit=3 a0=bfec83a4 a1=402 a2=bfec8568 a3=bfec82a0 items=0 ppid=14278 pid=14279 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163776802.123:12955): avc: denied { search } for pid=14279 comm="sadc" name="fs" dev=proc ino=-268435428 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=dir type=AVC msg=audit(1163776802.123:12955): avc: denied { read } for pid=14279 comm="sadc" name="dentry-state" dev=proc ino=-268435230 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=file type=SYSCALL msg=audit(1163776802.123:12955): arch=40000003 syscall=5 success=yes exit=4 a0=805037f a1=0 a2=1b6 a3=9abd2b8 items=0 ppid=14278 pid=14279 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163776802.123:12956): avc: denied { getattr } for pid=14279 comm="sadc" name="dentry-state" dev=proc ino=-268435230 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=file type=SYSCALL msg=audit(1163776802.123:12956): arch=40000003 syscall=197 success=yes exit=0 a0=4 a1=bfec7e50 a2=24bff4 a3=9abd2b8 items=0 ppid=14278 pid=14279 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163776802.123:12956): path="/proc/sys/fs/dentry-state" type=AVC msg=audit(1163776802.123:12957): avc: denied { search } for pid=14279 comm="sadc" name="rpc" dev=proc ino=-268433616 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_rpc_t:s0 tclass=dir type=SYSCALL msg=audit(1163776802.123:12957): arch=40000003 syscall=5 success=no exit=-2 a0=80502a5 a1=0 a2=1b6 a3=9abd2b8 items=0 ppid=14278 pid=14279 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163776802.123:12958): avc: denied { lock } for pid=14279 comm="sadc" name="sa17" dev=dm-0 ino=14600257 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=file type=SYSCALL msg=audit(1163776802.123:12958): arch=40000003 syscall=143 success=yes exit=0 a0=3 a1=6 a2=bfec82a0 a3=3 items=0 ppid=14278 pid=14279 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163776802.123:12958): path="/var/log/sa/sa17" type=CRED_DISP msg=audit(1163776802.139:12959): user pid=14278 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1163776802.139:12960): user pid=14278 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_AUTH msg=audit(1163776857.199:12961): user pid=3285 uid=0 auid=500 subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 msg='PAM: authentication acct=kmacmill : exe="/usr/sbin/gdm-binary" (hostname=?, addr=?, terminal=:0 res=success)' type=USER_ACCT msg=audit(1163776857.199:12962): user pid=3285 uid=0 auid=500 subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 msg='PAM: accounting acct=kmacmill : exe="/usr/sbin/gdm-binary" (hostname=?, addr=?, terminal=:0 res=success)' type=CRED_ACQ msg=audit(1163776857.199:12963): user pid=3285 uid=0 auid=500 subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 msg='PAM: setcred acct=kmacmill : exe="/usr/sbin/gdm-binary" (hostname=?, addr=?, terminal=:0 res=success)' type=LOGIN msg=audit(1163776857.215:12964): login pid=3285 uid=0 old auid=500 new auid=500 type=USER_START msg=audit(1163776857.267:12965): user pid=3285 uid=0 auid=500 subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 msg='PAM: session open acct=kmacmill : exe="/usr/sbin/gdm-binary" (hostname=?, addr=?, terminal=:0 res=success)' type=USER_LOGIN msg=audit(1163776857.267:12966): user pid=3285 uid=0 auid=500 subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 msg='uid=500: exe="/usr/sbin/gdm-binary" (hostname=localhost.localdomain, addr=127.0.0.1, terminal=:0 res=success)' type=AVC msg=audit(1163776857.583:12967): avc: denied { read } for pid=14281 comm="gdm-binary" name=".ICEauthority" dev=dm-0 ino=6574784 scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=staff_u:object_r:staff_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163776857.583:12967): arch=40000003 syscall=5 success=yes exit=10 a0=80865d5 a1=0 a2=1 a3=c items=0 ppid=3285 pid=14281 auid=500 uid=0 gid=500 euid=0 suid=0 fsuid=0 egid=0 sgid=500 fsgid=0 tty=(none) comm="gdm-binary" exe="/usr/sbin/gdm-binary" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163776857.583:12968): avc: denied { getattr } for pid=14281 comm="gdm-binary" name=".ICEauthority" dev=dm-0 ino=6574784 scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=staff_u:object_r:staff_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163776857.583:12968): arch=40000003 syscall=196 success=yes exit=0 a0=80865d5 a1=bfd7023c a2=c4eff4 a3=bfd7023c items=0 ppid=3285 pid=14281 auid=500 uid=0 gid=500 euid=0 suid=0 fsuid=0 egid=0 sgid=500 fsgid=0 tty=(none) comm="gdm-binary" exe="/usr/sbin/gdm-binary" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163776857.583:12968): path="/home/kmacmill/.ICEauthority" type=AVC msg=audit(1163776857.715:12969): avc: denied { read } for pid=14294 comm="xrdb" name=".gdmOFJZIT" dev=dm-0 ino=14469449 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163776857.715:12969): arch=40000003 syscall=33 success=yes exit=0 a0=bfbadfce a1=4 a2=da3a64 a3=bfbadfce items=0 ppid=14281 pid=14294 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="xrdb" exe="/usr/bin/xrdb" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776858.471:12970): avc: denied { getattr } for pid=14335 comm="dbus-daemon" name="/" dev=dm-0 ino=2 scontext=staff_u:staff_r:staff_dbusd_t:s0 tcontext=system_u:object_r:fs_t:s0 tclass=filesystem type=SYSCALL msg=audit(1163776858.471:12970): arch=40000003 syscall=100 success=yes exit=0 a0=5 a1=bff76fbc a2=e7fff4 a3=ffffffb8 items=0 ppid=14334 pid=14335 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="dbus-daemon" exe="/bin/dbus-daemon" subj=staff_u:staff_r:staff_dbusd_t:s0 key=(null) type=AVC msg=audit(1163776858.639:12971): avc: denied { search } for pid=14335 comm="dbus-daemon" name="kmacmill" dev=dm-0 ino=6547202 scontext=staff_u:staff_r:staff_dbusd_t:s0 tcontext=staff_u:object_r:staff_home_dir_t:s0 tclass=dir type=AVC msg=audit(1163776858.639:12971): avc: denied { search } for pid=14335 comm="dbus-daemon" name=".local" dev=dm-0 ino=6815703 scontext=staff_u:staff_r:staff_dbusd_t:s0 tcontext=staff_u:object_r:staff_home_t:s0 tclass=dir type=SYSCALL msg=audit(1163776858.639:12971): arch=40000003 syscall=5 success=no exit=-2 a0=94e5c68 a1=18800 a2=d4925c a3=0 items=0 ppid=14334 pid=14335 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="dbus-daemon" exe="/bin/dbus-daemon" subj=staff_u:staff_r:staff_dbusd_t:s0 key=(null) type=AVC msg=audit(1163776860.535:12972): avc: denied { add_name } for pid=14281 comm="gnome-session" name="14281" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:ice_tmp_t:s0 tclass=dir type=AVC msg=audit(1163776860.535:12972): avc: denied { create } for pid=14281 comm="gnome-session" name="14281" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:ice_tmp_t:s0 tclass=sock_file type=SYSCALL msg=audit(1163776860.535:12972): arch=40000003 syscall=102 success=yes exit=0 a0=2 a1=bf87d4a0 a2=df7770 a3=0 items=0 ppid=3285 pid=14281 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-session" exe="/usr/bin/gnome-session" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776860.535:12973): avc: denied { read } for pid=14281 comm="gnome-session" name=".ICEauthority" dev=dm-0 ino=6574784 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:staff_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163776860.535:12973): arch=40000003 syscall=5 success=yes exit=16 a0=94f7088 a1=0 a2=1b6 a3=94f70b0 items=0 ppid=3285 pid=14281 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-session" exe="/usr/bin/gnome-session" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776860.535:12974): avc: denied { write } for pid=14281 comm="gnome-session" name=".ICEauthority" dev=dm-0 ino=6574784 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:staff_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163776860.535:12974): arch=40000003 syscall=5 success=yes exit=16 a0=94f7088 a1=241 a2=1b6 a3=94ff5b8 items=0 ppid=3285 pid=14281 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-session" exe="/usr/bin/gnome-session" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776860.679:12975): avc: denied { read write } for pid=14354 comm="gnome-settings-" name="[154493]" dev=sockfs ino=154493 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_dbusd_t:s0 tclass=netlink_selinux_socket type=SYSCALL msg=audit(1163776860.679:12975): arch=40000003 syscall=11 success=yes exit=0 a0=94ec490 a1=94ec7d8 a2=94ecd90 a3=94ec4b8 items=0 ppid=14353 pid=14354 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-settings-" exe="/usr/libexec/gnome-settings-daemon" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163776860.679:12975): path="socket:[154493]" type=AVC msg=audit(1163776861.147:12976): avc: denied { read } for pid=14354 comm="gnome-settings-" name="resolv.conf" dev=dm-0 ino=9334568 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:net_conf_t:s0 tclass=file type=SYSCALL msg=audit(1163776861.147:12976): arch=40000003 syscall=5 success=yes exit=24 a0=7c7e73 a1=0 a2=1b6 a3=8f98930 items=0 ppid=14353 pid=14354 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-settings-" exe="/usr/libexec/gnome-settings-daemon" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776861.159:12977): avc: denied { read } for pid=14362 comm="esd" name="default.conf" dev=dm-0 ino=9330152 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:alsa_etc_rw_t:s0 tclass=file type=SYSCALL msg=audit(1163776861.159:12977): arch=40000003 syscall=5 success=yes exit=14 a0=96a0258 a1=0 a2=1b6 a3=96a0278 items=0 ppid=1 pid=14362 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="esd" exe="/usr/bin/esd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776866.443:12978): avc: denied { write } for pid=14856 comm="metacity" name="14281" dev=dm-0 ino=14567723 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:ice_tmp_t:s0 tclass=sock_file type=SYSCALL msg=audit(1163776866.443:12978): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=bfe99e40 a2=df7770 a3=16 items=0 ppid=1 pid=14856 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="metacity" exe="/usr/bin/metacity" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776867.555:12979): avc: denied { execute } for pid=14873 comm="beagle-search" name="mono" dev=dm-0 ino=10321084 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:mono_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163776867.555:12979): arch=40000003 syscall=33 success=yes exit=0 a0=8b1d880 a1=1 a2=11 a3=8b1d880 items=0 ppid=1 pid=14873 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="beagle-search" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776867.555:12980): avc: denied { read } for pid=14873 comm="beagle-search" name="mono" dev=dm-0 ino=10321084 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:mono_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163776867.555:12980): arch=40000003 syscall=33 success=yes exit=0 a0=8b1d880 a1=4 a2=ffffffff a3=8b1d880 items=0 ppid=1 pid=14873 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="beagle-search" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776867.555:12981): avc: denied { execute_no_trans } for pid=14873 comm="beagle-search" name="mono" dev=dm-0 ino=10321084 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:mono_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163776867.555:12981): arch=40000003 syscall=11 success=yes exit=0 a0=8b1d698 a1=8b1d868 a2=8b1df70 a3=8b1d868 items=0 ppid=1 pid=14873 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="mono" exe="/usr/bin/mono" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163776867.555:12981): path="/usr/bin/mono" type=AVC msg=audit(1163776867.943:12982): avc: denied { execheap } for pid=14873 comm="mono" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=process type=AVC msg=audit(1163776867.943:12982): avc: denied { execmem } for pid=14873 comm="mono" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=process type=SYSCALL msg=audit(1163776867.943:12982): arch=40000003 syscall=125 success=yes exit=0 a0=9a7d000 a1=1000 a2=7 a3=1 items=0 ppid=1 pid=14873 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="mono" exe="/usr/bin/mono" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776868.844:12983): avc: denied { sigchld } for pid=14889 comm="dbus-daemon" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_dbusd_t:s0 tclass=process type=SYSCALL msg=audit(1163776868.844:12983): arch=40000003 syscall=7 success=yes exit=0 a0=3a2a a1=bff76bc8 a2=1 a3=3a2a items=0 ppid=14337 pid=14889 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="dbus-daemon" exe="/bin/dbus-daemon" subj=staff_u:staff_r:staff_dbusd_t:s0 key=(null) type=AVC msg=audit(1163776870.456:12984): avc: denied { ioctl } for pid=14914 comm="pam_timestamp_c" name="[154356]" dev=pipefs ino=154356 scontext=staff_u:staff_r:pam_t:s0 tcontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tclass=fifo_file type=SYSCALL msg=audit(1163776870.456:12984): arch=40000003 syscall=54 success=no exit=-22 a0=2 a1=5401 a2=bf8bcd48 a3=bf8bcd88 items=0 ppid=14912 pid=14914 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=(none) comm="pam_timestamp_c" exe="/sbin/pam_timestamp_check" subj=staff_u:staff_r:pam_t:s0 key=(null) type=AVC_PATH msg=audit(1163776870.456:12984): path="pipe:[154356]" type=USER_AVC msg=audit(1163776871.064:12985): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManagerInfo member=getNetworks dest=org.freedesktop.NetworkManagerInfo spid=6687 tpid=14885 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163776871.064:12986): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManagerInfo member=getVPNConnections dest=org.freedesktop.NetworkManagerInfo spid=6687 tpid=14885 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163776871.072:12987): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager member=state dest=org.freedesktop.NetworkManager spid=14885 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163776871.072:12988): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager member=getDevices dest=org.freedesktop.NetworkManager spid=14885 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163776871.076:12989): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager member=getWirelessEnabled dest=org.freedesktop.NetworkManager spid=14885 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163776871.076:12990): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager member=getDialup dest=org.freedesktop.NetworkManager spid=14885 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163776871.076:12991): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.VPNConnections member=getVPNConnections dest=org.freedesktop.NetworkManager spid=14885 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163776871.076:12992): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.23 spid=6687 tpid=14885 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163776871.076:12993): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.23 spid=6687 tpid=14885 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163776871.076:12994): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.23 spid=6687 tpid=14885 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163776871.076:12995): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=error error_name=org.freedesktop.NetworkManager.NoDialup dest=:1.23 spid=6687 tpid=14885 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163776871.076:12996): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.23 spid=6687 tpid=14885 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163776871.076:12997): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=error error_name=org.freedesktop.NetworkManagerInfo.NoNetworks dest=:1.6 spid=14885 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163776871.252:12998): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.6 spid=14885 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163776871.252:12999): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=14885 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163776871.252:13000): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.VPNConnections member=getVPNConnectionProperties dest=org.freedesktop.NetworkManager spid=14885 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=AVC msg=audit(1163776871.172:13001): avc: denied { write } for pid=12248 comm="cupsd" name="certs" dev=dm-0 ino=14534810 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:cupsd_var_run_t:s0 tclass=dir type=AVC msg=audit(1163776871.172:13001): avc: denied { remove_name } for pid=12248 comm="cupsd" name="0" dev=dm-0 ino=14534809 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:cupsd_var_run_t:s0 tclass=dir type=AVC msg=audit(1163776871.172:13001): avc: denied { unlink } for pid=12248 comm="cupsd" name="0" dev=dm-0 ino=14534809 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:cupsd_var_run_t:s0 tclass=file type=SYSCALL msg=audit(1163776871.172:13001): arch=40000003 syscall=10 success=yes exit=0 a0=bfb167c8 a1=0 a2=927ff4 a3=bfb167c8 items=0 ppid=1 pid=12248 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="cupsd" exe="/usr/sbin/cupsd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776871.464:13002): avc: denied { add_name } for pid=12248 comm="cupsd" name="0" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:cupsd_var_run_t:s0 tclass=dir type=AVC msg=audit(1163776871.464:13002): avc: denied { create } for pid=12248 comm="cupsd" name="0" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:cupsd_var_run_t:s0 tclass=file type=SYSCALL msg=audit(1163776871.464:13002): arch=40000003 syscall=5 success=yes exit=8 a0=bfb167c8 a1=80c1 a2=100 a3=80c1 items=0 ppid=1 pid=12248 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="cupsd" exe="/usr/sbin/cupsd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776871.464:13003): avc: denied { setattr } for pid=12248 comm="cupsd" name="0" dev=dm-0 ino=14534809 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:cupsd_var_run_t:s0 tclass=file type=SYSCALL msg=audit(1163776871.464:13003): arch=40000003 syscall=94 success=yes exit=0 a0=8 a1=120 a2=927ff4 a3=21 items=0 ppid=1 pid=12248 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="cupsd" exe="/usr/sbin/cupsd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776871.464:13004): avc: denied { write } for pid=12248 comm="cupsd" name="0" dev=dm-0 ino=14534809 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:cupsd_var_run_t:s0 tclass=file type=SYSCALL msg=audit(1163776871.464:13004): arch=40000003 syscall=4 success=yes exit=32 a0=8 a1=9139578 a2=20 a3=9139578 items=0 ppid=1 pid=12248 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="cupsd" exe="/usr/sbin/cupsd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163776871.464:13004): path="/var/run/cups/certs/0" type=AVC msg=audit(1163776871.496:13005): avc: denied { read append } for pid=12248 comm="cupsd" name="access_log" dev=dm-0 ino=14437015 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:cupsd_log_t:s0 tclass=file type=SYSCALL msg=audit(1163776871.496:13005): arch=40000003 syscall=5 success=yes exit=8 a0=bfb122c4 a1=8442 a2=1b6 a3=8442 items=0 ppid=1 pid=12248 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="cupsd" exe="/usr/sbin/cupsd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776871.800:13006): avc: denied { setattr } for pid=12248 comm="cupsd" name="access_log" dev=dm-0 ino=14437015 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:cupsd_log_t:s0 tclass=file type=SYSCALL msg=audit(1163776871.800:13006): arch=40000003 syscall=207 success=yes exit=0 a0=8 a1=0 a2=7 a3=0 items=0 ppid=1 pid=12248 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="cupsd" exe="/usr/sbin/cupsd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=USER_AVC msg=audit(1163776872.780:13007): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManagerInfo member=getVPNConnectionProperties dest=org.freedesktop.NetworkManagerInfo spid=6687 tpid=14885 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163776872.780:13008): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.23 spid=6687 tpid=14885 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163776872.780:13009): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.23 spid=6687 tpid=14885 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163776872.816:13010): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.6 spid=14885 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163776872.816:13011): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=14885 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163776872.816:13012): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager.VPNConnections member=VPNConnectionUpdate dest=org.freedesktop.DBus spid=6687 tpid=14885 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163776872.816:13013): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.23 spid=6687 tpid=14885 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163776872.820:13014): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.VPNConnections member=getVPNConnectionProperties dest=org.freedesktop.NetworkManager spid=14885 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163776872.820:13015): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.23 spid=6687 tpid=14885 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=AVC msg=audit(1163776873.740:13016): avc: denied { read write } for pid=14926 comm="nautilus" name=4C6F7720427261737320417474656E64616E636520506F6C6963792E646F63 dev=dm-0 ino=14469399 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163776873.740:13016): arch=40000003 syscall=33 success=yes exit=0 a0=b46025e8 a1=6 a2=412708 a3=bcab59 items=0 ppid=1 pid=14926 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="nautilus" exe="/usr/bin/nautilus" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776875.476:13017): avc: denied { read } for pid=14886 comm="beagled" name="max_user_instances" dev=proc ino=-268435221 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=file type=SYSCALL msg=audit(1163776875.476:13017): arch=40000003 syscall=5 success=yes exit=24 a0=c9533c a1=0 a2=1 a3=844dff8 items=0 ppid=1 pid=14886 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="beagled" exe="/usr/bin/mono" subj=staff_u:staff_r:staff_t:s0 key=(null) type=USER_AUTH msg=audit(1163776937.604:13018): user pid=14970 uid=500 auid=500 subj=staff_u:staff_r:staff_su_t:s0 msg='PAM: authentication acct=root : exe="/bin/su" (hostname=?, addr=?, terminal=pts/1 res=success)' type=USER_ACCT msg=audit(1163776937.604:13019): user pid=14970 uid=500 auid=500 subj=staff_u:staff_r:staff_su_t:s0 msg='PAM: accounting acct=root : exe="/bin/su" (hostname=?, addr=?, terminal=pts/1 res=success)' type=AVC msg=audit(1163776937.620:13020): avc: denied { write } for pid=14970 comm="su" scontext=staff_u:staff_r:staff_su_t:s0 tcontext=staff_u:staff_r:staff_su_t:s0 tclass=key type=AVC msg=audit(1163776937.620:13020): avc: denied { link } for pid=14970 comm="su" scontext=staff_u:staff_r:staff_su_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=key type=SYSCALL msg=audit(1163776937.620:13020): arch=40000003 syscall=288 success=yes exit=0 a0=8 a1=fffffffc a2=fffffffd a3=0 items=0 ppid=14949 pid=14970 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=pts1 comm="su" exe="/bin/su" subj=staff_u:staff_r:staff_su_t:s0 key=(null) type=AVC msg=audit(1163776937.620:13021): avc: denied { search } for pid=14970 comm="su" name="root" dev=dm-0 ino=13127137 scontext=staff_u:staff_r:staff_su_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=SYSCALL msg=audit(1163776937.620:13021): arch=40000003 syscall=5 success=no exit=-2 a0=bff7b248 a1=8000 a2=1b6 a3=8797200 items=0 ppid=14949 pid=14970 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=pts1 comm="su" exe="/bin/su" subj=staff_u:staff_r:staff_su_t:s0 key=(null) type=AVC msg=audit(1163776937.664:13022): avc: denied { write } for pid=14971 comm="xauth" name=".gdmOFJZIT" dev=dm-0 ino=14469449 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163776937.664:13022): arch=40000003 syscall=33 success=yes exit=0 a0=bf80ef2b a1=2 a2=bf80d650 a3=0 items=0 ppid=14970 pid=14971 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts1 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC msg=audit(1163776937.668:13023): avc: denied { read } for pid=14971 comm="xauth" name=".gdmOFJZIT" dev=dm-0 ino=14469449 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163776937.668:13023): arch=40000003 syscall=5 success=yes exit=2 a0=bf80ef2b a1=0 a2=1b6 a3=92e7008 items=0 ppid=14970 pid=14971 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts1 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC msg=audit(1163776937.668:13024): avc: denied { getattr } for pid=14971 comm="xauth" name=".gdmOFJZIT" dev=dm-0 ino=14469449 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163776937.668:13024): arch=40000003 syscall=197 success=yes exit=0 a0=2 a1=bf80d39c a2=24bff4 a3=92e7008 items=0 ppid=14970 pid=14971 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts1 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC_PATH msg=audit(1163776937.668:13024): path="/tmp/.gdmOFJZIT" type=AVC msg=audit(1163776937.668:13025): avc: denied { write } for pid=14970 comm="su" name="root" dev=dm-0 ino=13127137 scontext=staff_u:staff_r:staff_su_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1163776937.668:13025): avc: denied { add_name } for pid=14970 comm="su" name=".xauthN5hi8W" scontext=staff_u:staff_r:staff_su_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1163776937.668:13025): avc: denied { create } for pid=14970 comm="su" name=".xauthN5hi8W" scontext=staff_u:staff_r:staff_su_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163776937.668:13025): arch=40000003 syscall=5 success=yes exit=4 a0=8797323 a1=80c2 a2=180 a3=80c2 items=0 ppid=14949 pid=14970 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=pts1 comm="su" exe="/bin/su" subj=staff_u:staff_r:staff_su_t:s0 key=(null) type=AVC msg=audit(1163776937.668:13026): avc: denied { setattr } for pid=14970 comm="su" name=".xauthN5hi8W" dev=dm-0 ino=13127382 scontext=staff_u:staff_r:staff_su_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163776937.668:13026): arch=40000003 syscall=207 success=yes exit=0 a0=4 a1=0 a2=0 a3=96b5bf items=0 ppid=14949 pid=14970 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=pts1 comm="su" exe="/bin/su" subj=staff_u:staff_r:staff_su_t:s0 key=(null) type=AVC msg=audit(1163776937.672:13027): avc: denied { search } for pid=14972 comm="xauth" name="root" dev=dm-0 ino=13127137 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=SYSCALL msg=audit(1163776937.672:13027): arch=40000003 syscall=195 success=no exit=-2 a0=bfaafbc7 a1=bfaaf6dc a2=24bff4 a3=bfaaf6dc items=0 ppid=14970 pid=14972 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC msg=audit(1163776937.672:13028): avc: denied { write } for pid=14972 comm="xauth" name="root" dev=dm-0 ino=13127137 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1163776937.672:13028): avc: denied { add_name } for pid=14972 comm="xauth" name=".xauthN5hi8W-c" scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1163776937.672:13028): avc: denied { create } for pid=14972 comm="xauth" name=".xauthN5hi8W-c" scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163776937.672:13028): arch=40000003 syscall=5 success=yes exit=2 a0=bfaafbc7 a1=c1 a2=180 a3=ffffffff items=0 ppid=14970 pid=14972 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC msg=audit(1163776937.672:13029): avc: denied { link } for pid=14972 comm="xauth" name=".xauthN5hi8W-c" dev=dm-0 ino=13127386 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163776937.672:13029): arch=40000003 syscall=9 success=yes exit=0 a0=bfaafbc7 a1=bfaaf7c6 a2=da3a64 a3=2 items=0 ppid=14970 pid=14972 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC msg=audit(1163776937.672:13030): avc: denied { write } for pid=14972 comm="xauth" name=".xauthN5hi8W" dev=dm-0 ino=13127382 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163776937.672:13030): arch=40000003 syscall=33 success=yes exit=0 a0=bfab0f27 a1=2 a2=bfab00f0 a3=0 items=0 ppid=14970 pid=14972 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC msg=audit(1163776937.672:13031): avc: denied { read } for pid=14972 comm="xauth" name=".xauthN5hi8W" dev=dm-0 ino=13127382 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163776937.672:13031): arch=40000003 syscall=5 success=yes exit=2 a0=bfab0f27 a1=0 a2=1b6 a3=8462008 items=0 ppid=14970 pid=14972 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC msg=audit(1163776937.672:13032): avc: denied { getattr } for pid=14972 comm="xauth" name=".xauthN5hi8W" dev=dm-0 ino=13127382 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163776937.672:13032): arch=40000003 syscall=197 success=yes exit=0 a0=2 a1=bfaafe3c a2=24bff4 a3=8462008 items=0 ppid=14970 pid=14972 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC_PATH msg=audit(1163776937.672:13032): path="/root/.xauthN5hi8W" type=AVC msg=audit(1163776937.672:13033): avc: denied { remove_name } for pid=14972 comm="xauth" name=".xauthN5hi8W" dev=dm-0 ino=13127382 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1163776937.672:13033): avc: denied { unlink } for pid=14972 comm="xauth" name=".xauthN5hi8W" dev=dm-0 ino=13127382 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163776937.672:13033): arch=40000003 syscall=10 success=yes exit=0 a0=8462008 a1=1000 a2=0 a3=846208a items=0 ppid=14970 pid=14972 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=USER_START msg=audit(1163776937.672:13034): user pid=14970 uid=500 auid=500 subj=staff_u:staff_r:staff_su_t:s0 msg='PAM: session open acct=root : exe="/bin/su" (hostname=?, addr=?, terminal=pts/1 res=success)' type=CRED_ACQ msg=audit(1163776937.672:13035): user pid=14970 uid=500 auid=500 subj=staff_u:staff_r:staff_su_t:s0 msg='PAM: setcred acct=root : exe="/bin/su" (hostname=?, addr=?, terminal=pts/1 res=success)' type=AVC msg=audit(1163776937.788:13036): avc: denied { read } for pid=14973 comm="bash" name=".bash_profile" dev=dm-0 ino=13127141 scontext=staff_u:staff_r:staff_t:s0 tcontext=root:object_r:user_home_t:s0 tclass=file type=SYSCALL msg=audit(1163776937.788:13036): arch=40000003 syscall=5 success=yes exit=3 a0=8dfef98 a1=8000 a2=0 a3=8000 items=0 ppid=14970 pid=14973 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776937.948:13037): avc: denied { read } for pid=14973 comm="bash" name=".bash_history" dev=dm-0 ino=13127151 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:user_home_t:s0 tclass=file type=SYSCALL msg=audit(1163776937.948:13037): arch=40000003 syscall=5 success=yes exit=3 a0=8dfedb8 a1=8000 a2=0 a3=8000 items=0 ppid=14970 pid=14973 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=USER_AUTH msg=audit(1163776943.384:13038): user pid=15016 uid=0 auid=500 subj=staff_u:staff_r:newrole_t:s0 msg='PAM: authentication acct=kmacmill : exe="/usr/bin/newrole" (hostname=?, addr=?, terminal=pts/1 res=success)' type=USER_ACCT msg=audit(1163776943.384:13039): user pid=15016 uid=0 auid=500 subj=staff_u:staff_r:newrole_t:s0 msg='PAM: accounting acct=kmacmill : exe="/usr/bin/newrole" (hostname=?, addr=?, terminal=pts/1 res=success)' type=AVC msg=audit(1163776949.573:13040): avc: denied { execheap } for pid=15050 comm="mono" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=process type=AVC msg=audit(1163776949.573:13040): avc: denied { execmem } for pid=15050 comm="mono" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=process type=SYSCALL msg=audit(1163776949.573:13040): arch=40000003 syscall=125 success=yes exit=0 a0=8a42000 a1=1000 a2=7 a3=1 items=0 ppid=1 pid=15050 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="mono" exe="/usr/bin/mono" subj=staff_u:staff_r:staff_t:s0 key=(null) type=USER_AVC msg=audit(1163776957.221:13041): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManagerInfo member=UserInterfaceActivated dest=org.freedesktop.DBus spid=14885 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=AVC msg=audit(1163776958.733:13042): avc: denied { write } for pid=15062 comm="nm-vpnc-auth-di" name="14281" dev=dm-0 ino=14567723 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:ice_tmp_t:s0 tclass=sock_file type=SYSCALL msg=audit(1163776958.733:13042): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=bfda95d0 a2=df7770 a3=16 items=0 ppid=14885 pid=15062 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="nm-vpnc-auth-di" exe="/usr/libexec/nm-vpnc-auth-dialog" subj=staff_u:staff_r:staff_t:s0 key=(null) type=USER_AVC msg=audit(1163776961.789:13043): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.VPNConnections member=activateVPNConnection dest=org.freedesktop.NetworkManager spid=14885 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163776961.789:13044): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManagerInfo member=UserInterfaceActivated dest=org.freedesktop.DBus spid=14885 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163776961.789:13045): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManagerInfo member=getVPNConnectionRoutes dest=org.freedesktop.NetworkManagerInfo spid=6687 tpid=14885 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163776961.793:13046): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.6 spid=14885 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163776961.793:13047): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManagerInfo member=getVPNConnectionVPNData dest=org.freedesktop.NetworkManagerInfo spid=6687 tpid=14885 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163776961.793:13048): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.6 spid=14885 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=AVC msg=audit(1163776961.941:13049): avc: denied { execute } for pid=15068 comm="sh" name="modprobe" dev=dm-0 ino=9984520 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:insmod_exec_t:s0 tclass=file type=AVC msg=audit(1163776961.941:13049): avc: denied { execute_no_trans } for pid=15068 comm="sh" name="modprobe" dev=dm-0 ino=9984520 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:insmod_exec_t:s0 tclass=file type=AVC msg=audit(1163776961.941:13049): avc: denied { read } for pid=15068 comm="sh" name="modprobe" dev=dm-0 ino=9984520 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:insmod_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163776961.941:13049): arch=40000003 syscall=11 success=yes exit=0 a0=9a0f6c0 a1=9a0f830 a2=9a0f770 a3=9a0f548 items=0 ppid=15067 pid=15068 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="modprobe" exe="/sbin/modprobe" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163776961.941:13049): path="/sbin/modprobe" type=AVC_PATH msg=audit(1163776961.941:13049): path="/sbin/modprobe" type=AVC msg=audit(1163776962.045:13050): avc: denied { read } for pid=15068 comm="modprobe" name="modules.dep" dev=dm-0 ino=13720574 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:modules_object_t:s0 tclass=file type=SYSCALL msg=audit(1163776962.045:13050): arch=40000003 syscall=5 success=yes exit=5 a0=86ae118 a1=0 a2=1b6 a3=86ae300 items=0 ppid=15067 pid=15068 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="modprobe" exe="/sbin/modprobe" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776962.101:13051): avc: denied { read write } for pid=15068 comm="modprobe" name="tun.ko" dev=dm-0 ino=13719702 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:modules_object_t:s0 tclass=file type=SYSCALL msg=audit(1163776962.101:13051): arch=40000003 syscall=5 success=yes exit=5 a0=86ae0bc a1=2 a2=0 a3=86ae0bc items=0 ppid=15067 pid=15068 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="modprobe" exe="/sbin/modprobe" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776962.153:13052): avc: denied { lock } for pid=15068 comm="modprobe" name="tun.ko" dev=dm-0 ino=13719702 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:modules_object_t:s0 tclass=file type=SYSCALL msg=audit(1163776962.153:13052): arch=40000003 syscall=221 success=yes exit=0 a0=5 a1=7 a2=bfb395e0 a3=bfb395e0 items=0 ppid=15067 pid=15068 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="modprobe" exe="/sbin/modprobe" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163776962.153:13052): path="/lib/modules/2.6.18-1.2849.fc6xen/kernel/drivers/net/tun.ko" type=USER_AVC msg=audit(1163776962.165:13053): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager.vpnc member=StateChange dest=org.freedesktop.DBus spid=15067 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163776962.213:13054): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager.VPNConnections member=VPNConnectionStateChange dest=org.freedesktop.DBus spid=6687 tpid=14885 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163776962.213:13055): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.vpnc member=startConnection dest=org.freedesktop.NetworkManager.vpnc spid=6687 tpid=15067 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163776962.213:13056): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager.vpnc member=StateChange dest=org.freedesktop.DBus spid=15067 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=AVC msg=audit(1163776962.213:13057): avc: denied { execute } for pid=15069 comm="nm-vpnc-service" name="vpnc" dev=dm-0 ino=10323010 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:vpnc_exec_t:s0 tclass=file type=AVC msg=audit(1163776962.213:13057): avc: denied { execute_no_trans } for pid=15069 comm="nm-vpnc-service" name="vpnc" dev=dm-0 ino=10323010 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:vpnc_exec_t:s0 tclass=file type=AVC msg=audit(1163776962.213:13057): avc: denied { read } for pid=15069 comm="nm-vpnc-service" name="vpnc" dev=dm-0 ino=10323010 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:vpnc_exec_t:s0 tclass=file type=USER_AVC msg=audit(1163776962.217:13058): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.6 spid=15067 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163776962.217:13059): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager.VPNConnections member=VPNConnectionStateChange dest=org.freedesktop.DBus spid=6687 tpid=14885 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=SYSCALL msg=audit(1163776962.213:13057): arch=40000003 syscall=11 success=yes exit=0 a0=804b8f3 a1=8e53518 a2=bf80aebc a3=0 items=0 ppid=15067 pid=15069 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vpnc" exe="/usr/sbin/vpnc" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163776962.213:13057): path="/usr/sbin/vpnc" type=AVC_PATH msg=audit(1163776962.213:13057): path="/usr/sbin/vpnc" type=AVC msg=audit(1163776962.237:13060): avc: denied { ipc_lock } for pid=15069 comm="vpnc" capability=14 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=capability type=SYSCALL msg=audit(1163776962.237:13060): arch=40000003 syscall=150 success=yes exit=0 a0=b7fad000 a1=4000 a2=57612c4 a3=b7fad000 items=0 ppid=15067 pid=15069 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vpnc" exe="/usr/sbin/vpnc" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776962.237:13061): avc: denied { name_bind } for pid=15069 comm="vpnc" src=500 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:isakmp_port_t:s0 tclass=udp_socket type=AVC msg=audit(1163776962.237:13061): avc: denied { net_bind_service } for pid=15069 comm="vpnc" capability=10 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=capability type=SYSCALL msg=audit(1163776962.237:13061): arch=40000003 syscall=102 success=yes exit=0 a0=2 a1=bfd59130 a2=805b6e8 a3=3 items=0 ppid=15067 pid=15069 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vpnc" exe="/usr/sbin/vpnc" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776962.257:13062): avc: denied { read write } for pid=15069 comm="vpnc" name="tun" dev=tmpfs ino=1473 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:tun_tap_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163776962.257:13062): arch=40000003 syscall=5 success=yes exit=4 a0=8058da4 a1=2 a2=1 a3=805c4c4 items=0 ppid=15067 pid=15069 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vpnc" exe="/usr/sbin/vpnc" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776962.257:13063): avc: denied { ioctl } for pid=15069 comm="vpnc" name="tun" dev=tmpfs ino=1473 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:tun_tap_device_t:s0 tclass=chr_file type=AVC msg=audit(1163776962.257:13063): avc: denied { net_admin } for pid=15069 comm="vpnc" capability=12 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=capability type=SYSCALL msg=audit(1163776962.257:13063): arch=40000003 syscall=54 success=yes exit=0 a0=4 a1=400454ca a2=bfd59148 a3=4 items=0 ppid=15067 pid=15069 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vpnc" exe="/usr/sbin/vpnc" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776962.257:13064): avc: denied { read } for pid=11049 comm="udevd" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=netlink_kobject_uevent_socket type=AVC_PATH msg=audit(1163776962.257:13063): path="/dev/net/tun" type=SYSCALL msg=audit(1163776962.257:13064): arch=40000003 syscall=102 success=yes exit=95 a0=a a1=bfedb480 a2=791234 a3=0 items=0 ppid=1 pid=11049 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="udevd" exe="/sbin/udevd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776962.257:13065): avc: denied { write } for pid=11049 comm="udevd" name=".udev" dev=tmpfs ino=1521 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:device_t:s0 tclass=dir type=AVC msg=audit(1163776962.257:13065): avc: denied { remove_name } for pid=11049 comm="udevd" name="failed" dev=tmpfs ino=3876 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:device_t:s0 tclass=dir type=AVC msg=audit(1163776962.257:13065): avc: denied { rmdir } for pid=11049 comm="udevd" name="failed" dev=tmpfs ino=3876 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:device_t:s0 tclass=dir type=SYSCALL msg=audit(1163776962.257:13065): arch=40000003 syscall=40 success=no exit=-39 a0=bfedae88 a1=2f2f2f2f a2=791234 a3=bfedae92 items=0 ppid=1 pid=11049 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="udevd" exe="/sbin/udevd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776962.257:13066): avc: denied { add_name } for pid=11049 comm="udevd" name="queue" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:device_t:s0 tclass=dir type=AVC msg=audit(1163776962.257:13066): avc: denied { create } for pid=11049 comm="udevd" name="queue" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:device_t:s0 tclass=dir type=SYSCALL msg=audit(1163776962.257:13066): arch=40000003 syscall=39 success=yes exit=0 a0=bfedae8c a1=1ed a2=791234 a3=bfedae8c items=0 ppid=1 pid=11049 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="udevd" exe="/sbin/udevd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776962.257:13067): avc: denied { write } for pid=11049 comm="udevd" name="queue" dev=tmpfs ino=160652 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:device_t:s0 tclass=dir type=AVC msg=audit(1163776962.257:13067): avc: denied { add_name } for pid=11049 comm="udevd" name="class@net@tun0" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:device_t:s0 tclass=dir type=AVC msg=audit(1163776962.257:13067): avc: denied { create } for pid=11049 comm="udevd" name="class@net@tun0" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:device_t:s0 tclass=file type=SYSCALL msg=audit(1163776962.257:13067): arch=40000003 syscall=5 success=yes exit=9 a0=bfedb2c8 a1=8241 a2=1a4 a3=8241 items=0 ppid=1 pid=11049 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="udevd" exe="/sbin/udevd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776962.337:13068): avc: denied { write } for pid=15073 comm="rename_device" name=".rename_device.lock" dev=tmpfs ino=160657 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:device_t:s0 tclass=file type=SYSCALL msg=audit(1163776962.337:13068): arch=40000003 syscall=4 success=yes exit=6272 a0=3 a1=8049769 a2=3ae1 a3=0 items=0 ppid=15072 pid=15073 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="rename_device" exe="/lib/udev/rename_device" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163776962.337:13068): path="/dev/.rename_device.lock" type=AVC msg=audit(1163776962.365:13069): avc: denied { unlink } for pid=15073 comm="rename_device" name=".rename_device.lock" dev=tmpfs ino=160657 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:device_t:s0 tclass=file type=SYSCALL msg=audit(1163776962.365:13069): arch=40000003 syscall=10 success=yes exit=0 a0=8049750 a1=ffffffff a2=bff9ffd1 a3=6a9ca0 items=0 ppid=15072 pid=15073 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="rename_device" exe="/lib/udev/rename_device" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776962.745:13070): avc: denied { remove_name } for pid=11049 comm="udevd" name="class@net@tun0" dev=tmpfs ino=160653 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:device_t:s0 tclass=dir type=SYSCALL msg=audit(1163776962.745:13070): arch=40000003 syscall=10 success=yes exit=0 a0=bfedb2b8 a1=24bff4 a2=791234 a3=791418 items=0 ppid=1 pid=11049 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="udevd" exe="/sbin/udevd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776962.745:13071): avc: denied { rmdir } for pid=11049 comm="udevd" name="queue" dev=tmpfs ino=160652 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:device_t:s0 tclass=dir type=SYSCALL msg=audit(1163776962.745:13071): arch=40000003 syscall=40 success=yes exit=0 a0=bfedae78 a1=2f2f2f2f a2=791234 a3=bfedae82 items=0 ppid=1 pid=11049 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="udevd" exe="/sbin/udevd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=USER_AVC msg=audit(1163776962.913:13072): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.vpnc member=signalIP4Config dest=org.freedesktop.NetworkManager.vpnc spid=15081 tpid=15067 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163776962.917:13073): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager.vpnc member=IP4Config dest=org.freedesktop.DBus spid=15067 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163776962.917:13074): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager.vpnc member=StateChange dest=org.freedesktop.DBus spid=15067 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163776962.921:13075): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManagerInfo member=getVPNConnectionRoutes dest=org.freedesktop.NetworkManagerInfo spid=6687 tpid=14885 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163776962.921:13076): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.6 spid=14885 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=AVC msg=audit(1163776962.921:13077): avc: denied { create } for pid=6687 comm="NetworkManager" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=packet_socket type=AVC msg=audit(1163776962.921:13077): avc: denied { net_raw } for pid=6687 comm="NetworkManager" capability=13 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=capability type=SYSCALL msg=audit(1163776962.921:13077): arch=40000003 syscall=102 success=yes exit=14 a0=1 a1=bfaf32b0 a2=8503fb8 a3=2 items=0 ppid=1 pid=6687 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="NetworkManager" exe="/usr/sbin/NetworkManager" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776962.921:13078): avc: denied { ioctl } for pid=6687 comm="NetworkManager" name="[160721]" dev=sockfs ino=160721 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=packet_socket type=SYSCALL msg=audit(1163776962.921:13078): arch=40000003 syscall=54 success=yes exit=0 a0=e a1=890b a2=bfaf3364 a3=8503fb8 items=0 ppid=1 pid=6687 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="NetworkManager" exe="/usr/sbin/NetworkManager" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163776962.921:13078): path="socket:[160721]" type=AVC msg=audit(1163776963.977:13079): avc: denied { execute } for pid=15082 comm="NetworkManager" name="ip" dev=dm-0 ino=9984563 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:ifconfig_exec_t:s0 tclass=file type=AVC msg=audit(1163776963.977:13079): avc: denied { execute_no_trans } for pid=15082 comm="NetworkManager" name="ip" dev=dm-0 ino=9984563 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:ifconfig_exec_t:s0 tclass=file type=AVC msg=audit(1163776963.977:13079): avc: denied { read } for pid=15082 comm="NetworkManager" name="ip" dev=dm-0 ino=9984563 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:ifconfig_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163776963.977:13079): arch=40000003 syscall=11 success=yes exit=0 a0=8503a98 a1=8503a78 a2=bfaf4160 a3=400 items=0 ppid=6687 pid=15082 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="ip" exe="/sbin/ip" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163776963.977:13079): path="/sbin/ip" type=AVC_PATH msg=audit(1163776963.977:13079): path="/sbin/ip" type=AVC msg=audit(1163776963.993:13080): avc: denied { write } for pid=6687 comm="NetworkManager" name="etc" dev=dm-0 ino=9329761 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=dir type=AVC msg=audit(1163776963.993:13080): avc: denied { add_name } for pid=6687 comm="NetworkManager" name="resolv.conf.tmp" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=dir type=AVC msg=audit(1163776963.993:13080): avc: denied { create } for pid=6687 comm="NetworkManager" name="resolv.conf.tmp" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1163776963.993:13080): arch=40000003 syscall=5 success=yes exit=14 a0=80892c8 a1=241 a2=1b6 a3=8504600 items=0 ppid=1 pid=6687 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="NetworkManager" exe="/usr/sbin/NetworkManager" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776963.993:13081): avc: denied { write } for pid=6687 comm="NetworkManager" name="resolv.conf.tmp" dev=dm-0 ino=9330239 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1163776963.993:13081): arch=40000003 syscall=4 success=yes exit=97 a0=e a1=b7fa1000 a2=61 a3=61 items=0 ppid=1 pid=6687 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="NetworkManager" exe="/usr/sbin/NetworkManager" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163776963.993:13081): path="/etc/resolv.conf.tmp" type=AVC msg=audit(1163776963.993:13082): avc: denied { remove_name } for pid=6687 comm="NetworkManager" name="resolv.conf.tmp" dev=dm-0 ino=9330239 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=dir type=AVC msg=audit(1163776963.993:13082): avc: denied { rename } for pid=6687 comm="NetworkManager" name="resolv.conf.tmp" dev=dm-0 ino=9330239 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:etc_t:s0 tclass=file type=AVC msg=audit(1163776963.993:13082): avc: denied { unlink } for pid=6687 comm="NetworkManager" name="resolv.conf" dev=dm-0 ino=9334568 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:net_conf_t:s0 tclass=file type=SYSCALL msg=audit(1163776963.993:13082): arch=40000003 syscall=38 success=yes exit=0 a0=80892c8 a1=8089313 a2=8094374 a3=808930e items=0 ppid=1 pid=6687 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="NetworkManager" exe="/usr/sbin/NetworkManager" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776963.993:13083): avc: denied { relabelfrom } for pid=12189 comm="restorecond" name="resolv.conf" dev=dm-0 ino=9330239 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:etc_t:s0 tclass=file type=AVC msg=audit(1163776963.993:13083): avc: denied { relabelto } for pid=12189 comm="restorecond" name="resolv.conf" dev=dm-0 ino=9330239 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:net_conf_t:s0 tclass=file type=SYSCALL msg=audit(1163776963.993:13083): arch=40000003 syscall=228 success=yes exit=0 a0=4 a1=ba70d3 a2=83853e0 a3=20 items=0 ppid=1 pid=12189 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="restorecond" exe="/usr/sbin/restorecond" subj=staff_u:staff_r:staff_t:s0 key=(null) type=USER_AVC msg=audit(1163776964.058:13084): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager.VPNConnections member=LoginBanner dest=org.freedesktop.DBus spid=6687 tpid=14885 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163776964.058:13085): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager.VPNConnections member=VPNConnectionStateChange dest=org.freedesktop.DBus spid=6687 tpid=14885 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=AVC msg=audit(1163776964.062:13086): avc: denied { sigchld } for pid=15086 comm="dbus-daemon" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_dbusd_t:s0 tclass=process type=SYSCALL msg=audit(1163776964.062:13086): arch=40000003 syscall=7 success=yes exit=0 a0=3aef a1=bff76c68 a2=1 a3=3aef items=0 ppid=14337 pid=15086 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="dbus-daemon" exe="/bin/dbus-daemon" subj=staff_u:staff_r:staff_dbusd_t:s0 key=(null) type=AVC msg=audit(1163776982.831:13087): avc: denied { write } for pid=15069 comm="vpnc" name="tun" dev=tmpfs ino=1473 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:tun_tap_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163776982.831:13087): arch=40000003 syscall=4 success=yes exit=52 a0=4 a1=805c570 a2=34 a3=bfd587e4 items=0 ppid=15067 pid=15069 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vpnc" exe="/usr/sbin/vpnc" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163776982.831:13087): path="/dev/net/tun" type=AVC msg=audit(1163776982.871:13088): avc: denied { read } for pid=15069 comm="vpnc" name="tun" dev=tmpfs ino=1473 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:tun_tap_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163776982.871:13088): arch=40000003 syscall=3 success=yes exit=52 a0=4 a1=805c5a0 a2=1000 a3=805c5a0 items=0 ppid=15067 pid=15069 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vpnc" exe="/usr/sbin/vpnc" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163776982.871:13088): path="/dev/net/tun" type=AVC msg=audit(1163776983.283:13089): avc: denied { read write } for pid=15095 comm="nautilus" name="befw11s4_v4_v1.52.02_000_FCC_code.bin" dev=dm-0 ino=14469650 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163776983.283:13089): arch=40000003 syscall=33 success=yes exit=0 a0=88dc870 a1=6 a2=412708 a3=9d items=0 ppid=1 pid=15095 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="nautilus" exe="/usr/bin/nautilus" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776987.567:13090): avc: denied { rename } for pid=15096 comm="nautilus" name="befw11s4_v4_v1.52.02_000_FCC_code.bin" dev=dm-0 ino=14469650 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163776987.567:13090): arch=40000003 syscall=38 success=yes exit=0 a0=891ff70 a1=88cb070 a2=bd4320 a3=b68d8160 items=0 ppid=1 pid=15096 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="nautilus" exe="/usr/bin/nautilus" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776992.283:13091): avc: denied { unlink } for pid=15097 comm="nautilus" name="befw11s4_v4_v1.52.02_000_FCC_code.bin" dev=dm-0 ino=14469650 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163776992.283:13091): arch=40000003 syscall=10 success=yes exit=0 a0=89c5160 a1=ffffffc3 a2=412708 a3=8755e91 items=0 ppid=1 pid=15097 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="nautilus" exe="/usr/bin/nautilus" subj=staff_u:staff_r:staff_t:s0 key=(null) type=USER_AUTH msg=audit(1163777035.842:13092): user pid=15125 uid=0 auid=500 subj=staff_u:staff_r:newrole_t:s0 msg='PAM: authentication acct=kmacmill : exe="/usr/bin/newrole" (hostname=?, addr=?, terminal=pts/1 res=success)' type=USER_ACCT msg=audit(1163777035.846:13093): user pid=15125 uid=0 auid=500 subj=staff_u:staff_r:newrole_t:s0 msg='PAM: accounting acct=kmacmill : exe="/usr/bin/newrole" (hostname=?, addr=?, terminal=pts/1 res=success)' type=AVC msg=audit(1163777043.974:13094): avc: denied { read } for pid=15158 comm="firefox-bin" name=".gdmOFJZIT" dev=dm-0 ino=14469449 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163777043.974:13094): arch=40000003 syscall=33 success=yes exit=0 a0=bfc4afcb a1=4 a2=da3a64 a3=bfc4afcb items=0 ppid=1 pid=15158 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163777043.974:13095): avc: denied { getattr } for pid=15158 comm="firefox-bin" name=".gdmOFJZIT" dev=dm-0 ino=14469449 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163777043.974:13095): arch=40000003 syscall=197 success=yes exit=0 a0=4 a1=bfc4804c a2=c4cff4 a3=9a0bd70 items=0 ppid=1 pid=15158 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163777043.974:13095): path="/tmp/.gdmOFJZIT" type=AVC msg=audit(1163777117.071:13096): avc: denied { write } for pid=15186 comm="gnome-terminal" name="14281" dev=dm-0 ino=14567723 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:ice_tmp_t:s0 tclass=sock_file type=SYSCALL msg=audit(1163777117.071:13096): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=bf9868e0 a2=df7770 a3=16 items=0 ppid=1 pid=15186 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-terminal" exe="/usr/bin/gnome-terminal" subj=staff_u:staff_r:staff_t:s0 key=(null) type=USER_ACCT msg=audit(1163777401.177:13097): user pid=15230 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1163777401.181:13098): login pid=15230 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1163777401.181:13099): user pid=15230 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1163777401.181:13100): user pid=15230 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1163777401.189:13101): avc: denied { execute } for pid=15231 comm="sh" name="sa1" dev=dm-0 ino=13061698 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:lib_t:s0 tclass=file type=AVC msg=audit(1163777401.189:13101): avc: denied { execute_no_trans } for pid=15231 comm="sh" name="sa1" dev=dm-0 ino=13061698 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1163777401.189:13101): arch=40000003 syscall=11 success=yes exit=0 a0=8a171b0 a1=8a17358 a2=8a17290 a3=8a17008 items=0 ppid=15230 pid=15231 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sa1" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163777401.189:13101): path="/usr/lib/sa/sa1" type=AVC msg=audit(1163777401.189:13102): avc: denied { execute } for pid=15231 comm="sa1" name="sadc" dev=dm-0 ino=11981401 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=AVC msg=audit(1163777401.189:13102): avc: denied { execute_no_trans } for pid=15231 comm="sa1" name="sadc" dev=dm-0 ino=11981401 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=AVC msg=audit(1163777401.189:13102): avc: denied { read } for pid=15231 comm="sa1" name="sadc" dev=dm-0 ino=11981401 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163777401.189:13102): arch=40000003 syscall=11 success=yes exit=0 a0=812ad48 a1=812a740 a2=812ad60 a3=812a740 items=0 ppid=15230 pid=15231 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163777401.189:13102): path="/usr/lib/sa/sadc" type=AVC_PATH msg=audit(1163777401.189:13102): path="/usr/lib/sa/sadc" type=AVC msg=audit(1163777401.193:13103): avc: denied { search } for pid=15231 comm="sadc" name="net" dev=proc ino=-268435432 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=dir type=AVC msg=audit(1163777401.193:13103): avc: denied { read } for pid=15231 comm="sadc" name="dev" dev=proc ino=-268434164 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=file type=SYSCALL msg=audit(1163777401.193:13103): arch=40000003 syscall=5 success=yes exit=3 a0=8050371 a1=0 a2=1b6 a3=8b4b7f8 items=0 ppid=15230 pid=15231 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163777401.193:13104): avc: denied { getattr } for pid=15231 comm="sadc" name="dev" dev=proc ino=-268434164 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=file type=SYSCALL msg=audit(1163777401.193:13104): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bfc0bd38 a2=8cdff4 a3=8b4b7f8 items=0 ppid=15230 pid=15231 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163777401.193:13104): path="/proc/net/dev" type=AVC msg=audit(1163777401.193:13105): avc: denied { search } for pid=15231 comm="sadc" name="sa" dev=dm-0 ino=14607631 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=dir type=SYSCALL msg=audit(1163777401.193:13105): arch=40000003 syscall=33 success=yes exit=0 a0=bfc0c0e4 a1=0 a2=bfc0bfd8 a3=bfc0bfe0 items=0 ppid=15230 pid=15231 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163777401.193:13106): avc: denied { read append } for pid=15231 comm="sadc" name="sa17" dev=dm-0 ino=14600257 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=file type=SYSCALL msg=audit(1163777401.193:13106): arch=40000003 syscall=5 success=yes exit=3 a0=bfc0c0e4 a1=402 a2=bfc0c2a8 a3=bfc0bfe0 items=0 ppid=15230 pid=15231 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163777401.193:13107): avc: denied { search } for pid=15231 comm="sadc" name="fs" dev=proc ino=-268435428 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=dir type=AVC msg=audit(1163777401.193:13107): avc: denied { read } for pid=15231 comm="sadc" name="dentry-state" dev=proc ino=-268435230 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=file type=SYSCALL msg=audit(1163777401.193:13107): arch=40000003 syscall=5 success=yes exit=4 a0=805037f a1=0 a2=1b6 a3=8b4c348 items=0 ppid=15230 pid=15231 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163777401.193:13108): avc: denied { getattr } for pid=15231 comm="sadc" name="dentry-state" dev=proc ino=-268435230 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=file type=SYSCALL msg=audit(1163777401.193:13108): arch=40000003 syscall=197 success=yes exit=0 a0=4 a1=bfc0bb90 a2=8cdff4 a3=8b4c348 items=0 ppid=15230 pid=15231 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163777401.193:13108): path="/proc/sys/fs/dentry-state" type=AVC msg=audit(1163777401.197:13109): avc: denied { search } for pid=15231 comm="sadc" name="rpc" dev=proc ino=-268433616 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_rpc_t:s0 tclass=dir type=SYSCALL msg=audit(1163777401.197:13109): arch=40000003 syscall=5 success=no exit=-2 a0=80502a5 a1=0 a2=1b6 a3=8b4c348 items=0 ppid=15230 pid=15231 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163777401.197:13110): avc: denied { lock } for pid=15231 comm="sadc" name="sa17" dev=dm-0 ino=14600257 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=file type=SYSCALL msg=audit(1163777401.197:13110): arch=40000003 syscall=143 success=yes exit=0 a0=3 a1=6 a2=bfc0bfe0 a3=3 items=0 ppid=15230 pid=15231 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163777401.197:13110): path="/var/log/sa/sa17" type=CRED_DISP msg=audit(1163777401.217:13111): user pid=15230 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1163777401.217:13112): user pid=15230 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1163777414.850:13113): avc: denied { read } for pid=15233 comm="emacs-x" name=".gdmOFJZIT" dev=dm-0 ino=14469449 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163777414.850:13113): arch=40000003 syscall=33 success=yes exit=0 a0=bfe5ffc2 a1=4 a2=da3a64 a3=bfe5ffc2 items=0 ppid=15101 pid=15233 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts2 comm="emacs-x" exe="/usr/bin/emacs-x" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163777475.445:13114): avc: denied { getattr } for pid=6659 comm="dbus-daemon" name="/" dev=dm-0 ino=2 scontext=staff_u:staff_r:staff_dbusd_t:s0 tcontext=system_u:object_r:fs_t:s0 tclass=filesystem type=SYSCALL msg=audit(1163777475.445:13114): arch=40000003 syscall=100 success=yes exit=0 a0=18 a1=bfcd52ac a2=c4eff4 a3=ffffffb8 items=0 ppid=1 pid=6659 auid=500 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) comm="dbus-daemon" exe="/bin/dbus-daemon" subj=staff_u:staff_r:staff_dbusd_t:s0 key=(null) type=AVC msg=audit(1163777530.661:13115): avc: denied { name_bind } for pid=15243 comm="synergys" src=24800 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:port_t:s0 tclass=tcp_socket type=AVC msg=audit(1163777530.661:13115): avc: denied { node_bind } for pid=15243 comm="synergys" src=24800 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:inaddr_any_node_t:s0 tclass=tcp_socket type=SYSCALL msg=audit(1163777530.661:13115): arch=40000003 syscall=102 success=yes exit=0 a0=2 a1=bf8243c0 a2=90170d8 a3=80b1220 items=0 ppid=15101 pid=15243 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts2 comm="synergys" exe="/usr/bin/synergys" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163777708.280:13116): avc: denied { read } for pid=14860 comm="gnome-panel" name=".recently-used.xbel" dev=dm-0 ino=11885042 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:staff_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163777708.280:13116): arch=40000003 syscall=5 success=yes exit=29 a0=8ab6a40 a1=8000 a2=0 a3=8000 items=0 ppid=1 pid=14860 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-panel" exe="/usr/bin/gnome-panel" subj=staff_u:staff_r:staff_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163777716.449:13117): security_compute_sid: invalid context staff_u:staff_r:staff_userhelper_t:s0 for scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:userhelper_exec_t:s0 tclass=process type=SYSCALL msg=audit(1163777716.449:13117): arch=40000003 syscall=11 success=yes exit=0 a0=804c35f a1=8f758c8 a2=bfeab04c a3=3 items=0 ppid=15255 pid=15256 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=(none) comm="userhelper" exe="/usr/sbin/userhelper" subj=staff_u:staff_r:staff_userhelper_t:s0 key=(null) type=AVC msg=audit(1163777716.533:13118): avc: denied { ioctl } for pid=15256 comm="userhelper" name="[154356]" dev=pipefs ino=154356 scontext=staff_u:staff_r:staff_userhelper_t:s0 tcontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tclass=fifo_file type=SYSCALL msg=audit(1163777716.533:13118): arch=40000003 syscall=54 success=no exit=-22 a0=1 a1=5401 a2=bfd276f8 a3=bfd27738 items=0 ppid=15255 pid=15256 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=(none) comm="userhelper" exe="/usr/sbin/userhelper" subj=staff_u:staff_r:staff_userhelper_t:s0 key=(null) type=AVC_PATH msg=audit(1163777716.533:13118): path="pipe:[154356]" type=USER_AUTH msg=audit(1163777721.373:13119): user pid=15256 uid=500 auid=500 subj=staff_u:staff_r:staff_userhelper_t:s0 msg='PAM: authentication acct=root : exe="/usr/sbin/userhelper" (hostname=?, addr=?, terminal=? res=success)' type=USER_ACCT msg=audit(1163777721.373:13120): user pid=15256 uid=500 auid=500 subj=staff_u:staff_r:staff_userhelper_t:s0 msg='PAM: accounting acct=root : exe="/usr/sbin/userhelper" (hostname=?, addr=?, terminal=? res=success)' type=AVC msg=audit(1163777721.377:13121): avc: denied { search } for pid=15256 comm="userhelper" name="kmacmill" dev=dm-0 ino=6547202 scontext=staff_u:staff_r:staff_userhelper_t:s0 tcontext=staff_u:object_r:staff_home_dir_t:s0 tclass=dir type=SYSCALL msg=audit(1163777721.377:13121): arch=40000003 syscall=5 success=no exit=-2 a0=bfd2a338 a1=8000 a2=1b6 a3=9ccbb98 items=0 ppid=15255 pid=15256 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="userhelper" exe="/usr/sbin/userhelper" subj=staff_u:staff_r:staff_userhelper_t:s0 key=(null) type=AVC msg=audit(1163777721.377:13122): avc: denied { search } for pid=15256 comm="userhelper" name="root" dev=dm-0 ino=13127137 scontext=staff_u:staff_r:staff_userhelper_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=SYSCALL msg=audit(1163777721.377:13122): arch=40000003 syscall=5 success=no exit=-2 a0=bfd2a338 a1=8000 a2=1b6 a3=9ccbcf0 items=0 ppid=15255 pid=15256 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=(none) comm="userhelper" exe="/usr/sbin/userhelper" subj=staff_u:staff_r:staff_userhelper_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163777721.381:13123): security_compute_sid: invalid context staff_u:staff_r:staff_userhelper_t:s0 for scontext=staff_u:staff_r:staff_userhelper_t:s0 tcontext=system_u:object_r:xauth_exec_t:s0 tclass=process type=AVC msg=audit(1163777721.381:13123): avc: denied { execute_no_trans } for pid=15257 comm="userhelper" name="xauth" dev=dm-0 ino=10326959 scontext=staff_u:staff_r:staff_userhelper_t:s0 tcontext=system_u:object_r:xauth_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163777721.381:13123): arch=40000003 syscall=11 success=yes exit=0 a0=126681 a1=bfd2b2fc a2=9cc6608 a3=4 items=0 ppid=15256 pid=15257 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_userhelper_t:s0 key=(null) type=AVC_PATH msg=audit(1163777721.381:13123): path="/usr/bin/xauth" type=AVC msg=audit(1163777721.381:13124): avc: denied { search } for pid=15257 comm="xauth" name="tmp" dev=dm-0 ino=14469313 scontext=staff_u:staff_r:staff_userhelper_t:s0 tcontext=system_u:object_r:tmp_t:s0 tclass=dir type=SYSCALL msg=audit(1163777721.381:13124): arch=40000003 syscall=195 success=no exit=-2 a0=bfcd15c7 a1=bfcd10dc a2=fa6ff4 a3=bfcd10dc items=0 ppid=15256 pid=15257 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_userhelper_t:s0 key=(null) type=AVC msg=audit(1163777721.381:13125): avc: denied { write } for pid=15257 comm="xauth" name="tmp" dev=dm-0 ino=14469313 scontext=staff_u:staff_r:staff_userhelper_t:s0 tcontext=system_u:object_r:tmp_t:s0 tclass=dir type=AVC msg=audit(1163777721.381:13125): avc: denied { add_name } for pid=15257 comm="xauth" name=".gdmOFJZIT-c" scontext=staff_u:staff_r:staff_userhelper_t:s0 tcontext=system_u:object_r:tmp_t:s0 tclass=dir type=AVC msg=audit(1163777721.381:13125): avc: denied { create } for pid=15257 comm="xauth" name=".gdmOFJZIT-c" scontext=staff_u:staff_r:staff_userhelper_t:s0 tcontext=staff_u:object_r:tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163777721.381:13125): arch=40000003 syscall=5 success=yes exit=2 a0=bfcd15c7 a1=c1 a2=180 a3=ffffffff items=0 ppid=15256 pid=15257 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_userhelper_t:s0 key=(null) type=AVC msg=audit(1163777721.381:13126): avc: denied { link } for pid=15257 comm="xauth" name=".gdmOFJZIT-c" dev=dm-0 ino=14469399 scontext=staff_u:staff_r:staff_userhelper_t:s0 tcontext=staff_u:object_r:tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163777721.381:13126): arch=40000003 syscall=9 success=yes exit=0 a0=bfcd15c7 a1=bfcd11c6 a2=da3a64 a3=2 items=0 ppid=15256 pid=15257 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_userhelper_t:s0 key=(null) type=AVC msg=audit(1163777721.381:13127): avc: denied { write } for pid=15257 comm="xauth" name=".gdmOFJZIT" dev=dm-0 ino=14469449 scontext=staff_u:staff_r:staff_userhelper_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163777721.381:13127): arch=40000003 syscall=33 success=yes exit=0 a0=bfcd1f0e a1=2 a2=bfcd1af0 a3=0 items=0 ppid=15256 pid=15257 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_userhelper_t:s0 key=(null) type=AVC msg=audit(1163777721.381:13128): avc: denied { read } for pid=15257 comm="xauth" name=".gdmOFJZIT" dev=dm-0 ino=14469449 scontext=staff_u:staff_r:staff_userhelper_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163777721.381:13128): arch=40000003 syscall=5 success=yes exit=2 a0=bfcd1f0e a1=0 a2=1b6 a3=8b8c008 items=0 ppid=15256 pid=15257 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_userhelper_t:s0 key=(null) type=AVC msg=audit(1163777721.381:13129): avc: denied { getattr } for pid=15257 comm="xauth" name=".gdmOFJZIT" dev=dm-0 ino=14469449 scontext=staff_u:staff_r:staff_userhelper_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163777721.381:13129): arch=40000003 syscall=197 success=yes exit=0 a0=2 a1=bfcd183c a2=fa6ff4 a3=8b8c008 items=0 ppid=15256 pid=15257 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_userhelper_t:s0 key=(null) type=AVC_PATH msg=audit(1163777721.381:13129): path="/tmp/.gdmOFJZIT" type=AVC msg=audit(1163777721.381:13130): avc: denied { remove_name } for pid=15257 comm="xauth" name=".gdmOFJZIT-c" dev=dm-0 ino=14469399 scontext=staff_u:staff_r:staff_userhelper_t:s0 tcontext=system_u:object_r:tmp_t:s0 tclass=dir type=AVC msg=audit(1163777721.381:13130): avc: denied { unlink } for pid=15257 comm="xauth" name=".gdmOFJZIT-c" dev=dm-0 ino=14469399 scontext=staff_u:staff_r:staff_userhelper_t:s0 tcontext=staff_u:object_r:tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163777721.381:13130): arch=40000003 syscall=10 success=yes exit=0 a0=bfcd11b7 a1=bfcd0dc6 a2=da3a64 a3=bfcd0db6 items=0 ppid=15256 pid=15257 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_userhelper_t:s0 key=(null) type=AVC msg=audit(1163777721.389:13131): avc: denied { write } for pid=15256 comm="userhelper" name="root" dev=dm-0 ino=13127137 scontext=staff_u:staff_r:staff_userhelper_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1163777721.389:13131): avc: denied { add_name } for pid=15256 comm="userhelper" name=".xauthfd6Dm8" scontext=staff_u:staff_r:staff_userhelper_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1163777721.389:13131): avc: denied { create } for pid=15256 comm="userhelper" name=".xauthfd6Dm8" scontext=staff_u:staff_r:staff_userhelper_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163777721.389:13131): arch=40000003 syscall=5 success=yes exit=5 a0=9ccbdfb a1=80c2 a2=180 a3=80c2 items=0 ppid=15255 pid=15256 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=(none) comm="userhelper" exe="/usr/sbin/userhelper" subj=staff_u:staff_r:staff_userhelper_t:s0 key=(null) type=AVC msg=audit(1163777721.389:13132): avc: denied { setattr } for pid=15256 comm="userhelper" name=".xauthfd6Dm8" dev=dm-0 ino=13127382 scontext=staff_u:staff_r:staff_userhelper_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163777721.389:13132): arch=40000003 syscall=207 success=yes exit=0 a0=5 a1=0 a2=0 a3=1265bf items=0 ppid=15255 pid=15256 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=(none) comm="userhelper" exe="/usr/sbin/userhelper" subj=staff_u:staff_r:staff_userhelper_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163777721.401:13133): security_compute_sid: invalid context staff_u:staff_r:staff_userhelper_t:s0 for scontext=staff_u:staff_r:staff_userhelper_t:s0 tcontext=system_u:object_r:xauth_exec_t:s0 tclass=process type=SYSCALL msg=audit(1163777721.401:13133): arch=40000003 syscall=11 success=yes exit=0 a0=126681 a1=bfd2b2fc a2=9cc6608 a3=4 items=0 ppid=15256 pid=15258 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_userhelper_t:s0 key=(null) type=AVC msg=audit(1163777721.401:13134): avc: denied { link } for pid=15258 comm="xauth" name=".xauthfd6Dm8-c" dev=dm-0 ino=13127386 scontext=staff_u:staff_r:staff_userhelper_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163777721.401:13134): arch=40000003 syscall=9 success=yes exit=0 a0=bf843937 a1=bf843536 a2=da3a64 a3=2 items=0 ppid=15256 pid=15258 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_userhelper_t:s0 key=(null) type=AVC msg=audit(1163777721.401:13135): avc: denied { write } for pid=15258 comm="xauth" name=".xauthfd6Dm8" dev=dm-0 ino=13127382 scontext=staff_u:staff_r:staff_userhelper_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163777721.401:13135): arch=40000003 syscall=33 success=yes exit=0 a0=bf844f0a a1=2 a2=bf843e60 a3=0 items=0 ppid=15256 pid=15258 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_userhelper_t:s0 key=(null) type=AVC msg=audit(1163777721.401:13136): avc: denied { read } for pid=15258 comm="xauth" name=".xauthfd6Dm8" dev=dm-0 ino=13127382 scontext=staff_u:staff_r:staff_userhelper_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163777721.401:13136): arch=40000003 syscall=5 success=yes exit=2 a0=bf844f0a a1=0 a2=1b6 a3=8ae8008 items=0 ppid=15256 pid=15258 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_userhelper_t:s0 key=(null) type=AVC msg=audit(1163777721.401:13137): avc: denied { getattr } for pid=15258 comm="xauth" name=".xauthfd6Dm8" dev=dm-0 ino=13127382 scontext=staff_u:staff_r:staff_userhelper_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163777721.401:13137): arch=40000003 syscall=197 success=yes exit=0 a0=2 a1=bf843bac a2=672ff4 a3=8ae8008 items=0 ppid=15256 pid=15258 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_userhelper_t:s0 key=(null) type=AVC_PATH msg=audit(1163777721.401:13137): path="/root/.xauthfd6Dm8" type=AVC msg=audit(1163777721.405:13138): avc: denied { remove_name } for pid=15258 comm="xauth" name=".xauthfd6Dm8" dev=dm-0 ino=13127382 scontext=staff_u:staff_r:staff_userhelper_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1163777721.405:13138): avc: denied { unlink } for pid=15258 comm="xauth" name=".xauthfd6Dm8" dev=dm-0 ino=13127382 scontext=staff_u:staff_r:staff_userhelper_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163777721.405:13138): arch=40000003 syscall=10 success=yes exit=0 a0=8ae8008 a1=1000 a2=0 a3=8ae808a items=0 ppid=15256 pid=15258 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_userhelper_t:s0 key=(null) type=USER_START msg=audit(1163777721.453:13139): user pid=15256 uid=500 auid=500 subj=staff_u:staff_r:staff_userhelper_t:s0 msg='PAM: session open acct=root : exe="/usr/sbin/userhelper" (hostname=?, addr=?, terminal=? res=success)' type=AVC msg=audit(1163777721.597:13140): avc: denied { read } for pid=15259 comm="system-config-s" name=".xauthfd6Dm8" dev=dm-0 ino=13127388 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163777721.597:13140): arch=40000003 syscall=33 success=yes exit=0 a0=bf897fa3 a1=4 a2=2eda64 a3=bf897fa3 items=0 ppid=15256 pid=15259 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="system-config-s" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163777721.721:13141): avc: denied { dac_override } for pid=15259 comm="system-config-s" capability=1 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=capability type=SYSCALL msg=audit(1163777721.721:13141): arch=40000003 syscall=5 success=no exit=-2 a0=902dc50 a1=8000 a2=1b6 a3=90211e0 items=0 ppid=15256 pid=15259 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="system-config-s" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163777724.001:13142): avc: denied { lock } for pid=14914 comm="pam_timestamp_c" name="utmp" dev=dm-0 ino=14436583 scontext=staff_u:staff_r:pam_t:s0 tcontext=system_u:object_r:initrc_var_run_t:s0 tclass=file type=SYSCALL msg=audit(1163777724.001:13142): arch=40000003 syscall=221 success=yes exit=0 a0=3 a1=7 a2=bf8bcea8 a3=0 items=0 ppid=14912 pid=14914 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=(none) comm="pam_timestamp_c" exe="/sbin/pam_timestamp_check" subj=staff_u:staff_r:pam_t:s0 key=(null) type=AVC_PATH msg=audit(1163777724.001:13142): path="/var/run/utmp" type=AVC msg=audit(1163777741.434:13143): avc: denied { write } for pid=15262 comm="lokkit" name="sysconfig" dev=dm-0 ino=9329763 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=dir type=AVC msg=audit(1163777741.434:13143): avc: denied { add_name } for pid=15262 comm="lokkit" name="new-iptables-config" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=dir type=AVC msg=audit(1163777741.434:13143): avc: denied { create } for pid=15262 comm="lokkit" name="new-iptables-config" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1163777741.434:13143): arch=40000003 syscall=5 success=yes exit=4 a0=805049c a1=241 a2=1b6 a3=8582f20 items=0 ppid=15259 pid=15262 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="lokkit" exe="/usr/sbin/lokkit" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163777741.442:13144): avc: denied { write } for pid=15262 comm="lokkit" name="new-iptables-config" dev=dm-0 ino=9330913 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1163777741.442:13144): arch=40000003 syscall=4 success=yes exit=1763 a0=4 a1=b7fcf000 a2=6e3 a3=6e3 items=0 ppid=15259 pid=15262 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="lokkit" exe="/usr/sbin/lokkit" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163777741.442:13144): path="/etc/sysconfig/new-iptables-config" type=AVC msg=audit(1163777741.442:13145): avc: denied { remove_name } for pid=15262 comm="lokkit" name="new-iptables-config" dev=dm-0 ino=9330913 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=dir type=AVC msg=audit(1163777741.442:13145): avc: denied { rename } for pid=15262 comm="lokkit" name="new-iptables-config" dev=dm-0 ino=9330913 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:etc_t:s0 tclass=file type=AVC msg=audit(1163777741.442:13145): avc: denied { unlink } for pid=15262 comm="lokkit" name="iptables-config" dev=dm-0 ino=9332021 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1163777741.442:13145): arch=40000003 syscall=38 success=yes exit=0 a0=805049c a1=805047c a2=0 a3=8583092 items=0 ppid=15259 pid=15262 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="lokkit" exe="/usr/sbin/lokkit" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163777741.486:13146): avc: denied { write } for pid=15262 comm="lokkit" name="iptables" dev=dm-0 ino=9331367 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1163777741.486:13146): arch=40000003 syscall=5 success=yes exit=3 a0=804e5a6 a1=241 a2=1b6 a3=8584038 items=0 ppid=15259 pid=15262 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="lokkit" exe="/usr/sbin/lokkit" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163777741.494:13147): avc: denied { setattr } for pid=15262 comm="lokkit" name="iptables" dev=dm-0 ino=9331367 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1163777741.494:13147): arch=40000003 syscall=15 success=yes exit=0 a0=804e5a6 a1=180 a2=8584030 a3=8584038 items=0 ppid=15259 pid=15262 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="lokkit" exe="/usr/sbin/lokkit" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163777741.494:13148): avc: denied { unlink } for pid=15262 comm="lokkit" name="iptables-config" dev=dm-0 ino=9330913 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1163777741.494:13148): arch=40000003 syscall=38 success=yes exit=0 a0=805049c a1=805047c a2=0 a3=8584312 items=0 ppid=15259 pid=15262 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="lokkit" exe="/usr/sbin/lokkit" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163777741.498:13149): avc: denied { execute } for pid=15264 comm="sh" name="modprobe" dev=dm-0 ino=9984520 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:insmod_exec_t:s0 tclass=file type=AVC msg=audit(1163777741.498:13149): avc: denied { execute_no_trans } for pid=15264 comm="sh" name="modprobe" dev=dm-0 ino=9984520 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:insmod_exec_t:s0 tclass=file type=AVC msg=audit(1163777741.498:13149): avc: denied { read } for pid=15264 comm="sh" name="modprobe" dev=dm-0 ino=9984520 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:insmod_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163777741.498:13149): arch=40000003 syscall=11 success=yes exit=0 a0=89bfd90 a1=89bff30 a2=89bfe28 a3=89bfbe8 items=0 ppid=15263 pid=15264 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="modprobe" exe="/sbin/modprobe" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163777741.498:13149): path="/sbin/modprobe" type=AVC_PATH msg=audit(1163777741.498:13149): path="/sbin/modprobe" type=AVC msg=audit(1163777741.502:13150): avc: denied { read } for pid=15264 comm="modprobe" name="modules.dep" dev=dm-0 ino=13720574 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:modules_object_t:s0 tclass=file type=SYSCALL msg=audit(1163777741.502:13150): arch=40000003 syscall=5 success=yes exit=3 a0=963a118 a1=0 a2=1b6 a3=963a300 items=0 ppid=15263 pid=15264 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="modprobe" exe="/sbin/modprobe" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163777741.594:13151): avc: denied { execute } for pid=15266 comm="service" name="iptables" dev=dm-0 ino=9331831 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163777741.594:13151): arch=40000003 syscall=33 success=yes exit=0 a0=863a578 a1=1 a2=1 a3=862d718 items=0 ppid=15265 pid=15266 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="service" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163777741.658:13152): avc: denied { execute_no_trans } for pid=15273 comm="env" name="iptables" dev=dm-0 ino=9331831 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=file type=AVC msg=audit(1163777741.658:13152): avc: denied { read } for pid=15273 comm="env" name="iptables" dev=dm-0 ino=9331831 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163777741.658:13152): arch=40000003 syscall=11 success=yes exit=0 a0=bf805efb a1=bf804dc8 a2=9700858 a3=5 items=0 ppid=15266 pid=15273 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="iptables" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163777741.658:13152): path="/etc/rc.d/init.d/iptables" type=AVC_PATH msg=audit(1163777741.658:13152): path="/etc/rc.d/init.d/iptables" type=AVC msg=audit(1163777741.682:13153): avc: denied { ioctl } for pid=15273 comm="iptables" name="iptables" dev=dm-0 ino=9331831 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163777741.682:13153): arch=40000003 syscall=54 success=no exit=-25 a0=3 a1=5401 a2=bfd1f068 a3=bfd1f0a8 items=0 ppid=15266 pid=15273 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="iptables" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163777741.682:13153): path="/etc/rc.d/init.d/iptables" type=AVC msg=audit(1163777741.702:13154): avc: denied { execute } for pid=15273 comm="iptables" name="iptables" dev=dm-0 ino=9984709 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:iptables_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163777741.702:13154): arch=40000003 syscall=33 success=yes exit=0 a0=83689a0 a1=1 a2=2 a3=834f7d8 items=0 ppid=15266 pid=15273 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="iptables" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163777741.786:13155): avc: denied { read } for pid=15273 comm="iptables" name="iptables" dev=dm-0 ino=9984709 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:iptables_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163777741.786:13155): arch=40000003 syscall=33 success=yes exit=0 a0=8373188 a1=4 a2=ffffffff a3=8373188 items=0 ppid=15266 pid=15273 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="iptables" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163777741.786:13156): avc: denied { execute_no_trans } for pid=15284 comm="iptables" name="iptables" dev=dm-0 ino=9984709 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:iptables_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163777741.786:13156): arch=40000003 syscall=11 success=yes exit=0 a0=8373188 a1=8372d68 a2=835ab98 a3=8372d38 items=0 ppid=15273 pid=15284 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="iptables" exe="/sbin/iptables" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163777741.786:13156): path="/sbin/iptables" type=AVC msg=audit(1163777741.806:13157): avc: denied { create } for pid=15284 comm="iptables" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=rawip_socket type=AVC msg=audit(1163777741.806:13157): avc: denied { net_raw } for pid=15284 comm="iptables" capability=13 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=capability type=SYSCALL msg=audit(1163777741.806:13157): arch=40000003 syscall=102 success=yes exit=3 a0=1 a1=bfcd8050 a2=8055864 a3=bfcd8f86 items=0 ppid=15273 pid=15284 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="iptables" exe="/sbin/iptables" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163777741.806:13158): avc: denied { getopt } for pid=15284 comm="iptables" lport=255 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=rawip_socket type=AVC msg=audit(1163777741.806:13158): avc: denied { net_admin } for pid=15284 comm="iptables" capability=12 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=capability type=SYSCALL msg=audit(1163777741.806:13158): arch=40000003 syscall=102 success=yes exit=0 a0=f a1=bfcd8050 a2=8055864 a3=bfcd8f86 items=0 ppid=15273 pid=15284 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="iptables" exe="/sbin/iptables" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163777741.806:13159): avc: denied { setopt } for pid=15284 comm="iptables" lport=255 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=rawip_socket type=SYSCALL msg=audit(1163777741.806:13159): arch=40000003 syscall=102 success=yes exit=0 a0=e a1=bfcd8250 a2=8055864 a3=9e49b28 items=0 ppid=15273 pid=15284 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="iptables" exe="/sbin/iptables" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163777741.950:13160): avc: denied { read write } for pid=15301 comm="modprobe" name="iptable_filter.ko" dev=dm-0 ino=13720289 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:modules_object_t:s0 tclass=file type=SYSCALL msg=audit(1163777741.950:13160): arch=40000003 syscall=5 success=yes exit=3 a0=86d10bc a1=2 a2=0 a3=86d10bc items=0 ppid=15273 pid=15301 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="modprobe" exe="/sbin/modprobe" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163777742.050:13161): avc: denied { lock } for pid=15301 comm="modprobe" name="iptable_filter.ko" dev=dm-0 ino=13720289 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:modules_object_t:s0 tclass=file type=SYSCALL msg=audit(1163777742.050:13161): arch=40000003 syscall=221 success=yes exit=0 a0=3 a1=7 a2=bf990460 a3=bf990460 items=0 ppid=15273 pid=15301 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="modprobe" exe="/sbin/modprobe" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163777742.050:13161): path="/lib/modules/2.6.18-1.2849.fc6xen/kernel/net/ipv4/netfilter/iptable_filter.ko" type=AVC msg=audit(1163777742.050:13162): avc: denied { sys_module } for pid=15301 comm="modprobe" capability=16 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=capability type=AVC msg=audit(1163777742.098:13163): avc: denied { read } for pid=11049 comm="udevd" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=netlink_kobject_uevent_socket type=SYSCALL msg=audit(1163777742.098:13163): arch=40000003 syscall=102 success=yes exit=103 a0=a a1=bfedb480 a2=791234 a3=0 items=0 ppid=1 pid=11049 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="udevd" exe="/sbin/udevd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163777742.098:13164): avc: denied { write } for pid=11049 comm="udevd" name="uevent_seqnum" dev=tmpfs ino=1522 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:udev_tbl_t:s0 tclass=file type=SYSCALL msg=audit(1163777742.098:13164): arch=40000003 syscall=5 success=yes exit=9 a0=bfee5668 a1=8241 a2=1a4 a3=8241 items=0 ppid=1 pid=11049 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="udevd" exe="/sbin/udevd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163777742.098:13165): avc: denied { write } for pid=11049 comm="udevd" name=".udev" dev=tmpfs ino=1521 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:device_t:s0 tclass=dir type=AVC msg=audit(1163777742.098:13165): avc: denied { remove_name } for pid=11049 comm="udevd" name="failed" dev=tmpfs ino=3876 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:device_t:s0 tclass=dir type=AVC msg=audit(1163777742.098:13165): avc: denied { rmdir } for pid=11049 comm="udevd" name="failed" dev=tmpfs ino=3876 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:device_t:s0 tclass=dir type=SYSCALL msg=audit(1163777742.098:13165): arch=40000003 syscall=40 success=no exit=-39 a0=bfedae88 a1=2f2f2f2f a2=791234 a3=bfedae92 items=0 ppid=1 pid=11049 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="udevd" exe="/sbin/udevd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163777742.098:13166): avc: denied { add_name } for pid=11049 comm="udevd" name="queue" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:device_t:s0 tclass=dir type=AVC msg=audit(1163777742.098:13166): avc: denied { create } for pid=11049 comm="udevd" name="queue" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:device_t:s0 tclass=dir type=SYSCALL msg=audit(1163777742.098:13166): arch=40000003 syscall=39 success=yes exit=0 a0=bfedae8c a1=1ed a2=791234 a3=bfedae8c items=0 ppid=1 pid=11049 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="udevd" exe="/sbin/udevd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163777742.098:13167): avc: denied { write } for pid=11049 comm="udevd" name="queue" dev=tmpfs ino=161994 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:device_t:s0 tclass=dir type=AVC msg=audit(1163777742.098:13167): avc: denied { add_name } for pid=11049 comm="udevd" name="module@iptable_filter" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:device_t:s0 tclass=dir type=AVC msg=audit(1163777742.098:13167): avc: denied { create } for pid=11049 comm="udevd" name="module@iptable_filter" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:device_t:s0 tclass=file type=SYSCALL msg=audit(1163777742.098:13167): arch=40000003 syscall=5 success=yes exit=9 a0=bfedb2c8 a1=8241 a2=1a4 a3=8241 items=0 ppid=1 pid=11049 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="udevd" exe="/sbin/udevd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163777742.098:13168): avc: denied { remove_name } for pid=11049 comm="udevd" name="module@iptable_filter" dev=tmpfs ino=161995 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:device_t:s0 tclass=dir type=AVC msg=audit(1163777742.098:13168): avc: denied { unlink } for pid=11049 comm="udevd" name="module@iptable_filter" dev=tmpfs ino=161995 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:device_t:s0 tclass=file type=SYSCALL msg=audit(1163777742.098:13168): arch=40000003 syscall=10 success=yes exit=0 a0=bfedb2b8 a1=24bff4 a2=791234 a3=791418 items=0 ppid=1 pid=11049 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="udevd" exe="/sbin/udevd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163777742.098:13169): avc: denied { rmdir } for pid=11049 comm="udevd" name="queue" dev=tmpfs ino=161994 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:device_t:s0 tclass=dir type=SYSCALL msg=audit(1163777742.098:13169): arch=40000003 syscall=40 success=yes exit=0 a0=bfedae78 a1=2f2f2f2f a2=791234 a3=bfedae82 items=0 ppid=1 pid=11049 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="udevd" exe="/sbin/udevd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=SYSCALL msg=audit(1163777742.050:13162): arch=40000003 syscall=129 success=yes exit=0 a0=86d1150 a1=80 a2=86d10bc a3=0 items=0 ppid=15273 pid=15301 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="modprobe" exe="/sbin/modprobe" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163777742.258:13170): avc: denied { write } for pid=15343 comm="rm" name="subsys" dev=dm-0 ino=14436611 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:var_lock_t:s0 tclass=dir type=AVC msg=audit(1163777742.258:13170): avc: denied { remove_name } for pid=15343 comm="rm" name="iptables" dev=dm-0 ino=14436590 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:var_lock_t:s0 tclass=dir type=AVC msg=audit(1163777742.258:13170): avc: denied { unlink } for pid=15343 comm="rm" name="iptables" dev=dm-0 ino=14436590 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:var_lock_t:s0 tclass=file type=SYSCALL msg=audit(1163777742.258:13170): arch=40000003 syscall=10 success=yes exit=0 a0=bfbabf84 a1=0 a2=805277c a3=bfbaa994 items=0 ppid=15273 pid=15343 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="rm" exe="/bin/rm" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163777742.270:13171): avc: denied { read } for pid=15344 comm="iptables-restor" name="modprobe" dev=proc ino=-268435399 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:sysctl_modprobe_t:s0 tclass=file type=SYSCALL msg=audit(1163777742.270:13171): arch=40000003 syscall=5 success=yes exit=4 a0=8052b9c a1=0 a2=0 a3=bf8f8ab6 items=0 ppid=15273 pid=15344 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="iptables-restor" exe="/sbin/iptables-restore" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163777742.522:13172): avc: denied { add_name } for pid=15358 comm="touch" name="iptables" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:var_lock_t:s0 tclass=dir type=AVC msg=audit(1163777742.522:13172): avc: denied { create } for pid=15358 comm="touch" name="iptables" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:var_lock_t:s0 tclass=file type=SYSCALL msg=audit(1163777742.522:13172): arch=40000003 syscall=5 success=yes exit=0 a0=bfe09f7e a1=8941 a2=1b6 a3=8941 items=0 ppid=15273 pid=15358 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="touch" exe="/bin/touch" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163777742.522:13173): avc: denied { write } for pid=15358 comm="touch" name="iptables" dev=dm-0 ino=14436590 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:var_lock_t:s0 tclass=file type=SYSCALL msg=audit(1163777742.522:13173): arch=40000003 syscall=271 success=yes exit=0 a0=bfe07ea4 a1=0 a2=3bfff4 a3=0 items=0 ppid=15273 pid=15358 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="touch" exe="/bin/touch" subj=staff_u:staff_r:staff_t:s0 key=(null) type=USER_END msg=audit(1163777886.823:13174): user pid=15256 uid=500 auid=500 subj=staff_u:staff_r:staff_userhelper_t:s0 msg='PAM: session close acct=root : exe="/usr/sbin/userhelper" (hostname=?, addr=?, terminal=? res=success)' type=AVC msg=audit(1163777906.000:13175): avc: denied { lock } for pid=14914 comm="pam_timestamp_c" name="utmp" dev=dm-0 ino=14436583 scontext=staff_u:staff_r:pam_t:s0 tcontext=system_u:object_r:initrc_var_run_t:s0 tclass=file type=SYSCALL msg=audit(1163777906.000:13175): arch=40000003 syscall=221 success=yes exit=0 a0=3 a1=7 a2=bf8bcea8 a3=0 items=0 ppid=14912 pid=14914 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=(none) comm="pam_timestamp_c" exe="/sbin/pam_timestamp_check" subj=staff_u:staff_r:pam_t:s0 key=(null) type=AVC_PATH msg=audit(1163777906.000:13175): path="/var/run/utmp" type=AVC msg=audit(1163777929.238:13176): avc: denied { read } for pid=15443 comm="firefox-bin" name=".gdmOFJZIT" dev=dm-0 ino=14469449 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163777929.238:13176): arch=40000003 syscall=33 success=yes exit=0 a0=bfb72fcb a1=4 a2=da3a64 a3=bfb72fcb items=0 ppid=1 pid=15443 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163777929.238:13177): avc: denied { getattr } for pid=15443 comm="firefox-bin" name=".gdmOFJZIT" dev=dm-0 ino=14469449 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163777929.238:13177): arch=40000003 syscall=197 success=yes exit=0 a0=4 a1=bfb718ac a2=d15ff4 a3=86b4d70 items=0 ppid=1 pid=15443 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163777929.238:13177): path="/tmp/.gdmOFJZIT" type=AVC msg=audit(1163777943.743:13178): avc: denied { read } for pid=15069 comm="vpnc" name="tun" dev=tmpfs ino=1473 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:tun_tap_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163777943.743:13178): arch=40000003 syscall=3 success=yes exit=71 a0=4 a1=805c5a0 a2=1000 a3=805c5a0 items=0 ppid=15067 pid=15069 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vpnc" exe="/usr/sbin/vpnc" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163777943.743:13178): path="/dev/net/tun" type=AVC msg=audit(1163777943.855:13179): avc: denied { write } for pid=15069 comm="vpnc" name="tun" dev=tmpfs ino=1473 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:tun_tap_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163777943.855:13179): arch=40000003 syscall=4 success=yes exit=150 a0=4 a1=805c570 a2=96 a3=bfd587e4 items=0 ppid=15067 pid=15069 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vpnc" exe="/usr/sbin/vpnc" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163777943.855:13179): path="/dev/net/tun" type=AVC msg=audit(1163777959.560:13180): avc: denied { execute } for pid=15443 comm="firefox-bin" name="libflashplayer.so" dev=dm-0 ino=6547382 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_mozilla_home_t:s0 tclass=file type=SYSCALL msg=audit(1163777959.560:13180): arch=40000003 syscall=192 success=yes exit=110735360 a0=0 a1=738dbc a2=5 a3=802 items=0 ppid=1 pid=15443 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163777959.560:13180): path="/home/kmacmill/.mozilla/plugins/libflashplayer.so" type=AVC msg=audit(1163777966.268:13181): avc: denied { execstack } for pid=15443 comm="firefox-bin" scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_mozilla_t:s0 tclass=process type=AVC msg=audit(1163777966.268:13181): avc: denied { execmem } for pid=15443 comm="firefox-bin" scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_mozilla_t:s0 tclass=process type=SYSCALL msg=audit(1163777966.268:13181): arch=40000003 syscall=125 success=yes exit=0 a0=bfb72000 a1=1000 a2=1000007 a3=fffff000 items=0 ppid=1 pid=15443 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163777966.376:13182): avc: denied { execmod } for pid=15443 comm="firefox-bin" name="nprhapengine.so" dev=dm-0 ino=6547712 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_mozilla_home_t:s0 tclass=file type=SYSCALL msg=audit(1163777966.376:13182): arch=40000003 syscall=125 success=yes exit=0 a0=37cd000 a1=26f000 a2=5 a3=bfb6f1b0 items=0 ppid=1 pid=15443 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163777966.376:13182): path="/home/kmacmill/.mozilla/plugins/nprhapengine.so" type=AVC msg=audit(1163777981.621:13183): avc: denied { write } for pid=15476 comm="gnome-terminal" name="14281" dev=dm-0 ino=14567723 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:ice_tmp_t:s0 tclass=sock_file type=SYSCALL msg=audit(1163777981.621:13183): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=bffbef20 a2=df7770 a3=16 items=0 ppid=1 pid=15476 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-terminal" exe="/usr/bin/gnome-terminal" subj=staff_u:staff_r:staff_t:s0 key=(null) type=USER_AUTH msg=audit(1163777985.761:13184): user pid=15498 uid=500 auid=500 subj=staff_u:staff_r:staff_su_t:s0 msg='PAM: authentication acct=root : exe="/bin/su" (hostname=?, addr=?, terminal=pts/3 res=success)' type=USER_ACCT msg=audit(1163777985.761:13185): user pid=15498 uid=500 auid=500 subj=staff_u:staff_r:staff_su_t:s0 msg='PAM: accounting acct=root : exe="/bin/su" (hostname=?, addr=?, terminal=pts/3 res=success)' type=AVC msg=audit(1163777985.761:13186): avc: denied { search } for pid=15498 comm="su" name="root" dev=dm-0 ino=13127137 scontext=staff_u:staff_r:staff_su_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=SYSCALL msg=audit(1163777985.761:13186): arch=40000003 syscall=5 success=no exit=-2 a0=bf891d38 a1=8000 a2=1b6 a3=8dc69a8 items=0 ppid=15478 pid=15498 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=pts3 comm="su" exe="/bin/su" subj=staff_u:staff_r:staff_su_t:s0 key=(null) type=AVC msg=audit(1163777985.769:13187): avc: denied { write } for pid=15499 comm="xauth" name=".gdmOFJZIT" dev=dm-0 ino=14469449 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163777985.769:13187): arch=40000003 syscall=33 success=yes exit=0 a0=bf945987 a1=2 a2=bf945160 a3=0 items=0 ppid=15498 pid=15499 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts3 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC msg=audit(1163777985.769:13188): avc: denied { read } for pid=15499 comm="xauth" name=".gdmOFJZIT" dev=dm-0 ino=14469449 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163777985.769:13188): arch=40000003 syscall=5 success=yes exit=2 a0=bf945987 a1=0 a2=1b6 a3=95f8008 items=0 ppid=15498 pid=15499 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts3 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC msg=audit(1163777985.769:13189): avc: denied { getattr } for pid=15499 comm="xauth" name=".gdmOFJZIT" dev=dm-0 ino=14469449 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163777985.769:13189): arch=40000003 syscall=197 success=yes exit=0 a0=2 a1=bf944eac a2=a59ff4 a3=95f8008 items=0 ppid=15498 pid=15499 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts3 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC_PATH msg=audit(1163777985.769:13189): path="/tmp/.gdmOFJZIT" type=AVC msg=audit(1163777985.769:13190): avc: denied { write } for pid=15498 comm="su" name="root" dev=dm-0 ino=13127137 scontext=staff_u:staff_r:staff_su_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1163777985.769:13190): avc: denied { add_name } for pid=15498 comm="su" name=".xauthjIDizz" scontext=staff_u:staff_r:staff_su_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1163777985.769:13190): avc: denied { create } for pid=15498 comm="su" name=".xauthjIDizz" scontext=staff_u:staff_r:staff_su_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163777985.769:13190): arch=40000003 syscall=5 success=yes exit=4 a0=8dc6acb a1=80c2 a2=180 a3=80c2 items=0 ppid=15478 pid=15498 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=pts3 comm="su" exe="/bin/su" subj=staff_u:staff_r:staff_su_t:s0 key=(null) type=AVC msg=audit(1163777985.805:13191): avc: denied { setattr } for pid=15498 comm="su" name=".xauthjIDizz" dev=dm-0 ino=13127382 scontext=staff_u:staff_r:staff_su_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163777985.805:13191): arch=40000003 syscall=207 success=yes exit=0 a0=4 a1=0 a2=0 a3=1985bf items=0 ppid=15478 pid=15498 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=pts3 comm="su" exe="/bin/su" subj=staff_u:staff_r:staff_su_t:s0 key=(null) type=AVC msg=audit(1163777985.809:13192): avc: denied { search } for pid=15500 comm="xauth" name="root" dev=dm-0 ino=13127137 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=SYSCALL msg=audit(1163777985.809:13192): arch=40000003 syscall=195 success=no exit=-2 a0=bfa85577 a1=bfa8508c a2=34dff4 a3=bfa8508c items=0 ppid=15498 pid=15500 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts3 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC msg=audit(1163777985.809:13193): avc: denied { write } for pid=15500 comm="xauth" name="root" dev=dm-0 ino=13127137 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1163777985.809:13193): avc: denied { add_name } for pid=15500 comm="xauth" name=".xauthjIDizz-c" scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1163777985.809:13193): avc: denied { create } for pid=15500 comm="xauth" name=".xauthjIDizz-c" scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163777985.809:13193): arch=40000003 syscall=5 success=yes exit=2 a0=bfa85577 a1=c1 a2=180 a3=ffffffff items=0 ppid=15498 pid=15500 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts3 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC msg=audit(1163777985.809:13194): avc: denied { link } for pid=15500 comm="xauth" name=".xauthjIDizz-c" dev=dm-0 ino=13127386 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163777985.809:13194): arch=40000003 syscall=9 success=yes exit=0 a0=bfa85577 a1=bfa85176 a2=da3a64 a3=2 items=0 ppid=15498 pid=15500 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts3 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC msg=audit(1163777985.809:13195): avc: denied { write } for pid=15500 comm="xauth" name=".xauthjIDizz" dev=dm-0 ino=13127382 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163777985.809:13195): arch=40000003 syscall=33 success=yes exit=0 a0=bfa87983 a1=2 a2=bfa85aa0 a3=0 items=0 ppid=15498 pid=15500 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts3 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC msg=audit(1163777985.813:13196): avc: denied { read } for pid=15500 comm="xauth" name=".xauthjIDizz" dev=dm-0 ino=13127382 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163777985.813:13196): arch=40000003 syscall=5 success=yes exit=2 a0=bfa87983 a1=0 a2=1b6 a3=9d2d008 items=0 ppid=15498 pid=15500 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts3 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC msg=audit(1163777985.813:13197): avc: denied { getattr } for pid=15500 comm="xauth" name=".xauthjIDizz" dev=dm-0 ino=13127382 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163777985.813:13197): arch=40000003 syscall=197 success=yes exit=0 a0=2 a1=bfa857ec a2=34dff4 a3=9d2d008 items=0 ppid=15498 pid=15500 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts3 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC_PATH msg=audit(1163777985.813:13197): path="/root/.xauthjIDizz" type=AVC msg=audit(1163777985.817:13198): avc: denied { remove_name } for pid=15500 comm="xauth" name=".xauthjIDizz" dev=dm-0 ino=13127382 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1163777985.817:13198): avc: denied { unlink } for pid=15500 comm="xauth" name=".xauthjIDizz" dev=dm-0 ino=13127382 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163777985.817:13198): arch=40000003 syscall=10 success=yes exit=0 a0=9d2d008 a1=1000 a2=0 a3=9d2d08a items=0 ppid=15498 pid=15500 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts3 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=USER_START msg=audit(1163777985.817:13199): user pid=15498 uid=500 auid=500 subj=staff_u:staff_r:staff_su_t:s0 msg='PAM: session open acct=root : exe="/bin/su" (hostname=?, addr=?, terminal=pts/3 res=success)' type=CRED_ACQ msg=audit(1163777985.817:13200): user pid=15498 uid=500 auid=500 subj=staff_u:staff_r:staff_su_t:s0 msg='PAM: setcred acct=root : exe="/bin/su" (hostname=?, addr=?, terminal=pts/3 res=success)' type=AVC msg=audit(1163777985.825:13201): avc: denied { dac_override } for pid=15501 comm="bash" capability=1 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=capability type=SYSCALL msg=audit(1163777985.825:13201): arch=40000003 syscall=195 success=yes exit=0 a0=80d2437 a1=bfe6bb80 a2=24bff4 a3=bfe6bbe0 items=0 ppid=15498 pid=15501 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts3 comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163777985.825:13202): avc: denied { read } for pid=15501 comm="bash" name=".bashrc" dev=dm-0 ino=13127142 scontext=staff_u:staff_r:staff_t:s0 tcontext=root:object_r:user_home_t:s0 tclass=file type=SYSCALL msg=audit(1163777985.825:13202): arch=40000003 syscall=5 success=yes exit=3 a0=8108880 a1=8000 a2=0 a3=8000 items=0 ppid=15498 pid=15501 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts3 comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163777985.909:13203): avc: denied { read } for pid=15501 comm="bash" name=".bash_history" dev=dm-0 ino=13127151 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:user_home_t:s0 tclass=file type=SYSCALL msg=audit(1163777985.909:13203): arch=40000003 syscall=5 success=yes exit=3 a0=8108a60 a1=8000 a2=0 a3=8000 items=0 ppid=15498 pid=15501 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts3 comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=USER_AUTH msg=audit(1163777994.954:13204): user pid=15521 uid=0 auid=500 subj=staff_u:staff_r:newrole_t:s0 msg='PAM: authentication acct=kmacmill : exe="/usr/bin/newrole" (hostname=?, addr=?, terminal=pts/3 res=failed)' type=AVC msg=audit(1163778000.802:13205): avc: denied { read } for pid=15524 comm="tail" name="messages" dev=dm-0 ino=14437053 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:var_log_t:s0 tclass=file type=SYSCALL msg=audit(1163778000.802:13205): arch=40000003 syscall=5 success=yes exit=3 a0=bfb97975 a1=8000 a2=0 a3=8000 items=0 ppid=15501 pid=15524 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts3 comm="tail" exe="/usr/bin/tail" subj=staff_u:staff_r:staff_t:s0 key=(null) type=USER_ACCT msg=audit(1163778001.254:13206): user pid=15525 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1163778001.258:13207): login pid=15525 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1163778001.258:13208): user pid=15525 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1163778001.258:13209): user pid=15525 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1163778001.278:13210): avc: denied { execute } for pid=15526 comm="sh" name="sa1" dev=dm-0 ino=13061698 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:lib_t:s0 tclass=file type=AVC msg=audit(1163778001.278:13210): avc: denied { execute_no_trans } for pid=15526 comm="sh" name="sa1" dev=dm-0 ino=13061698 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1163778001.278:13210): arch=40000003 syscall=11 success=yes exit=0 a0=88861b0 a1=8886358 a2=8886290 a3=8886008 items=0 ppid=15525 pid=15526 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sa1" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163778001.278:13210): path="/usr/lib/sa/sa1" type=AVC msg=audit(1163778001.310:13211): avc: denied { execute } for pid=15526 comm="sa1" name="sadc" dev=dm-0 ino=11981401 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=AVC msg=audit(1163778001.310:13211): avc: denied { execute_no_trans } for pid=15526 comm="sa1" name="sadc" dev=dm-0 ino=11981401 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=AVC msg=audit(1163778001.310:13211): avc: denied { read } for pid=15526 comm="sa1" name="sadc" dev=dm-0 ino=11981401 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163778001.310:13211): arch=40000003 syscall=11 success=yes exit=0 a0=89aed48 a1=89ae740 a2=89aed60 a3=89ae740 items=0 ppid=15525 pid=15526 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163778001.310:13211): path="/usr/lib/sa/sadc" type=AVC_PATH msg=audit(1163778001.310:13211): path="/usr/lib/sa/sadc" type=AVC msg=audit(1163778001.314:13212): avc: denied { search } for pid=15526 comm="sadc" name="net" dev=proc ino=-268435432 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=dir type=AVC msg=audit(1163778001.314:13212): avc: denied { read } for pid=15526 comm="sadc" name="dev" dev=proc ino=-268434164 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=file type=SYSCALL msg=audit(1163778001.314:13212): arch=40000003 syscall=5 success=yes exit=3 a0=8050371 a1=0 a2=1b6 a3=8cb17f8 items=0 ppid=15525 pid=15526 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163778001.314:13213): avc: denied { getattr } for pid=15526 comm="sadc" name="dev" dev=proc ino=-268434164 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=file type=SYSCALL msg=audit(1163778001.314:13213): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bf88a9b8 a2=5f3ff4 a3=8cb17f8 items=0 ppid=15525 pid=15526 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163778001.314:13213): path="/proc/net/dev" type=AVC msg=audit(1163778001.314:13214): avc: denied { search } for pid=15526 comm="sadc" name="sa" dev=dm-0 ino=14607631 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=dir type=SYSCALL msg=audit(1163778001.314:13214): arch=40000003 syscall=33 success=yes exit=0 a0=bf88ad64 a1=0 a2=bf88ac58 a3=bf88ac60 items=0 ppid=15525 pid=15526 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163778001.314:13215): avc: denied { read append } for pid=15526 comm="sadc" name="sa17" dev=dm-0 ino=14600257 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=file type=SYSCALL msg=audit(1163778001.314:13215): arch=40000003 syscall=5 success=yes exit=3 a0=bf88ad64 a1=402 a2=bf88af28 a3=bf88ac60 items=0 ppid=15525 pid=15526 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163778001.314:13216): avc: denied { search } for pid=15526 comm="sadc" name="fs" dev=proc ino=-268435428 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=dir type=AVC msg=audit(1163778001.314:13216): avc: denied { read } for pid=15526 comm="sadc" name="dentry-state" dev=proc ino=-268435230 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=file type=SYSCALL msg=audit(1163778001.314:13216): arch=40000003 syscall=5 success=yes exit=4 a0=805037f a1=0 a2=1b6 a3=8cb2348 items=0 ppid=15525 pid=15526 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163778001.318:13217): avc: denied { getattr } for pid=15526 comm="sadc" name="dentry-state" dev=proc ino=-268435230 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=file type=SYSCALL msg=audit(1163778001.318:13217): arch=40000003 syscall=197 success=yes exit=0 a0=4 a1=bf88a810 a2=5f3ff4 a3=8cb2348 items=0 ppid=15525 pid=15526 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163778001.318:13217): path="/proc/sys/fs/dentry-state" type=AVC msg=audit(1163778001.318:13218): avc: denied { search } for pid=15526 comm="sadc" name="rpc" dev=proc ino=-268433616 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_rpc_t:s0 tclass=dir type=SYSCALL msg=audit(1163778001.318:13218): arch=40000003 syscall=5 success=no exit=-2 a0=80502a5 a1=0 a2=1b6 a3=8cb2348 items=0 ppid=15525 pid=15526 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163778001.318:13219): avc: denied { lock } for pid=15526 comm="sadc" name="sa17" dev=dm-0 ino=14600257 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=file type=SYSCALL msg=audit(1163778001.318:13219): arch=40000003 syscall=143 success=yes exit=0 a0=3 a1=6 a2=bf88ac60 a3=3 items=0 ppid=15525 pid=15526 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163778001.318:13219): path="/var/log/sa/sa17" type=CRED_DISP msg=audit(1163778001.342:13220): user pid=15525 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1163778001.346:13221): user pid=15525 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1163778017.599:13222): avc: denied { read } for pid=15443 comm="firefox-bin" name=".gdmOFJZIT" dev=dm-0 ino=14469449 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163778017.599:13222): arch=40000003 syscall=33 success=yes exit=0 a0=bfb72fcb a1=4 a2=da3a64 a3=bfb72fcb items=0 ppid=1 pid=15443 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163778017.599:13223): avc: denied { getattr } for pid=15443 comm="firefox-bin" name=".gdmOFJZIT" dev=dm-0 ino=14469449 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163778017.599:13223): arch=40000003 syscall=197 success=yes exit=0 a0=3a a1=bfb6f640 a2=d15ff4 a3=986ab38 items=0 ppid=1 pid=15443 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163778017.599:13223): path="/tmp/.gdmOFJZIT" type=AVC msg=audit(1163778018.615:13224): avc: denied { write } for pid=15069 comm="vpnc" name="tun" dev=tmpfs ino=1473 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:tun_tap_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163778018.615:13224): arch=40000003 syscall=4 success=yes exit=64 a0=4 a1=805c570 a2=40 a3=bfd587e4 items=0 ppid=15067 pid=15069 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vpnc" exe="/usr/sbin/vpnc" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163778018.615:13224): path="/dev/net/tun" type=AVC msg=audit(1163778018.615:13225): avc: denied { read } for pid=15069 comm="vpnc" name="tun" dev=tmpfs ino=1473 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:tun_tap_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163778018.615:13225): arch=40000003 syscall=3 success=yes exit=52 a0=4 a1=805c5a0 a2=1000 a3=805c5a0 items=0 ppid=15067 pid=15069 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vpnc" exe="/usr/sbin/vpnc" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163778018.615:13225): path="/dev/net/tun" type=AVC msg=audit(1163778073.379:13226): avc: denied { read } for pid=15558 comm="desktop-effects" name=".gdmOFJZIT" dev=dm-0 ino=14469449 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163778073.379:13226): arch=40000003 syscall=33 success=yes exit=0 a0=bfa3edd3 a1=4 a2=63da64 a3=bfa3edd3 items=0 ppid=1 pid=15558 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="desktop-effects" exe="/usr/bin/desktop-effects" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163778074.775:13227): avc: denied { execmem } for pid=15562 comm="compiz" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=process type=SYSCALL msg=audit(1163778074.775:13227): arch=40000003 syscall=192 success=yes exit=81354752 a0=4d96000 a1=1a000 a2=7 a3=812 items=0 ppid=1 pid=15562 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="compiz" exe="/usr/bin/compiz" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163778074.783:13228): avc: denied { execstack } for pid=15562 comm="compiz" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=process type=SYSCALL msg=audit(1163778074.783:13228): arch=40000003 syscall=125 success=yes exit=0 a0=bfaca000 a1=1000 a2=1000007 a3=fffff000 items=0 ppid=1 pid=15562 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="compiz" exe="/usr/bin/compiz" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163778075.447:13229): avc: denied { getattr } for pid=6659 comm="dbus-daemon" name="/" dev=dm-0 ino=2 scontext=staff_u:staff_r:staff_dbusd_t:s0 tcontext=system_u:object_r:fs_t:s0 tclass=filesystem type=SYSCALL msg=audit(1163778075.447:13229): arch=40000003 syscall=100 success=yes exit=0 a0=18 a1=bfcd52ac a2=c4eff4 a3=ffffffb8 items=0 ppid=1 pid=6659 auid=500 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) comm="dbus-daemon" exe="/bin/dbus-daemon" subj=staff_u:staff_r:staff_dbusd_t:s0 key=(null) type=AVC msg=audit(1163778075.863:13230): avc: denied { execute } for pid=15562 comm="compiz" name="zero" dev=tmpfs ino=1493 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:zero_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163778075.863:13230): arch=40000003 syscall=192 success=yes exit=1273856 a0=0 a1=2000 a2=7 a3=2 items=0 ppid=1 pid=15562 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="compiz" exe="/usr/bin/compiz" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163778075.863:13230): path="/dev/zero" type=AVC msg=audit(1163778075.871:13231): avc: denied { read } for pid=15562 comm="compiz" name=".ICEauthority" dev=dm-0 ino=6574784 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:staff_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163778075.871:13231): arch=40000003 syscall=33 success=yes exit=0 a0=8b5b4c8 a1=4 a2=df7770 a3=8b5b4c8 items=0 ppid=1 pid=15562 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="compiz" exe="/usr/bin/compiz" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163778103.237:13232): avc: denied { execheap } for pid=14873 comm="beagle-search" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=process type=SYSCALL msg=audit(1163778103.237:13232): arch=40000003 syscall=125 success=yes exit=0 a0=9dc2000 a1=1000 a2=7 a3=1 items=0 ppid=1 pid=14873 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="beagle-search" exe="/usr/bin/mono" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163778117.358:13233): avc: denied { execute } for pid=15565 comm="beagle-settings" name="mono" dev=dm-0 ino=10321084 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:mono_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163778117.358:13233): arch=40000003 syscall=33 success=yes exit=0 a0=8e1d3d0 a1=1 a2=11 a3=8e1d3d0 items=0 ppid=14873 pid=15565 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="beagle-settings" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163778117.358:13234): avc: denied { read } for pid=15565 comm="beagle-settings" name="mono" dev=dm-0 ino=10321084 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:mono_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163778117.358:13234): arch=40000003 syscall=33 success=yes exit=0 a0=8e1d3d0 a1=4 a2=ffffffff a3=8e1d3d0 items=0 ppid=14873 pid=15565 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="beagle-settings" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163778117.358:13235): avc: denied { execute_no_trans } for pid=15565 comm="beagle-settings" name="mono" dev=dm-0 ino=10321084 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:mono_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163778117.358:13235): arch=40000003 syscall=11 success=yes exit=0 a0=8e1de80 a1=8e1e068 a2=8e1e630 a3=8e1e068 items=0 ppid=14873 pid=15565 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="mono" exe="/usr/bin/mono" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163778117.358:13235): path="/usr/bin/mono" type=AVC msg=audit(1163778134.295:13236): avc: denied { getattr } for pid=15569 comm="ps" name="tty1" dev=tmpfs ino=1444 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:tty_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163778134.295:13236): arch=40000003 syscall=195 success=yes exit=0 a0=c62840 a1=bfcd6e0c a2=f14ff4 a3=bfcd6e0c items=0 ppid=15533 pid=15569 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts4 comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163778134.295:13236): path="/dev/tty1" type=AVC msg=audit(1163778221.000:13237): avc: denied { lock } for pid=14914 comm="pam_timestamp_c" name="utmp" dev=dm-0 ino=14436583 scontext=staff_u:staff_r:pam_t:s0 tcontext=system_u:object_r:initrc_var_run_t:s0 tclass=file type=SYSCALL msg=audit(1163778221.000:13237): arch=40000003 syscall=221 success=yes exit=0 a0=3 a1=7 a2=bf8bcea8 a3=0 items=0 ppid=14912 pid=14914 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=(none) comm="pam_timestamp_c" exe="/sbin/pam_timestamp_check" subj=staff_u:staff_r:pam_t:s0 key=(null) type=AVC_PATH msg=audit(1163778221.000:13237): path="/var/run/utmp" type=USER_AUTH msg=audit(1163778226.432:13238): user pid=15636 uid=500 auid=500 subj=staff_u:staff_r:staff_su_t:s0 msg='PAM: authentication acct=root : exe="/bin/su" (hostname=?, addr=?, terminal=pts/5 res=success)' type=USER_ACCT msg=audit(1163778226.432:13239): user pid=15636 uid=500 auid=500 subj=staff_u:staff_r:staff_su_t:s0 msg='PAM: accounting acct=root : exe="/bin/su" (hostname=?, addr=?, terminal=pts/5 res=success)' type=AVC msg=audit(1163778226.464:13240): avc: denied { create } for pid=15636 comm="su" name=".xauthpHDAX5" scontext=staff_u:staff_r:staff_su_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163778226.464:13240): arch=40000003 syscall=5 success=yes exit=4 a0=861bacb a1=80c2 a2=180 a3=80c2 items=0 ppid=15605 pid=15636 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=pts5 comm="su" exe="/bin/su" subj=staff_u:staff_r:staff_su_t:s0 key=(null) type=AVC msg=audit(1163778226.464:13241): avc: denied { setattr } for pid=15636 comm="su" name=".xauthpHDAX5" dev=dm-0 ino=13127382 scontext=staff_u:staff_r:staff_su_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163778226.464:13241): arch=40000003 syscall=207 success=yes exit=0 a0=4 a1=0 a2=0 a3=28b5bf items=0 ppid=15605 pid=15636 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=pts5 comm="su" exe="/bin/su" subj=staff_u:staff_r:staff_su_t:s0 key=(null) type=AVC msg=audit(1163778226.472:13242): avc: denied { create } for pid=15638 comm="xauth" name=".xauthpHDAX5-c" scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163778226.472:13242): arch=40000003 syscall=5 success=yes exit=2 a0=bf85db57 a1=c1 a2=180 a3=ffffffff items=0 ppid=15636 pid=15638 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts5 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC msg=audit(1163778226.472:13243): avc: denied { link } for pid=15638 comm="xauth" name=".xauthpHDAX5-c" dev=dm-0 ino=13127386 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163778226.472:13243): arch=40000003 syscall=9 success=yes exit=0 a0=bf85db57 a1=bf85d756 a2=da3a64 a3=2 items=0 ppid=15636 pid=15638 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts5 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC msg=audit(1163778226.472:13244): avc: denied { write } for pid=15638 comm="xauth" name=".xauthpHDAX5" dev=dm-0 ino=13127382 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163778226.472:13244): arch=40000003 syscall=33 success=yes exit=0 a0=bf85e983 a1=2 a2=bf85e080 a3=0 items=0 ppid=15636 pid=15638 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts5 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC msg=audit(1163778226.472:13245): avc: denied { read } for pid=15638 comm="xauth" name=".xauthpHDAX5" dev=dm-0 ino=13127382 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163778226.472:13245): arch=40000003 syscall=5 success=yes exit=2 a0=bf85e983 a1=0 a2=1b6 a3=8e9c008 items=0 ppid=15636 pid=15638 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts5 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC msg=audit(1163778226.476:13246): avc: denied { getattr } for pid=15638 comm="xauth" name=".xauthpHDAX5" dev=dm-0 ino=13127382 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163778226.476:13246): arch=40000003 syscall=197 success=yes exit=0 a0=2 a1=bf85ddcc a2=8aaff4 a3=8e9c008 items=0 ppid=15636 pid=15638 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts5 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC_PATH msg=audit(1163778226.476:13246): path="/root/.xauthpHDAX5" type=AVC msg=audit(1163778226.496:13247): avc: denied { unlink } for pid=15638 comm="xauth" name=".xauthpHDAX5" dev=dm-0 ino=13127382 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163778226.496:13247): arch=40000003 syscall=10 success=yes exit=0 a0=8e9c008 a1=1000 a2=0 a3=8e9c08a items=0 ppid=15636 pid=15638 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts5 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=USER_START msg=audit(1163778226.504:13248): user pid=15636 uid=500 auid=500 subj=staff_u:staff_r:staff_su_t:s0 msg='PAM: session open acct=root : exe="/bin/su" (hostname=?, addr=?, terminal=pts/5 res=success)' type=CRED_ACQ msg=audit(1163778226.504:13249): user pid=15636 uid=500 auid=500 subj=staff_u:staff_r:staff_su_t:s0 msg='PAM: setcred acct=root : exe="/bin/su" (hostname=?, addr=?, terminal=pts/5 res=success)' type=AVC msg=audit(1163778226.508:13250): avc: denied { read } for pid=15639 comm="bash" name=".bashrc" dev=dm-0 ino=13127142 scontext=staff_u:staff_r:staff_t:s0 tcontext=root:object_r:user_home_t:s0 tclass=file type=SYSCALL msg=audit(1163778226.508:13250): arch=40000003 syscall=5 success=yes exit=3 a0=84ab880 a1=8000 a2=0 a3=8000 items=0 ppid=15636 pid=15639 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts5 comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=USER_AUTH msg=audit(1163778234.717:13251): user pid=15662 uid=0 auid=500 subj=staff_u:staff_r:newrole_t:s0 msg='PAM: authentication acct=kmacmill : exe="/usr/bin/newrole" (hostname=?, addr=?, terminal=pts/5 res=success)' type=USER_ACCT msg=audit(1163778234.717:13252): user pid=15662 uid=0 auid=500 subj=staff_u:staff_r:newrole_t:s0 msg='PAM: accounting acct=kmacmill : exe="/usr/bin/newrole" (hostname=?, addr=?, terminal=pts/5 res=success)' type=AVC msg=audit(1163778247.402:13253): avc: denied { execute } for pid=15591 comm="firefox-bin" name="nprhapengine.so" dev=dm-0 ino=6547712 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_mozilla_home_t:s0 tclass=file type=SYSCALL msg=audit(1163778247.402:13253): arch=40000003 syscall=192 success=yes exit=42897408 a0=0 a1=2af6e0 a2=5 a3=802 items=0 ppid=1 pid=15591 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163778247.402:13253): path="/home/kmacmill/.mozilla/plugins/nprhapengine.so" type=AVC msg=audit(1163778247.402:13254): avc: denied { execstack } for pid=15591 comm="firefox-bin" scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_mozilla_t:s0 tclass=process type=AVC msg=audit(1163778247.402:13254): avc: denied { execmem } for pid=15591 comm="firefox-bin" scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_mozilla_t:s0 tclass=process type=SYSCALL msg=audit(1163778247.402:13254): arch=40000003 syscall=125 success=yes exit=0 a0=bfa2f000 a1=1000 a2=1000007 a3=fffff000 items=0 ppid=1 pid=15591 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163778247.402:13255): avc: denied { execmod } for pid=15591 comm="firefox-bin" name="nprhapengine.so" dev=dm-0 ino=6547712 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_mozilla_home_t:s0 tclass=file type=SYSCALL msg=audit(1163778247.402:13255): arch=40000003 syscall=125 success=yes exit=0 a0=28e9000 a1=26f000 a2=5 a3=bfa2bf30 items=0 ppid=1 pid=15591 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163778247.402:13255): path="/home/kmacmill/.mozilla/plugins/nprhapengine.so" type=AVC msg=audit(1163778335.855:13256): avc: denied { read } for pid=15584 comm="tail" name="messages" dev=dm-0 ino=14437053 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:var_log_t:s0 tclass=file type=SYSCALL msg=audit(1163778335.855:13256): arch=40000003 syscall=3 success=yes exit=101 a0=3 a1=bf86d6a4 a2=2000 a3=2000 items=0 ppid=15501 pid=15584 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts3 comm="tail" exe="/usr/bin/tail" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163778335.855:13256): path="/var/log/messages" type=AVC msg=audit(1163778366.201:13257): avc: denied { read } for pid=15715 comm="gnome-terminal" name=".gdmOFJZIT" dev=dm-0 ino=14469449 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163778366.201:13257): arch=40000003 syscall=33 success=yes exit=0 a0=bf985dd5 a1=4 a2=da3a64 a3=bf985dd5 items=0 ppid=1 pid=15715 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-terminal" exe="/usr/bin/gnome-terminal" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163778366.281:13258): avc: denied { write } for pid=15715 comm="gnome-terminal" name="14281" dev=dm-0 ino=14567723 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:ice_tmp_t:s0 tclass=sock_file type=SYSCALL msg=audit(1163778366.281:13258): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=bf9848e0 a2=df7770 a3=16 items=0 ppid=1 pid=15715 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-terminal" exe="/usr/bin/gnome-terminal" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163778366.285:13259): avc: denied { read } for pid=15715 comm="gnome-terminal" name=".ICEauthority" dev=dm-0 ino=6574784 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:staff_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163778366.285:13259): arch=40000003 syscall=33 success=yes exit=0 a0=9db9a38 a1=4 a2=df7770 a3=9db9a38 items=0 ppid=1 pid=15715 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-terminal" exe="/usr/bin/gnome-terminal" subj=staff_u:staff_r:staff_t:s0 key=(null) type=USER_CHAUTHTOK msg=audit(1163778395.927:13260): user pid=15742 uid=0 auid=500 subj=staff_u:sysadm_r:useradd_t:s0 msg='op=adding user acct=apache exe="/usr/sbin/useradd" (hostname=?, addr=?, terminal=pts/1 res=failed)' type=AVC msg=audit(1163778415.932:13261): avc: denied { read } for pid=15584 comm="tail" name="messages" dev=dm-0 ino=14437053 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:var_log_t:s0 tclass=file type=SYSCALL msg=audit(1163778415.932:13261): arch=40000003 syscall=3 success=yes exit=68 a0=3 a1=bf86d6a4 a2=2000 a3=2000 items=0 ppid=15501 pid=15584 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts3 comm="tail" exe="/usr/bin/tail" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163778415.932:13261): path="/var/log/messages" type=AVC msg=audit(1163778417.000:13262): avc: denied { lock } for pid=14914 comm="pam_timestamp_c" name="utmp" dev=dm-0 ino=14436583 scontext=staff_u:staff_r:pam_t:s0 tcontext=system_u:object_r:initrc_var_run_t:s0 tclass=file type=SYSCALL msg=audit(1163778417.000:13262): arch=40000003 syscall=221 success=yes exit=0 a0=3 a1=7 a2=bf8bcea8 a3=0 items=0 ppid=14912 pid=14914 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=(none) comm="pam_timestamp_c" exe="/sbin/pam_timestamp_check" subj=staff_u:staff_r:pam_t:s0 key=(null) type=AVC_PATH msg=audit(1163778417.000:13262): path="/var/run/utmp" type=AVC msg=audit(1163778601.220:13263): avc: denied { execute } for pid=15789 comm="sshd" name="sshd" dev=dm-0 ino=10315312 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:sshd_exec_t:s0 tclass=file type=AVC msg=audit(1163778601.220:13263): avc: denied { execute_no_trans } for pid=15789 comm="sshd" name="sshd" dev=dm-0 ino=10315312 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:sshd_exec_t:s0 tclass=file type=AVC msg=audit(1163778601.220:13263): avc: denied { read } for pid=15789 comm="sshd" name="sshd" dev=dm-0 ino=10315312 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:sshd_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163778601.220:13263): arch=40000003 syscall=11 success=yes exit=0 a0=9f1c3e0 a1=9f20020 a2=9f1c3f8 a3=4 items=0 ppid=8872 pid=15789 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sshd" exe="/usr/sbin/sshd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163778601.220:13263): path="/usr/sbin/sshd" type=AVC_PATH msg=audit(1163778601.220:13263): path="/usr/sbin/sshd" type=AVC msg=audit(1163778601.352:13264): avc: denied { read } for pid=15789 comm="sshd" name="ssh_host_rsa_key" dev=dm-0 ino=9331557 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:sshd_key_t:s0 tclass=file type=SYSCALL msg=audit(1163778601.352:13264): arch=40000003 syscall=5 success=yes exit=3 a0=6af425 a1=8000 a2=0 a3=8000 items=0 ppid=8872 pid=15789 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sshd" exe="/usr/sbin/sshd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163778601.452:13265): avc: denied { setuid } for pid=15791 comm="sshd" capability=7 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=capability type=SYSCALL msg=audit(1163778601.452:13265): arch=40000003 syscall=208 success=yes exit=0 a0=4a a1=4a a2=4a a3=0 items=0 ppid=15789 pid=15791 auid=500 uid=74 gid=74 euid=74 suid=74 fsuid=74 egid=74 sgid=74 fsgid=74 tty=(none) comm="sshd" exe="/usr/sbin/sshd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=USER_ACCT msg=audit(1163778601.492:13266): user pid=15790 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1163778601.492:13267): login pid=15790 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1163778601.492:13268): user pid=15790 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1163778601.492:13269): user pid=15790 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1163778601.496:13270): avc: denied { execute } for pid=15792 comm="sh" name="sa1" dev=dm-0 ino=13061698 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:lib_t:s0 tclass=file type=AVC msg=audit(1163778601.496:13270): avc: denied { execute_no_trans } for pid=15792 comm="sh" name="sa1" dev=dm-0 ino=13061698 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1163778601.496:13270): arch=40000003 syscall=11 success=yes exit=0 a0=81131b0 a1=8113358 a2=8113290 a3=8113008 items=0 ppid=15790 pid=15792 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sa1" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163778601.496:13270): path="/usr/lib/sa/sa1" type=AVC msg=audit(1163778601.516:13271): avc: denied { execute } for pid=15792 comm="sa1" name="sadc" dev=dm-0 ino=11981401 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=AVC msg=audit(1163778601.516:13271): avc: denied { execute_no_trans } for pid=15792 comm="sa1" name="sadc" dev=dm-0 ino=11981401 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=AVC msg=audit(1163778601.516:13271): avc: denied { read } for pid=15792 comm="sa1" name="sadc" dev=dm-0 ino=11981401 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163778601.516:13271): arch=40000003 syscall=11 success=yes exit=0 a0=8cb0d48 a1=8cb0740 a2=8cb0d60 a3=8cb0740 items=0 ppid=15790 pid=15792 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163778601.516:13271): path="/usr/lib/sa/sadc" type=AVC_PATH msg=audit(1163778601.516:13271): path="/usr/lib/sa/sadc" type=AVC msg=audit(1163778601.516:13272): avc: denied { search } for pid=15792 comm="sadc" name="net" dev=proc ino=-268435432 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=dir type=AVC msg=audit(1163778601.516:13272): avc: denied { read } for pid=15792 comm="sadc" name="dev" dev=proc ino=-268434164 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=file type=SYSCALL msg=audit(1163778601.516:13272): arch=40000003 syscall=5 success=yes exit=3 a0=8050371 a1=0 a2=1b6 a3=82bd7f8 items=0 ppid=15790 pid=15792 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163778601.516:13273): avc: denied { getattr } for pid=15792 comm="sadc" name="dev" dev=proc ino=-268434164 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=file type=SYSCALL msg=audit(1163778601.516:13273): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bf8b31d8 a2=24bff4 a3=82bd7f8 items=0 ppid=15790 pid=15792 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163778601.516:13273): path="/proc/net/dev" type=AVC msg=audit(1163778601.516:13274): avc: denied { search } for pid=15792 comm="sadc" name="sa" dev=dm-0 ino=14607631 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=dir type=SYSCALL msg=audit(1163778601.516:13274): arch=40000003 syscall=33 success=yes exit=0 a0=bf8b3584 a1=0 a2=bf8b3478 a3=bf8b3480 items=0 ppid=15790 pid=15792 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163778601.516:13275): avc: denied { read append } for pid=15792 comm="sadc" name="sa17" dev=dm-0 ino=14600257 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=file type=SYSCALL msg=audit(1163778601.516:13275): arch=40000003 syscall=5 success=yes exit=3 a0=bf8b3584 a1=402 a2=bf8b3748 a3=bf8b3480 items=0 ppid=15790 pid=15792 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163778601.516:13276): avc: denied { search } for pid=15792 comm="sadc" name="rpc" dev=proc ino=-268433616 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_rpc_t:s0 tclass=dir type=SYSCALL msg=audit(1163778601.516:13276): arch=40000003 syscall=5 success=no exit=-2 a0=80502a5 a1=0 a2=1b6 a3=82be348 items=0 ppid=15790 pid=15792 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163778601.516:13277): avc: denied { lock } for pid=15792 comm="sadc" name="sa17" dev=dm-0 ino=14600257 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=file type=SYSCALL msg=audit(1163778601.516:13277): arch=40000003 syscall=143 success=yes exit=0 a0=3 a1=6 a2=bf8b3480 a3=3 items=0 ppid=15790 pid=15792 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163778601.516:13277): path="/var/log/sa/sa17" type=CRED_DISP msg=audit(1163778601.548:13278): user pid=15790 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1163778601.548:13279): user pid=15790 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1163778601.820:13280): avc: denied { read } for pid=15789 comm="sshd" name="resolv.conf" dev=dm-0 ino=9330239 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:net_conf_t:s0 tclass=file type=SYSCALL msg=audit(1163778601.820:13280): arch=40000003 syscall=5 success=yes exit=4 a0=432e73 a1=0 a2=1b6 a3=93afd10 items=0 ppid=8872 pid=15789 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sshd" exe="/usr/sbin/sshd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163778602.504:13281): avc: denied { audit_write } for pid=15789 comm="sshd" capability=29 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=capability type=USER_LOGIN msg=audit(1163778602.504:13282): user pid=15789 uid=0 auid=500 subj=staff_u:staff_r:staff_t:s0 msg='acct=kmacmill: exe="/usr/sbin/sshd" (hostname=?, addr=192.168.1.106, terminal=sshd res=failed)' type=SYSCALL msg=audit(1163778602.504:13281): arch=40000003 syscall=102 success=yes exit=112 a0=b a1=bfc19c40 a2=30dff4 a3=bfc20680 items=0 ppid=8872 pid=15789 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sshd" exe="/usr/sbin/sshd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=USER_LOGIN msg=audit(1163778602.508:13283): user pid=15789 uid=0 auid=500 subj=staff_u:staff_r:staff_t:s0 msg='acct=kmacmill: exe="/usr/sbin/sshd" (hostname=?, addr=192.168.1.106, terminal=sshd res=failed)' type=USER_AUTH msg=audit(1163778605.384:13284): user pid=15789 uid=0 auid=500 subj=staff_u:staff_r:staff_t:s0 msg='PAM: authentication acct=kmacmill : exe="/usr/sbin/sshd" (hostname=laptop.localdomain, addr=192.168.1.106, terminal=ssh res=success)' type=USER_ACCT msg=audit(1163778605.384:13285): user pid=15789 uid=0 auid=500 subj=staff_u:staff_r:staff_t:s0 msg='PAM: accounting acct=kmacmill : exe="/usr/sbin/sshd" (hostname=laptop.localdomain, addr=192.168.1.106, terminal=ssh res=success)' type=AVC msg=audit(1163778605.428:13286): avc: denied { write } for pid=15793 comm="sshd" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=key type=AVC msg=audit(1163778605.428:13286): avc: denied { link } for pid=15793 comm="sshd" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tclass=key type=SYSCALL msg=audit(1163778605.428:13286): arch=40000003 syscall=288 success=yes exit=0 a0=8 a1=fffffffc a2=fffffffd a3=1f4 items=0 ppid=15789 pid=15793 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=(none) comm="sshd" exe="/usr/sbin/sshd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163778605.428:13287): avc: denied { audit_control } for pid=15793 comm="sshd" capability=30 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=capability type=LOGIN msg=audit(1163778605.428:13288): login pid=15793 uid=0 old auid=500 new auid=500 type=SYSCALL msg=audit(1163778605.428:13287): arch=40000003 syscall=4 success=yes exit=3 a0=6 a1=bfc24ac8 a2=3 a3=3 items=0 ppid=15789 pid=15793 auid=500 uid=0 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=(none) comm="sshd" exe="/usr/sbin/sshd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=USER_START msg=audit(1163778605.428:13289): user pid=15793 uid=0 auid=500 subj=staff_u:staff_r:staff_t:s0 msg='PAM: session open acct=kmacmill : exe="/usr/sbin/sshd" (hostname=laptop.localdomain, addr=192.168.1.106, terminal=ssh res=success)' type=CRED_REFR msg=audit(1163778605.428:13290): user pid=15793 uid=0 auid=500 subj=staff_u:staff_r:staff_t:s0 msg='PAM: setcred acct=kmacmill : exe="/usr/sbin/sshd" (hostname=laptop.localdomain, addr=192.168.1.106, terminal=ssh res=success)' type=AVC msg=audit(1163778605.512:13291): avc: denied { setexec } for pid=15793 comm="sshd" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=process type=SYSCALL msg=audit(1163778605.512:13291): arch=40000003 syscall=4 success=yes exit=35 a0=6 a1=93a6dd8 a2=23 a3=62a751 items=0 ppid=15789 pid=15793 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="sshd" exe="/usr/sbin/sshd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163778605.528:13292): avc: denied { relabelfrom } for pid=15789 comm="sshd" name="8" dev=devpts ino=10 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:staff_devpts_t:s0 tclass=chr_file type=AVC msg=audit(1163778605.528:13292): avc: denied { relabelto } for pid=15789 comm="sshd" name="8" dev=devpts ino=10 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:staff_devpts_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163778605.528:13292): arch=40000003 syscall=226 success=yes exit=0 a0=6c7df4 a1=62a0d3 a2=93b8f60 a3=23 items=0 ppid=8872 pid=15789 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sshd" exe="/usr/sbin/sshd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163778605.540:13293): avc: denied { read } for pid=15789 comm="sshd" name="lastlog" dev=dm-0 ino=14437088 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lastlog_t:s0 tclass=file type=SYSCALL msg=audit(1163778605.540:13293): arch=40000003 syscall=5 success=yes exit=7 a0=bfc23f68 a1=8000 a2=0 a3=8000 items=0 ppid=8872 pid=15789 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sshd" exe="/usr/sbin/sshd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=USER_LOGIN msg=audit(1163778605.544:13294): user pid=15789 uid=0 auid=500 subj=staff_u:staff_r:staff_t:s0 msg='uid=500: exe="/usr/sbin/sshd" (hostname=laptop.localdomain, addr=192.168.1.106, terminal=/dev/pts/8 res=success)' type=AVC msg=audit(1163778605.548:13295): avc: denied { write } for pid=15789 comm="sshd" name="lastlog" dev=dm-0 ino=14437088 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lastlog_t:s0 tclass=file type=SYSCALL msg=audit(1163778605.548:13295): arch=40000003 syscall=5 success=yes exit=7 a0=bfc24238 a1=8042 a2=180 a3=8042 items=0 ppid=8872 pid=15789 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sshd" exe="/usr/sbin/sshd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163778605.568:13296): avc: denied { entrypoint } for pid=15794 comm="sshd" name="bash" dev=dm-0 ino=13683670 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:object_r:shell_exec_t:s0 tclass=file type=AVC msg=audit(1163778605.568:13296): avc: denied { read write } for pid=15794 comm="bash" name="8" dev=devpts ino=10 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=staff_u:object_r:staff_devpts_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163778605.568:13296): arch=40000003 syscall=11 success=yes exit=0 a0=93a77e8 a1=bfc23458 a2=93a7420 a3=0 items=0 ppid=15793 pid=15794 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC_PATH msg=audit(1163778605.568:13296): path="/bin/bash" type=AVC msg=audit(1163778605.568:13297): avc: denied { search } for pid=15794 comm="bash" name="/" dev=devpts ino=1 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:object_r:devpts_t:s0 tclass=dir type=SYSCALL msg=audit(1163778605.568:13297): arch=40000003 syscall=5 success=yes exit=3 a0=80cfa3a a1=8802 a2=0 a3=8802 items=0 ppid=15793 pid=15794 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC msg=audit(1163778605.568:13298): avc: denied { ioctl } for pid=15794 comm="bash" name="8" dev=devpts ino=10 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=staff_u:object_r:staff_devpts_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163778605.568:13298): arch=40000003 syscall=54 success=yes exit=0 a0=0 a1=5401 a2=bfd668f8 a3=bfd66938 items=0 ppid=15793 pid=15794 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC_PATH msg=audit(1163778605.568:13298): path="/dev/pts/8" type=AVC msg=audit(1163778605.588:13299): avc: denied { search } for pid=15794 comm="bash" name="spool" dev=dm-0 ino=14436617 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:object_r:var_spool_t:s0 tclass=dir type=AVC msg=audit(1163778605.588:13299): avc: denied { search } for pid=15794 comm="bash" name="mail" dev=dm-0 ino=14436619 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:object_r:mail_spool_t:s0 tclass=dir type=AVC msg=audit(1163778605.588:13299): avc: denied { getattr } for pid=15794 comm="bash" name="kmacmill" dev=dm-0 ino=14437393 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:object_r:mail_spool_t:s0 tclass=file type=SYSCALL msg=audit(1163778605.588:13299): arch=40000003 syscall=195 success=yes exit=0 a0=9dc9e38 a1=bfd66024 a2=457ff4 a3=bfd66024 items=0 ppid=15793 pid=15794 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC_PATH msg=audit(1163778605.588:13299): path="/var/spool/mail/kmacmill" type=AVC msg=audit(1163778605.628:13300): avc: denied { execute } for pid=15798 comm="bash" name="hostname" dev=dm-0 ino=13683750 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:object_r:hostname_exec_t:s0 tclass=file type=AVC msg=audit(1163778605.628:13300): avc: denied { execute_no_trans } for pid=15798 comm="bash" name="hostname" dev=dm-0 ino=13683750 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:object_r:hostname_exec_t:s0 tclass=file type=AVC msg=audit(1163778605.628:13300): avc: denied { read } for pid=15798 comm="bash" name="hostname" dev=dm-0 ino=13683750 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:object_r:hostname_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163778605.628:13300): arch=40000003 syscall=11 success=yes exit=0 a0=9dcce50 a1=9dcc0a8 a2=9dccf80 a3=9dccbc0 items=0 ppid=15797 pid=15798 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="hostname" exe="/bin/hostname" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC_PATH msg=audit(1163778605.628:13300): path="/bin/hostname" type=AVC_PATH msg=audit(1163778605.628:13300): path="/bin/hostname" type=AVC msg=audit(1163778605.648:13301): avc: denied { read } for pid=15794 comm="bash" name="kmacmill" dev=dm-0 ino=6547202 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=staff_u:object_r:staff_home_dir_t:s0 tclass=dir type=SYSCALL msg=audit(1163778605.648:13301): arch=40000003 syscall=5 success=yes exit=3 a0=80d2437 a1=18800 a2=459120 a3=9dcdaa8 items=0 ppid=15793 pid=15794 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC msg=audit(1163778605.684:13302): avc: denied { execute } for pid=15811 comm="bash" name="consoletype" dev=dm-0 ino=9984625 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:object_r:consoletype_exec_t:s0 tclass=file type=AVC msg=audit(1163778605.684:13302): avc: denied { execute_no_trans } for pid=15811 comm="bash" name="consoletype" dev=dm-0 ino=9984625 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:object_r:consoletype_exec_t:s0 tclass=file type=AVC msg=audit(1163778605.684:13302): avc: denied { read } for pid=15811 comm="bash" name="consoletype" dev=dm-0 ino=9984625 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:object_r:consoletype_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163778605.684:13302): arch=40000003 syscall=11 success=yes exit=0 a0=9dd54d8 a1=9dd4e48 a2=9dcf728 a3=9dd4ee0 items=0 ppid=15810 pid=15811 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="consoletype" exe="/sbin/consoletype" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC_PATH msg=audit(1163778605.684:13302): path="/sbin/consoletype" type=AVC_PATH msg=audit(1163778605.684:13302): path="/sbin/consoletype" type=AVC msg=audit(1163778605.688:13303): avc: denied { getattr } for pid=15811 comm="consoletype" name="8" dev=devpts ino=10 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=staff_u:object_r:staff_devpts_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163778605.688:13303): arch=40000003 syscall=197 success=yes exit=0 a0=0 a1=bfeb3ffc a2=c8eff4 a3=bfeb3ffc items=0 ppid=15810 pid=15811 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="consoletype" exe="/sbin/consoletype" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC_PATH msg=audit(1163778605.688:13303): path="/dev/pts/8" type=AVC msg=audit(1163778605.708:13304): avc: denied { read } for pid=15794 comm="bash" name=".bash_profile" dev=dm-0 ino=11884821 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=staff_u:object_r:staff_home_t:s0 tclass=file type=SYSCALL msg=audit(1163778605.708:13304): arch=40000003 syscall=5 success=yes exit=3 a0=9dcbac0 a1=8000 a2=0 a3=8000 items=0 ppid=15793 pid=15794 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC msg=audit(1163778605.708:13305): avc: denied { getattr } for pid=15794 comm="bash" name=".bash_profile" dev=dm-0 ino=11884821 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=staff_u:object_r:staff_home_t:s0 tclass=file type=SYSCALL msg=audit(1163778605.708:13305): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bfd668c4 a2=457ff4 a3=9dcbac0 items=0 ppid=15793 pid=15794 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC_PATH msg=audit(1163778605.708:13305): path="/home/kmacmill/.bash_profile" type=AVC msg=audit(1163778606.368:13306): avc: denied { getattr } for pid=15794 comm="bash" name="ls" dev=dm-0 ino=13683768 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:object_r:ls_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163778606.368:13306): arch=40000003 syscall=195 success=yes exit=0 a0=9dd2670 a1=bfd66590 a2=457ff4 a3=9dd2670 items=0 ppid=15793 pid=15794 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC_PATH msg=audit(1163778606.368:13306): path="/bin/ls" type=AVC msg=audit(1163778606.368:13307): avc: denied { execute } for pid=15794 comm="bash" name="ls" dev=dm-0 ino=13683768 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:object_r:ls_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163778606.368:13307): arch=40000003 syscall=33 success=yes exit=0 a0=9dd2670 a1=1 a2=11 a3=9dd2670 items=0 ppid=15793 pid=15794 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC msg=audit(1163778606.368:13308): avc: denied { read } for pid=15794 comm="bash" name="ls" dev=dm-0 ino=13683768 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:object_r:ls_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163778606.368:13308): arch=40000003 syscall=33 success=yes exit=0 a0=9dd2670 a1=4 a2=ffffffff a3=9dd2670 items=0 ppid=15793 pid=15794 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC msg=audit(1163778606.368:13309): avc: denied { execute_no_trans } for pid=15818 comm="bash" name="ls" dev=dm-0 ino=13683768 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:object_r:ls_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163778606.368:13309): arch=40000003 syscall=11 success=yes exit=0 a0=9dd2670 a1=9dd54f0 a2=9de05c0 a3=9de04f8 items=0 ppid=15794 pid=15818 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="ls" exe="/bin/ls" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC_PATH msg=audit(1163778606.368:13309): path="/bin/ls" type=AVC msg=audit(1163778612.949:13310): avc: denied { getattr } for pid=15819 comm="top" name="1" dev=proc ino=65538 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=dir type=SYSCALL msg=audit(1163778612.949:13310): arch=40000003 syscall=195 success=yes exit=0 a0=9b3783c a1=bff6335c a2=24bff4 a3=bff6335c items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC_PATH msg=audit(1163778612.949:13310): path="/proc/1" type=AVC msg=audit(1163778612.949:13311): avc: denied { search } for pid=15819 comm="top" name="1" dev=proc ino=65538 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=dir type=AVC msg=audit(1163778612.949:13311): avc: denied { read } for pid=15819 comm="top" name="stat" dev=proc ino=65549 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=file type=SYSCALL msg=audit(1163778612.949:13311): arch=40000003 syscall=5 success=yes exit=4 a0=c64780 a1=0 a2=0 a3=c64780 items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC msg=audit(1163778612.949:13312): avc: denied { getattr } for pid=15819 comm="top" name="2" dev=proc ino=131074 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir type=SYSCALL msg=audit(1163778612.949:13312): arch=40000003 syscall=195 success=yes exit=0 a0=9b3783c a1=bff6335c a2=24bff4 a3=bff6335c items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC_PATH msg=audit(1163778612.949:13312): path="/proc/2" type=AVC msg=audit(1163778612.949:13313): avc: denied { search } for pid=15819 comm="top" name="2" dev=proc ino=131074 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir type=AVC msg=audit(1163778612.949:13313): avc: denied { read } for pid=15819 comm="top" name="stat" dev=proc ino=131085 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=file type=SYSCALL msg=audit(1163778612.949:13313): arch=40000003 syscall=5 success=yes exit=4 a0=c64780 a1=0 a2=0 a3=c64780 items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC msg=audit(1163778612.949:13314): avc: denied { getattr } for pid=15819 comm="top" name="1865" dev=proc ino=122224642 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:auditd_t:s0 tclass=dir type=SYSCALL msg=audit(1163778612.949:13314): arch=40000003 syscall=195 success=yes exit=0 a0=9b3783c a1=bff6335c a2=24bff4 a3=bff6335c items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC_PATH msg=audit(1163778612.949:13314): path="/proc/1865" type=AVC msg=audit(1163778612.949:13315): avc: denied { search } for pid=15819 comm="top" name="1865" dev=proc ino=122224642 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:auditd_t:s0 tclass=dir type=AVC msg=audit(1163778612.949:13315): avc: denied { read } for pid=15819 comm="top" name="stat" dev=proc ino=122224653 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:auditd_t:s0 tclass=file type=SYSCALL msg=audit(1163778612.949:13315): arch=40000003 syscall=5 success=yes exit=4 a0=c64780 a1=0 a2=0 a3=c64780 items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC msg=audit(1163778612.949:13316): avc: denied { getattr } for pid=15819 comm="top" name="1881" dev=proc ino=123273218 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:syslogd_t:s0 tclass=dir type=SYSCALL msg=audit(1163778612.949:13316): arch=40000003 syscall=195 success=yes exit=0 a0=9b3783c a1=bff6335c a2=24bff4 a3=bff6335c items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC_PATH msg=audit(1163778612.949:13316): path="/proc/1881" type=AVC msg=audit(1163778612.949:13317): avc: denied { search } for pid=15819 comm="top" name="1881" dev=proc ino=123273218 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:syslogd_t:s0 tclass=dir type=AVC msg=audit(1163778612.949:13317): avc: denied { read } for pid=15819 comm="top" name="stat" dev=proc ino=123273229 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:syslogd_t:s0 tclass=file type=SYSCALL msg=audit(1163778612.949:13317): arch=40000003 syscall=5 success=yes exit=4 a0=c64780 a1=0 a2=0 a3=c64780 items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC msg=audit(1163778612.949:13318): avc: denied { getattr } for pid=15819 comm="top" name="1884" dev=proc ino=123469826 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:klogd_t:s0 tclass=dir type=SYSCALL msg=audit(1163778612.949:13318): arch=40000003 syscall=195 success=yes exit=0 a0=9b3783c a1=bff6335c a2=24bff4 a3=bff6335c items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC_PATH msg=audit(1163778612.949:13318): path="/proc/1884" type=AVC msg=audit(1163778612.949:13319): avc: denied { search } for pid=15819 comm="top" name="1884" dev=proc ino=123469826 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:klogd_t:s0 tclass=dir type=AVC msg=audit(1163778612.949:13319): avc: denied { read } for pid=15819 comm="top" name="stat" dev=proc ino=123469837 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:klogd_t:s0 tclass=file type=SYSCALL msg=audit(1163778612.949:13319): arch=40000003 syscall=5 success=yes exit=4 a0=c64780 a1=0 a2=0 a3=c64780 items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC msg=audit(1163778612.949:13320): avc: denied { getattr } for pid=15819 comm="top" name="1896" dev=proc ino=124256258 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:irqbalance_t:s0 tclass=dir type=SYSCALL msg=audit(1163778612.949:13320): arch=40000003 syscall=195 success=yes exit=0 a0=9b3783c a1=bff6335c a2=24bff4 a3=bff6335c items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC_PATH msg=audit(1163778612.949:13320): path="/proc/1896" type=AVC msg=audit(1163778612.949:13321): avc: denied { search } for pid=15819 comm="top" name="1896" dev=proc ino=124256258 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:irqbalance_t:s0 tclass=dir type=AVC msg=audit(1163778612.949:13321): avc: denied { read } for pid=15819 comm="top" name="stat" dev=proc ino=124256269 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:irqbalance_t:s0 tclass=file type=SYSCALL msg=audit(1163778612.949:13321): arch=40000003 syscall=5 success=yes exit=4 a0=c64780 a1=0 a2=0 a3=c64780 items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC msg=audit(1163778612.949:13322): avc: denied { getattr } for pid=15819 comm="top" name="1912" dev=proc ino=125304834 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:setrans_t:s0-s0:c0.c1023 tclass=dir type=SYSCALL msg=audit(1163778612.949:13322): arch=40000003 syscall=195 success=yes exit=0 a0=9b3783c a1=bff6335c a2=24bff4 a3=bff6335c items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC_PATH msg=audit(1163778612.949:13322): path="/proc/1912" type=AVC msg=audit(1163778612.949:13323): avc: denied { search } for pid=15819 comm="top" name="1912" dev=proc ino=125304834 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:setrans_t:s0-s0:c0.c1023 tclass=dir type=AVC msg=audit(1163778612.949:13323): avc: denied { read } for pid=15819 comm="top" name="stat" dev=proc ino=125304845 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:setrans_t:s0-s0:c0.c1023 tclass=file type=SYSCALL msg=audit(1163778612.949:13323): arch=40000003 syscall=5 success=yes exit=4 a0=c64780 a1=0 a2=0 a3=c64780 items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC msg=audit(1163778612.949:13324): avc: denied { getattr } for pid=15819 comm="top" name="1925" dev=proc ino=126156802 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:portmap_t:s0 tclass=dir type=SYSCALL msg=audit(1163778612.949:13324): arch=40000003 syscall=195 success=yes exit=0 a0=9b3783c a1=bff6335c a2=24bff4 a3=bff6335c items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC_PATH msg=audit(1163778612.949:13324): path="/proc/1925" type=AVC msg=audit(1163778612.949:13325): avc: denied { search } for pid=15819 comm="top" name="1925" dev=proc ino=126156802 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:portmap_t:s0 tclass=dir type=AVC msg=audit(1163778612.949:13325): avc: denied { read } for pid=15819 comm="top" name="stat" dev=proc ino=126156813 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:portmap_t:s0 tclass=file type=SYSCALL msg=audit(1163778612.949:13325): arch=40000003 syscall=5 success=yes exit=4 a0=c64780 a1=0 a2=0 a3=c64780 items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC msg=audit(1163778612.949:13326): avc: denied { getattr } for pid=15819 comm="top" name="1959" dev=proc ino=128385026 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:rpcd_t:s0 tclass=dir type=SYSCALL msg=audit(1163778612.949:13326): arch=40000003 syscall=195 success=yes exit=0 a0=9b3783c a1=bff6335c a2=24bff4 a3=bff6335c items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC_PATH msg=audit(1163778612.949:13326): path="/proc/1959" type=AVC msg=audit(1163778612.949:13327): avc: denied { search } for pid=15819 comm="top" name="1959" dev=proc ino=128385026 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:rpcd_t:s0 tclass=dir type=AVC msg=audit(1163778612.949:13327): avc: denied { read } for pid=15819 comm="top" name="stat" dev=proc ino=128385037 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:rpcd_t:s0 tclass=file type=SYSCALL msg=audit(1163778612.949:13327): arch=40000003 syscall=5 success=yes exit=4 a0=c64780 a1=0 a2=0 a3=c64780 items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC msg=audit(1163778612.949:13328): avc: denied { getattr } for pid=15819 comm="top" name="2033" dev=proc ino=133234690 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:bluetooth_t:s0 tclass=dir type=SYSCALL msg=audit(1163778612.949:13328): arch=40000003 syscall=195 success=yes exit=0 a0=9b3783c a1=bff6335c a2=24bff4 a3=bff6335c items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC_PATH msg=audit(1163778612.949:13328): path="/proc/2033" type=AVC msg=audit(1163778612.949:13329): avc: denied { search } for pid=15819 comm="top" name="2033" dev=proc ino=133234690 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:bluetooth_t:s0 tclass=dir type=AVC msg=audit(1163778612.949:13329): avc: denied { read } for pid=15819 comm="top" name="stat" dev=proc ino=133234701 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:bluetooth_t:s0 tclass=file type=SYSCALL msg=audit(1163778612.949:13329): arch=40000003 syscall=5 success=yes exit=4 a0=c64780 a1=0 a2=0 a3=c64780 items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC msg=audit(1163778612.949:13330): avc: denied { getattr } for pid=15819 comm="top" name="2123" dev=proc ino=139132930 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:automount_t:s0 tclass=dir type=SYSCALL msg=audit(1163778612.949:13330): arch=40000003 syscall=195 success=yes exit=0 a0=9b3783c a1=bff6335c a2=24bff4 a3=bff6335c items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC_PATH msg=audit(1163778612.949:13330): path="/proc/2123" type=AVC msg=audit(1163778612.949:13331): avc: denied { search } for pid=15819 comm="top" name="2123" dev=proc ino=139132930 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:automount_t:s0 tclass=dir type=AVC msg=audit(1163778612.949:13331): avc: denied { read } for pid=15819 comm="top" name="stat" dev=proc ino=139132941 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:automount_t:s0 tclass=file type=SYSCALL msg=audit(1163778612.949:13331): arch=40000003 syscall=5 success=yes exit=4 a0=c64780 a1=0 a2=0 a3=c64780 items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC msg=audit(1163778612.949:13332): avc: denied { getattr } for pid=15819 comm="top" name="2142" dev=proc ino=140378114 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:apmd_t:s0 tclass=dir type=SYSCALL msg=audit(1163778612.949:13332): arch=40000003 syscall=195 success=yes exit=0 a0=9b3783c a1=bff6335c a2=24bff4 a3=bff6335c items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC_PATH msg=audit(1163778612.949:13332): path="/proc/2142" type=AVC msg=audit(1163778612.949:13333): avc: denied { search } for pid=15819 comm="top" name="2142" dev=proc ino=140378114 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:apmd_t:s0 tclass=dir type=AVC msg=audit(1163778612.949:13333): avc: denied { read } for pid=15819 comm="top" name="stat" dev=proc ino=140378125 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:apmd_t:s0 tclass=file type=SYSCALL msg=audit(1163778612.949:13333): arch=40000003 syscall=5 success=yes exit=4 a0=c64780 a1=0 a2=0 a3=c64780 items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC msg=audit(1163778612.949:13334): avc: denied { getattr } for pid=15819 comm="top" name="2153" dev=proc ino=141099010 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:hplip_t:s0 tclass=dir type=SYSCALL msg=audit(1163778612.949:13334): arch=40000003 syscall=195 success=yes exit=0 a0=9b3783c a1=bff6335c a2=24bff4 a3=bff6335c items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC_PATH msg=audit(1163778612.949:13334): path="/proc/2153" type=AVC msg=audit(1163778612.949:13335): avc: denied { search } for pid=15819 comm="top" name="2153" dev=proc ino=141099010 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:hplip_t:s0 tclass=dir type=AVC msg=audit(1163778612.949:13335): avc: denied { read } for pid=15819 comm="top" name="stat" dev=proc ino=141099021 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:hplip_t:s0 tclass=file type=SYSCALL msg=audit(1163778612.949:13335): arch=40000003 syscall=5 success=yes exit=4 a0=c64780 a1=0 a2=0 a3=c64780 items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC msg=audit(1163778612.949:13336): avc: denied { getattr } for pid=15819 comm="top" name="2196" dev=proc ino=143917058 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:inetd_t:s0 tclass=dir type=SYSCALL msg=audit(1163778612.949:13336): arch=40000003 syscall=195 success=yes exit=0 a0=9b3783c a1=bff6335c a2=24bff4 a3=bff6335c items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC_PATH msg=audit(1163778612.949:13336): path="/proc/2196" type=AVC msg=audit(1163778612.949:13337): avc: denied { search } for pid=15819 comm="top" name="2196" dev=proc ino=143917058 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:inetd_t:s0 tclass=dir type=AVC msg=audit(1163778612.949:13337): avc: denied { read } for pid=15819 comm="top" name="stat" dev=proc ino=143917069 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:inetd_t:s0 tclass=file type=SYSCALL msg=audit(1163778612.949:13337): arch=40000003 syscall=5 success=yes exit=4 a0=c64780 a1=0 a2=0 a3=c64780 items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC msg=audit(1163778612.957:13338): avc: denied { getattr } for pid=15819 comm="top" name="2216" dev=proc ino=145227778 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:sendmail_t:s0 tclass=dir type=SYSCALL msg=audit(1163778612.957:13338): arch=40000003 syscall=195 success=yes exit=0 a0=9b3783c a1=bff6335c a2=24bff4 a3=bff6335c items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC_PATH msg=audit(1163778612.957:13338): path="/proc/2216" type=AVC msg=audit(1163778612.957:13339): avc: denied { search } for pid=15819 comm="top" name="2216" dev=proc ino=145227778 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:sendmail_t:s0 tclass=dir type=AVC msg=audit(1163778612.957:13339): avc: denied { read } for pid=15819 comm="top" name="stat" dev=proc ino=145227789 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:sendmail_t:s0 tclass=file type=SYSCALL msg=audit(1163778612.957:13339): arch=40000003 syscall=5 success=yes exit=4 a0=c64780 a1=0 a2=0 a3=c64780 items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC msg=audit(1163778612.957:13340): avc: denied { getattr } for pid=15819 comm="top" name="2237" dev=proc ino=146604034 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:gpm_t:s0 tclass=dir type=SYSCALL msg=audit(1163778612.957:13340): arch=40000003 syscall=195 success=yes exit=0 a0=9b3783c a1=bff6335c a2=24bff4 a3=bff6335c items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC_PATH msg=audit(1163778612.957:13340): path="/proc/2237" type=AVC msg=audit(1163778612.957:13341): avc: denied { search } for pid=15819 comm="top" name="2237" dev=proc ino=146604034 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:gpm_t:s0 tclass=dir type=AVC msg=audit(1163778612.957:13341): avc: denied { read } for pid=15819 comm="top" name="stat" dev=proc ino=146604045 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:gpm_t:s0 tclass=file type=SYSCALL msg=audit(1163778612.957:13341): arch=40000003 syscall=5 success=yes exit=4 a0=c64780 a1=0 a2=0 a3=c64780 items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC msg=audit(1163778612.957:13342): avc: denied { getattr } for pid=15819 comm="top" name="2248" dev=proc ino=147324930 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tclass=dir type=SYSCALL msg=audit(1163778612.957:13342): arch=40000003 syscall=195 success=yes exit=0 a0=9b3783c a1=bff6335c a2=24bff4 a3=bff6335c items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC_PATH msg=audit(1163778612.957:13342): path="/proc/2248" type=AVC msg=audit(1163778612.957:13343): avc: denied { search } for pid=15819 comm="top" name="2248" dev=proc ino=147324930 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tclass=dir type=AVC msg=audit(1163778612.957:13343): avc: denied { read } for pid=15819 comm="top" name="stat" dev=proc ino=147324941 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tclass=file type=SYSCALL msg=audit(1163778612.957:13343): arch=40000003 syscall=5 success=yes exit=4 a0=c64780 a1=0 a2=0 a3=c64780 items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC msg=audit(1163778612.957:13344): avc: denied { getattr } for pid=15819 comm="top" name="2285" dev=proc ino=149749762 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:xfs_t:s0 tclass=dir type=SYSCALL msg=audit(1163778612.957:13344): arch=40000003 syscall=195 success=yes exit=0 a0=9b3783c a1=bff6335c a2=24bff4 a3=bff6335c items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC_PATH msg=audit(1163778612.957:13344): path="/proc/2285" type=AVC msg=audit(1163778612.957:13345): avc: denied { search } for pid=15819 comm="top" name="2285" dev=proc ino=149749762 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:xfs_t:s0 tclass=dir type=AVC msg=audit(1163778612.957:13345): avc: denied { read } for pid=15819 comm="top" name="stat" dev=proc ino=149749773 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:xfs_t:s0 tclass=file type=SYSCALL msg=audit(1163778612.957:13345): arch=40000003 syscall=5 success=yes exit=4 a0=c64780 a1=0 a2=0 a3=c64780 items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC msg=audit(1163778612.957:13346): avc: denied { getattr } for pid=15819 comm="top" name="2401" dev=proc ino=157351938 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:hald_t:s0 tclass=dir type=SYSCALL msg=audit(1163778612.957:13346): arch=40000003 syscall=195 success=yes exit=0 a0=9b3783c a1=bff6335c a2=24bff4 a3=bff6335c items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC_PATH msg=audit(1163778612.957:13346): path="/proc/2401" type=AVC msg=audit(1163778612.957:13347): avc: denied { search } for pid=15819 comm="top" name="2401" dev=proc ino=157351938 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:hald_t:s0 tclass=dir type=AVC msg=audit(1163778612.957:13347): avc: denied { read } for pid=15819 comm="top" name="stat" dev=proc ino=157351949 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:hald_t:s0 tclass=file type=SYSCALL msg=audit(1163778612.957:13347): arch=40000003 syscall=5 success=yes exit=4 a0=c64780 a1=0 a2=0 a3=c64780 items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC msg=audit(1163778612.957:13348): avc: denied { getattr } for pid=15819 comm="top" name="2723" dev=proc ino=178454530 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:xenstored_t:s0 tclass=dir type=SYSCALL msg=audit(1163778612.957:13348): arch=40000003 syscall=195 success=yes exit=0 a0=9b3783c a1=bff6335c a2=24bff4 a3=bff6335c items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC_PATH msg=audit(1163778612.957:13348): path="/proc/2723" type=AVC msg=audit(1163778612.957:13349): avc: denied { search } for pid=15819 comm="top" name="2723" dev=proc ino=178454530 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:xenstored_t:s0 tclass=dir type=AVC msg=audit(1163778612.957:13349): avc: denied { read } for pid=15819 comm="top" name="stat" dev=proc ino=178454541 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:xenstored_t:s0 tclass=file type=SYSCALL msg=audit(1163778612.957:13349): arch=40000003 syscall=5 success=yes exit=4 a0=c64780 a1=0 a2=0 a3=c64780 items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC msg=audit(1163778612.957:13350): avc: denied { getattr } for pid=15819 comm="top" name="2732" dev=proc ino=179044354 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:xenconsoled_t:s0 tclass=dir type=SYSCALL msg=audit(1163778612.957:13350): arch=40000003 syscall=195 success=yes exit=0 a0=9b3783c a1=bff6335c a2=24bff4 a3=bff6335c items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC_PATH msg=audit(1163778612.957:13350): path="/proc/2732" type=AVC msg=audit(1163778612.957:13351): avc: denied { search } for pid=15819 comm="top" name="2732" dev=proc ino=179044354 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:xenconsoled_t:s0 tclass=dir type=AVC msg=audit(1163778612.957:13351): avc: denied { read } for pid=15819 comm="top" name="stat" dev=proc ino=179044365 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:xenconsoled_t:s0 tclass=file type=SYSCALL msg=audit(1163778612.957:13351): arch=40000003 syscall=5 success=yes exit=4 a0=c64780 a1=0 a2=0 a3=c64780 items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC msg=audit(1163778612.957:13352): avc: denied { getattr } for pid=15819 comm="top" name="2735" dev=proc ino=179240962 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:xend_t:s0 tclass=dir type=SYSCALL msg=audit(1163778612.957:13352): arch=40000003 syscall=195 success=yes exit=0 a0=9b3783c a1=bff6335c a2=24bff4 a3=bff6335c items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC_PATH msg=audit(1163778612.957:13352): path="/proc/2735" type=AVC msg=audit(1163778612.957:13353): avc: denied { search } for pid=15819 comm="top" name="2735" dev=proc ino=179240962 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:xend_t:s0 tclass=dir type=AVC msg=audit(1163778612.957:13353): avc: denied { read } for pid=15819 comm="top" name="stat" dev=proc ino=179240973 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:xend_t:s0 tclass=file type=SYSCALL msg=audit(1163778612.957:13353): arch=40000003 syscall=5 success=yes exit=4 a0=c64780 a1=0 a2=0 a3=c64780 items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC msg=audit(1163778612.965:13354): avc: denied { getattr } for pid=15819 comm="top" name="3150" dev=proc ino=206438402 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:fsdaemon_t:s0 tclass=dir type=SYSCALL msg=audit(1163778612.965:13354): arch=40000003 syscall=195 success=yes exit=0 a0=9b3783c a1=bff6335c a2=24bff4 a3=bff6335c items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC_PATH msg=audit(1163778612.965:13354): path="/proc/3150" type=AVC msg=audit(1163778612.965:13355): avc: denied { search } for pid=15819 comm="top" name="3150" dev=proc ino=206438402 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:fsdaemon_t:s0 tclass=dir type=AVC msg=audit(1163778612.965:13355): avc: denied { read } for pid=15819 comm="top" name="stat" dev=proc ino=206438413 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:fsdaemon_t:s0 tclass=file type=SYSCALL msg=audit(1163778612.965:13355): arch=40000003 syscall=5 success=yes exit=4 a0=c64780 a1=0 a2=0 a3=c64780 items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC msg=audit(1163778612.965:13356): avc: denied { getattr } for pid=15819 comm="top" name="3172" dev=proc ino=207880194 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:getty_t:s0 tclass=dir type=SYSCALL msg=audit(1163778612.965:13356): arch=40000003 syscall=195 success=yes exit=0 a0=9b3783c a1=bff6335c a2=24bff4 a3=bff6335c items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC_PATH msg=audit(1163778612.965:13356): path="/proc/3172" type=AVC msg=audit(1163778612.965:13357): avc: denied { search } for pid=15819 comm="top" name="3172" dev=proc ino=207880194 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:getty_t:s0 tclass=dir type=AVC msg=audit(1163778612.965:13357): avc: denied { read } for pid=15819 comm="top" name="stat" dev=proc ino=207880205 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:getty_t:s0 tclass=file type=SYSCALL msg=audit(1163778612.965:13357): arch=40000003 syscall=5 success=yes exit=4 a0=c64780 a1=0 a2=0 a3=c64780 items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC msg=audit(1163778612.965:13358): avc: denied { getattr } for pid=15819 comm="top" name="3201" dev=proc ino=209780738 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tclass=dir type=SYSCALL msg=audit(1163778612.965:13358): arch=40000003 syscall=195 success=yes exit=0 a0=9b3783c a1=bff6335c a2=24bff4 a3=bff6335c items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC_PATH msg=audit(1163778612.965:13358): path="/proc/3201" type=AVC msg=audit(1163778612.965:13359): avc: denied { search } for pid=15819 comm="top" name="3201" dev=proc ino=209780738 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tclass=dir type=AVC msg=audit(1163778612.965:13359): avc: denied { read } for pid=15819 comm="top" name="stat" dev=proc ino=209780749 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tclass=file type=SYSCALL msg=audit(1163778612.965:13359): arch=40000003 syscall=5 success=yes exit=4 a0=c64780 a1=0 a2=0 a3=c64780 items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC msg=audit(1163778612.969:13360): avc: denied { getattr } for pid=15819 comm="top" name="6659" dev=proc ino=436404226 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=staff_u:staff_r:staff_dbusd_t:s0 tclass=dir type=SYSCALL msg=audit(1163778612.969:13360): arch=40000003 syscall=195 success=yes exit=0 a0=9b3783c a1=bff6335c a2=24bff4 a3=bff6335c items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC_PATH msg=audit(1163778612.969:13360): path="/proc/6659" type=AVC msg=audit(1163778612.969:13361): avc: denied { search } for pid=15819 comm="top" name="6659" dev=proc ino=436404226 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=staff_u:staff_r:staff_dbusd_t:s0 tclass=dir type=AVC msg=audit(1163778612.969:13361): avc: denied { read } for pid=15819 comm="top" name="stat" dev=proc ino=436404237 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=staff_u:staff_r:staff_dbusd_t:s0 tclass=file type=SYSCALL msg=audit(1163778612.969:13361): arch=40000003 syscall=5 success=yes exit=4 a0=c64780 a1=0 a2=0 a3=c64780 items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC msg=audit(1163778612.969:13362): avc: denied { getattr } for pid=15819 comm="top" name="6687" dev=proc ino=438239234 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dir type=SYSCALL msg=audit(1163778612.969:13362): arch=40000003 syscall=195 success=yes exit=0 a0=9b3783c a1=bff6335c a2=24bff4 a3=bff6335c items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC_PATH msg=audit(1163778612.969:13362): path="/proc/6687" type=AVC msg=audit(1163778612.969:13363): avc: denied { search } for pid=15819 comm="top" name="6687" dev=proc ino=438239234 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dir type=AVC msg=audit(1163778612.969:13363): avc: denied { read } for pid=15819 comm="top" name="stat" dev=proc ino=438239245 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=file type=SYSCALL msg=audit(1163778612.969:13363): arch=40000003 syscall=5 success=yes exit=4 a0=c64780 a1=0 a2=0 a3=c64780 items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC msg=audit(1163778612.969:13364): avc: denied { getattr } for pid=15819 comm="top" name="14252" dev=proc ino=934019074 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:xdm_xserver_t:s0-s0:c0.c1023 tclass=dir type=SYSCALL msg=audit(1163778612.969:13364): arch=40000003 syscall=195 success=yes exit=0 a0=9b3783c a1=bff6335c a2=24bff4 a3=bff6335c items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC_PATH msg=audit(1163778612.969:13364): path="/proc/14252" type=AVC msg=audit(1163778612.969:13365): avc: denied { search } for pid=15819 comm="top" name="14252" dev=proc ino=934019074 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:xdm_xserver_t:s0-s0:c0.c1023 tclass=dir type=AVC msg=audit(1163778612.969:13365): avc: denied { read } for pid=15819 comm="top" name="stat" dev=proc ino=934019085 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:xdm_xserver_t:s0-s0:c0.c1023 tclass=file type=SYSCALL msg=audit(1163778612.969:13365): arch=40000003 syscall=5 success=yes exit=4 a0=c64780 a1=0 a2=0 a3=c64780 items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC msg=audit(1163778612.969:13366): avc: denied { getattr } for pid=15819 comm="top" name="14333" dev=proc ino=939327490 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=staff_u:staff_r:staff_ssh_agent_t:s0 tclass=dir type=SYSCALL msg=audit(1163778612.969:13366): arch=40000003 syscall=195 success=yes exit=0 a0=9b3783c a1=bff6335c a2=24bff4 a3=bff6335c items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC_PATH msg=audit(1163778612.969:13366): path="/proc/14333" type=AVC msg=audit(1163778612.969:13367): avc: denied { search } for pid=15819 comm="top" name="14333" dev=proc ino=939327490 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=staff_u:staff_r:staff_ssh_agent_t:s0 tclass=dir type=AVC msg=audit(1163778612.969:13367): avc: denied { read } for pid=15819 comm="top" name="stat" dev=proc ino=939327501 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=staff_u:staff_r:staff_ssh_agent_t:s0 tclass=file type=SYSCALL msg=audit(1163778612.969:13367): arch=40000003 syscall=5 success=yes exit=4 a0=c64780 a1=0 a2=0 a3=c64780 items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC msg=audit(1163778612.969:13368): avc: denied { getattr } for pid=15819 comm="top" name="14914" dev=proc ino=977403906 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=staff_u:staff_r:pam_t:s0 tclass=dir type=SYSCALL msg=audit(1163778612.969:13368): arch=40000003 syscall=195 success=yes exit=0 a0=9b3783c a1=bff6335c a2=24bff4 a3=bff6335c items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC_PATH msg=audit(1163778612.969:13368): path="/proc/14914" type=AVC msg=audit(1163778612.969:13369): avc: denied { search } for pid=15819 comm="top" name="14914" dev=proc ino=977403906 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=staff_u:staff_r:pam_t:s0 tclass=dir type=AVC msg=audit(1163778612.969:13369): avc: denied { read } for pid=15819 comm="top" name="stat" dev=proc ino=977403917 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=staff_u:staff_r:pam_t:s0 tclass=file type=SYSCALL msg=audit(1163778612.969:13369): arch=40000003 syscall=5 success=yes exit=4 a0=c64780 a1=0 a2=0 a3=c64780 items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC msg=audit(1163778612.969:13370): avc: denied { getattr } for pid=15819 comm="top" name="14970" dev=proc ino=981073922 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=staff_u:staff_r:staff_su_t:s0 tclass=dir type=SYSCALL msg=audit(1163778612.969:13370): arch=40000003 syscall=195 success=yes exit=0 a0=9b3783c a1=bff6335c a2=24bff4 a3=bff6335c items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC_PATH msg=audit(1163778612.969:13370): path="/proc/14970" type=AVC msg=audit(1163778612.969:13371): avc: denied { search } for pid=15819 comm="top" name="14970" dev=proc ino=981073922 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=staff_u:staff_r:staff_su_t:s0 tclass=dir type=AVC msg=audit(1163778612.969:13371): avc: denied { read } for pid=15819 comm="top" name="stat" dev=proc ino=981073933 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=staff_u:staff_r:staff_su_t:s0 tclass=file type=SYSCALL msg=audit(1163778612.969:13371): arch=40000003 syscall=5 success=yes exit=4 a0=c64780 a1=0 a2=0 a3=c64780 items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC msg=audit(1163778612.969:13372): avc: denied { getattr } for pid=15819 comm="top" name="15125" dev=proc ino=991232002 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=staff_u:staff_r:newrole_t:s0 tclass=dir type=SYSCALL msg=audit(1163778612.969:13372): arch=40000003 syscall=195 success=yes exit=0 a0=9b3783c a1=bff6335c a2=24bff4 a3=bff6335c items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC_PATH msg=audit(1163778612.969:13372): path="/proc/15125" type=AVC msg=audit(1163778612.969:13373): avc: denied { search } for pid=15819 comm="top" name="15125" dev=proc ino=991232002 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=staff_u:staff_r:newrole_t:s0 tclass=dir type=AVC msg=audit(1163778612.969:13373): avc: denied { read } for pid=15819 comm="top" name="stat" dev=proc ino=991232013 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=staff_u:staff_r:newrole_t:s0 tclass=file type=SYSCALL msg=audit(1163778612.969:13373): arch=40000003 syscall=5 success=yes exit=4 a0=c64780 a1=0 a2=0 a3=c64780 items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC msg=audit(1163778612.969:13374): avc: denied { getattr } for pid=15819 comm="top" name="15126" dev=proc ino=991297538 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=staff_u:sysadm_r:sysadm_t:s0 tclass=dir type=SYSCALL msg=audit(1163778612.969:13374): arch=40000003 syscall=195 success=yes exit=0 a0=9b3783c a1=bff6335c a2=24bff4 a3=bff6335c items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC_PATH msg=audit(1163778612.969:13374): path="/proc/15126" type=AVC msg=audit(1163778612.969:13375): avc: denied { search } for pid=15819 comm="top" name="15126" dev=proc ino=991297538 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=staff_u:sysadm_r:sysadm_t:s0 tclass=dir type=AVC msg=audit(1163778612.969:13375): avc: denied { read } for pid=15819 comm="top" name="stat" dev=proc ino=991297549 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=staff_u:sysadm_r:sysadm_t:s0 tclass=file type=SYSCALL msg=audit(1163778612.969:13375): arch=40000003 syscall=5 success=yes exit=4 a0=c64780 a1=0 a2=0 a3=c64780 items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC msg=audit(1163778612.969:13376): avc: denied { getattr } for pid=15819 comm="top" name="15713" dev=proc ino=1029767170 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=staff_u:sysadm_r:rpm_t:s0 tclass=dir type=SYSCALL msg=audit(1163778612.969:13376): arch=40000003 syscall=195 success=yes exit=0 a0=9b3783c a1=bff6335c a2=24bff4 a3=bff6335c items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC_PATH msg=audit(1163778612.969:13376): path="/proc/15713" type=AVC msg=audit(1163778612.969:13377): avc: denied { search } for pid=15819 comm="top" name="15713" dev=proc ino=1029767170 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=staff_u:sysadm_r:rpm_t:s0 tclass=dir type=AVC msg=audit(1163778612.969:13377): avc: denied { read } for pid=15819 comm="top" name="stat" dev=proc ino=1029767181 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=staff_u:sysadm_r:rpm_t:s0 tclass=file type=SYSCALL msg=audit(1163778612.969:13377): arch=40000003 syscall=5 success=yes exit=4 a0=c64780 a1=0 a2=0 a3=c64780 items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC msg=audit(1163778613.469:13378): avc: denied { getattr } for pid=15819 comm="top" name="2216" dev=proc ino=145227778 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:sendmail_t:s0 tclass=dir type=SYSCALL msg=audit(1163778613.469:13378): arch=40000003 syscall=195 success=yes exit=0 a0=9b3783c a1=bff6335c a2=24bff4 a3=bff6335c items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC_PATH msg=audit(1163778613.469:13378): path="/proc/2216" type=AVC msg=audit(1163778613.469:13379): avc: denied { search } for pid=15819 comm="top" name="2216" dev=proc ino=145227778 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:sendmail_t:s0 tclass=dir type=SYSCALL msg=audit(1163778613.469:13379): arch=40000003 syscall=5 success=yes exit=4 a0=c64780 a1=0 a2=0 a3=c64780 items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC msg=audit(1163778613.477:13380): avc: denied { read } for pid=15819 comm="top" name="utmp" dev=dm-0 ino=14436583 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:object_r:initrc_var_run_t:s0 tclass=file type=SYSCALL msg=audit(1163778613.477:13380): arch=40000003 syscall=5 success=yes exit=4 a0=2346d2 a1=0 a2=bff633e8 a3=2346d8 items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC msg=audit(1163778613.477:13381): avc: denied { lock } for pid=15819 comm="top" name="utmp" dev=dm-0 ino=14436583 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:object_r:initrc_var_run_t:s0 tclass=file type=SYSCALL msg=audit(1163778613.477:13381): arch=40000003 syscall=221 success=yes exit=0 a0=4 a1=7 a2=bff633a0 a3=0 items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC_PATH msg=audit(1163778613.477:13381): path="/var/run/utmp" type=AVC msg=audit(1163778613.477:13382): avc: denied { write } for pid=15819 comm="top" name="8" dev=devpts ino=10 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=staff_u:object_r:staff_devpts_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163778613.477:13382): arch=40000003 syscall=4 success=yes exit=2048 a0=1 a1=8056ba0 a2=800 a3=800 items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC_PATH msg=audit(1163778613.477:13382): path="/dev/pts/8" type=AVC msg=audit(1163778613.477:13383): avc: denied { read } for pid=15819 comm="top" name="8" dev=devpts ino=10 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=staff_u:object_r:staff_devpts_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163778613.477:13383): arch=40000003 syscall=3 success=no exit=-11 a0=0 a1=bff63c05 a2=1 a3=1 items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC_PATH msg=audit(1163778613.477:13383): path="/dev/pts/8" type=AVC msg=audit(1163778613.477:13384): avc: denied { ioctl } for pid=15819 comm="top" name="8" dev=devpts ino=10 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=staff_u:object_r:staff_devpts_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163778613.477:13384): arch=40000003 syscall=54 success=yes exit=0 a0=0 a1=540b a2=0 a3=1 items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC_PATH msg=audit(1163778613.477:13384): path="/dev/pts/8" type=AVC msg=audit(1163778633.746:13385): avc: denied { getattr } for pid=15794 comm="bash" name="su" dev=dm-0 ino=13683691 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:object_r:su_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163778633.746:13385): arch=40000003 syscall=195 success=yes exit=0 a0=9de04f8 a1=bfd66590 a2=457ff4 a3=9de04f8 items=0 ppid=15793 pid=15794 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC_PATH msg=audit(1163778633.746:13385): path="/bin/su" type=AVC msg=audit(1163778633.746:13386): avc: denied { execute } for pid=15794 comm="bash" name="su" dev=dm-0 ino=13683691 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:object_r:su_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163778633.746:13386): arch=40000003 syscall=33 success=yes exit=0 a0=9de04f8 a1=1 a2=11 a3=9de04f8 items=0 ppid=15793 pid=15794 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC msg=audit(1163778633.746:13387): avc: denied { read } for pid=15794 comm="bash" name="su" dev=dm-0 ino=13683691 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:object_r:su_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163778633.746:13387): arch=40000003 syscall=33 success=yes exit=0 a0=9de04f8 a1=4 a2=ffffffff a3=9de04f8 items=0 ppid=15793 pid=15794 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC msg=audit(1163778633.746:13388): avc: denied { execute_no_trans } for pid=15820 comm="bash" name="su" dev=dm-0 ino=13683691 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:object_r:su_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163778633.746:13388): arch=40000003 syscall=11 success=yes exit=0 a0=9de04f8 a1=9de0508 a2=9de05c0 a3=9de71b8 items=0 ppid=15794 pid=15820 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=pts8 comm="su" exe="/bin/su" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC_PATH msg=audit(1163778633.746:13388): path="/bin/su" type=AVC msg=audit(1163778633.754:13389): avc: denied { read } for pid=15820 comm="su" name="shadow" dev=dm-0 ino=9332039 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:object_r:shadow_t:s0 tclass=file type=SYSCALL msg=audit(1163778633.754:13389): arch=40000003 syscall=5 success=yes exit=3 a0=40d304 a1=0 a2=1b6 a3=8011aa8 items=0 ppid=15794 pid=15820 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=pts8 comm="su" exe="/bin/su" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC msg=audit(1163778633.754:13390): avc: denied { getattr } for pid=15820 comm="su" name="shadow" dev=dm-0 ino=9332039 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:object_r:shadow_t:s0 tclass=file type=SYSCALL msg=audit(1163778633.754:13390): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bffb8de8 a2=c35ff4 a3=8011aa8 items=0 ppid=15794 pid=15820 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=pts8 comm="su" exe="/bin/su" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC_PATH msg=audit(1163778633.754:13390): path="/etc/shadow" type=AVC msg=audit(1163778637.098:13391): avc: denied { create } for pid=15820 comm="su" scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=staff_u:staff_r:staff_xserver_t:s0 tclass=netlink_audit_socket type=SYSCALL msg=audit(1163778637.098:13391): arch=40000003 syscall=102 success=yes exit=3 a0=1 a1=bffb8f50 a2=130ff4 a3=0 items=0 ppid=15794 pid=15820 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=pts8 comm="su" exe="/bin/su" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC msg=audit(1163778637.098:13392): avc: denied { write } for pid=15820 comm="su" scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=staff_u:staff_r:staff_xserver_t:s0 tclass=netlink_audit_socket type=AVC msg=audit(1163778637.098:13392): avc: denied { nlmsg_relay } for pid=15820 comm="su" scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=staff_u:staff_r:staff_xserver_t:s0 tclass=netlink_audit_socket type=AVC msg=audit(1163778637.098:13392): avc: denied { audit_write } for pid=15820 comm="su" capability=29 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=staff_u:staff_r:staff_xserver_t:s0 tclass=capability type=USER_AUTH msg=audit(1163778637.102:13393): user pid=15820 uid=500 auid=500 subj=staff_u:staff_r:staff_xserver_t:s0 msg='PAM: authentication acct=root : exe="/bin/su" (hostname=?, addr=?, terminal=pts/8 res=success)' type=SYSCALL msg=audit(1163778637.098:13392): arch=40000003 syscall=102 success=yes exit=112 a0=b a1=bffae1d0 a2=130ff4 a3=bffb4c10 items=0 ppid=15794 pid=15820 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=pts8 comm="su" exe="/bin/su" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC msg=audit(1163778637.102:13394): avc: denied { read } for pid=15820 comm="su" scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=staff_u:staff_r:staff_xserver_t:s0 tclass=netlink_audit_socket type=SYSCALL msg=audit(1163778637.102:13394): arch=40000003 syscall=102 success=yes exit=36 a0=c a1=bffae180 a2=130ff4 a3=bffb054c items=0 ppid=15794 pid=15820 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=pts8 comm="su" exe="/bin/su" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=USER_ACCT msg=audit(1163778637.102:13395): user pid=15820 uid=500 auid=500 subj=staff_u:staff_r:staff_xserver_t:s0 msg='PAM: accounting acct=root : exe="/bin/su" (hostname=?, addr=?, terminal=pts/8 res=success)' type=AVC msg=audit(1163778637.102:13396): avc: denied { write } for pid=15820 comm="su" name="utmp" dev=dm-0 ino=14436583 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:object_r:initrc_var_run_t:s0 tclass=file type=SYSCALL msg=audit(1163778637.102:13396): arch=40000003 syscall=5 success=yes exit=3 a0=c1e6d2 a1=2 a2=0 a3=c1e6d8 items=0 ppid=15794 pid=15820 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=pts8 comm="su" exe="/bin/su" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=USER_START msg=audit(1163778637.102:13397): user pid=15820 uid=500 auid=500 subj=staff_u:staff_r:staff_xserver_t:s0 msg='PAM: session open acct=root : exe="/bin/su" (hostname=?, addr=?, terminal=pts/8 res=success)' type=CRED_ACQ msg=audit(1163778637.102:13398): user pid=15820 uid=500 auid=500 subj=staff_u:staff_r:staff_xserver_t:s0 msg='PAM: setcred acct=root : exe="/bin/su" (hostname=?, addr=?, terminal=pts/8 res=success)' type=AVC msg=audit(1163778637.106:13399): avc: denied { search } for pid=15821 comm="bash" name="root" dev=dm-0 ino=13127137 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1163778637.106:13399): avc: denied { read } for pid=15821 comm="bash" name=".bashrc" dev=dm-0 ino=13127142 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=root:object_r:user_home_t:s0 tclass=file type=SYSCALL msg=audit(1163778637.106:13399): arch=40000003 syscall=5 success=yes exit=3 a0=9a6ff70 a1=8000 a2=0 a3=8000 items=0 ppid=15820 pid=15821 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts8 comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC msg=audit(1163778637.106:13400): avc: denied { getattr } for pid=15821 comm="bash" name=".bashrc" dev=dm-0 ino=13127142 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=root:object_r:user_home_t:s0 tclass=file type=SYSCALL msg=audit(1163778637.106:13400): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bf8de094 a2=24bff4 a3=9a6ff70 items=0 ppid=15820 pid=15821 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts8 comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC_PATH msg=audit(1163778637.106:13400): path="/root/.bashrc" type=AVC msg=audit(1163778637.162:13401): avc: denied { execute } for pid=15834 comm="bash" name="consoletype" dev=dm-0 ino=9984625 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:object_r:consoletype_exec_t:s0 tclass=file type=AVC msg=audit(1163778637.162:13401): avc: denied { execute_no_trans } for pid=15834 comm="bash" name="consoletype" dev=dm-0 ino=9984625 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:object_r:consoletype_exec_t:s0 tclass=file type=AVC msg=audit(1163778637.162:13401): avc: denied { read } for pid=15834 comm="bash" name="consoletype" dev=dm-0 ino=9984625 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:object_r:consoletype_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163778637.162:13401): arch=40000003 syscall=11 success=yes exit=0 a0=9a82690 a1=9a820c0 a2=9a7cba8 a3=9a82158 items=0 ppid=15833 pid=15834 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts8 comm="consoletype" exe="/sbin/consoletype" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC_PATH msg=audit(1163778637.162:13401): path="/sbin/consoletype" type=AVC_PATH msg=audit(1163778637.162:13401): path="/sbin/consoletype" type=AVC msg=audit(1163778637.162:13402): avc: denied { getattr } for pid=15834 comm="consoletype" name="8" dev=devpts ino=10 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=staff_u:object_r:staff_devpts_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163778637.162:13402): arch=40000003 syscall=197 success=yes exit=0 a0=0 a1=bfe386cc a2=fe9ff4 a3=bfe386cc items=0 ppid=15833 pid=15834 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts8 comm="consoletype" exe="/sbin/consoletype" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC_PATH msg=audit(1163778637.162:13402): path="/dev/pts/8" type=AVC msg=audit(1163778637.190:13403): avc: denied { read } for pid=15821 comm="bash" name=".bash_history" dev=dm-0 ino=13127151 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=user_u:object_r:user_home_t:s0 tclass=file type=SYSCALL msg=audit(1163778637.190:13403): arch=40000003 syscall=5 success=yes exit=3 a0=9a70150 a1=8000 a2=0 a3=8000 items=0 ppid=15820 pid=15821 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts8 comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC msg=audit(1163778637.190:13404): avc: denied { getattr } for pid=15821 comm="bash" name=".bash_history" dev=dm-0 ino=13127151 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=user_u:object_r:user_home_t:s0 tclass=file type=SYSCALL msg=audit(1163778637.190:13404): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bf8de02c a2=24bff4 a3=0 items=0 ppid=15820 pid=15821 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts8 comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC_PATH msg=audit(1163778637.190:13404): path="/root/.bash_history" type=AVC msg=audit(1163778643.866:13405): avc: denied { getattr } for pid=15821 comm="bash" name="newrole" dev=dm-0 ino=10325592 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:object_r:newrole_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163778643.866:13405): arch=40000003 syscall=195 success=yes exit=0 a0=9a82dd0 a1=bf8ddd60 a2=24bff4 a3=9a82dd0 items=0 ppid=15820 pid=15821 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts8 comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC_PATH msg=audit(1163778643.866:13405): path="/usr/bin/newrole" type=AVC msg=audit(1163778643.866:13406): avc: denied { execute } for pid=15821 comm="bash" name="newrole" dev=dm-0 ino=10325592 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:object_r:newrole_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163778643.866:13406): arch=40000003 syscall=33 success=yes exit=0 a0=9a82dd0 a1=1 a2=11 a3=9a82dd0 items=0 ppid=15820 pid=15821 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts8 comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC msg=audit(1163778643.866:13407): avc: denied { read } for pid=15821 comm="bash" name="newrole" dev=dm-0 ino=10325592 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:object_r:newrole_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163778643.866:13407): arch=40000003 syscall=33 success=yes exit=0 a0=9a82dd0 a1=4 a2=ffffffff a3=9a82dd0 items=0 ppid=15820 pid=15821 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts8 comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC msg=audit(1163778643.866:13408): avc: denied { execute_no_trans } for pid=15841 comm="bash" name="newrole" dev=dm-0 ino=10325592 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:object_r:newrole_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163778643.866:13408): arch=40000003 syscall=11 success=yes exit=0 a0=9a82dd0 a1=9a819b0 a2=9a7cba8 a3=9a82d08 items=0 ppid=15821 pid=15841 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts8 comm="newrole" exe="/usr/bin/newrole" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC_PATH msg=audit(1163778643.866:13408): path="/usr/bin/newrole" type=AVC msg=audit(1163778643.866:13409): avc: denied { search } for pid=15841 comm="newrole" name="contexts" dev=dm-0 ino=9334400 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:object_r:default_context_t:s0 tclass=dir type=AVC msg=audit(1163778643.866:13409): avc: denied { read } for pid=15841 comm="newrole" name="default_type" dev=dm-0 ino=9334403 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:object_r:default_context_t:s0 tclass=file type=SYSCALL msg=audit(1163778643.866:13409): arch=40000003 syscall=5 success=yes exit=3 a0=9bc5040 a1=8000 a2=1b6 a3=9bc6c98 items=0 ppid=15821 pid=15841 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts8 comm="newrole" exe="/usr/bin/newrole" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC msg=audit(1163778643.866:13410): avc: denied { getattr } for pid=15841 comm="newrole" name="default_type" dev=dm-0 ino=9334403 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:object_r:default_context_t:s0 tclass=file type=SYSCALL msg=audit(1163778643.866:13410): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bff78d40 a2=743ff4 a3=9bc6c98 items=0 ppid=15821 pid=15841 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts8 comm="newrole" exe="/usr/bin/newrole" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC_PATH msg=audit(1163778643.866:13410): path="/etc/selinux/strict/contexts/default_type" type=AVC msg=audit(1163778643.866:13411): avc: denied { write } for pid=15841 comm="newrole" name="context" dev=selinuxfs ino=5 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:object_r:security_t:s0 tclass=file type=SYSCALL msg=audit(1163778643.866:13411): arch=40000003 syscall=5 success=yes exit=3 a0=bff77f88 a1=8002 a2=0 a3=8002 items=0 ppid=15821 pid=15841 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts8 comm="newrole" exe="/usr/bin/newrole" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC msg=audit(1163778643.866:13412): avc: denied { check_context } for pid=15841 comm="newrole" scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:object_r:security_t:s0 tclass=security type=SYSCALL msg=audit(1163778643.866:13412): arch=40000003 syscall=4 success=yes exit=29 a0=3 a1=9bc6d28 a2=1d a3=bff77f88 items=0 ppid=15821 pid=15841 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts8 comm="newrole" exe="/usr/bin/newrole" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=USER_AUTH msg=audit(1163778645.667:13413): user pid=15841 uid=0 auid=500 subj=staff_u:staff_r:staff_xserver_t:s0 msg='PAM: authentication acct=kmacmill : exe="/usr/bin/newrole" (hostname=?, addr=?, terminal=pts/8 res=success)' type=USER_ACCT msg=audit(1163778645.667:13414): user pid=15841 uid=0 auid=500 subj=staff_u:staff_r:staff_xserver_t:s0 msg='PAM: accounting acct=kmacmill : exe="/usr/bin/newrole" (hostname=?, addr=?, terminal=pts/8 res=success)' type=AVC msg=audit(1163778645.667:13415): avc: denied { compute_relabel } for pid=15841 comm="newrole" scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:object_r:security_t:s0 tclass=security type=SYSCALL msg=audit(1163778645.667:13415): arch=40000003 syscall=4 success=yes exit=66 a0=4 a1=9bcd788 a2=42 a3=9bcd788 items=0 ppid=15821 pid=15841 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts8 comm="newrole" exe="/usr/bin/newrole" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC msg=audit(1163778645.667:13416): avc: denied { fowner } for pid=15841 comm="newrole" capability=3 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=staff_u:staff_r:staff_xserver_t:s0 tclass=capability type=AVC msg=audit(1163778645.667:13416): avc: denied { relabelfrom } for pid=15841 comm="newrole" name="8" dev=devpts ino=10 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=staff_u:object_r:staff_devpts_t:s0 tclass=chr_file type=AVC msg=audit(1163778645.667:13416): avc: denied { relabelto } for pid=15841 comm="newrole" name="8" dev=devpts ino=10 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=staff_u:object_r:sysadm_devpts_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163778645.667:13416): arch=40000003 syscall=228 success=yes exit=0 a0=3 a1=a2f0d3 a2=9bcd6a8 a3=24 items=0 ppid=15821 pid=15841 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts8 comm="newrole" exe="/usr/bin/newrole" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC msg=audit(1163778645.667:13417): avc: denied { read } for pid=15842 comm="newrole" name="8" dev=devpts ino=10 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=staff_u:object_r:sysadm_devpts_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163778645.667:13417): arch=40000003 syscall=5 success=yes exit=0 a0=9bc5c90 a1=0 a2=a a3=9bc5c90 items=0 ppid=15841 pid=15842 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts8 comm="newrole" exe="/usr/bin/newrole" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC msg=audit(1163778645.667:13418): avc: denied { write } for pid=15842 comm="newrole" name="8" dev=devpts ino=10 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=staff_u:object_r:sysadm_devpts_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163778645.667:13418): arch=40000003 syscall=5 success=yes exit=1 a0=9bc5c90 a1=1 a2=a a3=9bc5c90 items=0 ppid=15841 pid=15842 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts8 comm="newrole" exe="/usr/bin/newrole" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC msg=audit(1163778645.671:13419): avc: denied { setexec } for pid=15842 comm="newrole" scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=staff_u:staff_r:staff_xserver_t:s0 tclass=process type=SYSCALL msg=audit(1163778645.671:13419): arch=40000003 syscall=4 success=yes exit=29 a0=3 a1=9bcd658 a2=1d a3=a2f751 items=0 ppid=15841 pid=15842 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts8 comm="newrole" exe="/usr/bin/newrole" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC msg=audit(1163778645.671:13420): avc: denied { transition } for pid=15842 comm="newrole" name="bash" dev=dm-0 ino=13683670 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=staff_u:sysadm_r:sysadm_t:s0 tclass=process type=AVC msg=audit(1163778645.671:13420): avc: denied { use } for pid=15842 comm="bash" name="8" dev=devpts ino=10 scontext=staff_u:sysadm_r:sysadm_t:s0 tcontext=staff_u:staff_r:staff_xserver_t:s0 tclass=fd type=AVC msg=audit(1163778645.671:13420): avc: denied { siginh } for pid=15842 comm="bash" scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=staff_u:sysadm_r:sysadm_t:s0 tclass=process type=AVC msg=audit(1163778645.671:13420): avc: denied { rlimitinh } for pid=15842 comm="bash" scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=staff_u:sysadm_r:sysadm_t:s0 tclass=process type=AVC msg=audit(1163778645.671:13420): avc: denied { noatsecure } for pid=15842 comm="bash" scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=staff_u:sysadm_r:sysadm_t:s0 tclass=process type=SYSCALL msg=audit(1163778645.671:13420): arch=40000003 syscall=11 success=yes exit=0 a0=9bc6f68 a1=bff7919c a2=9bc6d98 a3=9bc5c90 items=0 ppid=15841 pid=15842 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts8 comm="bash" exe="/bin/bash" subj=staff_u:sysadm_r:sysadm_t:s0 key=(null) type=AVC_PATH msg=audit(1163778645.671:13420): path="/dev/pts/8" type=AVC_PATH msg=audit(1163778645.671:13420): path="/bin/bash" type=AVC msg=audit(1163778645.723:13421): avc: denied { use } for pid=15852 comm="hostname" name="8" dev=devpts ino=10 scontext=staff_u:sysadm_r:hostname_t:s0 tcontext=staff_u:staff_r:staff_xserver_t:s0 tclass=fd type=SYSCALL msg=audit(1163778645.723:13421): arch=40000003 syscall=11 success=yes exit=0 a0=83064d0 a1=83091e8 a2=8309980 a3=8308440 items=0 ppid=15851 pid=15852 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts8 comm="hostname" exe="/bin/hostname" subj=staff_u:sysadm_r:hostname_t:s0 key=(null) type=AVC_PATH msg=audit(1163778645.723:13421): path="/dev/pts/8" type=AVC msg=audit(1163778645.755:13422): avc: denied { use } for pid=15865 comm="consoletype" name="8" dev=devpts ino=10 scontext=staff_u:sysadm_r:consoletype_t:s0 tcontext=staff_u:staff_r:staff_xserver_t:s0 tclass=fd type=SYSCALL msg=audit(1163778645.755:13422): arch=40000003 syscall=11 success=yes exit=0 a0=8312288 a1=8311be0 a2=830bbf0 a3=8311c78 items=0 ppid=15864 pid=15865 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts8 comm="consoletype" exe="/sbin/consoletype" subj=staff_u:sysadm_r:consoletype_t:s0 key=(null) type=AVC_PATH msg=audit(1163778645.755:13422): path="/dev/pts/8" type=AVC msg=audit(1163778648.635:13423): avc: denied { use } for pid=15842 comm="bash" name="8" dev=devpts ino=10 scontext=staff_u:sysadm_r:sysadm_t:s0 tcontext=staff_u:staff_r:staff_xserver_t:s0 tclass=fd type=SYSCALL msg=audit(1163778648.635:13423): arch=40000003 syscall=54 success=yes exit=0 a0=ff a1=5410 a2=bfef9f84 a3=bfef9f8c items=0 ppid=15841 pid=15842 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts8 comm="bash" exe="/bin/bash" subj=staff_u:sysadm_r:sysadm_t:s0 key=(null) type=AVC_PATH msg=audit(1163778648.635:13423): path="/dev/pts/8" type=AVC msg=audit(1163778675.468:13424): avc: denied { getattr } for pid=6659 comm="dbus-daemon" name="/" dev=dm-0 ino=2 scontext=staff_u:staff_r:staff_dbusd_t:s0 tcontext=system_u:object_r:fs_t:s0 tclass=filesystem type=SYSCALL msg=audit(1163778675.468:13424): arch=40000003 syscall=100 success=yes exit=0 a0=18 a1=bfcd52ac a2=c4eff4 a3=ffffffb8 items=0 ppid=1 pid=6659 auid=500 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) comm="dbus-daemon" exe="/bin/dbus-daemon" subj=staff_u:staff_r:staff_dbusd_t:s0 key=(null) type=AVC msg=audit(1163778682.377:13425): avc: denied { sigkill } for pid=15880 comm="pkill" scontext=staff_u:sysadm_r:sysadm_t:s0 tcontext=system_u:system_r:xdm_xserver_t:s0-s0:c0.c1023 tclass=process type=SYSCALL msg=audit(1163778682.377:13425): arch=40000003 syscall=37 success=yes exit=0 a0=37ac a1=9 a2=0 a3=8e790b0 items=0 ppid=15842 pid=15880 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts8 comm="pkill" exe="/usr/bin/pkill" subj=staff_u:sysadm_r:sysadm_t:s0 key=(null) type=AVC msg=audit(1163778682.477:13426): avc: denied { read } for pid=11049 comm="udevd" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=netlink_kobject_uevent_socket type=SYSCALL msg=audit(1163778682.477:13426): arch=40000003 syscall=102 success=yes exit=99 a0=a a1=bfedb480 a2=791234 a3=0 items=0 ppid=1 pid=11049 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="udevd" exe="/sbin/udevd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163778682.477:13427): avc: denied { write } for pid=11049 comm="udevd" name="uevent_seqnum" dev=tmpfs ino=1522 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:udev_tbl_t:s0 tclass=file type=SYSCALL msg=audit(1163778682.477:13427): arch=40000003 syscall=5 success=yes exit=9 a0=bfee5668 a1=8241 a2=1a4 a3=8241 items=0 ppid=1 pid=11049 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="udevd" exe="/sbin/udevd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163778682.477:13428): avc: denied { write } for pid=11049 comm="udevd" name=".udev" dev=tmpfs ino=1521 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:device_t:s0 tclass=dir type=AVC msg=audit(1163778682.477:13428): avc: denied { remove_name } for pid=11049 comm="udevd" name="failed" dev=tmpfs ino=3876 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:device_t:s0 tclass=dir type=AVC msg=audit(1163778682.477:13428): avc: denied { rmdir } for pid=11049 comm="udevd" name="failed" dev=tmpfs ino=3876 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:device_t:s0 tclass=dir type=SYSCALL msg=audit(1163778682.477:13428): arch=40000003 syscall=40 success=no exit=-39 a0=bfedae88 a1=2f2f2f2f a2=791234 a3=bfedae92 items=0 ppid=1 pid=11049 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="udevd" exe="/sbin/udevd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163778682.477:13429): avc: denied { add_name } for pid=11049 comm="udevd" name="queue" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:device_t:s0 tclass=dir type=AVC msg=audit(1163778682.477:13429): avc: denied { create } for pid=11049 comm="udevd" name="queue" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:device_t:s0 tclass=dir type=SYSCALL msg=audit(1163778682.477:13429): arch=40000003 syscall=39 success=yes exit=0 a0=bfedae8c a1=1ed a2=791234 a3=bfedae8c items=0 ppid=1 pid=11049 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="udevd" exe="/sbin/udevd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163778682.477:13430): avc: denied { write } for pid=11049 comm="udevd" name="queue" dev=tmpfs ino=166623 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:device_t:s0 tclass=dir type=AVC msg=audit(1163778682.477:13430): avc: denied { add_name } for pid=11049 comm="udevd" name="class@vc@vcs7" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:device_t:s0 tclass=dir type=AVC msg=audit(1163778682.477:13430): avc: denied { create } for pid=11049 comm="udevd" name="class@vc@vcs7" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:device_t:s0 tclass=file type=SYSCALL msg=audit(1163778682.477:13430): arch=40000003 syscall=5 success=yes exit=9 a0=bfedb2c8 a1=8241 a2=1a4 a3=8241 items=0 ppid=1 pid=11049 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="udevd" exe="/sbin/udevd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163778682.477:13431): avc: denied { unlink } for pid=15881 comm="udevd" name="class@vc@vcs7" dev=tmpfs ino=154266 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:device_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163778682.477:13431): arch=40000003 syscall=10 success=yes exit=0 a0=bfed2dcc a1=1b a2=791234 a3=bfed2dcc items=0 ppid=11049 pid=15881 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="udevd" exe="/sbin/udevd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163778682.477:13432): avc: denied { getattr } for pid=15881 comm="udevd" name="vcs7" dev=tmpfs ino=154265 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:tty_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163778682.477:13432): arch=40000003 syscall=195 success=yes exit=0 a0=bfed2dc8 a1=bfed2b68 a2=24bff4 a3=bfed2dc8 items=0 ppid=11049 pid=15881 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="udevd" exe="/sbin/udevd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163778682.477:13432): path="/dev/vcs7" type=AVC msg=audit(1163778682.477:13433): avc: denied { setattr } for pid=15881 comm="udevd" name="vcs7" dev=tmpfs ino=154265 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:tty_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163778682.477:13433): arch=40000003 syscall=212 success=yes exit=0 a0=bfed2dc8 a1=0 a2=0 a3=bfed2dc8 items=0 ppid=11049 pid=15881 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="udevd" exe="/sbin/udevd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163778682.477:13434): avc: denied { unlink } for pid=15881 comm="udevd" name="vcs7" dev=tmpfs ino=154265 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:tty_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163778682.477:13434): arch=40000003 syscall=10 success=yes exit=0 a0=bfed2dc8 a1=0 a2=791234 a3=bfed2dc8 items=0 ppid=11049 pid=15881 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="udevd" exe="/sbin/udevd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163778682.537:13435): avc: denied { append } for pid=15501 comm="bash" name=".bash_history" dev=dm-0 ino=13127151 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:user_home_t:s0 tclass=file type=SYSCALL msg=audit(1163778682.537:13435): arch=40000003 syscall=5 success=yes exit=3 a0=811c4e0 a1=8401 a2=0 a3=8401 items=0 ppid=15498 pid=15501 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163778682.537:13436): avc: denied { read } for pid=15501 comm="bash" name=".bash_history" dev=dm-0 ino=13127151 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:user_home_t:s0 tclass=file type=SYSCALL msg=audit(1163778682.537:13436): arch=40000003 syscall=5 success=yes exit=3 a0=811c4e0 a1=8000 a2=0 a3=8000 items=0 ppid=15498 pid=15501 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163778682.537:13437): avc: denied { write } for pid=15501 comm="bash" name=".bash_history" dev=dm-0 ino=13127151 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:user_home_t:s0 tclass=file type=SYSCALL msg=audit(1163778682.537:13437): arch=40000003 syscall=5 success=yes exit=3 a0=811c4e0 a1=8201 a2=0 a3=8201 items=0 ppid=15498 pid=15501 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=CRED_DISP msg=audit(1163778682.537:13438): user pid=15498 uid=500 auid=500 subj=staff_u:staff_r:staff_su_t:s0 msg='PAM: setcred acct=root : exe="/bin/su" (hostname=?, addr=?, terminal=pts/3 res=success)' type=AVC msg=audit(1163778682.537:13439): avc: denied { search } for pid=15498 comm="su" name="root" dev=dm-0 ino=13127137 scontext=staff_u:staff_r:staff_su_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1163778682.537:13439): avc: denied { write } for pid=15498 comm="su" name="root" dev=dm-0 ino=13127137 scontext=staff_u:staff_r:staff_su_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1163778682.537:13439): avc: denied { remove_name } for pid=15498 comm="su" name=".xauthjIDizz" dev=dm-0 ino=13127388 scontext=staff_u:staff_r:staff_su_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1163778682.537:13439): avc: denied { unlink } for pid=15498 comm="su" name=".xauthjIDizz" dev=dm-0 ino=13127388 scontext=staff_u:staff_r:staff_su_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163778682.537:13439): arch=40000003 syscall=10 success=yes exit=0 a0=8dc69a8 a1=8dc6a86 a2=199ae8 a3=8dc3008 items=0 ppid=1 pid=15498 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=(none) comm="su" exe="/bin/su" subj=staff_u:staff_r:staff_su_t:s0 key=(null) type=USER_END msg=audit(1163778682.545:13440): user pid=15498 uid=500 auid=500 subj=staff_u:staff_r:staff_su_t:s0 msg='PAM: session close acct=root : exe="/bin/su" (hostname=?, addr=?, terminal=pts/3 res=success)' type=AVC msg=audit(1163778683.001:13441): avc: denied { sendto } for pid=15881 comm="udevd" path=002F6F72672F667265656465736B746F702F68616C2F756465765F6576656E74 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:hald_t:s0 tclass=unix_dgram_socket type=SYSCALL msg=audit(1163778683.001:13441): arch=40000003 syscall=102 success=yes exit=142 a0=b a1=bfed27a0 a2=791234 a3=8e items=0 ppid=11049 pid=15881 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="udevd" exe="/sbin/udevd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163778683.001:13442): avc: denied { write } for pid=11049 comm="udevd" name=".udev" dev=tmpfs ino=1521 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:device_t:s0 tclass=dir type=AVC msg=audit(1163778683.001:13442): avc: denied { remove_name } for pid=11049 comm="udevd" name="failed" dev=tmpfs ino=3876 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:device_t:s0 tclass=dir type=AVC msg=audit(1163778683.001:13442): avc: denied { rmdir } for pid=11049 comm="udevd" name="failed" dev=tmpfs ino=3876 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:device_t:s0 tclass=dir type=SYSCALL msg=audit(1163778683.001:13442): arch=40000003 syscall=40 success=no exit=-39 a0=bfedae78 a1=2f2f2f2f a2=791234 a3=bfedae82 items=0 ppid=1 pid=11049 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="udevd" exe="/sbin/udevd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163778683.001:13443): avc: denied { remove_name } for pid=11049 comm="udevd" name="class@vc@vcs7" dev=tmpfs ino=166624 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:device_t:s0 tclass=dir type=AVC msg=audit(1163778683.001:13443): avc: denied { unlink } for pid=11049 comm="udevd" name="class@vc@vcs7" dev=tmpfs ino=166624 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:device_t:s0 tclass=file type=SYSCALL msg=audit(1163778683.001:13443): arch=40000003 syscall=10 success=yes exit=0 a0=bfedb2b8 a1=ffffffff a2=791234 a3=791418 items=0 ppid=1 pid=11049 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="udevd" exe="/sbin/udevd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163778683.005:13444): avc: denied { rmdir } for pid=11049 comm="udevd" name="queue" dev=tmpfs ino=166623 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:device_t:s0 tclass=dir type=SYSCALL msg=audit(1163778683.005:13444): arch=40000003 syscall=40 success=no exit=-39 a0=bfedae78 a1=2f2f2f2f a2=791234 a3=bfedae82 items=0 ppid=1 pid=11049 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="udevd" exe="/sbin/udevd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=CRED_DISP msg=audit(1163778683.005:13445): user pid=15636 uid=500 auid=500 subj=staff_u:staff_r:staff_su_t:s0 msg='PAM: setcred acct=root : exe="/bin/su" (hostname=?, addr=?, terminal=pts/5 res=success)' type=USER_END msg=audit(1163778683.005:13446): user pid=15636 uid=500 auid=500 subj=staff_u:staff_r:staff_su_t:s0 msg='PAM: session close acct=root : exe="/bin/su" (hostname=?, addr=?, terminal=pts/5 res=success)' type=USER_END msg=audit(1163778683.381:13447): user pid=3285 uid=0 auid=500 subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 msg='PAM: session close acct=kmacmill : exe="/usr/sbin/gdm-binary" (hostname=?, addr=?, terminal=:0 res=success)' type=CRED_DISP msg=audit(1163778683.381:13448): user pid=3285 uid=0 auid=500 subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 msg='PAM: setcred acct=kmacmill : exe="/usr/sbin/gdm-binary" (hostname=?, addr=?, terminal=:0 res=success)' type=AVC msg=audit(1163778683.997:13449): avc: denied { read } for pid=11049 comm="udevd" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=netlink_kobject_uevent_socket type=SYSCALL msg=audit(1163778683.997:13449): arch=40000003 syscall=102 success=yes exit=93 a0=a a1=bfedb480 a2=791234 a3=0 items=0 ppid=1 pid=11049 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="udevd" exe="/sbin/udevd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163778683.997:13450): avc: denied { add_name } for pid=11049 comm="udevd" name="queue" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:device_t:s0 tclass=dir type=SYSCALL msg=audit(1163778683.997:13450): arch=40000003 syscall=39 success=yes exit=0 a0=bfedae8c a1=1ed a2=791234 a3=bfedae8c items=0 ppid=1 pid=11049 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="udevd" exe="/sbin/udevd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163778684.001:13451): avc: denied { write } for pid=11049 comm="udevd" name="class@vc@vcs7" dev=tmpfs ino=167046 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:device_t:s0 tclass=file type=SYSCALL msg=audit(1163778684.001:13451): arch=40000003 syscall=5 success=yes exit=9 a0=bfedb2c8 a1=8241 a2=1a4 a3=8241 items=0 ppid=1 pid=11049 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="udevd" exe="/sbin/udevd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163778684.005:13452): avc: denied { mknod } for pid=15897 comm="udevd" capability=27 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=capability type=AVC msg=audit(1163778684.005:13452): avc: denied { create } for pid=15897 comm="udevd" name="vcsa7" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:tty_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163778684.005:13452): arch=40000003 syscall=14 success=yes exit=0 a0=bfed2dc4 a1=2180 a2=787 a3=180 items=0 ppid=11049 pid=15897 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="udevd" exe="/sbin/udevd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163778684.005:13453): avc: denied { create } for pid=15897 comm="udevd" name="class@vc@vcsa7" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:device_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163778684.005:13453): arch=40000003 syscall=83 success=yes exit=0 a0=9526ccc a1=bfed2dc8 a2=791234 a3=bfed2dc8 items=0 ppid=11049 pid=15897 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="udevd" exe="/sbin/udevd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163778684.593:13454): avc: denied { unlink } for pid=15909 comm="udevd" name="class@vc@vcs8" dev=tmpfs ino=167555 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:device_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163778684.593:13454): arch=40000003 syscall=10 success=yes exit=0 a0=bfed2dcc a1=1b a2=791234 a3=bfed2dcc items=0 ppid=11049 pid=15909 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="udevd" exe="/sbin/udevd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163778684.745:13455): avc: denied { create } for pid=15915 comm="udevd" name="class@vc@vcs8" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:device_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163778684.745:13455): arch=40000003 syscall=83 success=yes exit=0 a0=9526ccc a1=bfed2dc8 a2=791234 a3=bfed2dc8 items=0 ppid=11049 pid=15915 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="udevd" exe="/sbin/udevd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=USER_AUTH msg=audit(1163778701.194:13456): user pid=3285 uid=0 auid=500 subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 msg='PAM: authentication acct=kmacmill : exe="/usr/sbin/gdm-binary" (hostname=?, addr=?, terminal=:0 res=failed)' type=USER_LOGIN msg=audit(1163778701.194:13457): user pid=3285 uid=0 auid=500 subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 msg='uid=500: exe="/usr/sbin/gdm-binary" (hostname=localhost.localdomain, addr=127.0.0.1, terminal=:0 res=failed)' type=USER_AUTH msg=audit(1163778705.602:13458): user pid=3285 uid=0 auid=500 subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 msg='PAM: authentication acct=kmacmill : exe="/usr/sbin/gdm-binary" (hostname=?, addr=?, terminal=:0 res=success)' type=USER_ACCT msg=audit(1163778705.602:13459): user pid=3285 uid=0 auid=500 subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 msg='PAM: accounting acct=kmacmill : exe="/usr/sbin/gdm-binary" (hostname=?, addr=?, terminal=:0 res=success)' type=CRED_ACQ msg=audit(1163778705.606:13460): user pid=3285 uid=0 auid=500 subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 msg='PAM: setcred acct=kmacmill : exe="/usr/sbin/gdm-binary" (hostname=?, addr=?, terminal=:0 res=success)' type=LOGIN msg=audit(1163778705.622:13461): login pid=3285 uid=0 old auid=500 new auid=500 type=USER_START msg=audit(1163778705.670:13462): user pid=3285 uid=0 auid=500 subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 msg='PAM: session open acct=kmacmill : exe="/usr/sbin/gdm-binary" (hostname=?, addr=?, terminal=:0 res=success)' type=USER_LOGIN msg=audit(1163778705.670:13463): user pid=3285 uid=0 auid=500 subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 msg='uid=500: exe="/usr/sbin/gdm-binary" (hostname=localhost.localdomain, addr=127.0.0.1, terminal=:0 res=success)' type=AVC msg=audit(1163778706.358:13464): avc: denied { read } for pid=15931 comm="gdm-binary" name=".ICEauthority" dev=dm-0 ino=6574784 scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=staff_u:object_r:staff_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163778706.358:13464): arch=40000003 syscall=5 success=yes exit=12 a0=80865d5 a1=0 a2=1 a3=d items=0 ppid=3285 pid=15931 auid=500 uid=0 gid=500 euid=0 suid=0 fsuid=0 egid=0 sgid=500 fsgid=0 tty=(none) comm="gdm-binary" exe="/usr/sbin/gdm-binary" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163778706.358:13465): avc: denied { getattr } for pid=15931 comm="gdm-binary" name=".ICEauthority" dev=dm-0 ino=6574784 scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=staff_u:object_r:staff_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163778706.358:13465): arch=40000003 syscall=196 success=yes exit=0 a0=80865d5 a1=bfd7023c a2=c4eff4 a3=bfd7023c items=0 ppid=3285 pid=15931 auid=500 uid=0 gid=500 euid=0 suid=0 fsuid=0 egid=0 sgid=500 fsgid=0 tty=(none) comm="gdm-binary" exe="/usr/sbin/gdm-binary" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163778706.358:13465): path="/home/kmacmill/.ICEauthority" type=AVC msg=audit(1163778706.730:13466): avc: denied { read } for pid=15944 comm="xrdb" name=".gdm0UWNIT" dev=dm-0 ino=14469400 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163778706.730:13466): arch=40000003 syscall=33 success=yes exit=0 a0=bf8fcfce a1=4 a2=da3a64 a3=bf8fcfce items=0 ppid=15931 pid=15944 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="xrdb" exe="/usr/bin/xrdb" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163778708.231:13467): avc: denied { getattr } for pid=15985 comm="dbus-daemon" name="/" dev=dm-0 ino=2 scontext=staff_u:staff_r:staff_dbusd_t:s0 tcontext=system_u:object_r:fs_t:s0 tclass=filesystem type=SYSCALL msg=audit(1163778708.231:13467): arch=40000003 syscall=100 success=yes exit=0 a0=5 a1=bff51e8c a2=39cff4 a3=ffffffb8 items=0 ppid=15984 pid=15985 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="dbus-daemon" exe="/bin/dbus-daemon" subj=staff_u:staff_r:staff_dbusd_t:s0 key=(null) type=AVC msg=audit(1163778709.227:13468): avc: denied { search } for pid=15985 comm="dbus-daemon" name="kmacmill" dev=dm-0 ino=6547202 scontext=staff_u:staff_r:staff_dbusd_t:s0 tcontext=staff_u:object_r:staff_home_dir_t:s0 tclass=dir type=AVC msg=audit(1163778709.227:13468): avc: denied { search } for pid=15985 comm="dbus-daemon" name=".local" dev=dm-0 ino=6815703 scontext=staff_u:staff_r:staff_dbusd_t:s0 tcontext=staff_u:object_r:staff_home_t:s0 tclass=dir type=SYSCALL msg=audit(1163778709.227:13468): arch=40000003 syscall=5 success=no exit=-2 a0=8e9ec68 a1=18800 a2=26625c a3=0 items=0 ppid=15984 pid=15985 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="dbus-daemon" exe="/bin/dbus-daemon" subj=staff_u:staff_r:staff_dbusd_t:s0 key=(null) type=AVC msg=audit(1163778709.231:13469): avc: denied { read } for pid=15986 comm="dbus-launch" name=".gdm0UWNIT" dev=dm-0 ino=14469400 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163778709.231:13469): arch=40000003 syscall=33 success=yes exit=0 a0=bf87df80 a1=4 a2=112a64 a3=bf87df80 items=0 ppid=1 pid=15986 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="dbus-launch" exe="/usr/bin/dbus-launch" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163778716.215:13470): avc: denied { read } for pid=14973 comm="bash" name=".bash_logout" dev=dm-0 ino=13061690 scontext=staff_u:staff_r:staff_t:s0 tcontext=root:object_r:user_home_t:s0 tclass=file type=SYSCALL msg=audit(1163778716.215:13470): arch=40000003 syscall=5 success=yes exit=3 a0=8e0bf08 a1=8000 a2=0 a3=8000 items=0 ppid=14970 pid=14973 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163778716.267:13471): avc: denied { append } for pid=14973 comm="bash" name=".bash_history" dev=dm-0 ino=13127151 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:user_home_t:s0 tclass=file type=SYSCALL msg=audit(1163778716.267:13471): arch=40000003 syscall=5 success=yes exit=3 a0=8e0bec0 a1=8401 a2=0 a3=8401 items=0 ppid=14970 pid=14973 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163778716.267:13472): avc: denied { read } for pid=14973 comm="bash" name=".bash_history" dev=dm-0 ino=13127151 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:user_home_t:s0 tclass=file type=SYSCALL msg=audit(1163778716.267:13472): arch=40000003 syscall=5 success=yes exit=3 a0=8e0bec0 a1=8000 a2=0 a3=8000 items=0 ppid=14970 pid=14973 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163778716.267:13473): avc: denied { write } for pid=14973 comm="bash" name=".bash_history" dev=dm-0 ino=13127151 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:user_home_t:s0 tclass=file type=SYSCALL msg=audit(1163778716.267:13473): arch=40000003 syscall=5 success=yes exit=3 a0=8e0bec0 a1=8201 a2=0 a3=8201 items=0 ppid=14970 pid=14973 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=CRED_DISP msg=audit(1163778716.267:13474): user pid=14970 uid=500 auid=500 subj=staff_u:staff_r:staff_su_t:s0 msg='PAM: setcred acct=root : exe="/bin/su" (hostname=?, addr=?, terminal=pts/1 res=success)' type=AVC msg=audit(1163778716.271:13475): avc: denied { search } for pid=14970 comm="su" scontext=staff_u:staff_r:staff_su_t:s0 tcontext=staff_u:staff_r:staff_su_t:s0 tclass=key type=AVC msg=audit(1163778716.271:13475): avc: denied { search } for pid=14970 comm="su" scontext=staff_u:staff_r:staff_su_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=key type=AVC msg=audit(1163778716.271:13475): avc: denied { write } for pid=14970 comm="su" scontext=staff_u:staff_r:staff_su_t:s0 tcontext=staff_u:staff_r:staff_su_t:s0 tclass=key type=SYSCALL msg=audit(1163778716.271:13475): arch=40000003 syscall=288 success=yes exit=0 a0=3 a1=2abd1691 a2=1f4 a3=0 items=0 ppid=1 pid=14970 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="su" exe="/bin/su" subj=staff_u:staff_r:staff_su_t:s0 key=(null) type=AVC msg=audit(1163778719.635:13476): avc: denied { write } for pid=15931 comm="gnome-session" name=".ICE-unix" dev=dm-0 ino=14567572 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:ice_tmp_t:s0 tclass=dir type=AVC msg=audit(1163778719.635:13476): avc: denied { add_name } for pid=15931 comm="gnome-session" name="15931" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:ice_tmp_t:s0 tclass=dir type=AVC msg=audit(1163778719.635:13476): avc: denied { create } for pid=15931 comm="gnome-session" name="15931" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:ice_tmp_t:s0 tclass=sock_file type=SYSCALL msg=audit(1163778719.635:13476): arch=40000003 syscall=102 success=yes exit=0 a0=2 a1=bf9a36d0 a2=df7770 a3=0 items=0 ppid=3285 pid=15931 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-session" exe="/usr/bin/gnome-session" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163778719.643:13477): avc: denied { read } for pid=15931 comm="gnome-session" name=".ICEauthority" dev=dm-0 ino=6574784 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:staff_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163778719.643:13477): arch=40000003 syscall=5 success=yes exit=16 a0=84ee908 a1=0 a2=1b6 a3=84ee930 items=0 ppid=3285 pid=15931 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-session" exe="/usr/bin/gnome-session" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163778719.643:13478): avc: denied { write } for pid=15931 comm="gnome-session" name=".ICEauthority" dev=dm-0 ino=6574784 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:staff_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163778719.643:13478): arch=40000003 syscall=5 success=yes exit=16 a0=84ee908 a1=241 a2=1b6 a3=84f6f10 items=0 ppid=3285 pid=15931 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-session" exe="/usr/bin/gnome-session" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163778719.711:13479): avc: denied { read write } for pid=16006 comm="gnome-settings-" name="[169926]" dev=sockfs ino=169926 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_dbusd_t:s0 tclass=netlink_selinux_socket type=SYSCALL msg=audit(1163778719.711:13479): arch=40000003 syscall=11 success=yes exit=0 a0=8ea5760 a1=8ea5098 a2=8ea58c8 a3=8ea50e0 items=0 ppid=16005 pid=16006 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-settings-" exe="/usr/libexec/gnome-settings-daemon" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163778719.711:13479): path="socket:[169926]" type=AVC msg=audit(1163778719.711:13480): avc: denied { sigchld } for pid=16005 comm="dbus-daemon" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_dbusd_t:s0 tclass=process type=SYSCALL msg=audit(1163778719.711:13480): arch=40000003 syscall=7 success=yes exit=0 a0=3e86 a1=bff51b38 a2=1 a3=3e86 items=0 ppid=15987 pid=16005 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="dbus-daemon" exe="/bin/dbus-daemon" subj=staff_u:staff_r:staff_dbusd_t:s0 key=(null) type=AVC msg=audit(1163778720.219:13481): avc: denied { read } for pid=16015 comm="esd" name="default.conf" dev=dm-0 ino=9330152 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:alsa_etc_rw_t:s0 tclass=file type=SYSCALL msg=audit(1163778720.219:13481): arch=40000003 syscall=5 success=yes exit=14 a0=9e6e258 a1=0 a2=1b6 a3=9e6e278 items=0 ppid=1 pid=16015 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="esd" exe="/usr/bin/esd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163778724.264:13482): avc: denied { write } for pid=16425 comm="metacity" name="15931" dev=dm-0 ino=14567724 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:ice_tmp_t:s0 tclass=sock_file type=SYSCALL msg=audit(1163778724.264:13482): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=bff4a550 a2=df7770 a3=16 items=0 ppid=1 pid=16425 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="metacity" exe="/usr/bin/metacity" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163778724.784:13483): avc: denied { execute } for pid=16446 comm="beagle-search" name="mono" dev=dm-0 ino=10321084 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:mono_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163778724.784:13483): arch=40000003 syscall=33 success=yes exit=0 a0=948f880 a1=1 a2=11 a3=948f880 items=0 ppid=1 pid=16446 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="beagle-search" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163778724.784:13484): avc: denied { read } for pid=16446 comm="beagle-search" name="mono" dev=dm-0 ino=10321084 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:mono_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163778724.784:13484): arch=40000003 syscall=33 success=yes exit=0 a0=948f880 a1=4 a2=ffffffff a3=948f880 items=0 ppid=1 pid=16446 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="beagle-search" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163778724.784:13485): avc: denied { execute_no_trans } for pid=16446 comm="beagle-search" name="mono" dev=dm-0 ino=10321084 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:mono_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163778724.784:13485): arch=40000003 syscall=11 success=yes exit=0 a0=948f698 a1=948f868 a2=948ff70 a3=948f868 items=0 ppid=1 pid=16446 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="mono" exe="/usr/bin/mono" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163778724.784:13485): path="/usr/bin/mono" type=AVC msg=audit(1163778724.788:13486): avc: denied { execheap } for pid=16446 comm="mono" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=process type=AVC msg=audit(1163778724.788:13486): avc: denied { execmem } for pid=16446 comm="mono" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=process type=SYSCALL msg=audit(1163778724.788:13486): arch=40000003 syscall=125 success=yes exit=0 a0=95a7000 a1=1000 a2=7 a3=1 items=0 ppid=1 pid=16446 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="mono" exe="/usr/bin/mono" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163778726.308:13487): avc: denied { ioctl } for pid=16476 comm="pam_timestamp_c" name="[169789]" dev=pipefs ino=169789 scontext=staff_u:staff_r:pam_t:s0 tcontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tclass=fifo_file type=SYSCALL msg=audit(1163778726.308:13487): arch=40000003 syscall=54 success=no exit=-22 a0=2 a1=5401 a2=bfded278 a3=bfded2b8 items=0 ppid=16467 pid=16476 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=(none) comm="pam_timestamp_c" exe="/sbin/pam_timestamp_check" subj=staff_u:staff_r:pam_t:s0 key=(null) type=AVC_PATH msg=audit(1163778726.308:13487): path="pipe:[169789]" type=AVC msg=audit(1163778726.852:13488): avc: denied { dac_override } for pid=12248 comm="cupsd" capability=1 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=capability type=AVC msg=audit(1163778726.852:13488): avc: denied { write } for pid=12248 comm="cupsd" name="certs" dev=dm-0 ino=14534810 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:cupsd_var_run_t:s0 tclass=dir type=AVC msg=audit(1163778726.852:13488): avc: denied { remove_name } for pid=12248 comm="cupsd" name="0" dev=dm-0 ino=14534809 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:cupsd_var_run_t:s0 tclass=dir type=AVC msg=audit(1163778726.852:13488): avc: denied { unlink } for pid=12248 comm="cupsd" name="0" dev=dm-0 ino=14534809 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:cupsd_var_run_t:s0 tclass=file type=SYSCALL msg=audit(1163778726.852:13488): arch=40000003 syscall=10 success=yes exit=0 a0=bfb167c8 a1=0 a2=927ff4 a3=bfb167c8 items=0 ppid=1 pid=12248 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="cupsd" exe="/usr/sbin/cupsd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163778726.884:13489): avc: denied { add_name } for pid=12248 comm="cupsd" name="0" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:cupsd_var_run_t:s0 tclass=dir type=AVC msg=audit(1163778726.884:13489): avc: denied { create } for pid=12248 comm="cupsd" name="0" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:cupsd_var_run_t:s0 tclass=file type=SYSCALL msg=audit(1163778726.884:13489): arch=40000003 syscall=5 success=yes exit=9 a0=bfb167c8 a1=80c1 a2=100 a3=80c1 items=0 ppid=1 pid=12248 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="cupsd" exe="/usr/sbin/cupsd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163778726.884:13490): avc: denied { setattr } for pid=12248 comm="cupsd" name="0" dev=dm-0 ino=14534809 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:cupsd_var_run_t:s0 tclass=file type=SYSCALL msg=audit(1163778726.884:13490): arch=40000003 syscall=94 success=yes exit=0 a0=9 a1=120 a2=927ff4 a3=21 items=0 ppid=1 pid=12248 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="cupsd" exe="/usr/sbin/cupsd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163778726.884:13491): avc: denied { write } for pid=12248 comm="cupsd" name="0" dev=dm-0 ino=14534809 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:cupsd_var_run_t:s0 tclass=file type=SYSCALL msg=audit(1163778726.884:13491): arch=40000003 syscall=4 success=yes exit=32 a0=9 a1=911d500 a2=20 a3=911d500 items=0 ppid=1 pid=12248 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="cupsd" exe="/usr/sbin/cupsd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163778726.884:13491): path="/var/run/cups/certs/0" type=AVC msg=audit(1163778726.884:13492): avc: denied { append } for pid=12248 comm="cupsd" name="access_log" dev=dm-0 ino=14437015 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:cupsd_log_t:s0 tclass=file type=SYSCALL msg=audit(1163778726.884:13492): arch=40000003 syscall=4 success=yes exit=100 a0=8 a1=913d9b0 a2=64 a3=64 items=0 ppid=1 pid=12248 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="cupsd" exe="/usr/sbin/cupsd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163778726.884:13492): path="/var/log/cups/access_log" type=USER_AVC msg=audit(1163778726.952:13493): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager member=state dest=org.freedesktop.NetworkManager spid=16462 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163778726.952:13494): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager member=getDevices dest=org.freedesktop.NetworkManager spid=16462 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163778726.952:13495): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager member=getWirelessEnabled dest=org.freedesktop.NetworkManager spid=16462 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163778726.952:13496): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager member=getDialup dest=org.freedesktop.NetworkManager spid=16462 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163778726.952:13497): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.VPNConnections member=getVPNConnections dest=org.freedesktop.NetworkManager spid=16462 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163778727.656:13498): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManagerInfo member=getNetworks dest=org.freedesktop.NetworkManagerInfo spid=6687 tpid=16462 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163778727.660:13499): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManagerInfo member=getVPNConnections dest=org.freedesktop.NetworkManagerInfo spid=6687 tpid=16462 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163778727.660:13500): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.35 spid=6687 tpid=16462 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163778727.660:13501): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.35 spid=6687 tpid=16462 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163778727.660:13502): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.35 spid=6687 tpid=16462 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163778727.660:13503): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=error error_name=org.freedesktop.NetworkManager.NoDialup dest=:1.35 spid=6687 tpid=16462 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163778727.660:13504): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.35 spid=6687 tpid=16462 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163778727.660:13505): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=error error_name=org.freedesktop.NetworkManagerInfo.NoNetworks dest=:1.6 spid=16462 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163778727.848:13506): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.6 spid=16462 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163778727.848:13507): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=16462 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163778727.848:13508): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.VPNConnections member=getVPNConnectionProperties dest=org.freedesktop.NetworkManager spid=16462 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=AVC msg=audit(1163778728.948:13509): avc: denied { net_admin } for pid=6687 comm="NetworkManager" capability=12 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=capability type=SYSCALL msg=audit(1163778728.948:13509): arch=40000003 syscall=54 success=no exit=-95 a0=e a1=8946 a2=bfaf3328 a3=8502ed8 items=0 ppid=1 pid=6687 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="NetworkManager" exe="/usr/sbin/NetworkManager" subj=staff_u:staff_r:staff_t:s0 key=(null) type=USER_AVC msg=audit(1163778728.952:13510): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManagerInfo member=getVPNConnectionProperties dest=org.freedesktop.NetworkManagerInfo spid=6687 tpid=16462 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163778728.952:13511): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.35 spid=6687 tpid=16462 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163778728.952:13512): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.35 spid=6687 tpid=16462 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163778728.980:13513): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.6 spid=16462 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163778728.980:13514): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=16462 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163778728.984:13515): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager.VPNConnections member=VPNConnectionUpdate dest=org.freedesktop.DBus spid=6687 tpid=16462 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163778728.984:13516): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.35 spid=6687 tpid=16462 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163778728.984:13517): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.VPNConnections member=getVPNConnectionProperties dest=org.freedesktop.NetworkManager spid=16462 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163778728.988:13518): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.35 spid=6687 tpid=16462 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=AVC msg=audit(1163778782.323:13519): avc: denied { name_bind } for pid=16535 comm="synergys" src=24800 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:port_t:s0 tclass=tcp_socket type=AVC msg=audit(1163778782.323:13519): avc: denied { node_bind } for pid=16535 comm="synergys" src=24800 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:inaddr_any_node_t:s0 tclass=tcp_socket type=SYSCALL msg=audit(1163778782.323:13519): arch=40000003 syscall=102 success=yes exit=0 a0=2 a1=bffefb90 a2=90400d8 a3=80b1220 items=0 ppid=16509 pid=16535 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts1 comm="synergys" exe="/usr/bin/synergys" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163778813.085:13520): avc: denied { read } for pid=16541 comm="firefox-bin" name=".gdm0UWNIT" dev=dm-0 ino=14469400 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163778813.085:13520): arch=40000003 syscall=33 success=yes exit=0 a0=bfad6fcb a1=4 a2=33ea64 a3=bfad6fcb items=0 ppid=1 pid=16541 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163778813.085:13521): avc: denied { getattr } for pid=16541 comm="firefox-bin" name=".gdm0UWNIT" dev=dm-0 ino=14469400 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163778813.085:13521): arch=40000003 syscall=197 success=yes exit=0 a0=4 a1=bfad46dc a2=10b0ff4 a3=977bd70 items=0 ppid=1 pid=16541 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163778813.085:13521): path="/tmp/.gdm0UWNIT" type=AVC msg=audit(1163778820.602:13522): avc: denied { getattr } for pid=16583 comm="ps" name="tty1" dev=tmpfs ino=1444 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:tty_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163778820.602:13522): arch=40000003 syscall=195 success=yes exit=0 a0=c62840 a1=bffa615c a2=7b0ff4 a3=bffa615c items=0 ppid=16562 pid=16583 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts2 comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163778820.602:13522): path="/dev/tty1" type=AVC msg=audit(1163778820.606:13523): avc: denied { ptrace } for pid=16583 comm="ps" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_xserver_t:s0 tclass=process type=SYSCALL msg=audit(1163778820.606:13523): arch=40000003 syscall=85 success=yes exit=10 a0=bffa6198 a1=c62840 a2=7f a3=bffa6198 items=0 ppid=16562 pid=16583 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts2 comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_t:s0 key=(null) type=USER_AUTH msg=audit(1163778845.195:13524): user pid=16587 uid=500 auid=500 subj=staff_u:staff_r:staff_su_t:s0 msg='PAM: authentication acct=root : exe="/bin/su" (hostname=?, addr=?, terminal=pts/2 res=success)' type=USER_ACCT msg=audit(1163778845.195:13525): user pid=16587 uid=500 auid=500 subj=staff_u:staff_r:staff_su_t:s0 msg='PAM: accounting acct=root : exe="/bin/su" (hostname=?, addr=?, terminal=pts/2 res=success)' type=AVC msg=audit(1163778845.195:13526): avc: denied { search } for pid=16587 comm="su" name="root" dev=dm-0 ino=13127137 scontext=staff_u:staff_r:staff_su_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=SYSCALL msg=audit(1163778845.195:13526): arch=40000003 syscall=5 success=no exit=-2 a0=bf842ce8 a1=8000 a2=1b6 a3=9a649a8 items=0 ppid=16562 pid=16587 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=pts2 comm="su" exe="/bin/su" subj=staff_u:staff_r:staff_su_t:s0 key=(null) type=AVC msg=audit(1163778845.203:13527): avc: denied { write } for pid=16588 comm="xauth" name=".gdm0UWNIT" dev=dm-0 ino=14469400 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163778845.203:13527): arch=40000003 syscall=33 success=yes exit=0 a0=bfffc987 a1=2 a2=bfffb020 a3=0 items=0 ppid=16587 pid=16588 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts2 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC msg=audit(1163778845.203:13528): avc: denied { read } for pid=16588 comm="xauth" name=".gdm0UWNIT" dev=dm-0 ino=14469400 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163778845.203:13528): arch=40000003 syscall=5 success=yes exit=2 a0=bfffc987 a1=0 a2=1b6 a3=8cf7008 items=0 ppid=16587 pid=16588 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts2 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC msg=audit(1163778845.203:13529): avc: denied { getattr } for pid=16588 comm="xauth" name=".gdm0UWNIT" dev=dm-0 ino=14469400 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163778845.203:13529): arch=40000003 syscall=197 success=yes exit=0 a0=2 a1=bfffad6c a2=711ff4 a3=8cf7008 items=0 ppid=16587 pid=16588 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts2 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC_PATH msg=audit(1163778845.203:13529): path="/tmp/.gdm0UWNIT" type=AVC msg=audit(1163778845.207:13530): avc: denied { write } for pid=16587 comm="su" name="root" dev=dm-0 ino=13127137 scontext=staff_u:staff_r:staff_su_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1163778845.207:13530): avc: denied { add_name } for pid=16587 comm="su" name=".xauthI7R4Id" scontext=staff_u:staff_r:staff_su_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1163778845.207:13530): avc: denied { create } for pid=16587 comm="su" name=".xauthI7R4Id" scontext=staff_u:staff_r:staff_su_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163778845.207:13530): arch=40000003 syscall=5 success=yes exit=4 a0=9a64acb a1=80c2 a2=180 a3=80c2 items=0 ppid=16562 pid=16587 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=pts2 comm="su" exe="/bin/su" subj=staff_u:staff_r:staff_su_t:s0 key=(null) type=AVC msg=audit(1163778845.207:13531): avc: denied { setattr } for pid=16587 comm="su" name=".xauthI7R4Id" dev=dm-0 ino=13127382 scontext=staff_u:staff_r:staff_su_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163778845.207:13531): arch=40000003 syscall=207 success=yes exit=0 a0=4 a1=0 a2=0 a3=1475bf items=0 ppid=16562 pid=16587 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=pts2 comm="su" exe="/bin/su" subj=staff_u:staff_r:staff_su_t:s0 key=(null) type=AVC msg=audit(1163778845.207:13532): avc: denied { search } for pid=16589 comm="xauth" name="root" dev=dm-0 ino=13127137 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=SYSCALL msg=audit(1163778845.207:13532): arch=40000003 syscall=195 success=no exit=-2 a0=bfca0f97 a1=bfca0aac a2=24bff4 a3=bfca0aac items=0 ppid=16587 pid=16589 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC msg=audit(1163778845.207:13533): avc: denied { write } for pid=16589 comm="xauth" name="root" dev=dm-0 ino=13127137 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1163778845.207:13533): avc: denied { add_name } for pid=16589 comm="xauth" name=".xauthI7R4Id-c" scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1163778845.207:13533): avc: denied { create } for pid=16589 comm="xauth" name=".xauthI7R4Id-c" scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163778845.207:13533): arch=40000003 syscall=5 success=yes exit=2 a0=bfca0f97 a1=c1 a2=180 a3=ffffffff items=0 ppid=16587 pid=16589 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC msg=audit(1163778845.207:13534): avc: denied { link } for pid=16589 comm="xauth" name=".xauthI7R4Id-c" dev=dm-0 ino=13127386 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163778845.207:13534): arch=40000003 syscall=9 success=yes exit=0 a0=bfca0f97 a1=bfca0b96 a2=da3a64 a3=2 items=0 ppid=16587 pid=16589 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC msg=audit(1163778845.211:13535): avc: denied { write } for pid=16589 comm="xauth" name=".xauthI7R4Id" dev=dm-0 ino=13127382 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163778845.211:13535): arch=40000003 syscall=33 success=yes exit=0 a0=bfca2983 a1=2 a2=bfca14c0 a3=0 items=0 ppid=16587 pid=16589 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC msg=audit(1163778845.211:13536): avc: denied { read } for pid=16589 comm="xauth" name=".xauthI7R4Id" dev=dm-0 ino=13127382 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163778845.211:13536): arch=40000003 syscall=5 success=yes exit=2 a0=bfca2983 a1=0 a2=1b6 a3=8879008 items=0 ppid=16587 pid=16589 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC msg=audit(1163778845.211:13537): avc: denied { getattr } for pid=16589 comm="xauth" name=".xauthI7R4Id" dev=dm-0 ino=13127382 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163778845.211:13537): arch=40000003 syscall=197 success=yes exit=0 a0=2 a1=bfca120c a2=24bff4 a3=8879008 items=0 ppid=16587 pid=16589 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC_PATH msg=audit(1163778845.211:13537): path="/root/.xauthI7R4Id" type=AVC msg=audit(1163778845.211:13538): avc: denied { remove_name } for pid=16589 comm="xauth" name=".xauthI7R4Id" dev=dm-0 ino=13127382 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1163778845.211:13538): avc: denied { unlink } for pid=16589 comm="xauth" name=".xauthI7R4Id" dev=dm-0 ino=13127382 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163778845.211:13538): arch=40000003 syscall=10 success=yes exit=0 a0=8879008 a1=1000 a2=0 a3=887908a items=0 ppid=16587 pid=16589 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=USER_START msg=audit(1163778845.211:13539): user pid=16587 uid=500 auid=500 subj=staff_u:staff_r:staff_su_t:s0 msg='PAM: session open acct=root : exe="/bin/su" (hostname=?, addr=?, terminal=pts/2 res=success)' type=CRED_ACQ msg=audit(1163778845.211:13540): user pid=16587 uid=500 auid=500 subj=staff_u:staff_r:staff_su_t:s0 msg='PAM: setcred acct=root : exe="/bin/su" (hostname=?, addr=?, terminal=pts/2 res=success)' type=AVC msg=audit(1163778845.215:13541): avc: denied { read } for pid=16590 comm="bash" name=".bashrc" dev=dm-0 ino=13127142 scontext=staff_u:staff_r:staff_t:s0 tcontext=root:object_r:user_home_t:s0 tclass=file type=SYSCALL msg=audit(1163778845.215:13541): arch=40000003 syscall=5 success=yes exit=3 a0=924a880 a1=8000 a2=0 a3=8000 items=0 ppid=16587 pid=16590 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163778851.459:13542): avc: denied { read } for pid=15069 comm="vpnc" name="tun" dev=tmpfs ino=1473 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:tun_tap_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163778851.459:13542): arch=40000003 syscall=3 success=yes exit=59 a0=4 a1=805c5a0 a2=1000 a3=805c5a0 items=0 ppid=15067 pid=15069 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vpnc" exe="/usr/sbin/vpnc" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163778851.459:13542): path="/dev/net/tun" type=AVC msg=audit(1163778851.483:13543): avc: denied { write } for pid=15069 comm="vpnc" name="tun" dev=tmpfs ino=1473 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:tun_tap_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163778851.483:13543): arch=40000003 syscall=4 success=yes exit=126 a0=4 a1=805c570 a2=7e a3=bfd587e4 items=0 ppid=15067 pid=15069 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vpnc" exe="/usr/sbin/vpnc" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163778851.483:13543): path="/dev/net/tun" type=USER_AUTH msg=audit(1163778852.648:13544): user pid=16610 uid=0 auid=500 subj=staff_u:staff_r:newrole_t:s0 msg='PAM: authentication acct=kmacmill : exe="/usr/bin/newrole" (hostname=?, addr=?, terminal=pts/2 res=success)' type=USER_ACCT msg=audit(1163778852.648:13545): user pid=16610 uid=0 auid=500 subj=staff_u:staff_r:newrole_t:s0 msg='PAM: accounting acct=kmacmill : exe="/usr/bin/newrole" (hostname=?, addr=?, terminal=pts/2 res=success)' type=AVC msg=audit(1163778885.902:13546): avc: denied { execute } for pid=16541 comm="firefox-bin" name="libflashplayer.so" dev=dm-0 ino=6547382 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_mozilla_home_t:s0 tclass=file type=SYSCALL msg=audit(1163778885.902:13546): arch=40000003 syscall=192 success=yes exit=62861312 a0=0 a1=738dbc a2=5 a3=802 items=0 ppid=1 pid=16541 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163778885.902:13546): path="/home/kmacmill/.mozilla/plugins/libflashplayer.so" type=AVC msg=audit(1163778885.906:13547): avc: denied { read } for pid=16541 comm="firefox-bin" name=".gdm0UWNIT" dev=dm-0 ino=14469400 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163778885.906:13547): arch=40000003 syscall=33 success=yes exit=0 a0=bfad6fcb a1=4 a2=33ea64 a3=bfad6fcb items=0 ppid=1 pid=16541 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163778885.906:13548): avc: denied { getattr } for pid=16541 comm="firefox-bin" name=".gdm0UWNIT" dev=dm-0 ino=14469400 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163778885.906:13548): arch=40000003 syscall=197 success=yes exit=0 a0=38 a1=bfad1a5c a2=10b0ff4 a3=b057cc8 items=0 ppid=1 pid=16541 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163778885.906:13548): path="/tmp/.gdm0UWNIT" type=AVC msg=audit(1163778908.935:13549): avc: denied { read } for pid=16541 comm="firefox-bin" name="inotify" dev=inotifyfs ino=340 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:inotifyfs_t:s0 tclass=dir type=SYSCALL msg=audit(1163778908.935:13549): arch=40000003 syscall=3 success=yes exit=64 a0=21 a1=baaa9b0 a2=400 a3=400 items=0 ppid=1 pid=16541 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163778908.935:13549): path="inotify" type=AVC msg=audit(1163778910.427:13550): avc: denied { read } for pid=15069 comm="vpnc" name="tun" dev=tmpfs ino=1473 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:tun_tap_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163778910.427:13550): arch=40000003 syscall=3 success=yes exit=40 a0=4 a1=805c5a0 a2=1000 a3=805c5a0 items=0 ppid=15067 pid=15069 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vpnc" exe="/usr/sbin/vpnc" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163778910.427:13550): path="/dev/net/tun" type=AVC msg=audit(1163778910.463:13551): avc: denied { write } for pid=15069 comm="vpnc" name="tun" dev=tmpfs ino=1473 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:tun_tap_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163778910.463:13551): arch=40000003 syscall=4 success=yes exit=40 a0=4 a1=805c570 a2=28 a3=bfd587e4 items=0 ppid=15067 pid=15069 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vpnc" exe="/usr/sbin/vpnc" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163778910.463:13551): path="/dev/net/tun" type=USER_CHAUTHTOK msg=audit(1163778947.493:13552): user pid=16655 uid=0 auid=500 subj=staff_u:sysadm_r:useradd_t:s0 msg='op=adding user acct=rpcuser exe="/usr/sbin/useradd" (hostname=?, addr=?, terminal=pts/2 res=failed)' type=AVC msg=audit(1163778951.302:13553): avc: denied { read } for pid=16666 comm="gnome-terminal" name=".gdm0UWNIT" dev=dm-0 ino=14469400 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163778951.302:13553): arch=40000003 syscall=33 success=yes exit=0 a0=bfdb0dd5 a1=4 a2=da3a64 a3=bfdb0dd5 items=0 ppid=1 pid=16666 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-terminal" exe="/usr/bin/gnome-terminal" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163778951.522:13554): avc: denied { write } for pid=16666 comm="gnome-terminal" name="15931" dev=dm-0 ino=14567724 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:ice_tmp_t:s0 tclass=sock_file type=SYSCALL msg=audit(1163778951.522:13554): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=bfdaed10 a2=df7770 a3=16 items=0 ppid=1 pid=16666 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-terminal" exe="/usr/bin/gnome-terminal" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163778951.522:13555): avc: denied { read } for pid=16666 comm="gnome-terminal" name=".ICEauthority" dev=dm-0 ino=6574784 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:staff_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163778951.522:13555): arch=40000003 syscall=33 success=yes exit=0 a0=9feea38 a1=4 a2=df7770 a3=9feea38 items=0 ppid=1 pid=16666 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-terminal" exe="/usr/bin/gnome-terminal" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163778955.538:13556): avc: denied { execmem } for pid=16690 comm="gcj-dbtool" scontext=staff_u:sysadm_r:rpm_script_t:s0 tcontext=staff_u:sysadm_r:rpm_script_t:s0 tclass=process type=SYSCALL msg=audit(1163778955.538:13556): arch=40000003 syscall=192 success=yes exit=4096 a0=1000 a1=10000 a2=7 a3=22 items=0 ppid=16689 pid=16690 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="gcj-dbtool" exe="/usr/bin/gcj-dbtool" subj=staff_u:sysadm_r:rpm_script_t:s0 key=(null) type=AVC msg=audit(1163778957.002:13557): avc: denied { lock } for pid=16476 comm="pam_timestamp_c" name="utmp" dev=dm-0 ino=14436583 scontext=staff_u:staff_r:pam_t:s0 tcontext=system_u:object_r:initrc_var_run_t:s0 tclass=file type=SYSCALL msg=audit(1163778957.002:13557): arch=40000003 syscall=221 success=yes exit=0 a0=3 a1=7 a2=bfded3d8 a3=0 items=0 ppid=16467 pid=16476 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=(none) comm="pam_timestamp_c" exe="/sbin/pam_timestamp_check" subj=staff_u:staff_r:pam_t:s0 key=(null) type=AVC_PATH msg=audit(1163778957.002:13557): path="/var/run/utmp" type=AVC msg=audit(1163778960.194:13558): avc: denied { read } for pid=16541 comm="firefox-bin" name="inotify" dev=inotifyfs ino=340 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:inotifyfs_t:s0 tclass=dir type=SYSCALL msg=audit(1163778960.194:13558): arch=40000003 syscall=3 success=yes exit=512 a0=21 a1=baaa9b0 a2=400 a3=400 items=0 ppid=1 pid=16541 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163778960.194:13558): path="inotify" type=AVC msg=audit(1163778977.619:13559): avc: denied { write } for pid=16716 comm="gnome-backgroun" name="15931" dev=dm-0 ino=14567724 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:ice_tmp_t:s0 tclass=sock_file type=SYSCALL msg=audit(1163778977.619:13559): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=bf97d9c0 a2=24b770 a3=16 items=0 ppid=1 pid=16716 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-backgroun" exe="/usr/bin/gnome-background-properties" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163778988.364:13560): avc: denied { write } for pid=16722 comm="nautilus" name=".recently-used.xbel" dev=dm-0 ino=11885042 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:staff_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163778988.364:13560): arch=40000003 syscall=33 success=yes exit=0 a0=8e43740 a1=6 a2=7a7708 a3=d8db59 items=0 ppid=1 pid=16722 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="nautilus" exe="/usr/bin/nautilus" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163778989.728:13561): avc: denied { read write } for pid=16722 comm="nautilus" name=".gnupg" dev=dm-0 ino=6814310 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:staff_gpg_secret_t:s0 tclass=dir type=SYSCALL msg=audit(1163778989.728:13561): arch=40000003 syscall=33 success=yes exit=0 a0=8e43740 a1=6 a2=7a7708 a3=d8db59 items=0 ppid=1 pid=16722 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="nautilus" exe="/usr/bin/nautilus" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163779140.914:13562): avc: denied { read } for pid=16431 comm="nautilus" name=".gdm0UWNIT" dev=dm-0 ino=14469400 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163779140.914:13562): arch=40000003 syscall=33 success=yes exit=0 a0=bf971e36 a1=4 a2=da3a64 a3=bf971e36 items=0 ppid=1 pid=16431 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="nautilus" exe="/usr/bin/nautilus" subj=staff_u:staff_r:staff_t:s0 key=(null) type=USER_CHAUTHTOK msg=audit(1163779141.706:13563): user pid=16751 uid=0 auid=500 subj=staff_u:sysadm_r:useradd_t:s0 msg='op=adding user acct=nscd exe="/usr/sbin/useradd" (hostname=?, addr=?, terminal=? res=failed)' type=SELINUX_ERR msg=audit(1163779144.550:13564): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:rpm_script_t:s0 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=process type=SYSCALL msg=audit(1163779144.550:13564): arch=40000003 syscall=11 success=yes exit=0 a0=bfa32bd9 a1=bfa31c98 a2=9df6858 a3=5 items=0 ppid=16756 pid=16763 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="yum-updatesd" exe="/bin/bash" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=AVC msg=audit(1163779145.310:13565): avc: denied { write } for pid=15069 comm="vpnc" name="tun" dev=tmpfs ino=1473 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:tun_tap_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163779145.310:13565): arch=40000003 syscall=4 success=yes exit=40 a0=4 a1=805c570 a2=28 a3=bfd587e4 items=0 ppid=15067 pid=15069 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vpnc" exe="/usr/sbin/vpnc" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163779145.310:13565): path="/dev/net/tun" type=AVC msg=audit(1163779145.350:13566): avc: denied { read } for pid=15069 comm="vpnc" name="tun" dev=tmpfs ino=1473 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:tun_tap_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163779145.350:13566): arch=40000003 syscall=3 success=yes exit=40 a0=4 a1=805c5a0 a2=1000 a3=805c5a0 items=0 ppid=15067 pid=15069 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vpnc" exe="/usr/sbin/vpnc" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163779145.350:13566): path="/dev/net/tun" type=AVC msg=audit(1163779174.000:13567): avc: denied { lock } for pid=16476 comm="pam_timestamp_c" name="utmp" dev=dm-0 ino=14436583 scontext=staff_u:staff_r:pam_t:s0 tcontext=system_u:object_r:initrc_var_run_t:s0 tclass=file type=SYSCALL msg=audit(1163779174.000:13567): arch=40000003 syscall=221 success=yes exit=0 a0=3 a1=7 a2=bfded3d8 a3=0 items=0 ppid=16467 pid=16476 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=(none) comm="pam_timestamp_c" exe="/sbin/pam_timestamp_check" subj=staff_u:staff_r:pam_t:s0 key=(null) type=AVC_PATH msg=audit(1163779174.000:13567): path="/var/run/utmp" type=AVC msg=audit(1163779194.521:13568): avc: denied { read } for pid=16541 comm="firefox-bin" name="inotify" dev=inotifyfs ino=340 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:inotifyfs_t:s0 tclass=dir type=SYSCALL msg=audit(1163779194.521:13568): arch=40000003 syscall=3 success=yes exit=432 a0=21 a1=b3f42a8 a2=400 a3=400 items=0 ppid=1 pid=16541 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163779194.521:13568): path="inotify" type=USER_ACCT msg=audit(1163779202.669:13569): user pid=16786 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1163779202.669:13570): login pid=16786 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1163779202.681:13571): user pid=16786 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1163779202.681:13572): user pid=16786 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1163779202.685:13573): avc: denied { execute } for pid=16787 comm="sh" name="sa1" dev=dm-0 ino=13061698 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:lib_t:s0 tclass=file type=AVC msg=audit(1163779202.685:13573): avc: denied { execute_no_trans } for pid=16787 comm="sh" name="sa1" dev=dm-0 ino=13061698 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1163779202.685:13573): arch=40000003 syscall=11 success=yes exit=0 a0=97631b0 a1=9763358 a2=9763290 a3=9763008 items=0 ppid=16786 pid=16787 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sa1" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163779202.685:13573): path="/usr/lib/sa/sa1" type=AVC msg=audit(1163779202.865:13574): avc: denied { execute } for pid=16787 comm="sa1" name="sadc" dev=dm-0 ino=11981401 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=AVC msg=audit(1163779202.865:13574): avc: denied { execute_no_trans } for pid=16787 comm="sa1" name="sadc" dev=dm-0 ino=11981401 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=AVC msg=audit(1163779202.865:13574): avc: denied { read } for pid=16787 comm="sa1" name="sadc" dev=dm-0 ino=11981401 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163779202.865:13574): arch=40000003 syscall=11 success=yes exit=0 a0=9a42d48 a1=9a42740 a2=9a42d60 a3=9a42740 items=0 ppid=16786 pid=16787 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163779202.865:13574): path="/usr/lib/sa/sadc" type=AVC_PATH msg=audit(1163779202.865:13574): path="/usr/lib/sa/sadc" type=AVC msg=audit(1163779203.349:13575): avc: denied { search } for pid=16787 comm="sadc" name="net" dev=proc ino=-268435432 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=dir type=AVC msg=audit(1163779203.349:13575): avc: denied { read } for pid=16787 comm="sadc" name="dev" dev=proc ino=-268434164 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=file type=SYSCALL msg=audit(1163779203.349:13575): arch=40000003 syscall=5 success=yes exit=3 a0=8050371 a1=0 a2=1b6 a3=900a7f8 items=0 ppid=16786 pid=16787 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163779203.353:13576): avc: denied { getattr } for pid=16787 comm="sadc" name="dev" dev=proc ino=-268434164 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=file type=SYSCALL msg=audit(1163779203.353:13576): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bfdb5fe8 a2=92cff4 a3=900a7f8 items=0 ppid=16786 pid=16787 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163779203.353:13576): path="/proc/net/dev" type=AVC msg=audit(1163779203.353:13577): avc: denied { search } for pid=16787 comm="sadc" name="sa" dev=dm-0 ino=14607631 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=dir type=SYSCALL msg=audit(1163779203.353:13577): arch=40000003 syscall=33 success=yes exit=0 a0=bfdb6394 a1=0 a2=bfdb6288 a3=bfdb6290 items=0 ppid=16786 pid=16787 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163779203.581:13578): avc: denied { read append } for pid=16787 comm="sadc" name="sa17" dev=dm-0 ino=14600257 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=file type=SYSCALL msg=audit(1163779203.581:13578): arch=40000003 syscall=5 success=yes exit=3 a0=bfdb6394 a1=402 a2=bfdb6558 a3=bfdb6290 items=0 ppid=16786 pid=16787 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163779203.681:13579): avc: denied { search } for pid=16787 comm="sadc" name="fs" dev=proc ino=-268435428 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=dir type=AVC msg=audit(1163779203.681:13579): avc: denied { read } for pid=16787 comm="sadc" name="dentry-state" dev=proc ino=-268435230 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=file type=SYSCALL msg=audit(1163779203.681:13579): arch=40000003 syscall=5 success=yes exit=4 a0=805037f a1=0 a2=1b6 a3=900b348 items=0 ppid=16786 pid=16787 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163779203.681:13580): avc: denied { getattr } for pid=16787 comm="sadc" name="dentry-state" dev=proc ino=-268435230 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=file type=SYSCALL msg=audit(1163779203.681:13580): arch=40000003 syscall=197 success=yes exit=0 a0=4 a1=bfdb5e40 a2=92cff4 a3=900b348 items=0 ppid=16786 pid=16787 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163779203.681:13580): path="/proc/sys/fs/dentry-state" type=AVC msg=audit(1163779203.681:13581): avc: denied { search } for pid=16787 comm="sadc" name="rpc" dev=proc ino=-268433616 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_rpc_t:s0 tclass=dir type=SYSCALL msg=audit(1163779203.681:13581): arch=40000003 syscall=5 success=no exit=-2 a0=80502a5 a1=0 a2=1b6 a3=900b348 items=0 ppid=16786 pid=16787 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163779203.681:13582): avc: denied { lock } for pid=16787 comm="sadc" name="sa17" dev=dm-0 ino=14600257 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=file type=SYSCALL msg=audit(1163779203.681:13582): arch=40000003 syscall=143 success=yes exit=0 a0=3 a1=6 a2=bfdb6290 a3=3 items=0 ppid=16786 pid=16787 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163779203.681:13582): path="/var/log/sa/sa17" type=CRED_DISP msg=audit(1163779204.742:13583): user pid=16786 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1163779204.742:13584): user pid=16786 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_CHAUTHTOK msg=audit(1163779227.311:13585): user pid=16808 uid=0 auid=500 subj=staff_u:sysadm_r:useradd_t:s0 msg='op=adding user acct=gdm exe="/usr/sbin/useradd" (hostname=?, addr=?, terminal=? res=failed)' type=USER_CHAUTHTOK msg=audit(1163779227.419:13586): user pid=16809 uid=0 auid=500 subj=staff_u:sysadm_r:useradd_t:s0 msg='op=changing user shell acct=gdm exe="/usr/sbin/usermod" (hostname=?, addr=?, terminal=? res=success)' type=SELINUX_ERR msg=audit(1163779227.419:13587): security_compute_sid: invalid context staff_u:system_r:nscd_t:s0 for scontext=staff_u:sysadm_r:useradd_t:s0 tcontext=system_u:object_r:nscd_exec_t:s0 tclass=process type=AVC msg=audit(1163779227.419:13587): avc: denied { transition } for pid=16810 comm="usermod" name="nscd" dev=dm-0 ino=10327130 scontext=staff_u:sysadm_r:useradd_t:s0 tcontext=staff_u:system_r:nscd_t:s0 tclass=process type=SYSCALL msg=audit(1163779227.419:13587): arch=40000003 syscall=11 success=yes exit=0 a0=8055a15 a1=bfc38ff4 a2=bfc39008 a3=0 items=0 ppid=16809 pid=16810 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="nscd" exe="/usr/sbin/nscd" subj=staff_u:system_r:nscd_t:s0 key=(null) type=AVC_PATH msg=audit(1163779227.419:13587): path="/usr/sbin/nscd" type=SELINUX_ERR msg=audit(1163779227.571:13588): security_compute_sid: invalid context staff_u:system_r:nscd_t:s0 for scontext=staff_u:sysadm_r:useradd_t:s0 tcontext=system_u:object_r:nscd_exec_t:s0 tclass=process type=SYSCALL msg=audit(1163779227.571:13588): arch=40000003 syscall=11 success=yes exit=0 a0=8055a15 a1=bfc38ff4 a2=bfc39008 a3=0 items=0 ppid=16809 pid=16811 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="nscd" exe="/usr/sbin/nscd" subj=staff_u:system_r:nscd_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779227.611:13589): security_compute_sid: invalid context staff_u:system_r:nscd_t:s0 for scontext=staff_u:sysadm_r:useradd_t:s0 tcontext=system_u:object_r:nscd_exec_t:s0 tclass=process type=SYSCALL msg=audit(1163779227.611:13589): arch=40000003 syscall=11 success=yes exit=0 a0=8055a15 a1=bfc38b94 a2=bfc38ba8 a3=0 items=0 ppid=16809 pid=16812 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="nscd" exe="/usr/sbin/nscd" subj=staff_u:system_r:nscd_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779227.615:13590): security_compute_sid: invalid context staff_u:system_r:nscd_t:s0 for scontext=staff_u:sysadm_r:useradd_t:s0 tcontext=system_u:object_r:nscd_exec_t:s0 tclass=process type=SYSCALL msg=audit(1163779227.615:13590): arch=40000003 syscall=11 success=yes exit=0 a0=8055a15 a1=bfc38b94 a2=bfc38ba8 a3=0 items=0 ppid=16809 pid=16813 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="nscd" exe="/usr/sbin/nscd" subj=staff_u:system_r:nscd_t:s0 key=(null) type=USER_ACCT msg=audit(1163779261.749:13591): user pid=16823 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1163779261.753:13592): login pid=16823 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1163779261.753:13593): user pid=16823 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1163779261.753:13594): user pid=16823 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1163779261.969:13595): avc: denied { getattr } for pid=16824 comm="bash" name="run-parts" dev=dm-0 ino=10331890 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1163779261.969:13595): arch=40000003 syscall=195 success=yes exit=0 a0=9957120 a1=bf8ec1a0 a2=255ff4 a3=9957120 items=0 ppid=16823 pid=16824 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="bash" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163779261.969:13595): path="/usr/bin/run-parts" type=AVC msg=audit(1163779261.997:13596): avc: denied { execute } for pid=16824 comm="bash" name="run-parts" dev=dm-0 ino=10331890 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1163779261.997:13596): arch=40000003 syscall=33 success=yes exit=0 a0=9957120 a1=1 a2=11 a3=9957120 items=0 ppid=16823 pid=16824 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="bash" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163779261.997:13597): avc: denied { read } for pid=16824 comm="bash" name="run-parts" dev=dm-0 ino=10331890 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1163779261.997:13597): arch=40000003 syscall=33 success=yes exit=0 a0=9957120 a1=4 a2=ffffffff a3=9957120 items=0 ppid=16823 pid=16824 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="bash" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163779261.997:13598): avc: denied { execute_no_trans } for pid=16824 comm="bash" name="run-parts" dev=dm-0 ino=10331890 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1163779261.997:13598): arch=40000003 syscall=11 success=yes exit=0 a0=9957120 a1=99573d8 a2=99572f8 a3=9956f98 items=0 ppid=16823 pid=16824 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="run-parts" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163779261.997:13598): path="/usr/bin/run-parts" type=AVC msg=audit(1163779262.005:13599): avc: denied { ioctl } for pid=16824 comm="run-parts" name="run-parts" dev=dm-0 ino=10331890 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1163779262.005:13599): arch=40000003 syscall=54 success=no exit=-25 a0=3 a1=5401 a2=bf873358 a3=bf873398 items=0 ppid=16823 pid=16824 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="run-parts" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163779262.005:13599): path="/usr/bin/run-parts" type=AVC msg=audit(1163779262.017:13600): avc: denied { execute } for pid=16824 comm="run-parts" name="inn-cron-nntpsend" dev=dm-0 ino=9331477 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1163779262.017:13600): arch=40000003 syscall=33 success=yes exit=0 a0=8e61990 a1=1 a2=1 a3=8e61c98 items=0 ppid=16823 pid=16824 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="run-parts" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163779262.017:13601): avc: denied { execute_no_trans } for pid=16825 comm="run-parts" name="inn-cron-nntpsend" dev=dm-0 ino=9331477 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1163779262.017:13601): arch=40000003 syscall=11 success=yes exit=0 a0=8e61a10 a1=8e61ad8 a2=8e61ae8 a3=8e61758 items=0 ppid=16824 pid=16825 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="inn-cron-nntpse" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163779262.017:13601): path="/etc/cron.hourly/inn-cron-nntpsend" type=AVC msg=audit(1163779262.029:13602): avc: denied { execute } for pid=16827 comm="inn-cron-nntpse" name="chkconfig" dev=dm-0 ino=9984485 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sbin_t:s0 tclass=file type=AVC msg=audit(1163779262.029:13602): avc: denied { execute_no_trans } for pid=16827 comm="inn-cron-nntpse" name="chkconfig" dev=dm-0 ino=9984485 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sbin_t:s0 tclass=file type=AVC msg=audit(1163779262.029:13602): avc: denied { read } for pid=16827 comm="inn-cron-nntpse" name="chkconfig" dev=dm-0 ino=9984485 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sbin_t:s0 tclass=file type=SYSCALL msg=audit(1163779262.029:13602): arch=40000003 syscall=11 success=yes exit=0 a0=9563678 a1=9563808 a2=9563720 a3=9563508 items=0 ppid=16825 pid=16827 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="chkconfig" exe="/sbin/chkconfig" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163779262.029:13602): path="/sbin/chkconfig" type=AVC_PATH msg=audit(1163779262.029:13602): path="/sbin/chkconfig" type=AVC msg=audit(1163779262.033:13603): avc: denied { read } for pid=16827 comm="chkconfig" name="innd" dev=dm-0 ino=9331492 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163779262.033:13603): arch=40000003 syscall=5 success=yes exit=3 a0=bfc6ff30 a1=0 a2=ffffffff a3=9971038 items=0 ppid=16825 pid=16827 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="chkconfig" exe="/sbin/chkconfig" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163779262.033:13604): avc: denied { getattr } for pid=16827 comm="chkconfig" name="innd" dev=dm-0 ino=9331492 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163779262.033:13604): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bfc6fe9c a2=2e8ff4 a3=bfc6fe9c items=0 ppid=16825 pid=16827 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="chkconfig" exe="/sbin/chkconfig" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163779262.033:13604): path="/etc/rc.d/init.d/innd" type=CRED_DISP msg=audit(1163779262.573:13605): user pid=16823 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1163779262.573:13606): user pid=16823 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1163779304.352:13607): avc: denied { write } for pid=15069 comm="vpnc" name="tun" dev=tmpfs ino=1473 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:tun_tap_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163779304.352:13607): arch=40000003 syscall=4 success=yes exit=52 a0=4 a1=805c570 a2=34 a3=bfd587e4 items=0 ppid=15067 pid=15069 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vpnc" exe="/usr/sbin/vpnc" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163779304.352:13607): path="/dev/net/tun" type=AVC msg=audit(1163779304.392:13608): avc: denied { read } for pid=15069 comm="vpnc" name="tun" dev=tmpfs ino=1473 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:tun_tap_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163779304.392:13608): arch=40000003 syscall=3 success=yes exit=52 a0=4 a1=805c5a0 a2=1000 a3=805c5a0 items=0 ppid=15067 pid=15069 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vpnc" exe="/usr/sbin/vpnc" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163779304.392:13608): path="/dev/net/tun" type=AVC msg=audit(1163779328.941:13609): avc: denied { getattr } for pid=6659 comm="dbus-daemon" name="/" dev=dm-0 ino=2 scontext=staff_u:staff_r:staff_dbusd_t:s0 tcontext=system_u:object_r:fs_t:s0 tclass=filesystem type=SYSCALL msg=audit(1163779328.941:13609): arch=40000003 syscall=100 success=yes exit=0 a0=18 a1=bfcd52ac a2=c4eff4 a3=ffffffb8 items=0 ppid=1 pid=6659 auid=500 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) comm="dbus-daemon" exe="/bin/dbus-daemon" subj=staff_u:staff_r:staff_dbusd_t:s0 key=(null) type=USER_CHAUTHTOK msg=audit(1163779333.554:13610): user pid=16916 uid=0 auid=500 subj=staff_u:sysadm_r:useradd_t:s0 msg='op=adding user acct=sshd exe="/usr/sbin/useradd" (hostname=?, addr=?, terminal=pts/2 res=failed)' type=AVC msg=audit(1163779370.000:13611): avc: denied { lock } for pid=16476 comm="pam_timestamp_c" name="utmp" dev=dm-0 ino=14436583 scontext=staff_u:staff_r:pam_t:s0 tcontext=system_u:object_r:initrc_var_run_t:s0 tclass=file type=SYSCALL msg=audit(1163779370.000:13611): arch=40000003 syscall=221 success=yes exit=0 a0=3 a1=7 a2=bfded3d8 a3=0 items=0 ppid=16467 pid=16476 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=(none) comm="pam_timestamp_c" exe="/sbin/pam_timestamp_check" subj=staff_u:staff_r:pam_t:s0 key=(null) type=AVC_PATH msg=audit(1163779370.000:13611): path="/var/run/utmp" type=AVC msg=audit(1163779392.621:13612): avc: denied { read } for pid=16541 comm="firefox-bin" name="inotify" dev=inotifyfs ino=340 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:inotifyfs_t:s0 tclass=dir type=SYSCALL msg=audit(1163779392.621:13612): arch=40000003 syscall=3 success=yes exit=864 a0=21 a1=b3f42a8 a2=400 a3=400 items=0 ppid=1 pid=16541 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163779392.621:13612): path="inotify" type=SELINUX_ERR msg=audit(1163779436.236:13613): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:rpm_script_t:s0 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=process type=SYSCALL msg=audit(1163779436.236:13613): arch=40000003 syscall=11 success=yes exit=0 a0=bf8b2bd7 a1=bf8b2318 a2=87de858 a3=5 items=0 ppid=17379 pid=17386 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="setroubleshoot" exe="/bin/bash" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779436.260:13614): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:sbin_t:s0 tclass=process type=SYSCALL msg=audit(1163779436.260:13614): arch=40000003 syscall=11 success=yes exit=0 a0=8c5e0f0 a1=8c76418 a2=8c69620 a3=8c77300 items=0 ppid=17386 pid=17391 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="selinuxenabled" exe="/usr/sbin/selinuxenabled" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779436.312:13615): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=process type=SYSCALL msg=audit(1163779436.312:13615): arch=40000003 syscall=11 success=yes exit=0 a0=8c77d18 a1=8c5d0a8 a2=8c69620 a3=8c77ea8 items=0 ppid=17386 pid=17392 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="id" exe="/usr/bin/id" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779436.420:13616): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:sbin_t:s0 tclass=process type=SYSCALL msg=audit(1163779436.420:13616): arch=40000003 syscall=11 success=yes exit=0 a0=8c7b210 a1=8c5d010 a2=8c69620 a3=8c7b560 items=0 ppid=17393 pid=17394 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="pidof" exe="/sbin/killall5" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779436.464:13617): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:sbin_t:s0 tclass=process type=SYSCALL msg=audit(1163779436.464:13617): arch=40000003 syscall=11 success=yes exit=0 a0=8c7ba60 a1=8c7bf10 a2=8c69620 a3=8c7b560 items=0 ppid=17393 pid=17395 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="pidof" exe="/sbin/killall5" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779436.516:13618): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=process type=SYSCALL msg=audit(1163779436.516:13618): arch=40000003 syscall=11 success=yes exit=0 a0=8c7b1e0 a1=8c7aed8 a2=8c69620 a3=8c7b5c0 items=0 ppid=17386 pid=17396 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="rhgb-client" exe="/usr/bin/rhgb-client" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779436.560:13619): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=process type=SYSCALL msg=audit(1163779436.560:13619): arch=40000003 syscall=11 success=yes exit=0 a0=8c7af38 a1=8c7a9f8 a2=8c69620 a3=8c7a888 items=0 ppid=17386 pid=17397 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="rm" exe="/bin/rm" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779436.584:13620): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=process type=SYSCALL msg=audit(1163779436.584:13620): arch=40000003 syscall=11 success=yes exit=0 a0=8c612b8 a1=8c61288 a2=8c69620 a3=8c611d0 items=0 ppid=17386 pid=17398 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="rm" exe="/bin/rm" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779436.616:13621): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:shell_exec_t:s0 tclass=process type=SYSCALL msg=audit(1163779436.616:13621): arch=40000003 syscall=11 success=yes exit=0 a0=8c69870 a1=8c61a78 a2=8c69620 a3=8c78d80 items=0 ppid=17386 pid=17399 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="bash" exe="/bin/bash" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779436.620:13622): security_compute_sid: invalid context staff_u:system_r:setroubleshootd_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:setroubleshootd_exec_t:s0 tclass=process type=AVC msg=audit(1163779436.620:13622): avc: denied { transition } for pid=17400 comm="bash" name="setroubleshootd" dev=dm-0 ino=10317833 scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=staff_u:system_r:setroubleshootd_t:s0 tclass=process type=SYSCALL msg=audit(1163779436.620:13622): arch=40000003 syscall=11 success=yes exit=0 a0=85c3670 a1=85c3c38 a2=85c3b78 a3=85c35f0 items=0 ppid=17399 pid=17400 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="setroubleshootd" exe="/usr/bin/python" subj=staff_u:system_r:setroubleshootd_t:s0 key=(null) type=AVC_PATH msg=audit(1163779436.620:13622): path="/usr/sbin/setroubleshootd" type=SELINUX_ERR msg=audit(1163779437.084:13623): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=process type=SYSCALL msg=audit(1163779437.084:13623): arch=40000003 syscall=11 success=yes exit=0 a0=8c5f6f8 a1=8c78818 a2=8c69620 a3=8c5f4d8 items=0 ppid=17386 pid=17402 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="touch" exe="/bin/touch" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=AVC msg=audit(1163779438.396:13624): avc: denied { read } for pid=16541 comm="firefox-bin" name="inotify" dev=inotifyfs ino=340 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:inotifyfs_t:s0 tclass=dir type=SYSCALL msg=audit(1163779438.396:13624): arch=40000003 syscall=3 success=yes exit=384 a0=21 a1=b3f42a8 a2=400 a3=400 items=0 ppid=1 pid=16541 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163779438.396:13624): path="inotify" type=AVC msg=audit(1163779438.916:13625): avc: denied { read } for pid=16431 comm="nautilus" name=".gdm0UWNIT" dev=dm-0 ino=14469400 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163779438.916:13625): arch=40000003 syscall=33 success=yes exit=0 a0=bf971e36 a1=4 a2=da3a64 a3=bf971e36 items=0 ppid=1 pid=16431 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="nautilus" exe="/usr/bin/nautilus" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163779440.000:13626): avc: denied { lock } for pid=16476 comm="pam_timestamp_c" name="utmp" dev=dm-0 ino=14436583 scontext=staff_u:staff_r:pam_t:s0 tcontext=system_u:object_r:initrc_var_run_t:s0 tclass=file type=SYSCALL msg=audit(1163779440.000:13626): arch=40000003 syscall=221 success=yes exit=0 a0=3 a1=7 a2=bfded3d8 a3=0 items=0 ppid=16467 pid=16476 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=(none) comm="pam_timestamp_c" exe="/sbin/pam_timestamp_check" subj=staff_u:staff_r:pam_t:s0 key=(null) type=AVC_PATH msg=audit(1163779440.000:13626): path="/var/run/utmp" type=AVC msg=audit(1163779467.294:13627): avc: denied { read } for pid=15069 comm="vpnc" name="tun" dev=tmpfs ino=1473 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:tun_tap_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163779467.294:13627): arch=40000003 syscall=3 success=yes exit=63 a0=4 a1=805c5a0 a2=1000 a3=805c5a0 items=0 ppid=15067 pid=15069 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vpnc" exe="/usr/sbin/vpnc" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163779467.294:13627): path="/dev/net/tun" type=AVC msg=audit(1163779467.334:13628): avc: denied { write } for pid=15069 comm="vpnc" name="tun" dev=tmpfs ino=1473 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:tun_tap_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163779467.334:13628): arch=40000003 syscall=4 success=yes exit=133 a0=4 a1=805c570 a2=85 a3=bfd587e4 items=0 ppid=15067 pid=15069 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vpnc" exe="/usr/sbin/vpnc" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163779467.334:13628): path="/dev/net/tun" type=SELINUX_ERR msg=audit(1163779469.862:13629): security_compute_sid: invalid context staff_u:system_r:setroubleshootd_t:s0 for scontext=staff_u:system_r:setroubleshootd_t:s0 tcontext=system_u:object_r:shell_exec_t:s0 tclass=process type=SYSCALL msg=audit(1163779469.862:13629): arch=40000003 syscall=11 success=yes exit=0 a0=5696a4 a1=b79fbbfc a2=bfcd0364 a3=400 items=0 ppid=17401 pid=17409 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sh" exe="/bin/bash" subj=staff_u:system_r:setroubleshootd_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779470.006:13630): security_compute_sid: invalid context staff_u:system_r:setroubleshootd_t:s0 for scontext=staff_u:system_r:setroubleshootd_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=process type=SYSCALL msg=audit(1163779470.006:13630): arch=40000003 syscall=11 success=yes exit=0 a0=855a690 a1=855a9b0 a2=855a8e0 a3=855a598 items=0 ppid=17409 pid=17410 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="uname" exe="/bin/uname" subj=staff_u:system_r:setroubleshootd_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779491.795:13631): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:rpm_script_t:s0 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=process type=SYSCALL msg=audit(1163779491.795:13631): arch=40000003 syscall=11 success=yes exit=0 a0=bf8fcbe0 a1=bf8fb368 a2=85cd858 a3=5 items=0 ppid=17418 pid=17425 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="dhcpd" exe="/bin/bash" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779491.903:13632): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:rpm_script_t:s0 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=process type=SYSCALL msg=audit(1163779491.903:13632): arch=40000003 syscall=11 success=yes exit=0 a0=bfbedbdd a1=bfbec688 a2=977f858 a3=5 items=0 ppid=17431 pid=17438 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="dhcrelay" exe="/bin/bash" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779492.372:13633): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:rpm_script_t:s0 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=process type=SYSCALL msg=audit(1163779492.372:13633): arch=40000003 syscall=11 success=yes exit=0 a0=bf82dbdc a1=bf82d298 a2=9648858 a3=5 items=0 ppid=17445 pid=17452 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="mdmonitor" exe="/bin/bash" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779492.424:13634): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:rpm_script_t:s0 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=process type=SYSCALL msg=audit(1163779492.424:13634): arch=40000003 syscall=11 success=yes exit=0 a0=bfeacbe0 a1=bfeac118 a2=9056858 a3=5 items=0 ppid=17457 pid=17464 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="mdmpd" exe="/bin/bash" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=AVC msg=audit(1163779496.260:13635): avc: denied { read } for pid=16431 comm="nautilus" name=".gdm0UWNIT" dev=dm-0 ino=14469400 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163779496.260:13635): arch=40000003 syscall=33 success=yes exit=0 a0=bf971e36 a1=4 a2=da3a64 a3=bf971e36 items=0 ppid=1 pid=16431 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="nautilus" exe="/usr/bin/nautilus" subj=staff_u:staff_r:staff_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779508.453:13636): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:rpm_script_t:s0 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=process type=SYSCALL msg=audit(1163779508.453:13636): arch=40000003 syscall=11 success=yes exit=0 a0=bfff4be1 a1=bfff3a68 a2=9cc9858 a3=5 items=0 ppid=17483 pid=17490 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="sshd" exe="/bin/bash" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779508.481:13637): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:sbin_t:s0 tclass=process type=SYSCALL msg=audit(1163779508.481:13637): arch=40000003 syscall=11 success=yes exit=0 a0=840de80 a1=83f63b0 a2=8402ad8 a3=83f61a8 items=0 ppid=17496 pid=17497 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="runlevel" exe="/sbin/runlevel" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779508.541:13638): security_compute_sid: invalid context staff_u:system_r:sshd_t:s0-s0:c0.c1023 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:sshd_exec_t:s0 tclass=process type=AVC msg=audit(1163779508.541:13638): avc: denied { transition } for pid=17498 comm="sshd" name="sshd" dev=dm-0 ino=11066006 scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=staff_u:system_r:sshd_t:s0-s0:c0.c1023 tclass=process type=SYSCALL msg=audit(1163779508.541:13638): arch=40000003 syscall=11 success=yes exit=0 a0=84131f8 a1=8413210 a2=8402ad8 a3=8413098 items=0 ppid=17490 pid=17498 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="sshd" exe="/usr/sbin/sshd" subj=staff_u:system_r:sshd_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163779508.541:13638): path="/usr/sbin/sshd" type=AVC msg=audit(1163779508.693:13639): avc: denied { write } for pid=8872 comm="sshd" name="run" dev=dm-0 ino=14436616 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:var_run_t:s0 tclass=dir type=AVC msg=audit(1163779508.693:13639): avc: denied { remove_name } for pid=8872 comm="sshd" name="sshd.pid" dev=dm-0 ino=14436996 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:var_run_t:s0 tclass=dir type=AVC msg=audit(1163779508.693:13639): avc: denied { unlink } for pid=8872 comm="sshd" name="sshd.pid" dev=dm-0 ino=14436996 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:var_run_t:s0 tclass=file type=SYSCALL msg=audit(1163779508.693:13639): arch=40000003 syscall=10 success=yes exit=0 a0=dd8459 a1=1 a2=dec7ac a3=ffffffff items=0 ppid=1 pid=8872 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sshd" exe="/usr/sbin/sshd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779508.701:13640): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=process type=SYSCALL msg=audit(1163779508.701:13640): arch=40000003 syscall=11 success=yes exit=0 a0=8417d80 a1=8417350 a2=8402ad8 a3=8417d58 items=0 ppid=17490 pid=17500 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="usleep" exe="/bin/usleep" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779508.821:13641): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=process type=SYSCALL msg=audit(1163779508.821:13641): arch=40000003 syscall=11 success=yes exit=0 a0=8416f50 a1=8413898 a2=8402ad8 a3=84167a8 items=0 ppid=17490 pid=17501 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="rm" exe="/bin/rm" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779508.825:13642): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=process type=SYSCALL msg=audit(1163779508.825:13642): arch=40000003 syscall=11 success=yes exit=0 a0=8416d58 a1=84137d0 a2=8402ad8 a3=8413648 items=0 ppid=17490 pid=17502 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="rm" exe="/bin/rm" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779508.841:13643): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=process type=SYSCALL msg=audit(1163779508.841:13643): arch=40000003 syscall=11 success=yes exit=0 a0=8416550 a1=8413490 a2=8402ad8 a3=8412d38 items=0 ppid=17490 pid=17503 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="sleep" exe="/bin/sleep" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779511.873:13644): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=process type=SYSCALL msg=audit(1163779511.873:13644): arch=40000003 syscall=11 success=yes exit=0 a0=83fa250 a1=8413068 a2=8402ad8 a3=84133d8 items=0 ppid=17490 pid=17504 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="cp" exe="/bin/cp" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=AVC msg=audit(1163779511.905:13645): avc: denied { setfscreate } for pid=17504 comm="cp" scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=staff_u:sysadm_r:initrc_t:s0 tclass=process type=SYSCALL msg=audit(1163779511.905:13645): arch=40000003 syscall=4 success=yes exit=30 a0=3 a1=8e23088 a2=1e a3=a2f748 items=0 ppid=17490 pid=17504 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="cp" exe="/bin/cp" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=AVC msg=audit(1163779511.905:13646): avc: denied { relabelfrom } for pid=17504 comm="cp" name="localtime" dev=dm-0 ino=14537075 scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=file type=AVC msg=audit(1163779511.905:13646): avc: denied { relabelto } for pid=17504 comm="cp" name="localtime" dev=dm-0 ino=14537075 scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1163779511.905:13646): arch=40000003 syscall=228 success=yes exit=0 a0=4 a1=a2f0d3 a2=8e23088 a3=1e items=0 ppid=17490 pid=17504 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="cp" exe="/bin/cp" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=AVC msg=audit(1163779511.909:13647): avc: denied { setattr } for pid=17504 comm="cp" name="localtime" dev=dm-0 ino=14537075 scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1163779511.909:13647): arch=40000003 syscall=271 success=yes exit=0 a0=bfe1f564 a1=bfe1f5cc a2=24bff4 a3=0 items=0 ppid=17490 pid=17504 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="cp" exe="/bin/cp" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779511.909:13648): security_compute_sid: invalid context staff_u:system_r:sshd_t:s0-s0:c0.c1023 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:sshd_exec_t:s0 tclass=process type=SYSCALL msg=audit(1163779511.909:13648): arch=40000003 syscall=11 success=yes exit=0 a0=8415da0 a1=83fa1e0 a2=8402ad8 a3=83fa250 items=0 ppid=17490 pid=17505 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="sshd" exe="/usr/sbin/sshd" subj=staff_u:system_r:sshd_t:s0-s0:c0.c1023 key=(null) type=SELINUX_ERR msg=audit(1163779511.925:13649): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=process type=SYSCALL msg=audit(1163779511.925:13649): arch=40000003 syscall=11 success=yes exit=0 a0=84115a8 a1=83fa318 a2=8402ad8 a3=8413408 items=0 ppid=17490 pid=17507 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="touch" exe="/bin/touch" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779512.241:13650): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:rpm_script_t:s0 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=process type=SYSCALL msg=audit(1163779512.241:13650): arch=40000003 syscall=11 success=yes exit=0 a0=bfb8cbe1 a1=bfb8b5f8 a2=893d858 a3=5 items=0 ppid=17510 pid=17517 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="sshd" exe="/bin/bash" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779512.265:13651): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:sbin_t:s0 tclass=process type=SYSCALL msg=audit(1163779512.265:13651): arch=40000003 syscall=11 success=yes exit=0 a0=8d0fe80 a1=8cf83b0 a2=8d04ad8 a3=8cf81a8 items=0 ppid=17523 pid=17524 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="runlevel" exe="/sbin/runlevel" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779512.269:13652): security_compute_sid: invalid context staff_u:system_r:sshd_t:s0-s0:c0.c1023 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:sshd_exec_t:s0 tclass=process type=SYSCALL msg=audit(1163779512.269:13652): arch=40000003 syscall=11 success=yes exit=0 a0=8d151f8 a1=8d15210 a2=8d04ad8 a3=8d15098 items=0 ppid=17517 pid=17525 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="sshd" exe="/usr/sbin/sshd" subj=staff_u:system_r:sshd_t:s0-s0:c0.c1023 key=(null) type=SELINUX_ERR msg=audit(1163779512.285:13653): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=process type=SYSCALL msg=audit(1163779512.285:13653): arch=40000003 syscall=11 success=yes exit=0 a0=8d19d80 a1=8d19380 a2=8d04ad8 a3=8d19de0 items=0 ppid=17517 pid=17527 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="usleep" exe="/bin/usleep" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779512.393:13654): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=process type=SYSCALL msg=audit(1163779512.393:13654): arch=40000003 syscall=11 success=yes exit=0 a0=8d18cc8 a1=8d15898 a2=8d04ad8 a3=8d187a8 items=0 ppid=17517 pid=17528 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="rm" exe="/bin/rm" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779512.397:13655): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=process type=SYSCALL msg=audit(1163779512.397:13655): arch=40000003 syscall=11 success=yes exit=0 a0=8d18d58 a1=8d157d0 a2=8d04ad8 a3=8d15648 items=0 ppid=17517 pid=17529 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="rm" exe="/bin/rm" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779512.401:13656): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=process type=SYSCALL msg=audit(1163779512.401:13656): arch=40000003 syscall=11 success=yes exit=0 a0=8d18550 a1=8d15490 a2=8d04ad8 a3=8d14d38 items=0 ppid=17517 pid=17530 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="sleep" exe="/bin/sleep" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779515.405:13657): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=process type=SYSCALL msg=audit(1163779515.405:13657): arch=40000003 syscall=11 success=yes exit=0 a0=8cfc250 a1=8d15068 a2=8d04ad8 a3=8d153d8 items=0 ppid=17517 pid=17531 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="cp" exe="/bin/cp" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779515.409:13658): security_compute_sid: invalid context staff_u:system_r:sshd_t:s0-s0:c0.c1023 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:sshd_exec_t:s0 tclass=process type=SYSCALL msg=audit(1163779515.409:13658): arch=40000003 syscall=11 success=yes exit=0 a0=8d17da0 a1=8cfc1e0 a2=8d04ad8 a3=8cfc250 items=0 ppid=17517 pid=17532 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="sshd" exe="/usr/sbin/sshd" subj=staff_u:system_r:sshd_t:s0-s0:c0.c1023 key=(null) type=SELINUX_ERR msg=audit(1163779515.429:13659): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=process type=SYSCALL msg=audit(1163779515.429:13659): arch=40000003 syscall=11 success=yes exit=0 a0=8d135a8 a1=8cfc318 a2=8d04ad8 a3=8d15408 items=0 ppid=17517 pid=17534 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="touch" exe="/bin/touch" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779535.862:13660): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:rpm_script_t:s0 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=process type=SYSCALL msg=audit(1163779535.862:13660): arch=40000003 syscall=11 success=yes exit=0 a0=bfbd3be2 a1=bfbd2e48 a2=868e858 a3=5 items=0 ppid=17540 pid=17547 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="atd" exe="/bin/bash" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779535.894:13661): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=process type=SYSCALL msg=audit(1163779535.894:13661): arch=40000003 syscall=11 success=yes exit=0 a0=875d988 a1=875d308 a2=874c268 a3=875d978 items=0 ppid=17547 pid=17552 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="usleep" exe="/bin/usleep" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779536.002:13662): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=process type=SYSCALL msg=audit(1163779536.002:13662): arch=40000003 syscall=11 success=yes exit=0 a0=875daa8 a1=875d180 a2=874c268 a3=875c370 items=0 ppid=17547 pid=17553 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="rm" exe="/bin/rm" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779536.006:13663): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=process type=SYSCALL msg=audit(1163779536.006:13663): arch=40000003 syscall=11 success=yes exit=0 a0=8742ac0 a1=8742aa8 a2=874c268 a3=87429f0 items=0 ppid=17547 pid=17554 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="rm" exe="/bin/rm" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779536.010:13664): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:shell_exec_t:s0 tclass=process type=SYSCALL msg=audit(1163779536.010:13664): arch=40000003 syscall=11 success=yes exit=0 a0=875cf48 a1=8743448 a2=874c268 a3=8744318 items=0 ppid=17547 pid=17555 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="bash" exe="/bin/bash" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779536.014:13665): security_compute_sid: invalid context staff_u:system_r:crond_t:s0-s0:c0.c1023 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:crond_exec_t:s0 tclass=process type=AVC msg=audit(1163779536.014:13665): avc: denied { transition } for pid=17556 comm="bash" name="atd" dev=dm-0 ino=10321554 scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=staff_u:system_r:crond_t:s0-s0:c0.c1023 tclass=process type=SYSCALL msg=audit(1163779536.014:13665): arch=40000003 syscall=11 success=yes exit=0 a0=8152670 a1=81527e8 a2=8152a70 a3=81525f0 items=0 ppid=17555 pid=17556 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="atd" exe="/usr/sbin/atd" subj=staff_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163779536.014:13665): path="/usr/sbin/atd" type=SELINUX_ERR msg=audit(1163779536.058:13666): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=process type=SYSCALL msg=audit(1163779536.058:13666): arch=40000003 syscall=11 success=yes exit=0 a0=8744338 a1=8743d60 a2=874c268 a3=8744508 items=0 ppid=17547 pid=17558 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="touch" exe="/bin/touch" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779536.530:13667): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:rpm_script_t:s0 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=process type=SYSCALL msg=audit(1163779536.530:13667): arch=40000003 syscall=11 success=yes exit=0 a0=bf855be2 a1=bf8552c8 a2=8a54858 a3=5 items=0 ppid=17561 pid=17568 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="atd" exe="/bin/bash" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779536.554:13668): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=process type=SYSCALL msg=audit(1163779536.554:13668): arch=40000003 syscall=11 success=yes exit=0 a0=8b23988 a1=8b23308 a2=8b12268 a3=8b23a00 items=0 ppid=17568 pid=17573 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="usleep" exe="/bin/usleep" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779536.658:13669): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=process type=SYSCALL msg=audit(1163779536.658:13669): arch=40000003 syscall=11 success=yes exit=0 a0=8b23ac8 a1=8b23180 a2=8b12268 a3=8b22370 items=0 ppid=17568 pid=17574 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="rm" exe="/bin/rm" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779536.662:13670): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=process type=SYSCALL msg=audit(1163779536.662:13670): arch=40000003 syscall=11 success=yes exit=0 a0=8b08ac0 a1=8b08aa8 a2=8b12268 a3=8b089f0 items=0 ppid=17568 pid=17575 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="rm" exe="/bin/rm" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779536.666:13671): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:shell_exec_t:s0 tclass=process type=SYSCALL msg=audit(1163779536.666:13671): arch=40000003 syscall=11 success=yes exit=0 a0=8b24198 a1=8b09448 a2=8b12268 a3=8b0a318 items=0 ppid=17568 pid=17576 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="bash" exe="/bin/bash" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779536.670:13672): security_compute_sid: invalid context staff_u:system_r:crond_t:s0-s0:c0.c1023 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:crond_exec_t:s0 tclass=process type=SYSCALL msg=audit(1163779536.670:13672): arch=40000003 syscall=11 success=yes exit=0 a0=8b23670 a1=8b237e8 a2=8b23a70 a3=8b235f0 items=0 ppid=17576 pid=17577 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="atd" exe="/usr/sbin/atd" subj=staff_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=SELINUX_ERR msg=audit(1163779536.674:13673): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=process type=SYSCALL msg=audit(1163779536.674:13673): arch=40000003 syscall=11 success=yes exit=0 a0=8b0a338 a1=8b09d60 a2=8b12268 a3=8b0a508 items=0 ppid=17568 pid=17579 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="touch" exe="/bin/touch" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=AVC msg=audit(1163779538.002:13674): avc: denied { lock } for pid=16476 comm="pam_timestamp_c" name="utmp" dev=dm-0 ino=14436583 scontext=staff_u:staff_r:pam_t:s0 tcontext=system_u:object_r:initrc_var_run_t:s0 tclass=file type=SYSCALL msg=audit(1163779538.002:13674): arch=40000003 syscall=221 success=yes exit=0 a0=3 a1=7 a2=bfded3d8 a3=0 items=0 ppid=16467 pid=16476 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=(none) comm="pam_timestamp_c" exe="/sbin/pam_timestamp_check" subj=staff_u:staff_r:pam_t:s0 key=(null) type=AVC_PATH msg=audit(1163779538.002:13674): path="/var/run/utmp" type=AVC msg=audit(1163779545.711:13675): avc: denied { write } for pid=15069 comm="vpnc" name="tun" dev=tmpfs ino=1473 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:tun_tap_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163779545.711:13675): arch=40000003 syscall=4 success=yes exit=40 a0=4 a1=805c570 a2=28 a3=bfd587e4 items=0 ppid=15067 pid=15069 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vpnc" exe="/usr/sbin/vpnc" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163779545.711:13675): path="/dev/net/tun" type=AVC msg=audit(1163779549.167:13676): avc: denied { read } for pid=15069 comm="vpnc" name="tun" dev=tmpfs ino=1473 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:tun_tap_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163779549.167:13676): arch=40000003 syscall=3 success=yes exit=52 a0=4 a1=805c5a0 a2=1000 a3=805c5a0 items=0 ppid=15067 pid=15069 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vpnc" exe="/usr/sbin/vpnc" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163779549.167:13676): path="/dev/net/tun" type=SELINUX_ERR msg=audit(1163779552.803:13677): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:rpm_script_t:s0 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=process type=SYSCALL msg=audit(1163779552.803:13677): arch=40000003 syscall=11 success=yes exit=0 a0=bf98abdf a1=bf989bf8 a2=9302858 a3=5 items=0 ppid=17597 pid=17604 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="autofs" exe="/bin/bash" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779552.835:13678): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=process type=SYSCALL msg=audit(1163779552.835:13678): arch=40000003 syscall=11 success=yes exit=0 a0=9996230 a1=9996398 a2=9997418 a3=99960d0 items=0 ppid=17604 pid=17605 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="basename" exe="/bin/basename" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=AVC msg=audit(1163779555.027:13679): avc: denied { execmem } for pid=17611 comm="gcj-dbtool" scontext=staff_u:sysadm_r:rpm_script_t:s0 tcontext=staff_u:sysadm_r:rpm_script_t:s0 tclass=process type=SYSCALL msg=audit(1163779555.027:13679): arch=40000003 syscall=192 success=yes exit=4096 a0=1000 a1=10000 a2=7 a3=22 items=0 ppid=17610 pid=17611 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="gcj-dbtool" exe="/usr/bin/gcj-dbtool" subj=staff_u:sysadm_r:rpm_script_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779566.768:13680): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:rpm_script_t:s0 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=process type=SYSCALL msg=audit(1163779566.768:13680): arch=40000003 syscall=11 success=yes exit=0 a0=bf9e5be1 a1=bf9e5458 a2=897c858 a3=5 items=0 ppid=17651 pid=17658 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="nscd" exe="/bin/bash" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779567.416:13681): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:rpm_script_t:s0 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=process type=SYSCALL msg=audit(1163779567.416:13681): arch=40000003 syscall=11 success=yes exit=0 a0=bfbc9be1 a1=bfbc8638 a2=95cb858 a3=5 items=0 ppid=17665 pid=17672 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="nscd" exe="/bin/bash" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=AVC msg=audit(1163779569.376:13682): avc: denied { read } for pid=16541 comm="firefox-bin" name="inotify" dev=inotifyfs ino=340 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:inotifyfs_t:s0 tclass=dir type=SYSCALL msg=audit(1163779569.376:13682): arch=40000003 syscall=3 success=yes exit=416 a0=21 a1=b3f42a8 a2=400 a3=400 items=0 ppid=1 pid=16541 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163779569.376:13682): path="inotify" type=SELINUX_ERR msg=audit(1163779592.862:13683): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:rpm_script_t:s0 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=process type=SYSCALL msg=audit(1163779592.862:13683): arch=40000003 syscall=11 success=yes exit=0 a0=8a13448 a1=8a122a8 a2=8a13468 a3=8a132e0 items=0 ppid=17723 pid=17724 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="rpcidmapd" exe="/bin/bash" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779592.910:13684): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=process type=SYSCALL msg=audit(1163779592.910:13684): arch=40000003 syscall=11 success=yes exit=0 a0=95b48e0 a1=95b5dc8 a2=95bfce8 a3=95b5f58 items=0 ppid=17724 pid=17729 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="rpcidmapd" exe="/bin/bash" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779592.930:13685): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=process type=SYSCALL msg=audit(1163779592.930:13685): arch=40000003 syscall=11 success=yes exit=0 a0=913feb8 a1=9149e98 a2=9149ce0 a3=913fe50 items=0 ppid=17729 pid=17734 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="rpcidmapd" exe="/bin/bash" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779592.950:13686): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:sbin_t:s0 tclass=process type=SYSCALL msg=audit(1163779592.950:13686): arch=40000003 syscall=11 success=yes exit=0 a0=87d3ea8 a1=87b71f8 a2=87d4f40 a3=87d45a8 items=0 ppid=17739 pid=17740 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="pidof" exe="/sbin/killall5" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779592.982:13687): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=process type=SYSCALL msg=audit(1163779592.982:13687): arch=40000003 syscall=11 success=yes exit=0 a0=87d4d18 a1=87d43e0 a2=87d4f40 a3=87d4e48 items=0 ppid=17734 pid=17741 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="usleep" exe="/bin/usleep" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779593.086:13688): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=process type=SYSCALL msg=audit(1163779593.086:13688): arch=40000003 syscall=11 success=yes exit=0 a0=87d3ac8 a1=87d46d8 a2=87d4f40 a3=87d3858 items=0 ppid=17734 pid=17742 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="rm" exe="/bin/rm" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779593.090:13689): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=process type=SYSCALL msg=audit(1163779593.090:13689): arch=40000003 syscall=11 success=yes exit=0 a0=87b9f10 a1=87d3790 a2=87d4f40 a3=87b9e18 items=0 ppid=17734 pid=17743 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="rm" exe="/bin/rm" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779593.094:13690): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=process type=SYSCALL msg=audit(1163779593.094:13690): arch=40000003 syscall=11 success=yes exit=0 a0=913e8c0 a1=913ff40 a2=9149ce0 a3=913fe10 items=0 ppid=17729 pid=17744 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="rpcidmapd" exe="/bin/bash" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779593.114:13691): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:sbin_t:s0 tclass=process type=SYSCALL msg=audit(1163779593.114:13691): arch=40000003 syscall=11 success=yes exit=0 a0=995b9a8 a1=9973250 a2=9963ce0 a3=99727a8 items=0 ppid=17749 pid=17750 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="pidof" exe="/sbin/killall5" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779593.142:13692): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:sbin_t:s0 tclass=process type=SYSCALL msg=audit(1163779593.142:13692): arch=40000003 syscall=11 success=yes exit=0 a0=9972c48 a1=9972f20 a2=9963ce0 a3=99727a8 items=0 ppid=17749 pid=17751 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="pidof" exe="/sbin/killall5" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779593.162:13693): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=process type=SYSCALL msg=audit(1163779593.162:13693): arch=40000003 syscall=11 success=yes exit=0 a0=995a0e0 a1=995c588 a2=9963ce0 a3=995a010 items=0 ppid=17744 pid=17752 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="rm" exe="/bin/rm" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779593.194:13694): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:sbin_t:s0 tclass=process type=SELINUX_ERR msg=audit(1163779593.194:13695): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=process type=SYSCALL msg=audit(1163779593.194:13695): arch=40000003 syscall=11 success=yes exit=0 a0=995a178 a1=995a2a0 a2=9963ce0 a3=995a148 items=0 ppid=17744 pid=17754 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="grep" exe="/bin/grep" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SYSCALL msg=audit(1163779593.194:13694): arch=40000003 syscall=11 success=yes exit=0 a0=9971898 a1=995a2a0 a2=9963ce0 a3=995a158 items=0 ppid=17744 pid=17753 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="lsmod" exe="/sbin/lsmod" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779593.238:13696): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=process type=SYSCALL msg=audit(1163779593.238:13696): arch=40000003 syscall=11 success=yes exit=0 a0=995a5c8 a1=99573d0 a2=9963ce0 a3=995a0e0 items=0 ppid=17755 pid=17756 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="grep" exe="/bin/grep" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779593.238:13697): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=process type=SYSCALL msg=audit(1163779593.238:13697): arch=40000003 syscall=11 success=yes exit=0 a0=9957450 a1=995a2a0 a2=9963ce0 a3=995a270 items=0 ppid=17755 pid=17757 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="awk" exe="/bin/gawk" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779593.274:13698): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:shell_exec_t:s0 tclass=process type=SYSCALL msg=audit(1163779593.274:13698): arch=40000003 syscall=11 success=yes exit=0 a0=9974368 a1=9959fe0 a2=9963ce0 a3=9973168 items=0 ppid=17744 pid=17758 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="bash" exe="/bin/bash" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779593.278:13699): security_compute_sid: invalid context staff_u:system_r:rpcd_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:rpcd_exec_t:s0 tclass=process type=AVC msg=audit(1163779593.278:13699): avc: denied { transition } for pid=17759 comm="bash" name="rpc.idmapd" dev=dm-0 ino=10327370 scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=staff_u:system_r:rpcd_t:s0 tclass=process type=SYSCALL msg=audit(1163779593.278:13699): arch=40000003 syscall=11 success=yes exit=0 a0=8110c08 a1=8110f38 a2=8110e08 a3=8110880 items=0 ppid=17758 pid=17759 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="rpc.idmapd" exe="/usr/sbin/rpc.idmapd" subj=staff_u:system_r:rpcd_t:s0 key=(null) type=AVC_PATH msg=audit(1163779593.278:13699): path="/usr/sbin/rpc.idmapd" type=SELINUX_ERR msg=audit(1163779593.398:13700): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=process type=SYSCALL msg=audit(1163779593.398:13700): arch=40000003 syscall=11 success=yes exit=0 a0=995a1f8 a1=9973848 a2=9963ce0 a3=9959e18 items=0 ppid=17744 pid=17761 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="touch" exe="/bin/touch" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779593.410:13701): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:rpm_script_t:s0 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=process type=SYSCALL msg=audit(1163779593.410:13701): arch=40000003 syscall=11 success=yes exit=0 a0=8a13448 a1=8a13248 a2=8a13468 a3=8a131c0 items=0 ppid=17723 pid=17762 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="rpcgssd" exe="/bin/bash" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779593.474:13702): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:rpm_script_t:s0 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=process type=SYSCALL msg=audit(1163779593.474:13702): arch=40000003 syscall=11 success=yes exit=0 a0=8a13448 a1=8a132e0 a2=8a13468 a3=8a13040 items=0 ppid=17723 pid=17767 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="nfs" exe="/bin/bash" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779593.530:13703): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:sbin_t:s0 tclass=process type=SYSCALL msg=audit(1163779593.530:13703): arch=40000003 syscall=11 success=yes exit=0 a0=9a13160 a1=99fc040 a2=9a03760 a3=9a12fb0 items=0 ppid=17767 pid=17773 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="service" exe="/bin/bash" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779593.550:13704): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=process type=SYSCALL msg=audit(1163779593.550:13704): arch=40000003 syscall=11 success=yes exit=0 a0=9824ce0 a1=983a920 a2=98257f8 a3=983a758 items=0 ppid=17773 pid=17778 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="basename" exe="/bin/basename" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779593.554:13705): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=process type=SYSCALL msg=audit(1163779593.554:13705): arch=40000003 syscall=11 success=yes exit=0 a0=9824d10 a1=983a8c0 a2=98257f8 a3=9824b78 items=0 ppid=17773 pid=17779 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="basename" exe="/bin/basename" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779593.558:13706): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=process type=SYSCALL msg=audit(1163779593.558:13706): arch=40000003 syscall=11 success=yes exit=0 a0=9822138 a1=9833288 a2=98257f8 a3=9822188 items=0 ppid=17773 pid=17780 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="env" exe="/bin/env" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779593.558:13707): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=process type=SYSCALL msg=audit(1163779593.558:13707): arch=40000003 syscall=11 success=yes exit=0 a0=bfe4fbdb a1=bfe4e8b8 a2=94d1858 a3=5 items=0 ppid=17773 pid=17780 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="rpcsvcgssd" exe="/bin/bash" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779594.434:13708): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:rpm_script_t:s0 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=process type=SYSCALL msg=audit(1163779594.434:13708): arch=40000003 syscall=11 success=yes exit=0 a0=957f448 a1=957e2a8 a2=957f468 a3=957f2e0 items=0 ppid=17786 pid=17787 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="rpcidmapd" exe="/bin/bash" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779594.454:13709): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=process type=SYSCALL msg=audit(1163779594.454:13709): arch=40000003 syscall=11 success=yes exit=0 a0=9a7c8e0 a1=9a7ddc8 a2=9a87ce8 a3=9a7df58 items=0 ppid=17787 pid=17792 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="rpcidmapd" exe="/bin/bash" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779594.474:13710): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=process type=SYSCALL msg=audit(1163779594.474:13710): arch=40000003 syscall=11 success=yes exit=0 a0=9df9eb8 a1=9e03e98 a2=9e03ce0 a3=9df9e50 items=0 ppid=17792 pid=17797 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="rpcidmapd" exe="/bin/bash" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779594.498:13711): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:sbin_t:s0 tclass=process type=SYSCALL msg=audit(1163779594.498:13711): arch=40000003 syscall=11 success=yes exit=0 a0=985eea8 a1=98421f8 a2=985ff40 a3=985f5a8 items=0 ppid=17802 pid=17803 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="pidof" exe="/sbin/killall5" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779594.522:13712): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=process type=SYSCALL msg=audit(1163779594.522:13712): arch=40000003 syscall=11 success=yes exit=0 a0=985fd18 a1=985f3e0 a2=985ff40 a3=985fe48 items=0 ppid=17797 pid=17804 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="usleep" exe="/bin/usleep" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779594.630:13713): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=process type=SYSCALL msg=audit(1163779594.630:13713): arch=40000003 syscall=11 success=yes exit=0 a0=985eac8 a1=985f6d8 a2=985ff40 a3=985e858 items=0 ppid=17797 pid=17805 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="rm" exe="/bin/rm" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779594.634:13714): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=process type=SYSCALL msg=audit(1163779594.634:13714): arch=40000003 syscall=11 success=yes exit=0 a0=9844f10 a1=985e790 a2=985ff40 a3=9844e18 items=0 ppid=17797 pid=17806 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="rm" exe="/bin/rm" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779594.638:13715): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=process type=SYSCALL msg=audit(1163779594.638:13715): arch=40000003 syscall=11 success=yes exit=0 a0=9df88c0 a1=9df9f40 a2=9e03ce0 a3=9df9e10 items=0 ppid=17792 pid=17807 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="rpcidmapd" exe="/bin/bash" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779594.658:13716): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:sbin_t:s0 tclass=process type=SYSCALL msg=audit(1163779594.658:13716): arch=40000003 syscall=11 success=yes exit=0 a0=929c9a8 a1=92b4250 a2=92a4ce0 a3=92b37a8 items=0 ppid=17812 pid=17813 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="pidof" exe="/sbin/killall5" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779594.682:13717): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:sbin_t:s0 tclass=process type=SYSCALL msg=audit(1163779594.682:13717): arch=40000003 syscall=11 success=yes exit=0 a0=92b3c48 a1=92b3f20 a2=92a4ce0 a3=92b37a8 items=0 ppid=17812 pid=17814 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="pidof" exe="/sbin/killall5" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779594.702:13718): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=process type=SYSCALL msg=audit(1163779594.702:13718): arch=40000003 syscall=11 success=yes exit=0 a0=929b0e0 a1=929d588 a2=92a4ce0 a3=929b010 items=0 ppid=17807 pid=17815 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="rm" exe="/bin/rm" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779594.706:13719): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:sbin_t:s0 tclass=process type=SYSCALL msg=audit(1163779594.706:13719): arch=40000003 syscall=11 success=yes exit=0 a0=92b2898 a1=929b2a0 a2=92a4ce0 a3=929b158 items=0 ppid=17807 pid=17816 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="lsmod" exe="/sbin/lsmod" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779594.706:13720): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=process type=SYSCALL msg=audit(1163779594.706:13720): arch=40000003 syscall=11 success=yes exit=0 a0=929b178 a1=929b2a0 a2=92a4ce0 a3=929b148 items=0 ppid=17807 pid=17817 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="grep" exe="/bin/grep" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779594.714:13721): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=process type=SYSCALL msg=audit(1163779594.714:13721): arch=40000003 syscall=11 success=yes exit=0 a0=929b5c8 a1=92983d0 a2=92a4ce0 a3=929b0e0 items=0 ppid=17818 pid=17819 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="grep" exe="/bin/grep" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779594.714:13722): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=process type=SYSCALL msg=audit(1163779594.714:13722): arch=40000003 syscall=11 success=yes exit=0 a0=9298450 a1=929b2a0 a2=92a4ce0 a3=929b270 items=0 ppid=17818 pid=17820 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="awk" exe="/bin/gawk" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779594.722:13723): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:shell_exec_t:s0 tclass=process type=SYSCALL msg=audit(1163779594.722:13723): arch=40000003 syscall=11 success=yes exit=0 a0=92b5368 a1=929afe0 a2=92a4ce0 a3=92b4168 items=0 ppid=17807 pid=17821 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="bash" exe="/bin/bash" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779594.726:13724): security_compute_sid: invalid context staff_u:system_r:rpcd_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:rpcd_exec_t:s0 tclass=process type=SYSCALL msg=audit(1163779594.726:13724): arch=40000003 syscall=11 success=yes exit=0 a0=9628c08 a1=9628f38 a2=9628e08 a3=9628880 items=0 ppid=17821 pid=17822 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="rpc.idmapd" exe="/usr/sbin/rpc.idmapd" subj=staff_u:system_r:rpcd_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779594.734:13725): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=process type=SYSCALL msg=audit(1163779594.734:13725): arch=40000003 syscall=11 success=yes exit=0 a0=929b1f8 a1=92b4848 a2=92a4ce0 a3=929ae18 items=0 ppid=17807 pid=17824 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="touch" exe="/bin/touch" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779594.742:13726): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:rpm_script_t:s0 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=process type=SYSCALL msg=audit(1163779594.742:13726): arch=40000003 syscall=11 success=yes exit=0 a0=957f448 a1=957f248 a2=957f468 a3=957f1c0 items=0 ppid=17786 pid=17825 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="rpcgssd" exe="/bin/bash" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779594.762:13727): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:rpm_script_t:s0 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=process type=SYSCALL msg=audit(1163779594.762:13727): arch=40000003 syscall=11 success=yes exit=0 a0=957f448 a1=957f2e0 a2=957f468 a3=957f040 items=0 ppid=17786 pid=17830 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="nfs" exe="/bin/bash" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779594.782:13728): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:sbin_t:s0 tclass=process type=SYSCALL msg=audit(1163779594.782:13728): arch=40000003 syscall=11 success=yes exit=0 a0=9393160 a1=937c040 a2=9383760 a3=9392fb0 items=0 ppid=17830 pid=17836 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="service" exe="/bin/bash" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779594.802:13729): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=process type=SYSCALL msg=audit(1163779594.802:13729): arch=40000003 syscall=11 success=yes exit=0 a0=8dacce0 a1=8dc2920 a2=8dad7f8 a3=8dc2758 items=0 ppid=17836 pid=17841 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="basename" exe="/bin/basename" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779594.806:13730): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=process type=SYSCALL msg=audit(1163779594.806:13730): arch=40000003 syscall=11 success=yes exit=0 a0=8dacd10 a1=8dc28c0 a2=8dad7f8 a3=8dacb78 items=0 ppid=17836 pid=17842 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="basename" exe="/bin/basename" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779594.810:13731): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=process type=SYSCALL msg=audit(1163779594.810:13731): arch=40000003 syscall=11 success=yes exit=0 a0=8daa138 a1=8dbb288 a2=8dad7f8 a3=8daa188 items=0 ppid=17836 pid=17843 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="env" exe="/bin/env" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779594.814:13732): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=process type=SYSCALL msg=audit(1163779594.814:13732): arch=40000003 syscall=11 success=yes exit=0 a0=bff4abdb a1=bff491b8 a2=996b858 a3=5 items=0 ppid=17836 pid=17843 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="rpcsvcgssd" exe="/bin/bash" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=AVC msg=audit(1163779597.918:13733): avc: denied { read } for pid=15069 comm="vpnc" name="tun" dev=tmpfs ino=1473 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:tun_tap_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163779597.918:13733): arch=40000003 syscall=3 success=yes exit=52 a0=4 a1=805c5a0 a2=1000 a3=805c5a0 items=0 ppid=15067 pid=15069 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vpnc" exe="/usr/sbin/vpnc" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163779597.918:13733): path="/dev/net/tun" type=AVC msg=audit(1163779597.946:13734): avc: denied { write } for pid=15069 comm="vpnc" name="tun" dev=tmpfs ino=1473 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:tun_tap_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163779597.946:13734): arch=40000003 syscall=4 success=yes exit=40 a0=4 a1=805c570 a2=28 a3=bfd587e4 items=0 ppid=15067 pid=15069 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vpnc" exe="/usr/sbin/vpnc" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163779597.946:13734): path="/dev/net/tun" type=USER_ACCT msg=audit(1163779801.843:13735): user pid=17860 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1163779801.843:13736): login pid=17860 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1163779801.855:13737): user pid=17860 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1163779801.855:13738): user pid=17860 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1163779801.883:13739): avc: denied { execute } for pid=17861 comm="sh" name="sa1" dev=dm-0 ino=12865251 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:lib_t:s0 tclass=file type=AVC msg=audit(1163779801.883:13739): avc: denied { execute_no_trans } for pid=17861 comm="sh" name="sa1" dev=dm-0 ino=12865251 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1163779801.883:13739): arch=40000003 syscall=11 success=yes exit=0 a0=8ed81b0 a1=8ed8358 a2=8ed8290 a3=8ed8008 items=0 ppid=17860 pid=17861 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sa1" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163779801.883:13739): path="/usr/lib/sa/sa1" type=AVC msg=audit(1163779801.887:13740): avc: denied { execute } for pid=17861 comm="sa1" name="sadc" dev=dm-0 ino=12865253 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=AVC msg=audit(1163779801.887:13740): avc: denied { execute_no_trans } for pid=17861 comm="sa1" name="sadc" dev=dm-0 ino=12865253 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=AVC msg=audit(1163779801.887:13740): avc: denied { read } for pid=17861 comm="sa1" name="sadc" dev=dm-0 ino=12865253 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163779801.887:13740): arch=40000003 syscall=11 success=yes exit=0 a0=87ead48 a1=87ea740 a2=87ead60 a3=87ea740 items=0 ppid=17860 pid=17861 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163779801.887:13740): path="/usr/lib/sa/sadc" type=AVC_PATH msg=audit(1163779801.887:13740): path="/usr/lib/sa/sadc" type=AVC msg=audit(1163779801.891:13741): avc: denied { search } for pid=17861 comm="sadc" name="net" dev=proc ino=-268435432 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=dir type=AVC msg=audit(1163779801.891:13741): avc: denied { read } for pid=17861 comm="sadc" name="dev" dev=proc ino=-268434164 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=file type=SYSCALL msg=audit(1163779801.891:13741): arch=40000003 syscall=5 success=yes exit=3 a0=80502e1 a1=0 a2=1b6 a3=99be7f8 items=0 ppid=17860 pid=17861 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163779801.891:13742): avc: denied { getattr } for pid=17861 comm="sadc" name="dev" dev=proc ino=-268434164 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=file type=SYSCALL msg=audit(1163779801.891:13742): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bfff9928 a2=362ff4 a3=99be7f8 items=0 ppid=17860 pid=17861 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163779801.891:13742): path="/proc/net/dev" type=AVC msg=audit(1163779801.891:13743): avc: denied { search } for pid=17861 comm="sadc" name="sa" dev=dm-0 ino=14607631 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=dir type=SYSCALL msg=audit(1163779801.891:13743): arch=40000003 syscall=33 success=yes exit=0 a0=bfff9cd4 a1=0 a2=bfff9bc8 a3=bfff9bd0 items=0 ppid=17860 pid=17861 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163779801.919:13744): avc: denied { read append } for pid=17861 comm="sadc" name="sa17" dev=dm-0 ino=14600257 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=file type=SYSCALL msg=audit(1163779801.919:13744): arch=40000003 syscall=5 success=yes exit=3 a0=bfff9cd4 a1=402 a2=bfff9e98 a3=bfff9bd0 items=0 ppid=17860 pid=17861 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163779801.931:13745): avc: denied { search } for pid=17861 comm="sadc" name="fs" dev=proc ino=-268435428 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=dir type=AVC msg=audit(1163779801.931:13745): avc: denied { read } for pid=17861 comm="sadc" name="dentry-state" dev=proc ino=-268435230 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=file type=SYSCALL msg=audit(1163779801.931:13745): arch=40000003 syscall=5 success=yes exit=4 a0=80502ef a1=0 a2=1b6 a3=99bf348 items=0 ppid=17860 pid=17861 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163779801.931:13746): avc: denied { getattr } for pid=17861 comm="sadc" name="dentry-state" dev=proc ino=-268435230 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=file type=SYSCALL msg=audit(1163779801.931:13746): arch=40000003 syscall=197 success=yes exit=0 a0=4 a1=bfff9780 a2=362ff4 a3=99bf348 items=0 ppid=17860 pid=17861 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163779801.931:13746): path="/proc/sys/fs/dentry-state" type=AVC msg=audit(1163779801.931:13747): avc: denied { search } for pid=17861 comm="sadc" name="rpc" dev=proc ino=-268433616 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_rpc_t:s0 tclass=dir type=SYSCALL msg=audit(1163779801.931:13747): arch=40000003 syscall=5 success=no exit=-2 a0=8050215 a1=0 a2=1b6 a3=99bf348 items=0 ppid=17860 pid=17861 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163779801.931:13748): avc: denied { lock } for pid=17861 comm="sadc" name="sa17" dev=dm-0 ino=14600257 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=file type=SYSCALL msg=audit(1163779801.931:13748): arch=40000003 syscall=143 success=yes exit=0 a0=3 a1=6 a2=bfff9bd0 a3=3 items=0 ppid=17860 pid=17861 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163779801.931:13748): path="/var/log/sa/sa17" type=CRED_DISP msg=audit(1163779801.951:13749): user pid=17860 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1163779801.951:13750): user pid=17860 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1163779805.239:13751): avc: denied { getattr } for pid=17403 comm="setroubleshootd" name="net" dev=proc ino=-268435432 scontext=staff_u:system_r:setroubleshootd_t:s0 tcontext=system_u:object_r:proc_net_t:s0 tclass=dir type=SYSCALL msg=audit(1163779805.239:13751): arch=40000003 syscall=195 success=yes exit=0 a0=b79fc1d0 a1=b79fc214 a2=582ff4 a3=b79fc1d9 items=0 ppid=1 pid=17403 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="setroubleshootd" exe="/usr/bin/python" subj=staff_u:system_r:setroubleshootd_t:s0 key=(null) type=AVC_PATH msg=audit(1163779805.239:13751): path="/proc/net" type=AVC msg=audit(1163779929.135:13752): avc: denied { getattr } for pid=6659 comm="dbus-daemon" name="/" dev=dm-0 ino=2 scontext=staff_u:staff_r:staff_dbusd_t:s0 tcontext=system_u:object_r:fs_t:s0 tclass=filesystem type=SYSCALL msg=audit(1163779929.135:13752): arch=40000003 syscall=100 success=yes exit=0 a0=18 a1=bfcd52ac a2=c4eff4 a3=ffffffb8 items=0 ppid=1 pid=6659 auid=500 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) comm="dbus-daemon" exe="/bin/dbus-daemon" subj=staff_u:staff_r:staff_dbusd_t:s0 key=(null) type=USER_ACCT msg=audit(1163780401.988:13753): user pid=17893 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1163780401.992:13754): login pid=17893 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1163780401.992:13755): user pid=17893 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1163780401.992:13756): user pid=17893 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1163780402.000:13757): avc: denied { execute } for pid=17894 comm="sa1" name="sadc" dev=dm-0 ino=12865253 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=AVC msg=audit(1163780402.000:13757): avc: denied { execute_no_trans } for pid=17894 comm="sa1" name="sadc" dev=dm-0 ino=12865253 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=AVC msg=audit(1163780402.000:13757): avc: denied { read } for pid=17894 comm="sa1" name="sadc" dev=dm-0 ino=12865253 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163780402.000:13757): arch=40000003 syscall=11 success=yes exit=0 a0=8695d48 a1=8695740 a2=8695d60 a3=8695740 items=0 ppid=17893 pid=17894 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163780402.000:13757): path="/usr/lib/sa/sadc" type=AVC_PATH msg=audit(1163780402.000:13757): path="/usr/lib/sa/sadc" type=AVC msg=audit(1163780402.004:13758): avc: denied { search } for pid=17894 comm="sadc" name="sa" dev=dm-0 ino=14607631 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=dir type=SYSCALL msg=audit(1163780402.004:13758): arch=40000003 syscall=33 success=yes exit=0 a0=bfd52a24 a1=0 a2=bfd52918 a3=bfd52920 items=0 ppid=17893 pid=17894 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163780402.004:13759): avc: denied { read append } for pid=17894 comm="sadc" name="sa17" dev=dm-0 ino=14600257 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=file type=SYSCALL msg=audit(1163780402.004:13759): arch=40000003 syscall=5 success=yes exit=3 a0=bfd52a24 a1=402 a2=bfd52be8 a3=bfd52920 items=0 ppid=17893 pid=17894 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163780402.004:13760): avc: denied { lock } for pid=17894 comm="sadc" name="sa17" dev=dm-0 ino=14600257 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=file type=SYSCALL msg=audit(1163780402.004:13760): arch=40000003 syscall=143 success=yes exit=0 a0=3 a1=6 a2=bfd52920 a3=3 items=0 ppid=17893 pid=17894 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163780402.004:13760): path="/var/log/sa/sa17" type=CRED_DISP msg=audit(1163780402.044:13761): user pid=17893 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1163780402.044:13762): user pid=17893 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1163780530.068:13763): avc: denied { execute } for pid=16541 comm="firefox-bin" name="libflashplayer.so" dev=dm-0 ino=6547382 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_mozilla_home_t:s0 tclass=file type=SYSCALL msg=audit(1163780530.068:13763): arch=40000003 syscall=192 success=yes exit=62861312 a0=0 a1=738dbc a2=5 a3=802 items=0 ppid=1 pid=16541 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163780530.068:13763): path="/home/kmacmill/.mozilla/plugins/libflashplayer.so" type=AVC msg=audit(1163780530.392:13764): avc: denied { read } for pid=16541 comm="firefox-bin" name=".gdm0UWNIT" dev=dm-0 ino=14469400 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163780530.392:13764): arch=40000003 syscall=33 success=yes exit=0 a0=bfad6fcb a1=4 a2=33ea64 a3=bfad6fcb items=0 ppid=1 pid=16541 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163780530.392:13765): avc: denied { getattr } for pid=16541 comm="firefox-bin" name=".gdm0UWNIT" dev=dm-0 ino=14469400 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163780530.392:13765): arch=40000003 syscall=197 success=yes exit=0 a0=46 a1=bfad161c a2=10b0ff4 a3=ae80638 items=0 ppid=1 pid=16541 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163780530.392:13765): path="/tmp/.gdm0UWNIT" type=USER_ACCT msg=audit(1163781001.082:13766): user pid=17945 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1163781001.082:13767): login pid=17945 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1163781001.086:13768): user pid=17945 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1163781001.086:13769): user pid=17945 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1163781001.106:13770): user pid=17945 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1163781001.106:13771): user pid=17945 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1163781601.151:13772): user pid=17971 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1163781601.151:13773): login pid=17971 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1163781601.151:13774): user pid=17971 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1163781601.151:13775): user pid=17971 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1163781601.167:13776): user pid=17971 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1163781601.167:13777): user pid=17971 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1163782201.209:13778): user pid=17995 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1163782201.209:13779): login pid=17995 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1163782201.209:13780): user pid=17995 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1163782201.209:13781): user pid=17995 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1163782201.253:13782): user pid=17995 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1163782201.257:13783): user pid=17995 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1163782454.417:13784): avc: denied { read } for pid=18033 comm="mozilla-xremote" name=".gdm0UWNIT" dev=dm-0 ino=14469400 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163782454.417:13784): arch=40000003 syscall=33 success=yes exit=0 a0=bfb38f92 a1=4 a2=da3a64 a3=bfb38f92 items=0 ppid=18032 pid=18033 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="mozilla-xremote" exe="/usr/lib/firefox-2.0/mozilla-xremote-client" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163782663.570:13785): avc: denied { execute } for pid=18047 comm="firefox-bin" name="evolution-2.10" dev=dm-0 ino=10329292 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:evolution_exec_t:s0 tclass=file type=AVC msg=audit(1163782663.570:13785): avc: denied { execute_no_trans } for pid=18047 comm="firefox-bin" name="evolution-2.10" dev=dm-0 ino=10329292 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:evolution_exec_t:s0 tclass=file type=AVC msg=audit(1163782663.570:13785): avc: denied { read } for pid=18047 comm="firefox-bin" name="evolution-2.10" dev=dm-0 ino=10329292 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:evolution_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163782663.570:13785): arch=40000003 syscall=11 success=yes exit=0 a0=c32dc7c a1=c32d998 a2=97fc2c0 a3=bfad6d95 items=0 ppid=1 pid=18047 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163782663.570:13785): path="/usr/bin/evolution-2.10" type=AVC_PATH msg=audit(1163782663.570:13785): path="/usr/bin/evolution-2.10" type=AVC msg=audit(1163782664.558:13786): avc: denied { search } for pid=18047 comm="evolution" name=".ICE-unix" dev=dm-0 ino=14567572 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:ice_tmp_t:s0 tclass=dir type=AVC msg=audit(1163782664.558:13786): avc: denied { write } for pid=18047 comm="evolution" name="15931" dev=dm-0 ino=14567724 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:ice_tmp_t:s0 tclass=sock_file type=SYSCALL msg=audit(1163782664.558:13786): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=bffbc6c0 a2=df7770 a3=16 items=0 ppid=1 pid=18047 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163782664.558:13787): avc: denied { read } for pid=18047 comm="evolution" name=".ICEauthority" dev=dm-0 ino=6574784 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163782664.558:13787): arch=40000003 syscall=33 success=yes exit=0 a0=8aee240 a1=4 a2=df7770 a3=8aee240 items=0 ppid=1 pid=18047 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163782664.582:13788): avc: denied { getattr } for pid=18047 comm="evolution" name=".ICEauthority" dev=dm-0 ino=6574784 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163782664.582:13788): arch=40000003 syscall=197 success=yes exit=0 a0=b a1=bffbc75c a2=758aff4 a3=8aeeb30 items=0 ppid=1 pid=18047 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163782664.582:13788): path="/home/kmacmill/.ICEauthority" type=AVC msg=audit(1163782667.450:13789): avc: denied { write } for pid=18051 comm="evolution-data-" name="[214240]" dev=pipefs ino=214240 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=fifo_file type=SYSCALL msg=audit(1163782667.450:13789): arch=40000003 syscall=11 success=yes exit=0 a0=9770f60 a1=9771230 a2=9771248 a3=0 items=0 ppid=1 pid=18051 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC_PATH msg=audit(1163782667.450:13789): path="pipe:[214240]" type=AVC msg=audit(1163782667.626:13790): avc: denied { read } for pid=18051 comm="evolution-data-" name="gconv-modules.cache" dev=dm-0 ino=10386358 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1163782667.626:13790): arch=40000003 syscall=5 success=yes exit=3 a0=57eb3c a1=0 a2=0 a3=0 items=0 ppid=1 pid=18051 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC msg=audit(1163782667.626:13791): avc: denied { getattr } for pid=18051 comm="evolution-data-" name="gconv-modules.cache" dev=dm-0 ino=10386358 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1163782667.626:13791): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bf806754 a2=595ff4 a3=3 items=0 ppid=1 pid=18051 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC_PATH msg=audit(1163782667.626:13791): path="/usr/lib/gconv/gconv-modules.cache" type=AVC msg=audit(1163782667.626:13792): avc: denied { getsched } for pid=18051 comm="evolution-data-" scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:staff_r:staff_evolution_server_t:s0 tclass=process type=SYSCALL msg=audit(1163782667.626:13792): arch=40000003 syscall=155 success=yes exit=0 a0=4683 a1=b7f228dc a2=19bff4 a3=b7f226d0 items=0 ppid=1 pid=18051 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC msg=audit(1163782667.626:13793): avc: denied { search } for pid=18051 comm="evolution-data-" name="locale" dev=dm-0 ino=10311905 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=dir type=AVC msg=audit(1163782667.626:13793): avc: denied { read } for pid=18051 comm="evolution-data-" name="locale.alias" dev=dm-0 ino=10314034 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1163782667.626:13793): arch=40000003 syscall=5 success=yes exit=3 a0=40484c a1=8000 a2=1b6 a3=9604200 items=0 ppid=1 pid=18051 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC msg=audit(1163782667.626:13794): avc: denied { getattr } for pid=18051 comm="evolution-data-" name="locale.alias" dev=dm-0 ino=10314034 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1163782667.626:13794): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bf806d68 a2=595ff4 a3=9604200 items=0 ppid=1 pid=18051 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC_PATH msg=audit(1163782667.626:13794): path="/usr/share/locale/locale.alias" type=AVC msg=audit(1163782667.630:13795): avc: denied { read } for pid=18051 comm="evolution-data-" name="locale-archive" dev=dm-0 ino=11588566 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1163782667.630:13795): arch=40000003 syscall=5 success=yes exit=3 a0=57eb60 a1=8000 a2=1 a3=bf806c50 items=0 ppid=1 pid=18051 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC msg=audit(1163782667.630:13796): avc: denied { getattr } for pid=18051 comm="evolution-data-" name="locale-archive" dev=dm-0 ino=11588566 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1163782667.630:13796): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=596aa0 a2=595ff4 a3=bf806c50 items=0 ppid=1 pid=18051 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC_PATH msg=audit(1163782667.630:13796): path="/usr/lib/locale/locale-archive" type=AVC msg=audit(1163782667.630:13797): avc: denied { read } for pid=18051 comm="evolution-data-" name="tmp" dev=dm-0 ino=14469313 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=system_u:object_r:tmp_t:s0 tclass=dir type=SYSCALL msg=audit(1163782667.630:13797): arch=40000003 syscall=5 success=yes exit=9 a0=960a958 a1=18800 a2=abafc0 a3=960a958 items=0 ppid=1 pid=18051 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC msg=audit(1163782667.630:13798): avc: denied { getattr } for pid=18051 comm="evolution-data-" name="tmp" dev=dm-0 ino=14469313 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=system_u:object_r:tmp_t:s0 tclass=dir type=SYSCALL msg=audit(1163782667.630:13798): arch=40000003 syscall=197 success=yes exit=0 a0=9 a1=bf806d6c a2=595ff4 a3=9 items=0 ppid=1 pid=18051 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC_PATH msg=audit(1163782667.630:13798): path="/tmp" type=AVC msg=audit(1163782667.630:13799): avc: denied { search } for pid=18051 comm="evolution-data-" name="tmp" dev=dm-0 ino=14469313 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=system_u:object_r:tmp_t:s0 tclass=dir type=AVC msg=audit(1163782667.630:13799): avc: denied { getattr } for pid=18051 comm="evolution-data-" name="orbit-kmacmill" dev=dm-0 ino=14567718 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=dir type=SYSCALL msg=audit(1163782667.630:13799): arch=40000003 syscall=195 success=yes exit=0 a0=960c660 a1=bf806dac a2=595ff4 a3=bf806dac items=0 ppid=1 pid=18051 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC_PATH msg=audit(1163782667.630:13799): path="/tmp/orbit-kmacmill" type=AVC msg=audit(1163782667.630:13800): avc: denied { setattr } for pid=18051 comm="evolution-data-" name="orbit-kmacmill" dev=dm-0 ino=14567718 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=dir type=SYSCALL msg=audit(1163782667.630:13800): arch=40000003 syscall=30 success=yes exit=0 a0=960c5d0 a1=bf806e04 a2=466ef80 a3=1f4 items=0 ppid=1 pid=18051 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC msg=audit(1163782667.630:13801): avc: denied { read } for pid=18051 comm="evolution-data-" name="urandom" dev=tmpfs ino=1972 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=system_u:object_r:urandom_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163782667.630:13801): arch=40000003 syscall=5 success=yes exit=9 a0=3d4880 a1=8000 a2=1b6 a3=960cfc0 items=0 ppid=1 pid=18051 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC msg=audit(1163782667.630:13802): avc: denied { getattr } for pid=18051 comm="evolution-data-" name="urandom" dev=tmpfs ino=1972 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=system_u:object_r:urandom_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163782667.630:13802): arch=40000003 syscall=197 success=yes exit=0 a0=9 a1=bf806d8c a2=595ff4 a3=960cfc0 items=0 ppid=1 pid=18051 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC_PATH msg=audit(1163782667.630:13802): path="/dev/urandom" type=AVC msg=audit(1163782667.630:13803): avc: denied { ioctl } for pid=18051 comm="evolution-data-" name="urandom" dev=tmpfs ino=1972 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=system_u:object_r:urandom_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163782667.630:13803): arch=40000003 syscall=54 success=no exit=-22 a0=9 a1=5401 a2=bf806cec a3=bf806d2c items=0 ppid=1 pid=18051 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC_PATH msg=audit(1163782667.630:13803): path="/dev/urandom" type=AVC msg=audit(1163782667.634:13804): avc: denied { search } for pid=18051 comm="evolution-data-" name="gconfd-kmacmill" dev=dm-0 ino=15648282 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=dir type=AVC msg=audit(1163782667.634:13804): avc: denied { read } for pid=18051 comm="evolution-data-" name="ior" dev=dm-0 ino=15647969 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163782667.634:13804): arch=40000003 syscall=5 success=yes exit=9 a0=960e8d8 a1=0 a2=1b6 a3=960e900 items=0 ppid=1 pid=18051 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC msg=audit(1163782667.634:13805): avc: denied { getattr } for pid=18051 comm="evolution-data-" name="ior" dev=dm-0 ino=15647969 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163782667.634:13805): arch=40000003 syscall=197 success=yes exit=0 a0=9 a1=bf806418 a2=595ff4 a3=960e900 items=0 ppid=1 pid=18051 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC_PATH msg=audit(1163782667.634:13805): path="/tmp/gconfd-kmacmill/lock/ior" type=AVC msg=audit(1163782667.634:13806): avc: denied { write } for pid=18051 comm="evolution-data-" name="linc-4651-0-23d6c771c010d" dev=dm-0 ino=14568138 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=sock_file type=AVC msg=audit(1163782667.634:13806): avc: denied { connectto } for pid=18051 comm="evolution-data-" name="linc-4651-0-23d6c771c010d" scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=unix_stream_socket type=SYSCALL msg=audit(1163782667.634:13806): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=bf806b30 a2=466ef80 a3=0 items=0 ppid=1 pid=18051 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC_PATH msg=audit(1163782667.634:13806): path="/tmp/orbit-kmacmill/linc-4651-0-23d6c771c010d" type=AVC msg=audit(1163782667.634:13807): avc: denied { write } for pid=18051 comm="evolution-data-" name="orbit-kmacmill" dev=dm-0 ino=14567718 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=dir type=AVC msg=audit(1163782667.634:13807): avc: denied { add_name } for pid=18051 comm="evolution-data-" name="linc-4683-0-7ad019c79b7ca" scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=dir type=AVC msg=audit(1163782667.634:13807): avc: denied { create } for pid=18051 comm="evolution-data-" name="linc-4683-0-7ad019c79b7ca" scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=sock_file type=SYSCALL msg=audit(1163782667.634:13807): arch=40000003 syscall=102 success=yes exit=0 a0=2 a1=bf806b70 a2=466ef80 a3=b7f2269c items=0 ppid=1 pid=18051 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC msg=audit(1163782667.634:13808): avc: denied { connectto } for pid=18001 comm="gconfd-2" name="linc-4683-0-7ad019c79b7ca" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_evolution_server_t:s0 tclass=unix_stream_socket type=SYSCALL msg=audit(1163782667.634:13808): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=bfa7bbc0 a2=466ef80 a3=0 items=0 ppid=1 pid=18001 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163782667.634:13808): path="/tmp/orbit-kmacmill/linc-4683-0-7ad019c79b7ca" type=AVC msg=audit(1163782667.782:13809): avc: denied { write } for pid=18051 comm="evolution-data-" name="bonobo-activation-register.lock" dev=dm-0 ino=14567728 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163782667.782:13809): arch=40000003 syscall=5 success=yes exit=16 a0=9614048 a1=42 a2=1c0 a3=9614048 items=0 ppid=1 pid=18051 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC msg=audit(1163782667.782:13810): avc: denied { lock } for pid=18051 comm="evolution-data-" name="bonobo-activation-register.lock" dev=dm-0 ino=14567728 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163782667.782:13810): arch=40000003 syscall=221 success=yes exit=0 a0=10 a1=7 a2=bf806dcc a3=bf806dcc items=0 ppid=1 pid=18051 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC_PATH msg=audit(1163782667.782:13810): path="/tmp/orbit-kmacmill/bonobo-activation-register.lock" type=AVC msg=audit(1163782667.866:13811): avc: denied { getattr } for pid=18051 comm="evolution-data-" name="[214240]" dev=pipefs ino=214240 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=fifo_file type=SYSCALL msg=audit(1163782667.866:13811): arch=40000003 syscall=197 success=yes exit=0 a0=21 a1=bf806e04 a2=595ff4 a3=9621278 items=0 ppid=1 pid=18051 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC_PATH msg=audit(1163782667.866:13811): path="pipe:[214240]" type=AVC msg=audit(1163782667.866:13812): avc: denied { connectto } for pid=18047 comm="evolution" name="linc-4683-0-7ad019c79b7ca" scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_evolution_server_t:s0 tclass=unix_stream_socket type=SYSCALL msg=audit(1163782667.866:13812): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=bffbcb10 a2=466ef80 a3=0 items=0 ppid=1 pid=18047 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163782667.866:13812): path="/tmp/orbit-kmacmill/linc-4683-0-7ad019c79b7ca" type=AVC msg=audit(1163782668.126:13813): avc: denied { getattr } for pid=18047 comm="evolution" name=".evolution" dev=dm-0 ino=6776355 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_evolution_home_t:s0 tclass=dir type=SYSCALL msg=audit(1163782668.126:13813): arch=40000003 syscall=195 success=yes exit=0 a0=8ba8e80 a1=bffbc69c a2=758aff4 a3=4 items=0 ppid=1 pid=18047 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163782668.126:13813): path="/home/kmacmill/.evolution" type=AVC msg=audit(1163782668.126:13814): avc: denied { search } for pid=18047 comm="evolution" name=".evolution" dev=dm-0 ino=6776355 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_evolution_home_t:s0 tclass=dir type=SYSCALL msg=audit(1163782668.126:13814): arch=40000003 syscall=33 success=yes exit=0 a0=8ba8e80 a1=0 a2=bae708 a3=10 items=0 ppid=1 pid=18047 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163782668.506:13815): avc: denied { getattr } for pid=18047 comm="evolution" name="gtkrc-mail-fonts" dev=dm-0 ino=6814316 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_evolution_home_t:s0 tclass=file type=SYSCALL msg=audit(1163782668.506:13815): arch=40000003 syscall=196 success=yes exit=0 a0=8ba5e08 a1=bffbc98c a2=758aff4 a3=8b019c8 items=0 ppid=1 pid=18047 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163782668.506:13815): path="/home/kmacmill/.evolution/mail/config/gtkrc-mail-fonts" type=AVC msg=audit(1163782668.554:13816): avc: denied { read } for pid=18047 comm="evolution" name="gtkrc-mail-fonts" dev=dm-0 ino=6814316 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_evolution_home_t:s0 tclass=file type=SYSCALL msg=audit(1163782668.554:13816): arch=40000003 syscall=5 success=yes exit=19 a0=8ba5e08 a1=8000 a2=0 a3=8000 items=0 ppid=1 pid=18047 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163782668.946:13817): avc: denied { write } for pid=18047 comm="evolution" name="cert8.db" dev=dm-0 ino=6778529 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_evolution_home_t:s0 tclass=file type=SYSCALL msg=audit(1163782668.946:13817): arch=40000003 syscall=5 success=yes exit=19 a0=8b990c0 a1=2 a2=180 a3=2 items=0 ppid=1 pid=18047 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163782669.114:13818): avc: denied { read } for pid=15069 comm="vpnc" name="tun" dev=tmpfs ino=1473 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:tun_tap_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163782669.114:13818): arch=40000003 syscall=3 success=yes exit=60 a0=4 a1=805c5a0 a2=1000 a3=805c5a0 items=0 ppid=15067 pid=15069 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vpnc" exe="/usr/sbin/vpnc" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163782669.114:13818): path="/dev/net/tun" type=AVC msg=audit(1163782669.218:13819): avc: denied { write } for pid=15069 comm="vpnc" name="tun" dev=tmpfs ino=1473 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:tun_tap_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163782669.218:13819): arch=40000003 syscall=4 success=yes exit=60 a0=4 a1=805c570 a2=3c a3=bfd587e4 items=0 ppid=15067 pid=15069 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vpnc" exe="/usr/sbin/vpnc" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163782669.218:13819): path="/dev/net/tun" type=AVC msg=audit(1163782670.122:13820): avc: denied { append } for pid=18056 comm="evolution" name="journal" dev=dm-0 ino=6782620 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_evolution_home_t:s0 tclass=file type=SYSCALL msg=audit(1163782670.122:13820): arch=40000003 syscall=5 success=yes exit=29 a0=8c039e0 a1=442 a2=1b6 a3=8c03c98 items=0 ppid=1 pid=18056 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163782670.866:13821): avc: denied { connectto } for pid=18062 comm="evolution-data-" name="linc-467f-0-732b5c6395bf3" scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:staff_r:staff_mozilla_t:s0 tclass=unix_stream_socket type=SYSCALL msg=audit(1163782670.866:13821): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=b7cdfe70 a2=466ef80 a3=0 items=0 ppid=1 pid=18062 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC_PATH msg=audit(1163782670.866:13821): path="/tmp/orbit-kmacmill/linc-467f-0-732b5c6395bf3" type=AVC msg=audit(1163782671.098:13822): avc: denied { create } for pid=18063 comm="evolution-data-" scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:staff_r:staff_evolution_server_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1163782671.098:13822): arch=40000003 syscall=102 success=yes exit=20 a0=1 a1=b72deb04 a2=595ff4 a3=b72ded91 items=0 ppid=1 pid=18063 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC msg=audit(1163782671.098:13823): avc: denied { bind } for pid=18063 comm="evolution-data-" scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:staff_r:staff_evolution_server_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1163782671.098:13823): arch=40000003 syscall=102 success=yes exit=0 a0=2 a1=b72deb04 a2=595ff4 a3=14 items=0 ppid=1 pid=18063 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC msg=audit(1163782671.098:13824): avc: denied { getattr } for pid=18063 comm="evolution-data-" scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:staff_r:staff_evolution_server_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1163782671.098:13824): arch=40000003 syscall=102 success=yes exit=0 a0=6 a1=b72deb04 a2=595ff4 a3=14 items=0 ppid=1 pid=18063 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC msg=audit(1163782671.098:13825): avc: denied { write } for pid=18063 comm="evolution-data-" scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:staff_r:staff_evolution_server_t:s0 tclass=netlink_route_socket type=AVC msg=audit(1163782671.098:13825): avc: denied { nlmsg_read } for pid=18063 comm="evolution-data-" scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:staff_r:staff_evolution_server_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1163782671.098:13825): arch=40000003 syscall=102 success=yes exit=20 a0=b a1=b72dda3c a2=595ff4 a3=0 items=0 ppid=1 pid=18063 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC msg=audit(1163782671.098:13826): avc: denied { read } for pid=18063 comm="evolution-data-" scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:staff_r:staff_evolution_server_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1163782671.098:13826): arch=40000003 syscall=102 success=yes exit=188 a0=11 a1=b72dda3c a2=595ff4 a3=0 items=0 ppid=1 pid=18063 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC msg=audit(1163782673.558:13827): avc: denied { write } for pid=18047 comm="evolution" name=".evolution" dev=dm-0 ino=6776355 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_evolution_home_t:s0 tclass=dir type=AVC msg=audit(1163782673.558:13827): avc: denied { add_name } for pid=18047 comm="evolution" name=".evolution-composer.autosave-M1CUIT" scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_evolution_home_t:s0 tclass=dir type=AVC msg=audit(1163782673.558:13827): avc: denied { create } for pid=18047 comm="evolution" name=".evolution-composer.autosave-M1CUIT" scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_evolution_home_t:s0 tclass=file type=SYSCALL msg=audit(1163782673.558:13827): arch=40000003 syscall=5 success=yes exit=39 a0=8c081e8 a1=80c2 a2=180 a3=80c2 items=0 ppid=1 pid=18047 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163782673.562:13828): avc: denied { read } for pid=18047 comm="evolution" name=".evolution" dev=dm-0 ino=6776355 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_evolution_home_t:s0 tclass=dir type=SYSCALL msg=audit(1163782673.562:13828): arch=40000003 syscall=5 success=yes exit=40 a0=8c08230 a1=18800 a2=318bd14 a3=8c08230 items=0 ppid=1 pid=18047 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163782674.022:13829): avc: denied { name_connect } for pid=18068 comm="evolution" dest=993 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:pop_port_t:s0 tclass=tcp_socket type=AVC msg=audit(1163782674.022:13829): avc: denied { send_msg } for pid=18068 comm="evolution" saddr=10.11.14.219 src=37722 daddr=10.11.255.15 dest=993 netif=tun0 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:pop_port_t:s0 tclass=tcp_socket type=SYSCALL msg=audit(1163782674.022:13829): arch=40000003 syscall=102 success=no exit=-115 a0=3 a1=aa35aef0 a2=4932550 a3=0 items=0 ppid=1 pid=18068 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163782674.054:13830): avc: denied { recv_msg } for pid=15069 comm="vpnc" saddr=10.11.255.15 src=993 daddr=10.11.14.219 dest=37722 netif=tun0 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:pop_port_t:s0 tclass=tcp_socket type=SYSCALL msg=audit(1163782674.054:13830): arch=40000003 syscall=4 success=yes exit=60 a0=4 a1=805c570 a2=3c a3=bfd587e4 items=0 ppid=15067 pid=15069 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vpnc" exe="/usr/sbin/vpnc" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163782674.442:13831): avc: denied { write } for pid=18072 comm="evolution-alarm" name="[214306]" dev=pipefs ino=214306 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=fifo_file type=SYSCALL msg=audit(1163782674.442:13831): arch=40000003 syscall=11 success=yes exit=0 a0=97742c0 a1=97715b0 a2=97715c8 a3=0 items=0 ppid=1 pid=18072 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC_PATH msg=audit(1163782674.442:13831): path="pipe:[214306]" type=AVC msg=audit(1163782674.658:13832): avc: denied { read } for pid=18072 comm="evolution-alarm" name="libeutil.so.0.0.0" dev=dm-0 ino=10509693 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=system_u:object_r:shlib_t:s0 tclass=file type=SYSCALL msg=audit(1163782674.658:13832): arch=40000003 syscall=5 success=yes exit=3 a0=bfd65d30 a1=0 a2=0 a3=bfd65d30 items=0 ppid=1 pid=18072 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC msg=audit(1163782674.658:13833): avc: denied { getattr } for pid=18072 comm="evolution-alarm" name="libeutil.so.0.0.0" dev=dm-0 ino=10509693 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=system_u:object_r:shlib_t:s0 tclass=file type=SYSCALL msg=audit(1163782674.658:13833): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bfd65d84 a2=c27fc0 a3=4 items=0 ppid=1 pid=18072 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC_PATH msg=audit(1163782674.658:13833): path="/usr/lib/evolution/2.10/libeutil.so.0.0.0" type=AVC msg=audit(1163782674.662:13834): avc: denied { execute } for pid=18072 comm="evolution-alarm" name="libeutil.so.0.0.0" dev=dm-0 ino=10509693 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=system_u:object_r:shlib_t:s0 tclass=file type=SYSCALL msg=audit(1163782674.662:13834): arch=40000003 syscall=192 success=yes exit=7815168 a0=0 a1=33cd0 a2=5 a3=802 items=0 ppid=1 pid=18072 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC_PATH msg=audit(1163782674.662:13834): path="/usr/lib/evolution/2.10/libeutil.so.0.0.0" type=AVC msg=audit(1163782674.662:13835): avc: denied { read } for pid=18072 comm="evolution-alarm" name="ld.so.cache" dev=dm-0 ino=9330488 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=staff_u:object_r:ld_so_cache_t:s0 tclass=file type=SYSCALL msg=audit(1163782674.662:13835): arch=40000003 syscall=5 success=yes exit=3 a0=c25037 a1=0 a2=c28650 a3=ffffffff items=0 ppid=1 pid=18072 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC msg=audit(1163782674.662:13836): avc: denied { getattr } for pid=18072 comm="evolution-alarm" name="ld.so.cache" dev=dm-0 ino=9330488 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=staff_u:object_r:ld_so_cache_t:s0 tclass=file type=SYSCALL msg=audit(1163782674.662:13836): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bfd65c78 a2=c27fc0 a3=ffffffff items=0 ppid=1 pid=18072 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC_PATH msg=audit(1163782674.662:13836): path="/etc/ld.so.cache" type=AVC msg=audit(1163782674.734:13837): avc: denied { read } for pid=18072 comm="evolution-alarm" name="ld-2.5.90.so" dev=dm-0 ino=13716553 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=system_u:object_r:ld_so_t:s0 tclass=file type=SYSCALL msg=audit(1163782674.734:13837): arch=40000003 syscall=125 success=yes exit=0 a0=c27000 a1=1000 a2=1 a3=380 items=0 ppid=1 pid=18072 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC_PATH msg=audit(1163782674.734:13837): path="/lib/ld-2.5.90.so" type=AVC msg=audit(1163782674.738:13838): avc: denied { getsched } for pid=18072 comm="evolution-alarm" scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tclass=process type=SYSCALL msg=audit(1163782674.738:13838): arch=40000003 syscall=155 success=yes exit=0 a0=4698 a1=b7fc6aec a2=1eeff4 a3=b7fc68e0 items=0 ppid=1 pid=18072 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC msg=audit(1163782674.742:13839): avc: denied { read } for pid=18072 comm="evolution-alarm" name="nsswitch.conf" dev=dm-0 ino=9334508 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1163782674.742:13839): arch=40000003 syscall=5 success=yes exit=3 a0=7c58f9d a1=0 a2=1b6 a3=86fc258 items=0 ppid=1 pid=18072 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC msg=audit(1163782674.742:13840): avc: denied { getattr } for pid=18072 comm="evolution-alarm" name="nsswitch.conf" dev=dm-0 ino=9334508 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1163782674.742:13840): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bfd65e64 a2=7c70ff4 a3=86fc258 items=0 ppid=1 pid=18072 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC_PATH msg=audit(1163782674.742:13840): path="/etc/nsswitch.conf" type=AVC msg=audit(1163782674.746:13841): avc: denied { read } for pid=18072 comm="evolution-alarm" name="locale.alias" dev=dm-0 ino=4845049 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=file type=SYSCALL msg=audit(1163782674.746:13841): arch=40000003 syscall=5 success=yes exit=3 a0=bfd61e08 a1=0 a2=1b6 a3=8703888 items=0 ppid=1 pid=18072 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC msg=audit(1163782674.746:13842): avc: denied { getattr } for pid=18072 comm="evolution-alarm" name="locale.alias" dev=dm-0 ino=4845049 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=file type=SYSCALL msg=audit(1163782674.746:13842): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bfd61a28 a2=7c70ff4 a3=8703888 items=0 ppid=1 pid=18072 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC_PATH msg=audit(1163782674.746:13842): path="/usr/share/X11/locale/locale.alias" type=AVC msg=audit(1163782674.750:13843): avc: denied { read } for pid=18072 comm="evolution-alarm" name=".gdm0UWNIT" dev=dm-0 ino=14469400 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163782674.750:13843): arch=40000003 syscall=33 success=yes exit=0 a0=bfd67c28 a1=4 a2=da3a64 a3=bfd67c28 items=0 ppid=1 pid=18072 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC msg=audit(1163782674.750:13844): avc: denied { getattr } for pid=18072 comm="evolution-alarm" name=".gdm0UWNIT" dev=dm-0 ino=14469400 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163782674.750:13844): arch=40000003 syscall=197 success=yes exit=0 a0=4 a1=bfd65cbc a2=7c70ff4 a3=8706cc0 items=0 ppid=1 pid=18072 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC_PATH msg=audit(1163782674.750:13844): path="/tmp/.gdm0UWNIT" type=AVC msg=audit(1163782674.754:13845): avc: denied { read } for pid=18072 comm="evolution-alarm" name="tmp" dev=dm-0 ino=14469313 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=system_u:object_r:tmp_t:s0 tclass=dir type=SYSCALL msg=audit(1163782674.754:13845): arch=40000003 syscall=5 success=yes exit=10 a0=86fc058 a1=18800 a2=c27fc0 a3=86fc058 items=0 ppid=1 pid=18072 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC msg=audit(1163782674.754:13846): avc: denied { getattr } for pid=18072 comm="evolution-alarm" name="orbit-kmacmill" dev=dm-0 ino=14567718 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=dir type=SYSCALL msg=audit(1163782674.754:13846): arch=40000003 syscall=195 success=yes exit=0 a0=8715768 a1=bfd6631c a2=7c70ff4 a3=bfd6631c items=0 ppid=1 pid=18072 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC_PATH msg=audit(1163782674.754:13846): path="/tmp/orbit-kmacmill" type=AVC msg=audit(1163782674.754:13847): avc: denied { setattr } for pid=18072 comm="evolution-alarm" name="orbit-kmacmill" dev=dm-0 ino=14567718 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=dir type=SYSCALL msg=audit(1163782674.754:13847): arch=40000003 syscall=30 success=yes exit=0 a0=8714748 a1=bfd66374 a2=466ef80 a3=1f4 items=0 ppid=1 pid=18072 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC msg=audit(1163782674.754:13848): avc: denied { read } for pid=18072 comm="evolution-alarm" name="urandom" dev=tmpfs ino=1972 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=system_u:object_r:urandom_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163782674.754:13848): arch=40000003 syscall=5 success=yes exit=10 a0=b7b880 a1=8000 a2=1b6 a3=87147c0 items=0 ppid=1 pid=18072 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC msg=audit(1163782674.754:13849): avc: denied { getattr } for pid=18072 comm="evolution-alarm" name="urandom" dev=tmpfs ino=1972 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=system_u:object_r:urandom_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163782674.754:13849): arch=40000003 syscall=197 success=yes exit=0 a0=a a1=bfd662fc a2=7c70ff4 a3=87147c0 items=0 ppid=1 pid=18072 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC_PATH msg=audit(1163782674.754:13849): path="/dev/urandom" type=AVC msg=audit(1163782674.754:13850): avc: denied { ioctl } for pid=18072 comm="evolution-alarm" name="urandom" dev=tmpfs ino=1972 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=system_u:object_r:urandom_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163782674.754:13850): arch=40000003 syscall=54 success=no exit=-22 a0=a a1=5401 a2=bfd6625c a3=bfd6629c items=0 ppid=1 pid=18072 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC_PATH msg=audit(1163782674.754:13850): path="/dev/urandom" type=AVC msg=audit(1163782674.758:13851): avc: denied { read } for pid=18072 comm="evolution-alarm" name="modules" dev=dm-0 ino=9331073 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=dir type=SYSCALL msg=audit(1163782674.758:13851): arch=40000003 syscall=5 success=yes exit=10 a0=8715b30 a1=18800 a2=b25d07 a3=8715b30 items=0 ppid=1 pid=18072 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC msg=audit(1163782674.758:13852): avc: denied { search } for pid=18072 comm="evolution-alarm" name=".ICE-unix" dev=dm-0 ino=14567572 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=system_u:object_r:ice_tmp_t:s0 tclass=dir type=AVC msg=audit(1163782674.758:13852): avc: denied { write } for pid=18072 comm="evolution-alarm" name="15931" dev=dm-0 ino=14567724 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=staff_u:object_r:ice_tmp_t:s0 tclass=sock_file type=AVC msg=audit(1163782674.758:13852): avc: denied { connectto } for pid=18072 comm="evolution-alarm" name="15931" scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=unix_stream_socket type=SYSCALL msg=audit(1163782674.758:13852): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=bfd65d70 a2=df7770 a3=16 items=0 ppid=1 pid=18072 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC_PATH msg=audit(1163782674.758:13852): path="/tmp/.ICE-unix/15931" type=AVC msg=audit(1163782674.758:13853): avc: denied { read } for pid=18072 comm="evolution-alarm" name=".ICEauthority" dev=dm-0 ino=6574784 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=staff_u:object_r:staff_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163782674.758:13853): arch=40000003 syscall=33 success=yes exit=0 a0=8717ea8 a1=4 a2=df7770 a3=8717ea8 items=0 ppid=1 pid=18072 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC msg=audit(1163782674.758:13854): avc: denied { getattr } for pid=18072 comm="evolution-alarm" name=".ICEauthority" dev=dm-0 ino=6574784 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=staff_u:object_r:staff_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163782674.758:13854): arch=40000003 syscall=197 success=yes exit=0 a0=b a1=bfd65e0c a2=7c70ff4 a3=8718798 items=0 ppid=1 pid=18072 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC_PATH msg=audit(1163782674.758:13854): path="/home/kmacmill/.ICEauthority" type=AVC msg=audit(1163782674.762:13855): avc: denied { search } for pid=18072 comm="evolution-alarm" name="gconfd-kmacmill" dev=dm-0 ino=15648282 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=dir type=AVC msg=audit(1163782674.762:13855): avc: denied { read } for pid=18072 comm="evolution-alarm" name="ior" dev=dm-0 ino=15647969 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163782674.762:13855): arch=40000003 syscall=5 success=yes exit=11 a0=871b040 a1=0 a2=1b6 a3=871b068 items=0 ppid=1 pid=18072 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC msg=audit(1163782674.766:13856): avc: denied { getattr } for pid=18072 comm="evolution-alarm" name="ior" dev=dm-0 ino=15647969 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163782674.766:13856): arch=40000003 syscall=197 success=yes exit=0 a0=b a1=bfd65928 a2=7c70ff4 a3=871b068 items=0 ppid=1 pid=18072 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC_PATH msg=audit(1163782674.766:13856): path="/tmp/gconfd-kmacmill/lock/ior" type=AVC msg=audit(1163782674.766:13857): avc: denied { write } for pid=18072 comm="evolution-alarm" name="linc-4651-0-23d6c771c010d" dev=dm-0 ino=14568138 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=sock_file type=SYSCALL msg=audit(1163782674.766:13857): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=bfd66040 a2=466ef80 a3=0 items=0 ppid=1 pid=18072 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC msg=audit(1163782674.766:13858): avc: denied { write } for pid=18072 comm="evolution-alarm" name="orbit-kmacmill" dev=dm-0 ino=14567718 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=dir type=AVC msg=audit(1163782674.766:13858): avc: denied { add_name } for pid=18072 comm="evolution-alarm" name="linc-4698-0-45fa60dbcacd" scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=dir type=AVC msg=audit(1163782674.766:13858): avc: denied { create } for pid=18072 comm="evolution-alarm" name="linc-4698-0-45fa60dbcacd" scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=sock_file type=SYSCALL msg=audit(1163782674.766:13858): arch=40000003 syscall=102 success=yes exit=0 a0=2 a1=bfd66080 a2=466ef80 a3=b7fc68ac items=0 ppid=1 pid=18072 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC msg=audit(1163782674.774:13859): avc: denied { connectto } for pid=18001 comm="gconfd-2" name="linc-4698-0-45fa60dbcacd" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tclass=unix_stream_socket type=SYSCALL msg=audit(1163782674.774:13859): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=bfa7bbc0 a2=466ef80 a3=0 items=0 ppid=1 pid=18001 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163782674.774:13859): path="/tmp/orbit-kmacmill/linc-4698-0-45fa60dbcacd" type=AVC msg=audit(1163782675.022:13860): avc: denied { read } for pid=18072 comm="evolution-alarm" name="meminfo" dev=proc ino=-268435454 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=system_u:object_r:proc_t:s0 tclass=file type=SYSCALL msg=audit(1163782675.022:13860): arch=40000003 syscall=5 success=yes exit=18 a0=7c58afa a1=0 a2=1b6 a3=87446e0 items=0 ppid=1 pid=18072 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC msg=audit(1163782675.022:13861): avc: denied { getattr } for pid=18072 comm="evolution-alarm" name="meminfo" dev=proc ino=-268435454 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=system_u:object_r:proc_t:s0 tclass=file type=SYSCALL msg=audit(1163782675.022:13861): arch=40000003 syscall=197 success=yes exit=0 a0=12 a1=bfd61b98 a2=7c70ff4 a3=87446e0 items=0 ppid=1 pid=18072 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC_PATH msg=audit(1163782675.022:13861): path="/proc/meminfo" type=AVC msg=audit(1163782675.062:13862): avc: denied { connectto } for pid=18072 comm="evolution-alarm" path=002F746D702F646275732D4F36457A564B53704F4E scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=staff_u:staff_r:staff_dbusd_t:s0 tclass=unix_stream_socket type=SYSCALL msg=audit(1163782675.062:13862): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=bfd65f10 a2=703454 a3=0 items=0 ppid=1 pid=18072 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC msg=audit(1163782675.098:13863): avc: denied { write } for pid=18072 comm="evolution-alarm" name="bonobo-activation-register.lock" dev=dm-0 ino=14567728 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163782675.098:13863): arch=40000003 syscall=5 success=yes exit=19 a0=8757da0 a1=42 a2=1c0 a3=8757da0 items=0 ppid=1 pid=18072 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC msg=audit(1163782675.098:13864): avc: denied { lock } for pid=18072 comm="evolution-alarm" name="bonobo-activation-register.lock" dev=dm-0 ino=14567728 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163782675.098:13864): arch=40000003 syscall=221 success=yes exit=0 a0=13 a1=7 a2=bfd65f4c a3=bfd65f4c items=0 ppid=1 pid=18072 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC_PATH msg=audit(1163782675.098:13864): path="/tmp/orbit-kmacmill/bonobo-activation-register.lock" type=AVC msg=audit(1163782675.110:13865): avc: denied { signal } for pid=18076 comm="evolution-data-" scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:staff_r:staff_evolution_server_t:s0 tclass=process type=SYSCALL msg=audit(1163782675.110:13865): arch=40000003 syscall=270 success=yes exit=0 a0=4683 a1=4684 a2=21 a3=b7d21bd0 items=0 ppid=1 pid=18076 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC msg=audit(1163782675.114:13866): avc: denied { getattr } for pid=18072 comm="evolution-alarm" name="[214306]" dev=pipefs ino=214306 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=fifo_file type=SYSCALL msg=audit(1163782675.114:13866): arch=40000003 syscall=197 success=yes exit=0 a0=22 a1=bfd66314 a2=7c70ff4 a3=8762150 items=0 ppid=1 pid=18072 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC_PATH msg=audit(1163782675.114:13866): path="pipe:[214306]" type=AVC msg=audit(1163782675.118:13867): avc: denied { connectto } for pid=18047 comm="evolution" name="linc-4698-0-45fa60dbcacd" scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tclass=unix_stream_socket type=SYSCALL msg=audit(1163782675.118:13867): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=bffbcb00 a2=466ef80 a3=0 items=0 ppid=1 pid=18047 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163782675.118:13867): path="/tmp/orbit-kmacmill/linc-4698-0-45fa60dbcacd" type=AVC msg=audit(1163782675.886:13868): avc: denied { remove_name } for pid=18066 comm="evolution" name="2289." dev=dm-0 ino=6814000 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_evolution_home_t:s0 tclass=dir type=AVC msg=audit(1163782675.886:13868): avc: denied { unlink } for pid=18066 comm="evolution" name="2289." dev=dm-0 ino=6814000 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_evolution_home_t:s0 tclass=file type=SYSCALL msg=audit(1163782675.886:13868): arch=40000003 syscall=10 success=yes exit=0 a0=8f21198 a1=bae708 a2=bae708 a3=8f21198 items=0 ppid=1 pid=18066 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163782677.135:13869): avc: denied { rename } for pid=18066 comm="evolution" name="summary~" dev=dm-0 ino=6811439 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_evolution_home_t:s0 tclass=file type=SYSCALL msg=audit(1163782677.135:13869): arch=40000003 syscall=38 success=yes exit=0 a0=b4091000 a1=8dbaeb8 a2=1dcbd8 a3=8fbae74 items=0 ppid=1 pid=18066 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163782677.215:13870): avc: denied { connectto } for pid=18047 comm="evolution" path=002F746D702F646275732D4F36457A564B53704F4E scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_dbusd_t:s0 tclass=unix_stream_socket type=SYSCALL msg=audit(1163782677.215:13870): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=bffbca00 a2=64a454 a3=0 items=0 ppid=1 pid=18047 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163782687.191:13871): avc: denied { lock } for pid=18094 comm="evolution" name="Outbox" dev=dm-0 ino=6785198 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_evolution_home_t:s0 tclass=file type=SYSCALL msg=audit(1163782687.191:13871): arch=40000003 syscall=221 success=yes exit=0 a0=2c a1=6 a2=b2c8f15c a3=b2c8f15c items=0 ppid=1 pid=18094 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163782687.191:13871): path="/home/kmacmill/.evolution/mail/local/Outbox" type=AVC msg=audit(1163782687.703:13872): avc: denied { name_connect } for pid=18094 comm="evolution" dest=25 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:smtp_port_t:s0 tclass=tcp_socket type=AVC msg=audit(1163782687.703:13872): avc: denied { send_msg } for pid=18094 comm="evolution" saddr=10.11.14.219 src=53306 daddr=10.11.255.15 dest=25 netif=tun0 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:smtp_port_t:s0 tclass=tcp_socket type=SYSCALL msg=audit(1163782687.703:13872): arch=40000003 syscall=102 success=no exit=-115 a0=3 a1=b2c8ef50 a2=1dcbd8 a3=0 items=0 ppid=1 pid=18094 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163782687.739:13873): avc: denied { recv_msg } for pid=15069 comm="vpnc" saddr=10.11.255.15 src=25 daddr=10.11.14.219 dest=53306 netif=tun0 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:smtp_port_t:s0 tclass=tcp_socket type=SYSCALL msg=audit(1163782687.739:13873): arch=40000003 syscall=4 success=yes exit=60 a0=4 a1=805c570 a2=3c a3=bfd587e4 items=0 ppid=15067 pid=15069 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vpnc" exe="/usr/sbin/vpnc" subj=staff_u:staff_r:staff_t:s0 key=(null) type=USER_ACCT msg=audit(1163782801.294:13874): user pid=18104 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1163782801.298:13875): login pid=18104 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1163782801.298:13876): user pid=18104 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1163782801.298:13877): user pid=18104 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1163782801.306:13878): avc: denied { read } for pid=18105 comm="sadc" name="dev" dev=proc ino=-268434164 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=file type=SYSCALL msg=audit(1163782801.306:13878): arch=40000003 syscall=5 success=yes exit=3 a0=80502e1 a1=0 a2=1b6 a3=90897f8 items=0 ppid=18104 pid=18105 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163782801.306:13879): avc: denied { getattr } for pid=18105 comm="sadc" name="dev" dev=proc ino=-268434164 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=file type=SYSCALL msg=audit(1163782801.306:13879): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bfb1e448 a2=99bff4 a3=90897f8 items=0 ppid=18104 pid=18105 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163782801.306:13879): path="/proc/net/dev" type=CRED_DISP msg=audit(1163782801.318:13880): user pid=18104 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1163782801.318:13881): user pid=18104 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1163782861.326:13882): user pid=18106 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1163782861.326:13883): login pid=18106 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1163782861.330:13884): user pid=18106 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1163782861.330:13885): user pid=18106 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1163782861.338:13886): avc: denied { getattr } for pid=18107 comm="bash" name="run-parts" dev=dm-0 ino=10331890 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1163782861.338:13886): arch=40000003 syscall=195 success=yes exit=0 a0=89ef120 a1=bfa2f470 a2=bccff4 a3=89ef120 items=0 ppid=18106 pid=18107 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="bash" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163782861.338:13886): path="/usr/bin/run-parts" type=AVC msg=audit(1163782861.394:13887): avc: denied { execute } for pid=18107 comm="bash" name="run-parts" dev=dm-0 ino=10331890 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1163782861.394:13887): arch=40000003 syscall=33 success=yes exit=0 a0=89ef120 a1=1 a2=11 a3=89ef120 items=0 ppid=18106 pid=18107 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="bash" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163782861.394:13888): avc: denied { read } for pid=18107 comm="bash" name="run-parts" dev=dm-0 ino=10331890 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1163782861.394:13888): arch=40000003 syscall=33 success=yes exit=0 a0=89ef120 a1=4 a2=ffffffff a3=89ef120 items=0 ppid=18106 pid=18107 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="bash" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163782861.394:13889): avc: denied { execute_no_trans } for pid=18107 comm="bash" name="run-parts" dev=dm-0 ino=10331890 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1163782861.394:13889): arch=40000003 syscall=11 success=yes exit=0 a0=89ef120 a1=89ef3d8 a2=89ef2f8 a3=89eef98 items=0 ppid=18106 pid=18107 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="run-parts" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163782861.394:13889): path="/usr/bin/run-parts" type=AVC msg=audit(1163782861.406:13890): avc: denied { ioctl } for pid=18107 comm="run-parts" name="run-parts" dev=dm-0 ino=10331890 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1163782861.406:13890): arch=40000003 syscall=54 success=no exit=-25 a0=3 a1=5401 a2=bffe5ac8 a3=bffe5b08 items=0 ppid=18106 pid=18107 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="run-parts" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163782861.406:13890): path="/usr/bin/run-parts" type=AVC msg=audit(1163782861.406:13891): avc: denied { execute } for pid=18107 comm="run-parts" name="inn-cron-nntpsend" dev=dm-0 ino=9331477 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1163782861.406:13891): arch=40000003 syscall=33 success=yes exit=0 a0=8fc6990 a1=1 a2=1 a3=8fc6c98 items=0 ppid=18106 pid=18107 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="run-parts" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163782861.410:13892): avc: denied { execute_no_trans } for pid=18108 comm="run-parts" name="inn-cron-nntpsend" dev=dm-0 ino=9331477 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1163782861.410:13892): arch=40000003 syscall=11 success=yes exit=0 a0=8fc6a10 a1=8fc6ad8 a2=8fc6ae8 a3=8fc6758 items=0 ppid=18107 pid=18108 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="inn-cron-nntpse" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163782861.410:13892): path="/etc/cron.hourly/inn-cron-nntpsend" type=AVC msg=audit(1163782861.426:13893): avc: denied { execute } for pid=18110 comm="inn-cron-nntpse" name="chkconfig" dev=dm-0 ino=9984485 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sbin_t:s0 tclass=file type=AVC msg=audit(1163782861.426:13893): avc: denied { execute_no_trans } for pid=18110 comm="inn-cron-nntpse" name="chkconfig" dev=dm-0 ino=9984485 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sbin_t:s0 tclass=file type=AVC msg=audit(1163782861.426:13893): avc: denied { read } for pid=18110 comm="inn-cron-nntpse" name="chkconfig" dev=dm-0 ino=9984485 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sbin_t:s0 tclass=file type=SYSCALL msg=audit(1163782861.426:13893): arch=40000003 syscall=11 success=yes exit=0 a0=8af0678 a1=8af0808 a2=8af0720 a3=8af0508 items=0 ppid=18108 pid=18110 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="chkconfig" exe="/sbin/chkconfig" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163782861.426:13893): path="/sbin/chkconfig" type=AVC_PATH msg=audit(1163782861.426:13893): path="/sbin/chkconfig" type=AVC msg=audit(1163782861.426:13894): avc: denied { read } for pid=18110 comm="chkconfig" name="innd" dev=dm-0 ino=9331492 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163782861.426:13894): arch=40000003 syscall=5 success=yes exit=3 a0=bf857b20 a1=0 a2=ffffffff a3=9c48038 items=0 ppid=18108 pid=18110 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="chkconfig" exe="/sbin/chkconfig" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163782861.438:13895): avc: denied { getattr } for pid=18110 comm="chkconfig" name="innd" dev=dm-0 ino=9331492 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163782861.438:13895): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bf857a8c a2=24bff4 a3=bf857a8c items=0 ppid=18108 pid=18110 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="chkconfig" exe="/sbin/chkconfig" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163782861.438:13895): path="/etc/rc.d/init.d/innd" type=CRED_DISP msg=audit(1163782861.462:13896): user pid=18106 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1163782861.462:13897): user pid=18106 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1163783269.908:13898): avc: denied { create } for pid=18131 comm="evolution" name="commits" scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_evolution_home_t:s0 tclass=dir type=SYSCALL msg=audit(1163783269.908:13898): arch=40000003 syscall=39 success=yes exit=0 a0=a8415208 a1=1c0 a2=bae708 a3=0 items=0 ppid=1 pid=18131 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=USER_ACCT msg=audit(1163783401.496:13899): user pid=18141 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1163783401.500:13900): login pid=18141 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1163783401.500:13901): user pid=18141 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1163783401.500:13902): user pid=18141 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1163783401.512:13903): user pid=18141 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1163783401.512:13904): user pid=18141 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1163784001.553:13905): user pid=18172 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1163784001.553:13906): login pid=18172 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1163784001.553:13907): user pid=18172 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1163784001.553:13908): user pid=18172 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1163784001.585:13909): user pid=18172 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1163784001.585:13910): user pid=18172 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1163784601.623:13911): user pid=18208 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1163784601.627:13912): login pid=18208 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1163784601.627:13913): user pid=18208 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1163784601.627:13914): user pid=18208 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1163784601.647:13915): user pid=18208 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1163784601.647:13916): user pid=18208 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1163784917.951:13917): avc: denied { execmem } for pid=18220 comm="gnome-screensav" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=process type=SYSCALL msg=audit(1163784917.951:13917): arch=40000003 syscall=192 success=yes exit=81354752 a0=4d96000 a1=1a000 a2=7 a3=812 items=0 ppid=16501 pid=18220 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-screensav" exe="/usr/libexec/gnome-screensaver-gl-helper" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163784917.951:13918): avc: denied { execstack } for pid=18220 comm="gnome-screensav" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=process type=SYSCALL msg=audit(1163784917.951:13918): arch=40000003 syscall=125 success=yes exit=0 a0=bf8aa000 a1=1000 a2=1000007 a3=fffff000 items=0 ppid=16501 pid=18220 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-screensav" exe="/usr/libexec/gnome-screensaver-gl-helper" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163784918.639:13919): avc: denied { execute } for pid=18220 comm="gnome-screensav" name="zero" dev=tmpfs ino=1493 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:zero_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163784918.639:13919): arch=40000003 syscall=192 success=yes exit=2985984 a0=0 a1=2000 a2=7 a3=2 items=0 ppid=16501 pid=18220 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-screensav" exe="/usr/libexec/gnome-screensaver-gl-helper" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163784918.639:13919): path="/dev/zero" type=USER_ACCT msg=audit(1163785201.692:13920): user pid=18235 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1163785201.692:13921): login pid=18235 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1163785201.692:13922): user pid=18235 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1163785201.692:13923): user pid=18235 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1163785201.712:13924): user pid=18235 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1163785201.712:13925): user pid=18235 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1163785801.758:13926): user pid=18259 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1163785801.758:13927): login pid=18259 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1163785801.758:13928): user pid=18259 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1163785801.758:13929): user pid=18259 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1163785801.782:13930): user pid=18259 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1163785801.782:13931): user pid=18259 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1163786401.823:13932): user pid=18289 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1163786401.827:13933): login pid=18289 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1163786401.827:13934): user pid=18289 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1163786401.827:13935): user pid=18289 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1163786401.859:13936): user pid=18289 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1163786401.859:13937): user pid=18289 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1163786461.863:13938): user pid=18292 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1163786461.867:13939): login pid=18292 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1163786461.867:13940): user pid=18292 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1163786461.867:13941): user pid=18292 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1163786461.899:13942): user pid=18292 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1163786461.899:13943): user pid=18292 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1163787001.941:13944): user pid=18329 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1163787001.941:13945): login pid=18329 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1163787001.941:13946): user pid=18329 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1163787001.941:13947): user pid=18329 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1163787001.953:13948): avc: denied { read } for pid=18330 comm="sadc" name="dentry-state" dev=proc ino=-268435230 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=file type=SYSCALL msg=audit(1163787001.953:13948): arch=40000003 syscall=5 success=yes exit=4 a0=80502ef a1=0 a2=1b6 a3=8fa9348 items=0 ppid=18329 pid=18330 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163787001.953:13949): avc: denied { getattr } for pid=18330 comm="sadc" name="dentry-state" dev=proc ino=-268435230 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=file type=SYSCALL msg=audit(1163787001.953:13949): arch=40000003 syscall=197 success=yes exit=0 a0=4 a1=bfc593e0 a2=caaff4 a3=8fa9348 items=0 ppid=18329 pid=18330 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163787001.953:13949): path="/proc/sys/fs/dentry-state" type=CRED_DISP msg=audit(1163787001.961:13950): user pid=18329 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1163787001.961:13951): user pid=18329 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1163787455.869:13952): avc: denied { execstack } for pid=16541 comm="firefox-bin" scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_mozilla_t:s0 tclass=process type=AVC msg=audit(1163787455.869:13952): avc: denied { execmem } for pid=16541 comm="firefox-bin" scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_mozilla_t:s0 tclass=process type=SYSCALL msg=audit(1163787455.869:13952): arch=40000003 syscall=125 success=yes exit=0 a0=bfad5000 a1=1000 a2=1000007 a3=fffff000 items=0 ppid=1 pid=16541 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163787455.917:13953): avc: denied { execmod } for pid=16541 comm="firefox-bin" name="nprhapengine.so" dev=dm-0 ino=6547712 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_mozilla_home_t:s0 tclass=file type=SYSCALL msg=audit(1163787455.917:13953): arch=40000003 syscall=125 success=yes exit=0 a0=14c0000 a1=26f000 a2=5 a3=bfad1fe0 items=0 ppid=1 pid=16541 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163787455.917:13953): path="/home/kmacmill/.mozilla/plugins/nprhapengine.so" type=AVC msg=audit(1163787469.318:13954): avc: denied { read } for pid=18362 comm="evolution" name="summary" dev=dm-0 ino=6815397 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_evolution_home_t:s0 tclass=file type=SYSCALL msg=audit(1163787469.318:13954): arch=40000003 syscall=5 success=yes exit=25 a0=91d4610 a1=0 a2=1b6 a3=8c51800 items=0 ppid=1 pid=18362 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163787469.318:13955): avc: denied { getattr } for pid=18362 comm="evolution" name="summary" dev=dm-0 ino=6815397 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_evolution_home_t:s0 tclass=file type=SYSCALL msg=audit(1163787469.318:13955): arch=40000003 syscall=197 success=yes exit=0 a0=19 a1=b4090f48 a2=758aff4 a3=8c51800 items=0 ppid=1 pid=18362 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163787469.318:13955): path="/home/kmacmill/.evolution/mail/imap/kmacmill@pobox-2.corp.redhat.com/folders/INBOX/summary" type=AVC msg=audit(1163787469.634:13956): avc: denied { create } for pid=18362 comm="evolution" name="summary~" scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_evolution_home_t:s0 tclass=file type=SYSCALL msg=audit(1163787469.634:13956): arch=40000003 syscall=5 success=yes exit=43 a0=b4090ff0 a1=242 a2=180 a3=92401d0 items=0 ppid=1 pid=18362 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163787469.634:13957): avc: denied { write } for pid=18362 comm="evolution" name="summary~" dev=dm-0 ino=9103731 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_evolution_home_t:s0 tclass=file type=SYSCALL msg=audit(1163787469.634:13957): arch=40000003 syscall=4 success=yes exit=40 a0=2b a1=b219f000 a2=28 a3=28 items=0 ppid=1 pid=18362 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163787469.634:13957): path="/home/kmacmill/.evolution/mail/imap/kmacmill@pobox-2.corp.redhat.com/folders/INBOX/subfolders/Sent/summary~" type=AVC msg=audit(1163787469.658:13958): avc: denied { rename } for pid=18362 comm="evolution" name="summary~" dev=dm-0 ino=9103731 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_evolution_home_t:s0 tclass=file type=AVC msg=audit(1163787469.658:13958): avc: denied { unlink } for pid=18362 comm="evolution" name="summary" dev=dm-0 ino=9103670 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_evolution_home_t:s0 tclass=file type=SYSCALL msg=audit(1163787469.658:13958): arch=40000003 syscall=38 success=yes exit=0 a0=b4090ff0 a1=92401d0 a2=1dcbd8 a3=923f174 items=0 ppid=1 pid=18362 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163787474.018:13959): avc: denied { lock } for pid=18369 comm="evolution" name="Inbox" dev=dm-0 ino=6778778 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_evolution_home_t:s0 tclass=file type=SYSCALL msg=audit(1163787474.018:13959): arch=40000003 syscall=221 success=yes exit=0 a0=19 a1=6 a2=b2c8f1fc a3=b2c8f1fc items=0 ppid=1 pid=18369 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163787474.018:13959): path="/home/kmacmill/.evolution/mail/local/Inbox" type=AVC msg=audit(1163787480.523:13960): avc: denied { read } for pid=16429 comm="gnome-panel" name=".recently-used.xbel" dev=dm-0 ino=11885042 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:staff_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163787480.523:13960): arch=40000003 syscall=5 success=yes exit=29 a0=8d54aa0 a1=8000 a2=0 a3=8000 items=0 ppid=1 pid=16429 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-panel" exe="/usr/bin/gnome-panel" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163787490.983:13961): avc: denied { write } for pid=18373 comm="gnome-sound-pro" name="15931" dev=dm-0 ino=14567724 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:ice_tmp_t:s0 tclass=sock_file type=SYSCALL msg=audit(1163787490.983:13961): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=bff90f80 a2=df7770 a3=16 items=0 ppid=1 pid=18373 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-sound-pro" exe="/usr/bin/gnome-sound-properties" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163787515.609:13962): avc: denied { read } for pid=18373 comm="gnome-sound-pro" name="default.conf" dev=dm-0 ino=9330152 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:alsa_etc_rw_t:s0 tclass=file type=SYSCALL msg=audit(1163787515.609:13962): arch=40000003 syscall=5 success=yes exit=20 a0=897d648 a1=0 a2=1b6 a3=89855b0 items=0 ppid=1 pid=18373 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-sound-pro" exe="/usr/bin/gnome-sound-properties" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163787515.657:13963): avc: denied { read } for pid=18373 comm="gnome-sound-pro" name="resolv.conf" dev=dm-0 ino=9330239 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:net_conf_t:s0 tclass=file type=SYSCALL msg=audit(1163787515.657:13963): arch=40000003 syscall=5 success=yes exit=19 a0=f1de73 a1=0 a2=1b6 a3=898fa50 items=0 ppid=1 pid=18373 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-sound-pro" exe="/usr/bin/gnome-sound-properties" subj=staff_u:staff_r:staff_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163787527.434:13964): security_compute_sid: invalid context staff_u:staff_r:staff_userhelper_t:s0 for scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:userhelper_exec_t:s0 tclass=process type=SYSCALL msg=audit(1163787527.434:13964): arch=40000003 syscall=11 success=yes exit=0 a0=804c35f a1=94df8c8 a2=bf80e1ac a3=3 items=0 ppid=18381 pid=18382 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=(none) comm="userhelper" exe="/usr/sbin/userhelper" subj=staff_u:staff_r:staff_userhelper_t:s0 key=(null) type=AVC msg=audit(1163787527.538:13965): avc: denied { ioctl } for pid=18382 comm="userhelper" name="[169789]" dev=pipefs ino=169789 scontext=staff_u:staff_r:staff_userhelper_t:s0 tcontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tclass=fifo_file type=SYSCALL msg=audit(1163787527.538:13965): arch=40000003 syscall=54 success=no exit=-22 a0=1 a1=5401 a2=bfb54528 a3=bfb54568 items=0 ppid=18381 pid=18382 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=(none) comm="userhelper" exe="/usr/sbin/userhelper" subj=staff_u:staff_r:staff_userhelper_t:s0 key=(null) type=AVC_PATH msg=audit(1163787527.538:13965): path="pipe:[169789]" type=USER_AUTH msg=audit(1163787530.250:13966): user pid=18382 uid=500 auid=500 subj=staff_u:staff_r:staff_userhelper_t:s0 msg='PAM: authentication acct=root : exe="/usr/sbin/userhelper" (hostname=?, addr=?, terminal=? res=success)' type=USER_ACCT msg=audit(1163787530.250:13967): user pid=18382 uid=500 auid=500 subj=staff_u:staff_r:staff_userhelper_t:s0 msg='PAM: accounting acct=root : exe="/usr/sbin/userhelper" (hostname=?, addr=?, terminal=? res=success)' type=AVC msg=audit(1163787530.270:13968): avc: denied { search } for pid=18382 comm="userhelper" name="kmacmill" dev=dm-0 ino=6547202 scontext=staff_u:staff_r:staff_userhelper_t:s0 tcontext=staff_u:object_r:staff_home_dir_t:s0 tclass=dir type=SYSCALL msg=audit(1163787530.270:13968): arch=40000003 syscall=5 success=no exit=-2 a0=bfb57168 a1=8000 a2=1b6 a3=9752c28 items=0 ppid=18381 pid=18382 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="userhelper" exe="/usr/sbin/userhelper" subj=staff_u:staff_r:staff_userhelper_t:s0 key=(null) type=AVC msg=audit(1163787530.270:13969): avc: denied { search } for pid=18382 comm="userhelper" name="root" dev=dm-0 ino=13127137 scontext=staff_u:staff_r:staff_userhelper_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=SYSCALL msg=audit(1163787530.270:13969): arch=40000003 syscall=5 success=no exit=-2 a0=bfb57168 a1=8000 a2=1b6 a3=9752d80 items=0 ppid=18381 pid=18382 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=(none) comm="userhelper" exe="/usr/sbin/userhelper" subj=staff_u:staff_r:staff_userhelper_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163787530.286:13970): security_compute_sid: invalid context staff_u:staff_r:staff_userhelper_t:s0 for scontext=staff_u:staff_r:staff_userhelper_t:s0 tcontext=system_u:object_r:xauth_exec_t:s0 tclass=process type=AVC msg=audit(1163787530.286:13970): avc: denied { execute_no_trans } for pid=18383 comm="userhelper" name="xauth" dev=dm-0 ino=10326959 scontext=staff_u:staff_r:staff_userhelper_t:s0 tcontext=system_u:object_r:xauth_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163787530.286:13970): arch=40000003 syscall=11 success=yes exit=0 a0=156681 a1=bfb5812c a2=974cda8 a3=4 items=0 ppid=18382 pid=18383 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_userhelper_t:s0 key=(null) type=AVC_PATH msg=audit(1163787530.286:13970): path="/usr/bin/xauth" type=AVC msg=audit(1163787530.338:13971): avc: denied { search } for pid=18383 comm="xauth" name="tmp" dev=dm-0 ino=14469313 scontext=staff_u:staff_r:staff_userhelper_t:s0 tcontext=system_u:object_r:tmp_t:s0 tclass=dir type=SYSCALL msg=audit(1163787530.338:13971): arch=40000003 syscall=195 success=no exit=-2 a0=bf99da97 a1=bf99d5ac a2=256ff4 a3=bf99d5ac items=0 ppid=18382 pid=18383 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_userhelper_t:s0 key=(null) type=AVC msg=audit(1163787530.338:13972): avc: denied { write } for pid=18383 comm="xauth" name="tmp" dev=dm-0 ino=14469313 scontext=staff_u:staff_r:staff_userhelper_t:s0 tcontext=system_u:object_r:tmp_t:s0 tclass=dir type=AVC msg=audit(1163787530.338:13972): avc: denied { add_name } for pid=18383 comm="xauth" name=".gdm0UWNIT-c" scontext=staff_u:staff_r:staff_userhelper_t:s0 tcontext=system_u:object_r:tmp_t:s0 tclass=dir type=AVC msg=audit(1163787530.338:13972): avc: denied { create } for pid=18383 comm="xauth" name=".gdm0UWNIT-c" scontext=staff_u:staff_r:staff_userhelper_t:s0 tcontext=staff_u:object_r:tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163787530.338:13972): arch=40000003 syscall=5 success=yes exit=2 a0=bf99da97 a1=c1 a2=180 a3=ffffffff items=0 ppid=18382 pid=18383 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_userhelper_t:s0 key=(null) type=AVC msg=audit(1163787530.338:13973): avc: denied { link } for pid=18383 comm="xauth" name=".gdm0UWNIT-c" dev=dm-0 ino=14469449 scontext=staff_u:staff_r:staff_userhelper_t:s0 tcontext=staff_u:object_r:tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163787530.338:13973): arch=40000003 syscall=9 success=yes exit=0 a0=bf99da97 a1=bf99d696 a2=da3a64 a3=2 items=0 ppid=18382 pid=18383 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_userhelper_t:s0 key=(null) type=AVC msg=audit(1163787530.338:13974): avc: denied { write } for pid=18383 comm="xauth" name=".gdm0UWNIT" dev=dm-0 ino=14469400 scontext=staff_u:staff_r:staff_userhelper_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163787530.338:13974): arch=40000003 syscall=33 success=yes exit=0 a0=bf99ef0e a1=2 a2=bf99dfc0 a3=0 items=0 ppid=18382 pid=18383 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_userhelper_t:s0 key=(null) type=AVC msg=audit(1163787530.338:13975): avc: denied { read } for pid=18383 comm="xauth" name=".gdm0UWNIT" dev=dm-0 ino=14469400 scontext=staff_u:staff_r:staff_userhelper_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163787530.338:13975): arch=40000003 syscall=5 success=yes exit=2 a0=bf99ef0e a1=0 a2=1b6 a3=8f3a008 items=0 ppid=18382 pid=18383 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_userhelper_t:s0 key=(null) type=AVC msg=audit(1163787530.338:13976): avc: denied { getattr } for pid=18383 comm="xauth" name=".gdm0UWNIT" dev=dm-0 ino=14469400 scontext=staff_u:staff_r:staff_userhelper_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163787530.338:13976): arch=40000003 syscall=197 success=yes exit=0 a0=2 a1=bf99dd0c a2=256ff4 a3=8f3a008 items=0 ppid=18382 pid=18383 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_userhelper_t:s0 key=(null) type=AVC_PATH msg=audit(1163787530.338:13976): path="/tmp/.gdm0UWNIT" type=AVC msg=audit(1163787530.338:13977): avc: denied { remove_name } for pid=18383 comm="xauth" name=".gdm0UWNIT-c" dev=dm-0 ino=14469449 scontext=staff_u:staff_r:staff_userhelper_t:s0 tcontext=system_u:object_r:tmp_t:s0 tclass=dir type=AVC msg=audit(1163787530.338:13977): avc: denied { unlink } for pid=18383 comm="xauth" name=".gdm0UWNIT-c" dev=dm-0 ino=14469449 scontext=staff_u:staff_r:staff_userhelper_t:s0 tcontext=staff_u:object_r:tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163787530.338:13977): arch=40000003 syscall=10 success=yes exit=0 a0=bf99d687 a1=bf99d296 a2=da3a64 a3=bf99d286 items=0 ppid=18382 pid=18383 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_userhelper_t:s0 key=(null) type=AVC msg=audit(1163787530.338:13978): avc: denied { write } for pid=18382 comm="userhelper" name="root" dev=dm-0 ino=13127137 scontext=staff_u:staff_r:staff_userhelper_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1163787530.338:13978): avc: denied { add_name } for pid=18382 comm="userhelper" name=".xauth6LUkFr" scontext=staff_u:staff_r:staff_userhelper_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1163787530.338:13978): avc: denied { create } for pid=18382 comm="userhelper" name=".xauth6LUkFr" scontext=staff_u:staff_r:staff_userhelper_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163787530.338:13978): arch=40000003 syscall=5 success=yes exit=5 a0=9752ea3 a1=80c2 a2=180 a3=80c2 items=0 ppid=18381 pid=18382 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=(none) comm="userhelper" exe="/usr/sbin/userhelper" subj=staff_u:staff_r:staff_userhelper_t:s0 key=(null) type=AVC msg=audit(1163787530.362:13979): avc: denied { setattr } for pid=18382 comm="userhelper" name=".xauth6LUkFr" dev=dm-0 ino=13127382 scontext=staff_u:staff_r:staff_userhelper_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163787530.362:13979): arch=40000003 syscall=207 success=yes exit=0 a0=5 a1=0 a2=0 a3=1565bf items=0 ppid=18381 pid=18382 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=(none) comm="userhelper" exe="/usr/sbin/userhelper" subj=staff_u:staff_r:staff_userhelper_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163787530.370:13980): security_compute_sid: invalid context staff_u:staff_r:staff_userhelper_t:s0 for scontext=staff_u:staff_r:staff_userhelper_t:s0 tcontext=system_u:object_r:xauth_exec_t:s0 tclass=process type=SYSCALL msg=audit(1163787530.370:13980): arch=40000003 syscall=11 success=yes exit=0 a0=156681 a1=bfb5812c a2=974cda8 a3=4 items=0 ppid=18382 pid=18384 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_userhelper_t:s0 key=(null) type=AVC msg=audit(1163787530.370:13981): avc: denied { link } for pid=18384 comm="xauth" name=".xauth6LUkFr-c" dev=dm-0 ino=13127386 scontext=staff_u:staff_r:staff_userhelper_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163787530.370:13981): arch=40000003 syscall=9 success=yes exit=0 a0=bff94887 a1=bff94486 a2=da3a64 a3=2 items=0 ppid=18382 pid=18384 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_userhelper_t:s0 key=(null) type=AVC msg=audit(1163787530.374:13982): avc: denied { write } for pid=18384 comm="xauth" name=".xauth6LUkFr" dev=dm-0 ino=13127382 scontext=staff_u:staff_r:staff_userhelper_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163787530.374:13982): arch=40000003 syscall=33 success=yes exit=0 a0=bff94f0a a1=2 a2=bff94db0 a3=0 items=0 ppid=18382 pid=18384 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_userhelper_t:s0 key=(null) type=AVC msg=audit(1163787530.374:13983): avc: denied { read } for pid=18384 comm="xauth" name=".xauth6LUkFr" dev=dm-0 ino=13127382 scontext=staff_u:staff_r:staff_userhelper_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163787530.374:13983): arch=40000003 syscall=5 success=yes exit=2 a0=bff94f0a a1=0 a2=1b6 a3=9ae4008 items=0 ppid=18382 pid=18384 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_userhelper_t:s0 key=(null) type=AVC msg=audit(1163787530.374:13984): avc: denied { getattr } for pid=18384 comm="xauth" name=".xauth6LUkFr" dev=dm-0 ino=13127382 scontext=staff_u:staff_r:staff_userhelper_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163787530.374:13984): arch=40000003 syscall=197 success=yes exit=0 a0=2 a1=bff94afc a2=34dff4 a3=9ae4008 items=0 ppid=18382 pid=18384 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_userhelper_t:s0 key=(null) type=AVC_PATH msg=audit(1163787530.374:13984): path="/root/.xauth6LUkFr" type=AVC msg=audit(1163787530.394:13985): avc: denied { remove_name } for pid=18384 comm="xauth" name=".xauth6LUkFr" dev=dm-0 ino=13127382 scontext=staff_u:staff_r:staff_userhelper_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1163787530.394:13985): avc: denied { unlink } for pid=18384 comm="xauth" name=".xauth6LUkFr" dev=dm-0 ino=13127382 scontext=staff_u:staff_r:staff_userhelper_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163787530.394:13985): arch=40000003 syscall=10 success=yes exit=0 a0=9ae4008 a1=1000 a2=0 a3=9ae408a items=0 ppid=18382 pid=18384 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_userhelper_t:s0 key=(null) type=USER_START msg=audit(1163787530.398:13986): user pid=18382 uid=500 auid=500 subj=staff_u:staff_r:staff_userhelper_t:s0 msg='PAM: session open acct=root : exe="/usr/sbin/userhelper" (hostname=?, addr=?, terminal=? res=success)' type=AVC msg=audit(1163787530.474:13987): avc: denied { append } for pid=18386 comm="system-config-s" name="scsrun.log" dev=dm-0 ino=13061665 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:user_home_t:s0 tclass=file type=SYSCALL msg=audit(1163787530.474:13987): arch=40000003 syscall=5 success=yes exit=3 a0=83c6638 a1=8441 a2=1b6 a3=8441 items=0 ppid=18385 pid=18386 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="system-config-s" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163787530.522:13988): avc: denied { ioctl } for pid=18386 comm="python2" name="scsrun.log" dev=dm-0 ino=13061665 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:user_home_t:s0 tclass=file type=SYSCALL msg=audit(1163787530.522:13988): arch=40000003 syscall=54 success=no exit=-25 a0=1 a1=5401 a2=bfefd968 a3=bfefd9a8 items=0 ppid=18385 pid=18386 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="python2" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163787530.522:13988): path="/root/scsrun.log" type=AVC msg=audit(1163787530.666:13989): avc: denied { read } for pid=18386 comm="python2" name="modules.alias" dev=dm-0 ino=13720583 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:modules_object_t:s0 tclass=file type=SYSCALL msg=audit(1163787530.666:13989): arch=40000003 syscall=5 success=yes exit=6 a0=8183418 a1=0 a2=81e1098 a3=0 items=0 ppid=18385 pid=18386 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="python2" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163787530.702:13990): avc: denied { read } for pid=18386 comm="python2" name="mga.xinf" dev=dm-0 ino=10607363 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:hwdata_t:s0 tclass=file type=SYSCALL msg=audit(1163787530.702:13990): arch=40000003 syscall=5 success=yes exit=7 a0=820c060 a1=0 a2=a a3=820b002 items=0 ppid=18385 pid=18386 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="python2" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163787531.198:13991): avc: denied { read } for pid=18386 comm="python2" name=".xauth6LUkFr" dev=dm-0 ino=13127398 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163787531.198:13991): arch=40000003 syscall=33 success=yes exit=0 a0=bfefdfc5 a1=4 a2=da3a64 a3=bfefdfc5 items=0 ppid=18385 pid=18386 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="python2" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163787531.286:13992): avc: denied { dac_override } for pid=18386 comm="python2" capability=1 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=capability type=SYSCALL msg=audit(1163787531.286:13992): arch=40000003 syscall=5 success=no exit=-2 a0=83dce88 a1=8000 a2=1b6 a3=83d7198 items=0 ppid=18385 pid=18386 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="python2" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163787531.682:13993): avc: denied { syslog_console } for pid=18386 comm="python2" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=system type=SYSCALL msg=audit(1163787531.682:13993): arch=40000003 syscall=103 success=yes exit=0 a0=8 a1=0 a2=1 a3=aca369 items=0 ppid=18385 pid=18386 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="python2" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163787539.130:13994): avc: denied { execute } for pid=18392 comm="python2" name="modprobe" dev=dm-0 ino=9984520 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:insmod_exec_t:s0 tclass=file type=AVC msg=audit(1163787539.130:13994): avc: denied { execute_no_trans } for pid=18392 comm="python2" name="modprobe" dev=dm-0 ino=9984520 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:insmod_exec_t:s0 tclass=file type=AVC msg=audit(1163787539.130:13994): avc: denied { read } for pid=18392 comm="python2" name="modprobe" dev=dm-0 ino=9984520 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:insmod_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163787539.130:13994): arch=40000003 syscall=11 success=yes exit=0 a0=8750d70 a1=8750b90 a2=bfefdc90 a3=8184d18 items=0 ppid=18386 pid=18392 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="modprobe" exe="/sbin/modprobe" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163787539.130:13994): path="/sbin/modprobe" type=AVC_PATH msg=audit(1163787539.130:13994): path="/sbin/modprobe" type=AVC msg=audit(1163787539.250:13995): avc: denied { read write } for pid=18392 comm="modprobe" name="snd.ko" dev=dm-0 ino=13720454 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:modules_object_t:s0 tclass=file type=SYSCALL msg=audit(1163787539.250:13995): arch=40000003 syscall=5 success=yes exit=3 a0=9aec0bc a1=2 a2=0 a3=9aec0bc items=0 ppid=18386 pid=18392 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="modprobe" exe="/sbin/modprobe" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163787539.294:13996): avc: denied { lock } for pid=18392 comm="modprobe" name="snd.ko" dev=dm-0 ino=13720454 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:modules_object_t:s0 tclass=file type=SYSCALL msg=audit(1163787539.294:13996): arch=40000003 syscall=221 success=yes exit=0 a0=3 a1=7 a2=bfcd1ec0 a3=bfcd1ec0 items=0 ppid=18386 pid=18392 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="modprobe" exe="/sbin/modprobe" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163787539.294:13996): path="/lib/modules/2.6.18-1.2849.fc6xen/kernel/sound/core/snd.ko" type=AVC msg=audit(1163787557.768:13997): avc: denied { write } for pid=18393 comm="system-config-s" name="scsconfig.log" dev=dm-0 ino=13061681 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:user_home_t:s0 tclass=file type=SYSCALL msg=audit(1163787557.768:13997): arch=40000003 syscall=5 success=yes exit=3 a0=84c5450 a1=8241 a2=1b6 a3=8241 items=0 ppid=18386 pid=18393 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="system-config-s" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=USER_END msg=audit(1163787563.272:13998): user pid=18382 uid=500 auid=500 subj=staff_u:staff_r:staff_userhelper_t:s0 msg='PAM: session close acct=root : exe="/usr/sbin/userhelper" (hostname=?, addr=?, terminal=? res=success)' type=AVC msg=audit(1163787586.537:13999): avc: denied { write } for pid=18412 comm="vi" name="modprobe.conf" dev=dm-0 ino=9331083 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_runtime_t:s0 tclass=file type=SYSCALL msg=audit(1163787586.537:13999): arch=40000003 syscall=33 success=yes exit=0 a0=9da4040 a1=2 a2=1a4 a3=1 items=0 ppid=16590 pid=18412 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="vi" exe="/bin/vi" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163787586.541:14000): avc: denied { write } for pid=18412 comm="vi" name="etc" dev=dm-0 ino=9329761 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=dir type=AVC msg=audit(1163787586.541:14000): avc: denied { add_name } for pid=18412 comm="vi" name=".modprobe.conf.swp" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=dir type=AVC msg=audit(1163787586.541:14000): avc: denied { create } for pid=18412 comm="vi" name=".modprobe.conf.swp" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1163787586.541:14000): arch=40000003 syscall=5 success=yes exit=4 a0=9da6140 a1=80c2 a2=180 a3=80c2 items=0 ppid=16590 pid=18412 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="vi" exe="/bin/vi" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163787586.541:14001): avc: denied { remove_name } for pid=18412 comm="vi" name=".modprobe.conf.swx" dev=dm-0 ino=9331575 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=dir type=AVC msg=audit(1163787586.541:14001): avc: denied { unlink } for pid=18412 comm="vi" name=".modprobe.conf.swx" dev=dm-0 ino=9331575 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1163787586.541:14001): arch=40000003 syscall=10 success=yes exit=0 a0=9da6128 a1=2b3 a2=5 a3=9da6152 items=0 ppid=16590 pid=18412 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="vi" exe="/bin/vi" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163787586.541:14002): avc: denied { write } for pid=18412 comm="vi" name=".modprobe.conf.swp" dev=dm-0 ino=9331140 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1163787586.541:14002): arch=40000003 syscall=4 success=yes exit=4096 a0=4 a1=9db32d8 a2=1000 a3=1 items=0 ppid=16590 pid=18412 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="vi" exe="/bin/vi" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163787586.541:14002): path="/etc/.modprobe.conf.swp" type=AVC msg=audit(1163787586.541:14003): avc: denied { setattr } for pid=18412 comm="vi" name=".modprobe.conf.swp" dev=dm-0 ino=9331140 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1163787586.541:14003): arch=40000003 syscall=15 success=yes exit=0 a0=9da6140 a1=1a4 a2=1a4 a3=1 items=0 ppid=16590 pid=18412 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="vi" exe="/bin/vi" subj=staff_u:staff_r:staff_t:s0 key=(null) type=USER_ACCT msg=audit(1163787602.002:14004): user pid=18415 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1163787602.002:14005): login pid=18415 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1163787602.006:14006): user pid=18415 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1163787602.006:14007): user pid=18415 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1163787602.010:14008): avc: denied { execute } for pid=18416 comm="sh" name="sa1" dev=dm-0 ino=12865251 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:lib_t:s0 tclass=file type=AVC msg=audit(1163787602.010:14008): avc: denied { execute_no_trans } for pid=18416 comm="sh" name="sa1" dev=dm-0 ino=12865251 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1163787602.010:14008): arch=40000003 syscall=11 success=yes exit=0 a0=859f1b0 a1=859f358 a2=859f290 a3=859f008 items=0 ppid=18415 pid=18416 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sa1" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163787602.010:14008): path="/usr/lib/sa/sa1" type=AVC msg=audit(1163787602.022:14009): avc: denied { execute } for pid=18416 comm="sa1" name="sadc" dev=dm-0 ino=12865253 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=AVC msg=audit(1163787602.022:14009): avc: denied { execute_no_trans } for pid=18416 comm="sa1" name="sadc" dev=dm-0 ino=12865253 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=AVC msg=audit(1163787602.022:14009): avc: denied { read } for pid=18416 comm="sa1" name="sadc" dev=dm-0 ino=12865253 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163787602.022:14009): arch=40000003 syscall=11 success=yes exit=0 a0=859fd48 a1=859f740 a2=859fd60 a3=859f740 items=0 ppid=18415 pid=18416 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163787602.022:14009): path="/usr/lib/sa/sadc" type=AVC_PATH msg=audit(1163787602.022:14009): path="/usr/lib/sa/sadc" type=AVC msg=audit(1163787602.026:14010): avc: denied { search } for pid=18416 comm="sadc" name="sa" dev=dm-0 ino=14607631 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=dir type=SYSCALL msg=audit(1163787602.026:14010): arch=40000003 syscall=33 success=yes exit=0 a0=bfadefb4 a1=0 a2=bfadeea8 a3=bfadeeb0 items=0 ppid=18415 pid=18416 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163787602.026:14011): avc: denied { read append } for pid=18416 comm="sadc" name="sa17" dev=dm-0 ino=14600257 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=file type=SYSCALL msg=audit(1163787602.026:14011): arch=40000003 syscall=5 success=yes exit=3 a0=bfadefb4 a1=402 a2=bfadf178 a3=bfadeeb0 items=0 ppid=18415 pid=18416 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163787602.026:14012): avc: denied { search } for pid=18416 comm="sadc" name="fs" dev=proc ino=-268435428 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=dir type=SYSCALL msg=audit(1163787602.026:14012): arch=40000003 syscall=5 success=yes exit=4 a0=80502ef a1=0 a2=1b6 a3=8901348 items=0 ppid=18415 pid=18416 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163787602.030:14013): avc: denied { search } for pid=18416 comm="sadc" name="rpc" dev=proc ino=-268433616 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_rpc_t:s0 tclass=dir type=SYSCALL msg=audit(1163787602.030:14013): arch=40000003 syscall=5 success=no exit=-2 a0=8050215 a1=0 a2=1b6 a3=8901348 items=0 ppid=18415 pid=18416 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163787602.030:14014): avc: denied { lock } for pid=18416 comm="sadc" name="sa17" dev=dm-0 ino=14600257 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=file type=SYSCALL msg=audit(1163787602.030:14014): arch=40000003 syscall=143 success=yes exit=0 a0=3 a1=6 a2=bfadeeb0 a3=3 items=0 ppid=18415 pid=18416 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163787602.030:14014): path="/var/log/sa/sa17" type=CRED_DISP msg=audit(1163787602.038:14015): user pid=18415 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1163787602.038:14016): user pid=18415 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1163787610.395:14017): avc: denied { rename } for pid=18412 comm="vi" name="modprobe.conf" dev=dm-0 ino=9331083 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_runtime_t:s0 tclass=file type=SYSCALL msg=audit(1163787610.395:14017): arch=40000003 syscall=38 success=yes exit=0 a0=9da4040 a1=9da61d8 a2=9da61d8 a3=9da4040 items=0 ppid=16590 pid=18412 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="vi" exe="/bin/vi" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163787610.403:14018): avc: denied { relabelfrom } for pid=18412 comm="vi" name="modprobe.conf" dev=dm-0 ino=9331575 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:etc_t:s0 tclass=file type=AVC msg=audit(1163787610.403:14018): avc: denied { relabelto } for pid=18412 comm="vi" name="modprobe.conf" dev=dm-0 ino=9331575 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_runtime_t:s0 tclass=file type=SYSCALL msg=audit(1163787610.403:14018): arch=40000003 syscall=226 success=yes exit=0 a0=9da4040 a1=a2f0d3 a2=9da5358 a3=23 items=0 ppid=16590 pid=18412 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="vi" exe="/bin/vi" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163787610.403:14019): avc: denied { setattr } for pid=18412 comm="vi" name="modprobe.conf" dev=dm-0 ino=9331575 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_runtime_t:s0 tclass=file type=SYSCALL msg=audit(1163787610.403:14019): arch=40000003 syscall=15 success=yes exit=0 a0=9da4040 a1=81a4 a2=1 a3=0 items=0 ppid=16590 pid=18412 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="vi" exe="/bin/vi" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163787610.403:14020): avc: denied { unlink } for pid=18412 comm="vi" name="modprobe.conz~" dev=dm-0 ino=9331083 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_runtime_t:s0 tclass=file type=SYSCALL msg=audit(1163787610.403:14020): arch=40000003 syscall=10 success=yes exit=0 a0=9da61d8 a1=9da61d8 a2=1 a3=0 items=0 ppid=16590 pid=18412 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="vi" exe="/bin/vi" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163788069.316:14021): avc: denied { getattr } for pid=18433 comm="evolution" name=".evolution" dev=dm-0 ino=6776355 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_evolution_home_t:s0 tclass=dir type=SYSCALL msg=audit(1163788069.316:14021): arch=40000003 syscall=195 success=yes exit=0 a0=91f4a10 a1=b2c8f0cc a2=758aff4 a3=4 items=0 ppid=1 pid=18433 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163788069.316:14021): path="/home/kmacmill/.evolution" type=AVC msg=audit(1163788069.316:14022): avc: denied { search } for pid=18433 comm="evolution" name=".evolution" dev=dm-0 ino=6776355 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_evolution_home_t:s0 tclass=dir type=SYSCALL msg=audit(1163788069.316:14022): arch=40000003 syscall=33 success=yes exit=0 a0=91f4a10 a1=0 a2=bae708 a3=10 items=0 ppid=1 pid=18433 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163788069.316:14023): avc: denied { read } for pid=18433 comm="evolution" name="INBOX" dev=dm-0 ino=6809503 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_evolution_home_t:s0 tclass=dir type=SYSCALL msg=audit(1163788069.316:14023): arch=40000003 syscall=5 success=yes exit=25 a0=9215ed0 a1=18800 a2=758c120 a3=9215ed0 items=0 ppid=1 pid=18433 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163788070.660:14024): avc: denied { write } for pid=18433 comm="evolution" name="memos" dev=dm-0 ino=6814327 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_evolution_home_t:s0 tclass=dir type=AVC msg=audit(1163788070.660:14024): avc: denied { add_name } for pid=18433 comm="evolution" name="summary~" scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_evolution_home_t:s0 tclass=dir type=SYSCALL msg=audit(1163788070.660:14024): arch=40000003 syscall=5 success=yes exit=43 a0=b2c8efe0 a1=242 a2=180 a3=9240268 items=0 ppid=1 pid=18433 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163788070.676:14025): avc: denied { remove_name } for pid=18433 comm="evolution" name="summary~" dev=dm-0 ino=6815422 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_evolution_home_t:s0 tclass=dir type=SYSCALL msg=audit(1163788070.676:14025): arch=40000003 syscall=38 success=yes exit=0 a0=b2c8efe0 a1=9240268 a2=1dcbd8 a3=8c3c7bc items=0 ppid=1 pid=18433 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=USER_ACCT msg=audit(1163788201.080:14026): user pid=18445 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1163788201.080:14027): login pid=18445 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1163788201.080:14028): user pid=18445 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1163788201.080:14029): user pid=18445 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1163788201.100:14030): user pid=18445 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1163788201.100:14031): user pid=18445 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1163788520.688:14032): avc: denied { write } for pid=16541 comm="firefox-bin" name="tmp" dev=dm-0 ino=14469313 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:tmp_t:s0 tclass=dir type=AVC msg=audit(1163788520.688:14032): avc: denied { add_name } for pid=16541 comm="firefox-bin" name="5e6k208m" scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:tmp_t:s0 tclass=dir type=AVC msg=audit(1163788520.688:14032): avc: denied { create } for pid=16541 comm="firefox-bin" name="5e6k208m" scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163788520.688:14032): arch=40000003 syscall=5 success=yes exit=23 a0=b999b68 a1=82c1 a2=180 a3=82c1 items=0 ppid=1 pid=16541 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163788520.688:14033): avc: denied { write } for pid=16541 comm="firefox-bin" name="5e6k208m" dev=dm-0 ino=14469449 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163788520.688:14033): arch=40000003 syscall=5 success=yes exit=23 a0=b999b68 a1=8041 a2=180 a3=8041 items=0 ppid=1 pid=16541 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163788523.588:14034): avc: denied { getattr } for pid=16541 comm="firefox-bin" name="15.pdf" dev=dm-0 ino=14469568 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163788523.588:14034): arch=40000003 syscall=195 success=yes exit=0 a0=c76bca8 a1=bfad2d70 a2=10b0ff4 a3=bfad2d70 items=0 ppid=1 pid=16541 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163788523.588:14034): path="/tmp/15.pdf" type=AVC msg=audit(1163788523.588:14035): avc: denied { remove_name } for pid=16541 comm="firefox-bin" name="15.pdf" dev=dm-0 ino=14469568 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:tmp_t:s0 tclass=dir type=AVC msg=audit(1163788523.588:14035): avc: denied { unlink } for pid=16541 comm="firefox-bin" name="15.pdf" dev=dm-0 ino=14469568 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163788523.588:14035): arch=40000003 syscall=10 success=yes exit=0 a0=c76bca8 a1=0 a2=4a4e304 a3=0 items=0 ppid=1 pid=16541 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163788523.588:14036): avc: denied { rename } for pid=16541 comm="firefox-bin" name="5e6k208m" dev=dm-0 ino=14469449 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163788523.588:14036): arch=40000003 syscall=38 success=yes exit=0 a0=b999b68 a1=bfad2e3c a2=4a4e304 a3=0 items=0 ppid=1 pid=16541 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163788523.900:14037): avc: denied { read } for pid=18462 comm="evince" name=".gdm0UWNIT" dev=dm-0 ino=14469400 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163788523.900:14037): arch=40000003 syscall=33 success=yes exit=0 a0=bf852f48 a1=4 a2=da3a64 a3=bf852f48 items=0 ppid=16541 pid=18462 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evince" exe="/usr/bin/evince" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163788523.900:14038): avc: denied { getattr } for pid=18462 comm="evince" name=".gdm0UWNIT" dev=dm-0 ino=14469400 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163788523.900:14038): arch=40000003 syscall=197 success=yes exit=0 a0=11 a1=bf85064c a2=f35ff4 a3=8800160 items=0 ppid=16541 pid=18462 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evince" exe="/usr/bin/evince" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163788523.900:14038): path="/tmp/.gdm0UWNIT" type=AVC msg=audit(1163788524.032:14039): avc: denied { search } for pid=18462 comm="evince" name=".ICE-unix" dev=dm-0 ino=14567572 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:ice_tmp_t:s0 tclass=dir type=AVC msg=audit(1163788524.032:14039): avc: denied { write } for pid=18462 comm="evince" name="15931" dev=dm-0 ino=14567724 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:ice_tmp_t:s0 tclass=sock_file type=SYSCALL msg=audit(1163788524.032:14039): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=bf850750 a2=df7770 a3=16 items=0 ppid=16541 pid=18462 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evince" exe="/usr/bin/evince" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163788524.032:14040): avc: denied { read } for pid=18462 comm="evince" name=".ICEauthority" dev=dm-0 ino=6574784 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163788524.032:14040): arch=40000003 syscall=33 success=yes exit=0 a0=88243f0 a1=4 a2=df7770 a3=88243f0 items=0 ppid=16541 pid=18462 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evince" exe="/usr/bin/evince" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163788524.032:14041): avc: denied { getattr } for pid=18462 comm="evince" name=".ICEauthority" dev=dm-0 ino=6574784 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163788524.032:14041): arch=40000003 syscall=197 success=yes exit=0 a0=2a a1=bf8507ec a2=f35ff4 a3=8824ce0 items=0 ppid=16541 pid=18462 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evince" exe="/usr/bin/evince" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163788524.032:14041): path="/home/kmacmill/.ICEauthority" type=AVC msg=audit(1163788524.860:14042): avc: denied { read } for pid=18463 comm="evince" name="15.pdf" dev=dm-0 ino=14469449 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163788524.860:14042): arch=40000003 syscall=5 success=yes exit=59 a0=8a07a38 a1=8000 a2=1b6 a3=8a15668 items=0 ppid=16541 pid=18463 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evince" exe="/usr/bin/evince" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163788525.116:14043): avc: denied { create } for pid=18462 comm="evince" name=".recently-used.xbel.Y9V8IT" scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163788525.116:14043): arch=40000003 syscall=5 success=yes exit=60 a0=8a531e8 a1=80c2 a2=1b6 a3=80c2 items=0 ppid=16541 pid=18462 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evince" exe="/usr/bin/evince" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163788525.120:14044): avc: denied { write } for pid=18462 comm="evince" name=".recently-used.xbel.Y9V8IT" dev=dm-0 ino=6573261 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163788525.120:14044): arch=40000003 syscall=4 success=yes exit=102400 a0=3c a1=8a53c38 a2=19000 a3=19000 items=0 ppid=16541 pid=18462 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evince" exe="/usr/bin/evince" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163788525.120:14044): path="/home/kmacmill/.recently-used.xbel.Y9V8IT" type=AVC msg=audit(1163788525.120:14045): avc: denied { rename } for pid=18462 comm="evince" name=".recently-used.xbel.Y9V8IT" dev=dm-0 ino=6573261 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_home_dir_t:s0 tclass=file type=AVC msg=audit(1163788525.120:14045): avc: denied { unlink } for pid=18462 comm="evince" name=".recently-used.xbel" dev=dm-0 ino=11885042 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163788525.120:14045): arch=40000003 syscall=38 success=yes exit=0 a0=8a52d98 a1=886f550 a2=7b1708 a3=b7f9e8cc items=0 ppid=16541 pid=18462 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evince" exe="/usr/bin/evince" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163788526.164:14046): avc: denied { read } for pid=16429 comm="gnome-panel" name=".recently-used.xbel" dev=dm-0 ino=6573261 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:staff_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163788526.164:14046): arch=40000003 syscall=5 success=yes exit=31 a0=8d54aa0 a1=8000 a2=0 a3=8000 items=0 ppid=1 pid=16429 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-panel" exe="/usr/bin/gnome-panel" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163788669.349:14047): avc: denied { read } for pid=15069 comm="vpnc" name="tun" dev=tmpfs ino=1473 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:tun_tap_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163788669.349:14047): arch=40000003 syscall=3 success=yes exit=94 a0=4 a1=805c5a0 a2=1000 a3=805c5a0 items=0 ppid=15067 pid=15069 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vpnc" exe="/usr/sbin/vpnc" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163788669.349:14047): path="/dev/net/tun" type=AVC msg=audit(1163788669.413:14048): avc: denied { write } for pid=15069 comm="vpnc" name="tun" dev=tmpfs ino=1473 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:tun_tap_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163788669.413:14048): arch=40000003 syscall=4 success=yes exit=52 a0=4 a1=805c570 a2=34 a3=bfd587e4 items=0 ppid=15067 pid=15069 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vpnc" exe="/usr/sbin/vpnc" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163788669.413:14048): path="/dev/net/tun" type=USER_ACCT msg=audit(1163788801.141:14049): user pid=18478 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1163788801.141:14050): login pid=18478 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1163788801.141:14051): user pid=18478 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1163788801.141:14052): user pid=18478 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1163788801.169:14053): user pid=18478 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1163788801.169:14054): user pid=18478 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1163789401.211:14055): user pid=18502 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1163789401.211:14056): login pid=18502 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1163789401.211:14057): user pid=18502 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1163789401.211:14058): user pid=18502 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1163789401.231:14059): user pid=18502 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1163789401.231:14060): user pid=18502 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1163789555.316:14061): avc: denied { read } for pid=11049 comm="udevd" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=netlink_kobject_uevent_socket type=SYSCALL msg=audit(1163789555.316:14061): arch=40000003 syscall=102 success=yes exit=165 a0=a a1=bfedb480 a2=791234 a3=0 items=0 ppid=1 pid=11049 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="udevd" exe="/sbin/udevd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163789555.316:14062): avc: denied { write } for pid=11049 comm="udevd" name="uevent_seqnum" dev=tmpfs ino=1522 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:udev_tbl_t:s0 tclass=file type=SYSCALL msg=audit(1163789555.316:14062): arch=40000003 syscall=5 success=yes exit=9 a0=bfee5668 a1=8241 a2=1a4 a3=8241 items=0 ppid=1 pid=11049 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="udevd" exe="/sbin/udevd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163789555.316:14063): avc: denied { write } for pid=11049 comm="udevd" name=".udev" dev=tmpfs ino=1521 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:device_t:s0 tclass=dir type=AVC msg=audit(1163789555.316:14063): avc: denied { remove_name } for pid=11049 comm="udevd" name="failed" dev=tmpfs ino=3876 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:device_t:s0 tclass=dir type=AVC msg=audit(1163789555.316:14063): avc: denied { rmdir } for pid=11049 comm="udevd" name="failed" dev=tmpfs ino=3876 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:device_t:s0 tclass=dir type=SYSCALL msg=audit(1163789555.316:14063): arch=40000003 syscall=40 success=no exit=-39 a0=bfedae88 a1=2f2f2f2f a2=791234 a3=bfedae92 items=0 ppid=1 pid=11049 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="udevd" exe="/sbin/udevd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163789555.316:14064): avc: denied { add_name } for pid=11049 comm="udevd" name="queue" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:device_t:s0 tclass=dir type=AVC msg=audit(1163789555.316:14064): avc: denied { create } for pid=11049 comm="udevd" name="queue" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:device_t:s0 tclass=dir type=SYSCALL msg=audit(1163789555.316:14064): arch=40000003 syscall=39 success=yes exit=0 a0=bfedae8c a1=1ed a2=791234 a3=bfedae8c items=0 ppid=1 pid=11049 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="udevd" exe="/sbin/udevd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163789555.316:14065): avc: denied { write } for pid=11049 comm="udevd" name="queue" dev=tmpfs ino=217561 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:device_t:s0 tclass=dir type=AVC msg=audit(1163789555.316:14065): avc: denied { add_name } for pid=11049 comm="udevd" name="devices@pci0000:00@0000:00:1d.3@usb4@4-1" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:device_t:s0 tclass=dir type=AVC msg=audit(1163789555.316:14065): avc: denied { create } for pid=11049 comm="udevd" name="devices@pci0000:00@0000:00:1d.3@usb4@4-1" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:device_t:s0 tclass=file type=SYSCALL msg=audit(1163789555.316:14065): arch=40000003 syscall=5 success=yes exit=9 a0=bfedb2c8 a1=8241 a2=1a4 a3=8241 items=0 ppid=1 pid=11049 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="udevd" exe="/sbin/udevd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163789555.316:14066): avc: denied { write } for pid=11049 comm="udevd" name=".udev" dev=tmpfs ino=1521 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:device_t:s0 tclass=dir type=AVC msg=audit(1163789555.316:14066): avc: denied { remove_name } for pid=11049 comm="udevd" name="failed" dev=tmpfs ino=3876 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:device_t:s0 tclass=dir type=AVC msg=audit(1163789555.316:14066): avc: denied { rmdir } for pid=11049 comm="udevd" name="failed" dev=tmpfs ino=3876 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:device_t:s0 tclass=dir type=SYSCALL msg=audit(1163789555.316:14066): arch=40000003 syscall=40 success=no exit=-39 a0=bfedae88 a1=2f2f2f2f a2=791234 a3=bfedae92 items=0 ppid=1 pid=11049 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="udevd" exe="/sbin/udevd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163789555.396:14067): avc: denied { sendto } for pid=18508 comm="udevd" path=002F6F72672F667265656465736B746F702F68616C2F756465765F6576656E74 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:hald_t:s0 tclass=unix_dgram_socket type=SYSCALL msg=audit(1163789555.396:14067): arch=40000003 syscall=102 success=yes exit=201 a0=b a1=bfed27a0 a2=791234 a3=c9 items=0 ppid=11049 pid=18508 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="udevd" exe="/sbin/udevd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163789555.400:14068): avc: denied { remove_name } for pid=11049 comm="udevd" name="devices@pci0000:00@0000:00:1d.3@usb4@4-1" dev=tmpfs ino=217562 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:device_t:s0 tclass=dir type=AVC msg=audit(1163789555.400:14068): avc: denied { unlink } for pid=11049 comm="udevd" name="devices@pci0000:00@0000:00:1d.3@usb4@4-1" dev=tmpfs ino=217562 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:device_t:s0 tclass=file type=SYSCALL msg=audit(1163789555.400:14068): arch=40000003 syscall=10 success=yes exit=0 a0=bfedb2b8 a1=ffffffff a2=791234 a3=791418 items=0 ppid=1 pid=11049 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="udevd" exe="/sbin/udevd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163789555.400:14069): avc: denied { rmdir } for pid=11049 comm="udevd" name="queue" dev=tmpfs ino=217561 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:device_t:s0 tclass=dir type=SYSCALL msg=audit(1163789555.400:14069): arch=40000003 syscall=40 success=no exit=-39 a0=bfedae78 a1=2f2f2f2f a2=791234 a3=bfedae82 items=0 ppid=1 pid=11049 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="udevd" exe="/sbin/udevd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163789555.408:14070): avc: denied { execute } for pid=18513 comm="udevd" name="modprobe" dev=dm-0 ino=9984520 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:insmod_exec_t:s0 tclass=file type=AVC msg=audit(1163789555.408:14070): avc: denied { execute_no_trans } for pid=18513 comm="udevd" name="modprobe" dev=dm-0 ino=9984520 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:insmod_exec_t:s0 tclass=file type=AVC msg=audit(1163789555.408:14070): avc: denied { read } for pid=18513 comm="udevd" name="modprobe" dev=dm-0 ino=9984520 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:insmod_exec_t:s0 tclass=file type=AVC msg=audit(1163789555.408:14071): avc: denied { mknod } for pid=18511 comm="udevd" capability=27 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=capability type=AVC msg=audit(1163789555.408:14071): avc: denied { add_name } for pid=18511 comm="udevd" name="usbdev4.3_ep00" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:device_t:s0 tclass=dir type=AVC msg=audit(1163789555.408:14071): avc: denied { create } for pid=18511 comm="udevd" name="usbdev4.3_ep00" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:usb_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163789555.408:14071): arch=40000003 syscall=14 success=yes exit=0 a0=bfed2dc4 a1=2180 a2=181ba02 a3=180 items=0 ppid=11049 pid=18511 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="udevd" exe="/sbin/udevd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163789555.408:14072): avc: denied { setattr } for pid=18511 comm="udevd" name="usbdev4.3_ep00" dev=tmpfs ino=217621 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:usb_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163789555.408:14072): arch=40000003 syscall=15 success=yes exit=0 a0=bfed2dc4 a1=2180 a2=791234 a3=0 items=0 ppid=11049 pid=18511 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="udevd" exe="/sbin/udevd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163789555.408:14073): avc: denied { create } for pid=18511 comm="udevd" name="devices@pci0000:00@0000:00:1d.3@usb4@4-1@usbdev4.3_ep00" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:device_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163789555.408:14073): arch=40000003 syscall=83 success=yes exit=0 a0=9526ccc a1=bfed2dc8 a2=791234 a3=bfed2dc8 items=0 ppid=11049 pid=18511 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="udevd" exe="/sbin/udevd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=SYSCALL msg=audit(1163789555.408:14070): arch=40000003 syscall=11 success=yes exit=0 a0=bfed2e48 a1=bfed23ac a2=9526298 a3=3 items=0 ppid=18512 pid=18513 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="modprobe" exe="/sbin/modprobe" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163789555.408:14070): path="/sbin/modprobe" type=AVC_PATH msg=audit(1163789555.408:14070): path="/sbin/modprobe" type=AVC msg=audit(1163789555.412:14074): avc: denied { read } for pid=18513 comm="modprobe" name="modules.dep" dev=dm-0 ino=13720574 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:modules_object_t:s0 tclass=file type=SYSCALL msg=audit(1163789555.412:14074): arch=40000003 syscall=5 success=yes exit=3 a0=9fd4118 a1=0 a2=1b6 a3=9fd4300 items=0 ppid=18512 pid=18513 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="modprobe" exe="/sbin/modprobe" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163789555.496:14075): avc: denied { rename } for pid=11049 comm="udevd" name="devices@pci0000:00@0000:00:1d.3@usb4@4-1@4-1:1.0" dev=tmpfs ino=217572 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:device_t:s0 tclass=file type=SYSCALL msg=audit(1163789555.496:14075): arch=40000003 syscall=38 success=yes exit=0 a0=bfedb2b8 a1=bfedb0b8 a2=791234 a3=bfedb0b8 items=0 ppid=1 pid=11049 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="udevd" exe="/sbin/udevd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163789555.484:14076): avc: denied { execute } for pid=18516 comm="udevd" name="pam_console_apply" dev=dm-0 ino=9984592 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:pam_console_exec_t:s0 tclass=file type=AVC msg=audit(1163789555.508:14077): avc: denied { execute } for pid=18524 comm="udevd" name="pam_console_apply" dev=dm-0 ino=9984592 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:pam_console_exec_t:s0 tclass=file type=AVC msg=audit(1163789555.484:14076): avc: denied { execute_no_trans } for pid=18516 comm="udevd" name="pam_console_apply" dev=dm-0 ino=9984592 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:pam_console_exec_t:s0 tclass=file type=AVC msg=audit(1163789555.484:14076): avc: denied { read } for pid=18516 comm="udevd" name="pam_console_apply" dev=dm-0 ino=9984592 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:pam_console_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163789555.484:14076): arch=40000003 syscall=11 success=yes exit=0 a0=bfed2e48 a1=bfed23ac a2=9526298 a3=3 items=0 ppid=18511 pid=18516 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="pam_console_app" exe="/sbin/pam_console_apply" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163789555.484:14076): path="/sbin/pam_console_apply" type=AVC_PATH msg=audit(1163789555.484:14076): path="/sbin/pam_console_apply" type=SYSCALL msg=audit(1163789555.508:14077): arch=40000003 syscall=11 success=yes exit=0 a0=bfed2e48 a1=bfed23ac a2=9526298 a3=3 items=0 ppid=18519 pid=18524 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="pam_console_app" exe="/sbin/pam_console_apply" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163789555.740:14078): avc: denied { read } for pid=18516 comm="pam_console_app" name="console.lock" dev=dm-0 ino=14437305 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:pam_var_console_t:s0 tclass=file type=SYSCALL msg=audit(1163789555.740:14078): arch=40000003 syscall=5 success=yes exit=3 a0=804c1fc a1=8000 a2=0 a3=8000 items=0 ppid=18511 pid=18516 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="pam_console_app" exe="/sbin/pam_console_apply" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163789593.139:14079): avc: denied { execmem } for pid=18532 comm="gnome-screensav" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=process type=SYSCALL msg=audit(1163789593.139:14079): arch=40000003 syscall=192 success=yes exit=81354752 a0=4d96000 a1=1a000 a2=7 a3=812 items=0 ppid=16501 pid=18532 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-screensav" exe="/usr/libexec/gnome-screensaver-gl-helper" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163789593.139:14080): avc: denied { execstack } for pid=18532 comm="gnome-screensav" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=process type=SYSCALL msg=audit(1163789593.139:14080): arch=40000003 syscall=125 success=yes exit=0 a0=bff9b000 a1=1000 a2=1000007 a3=fffff000 items=0 ppid=16501 pid=18532 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-screensav" exe="/usr/libexec/gnome-screensaver-gl-helper" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163789593.163:14081): avc: denied { execute } for pid=18532 comm="gnome-screensav" name="zero" dev=tmpfs ino=1493 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:zero_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163789593.163:14081): arch=40000003 syscall=192 success=yes exit=2953216 a0=0 a1=2000 a2=7 a3=2 items=0 ppid=16501 pid=18532 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-screensav" exe="/usr/libexec/gnome-screensaver-gl-helper" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163789593.163:14081): path="/dev/zero" type=AVC msg=audit(1163789593.167:14082): avc: denied { read } for pid=18532 comm="gnome-screensav" name=".gdm0UWNIT" dev=dm-0 ino=14469400 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163789593.167:14082): arch=40000003 syscall=33 success=yes exit=0 a0=bff9ce8e a1=4 a2=da3a64 a3=bff9ce8e items=0 ppid=16501 pid=18532 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-screensav" exe="/usr/libexec/gnome-screensaver-gl-helper" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163789869.328:14083): avc: denied { send_msg } for pid=18541 comm="evolution" saddr=10.11.14.219 src=37722 daddr=10.11.255.15 dest=993 netif=tun0 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:pop_port_t:s0 tclass=tcp_socket type=SYSCALL msg=audit(1163789869.328:14083): arch=40000003 syscall=102 success=yes exit=42 a0=9 a1=aa35aeb0 a2=4932550 a3=0 items=0 ppid=1 pid=18541 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163789869.396:14084): avc: denied { recv_msg } for pid=15069 comm="vpnc" saddr=10.11.255.15 src=993 daddr=10.11.14.219 dest=37722 netif=tun0 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:pop_port_t:s0 tclass=tcp_socket type=SYSCALL msg=audit(1163789869.396:14084): arch=40000003 syscall=4 success=yes exit=52 a0=4 a1=805c570 a2=34 a3=bfd587e4 items=0 ppid=15067 pid=15069 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vpnc" exe="/usr/sbin/vpnc" subj=staff_u:staff_r:staff_t:s0 key=(null) type=USER_ACCT msg=audit(1163790001.272:14085): user pid=18550 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1163790001.276:14086): login pid=18550 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1163790001.276:14087): user pid=18550 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1163790001.276:14088): user pid=18550 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1163790001.292:14089): user pid=18550 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1163790001.292:14090): user pid=18550 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1163790061.312:14091): user pid=18553 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1163790061.312:14092): login pid=18553 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1163790061.312:14093): user pid=18553 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1163790061.312:14094): user pid=18553 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1163790061.328:14095): avc: denied { getattr } for pid=18554 comm="bash" name="run-parts" dev=dm-0 ino=10331890 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1163790061.328:14095): arch=40000003 syscall=195 success=yes exit=0 a0=901b120 a1=bf95a210 a2=f08ff4 a3=901b120 items=0 ppid=18553 pid=18554 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="bash" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163790061.328:14095): path="/usr/bin/run-parts" type=AVC msg=audit(1163790061.328:14096): avc: denied { execute } for pid=18554 comm="bash" name="run-parts" dev=dm-0 ino=10331890 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1163790061.328:14096): arch=40000003 syscall=33 success=yes exit=0 a0=901b120 a1=1 a2=11 a3=901b120 items=0 ppid=18553 pid=18554 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="bash" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163790061.328:14097): avc: denied { read } for pid=18554 comm="bash" name="run-parts" dev=dm-0 ino=10331890 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1163790061.328:14097): arch=40000003 syscall=33 success=yes exit=0 a0=901b120 a1=4 a2=ffffffff a3=901b120 items=0 ppid=18553 pid=18554 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="bash" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163790061.328:14098): avc: denied { execute_no_trans } for pid=18554 comm="bash" name="run-parts" dev=dm-0 ino=10331890 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1163790061.328:14098): arch=40000003 syscall=11 success=yes exit=0 a0=901b120 a1=901b3d8 a2=901b2f8 a3=901af98 items=0 ppid=18553 pid=18554 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="run-parts" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163790061.328:14098): path="/usr/bin/run-parts" type=AVC msg=audit(1163790061.328:14099): avc: denied { ioctl } for pid=18554 comm="run-parts" name="run-parts" dev=dm-0 ino=10331890 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1163790061.328:14099): arch=40000003 syscall=54 success=no exit=-25 a0=3 a1=5401 a2=bfaa9d88 a3=bfaa9dc8 items=0 ppid=18553 pid=18554 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="run-parts" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163790061.328:14099): path="/usr/bin/run-parts" type=AVC msg=audit(1163790061.332:14100): avc: denied { execute } for pid=18554 comm="run-parts" name="inn-cron-nntpsend" dev=dm-0 ino=9331477 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1163790061.332:14100): arch=40000003 syscall=33 success=yes exit=0 a0=904f990 a1=1 a2=1 a3=904fc98 items=0 ppid=18553 pid=18554 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="run-parts" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163790061.332:14101): avc: denied { execute_no_trans } for pid=18555 comm="run-parts" name="inn-cron-nntpsend" dev=dm-0 ino=9331477 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1163790061.332:14101): arch=40000003 syscall=11 success=yes exit=0 a0=904fa10 a1=904fad8 a2=904fae8 a3=904f758 items=0 ppid=18554 pid=18555 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="inn-cron-nntpse" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163790061.332:14101): path="/etc/cron.hourly/inn-cron-nntpsend" type=AVC msg=audit(1163790061.336:14102): avc: denied { execute } for pid=18556 comm="inn-cron-nntpse" name="chkconfig" dev=dm-0 ino=9984485 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sbin_t:s0 tclass=file type=AVC msg=audit(1163790061.336:14102): avc: denied { execute_no_trans } for pid=18556 comm="inn-cron-nntpse" name="chkconfig" dev=dm-0 ino=9984485 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sbin_t:s0 tclass=file type=AVC msg=audit(1163790061.336:14102): avc: denied { read } for pid=18556 comm="inn-cron-nntpse" name="chkconfig" dev=dm-0 ino=9984485 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sbin_t:s0 tclass=file type=SYSCALL msg=audit(1163790061.336:14102): arch=40000003 syscall=11 success=yes exit=0 a0=98fd678 a1=98fd808 a2=98fd720 a3=98fd508 items=0 ppid=18555 pid=18556 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="chkconfig" exe="/sbin/chkconfig" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163790061.336:14102): path="/sbin/chkconfig" type=AVC_PATH msg=audit(1163790061.336:14102): path="/sbin/chkconfig" type=AVC msg=audit(1163790061.340:14103): avc: denied { read } for pid=18556 comm="chkconfig" name="innd" dev=dm-0 ino=9331492 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163790061.340:14103): arch=40000003 syscall=5 success=yes exit=3 a0=bf98f450 a1=0 a2=ffffffff a3=899e038 items=0 ppid=18555 pid=18556 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="chkconfig" exe="/sbin/chkconfig" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163790061.340:14104): avc: denied { getattr } for pid=18556 comm="chkconfig" name="innd" dev=dm-0 ino=9331492 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163790061.340:14104): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bf98f3bc a2=9d5ff4 a3=bf98f3bc items=0 ppid=18555 pid=18556 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="chkconfig" exe="/sbin/chkconfig" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163790061.340:14104): path="/etc/rc.d/init.d/innd" type=CRED_DISP msg=audit(1163790061.360:14105): user pid=18553 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1163790061.360:14106): user pid=18553 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1163790189.352:14107): avc: denied { read } for pid=8116 comm="dhclient" name="[31406]" dev=sockfs ino=31406 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=packet_socket type=SYSCALL msg=audit(1163790189.352:14107): arch=40000003 syscall=3 success=yes exit=590 a0=6 a1=bf923428 a2=600 a3=9604620 items=0 ppid=8112 pid=8116 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="dhclient" exe="/sbin/dhclient" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163790189.352:14107): path="socket:[31406]" type=AVC msg=audit(1163790302.383:14108): avc: denied { search } for pid=18577 comm="thunderbird" name="locale" dev=dm-0 ino=10311858 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=dir type=AVC msg=audit(1163790302.383:14108): avc: denied { read } for pid=18577 comm="thunderbird" name="locale-archive" dev=dm-0 ino=11588566 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=staff_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1163790302.383:14108): arch=40000003 syscall=5 success=yes exit=3 a0=32ab60 a1=8000 a2=1 a3=bfdfd220 items=0 ppid=1 pid=18577 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird" exe="/bin/bash" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC msg=audit(1163790302.383:14109): avc: denied { getattr } for pid=18577 comm="thunderbird" name="locale-archive" dev=dm-0 ino=11588566 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=staff_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1163790302.383:14109): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=342aa0 a2=341ff4 a3=bfdfd220 items=0 ppid=1 pid=18577 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird" exe="/bin/bash" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC_PATH msg=audit(1163790302.383:14109): path="/usr/lib/locale/locale-archive" type=AVC msg=audit(1163790302.383:14110): avc: denied { read } for pid=18577 comm="thunderbird" name="meminfo" dev=proc ino=-268435454 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:proc_t:s0 tclass=file type=SYSCALL msg=audit(1163790302.383:14110): arch=40000003 syscall=5 success=yes exit=3 a0=329afa a1=0 a2=1b6 a3=812aa60 items=0 ppid=1 pid=18577 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird" exe="/bin/bash" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC msg=audit(1163790302.383:14111): avc: denied { getattr } for pid=18577 comm="thunderbird" name="meminfo" dev=proc ino=-268435454 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:proc_t:s0 tclass=file type=SYSCALL msg=audit(1163790302.383:14111): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bfdfb398 a2=341ff4 a3=812aa60 items=0 ppid=1 pid=18577 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird" exe="/bin/bash" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC_PATH msg=audit(1163790302.383:14111): path="/proc/meminfo" type=AVC msg=audit(1163790302.383:14112): avc: denied { read } for pid=18577 comm="thunderbird" name="gconv-modules.cache" dev=dm-0 ino=10386358 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=staff_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1163790302.383:14112): arch=40000003 syscall=5 success=yes exit=3 a0=32ab3c a1=0 a2=0 a3=bfdfd480 items=0 ppid=1 pid=18577 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird" exe="/bin/bash" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC msg=audit(1163790302.383:14113): avc: denied { getattr } for pid=18577 comm="thunderbird" name="gconv-modules.cache" dev=dm-0 ino=10386358 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=staff_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1163790302.383:14113): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bfdfd328 a2=341ff4 a3=3 items=0 ppid=1 pid=18577 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird" exe="/bin/bash" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC_PATH msg=audit(1163790302.383:14113): path="/usr/lib/gconv/gconv-modules.cache" type=AVC msg=audit(1163790302.939:14114): avc: denied { read } for pid=18589 comm="thunderbird-bin" name="locale.alias" dev=dm-0 ino=10314034 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1163790302.939:14114): arch=40000003 syscall=5 success=yes exit=3 a0=bf8c4d00 a1=0 a2=1b6 a3=8ae5f08 items=0 ppid=18584 pid=18589 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird-bin" exe="/usr/lib/thunderbird-1.5.0.7/thunderbird-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC msg=audit(1163790302.939:14115): avc: denied { getattr } for pid=18589 comm="thunderbird-bin" name="locale.alias" dev=dm-0 ino=10314034 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1163790302.939:14115): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bf8c4b9c a2=f14ff4 a3=8ae5f08 items=0 ppid=18584 pid=18589 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird-bin" exe="/usr/lib/thunderbird-1.5.0.7/thunderbird-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC_PATH msg=audit(1163790302.939:14115): path="/usr/share/locale/locale.alias" type=AVC msg=audit(1163790302.939:14116): avc: denied { search } for pid=18589 comm="thunderbird-bin" name="nscd" dev=dm-0 ino=14436932 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:nscd_var_run_t:s0 tclass=dir type=SYSCALL msg=audit(1163790302.939:14116): arch=40000003 syscall=102 success=no exit=-2 a0=3 a1=bf8c4c70 a2=f14ff4 a3=3 items=0 ppid=18584 pid=18589 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird-bin" exe="/usr/lib/thunderbird-1.5.0.7/thunderbird-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC msg=audit(1163790302.947:14117): avc: denied { read } for pid=18589 comm="thunderbird-bin" name=".gdm0UWNIT" dev=dm-0 ino=14469400 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163790302.947:14117): arch=40000003 syscall=33 success=yes exit=0 a0=bf8c7f72 a1=4 a2=da3a64 a3=bf8c7f72 items=0 ppid=18584 pid=18589 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird-bin" exe="/usr/lib/thunderbird-1.5.0.7/thunderbird-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC msg=audit(1163790302.947:14118): avc: denied { getattr } for pid=18589 comm="thunderbird-bin" name=".gdm0UWNIT" dev=dm-0 ino=14469400 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163790302.947:14118): arch=40000003 syscall=197 success=yes exit=0 a0=4 a1=bf8c49fc a2=f14ff4 a3=8ad9558 items=0 ppid=18584 pid=18589 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird-bin" exe="/usr/lib/thunderbird-1.5.0.7/thunderbird-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC_PATH msg=audit(1163790302.947:14118): path="/tmp/.gdm0UWNIT" type=AVC msg=audit(1163790302.959:14119): avc: denied { read } for pid=18589 comm="thunderbird-bin" name="urandom" dev=tmpfs ino=1972 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:urandom_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163790302.959:14119): arch=40000003 syscall=5 success=yes exit=10 a0=249880 a1=8000 a2=1b6 a3=8b103c0 items=0 ppid=18584 pid=18589 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird-bin" exe="/usr/lib/thunderbird-1.5.0.7/thunderbird-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC msg=audit(1163790302.959:14120): avc: denied { getattr } for pid=18589 comm="thunderbird-bin" name="urandom" dev=tmpfs ino=1972 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:urandom_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163790302.959:14120): arch=40000003 syscall=197 success=yes exit=0 a0=a a1=bf8c495c a2=f14ff4 a3=8b103c0 items=0 ppid=18584 pid=18589 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird-bin" exe="/usr/lib/thunderbird-1.5.0.7/thunderbird-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC_PATH msg=audit(1163790302.959:14120): path="/dev/urandom" type=AVC msg=audit(1163790302.959:14121): avc: denied { ioctl } for pid=18589 comm="thunderbird-bin" name="urandom" dev=tmpfs ino=1972 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:urandom_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163790302.959:14121): arch=40000003 syscall=54 success=no exit=-22 a0=a a1=5401 a2=bf8c48bc a3=bf8c48fc items=0 ppid=18584 pid=18589 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird-bin" exe="/usr/lib/thunderbird-1.5.0.7/thunderbird-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC_PATH msg=audit(1163790302.959:14121): path="/dev/urandom" type=AVC msg=audit(1163790303.447:14122): avc: denied { search } for pid=18600 comm="thunderbird-bin" name=".mozilla" dev=dm-0 ino=6547337 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=staff_u:object_r:staff_mozilla_home_t:s0 tclass=dir type=SYSCALL msg=audit(1163790303.447:14122): arch=40000003 syscall=33 success=yes exit=0 a0=9fd2300 a1=0 a2=ab3bdc a3=bfc61b6c items=0 ppid=18595 pid=18600 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird-bin" exe="/usr/lib/thunderbird-1.5.0.7/thunderbird-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC msg=audit(1163790303.743:14123): avc: denied { read } for pid=18600 comm="thunderbird-bin" name="xpinstall.js" dev=dm-0 ino=10739315 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1163790303.743:14123): arch=40000003 syscall=5 success=yes exit=16 a0=9fdb320 a1=8000 a2=0 a3=8000 items=0 ppid=18595 pid=18600 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird-bin" exe="/usr/lib/thunderbird-1.5.0.7/thunderbird-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC msg=audit(1163790304.003:14124): avc: denied { lock } for pid=16476 comm="pam_timestamp_c" name="utmp" dev=dm-0 ino=14436583 scontext=staff_u:staff_r:pam_t:s0 tcontext=system_u:object_r:initrc_var_run_t:s0 tclass=file type=SYSCALL msg=audit(1163790304.003:14124): arch=40000003 syscall=221 success=yes exit=0 a0=3 a1=7 a2=bfded3d8 a3=0 items=0 ppid=16467 pid=16476 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=(none) comm="pam_timestamp_c" exe="/sbin/pam_timestamp_check" subj=staff_u:staff_r:pam_t:s0 key=(null) type=AVC_PATH msg=audit(1163790304.003:14124): path="/var/run/utmp" type=AVC msg=audit(1163790304.255:14125): avc: denied { getattr } for pid=18600 comm="thunderbird-bin" name="offline.manifest" dev=dm-0 ino=10737672 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1163790304.255:14125): arch=40000003 syscall=195 success=yes exit=0 a0=a02c418 a1=bfc6107c a2=1113ff4 a3=bfc6107c items=0 ppid=18595 pid=18600 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird-bin" exe="/usr/lib/thunderbird-1.5.0.7/thunderbird-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC_PATH msg=audit(1163790304.255:14125): path="/usr/lib/thunderbird-1.5.0.7/chrome/offline.manifest" type=AVC msg=audit(1163790307.399:14126): avc: denied { read } for pid=18600 comm="thunderbird-bin" name="3830d5c3ddfd5cd38a049b759396e72e-x86.cache-2" dev=dm-0 ino=14437317 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=user_u:object_r:var_t:s0 tclass=file type=SYSCALL msg=audit(1163790307.399:14126): arch=40000003 syscall=5 success=yes exit=26 a0=a3055a8 a1=0 a2=735bf000 a3=a2f9c78 items=0 ppid=18595 pid=18600 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird-bin" exe="/usr/lib/thunderbird-1.5.0.7/thunderbird-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC msg=audit(1163790307.399:14127): avc: denied { getattr } for pid=18600 comm="thunderbird-bin" name="3830d5c3ddfd5cd38a049b759396e72e-x86.cache-2" dev=dm-0 ino=14437317 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=user_u:object_r:var_t:s0 tclass=file type=SYSCALL msg=audit(1163790307.399:14127): arch=40000003 syscall=197 success=yes exit=0 a0=1a a1=bfc6024c a2=1113ff4 a3=bfc6024c items=0 ppid=18595 pid=18600 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird-bin" exe="/usr/lib/thunderbird-1.5.0.7/thunderbird-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC_PATH msg=audit(1163790307.399:14127): path="/var/cache/fontconfig/3830d5c3ddfd5cd38a049b759396e72e-x86.cache-2" type=AVC msg=audit(1163790309.540:14128): avc: denied { search } for pid=18607 comm="netstat" name="sys" dev=proc ino=-268435429 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:sysctl_t:s0 tclass=dir type=AVC msg=audit(1163790309.540:14128): avc: denied { search } for pid=18607 comm="netstat" name="net" dev=proc ino=-268435343 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:sysctl_net_t:s0 tclass=dir type=SYSCALL msg=audit(1163790309.540:14128): arch=40000003 syscall=33 success=no exit=-2 a0=805f53c a1=4 a2=8064740 a3=8 items=0 ppid=18600 pid=18607 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="netstat" exe="/bin/netstat" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC msg=audit(1163790309.952:14129): avc: denied { create } for pid=18609 comm="thunderbird-bin" scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=staff_u:staff_r:staff_thunderbird_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1163790309.952:14129): arch=40000003 syscall=102 success=yes exit=36 a0=1 a1=b2ffe1d4 a2=1113ff4 a3=0 items=0 ppid=18595 pid=18609 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird-bin" exe="/usr/lib/thunderbird-1.5.0.7/thunderbird-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC msg=audit(1163790309.952:14130): avc: denied { bind } for pid=18609 comm="thunderbird-bin" scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=staff_u:staff_r:staff_thunderbird_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1163790309.952:14130): arch=40000003 syscall=102 success=yes exit=0 a0=2 a1=b2ffe1d4 a2=1113ff4 a3=24 items=0 ppid=18595 pid=18609 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird-bin" exe="/usr/lib/thunderbird-1.5.0.7/thunderbird-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC msg=audit(1163790309.952:14131): avc: denied { getattr } for pid=18609 comm="thunderbird-bin" scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=staff_u:staff_r:staff_thunderbird_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1163790309.952:14131): arch=40000003 syscall=102 success=yes exit=0 a0=6 a1=b2ffe1d4 a2=1113ff4 a3=24 items=0 ppid=18595 pid=18609 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird-bin" exe="/usr/lib/thunderbird-1.5.0.7/thunderbird-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC msg=audit(1163790309.952:14132): avc: denied { write } for pid=18609 comm="thunderbird-bin" scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=staff_u:staff_r:staff_thunderbird_t:s0 tclass=netlink_route_socket type=AVC msg=audit(1163790309.952:14132): avc: denied { nlmsg_read } for pid=18609 comm="thunderbird-bin" scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=staff_u:staff_r:staff_thunderbird_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1163790309.952:14132): arch=40000003 syscall=102 success=yes exit=20 a0=b a1=b2ffd10c a2=1113ff4 a3=0 items=0 ppid=18595 pid=18609 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird-bin" exe="/usr/lib/thunderbird-1.5.0.7/thunderbird-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC msg=audit(1163790309.952:14133): avc: denied { read } for pid=18609 comm="thunderbird-bin" scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=staff_u:staff_r:staff_thunderbird_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1163790309.952:14133): arch=40000003 syscall=102 success=yes exit=188 a0=11 a1=b2ffd10c a2=1113ff4 a3=0 items=0 ppid=18595 pid=18609 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird-bin" exe="/usr/lib/thunderbird-1.5.0.7/thunderbird-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC msg=audit(1163790486.511:14134): avc: denied { read } for pid=11049 comm="udevd" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=netlink_kobject_uevent_socket type=SYSCALL msg=audit(1163790486.511:14134): arch=40000003 syscall=102 success=yes exit=214 a0=a a1=bfedb480 a2=791234 a3=0 items=0 ppid=1 pid=11049 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="udevd" exe="/sbin/udevd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163790486.511:14135): avc: denied { unlink } for pid=18623 comm="udevd" name="devices@pci0000:00@0000:00:1d.3@usb4@4-1@4-1:1.0@usbdev4.3_ep01" dev=tmpfs ino=217656 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:device_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163790486.511:14135): arch=40000003 syscall=10 success=yes exit=0 a0=bfed2dcc a1=4d a2=791234 a3=bfed2dcc items=0 ppid=11049 pid=18623 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="udevd" exe="/sbin/udevd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163790486.511:14136): avc: denied { getattr } for pid=18623 comm="udevd" name="usbdev4.3_ep01" dev=tmpfs ino=217655 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:usb_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163790486.511:14136): arch=40000003 syscall=195 success=yes exit=0 a0=bfed2dc8 a1=bfed2b68 a2=24bff4 a3=bfed2dc8 items=0 ppid=11049 pid=18623 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="udevd" exe="/sbin/udevd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163790486.511:14136): path="/dev/usbdev4.3_ep01" type=AVC msg=audit(1163790486.511:14137): avc: denied { unlink } for pid=18623 comm="udevd" name="usbdev4.3_ep01" dev=tmpfs ino=217655 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:usb_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163790486.511:14137): arch=40000003 syscall=10 success=yes exit=0 a0=bfed2dc8 a1=0 a2=791234 a3=bfed2dc8 items=0 ppid=11049 pid=18623 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="udevd" exe="/sbin/udevd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=USER_ACCT msg=audit(1163790601.398:14138): user pid=18645 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1163790601.402:14139): login pid=18645 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1163790601.402:14140): user pid=18645 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1163790601.402:14141): user pid=18645 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1163790601.410:14142): avc: denied { search } for pid=18646 comm="sadc" name="net" dev=proc ino=-268435432 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=dir type=AVC msg=audit(1163790601.410:14142): avc: denied { read } for pid=18646 comm="sadc" name="dev" dev=proc ino=-268434164 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=file type=SYSCALL msg=audit(1163790601.410:14142): arch=40000003 syscall=5 success=yes exit=3 a0=80502e1 a1=0 a2=1b6 a3=9ae77f8 items=0 ppid=18645 pid=18646 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163790601.410:14143): avc: denied { getattr } for pid=18646 comm="sadc" name="dev" dev=proc ino=-268434164 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=file type=SYSCALL msg=audit(1163790601.410:14143): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bfce8e18 a2=659ff4 a3=9ae77f8 items=0 ppid=18645 pid=18646 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163790601.410:14143): path="/proc/net/dev" type=CRED_DISP msg=audit(1163790601.422:14144): user pid=18645 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1163790601.422:14145): user pid=18645 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1163791047.922:14146): avc: denied { create } for pid=18662 comm="thunderbird-bin" scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=staff_u:staff_r:staff_thunderbird_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1163791047.922:14146): arch=40000003 syscall=102 success=yes exit=50 a0=1 a1=b68a61d4 a2=1113ff4 a3=0 items=0 ppid=18595 pid=18662 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird-bin" exe="/usr/lib/thunderbird-1.5.0.7/thunderbird-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC msg=audit(1163791047.922:14147): avc: denied { bind } for pid=18662 comm="thunderbird-bin" scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=staff_u:staff_r:staff_thunderbird_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1163791047.922:14147): arch=40000003 syscall=102 success=yes exit=0 a0=2 a1=b68a61d4 a2=1113ff4 a3=32 items=0 ppid=18595 pid=18662 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird-bin" exe="/usr/lib/thunderbird-1.5.0.7/thunderbird-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC msg=audit(1163791047.922:14148): avc: denied { getattr } for pid=18662 comm="thunderbird-bin" scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=staff_u:staff_r:staff_thunderbird_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1163791047.922:14148): arch=40000003 syscall=102 success=yes exit=0 a0=6 a1=b68a61d4 a2=1113ff4 a3=32 items=0 ppid=18595 pid=18662 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird-bin" exe="/usr/lib/thunderbird-1.5.0.7/thunderbird-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC msg=audit(1163791047.922:14149): avc: denied { write } for pid=18662 comm="thunderbird-bin" scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=staff_u:staff_r:staff_thunderbird_t:s0 tclass=netlink_route_socket type=AVC msg=audit(1163791047.922:14149): avc: denied { nlmsg_read } for pid=18662 comm="thunderbird-bin" scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=staff_u:staff_r:staff_thunderbird_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1163791047.922:14149): arch=40000003 syscall=102 success=yes exit=20 a0=b a1=b68a510c a2=1113ff4 a3=0 items=0 ppid=18595 pid=18662 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird-bin" exe="/usr/lib/thunderbird-1.5.0.7/thunderbird-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC msg=audit(1163791047.922:14150): avc: denied { read } for pid=18662 comm="thunderbird-bin" scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=staff_u:staff_r:staff_thunderbird_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1163791047.922:14150): arch=40000003 syscall=102 success=yes exit=188 a0=11 a1=b68a510c a2=1113ff4 a3=0 items=0 ppid=18595 pid=18662 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird-bin" exe="/usr/lib/thunderbird-1.5.0.7/thunderbird-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC msg=audit(1163791086.004:14151): avc: denied { write } for pid=18600 comm="thunderbird-bin" name="tmp" dev=dm-0 ino=14469313 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:tmp_t:s0 tclass=dir type=AVC msg=audit(1163791086.004:14151): avc: denied { add_name } for pid=18600 comm="thunderbird-bin" name="nsmail.eml" scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:tmp_t:s0 tclass=dir type=AVC msg=audit(1163791086.004:14151): avc: denied { create } for pid=18600 comm="thunderbird-bin" name="nsmail.eml" scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=staff_u:object_r:tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163791086.004:14151): arch=40000003 syscall=5 success=yes exit=52 a0=ab774e0 a1=82c1 a2=180 a3=82c1 items=0 ppid=18595 pid=18600 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird-bin" exe="/usr/lib/thunderbird-1.5.0.7/thunderbird-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC msg=audit(1163791086.004:14152): avc: denied { write } for pid=18600 comm="thunderbird-bin" name="nsmail.eml" dev=dm-0 ino=14469568 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=staff_u:object_r:tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163791086.004:14152): arch=40000003 syscall=5 success=yes exit=52 a0=ade18e0 a1=8241 a2=180 a3=8241 items=0 ppid=18595 pid=18600 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird-bin" exe="/usr/lib/thunderbird-1.5.0.7/thunderbird-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC msg=audit(1163791086.012:14153): avc: denied { getattr } for pid=18600 comm="thunderbird-bin" name="nsmail.eml" dev=dm-0 ino=14469568 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=staff_u:object_r:tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163791086.012:14153): arch=40000003 syscall=195 success=yes exit=0 a0=ade18e0 a1=bfc5ebf4 a2=1113ff4 a3=bfc5ebf4 items=0 ppid=18595 pid=18600 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird-bin" exe="/usr/lib/thunderbird-1.5.0.7/thunderbird-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC_PATH msg=audit(1163791086.012:14153): path="/tmp/nsmail.eml" type=AVC msg=audit(1163791086.356:14154): avc: denied { read } for pid=18600 comm="thunderbird-bin" name="nsmail.eml" dev=dm-0 ino=14469568 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=staff_u:object_r:tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163791086.356:14154): arch=40000003 syscall=5 success=yes exit=49 a0=ae24fd0 a1=8000 a2=0 a3=8000 items=0 ppid=18595 pid=18600 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird-bin" exe="/usr/lib/thunderbird-1.5.0.7/thunderbird-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC msg=audit(1163791088.020:14155): avc: denied { remove_name } for pid=18600 comm="thunderbird-bin" name="nscopy.tmp" dev=dm-0 ino=14469571 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:tmp_t:s0 tclass=dir type=AVC msg=audit(1163791088.020:14155): avc: denied { unlink } for pid=18600 comm="thunderbird-bin" name="nscopy.tmp" dev=dm-0 ino=14469571 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=staff_u:object_r:tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163791088.020:14155): arch=40000003 syscall=10 success=yes exit=0 a0=ae00688 a1=0 a2=1113ff4 a3=ae00688 items=0 ppid=18595 pid=18600 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird-bin" exe="/usr/lib/thunderbird-1.5.0.7/thunderbird-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=USER_ACCT msg=audit(1163791201.487:14156): user pid=18674 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1163791201.487:14157): login pid=18674 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1163791201.487:14158): user pid=18674 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1163791201.487:14159): user pid=18674 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1163791201.507:14160): user pid=18674 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1163791201.507:14161): user pid=18674 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1163791346.416:14162): avc: denied { write } for pid=18682 comm="nautilus" name=".recently-used.xbel" dev=dm-0 ino=6573261 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:staff_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163791346.416:14162): arch=40000003 syscall=33 success=yes exit=0 a0=8cbd4c8 a1=6 a2=7a7708 a3=d8db59 items=0 ppid=1 pid=18682 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="nautilus" exe="/usr/bin/nautilus" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163791347.192:14163): avc: denied { read write } for pid=18682 comm="nautilus" name=".gnupg" dev=dm-0 ino=6814310 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:staff_gpg_secret_t:s0 tclass=dir type=SYSCALL msg=audit(1163791347.192:14163): arch=40000003 syscall=33 success=yes exit=0 a0=8cbd4c8 a1=6 a2=7a7708 a3=d8db59 items=0 ppid=1 pid=18682 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="nautilus" exe="/usr/bin/nautilus" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163791381.359:14164): avc: denied { unlink } for pid=16431 comm="nautilus" name=".recently-used.xbel" dev=dm-0 ino=6573261 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:staff_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163791381.359:14164): arch=40000003 syscall=38 success=yes exit=0 a0=9045800 a1=8d52e38 a2=7a7708 a3=b7ef9acc items=0 ppid=1 pid=16431 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="nautilus" exe="/usr/bin/nautilus" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163791381.519:14165): avc: denied { write } for pid=18707 comm="eog" name="15931" dev=dm-0 ino=14567724 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:ice_tmp_t:s0 tclass=sock_file type=SYSCALL msg=audit(1163791381.519:14165): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=bfe06e40 a2=df7770 a3=16 items=0 ppid=1 pid=18707 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="eog" exe="/usr/bin/eog" subj=staff_u:staff_r:staff_t:s0 key=(null) type=USER_ACCT msg=audit(1163791801.585:14166): user pid=18750 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1163791801.585:14167): login pid=18750 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1163791801.585:14168): user pid=18750 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1163791801.585:14169): user pid=18750 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1163791801.597:14170): avc: denied { read } for pid=18751 comm="sadc" name="dentry-state" dev=proc ino=-268435230 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=file type=SYSCALL msg=audit(1163791801.597:14170): arch=40000003 syscall=5 success=yes exit=4 a0=80502ef a1=0 a2=1b6 a3=8862348 items=0 ppid=18750 pid=18751 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163791801.597:14171): avc: denied { getattr } for pid=18751 comm="sadc" name="dentry-state" dev=proc ino=-268435230 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=file type=SYSCALL msg=audit(1163791801.597:14171): arch=40000003 syscall=197 success=yes exit=0 a0=4 a1=bfe1a5a0 a2=a63ff4 a3=8862348 items=0 ppid=18750 pid=18751 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163791801.597:14171): path="/proc/sys/fs/dentry-state" type=CRED_DISP msg=audit(1163791801.653:14172): user pid=18750 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1163791801.653:14173): user pid=18750 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1163792170.124:14174): avc: denied { execute } for pid=16541 comm="firefox-bin" name="libflashplayer.so" dev=dm-0 ino=6547382 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_mozilla_home_t:s0 tclass=file type=SYSCALL msg=audit(1163792170.124:14174): arch=40000003 syscall=192 success=yes exit=62861312 a0=0 a1=738dbc a2=5 a3=802 items=0 ppid=1 pid=16541 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163792170.124:14174): path="/home/kmacmill/.mozilla/plugins/libflashplayer.so" type=AVC msg=audit(1163792170.560:14175): avc: denied { execmem } for pid=16548 comm="firefox-bin" scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_mozilla_t:s0 tclass=process type=SYSCALL msg=audit(1163792170.560:14175): arch=40000003 syscall=192 success=yes exit=145154048 a0=0 a1=a01000 a2=7 a3=22 items=0 ppid=1 pid=16548 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=USER_ACCT msg=audit(1163792401.694:14176): user pid=18789 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1163792401.694:14177): login pid=18789 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1163792401.694:14178): user pid=18789 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1163792401.694:14179): user pid=18789 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1163792401.698:14180): avc: denied { execute } for pid=18790 comm="sh" name="sa1" dev=dm-0 ino=12865251 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:lib_t:s0 tclass=file type=AVC msg=audit(1163792401.698:14180): avc: denied { execute_no_trans } for pid=18790 comm="sh" name="sa1" dev=dm-0 ino=12865251 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1163792401.698:14180): arch=40000003 syscall=11 success=yes exit=0 a0=8d111b0 a1=8d11358 a2=8d11290 a3=8d11008 items=0 ppid=18789 pid=18790 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sa1" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163792401.698:14180): path="/usr/lib/sa/sa1" type=AVC msg=audit(1163792401.702:14181): avc: denied { search } for pid=18790 comm="sadc" name="fs" dev=proc ino=-268435428 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=dir type=SYSCALL msg=audit(1163792401.702:14181): arch=40000003 syscall=5 success=yes exit=4 a0=80502ef a1=0 a2=1b6 a3=9b3f348 items=0 ppid=18789 pid=18790 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=CRED_DISP msg=audit(1163792401.710:14182): user pid=18789 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1163792401.710:14183): user pid=18789 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1163792590.410:14184): avc: denied { read } for pid=18800 comm="gnome-open" name="urandom" dev=tmpfs ino=1972 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:urandom_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163792590.410:14184): arch=40000003 syscall=5 success=yes exit=23 a0=3d4880 a1=8000 a2=1b6 a3=9828bd8 items=0 ppid=18799 pid=18800 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-open" exe="/usr/bin/gnome-open" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC msg=audit(1163792590.414:14185): avc: denied { getattr } for pid=18800 comm="gnome-open" name="urandom" dev=tmpfs ino=1972 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:urandom_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163792590.414:14185): arch=40000003 syscall=197 success=yes exit=0 a0=17 a1=bfbd0e4c a2=83fff4 a3=9828bd8 items=0 ppid=18799 pid=18800 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-open" exe="/usr/bin/gnome-open" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC_PATH msg=audit(1163792590.414:14185): path="/dev/urandom" type=AVC msg=audit(1163792590.414:14186): avc: denied { ioctl } for pid=18800 comm="gnome-open" name="urandom" dev=tmpfs ino=1972 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:urandom_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163792590.414:14186): arch=40000003 syscall=54 success=no exit=-22 a0=17 a1=5401 a2=bfbd0dac a3=bfbd0dec items=0 ppid=18799 pid=18800 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-open" exe="/usr/bin/gnome-open" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC_PATH msg=audit(1163792590.414:14186): path="/dev/urandom" type=AVC msg=audit(1163792590.590:14187): avc: denied { execute } for pid=18802 comm="firefox" name="firefox-bin" dev=dm-0 ino=10379247 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:mozilla_exec_t:s0 tclass=file type=AVC msg=audit(1163792590.590:14187): avc: denied { execute_no_trans } for pid=18802 comm="firefox" name="firefox-bin" dev=dm-0 ino=10379247 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:mozilla_exec_t:s0 tclass=file type=AVC msg=audit(1163792590.590:14187): avc: denied { read } for pid=18802 comm="firefox" name="firefox-bin" dev=dm-0 ino=10379247 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:mozilla_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163792590.590:14187): arch=40000003 syscall=11 success=yes exit=0 a0=872bf00 a1=872c838 a2=872bbe8 a3=872c838 items=0 ppid=1 pid=18802 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC_PATH msg=audit(1163792590.590:14187): path="/usr/lib/firefox-2.0/firefox-bin" type=AVC_PATH msg=audit(1163792590.590:14187): path="/usr/lib/firefox-2.0/firefox-bin" type=AVC msg=audit(1163792590.754:14188): avc: denied { getattr } for pid=18802 comm="firefox-bin" name="firefox-bin" dev=dm-0 ino=10379247 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:mozilla_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163792590.754:14188): arch=40000003 syscall=196 success=yes exit=0 a0=bfee5b18 a1=bfee560c a2=fe4ff4 a3=bfee6759 items=0 ppid=1 pid=18802 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC_PATH msg=audit(1163792590.754:14188): path="/usr/lib/firefox-2.0/firefox-bin" type=AVC msg=audit(1163792672.087:14189): avc: denied { search } for pid=18818 comm="evince" name=".ICE-unix" dev=dm-0 ino=14567572 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:ice_tmp_t:s0 tclass=dir type=AVC msg=audit(1163792672.087:14189): avc: denied { write } for pid=18818 comm="evince" name="15931" dev=dm-0 ino=14567724 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:ice_tmp_t:s0 tclass=sock_file type=SYSCALL msg=audit(1163792672.087:14189): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=bff22620 a2=df7770 a3=16 items=0 ppid=1 pid=18818 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evince" exe="/usr/bin/evince" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163792672.127:14190): avc: denied { connectto } for pid=18818 comm="evince" path=002F746D702F646275732D4F36457A564B53704F4E scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_dbusd_t:s0 tclass=unix_stream_socket type=SYSCALL msg=audit(1163792672.127:14190): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=bff22c00 a2=15f454 a3=15 items=0 ppid=1 pid=18818 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evince" exe="/usr/bin/evince" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163792672.327:14191): avc: denied { getattr } for pid=18819 comm="evince" name="chapter2.pdf" dev=dm-0 ino=14469568 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163792672.327:14191): arch=40000003 syscall=195 success=yes exit=0 a0=8dc0f88 a1=b7dc1250 a2=5c3ff4 a3=8da3e78 items=0 ppid=1 pid=18819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evince" exe="/usr/bin/evince" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163792672.327:14191): path="/tmp/chapter2.pdf" type=AVC msg=audit(1163792672.655:14192): avc: denied { read } for pid=18819 comm="evince" name="chapter2.pdf" dev=dm-0 ino=14469568 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163792672.655:14192): arch=40000003 syscall=5 success=yes exit=19 a0=8e09078 a1=8000 a2=1b6 a3=8e10690 items=0 ppid=1 pid=18819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evince" exe="/usr/bin/evince" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163792673.403:14193): avc: denied { create } for pid=18819 comm="evince" name="QEO7Np" scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163792673.403:14193): arch=40000003 syscall=5 success=yes exit=20 a0=b3101fb0 a1=80c2 a2=180 a3=80c2 items=0 ppid=1 pid=18819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evince" exe="/usr/bin/evince" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163792673.407:14194): avc: denied { write } for pid=18819 comm="evince" name="QEO7Np" dev=dm-0 ino=14469571 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163792673.407:14194): arch=40000003 syscall=4 success=yes exit=4096 a0=14 a1=b29fe000 a2=1000 a3=1000 items=0 ppid=1 pid=18819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evince" exe="/usr/bin/evince" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163792673.407:14194): path="/tmp/QEO7Np" type=AVC msg=audit(1163792673.411:14195): avc: denied { unlink } for pid=18819 comm="evince" name="QEO7Np" dev=dm-0 ino=14469571 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163792673.411:14195): arch=40000003 syscall=10 success=yes exit=0 a0=b3101fb0 a1=b3103c00 a2=48eeac8 a3=101 items=0 ppid=1 pid=18819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evince" exe="/usr/bin/evince" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163792869.360:14196): avc: denied { getattr } for pid=18828 comm="evolution" name=".evolution" dev=dm-0 ino=6776355 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_evolution_home_t:s0 tclass=dir type=SYSCALL msg=audit(1163792869.360:14196): arch=40000003 syscall=195 success=yes exit=0 a0=8eb8d78 a1=b40910cc a2=758aff4 a3=4 items=0 ppid=1 pid=18828 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163792869.360:14196): path="/home/kmacmill/.evolution" type=AVC msg=audit(1163792869.360:14197): avc: denied { search } for pid=18828 comm="evolution" name=".evolution" dev=dm-0 ino=6776355 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_evolution_home_t:s0 tclass=dir type=SYSCALL msg=audit(1163792869.360:14197): arch=40000003 syscall=33 success=yes exit=0 a0=8eb8d78 a1=0 a2=bae708 a3=10 items=0 ppid=1 pid=18828 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163792869.360:14198): avc: denied { read } for pid=18828 comm="evolution" name="summary" dev=dm-0 ino=6814004 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_evolution_home_t:s0 tclass=file type=SYSCALL msg=audit(1163792869.360:14198): arch=40000003 syscall=5 success=yes exit=25 a0=900b940 a1=0 a2=1b6 a3=8fb12b0 items=0 ppid=1 pid=18828 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163792869.360:14199): avc: denied { getattr } for pid=18828 comm="evolution" name="summary" dev=dm-0 ino=6814004 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_evolution_home_t:s0 tclass=file type=SYSCALL msg=audit(1163792869.360:14199): arch=40000003 syscall=197 success=yes exit=0 a0=19 a1=b4090f48 a2=758aff4 a3=8fb12b0 items=0 ppid=1 pid=18828 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163792869.360:14199): path="/home/kmacmill/.evolution/mail/imap/kmacmill@pobox-2.corp.redhat.com/folders/INBOX/summary" type=AVC msg=audit(1163792869.360:14200): avc: denied { read } for pid=18828 comm="evolution" name="INBOX" dev=dm-0 ino=6809503 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_evolution_home_t:s0 tclass=dir type=SYSCALL msg=audit(1163792869.360:14200): arch=40000003 syscall=5 success=yes exit=25 a0=8e69830 a1=18800 a2=758c120 a3=8e69830 items=0 ppid=1 pid=18828 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163792869.512:14201): avc: denied { write } for pid=18829 comm="evolution" name=".ev-store-summary" dev=dm-0 ino=6815187 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_evolution_home_t:s0 tclass=file type=SYSCALL msg=audit(1163792869.512:14201): arch=40000003 syscall=5 success=yes exit=43 a0=8c05ce0 a1=242 a2=180 a3=8c0d8d8 items=0 ppid=1 pid=18829 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163792869.520:14202): avc: denied { write } for pid=18828 comm="evolution" name="INBOX" dev=dm-0 ino=6809503 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_evolution_home_t:s0 tclass=dir type=AVC msg=audit(1163792869.520:14202): avc: denied { add_name } for pid=18828 comm="evolution" name="summary~" scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_evolution_home_t:s0 tclass=dir type=AVC msg=audit(1163792869.520:14202): avc: denied { create } for pid=18828 comm="evolution" name="summary~" scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_evolution_home_t:s0 tclass=file type=SYSCALL msg=audit(1163792869.520:14202): arch=40000003 syscall=5 success=yes exit=44 a0=b4091000 a1=242 a2=180 a3=900b940 items=0 ppid=1 pid=18828 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163792869.564:14203): avc: denied { remove_name } for pid=18828 comm="evolution" name="summary~" dev=dm-0 ino=6814052 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_evolution_home_t:s0 tclass=dir type=AVC msg=audit(1163792869.564:14203): avc: denied { rename } for pid=18828 comm="evolution" name="summary~" dev=dm-0 ino=6814052 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_evolution_home_t:s0 tclass=file type=AVC msg=audit(1163792869.564:14203): avc: denied { unlink } for pid=18828 comm="evolution" name="summary" dev=dm-0 ino=6814004 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_evolution_home_t:s0 tclass=file type=SYSCALL msg=audit(1163792869.564:14203): arch=40000003 syscall=38 success=yes exit=0 a0=b4091000 a1=900b940 a2=1dcbd8 a3=8ddc404 items=0 ppid=1 pid=18828 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163792876.880:14204): avc: denied { lock } for pid=18832 comm="evolution" name="Inbox" dev=dm-0 ino=6778778 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_evolution_home_t:s0 tclass=file type=SYSCALL msg=audit(1163792876.880:14204): arch=40000003 syscall=221 success=yes exit=0 a0=19 a1=6 a2=aa35b1fc a3=aa35b1fc items=0 ppid=1 pid=18832 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163792876.880:14204): path="/home/kmacmill/.evolution/mail/local/Inbox" type=USER_ACCT msg=audit(1163793001.776:14205): user pid=18844 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1163793001.780:14206): login pid=18844 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1163793001.780:14207): user pid=18844 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1163793001.780:14208): user pid=18844 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1163793001.792:14209): avc: denied { search } for pid=18845 comm="sadc" name="rpc" dev=proc ino=-268433616 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_rpc_t:s0 tclass=dir type=SYSCALL msg=audit(1163793001.792:14209): arch=40000003 syscall=5 success=no exit=-2 a0=8050215 a1=0 a2=1b6 a3=9bdc348 items=0 ppid=18844 pid=18845 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=CRED_DISP msg=audit(1163793001.800:14210): user pid=18844 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1163793001.800:14211): user pid=18844 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1163793601.845:14212): user pid=18872 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1163793601.849:14213): login pid=18872 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1163793601.849:14214): user pid=18872 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1163793601.849:14215): user pid=18872 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1163793601.869:14216): user pid=18872 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1163793601.869:14217): user pid=18872 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1163793661.873:14218): user pid=18874 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1163793661.877:14219): login pid=18874 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1163793661.877:14220): user pid=18874 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1163793661.877:14221): user pid=18874 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1163793661.881:14222): avc: denied { getattr } for pid=18875 comm="bash" name="run-parts" dev=dm-0 ino=10331890 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1163793661.881:14222): arch=40000003 syscall=195 success=yes exit=0 a0=82f0120 a1=bfd9fe60 a2=70dff4 a3=82f0120 items=0 ppid=18874 pid=18875 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="bash" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163793661.881:14222): path="/usr/bin/run-parts" type=AVC msg=audit(1163793661.885:14223): avc: denied { execute } for pid=18875 comm="bash" name="run-parts" dev=dm-0 ino=10331890 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1163793661.885:14223): arch=40000003 syscall=33 success=yes exit=0 a0=82f0120 a1=1 a2=11 a3=82f0120 items=0 ppid=18874 pid=18875 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="bash" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163793661.885:14224): avc: denied { read } for pid=18875 comm="bash" name="run-parts" dev=dm-0 ino=10331890 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1163793661.885:14224): arch=40000003 syscall=33 success=yes exit=0 a0=82f0120 a1=4 a2=ffffffff a3=82f0120 items=0 ppid=18874 pid=18875 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="bash" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163793661.885:14225): avc: denied { execute_no_trans } for pid=18875 comm="bash" name="run-parts" dev=dm-0 ino=10331890 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1163793661.885:14225): arch=40000003 syscall=11 success=yes exit=0 a0=82f0120 a1=82f03d8 a2=82f02f8 a3=82eff98 items=0 ppid=18874 pid=18875 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="run-parts" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163793661.885:14225): path="/usr/bin/run-parts" type=AVC msg=audit(1163793661.885:14226): avc: denied { ioctl } for pid=18875 comm="run-parts" name="run-parts" dev=dm-0 ino=10331890 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1163793661.885:14226): arch=40000003 syscall=54 success=no exit=-25 a0=3 a1=5401 a2=bfbe06b8 a3=bfbe06f8 items=0 ppid=18874 pid=18875 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="run-parts" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163793661.885:14226): path="/usr/bin/run-parts" type=AVC msg=audit(1163793661.889:14227): avc: denied { execute } for pid=18875 comm="run-parts" name="inn-cron-nntpsend" dev=dm-0 ino=9331477 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1163793661.889:14227): arch=40000003 syscall=33 success=yes exit=0 a0=93b7990 a1=1 a2=1 a3=93b7c98 items=0 ppid=18874 pid=18875 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="run-parts" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163793661.889:14228): avc: denied { execute_no_trans } for pid=18876 comm="run-parts" name="inn-cron-nntpsend" dev=dm-0 ino=9331477 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1163793661.889:14228): arch=40000003 syscall=11 success=yes exit=0 a0=93b7a10 a1=93b7ad8 a2=93b7ae8 a3=93b7758 items=0 ppid=18875 pid=18876 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="inn-cron-nntpse" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163793661.889:14228): path="/etc/cron.hourly/inn-cron-nntpsend" type=AVC msg=audit(1163793661.893:14229): avc: denied { execute } for pid=18878 comm="inn-cron-nntpse" name="chkconfig" dev=dm-0 ino=9984485 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sbin_t:s0 tclass=file type=AVC msg=audit(1163793661.893:14229): avc: denied { execute_no_trans } for pid=18878 comm="inn-cron-nntpse" name="chkconfig" dev=dm-0 ino=9984485 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sbin_t:s0 tclass=file type=AVC msg=audit(1163793661.893:14229): avc: denied { read } for pid=18878 comm="inn-cron-nntpse" name="chkconfig" dev=dm-0 ino=9984485 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sbin_t:s0 tclass=file type=SYSCALL msg=audit(1163793661.893:14229): arch=40000003 syscall=11 success=yes exit=0 a0=8e85678 a1=8e85808 a2=8e85720 a3=8e85508 items=0 ppid=18876 pid=18878 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="chkconfig" exe="/sbin/chkconfig" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163793661.893:14229): path="/sbin/chkconfig" type=AVC_PATH msg=audit(1163793661.893:14229): path="/sbin/chkconfig" type=CRED_DISP msg=audit(1163793661.913:14230): user pid=18874 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1163793661.913:14231): user pid=18874 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1163793771.128:14232): avc: denied { search } for pid=15793 comm="sshd" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=key type=AVC msg=audit(1163793771.128:14232): avc: denied { search } for pid=15793 comm="sshd" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tclass=key type=AVC msg=audit(1163793771.128:14232): avc: denied { write } for pid=15793 comm="sshd" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=key type=SYSCALL msg=audit(1163793771.128:14232): arch=40000003 syscall=288 success=yes exit=0 a0=3 a1=1556d8ee a2=1f4 a3=1f4 items=0 ppid=15789 pid=15793 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="sshd" exe="/usr/sbin/sshd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163793771.148:14233): avc: denied { setattr } for pid=15789 comm="sshd" name="8" dev=devpts ino=10 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:sysadm_devpts_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163793771.148:14233): arch=40000003 syscall=212 success=yes exit=0 a0=6c7df4 a1=0 a2=0 a3=6c7df4 items=0 ppid=1 pid=15789 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sshd" exe="/usr/sbin/sshd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163793771.148:14234): avc: denied { use } for pid=15842 comm="bash" name="8" dev=devpts ino=10 scontext=staff_u:sysadm_r:sysadm_t:s0 tcontext=staff_u:staff_r:staff_xserver_t:s0 tclass=fd type=SYSCALL msg=audit(1163793771.148:14234): arch=40000003 syscall=54 success=yes exit=0 a0=0 a1=5403 a2=bfef9958 a3=80f9f40 items=0 ppid=15841 pid=15842 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts8 comm="bash" exe="/bin/bash" subj=staff_u:sysadm_r:sysadm_t:s0 key=(null) type=AVC_PATH msg=audit(1163793771.148:14234): path="/dev/pts/8" type=AVC msg=audit(1163793771.152:14235): avc: denied { getattr } for pid=15794 comm="bash" name=".bash_history" dev=dm-0 ino=6547367 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=staff_u:object_r:staff_home_t:s0 tclass=file type=SYSCALL msg=audit(1163793771.152:14235): arch=40000003 syscall=195 success=yes exit=0 a0=9dcac10 a1=bfd66564 a2=457ff4 a3=1 items=0 ppid=1 pid=15794 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC_PATH msg=audit(1163793771.152:14235): path="/home/kmacmill/.bash_history" type=AVC msg=audit(1163793771.152:14236): avc: denied { append } for pid=15794 comm="bash" name=".bash_history" dev=dm-0 ino=6547367 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=staff_u:object_r:staff_home_t:s0 tclass=file type=SYSCALL msg=audit(1163793771.152:14236): arch=40000003 syscall=5 success=yes exit=3 a0=9de7320 a1=8401 a2=0 a3=8401 items=0 ppid=1 pid=15794 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC msg=audit(1163793771.152:14237): avc: denied { read } for pid=15794 comm="bash" name=".bash_history" dev=dm-0 ino=6547367 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=staff_u:object_r:staff_home_t:s0 tclass=file type=SYSCALL msg=audit(1163793771.152:14237): arch=40000003 syscall=5 success=yes exit=3 a0=9de7320 a1=8000 a2=0 a3=8000 items=0 ppid=1 pid=15794 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC msg=audit(1163793771.152:14238): avc: denied { write } for pid=15794 comm="bash" name=".bash_history" dev=dm-0 ino=6547367 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=staff_u:object_r:staff_home_t:s0 tclass=file type=SYSCALL msg=audit(1163793771.152:14238): arch=40000003 syscall=5 success=yes exit=3 a0=9de7320 a1=8201 a2=0 a3=8201 items=0 ppid=1 pid=15794 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC msg=audit(1163793771.152:14239): avc: denied { ioctl } for pid=15794 comm="bash" name="8" dev=devpts ino=10 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=staff_u:object_r:sysadm_devpts_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163793771.152:14239): arch=40000003 syscall=54 success=no exit=-25 a0=ff a1=5410 a2=bfd664a4 a3=bfd664ac items=0 ppid=1 pid=15794 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC_PATH msg=audit(1163793771.152:14239): path=2F6465762F7074732F38202864656C6574656429 type=AVC msg=audit(1163793771.316:14240): avc: denied { getattr } for pid=15841 comm="newrole" name="8" dev=devpts ino=10 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=staff_u:object_r:sysadm_devpts_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163793771.316:14240): arch=40000003 syscall=231 success=yes exit=36 a0=3 a1=a2f0d3 a2=9bcd788 a3=ff items=0 ppid=15821 pid=15841 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="newrole" exe="/usr/bin/newrole" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC msg=audit(1163793771.316:14241): avc: denied { relabelfrom } for pid=15841 comm="newrole" name="8" dev=devpts ino=10 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=staff_u:object_r:sysadm_devpts_t:s0 tclass=chr_file type=AVC msg=audit(1163793771.316:14241): avc: denied { relabelto } for pid=15841 comm="newrole" name="8" dev=devpts ino=10 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=staff_u:object_r:staff_devpts_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163793771.316:14241): arch=40000003 syscall=228 success=yes exit=0 a0=3 a1=a2f0d3 a2=9bcd658 a3=23 items=0 ppid=15821 pid=15841 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="newrole" exe="/usr/bin/newrole" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC msg=audit(1163793771.320:14242): avc: denied { ioctl } for pid=15821 comm="bash" name="8" dev=devpts ino=10 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=staff_u:object_r:staff_devpts_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163793771.320:14242): arch=40000003 syscall=54 success=no exit=-25 a0=ff a1=5410 a2=bf8ddd04 a3=bf8ddd0c items=0 ppid=15820 pid=15821 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC_PATH msg=audit(1163793771.320:14242): path=2F6465762F7074732F38202864656C6574656429 type=AVC msg=audit(1163793771.320:14243): avc: denied { write } for pid=15821 comm="bash" name="8" dev=devpts ino=10 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=staff_u:object_r:staff_devpts_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163793771.320:14243): arch=40000003 syscall=4 success=no exit=-5 a0=1 a1=b7f89000 a2=25 a3=25 items=0 ppid=15820 pid=15821 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC_PATH msg=audit(1163793771.320:14243): path=2F6465762F7074732F38202864656C6574656429 type=AVC msg=audit(1163793771.320:14244): avc: denied { search } for pid=15821 comm="bash" name="spool" dev=dm-0 ino=14436617 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:object_r:var_spool_t:s0 tclass=dir type=AVC msg=audit(1163793771.320:14244): avc: denied { search } for pid=15821 comm="bash" name="mail" dev=dm-0 ino=14436619 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:object_r:mail_spool_t:s0 tclass=dir type=AVC msg=audit(1163793771.320:14244): avc: denied { getattr } for pid=15821 comm="bash" name="kmacmill" dev=dm-0 ino=14437393 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:object_r:mail_spool_t:s0 tclass=file type=SYSCALL msg=audit(1163793771.320:14244): arch=40000003 syscall=195 success=yes exit=0 a0=9a6ff70 a1=bf8dd818 a2=24bff4 a3=bf8dd818 items=0 ppid=15820 pid=15821 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC_PATH msg=audit(1163793771.320:14244): path="/var/spool/mail/kmacmill" type=AVC msg=audit(1163793771.320:14245): avc: denied { read } for pid=15821 comm="bash" name="8" dev=devpts ino=10 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=staff_u:object_r:staff_devpts_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163793771.320:14245): arch=40000003 syscall=3 success=yes exit=0 a0=0 a1=bf8dd5cb a2=1 a3=24c420 items=0 ppid=15820 pid=15821 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC_PATH msg=audit(1163793771.320:14245): path=2F6465762F7074732F38202864656C6574656429 type=AVC msg=audit(1163793771.320:14246): avc: denied { search } for pid=15821 comm="bash" name="root" dev=dm-0 ino=13127137 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1163793771.320:14246): avc: denied { getattr } for pid=15821 comm="bash" name=".bash_history" dev=dm-0 ino=13127151 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=user_u:object_r:user_home_t:s0 tclass=file type=SYSCALL msg=audit(1163793771.320:14246): arch=40000003 syscall=195 success=yes exit=0 a0=9a6f800 a1=bf8de0d4 a2=24bff4 a3=0 items=0 ppid=15820 pid=15821 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC_PATH msg=audit(1163793771.320:14246): path="/root/.bash_history" type=AVC msg=audit(1163793771.340:14247): avc: denied { append } for pid=15821 comm="bash" name=".bash_history" dev=dm-0 ino=13127151 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=user_u:object_r:user_home_t:s0 tclass=file type=SYSCALL msg=audit(1163793771.340:14247): arch=40000003 syscall=5 success=yes exit=3 a0=9a70150 a1=8401 a2=0 a3=8401 items=0 ppid=15820 pid=15821 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC msg=audit(1163793771.360:14248): avc: denied { read } for pid=15821 comm="bash" name=".bash_history" dev=dm-0 ino=13127151 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=user_u:object_r:user_home_t:s0 tclass=file type=SYSCALL msg=audit(1163793771.360:14248): arch=40000003 syscall=5 success=yes exit=3 a0=9a70150 a1=8000 a2=0 a3=8000 items=0 ppid=15820 pid=15821 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC msg=audit(1163793771.372:14249): avc: denied { write } for pid=15821 comm="bash" name=".bash_history" dev=dm-0 ino=13127151 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=user_u:object_r:user_home_t:s0 tclass=file type=SYSCALL msg=audit(1163793771.372:14249): arch=40000003 syscall=5 success=yes exit=3 a0=9a70150 a1=8201 a2=0 a3=8201 items=0 ppid=15820 pid=15821 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC msg=audit(1163793771.372:14250): avc: denied { create } for pid=15820 comm="su" scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=staff_u:staff_r:staff_xserver_t:s0 tclass=netlink_audit_socket type=SYSCALL msg=audit(1163793771.372:14250): arch=40000003 syscall=102 success=yes exit=4 a0=1 a1=bffb8e00 a2=130ff4 a3=8004 items=0 ppid=1 pid=15820 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=(none) comm="su" exe="/bin/su" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC msg=audit(1163793771.376:14251): avc: denied { write } for pid=15820 comm="su" scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=staff_u:staff_r:staff_xserver_t:s0 tclass=netlink_audit_socket type=AVC msg=audit(1163793771.376:14251): avc: denied { nlmsg_relay } for pid=15820 comm="su" scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=staff_u:staff_r:staff_xserver_t:s0 tclass=netlink_audit_socket type=AVC msg=audit(1163793771.376:14251): avc: denied { audit_write } for pid=15820 comm="su" capability=29 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=staff_u:staff_r:staff_xserver_t:s0 tclass=capability type=CRED_DISP msg=audit(1163793771.376:14252): user pid=15820 uid=500 auid=500 subj=staff_u:staff_r:staff_xserver_t:s0 msg='PAM: setcred acct=root : exe="/bin/su" (hostname=?, addr=?, terminal=pts/8 res=success)' type=SYSCALL msg=audit(1163793771.376:14251): arch=40000003 syscall=102 success=yes exit=104 a0=b a1=bffae080 a2=130ff4 a3=bffb4ac0 items=0 ppid=1 pid=15820 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=(none) comm="su" exe="/bin/su" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC msg=audit(1163793771.376:14253): avc: denied { read } for pid=15820 comm="su" scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=staff_u:staff_r:staff_xserver_t:s0 tclass=netlink_audit_socket type=SYSCALL msg=audit(1163793771.376:14253): arch=40000003 syscall=102 success=yes exit=36 a0=c a1=bffae030 a2=130ff4 a3=bffb03fc items=0 ppid=1 pid=15820 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=(none) comm="su" exe="/bin/su" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=USER_END msg=audit(1163793771.376:14254): user pid=15820 uid=500 auid=500 subj=staff_u:staff_r:staff_xserver_t:s0 msg='PAM: session close acct=root : exe="/bin/su" (hostname=?, addr=?, terminal=pts/8 res=success)' type=AVC msg=audit(1163793882.003:14255): avc: denied { read } for pid=18900 comm="mozilla-xremote" name=".gdm0UWNIT" dev=dm-0 ino=14469400 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163793882.003:14255): arch=40000003 syscall=33 success=yes exit=0 a0=bf8b0f92 a1=4 a2=da3a64 a3=bf8b0f92 items=0 ppid=18899 pid=18900 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="mozilla-xremote" exe="/usr/lib/firefox-2.0/mozilla-xremote-client" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794112.281:14256): avc: denied { execute } for pid=16590 comm="bash" name="httpd" dev=dm-0 ino=9330356 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163794112.281:14256): arch=40000003 syscall=33 success=yes exit=0 a0=9261e70 a1=1 a2=11 a3=9261e70 items=0 ppid=16587 pid=16590 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794112.281:14257): avc: denied { read } for pid=16590 comm="bash" name="httpd" dev=dm-0 ino=9330356 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163794112.281:14257): arch=40000003 syscall=33 success=yes exit=0 a0=9261e70 a1=4 a2=ffffffff a3=9261e70 items=0 ppid=16587 pid=16590 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794114.237:14258): avc: denied { execute_no_trans } for pid=18920 comm="bash" name="httpd" dev=dm-0 ino=9330356 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163794114.237:14258): arch=40000003 syscall=11 success=yes exit=0 a0=925eac8 a1=925eab8 a2=9257740 a3=925e028 items=0 ppid=16590 pid=18920 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="httpd" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163794114.237:14258): path="/etc/rc.d/init.d/httpd" type=AVC msg=audit(1163794114.249:14259): avc: denied { ioctl } for pid=18920 comm="httpd" name="httpd" dev=dm-0 ino=9330356 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163794114.249:14259): arch=40000003 syscall=54 success=no exit=-25 a0=3 a1=5401 a2=bfa5ded8 a3=bfa5df18 items=0 ppid=16590 pid=18920 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="httpd" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163794114.249:14259): path="/etc/rc.d/init.d/httpd" type=AVC msg=audit(1163794116.229:14260): avc: denied { sys_ptrace } for pid=18931 comm="pidof" capability=19 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=capability type=AVC msg=audit(1163794116.229:14260): avc: denied { ptrace } for pid=18931 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=process type=SYSCALL msg=audit(1163794116.229:14260): arch=40000003 syscall=85 success=yes exit=10 a0=bff11a48 a1=8b621e0 a2=1000 a3=8b62028 items=0 ppid=18930 pid=18931 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794116.229:14261): avc: denied { ptrace } for pid=18931 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process type=SYSCALL msg=audit(1163794116.229:14261): arch=40000003 syscall=85 success=no exit=-2 a0=bff11a48 a1=8b631e8 a2=1000 a3=8b62058 items=0 ppid=18930 pid=18931 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794116.233:14262): avc: denied { ptrace } for pid=18931 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:auditd_t:s0 tclass=process type=SYSCALL msg=audit(1163794116.233:14262): arch=40000003 syscall=85 success=yes exit=12 a0=bff11a48 a1=8b84b10 a2=1000 a3=8b829c8 items=0 ppid=18930 pid=18931 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794116.233:14263): avc: denied { ptrace } for pid=18931 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:syslogd_t:s0 tclass=process type=SYSCALL msg=audit(1163794116.233:14263): arch=40000003 syscall=85 success=yes exit=13 a0=bff11a48 a1=8b86b20 a2=1000 a3=8b82a80 items=0 ppid=18930 pid=18931 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794116.233:14264): avc: denied { ptrace } for pid=18931 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:klogd_t:s0 tclass=process type=SYSCALL msg=audit(1163794116.233:14264): arch=40000003 syscall=85 success=yes exit=11 a0=bff11a48 a1=8b87cd0 a2=1000 a3=8b87b28 items=0 ppid=18930 pid=18931 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794116.233:14265): avc: denied { ptrace } for pid=18931 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:irqbalance_t:s0 tclass=process type=SYSCALL msg=audit(1163794116.233:14265): arch=40000003 syscall=85 success=yes exit=39 a0=bff11a48 a1=8b88cd8 a2=1000 a3=8b87b58 items=0 ppid=18930 pid=18931 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794116.237:14266): avc: denied { ptrace } for pid=18931 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:setrans_t:s0-s0:c0.c1023 tclass=process type=SYSCALL msg=audit(1163794116.237:14266): arch=40000003 syscall=85 success=yes exit=15 a0=bff11a48 a1=8b89ce0 a2=1000 a3=8b87ba8 items=0 ppid=18930 pid=18931 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794116.237:14267): avc: denied { ptrace } for pid=18931 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:portmap_t:s0 tclass=process type=SYSCALL msg=audit(1163794116.237:14267): arch=40000003 syscall=85 success=yes exit=13 a0=bff11a48 a1=8b8ace8 a2=1000 a3=8b87bf8 items=0 ppid=18930 pid=18931 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794116.237:14268): avc: denied { ptrace } for pid=18931 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:rpcd_t:s0 tclass=process type=SYSCALL msg=audit(1163794116.237:14268): arch=40000003 syscall=85 success=yes exit=34 a0=bff11a48 a1=8b8bcf0 a2=1000 a3=8b87c48 items=0 ppid=18930 pid=18931 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794116.237:14269): avc: denied { ptrace } for pid=18931 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:bluetooth_t:s0 tclass=process type=SYSCALL msg=audit(1163794116.237:14269): arch=40000003 syscall=85 success=yes exit=14 a0=bff11a48 a1=8b8cd28 a2=1000 a3=8b8ccf8 items=0 ppid=18930 pid=18931 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794116.237:14270): avc: denied { ptrace } for pid=18931 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:automount_t:s0 tclass=process type=SYSCALL msg=audit(1163794116.237:14270): arch=40000003 syscall=85 success=yes exit=38 a0=bff11a48 a1=8b90f08 a2=1000 a3=8b8ddf8 items=0 ppid=18930 pid=18931 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794116.237:14271): avc: denied { ptrace } for pid=18931 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:apmd_t:s0 tclass=process type=SYSCALL msg=audit(1163794116.237:14271): arch=40000003 syscall=85 success=yes exit=15 a0=bff11a48 a1=8b91f10 a2=1000 a3=8b8de48 items=0 ppid=18930 pid=18931 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794116.237:14272): avc: denied { ptrace } for pid=18931 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:hplip_t:s0 tclass=process type=SYSCALL msg=audit(1163794116.237:14272): arch=40000003 syscall=85 success=yes exit=15 a0=bff11a48 a1=8b92f48 a2=1000 a3=8b92f18 items=0 ppid=18930 pid=18931 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794116.237:14273): avc: denied { ptrace } for pid=18931 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:inetd_t:s0 tclass=process type=SYSCALL msg=audit(1163794116.237:14273): arch=40000003 syscall=85 success=yes exit=16 a0=bff11a48 a1=8b95120 a2=1000 a3=8b93f80 items=0 ppid=18930 pid=18931 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794116.237:14274): avc: denied { ptrace } for pid=18931 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:sendmail_t:s0 tclass=process type=SYSCALL msg=audit(1163794116.237:14274): arch=40000003 syscall=85 success=yes exit=27 a0=bff11a48 a1=8b96128 a2=1000 a3=8b93fe8 items=0 ppid=18930 pid=18931 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794116.237:14275): avc: denied { ptrace } for pid=18931 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:gpm_t:s0 tclass=process type=SYSCALL msg=audit(1163794116.237:14275): arch=40000003 syscall=85 success=yes exit=13 a0=bff11a48 a1=8b982f8 a2=1000 a3=8b98138 items=0 ppid=18930 pid=18931 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794116.241:14276): avc: denied { ptrace } for pid=18931 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tclass=process type=SYSCALL msg=audit(1163794116.241:14276): arch=40000003 syscall=85 success=yes exit=15 a0=bff11a48 a1=8b99300 a2=1000 a3=8b98168 items=0 ppid=18930 pid=18931 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794116.241:14277): avc: denied { ptrace } for pid=18931 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:xfs_t:s0 tclass=process type=SYSCALL msg=audit(1163794116.241:14277): arch=40000003 syscall=85 success=yes exit=12 a0=bff11a48 a1=8b9a308 a2=1000 a3=8b981b8 items=0 ppid=18930 pid=18931 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794116.241:14278): avc: denied { ptrace } for pid=18931 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:hald_t:s0 tclass=process type=SYSCALL msg=audit(1163794116.241:14278): arch=40000003 syscall=85 success=yes exit=33 a0=bff11a48 a1=8b9b310 a2=1000 a3=8b98208 items=0 ppid=18930 pid=18931 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794116.241:14279): avc: denied { ptrace } for pid=18931 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:xenstored_t:s0 tclass=process type=SYSCALL msg=audit(1163794116.241:14279): arch=40000003 syscall=85 success=yes exit=19 a0=bff11a48 a1=8ba16b8 a2=1000 a3=8ba0518 items=0 ppid=18930 pid=18931 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794116.241:14280): avc: denied { ptrace } for pid=18931 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:xenconsoled_t:s0 tclass=process type=SYSCALL msg=audit(1163794116.241:14280): arch=40000003 syscall=85 success=yes exit=21 a0=bff11a48 a1=8ba26c0 a2=1000 a3=8ba0568 items=0 ppid=18930 pid=18931 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794116.241:14281): avc: denied { ptrace } for pid=18931 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:xend_t:s0 tclass=process type=SYSCALL msg=audit(1163794116.241:14281): arch=40000003 syscall=85 success=yes exit=15 a0=bff11a48 a1=8ba36c8 a2=1000 a3=8ba05a8 items=0 ppid=18930 pid=18931 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794116.241:14282): avc: denied { ptrace } for pid=18931 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:fsdaemon_t:s0 tclass=process type=SYSCALL msg=audit(1163794116.241:14282): arch=40000003 syscall=85 success=yes exit=35 a0=bff11a48 a1=8ba6898 a2=1000 a3=8ba5708 items=0 ppid=18930 pid=18931 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794116.241:14283): avc: denied { ptrace } for pid=18931 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:getty_t:s0 tclass=process type=SYSCALL msg=audit(1163794116.241:14283): arch=40000003 syscall=85 success=yes exit=14 a0=bff11a48 a1=8ba78a0 a2=1000 a3=8ba5770 items=0 ppid=18930 pid=18931 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794116.245:14284): avc: denied { ptrace } for pid=18931 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tclass=process type=SYSCALL msg=audit(1163794116.245:14284): arch=40000003 syscall=85 success=yes exit=39 a0=bff11a48 a1=8badc08 a2=1000 a3=8ba99e8 items=0 ppid=18930 pid=18931 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794116.245:14285): avc: denied { ptrace } for pid=18931 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_dbusd_t:s0 tclass=process type=SYSCALL msg=audit(1163794116.245:14285): arch=40000003 syscall=85 success=yes exit=35 a0=bff11a48 a1=8bafc18 a2=1000 a3=8badad0 items=0 ppid=18930 pid=18931 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794116.245:14286): avc: denied { ptrace } for pid=18931 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:xdm_xserver_t:s0-s0:c0.c1023 tclass=process type=SYSCALL msg=audit(1163794116.245:14286): arch=40000003 syscall=85 success=yes exit=13 a0=bff11a48 a1=8bba010 a2=1000 a3=8bb7ec0 items=0 ppid=18930 pid=18931 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794116.245:14287): avc: denied { ptrace } for pid=18931 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_ssh_agent_t:s0 tclass=process type=SYSCALL msg=audit(1163794116.245:14287): arch=40000003 syscall=85 success=yes exit=18 a0=bff11a48 a1=8bbc1a8 a2=1000 a3=8bb7f88 items=0 ppid=18930 pid=18931 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794116.249:14288): avc: denied { ptrace } for pid=18931 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:pam_t:s0 tclass=process type=SYSCALL msg=audit(1163794116.249:14288): arch=40000003 syscall=85 success=yes exit=25 a0=bff11a48 a1=8bce950 a2=1000 a3=8bcd7a0 items=0 ppid=18930 pid=18931 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794116.249:14289): avc: denied { ptrace } for pid=18931 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_mozilla_t:s0 tclass=process type=SYSCALL msg=audit(1163794116.249:14289): arch=40000003 syscall=85 success=yes exit=32 a0=bff11a48 a1=8bd6ce0 a2=1000 a3=8bd5b58 items=0 ppid=18930 pid=18931 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794116.249:14290): avc: denied { ptrace } for pid=18931 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_su_t:s0 tclass=process type=SYSCALL msg=audit(1163794116.249:14290): arch=40000003 syscall=85 success=yes exit=7 a0=bff11a48 a1=8bdae88 a2=1000 a3=8bd9cf8 items=0 ppid=18930 pid=18931 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794116.249:14291): avc: denied { ptrace } for pid=18931 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:system_r:sshd_t:s0-s0:c0.c1023 tclass=process type=SYSCALL msg=audit(1163794116.249:14291): arch=40000003 syscall=85 success=yes exit=14 a0=bff11a48 a1=8be0058 a2=1000 a3=8bdeed8 items=0 ppid=18930 pid=18931 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794116.253:14292): avc: denied { ptrace } for pid=18931 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:system_r:crond_t:s0-s0:c0.c1023 tclass=process type=SYSCALL msg=audit(1163794116.253:14292): arch=40000003 syscall=85 success=yes exit=13 a0=bff11a48 a1=8be1060 a2=1000 a3=8bdef30 items=0 ppid=18930 pid=18931 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794116.253:14293): avc: denied { ptrace } for pid=18931 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:system_r:rpcd_t:s0 tclass=process type=SYSCALL msg=audit(1163794116.253:14293): arch=40000003 syscall=85 success=yes exit=20 a0=bff11a48 a1=8be2068 a2=1000 a3=8bdef88 items=0 ppid=18930 pid=18931 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794116.253:14294): avc: denied { ptrace } for pid=18931 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_evolution_server_t:s0 tclass=process type=SYSCALL msg=audit(1163794116.253:14294): arch=40000003 syscall=85 success=yes exit=39 a0=bff11a48 a1=8be6200 a2=1000 a3=8be3160 items=0 ppid=18930 pid=18931 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794116.253:14295): avc: denied { ptrace } for pid=18931 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tclass=process type=SYSCALL msg=audit(1163794116.253:14295): arch=40000003 syscall=85 success=yes exit=50 a0=bff11a48 a1=8be83b8 a2=1000 a3=8be7238 items=0 ppid=18930 pid=18931 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794116.253:14296): avc: denied { ptrace } for pid=18931 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_thunderbird_t:s0 tclass=process type=SYSCALL msg=audit(1163794116.253:14296): arch=40000003 syscall=85 success=yes exit=9 a0=bff11a48 a1=8beb588 a2=1000 a3=8be7368 items=0 ppid=18930 pid=18931 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794116.285:14297): avc: denied { ptrace } for pid=18932 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:hplip_t:s0 tclass=process type=SYSCALL msg=audit(1163794116.285:14297): arch=40000003 syscall=85 success=yes exit=15 a0=bfb45e88 a1=88a3f48 a2=1000 a3=88a3f18 items=0 ppid=18930 pid=18932 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794116.285:14298): avc: denied { ptrace } for pid=18932 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:xfs_t:s0 tclass=process type=SYSCALL msg=audit(1163794116.285:14298): arch=40000003 syscall=85 success=yes exit=12 a0=bfb45e88 a1=88ab308 a2=1000 a3=88a91b8 items=0 ppid=18930 pid=18932 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794117.818:14299): avc: denied { write } for pid=15069 comm="vpnc" name="tun" dev=tmpfs ino=1473 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:tun_tap_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163794117.818:14299): arch=40000003 syscall=4 success=yes exit=133 a0=4 a1=805c570 a2=85 a3=bfd587e4 items=0 ppid=15067 pid=15069 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vpnc" exe="/usr/sbin/vpnc" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163794117.818:14299): path="/dev/net/tun" type=AVC msg=audit(1163794117.818:14300): avc: denied { read } for pid=15069 comm="vpnc" name="tun" dev=tmpfs ino=1473 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:tun_tap_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163794117.818:14300): arch=40000003 syscall=3 success=yes exit=52 a0=4 a1=805c5a0 a2=1000 a3=805c5a0 items=0 ppid=15067 pid=15069 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vpnc" exe="/usr/sbin/vpnc" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163794117.818:14300): path="/dev/net/tun" type=AVC msg=audit(1163794126.150:14301): avc: denied { dac_override } for pid=16590 comm="bash" capability=1 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=capability type=SYSCALL msg=audit(1163794126.150:14301): arch=40000003 syscall=195 success=yes exit=0 a0=9261e40 a1=bfb3fc64 a2=573ff4 a3=9261e52 items=0 ppid=16587 pid=16590 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794129.714:14302): avc: denied { read } for pid=18937 comm="gnome-terminal" name=".ICEauthority" dev=dm-0 ino=6574784 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:staff_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163794129.714:14302): arch=40000003 syscall=33 success=yes exit=0 a0=9c66a38 a1=4 a2=df7770 a3=9c66a38 items=0 ppid=1 pid=18937 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-terminal" exe="/usr/bin/gnome-terminal" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794147.003:14303): avc: denied { lock } for pid=16476 comm="pam_timestamp_c" name="utmp" dev=dm-0 ino=14436583 scontext=staff_u:staff_r:pam_t:s0 tcontext=system_u:object_r:initrc_var_run_t:s0 tclass=file type=SYSCALL msg=audit(1163794147.003:14303): arch=40000003 syscall=221 success=yes exit=0 a0=3 a1=7 a2=bfded3d8 a3=0 items=0 ppid=16467 pid=16476 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=(none) comm="pam_timestamp_c" exe="/sbin/pam_timestamp_check" subj=staff_u:staff_r:pam_t:s0 key=(null) type=AVC_PATH msg=audit(1163794147.003:14303): path="/var/run/utmp" type=AVC msg=audit(1163794172.261:14304): avc: denied { getattr } for pid=19009 comm="ls" name="rndc.key" dev=dm-0 ino=9330789 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:dnssec_t:s0 tclass=file type=SYSCALL msg=audit(1163794172.261:14304): arch=40000003 syscall=196 success=yes exit=0 a0=bfa889d0 a1=9063944 a2=24bff4 a3=8 items=0 ppid=16590 pid=19009 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="ls" exe="/bin/ls" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163794172.261:14304): path="/etc/rndc.key" type=AVC msg=audit(1163794189.118:14305): avc: denied { execute } for pid=16590 comm="bash" name="semodule" dev=dm-0 ino=10325888 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:semanage_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163794189.118:14305): arch=40000003 syscall=33 success=yes exit=0 a0=924b250 a1=1 a2=11 a3=924b250 items=0 ppid=16587 pid=16590 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794189.118:14306): avc: denied { read } for pid=16590 comm="bash" name="semodule" dev=dm-0 ino=10325888 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:semanage_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163794189.118:14306): arch=40000003 syscall=33 success=yes exit=0 a0=924b250 a1=4 a2=ffffffff a3=924b250 items=0 ppid=16587 pid=16590 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794194.550:14307): avc: denied { execute_no_trans } for pid=19011 comm="bash" name="semodule" dev=dm-0 ino=10325888 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:semanage_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163794194.550:14307): arch=40000003 syscall=11 success=yes exit=0 a0=925dbe0 a1=9249808 a2=9257740 a3=9261e10 items=0 ppid=16590 pid=19011 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="semodule" exe="/usr/sbin/semodule" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163794194.550:14307): path="/usr/sbin/semodule" type=AVC msg=audit(1163794194.594:14308): avc: denied { execute } for pid=19011 comm="semodule" name="setfiles" dev=dm-0 ino=9984601 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:setfiles_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163794194.594:14308): arch=40000003 syscall=33 success=yes exit=0 a0=c75905 a1=1 a2=c7b21c a3=8fef510 items=0 ppid=16590 pid=19011 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="semodule" exe="/usr/sbin/semodule" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794194.646:14309): avc: denied { read } for pid=19011 comm="semodule" name="semanage.read.LOCK" dev=dm-0 ino=9334533 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:semanage_read_lock_t:s0 tclass=file type=SYSCALL msg=audit(1163794194.646:14309): arch=40000003 syscall=33 success=yes exit=0 a0=8fef628 a1=4 a2=c7b21c a3=8fef628 items=0 ppid=16590 pid=19011 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="semodule" exe="/usr/sbin/semodule" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794194.650:14310): avc: denied { write } for pid=19011 comm="semodule" name="modules" dev=dm-0 ino=9395255 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:selinux_config_t:s0 tclass=dir type=SYSCALL msg=audit(1163794194.650:14310): arch=40000003 syscall=33 success=yes exit=0 a0=8fef6c8 a1=7 a2=c7b21c a3=8fef628 items=0 ppid=16590 pid=19011 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="semodule" exe="/usr/sbin/semodule" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794194.654:14311): avc: denied { read } for pid=19011 comm="semodule" name="semanage.trans.LOCK" dev=dm-0 ino=9334536 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:semanage_trans_lock_t:s0 tclass=file type=SYSCALL msg=audit(1163794194.654:14311): arch=40000003 syscall=5 success=yes exit=3 a0=8fef5f0 a1=0 a2=e4e120 a3=8fef3e0 items=0 ppid=16590 pid=19011 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="semodule" exe="/usr/sbin/semodule" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794194.658:14312): avc: denied { lock } for pid=19011 comm="semodule" name="semanage.trans.LOCK" dev=dm-0 ino=9334536 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:semanage_trans_lock_t:s0 tclass=file type=SYSCALL msg=audit(1163794194.658:14312): arch=40000003 syscall=143 success=yes exit=0 a0=3 a1=6 a2=c7b21c a3=5 items=0 ppid=16590 pid=19011 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="semodule" exe="/usr/sbin/semodule" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163794194.658:14312): path="/etc/selinux/strict/modules/semanage.trans.LOCK" type=AVC msg=audit(1163794194.658:14313): avc: denied { write } for pid=19011 comm="semodule" name="modules" dev=dm-0 ino=9334534 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:selinux_config_t:s0 tclass=dir type=AVC msg=audit(1163794194.658:14313): avc: denied { add_name } for pid=19011 comm="semodule" name="tmp" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:selinux_config_t:s0 tclass=dir type=AVC msg=audit(1163794194.658:14313): avc: denied { create } for pid=19011 comm="semodule" name="tmp" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:selinux_config_t:s0 tclass=dir type=SYSCALL msg=audit(1163794194.658:14313): arch=40000003 syscall=39 success=yes exit=0 a0=8fef6f8 a1=1c0 a2=c7b21c a3=8fef6f8 items=0 ppid=16590 pid=19011 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="semodule" exe="/usr/sbin/semodule" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794194.674:14314): avc: denied { add_name } for pid=19011 comm="semodule" name="base.linked.tmp" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:selinux_config_t:s0 tclass=dir type=AVC msg=audit(1163794194.674:14314): avc: denied { create } for pid=19011 comm="semodule" name="base.linked.tmp" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:selinux_config_t:s0 tclass=file type=SYSCALL msg=audit(1163794194.674:14314): arch=40000003 syscall=5 success=yes exit=5 a0=bff43c08 a1=241 a2=81a4 a3=81a4 items=0 ppid=16590 pid=19011 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="semodule" exe="/usr/sbin/semodule" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794194.690:14315): avc: denied { write } for pid=19011 comm="semodule" name="base.linked.tmp" dev=dm-0 ino=9331140 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:selinux_config_t:s0 tclass=file type=SYSCALL msg=audit(1163794194.690:14315): arch=40000003 syscall=4 success=yes exit=4192 a0=5 a1=bff42ba8 a2=1060 a3=1060 items=0 ppid=16590 pid=19011 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="semodule" exe="/usr/sbin/semodule" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163794194.690:14315): path="/etc/selinux/strict/modules/tmp/base.linked.tmp" type=AVC msg=audit(1163794194.986:14316): avc: denied { remove_name } for pid=19011 comm="semodule" name="base.linked.tmp" dev=dm-0 ino=9331140 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:selinux_config_t:s0 tclass=dir type=AVC msg=audit(1163794194.986:14316): avc: denied { rename } for pid=19011 comm="semodule" name="base.linked.tmp" dev=dm-0 ino=9331140 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:selinux_config_t:s0 tclass=file type=SYSCALL msg=audit(1163794194.986:14316): arch=40000003 syscall=38 success=yes exit=0 a0=bff43c08 a1=bff44cb8 a2=c7b21c a3=0 items=0 ppid=16590 pid=19011 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="semodule" exe="/usr/sbin/semodule" subj=staff_u:staff_r:staff_t:s0 key=(null) type=USER_ACCT msg=audit(1163794201.951:14317): user pid=19014 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1163794201.951:14318): login pid=19014 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1163794201.951:14319): user pid=19014 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1163794201.951:14320): user pid=19014 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1163794201.963:14321): avc: denied { execute } for pid=19015 comm="sa1" name="sadc" dev=dm-0 ino=12865253 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=AVC msg=audit(1163794201.963:14321): avc: denied { execute_no_trans } for pid=19015 comm="sa1" name="sadc" dev=dm-0 ino=12865253 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=AVC msg=audit(1163794201.963:14321): avc: denied { read } for pid=19015 comm="sa1" name="sadc" dev=dm-0 ino=12865253 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163794201.963:14321): arch=40000003 syscall=11 success=yes exit=0 a0=95c5d48 a1=95c5740 a2=95c5d60 a3=95c5740 items=0 ppid=19014 pid=19015 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163794201.963:14321): path="/usr/lib/sa/sadc" type=AVC_PATH msg=audit(1163794201.963:14321): path="/usr/lib/sa/sadc" type=AVC msg=audit(1163794201.963:14322): avc: denied { search } for pid=19015 comm="sadc" name="net" dev=proc ino=-268435432 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=dir type=AVC msg=audit(1163794201.963:14322): avc: denied { read } for pid=19015 comm="sadc" name="dev" dev=proc ino=-268434164 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=file type=SYSCALL msg=audit(1163794201.963:14322): arch=40000003 syscall=5 success=yes exit=3 a0=80502e1 a1=0 a2=1b6 a3=9af87f8 items=0 ppid=19014 pid=19015 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163794201.963:14323): avc: denied { getattr } for pid=19015 comm="sadc" name="dev" dev=proc ino=-268434164 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=file type=SYSCALL msg=audit(1163794201.963:14323): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bfac13e8 a2=24bff4 a3=9af87f8 items=0 ppid=19014 pid=19015 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163794201.963:14323): path="/proc/net/dev" type=AVC msg=audit(1163794201.963:14324): avc: denied { search } for pid=19015 comm="sadc" name="sa" dev=dm-0 ino=14607631 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=dir type=SYSCALL msg=audit(1163794201.963:14324): arch=40000003 syscall=33 success=yes exit=0 a0=bfac1794 a1=0 a2=bfac1688 a3=bfac1690 items=0 ppid=19014 pid=19015 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163794201.963:14325): avc: denied { read append } for pid=19015 comm="sadc" name="sa17" dev=dm-0 ino=14600257 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=file type=SYSCALL msg=audit(1163794201.963:14325): arch=40000003 syscall=5 success=yes exit=3 a0=bfac1794 a1=402 a2=bfac1958 a3=bfac1690 items=0 ppid=19014 pid=19015 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163794201.963:14326): avc: denied { lock } for pid=19015 comm="sadc" name="sa17" dev=dm-0 ino=14600257 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=file type=SYSCALL msg=audit(1163794201.963:14326): arch=40000003 syscall=143 success=yes exit=0 a0=3 a1=6 a2=bfac1690 a3=3 items=0 ppid=19014 pid=19015 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163794201.963:14326): path="/var/log/sa/sa17" type=CRED_DISP msg=audit(1163794202.027:14327): user pid=19014 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1163794202.027:14328): user pid=19014 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1163794205.023:14329): avc: denied { lock } for pid=19011 comm="semodule" name="semanage.read.LOCK" dev=dm-0 ino=9334533 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:semanage_read_lock_t:s0 tclass=file type=SYSCALL msg=audit(1163794205.023:14329): arch=40000003 syscall=143 success=yes exit=0 a0=4 a1=6 a2=c7b21c a3=5 items=0 ppid=16590 pid=19011 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="semodule" exe="/usr/sbin/semodule" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163794205.023:14329): path="/etc/selinux/strict/modules/semanage.read.LOCK" type=AVC msg=audit(1163794205.055:14330): avc: denied { write } for pid=19011 comm="semodule" name="previous" dev=dm-0 ino=9334708 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:semanage_store_t:s0 tclass=dir type=AVC msg=audit(1163794205.055:14330): avc: denied { remove_name } for pid=19011 comm="semodule" name="base.linked" dev=dm-0 ino=9334715 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:semanage_store_t:s0 tclass=dir type=AVC msg=audit(1163794205.055:14330): avc: denied { unlink } for pid=19011 comm="semodule" name="base.linked" dev=dm-0 ino=9334715 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:semanage_store_t:s0 tclass=file type=SYSCALL msg=audit(1163794205.055:14330): arch=40000003 syscall=10 success=yes exit=0 a0=bff46b09 a1=0 a2=e4cff4 a3=bff46b09 items=0 ppid=16590 pid=19011 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="semodule" exe="/usr/sbin/semodule" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794205.107:14331): avc: denied { write } for pid=19011 comm="semodule" name="modules" dev=dm-0 ino=9334945 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:semanage_store_t:s0 tclass=dir type=AVC msg=audit(1163794205.107:14331): avc: denied { remove_name } for pid=19011 comm="semodule" name="thunderbird.pp" dev=dm-0 ino=9334946 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:semanage_store_t:s0 tclass=dir type=SYSCALL msg=audit(1163794205.107:14331): arch=40000003 syscall=10 success=yes exit=0 a0=bff46959 a1=0 a2=e4cff4 a3=bff46959 items=0 ppid=16590 pid=19011 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="semodule" exe="/usr/sbin/semodule" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794205.623:14332): avc: denied { rmdir } for pid=19011 comm="semodule" name="modules" dev=dm-0 ino=9334945 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:semanage_store_t:s0 tclass=dir type=SYSCALL msg=audit(1163794205.623:14332): arch=40000003 syscall=40 success=yes exit=0 a0=bff46b09 a1=b7f3d688 a2=e4cff4 a3=bff46b09 items=0 ppid=16590 pid=19011 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="semodule" exe="/usr/sbin/semodule" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794205.631:14333): avc: denied { remove_name } for pid=19011 comm="semodule" name="previous" dev=dm-0 ino=9334708 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:selinux_config_t:s0 tclass=dir type=AVC msg=audit(1163794205.631:14333): avc: denied { rmdir } for pid=19011 comm="semodule" name="previous" dev=dm-0 ino=9334708 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:semanage_store_t:s0 tclass=dir type=SYSCALL msg=audit(1163794205.631:14333): arch=40000003 syscall=40 success=yes exit=0 a0=8ff3b58 a1=b7f3d688 a2=e4cff4 a3=8ff3b58 items=0 ppid=16590 pid=19011 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="semodule" exe="/usr/sbin/semodule" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794205.631:14334): avc: denied { rename } for pid=19011 comm="semodule" name="active" dev=dm-0 ino=9395239 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:selinux_config_t:s0 tclass=dir type=SYSCALL msg=audit(1163794205.631:14334): arch=40000003 syscall=38 success=yes exit=0 a0=8fef6a0 a1=8ff3b58 a2=c7b21c a3=bff46cb8 items=0 ppid=16590 pid=19011 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="semodule" exe="/usr/sbin/semodule" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794205.631:14335): avc: denied { write } for pid=19011 comm="semodule" name="policy" dev=dm-0 ino=9334538 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:policy_config_t:s0 tclass=dir type=AVC msg=audit(1163794205.631:14335): avc: denied { add_name } for pid=19011 comm="semodule" name="policy.21.tmp" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:policy_config_t:s0 tclass=dir type=AVC msg=audit(1163794205.631:14335): avc: denied { create } for pid=19011 comm="semodule" name="policy.21.tmp" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:policy_config_t:s0 tclass=file type=SYSCALL msg=audit(1163794205.631:14335): arch=40000003 syscall=5 success=yes exit=6 a0=bff3fac8 a1=241 a2=1a4 a3=1a4 items=0 ppid=16590 pid=19011 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="semodule" exe="/usr/sbin/semodule" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794205.647:14336): avc: denied { write } for pid=19011 comm="semodule" name="policy.21.tmp" dev=dm-0 ino=9334698 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:policy_config_t:s0 tclass=file type=SYSCALL msg=audit(1163794205.647:14336): arch=40000003 syscall=4 success=yes exit=4192 a0=6 a1=bff3ea68 a2=1060 a3=1060 items=0 ppid=16590 pid=19011 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="semodule" exe="/usr/sbin/semodule" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163794205.647:14336): path="/etc/selinux/strict/policy/policy.21.tmp" type=AVC msg=audit(1163794205.759:14337): avc: denied { write } for pid=19017 comm="gnome-terminal" name="15931" dev=dm-0 ino=14567724 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:ice_tmp_t:s0 tclass=sock_file type=SYSCALL msg=audit(1163794205.759:14337): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=bfe1f580 a2=df7770 a3=16 items=0 ppid=1 pid=19017 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-terminal" exe="/usr/bin/gnome-terminal" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794205.667:14338): avc: denied { remove_name } for pid=19011 comm="semodule" name="policy.21.tmp" dev=dm-0 ino=9334698 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:policy_config_t:s0 tclass=dir type=AVC msg=audit(1163794205.667:14338): avc: denied { rename } for pid=19011 comm="semodule" name="policy.21.tmp" dev=dm-0 ino=9334698 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:policy_config_t:s0 tclass=file type=AVC msg=audit(1163794205.667:14338): avc: denied { unlink } for pid=19011 comm="semodule" name="policy.21" dev=dm-0 ino=9331805 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:policy_config_t:s0 tclass=file type=SYSCALL msg=audit(1163794205.667:14338): arch=40000003 syscall=38 success=yes exit=0 a0=bff3fac8 a1=bff42c08 a2=c7b21c a3=0 items=0 ppid=16590 pid=19011 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="semodule" exe="/usr/sbin/semodule" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794205.783:14339): avc: denied { write } for pid=19011 comm="semodule" name="files" dev=dm-0 ino=9334527 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:file_context_t:s0 tclass=dir type=AVC msg=audit(1163794205.783:14339): avc: denied { add_name } for pid=19011 comm="semodule" name="homedir_template.tmp" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:file_context_t:s0 tclass=dir type=AVC msg=audit(1163794205.783:14339): avc: denied { create } for pid=19011 comm="semodule" name="homedir_template.tmp" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:file_context_t:s0 tclass=file type=SYSCALL msg=audit(1163794205.783:14339): arch=40000003 syscall=5 success=yes exit=6 a0=bff3fac8 a1=241 a2=1a4 a3=1a4 items=0 ppid=16590 pid=19011 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="semodule" exe="/usr/sbin/semodule" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794205.799:14340): avc: denied { write } for pid=19011 comm="semodule" name="homedir_template.tmp" dev=dm-0 ino=9331805 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:file_context_t:s0 tclass=file type=SYSCALL msg=audit(1163794205.799:14340): arch=40000003 syscall=4 success=yes exit=2138 a0=6 a1=bff3ea68 a2=85a a3=85a items=0 ppid=16590 pid=19011 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="semodule" exe="/usr/sbin/semodule" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163794205.799:14340): path="/etc/selinux/strict/contexts/files/homedir_template.tmp" type=AVC msg=audit(1163794205.799:14341): avc: denied { remove_name } for pid=19011 comm="semodule" name="homedir_template.tmp" dev=dm-0 ino=9331805 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:file_context_t:s0 tclass=dir type=AVC msg=audit(1163794205.799:14341): avc: denied { rename } for pid=19011 comm="semodule" name="homedir_template.tmp" dev=dm-0 ino=9331805 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:file_context_t:s0 tclass=file type=AVC msg=audit(1163794205.799:14341): avc: denied { unlink } for pid=19011 comm="semodule" name="homedir_template" dev=dm-0 ino=9330752 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:file_context_t:s0 tclass=file type=SYSCALL msg=audit(1163794205.799:14341): arch=40000003 syscall=38 success=yes exit=0 a0=bff3fac8 a1=bff43c08 a2=c7b21c a3=0 items=0 ppid=16590 pid=19011 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="semodule" exe="/usr/sbin/semodule" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794205.819:14342): avc: denied { unlink } for pid=19011 comm="semodule" name="seusers" dev=dm-0 ino=9334539 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:selinux_config_t:s0 tclass=file type=SYSCALL msg=audit(1163794205.819:14342): arch=40000003 syscall=38 success=yes exit=0 a0=bff3fac8 a1=bff41c08 a2=c7b21c a3=0 items=0 ppid=16590 pid=19011 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="semodule" exe="/usr/sbin/semodule" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794205.819:14343): avc: denied { write } for pid=19011 comm="semodule" name="contexts" dev=dm-0 ino=9334400 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:default_context_t:s0 tclass=dir type=AVC msg=audit(1163794205.819:14343): avc: denied { add_name } for pid=19011 comm="semodule" name="netfilter_contexts.tmp" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:default_context_t:s0 tclass=dir type=AVC msg=audit(1163794205.819:14343): avc: denied { create } for pid=19011 comm="semodule" name="netfilter_contexts.tmp" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:default_context_t:s0 tclass=file type=SYSCALL msg=audit(1163794205.819:14343): arch=40000003 syscall=5 success=yes exit=6 a0=bff3fac8 a1=241 a2=1a4 a3=1a4 items=0 ppid=16590 pid=19011 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="semodule" exe="/usr/sbin/semodule" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794205.819:14344): avc: denied { write } for pid=19011 comm="semodule" name="netfilter_contexts.tmp" dev=dm-0 ino=9334539 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:default_context_t:s0 tclass=file type=SYSCALL msg=audit(1163794205.819:14344): arch=40000003 syscall=4 success=yes exit=4192 a0=6 a1=bff3ea68 a2=1060 a3=1060 items=0 ppid=16590 pid=19011 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="semodule" exe="/usr/sbin/semodule" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163794205.819:14344): path="/etc/selinux/strict/contexts/netfilter_contexts.tmp" type=AVC msg=audit(1163794205.819:14345): avc: denied { remove_name } for pid=19011 comm="semodule" name="netfilter_contexts.tmp" dev=dm-0 ino=9334539 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:default_context_t:s0 tclass=dir type=AVC msg=audit(1163794205.819:14345): avc: denied { rename } for pid=19011 comm="semodule" name="netfilter_contexts.tmp" dev=dm-0 ino=9334539 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:default_context_t:s0 tclass=file type=AVC msg=audit(1163794205.819:14345): avc: denied { unlink } for pid=19011 comm="semodule" name="netfilter_contexts" dev=dm-0 ino=9334535 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:default_context_t:s0 tclass=file type=SYSCALL msg=audit(1163794205.819:14345): arch=40000003 syscall=38 success=yes exit=0 a0=bff3fac8 a1=bff40c08 a2=c7b21c a3=0 items=0 ppid=16590 pid=19011 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="semodule" exe="/usr/sbin/semodule" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794205.871:14346): avc: denied { execute } for pid=19018 comm="semodule" name="load_policy" dev=dm-0 ino=10325048 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:load_policy_exec_t:s0 tclass=file type=AVC msg=audit(1163794205.871:14346): avc: denied { execute_no_trans } for pid=19018 comm="semodule" name="load_policy" dev=dm-0 ino=10325048 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:load_policy_exec_t:s0 tclass=file type=AVC msg=audit(1163794205.871:14346): avc: denied { read } for pid=19018 comm="semodule" name="load_policy" dev=dm-0 ino=10325048 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:load_policy_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163794205.871:14346): arch=40000003 syscall=11 success=yes exit=0 a0=8fef520 a1=d26a0c0 a2=0 a3=0 items=0 ppid=19011 pid=19018 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="load_policy" exe="/usr/sbin/load_policy" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163794205.871:14346): path="/usr/sbin/load_policy" type=AVC_PATH msg=audit(1163794205.871:14346): path="/usr/sbin/load_policy" type=AVC msg=audit(1163794205.935:14347): avc: denied { read } for pid=19018 comm="load_policy" name="policy.21" dev=dm-0 ino=9334698 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:policy_config_t:s0 tclass=file type=SYSCALL msg=audit(1163794205.935:14347): arch=40000003 syscall=5 success=yes exit=3 a0=bfd15358 a1=8000 a2=0 a3=8000 items=0 ppid=19011 pid=19018 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="load_policy" exe="/usr/sbin/load_policy" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794206.019:14348): avc: denied { load_policy } for pid=19018 comm="load_policy" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:security_t:s0 tclass=security type=MAC_POLICY_LOAD msg=audit(1163794206.019:14348): policy loaded auid=500 type=SYSCALL msg=audit(1163794206.019:14348): arch=40000003 syscall=4 success=yes exit=2111036 a0=4 a1=b7d97000 a2=20363c a3=bfd14288 items=0 ppid=19011 pid=19018 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="load_policy" exe="/usr/sbin/load_policy" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794206.135:14349): avc: denied { ptrace } for pid=15988 comm="dbus-daemon" scontext=staff_u:staff_r:staff_dbusd_t:s0 tcontext=staff_u:staff_r:staff_dbusd_t:s0 tclass=process type=SYSCALL msg=audit(1163794206.135:14349): arch=40000003 syscall=85 success=yes exit=16 a0=a45fce a1=b7edab58 a2=fff a3=b7eddeba items=0 ppid=1 pid=15988 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="dbus-daemon" exe="/bin/dbus-daemon" subj=staff_u:staff_r:staff_dbusd_t:s0 key=(null) type=AVC msg=audit(1163794206.151:14350): avc: denied { execute } for pid=19024 comm="semodule" name="setfiles" dev=dm-0 ino=9984601 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:setfiles_exec_t:s0 tclass=file type=AVC msg=audit(1163794206.151:14350): avc: denied { execute_no_trans } for pid=19024 comm="semodule" name="setfiles" dev=dm-0 ino=9984601 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:setfiles_exec_t:s0 tclass=file type=AVC msg=audit(1163794206.151:14350): avc: denied { read } for pid=19024 comm="semodule" name="setfiles" dev=dm-0 ino=9984601 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:setfiles_exec_t:s0 tclass=file type=AVC msg=audit(1163794206.243:14351): avc: denied { getattr } for pid=6659 comm="dbus-daemon" name="/" dev=dm-0 ino=2 scontext=staff_u:staff_r:staff_dbusd_t:s0 tcontext=system_u:object_r:fs_t:s0 tclass=filesystem type=SYSCALL msg=audit(1163794206.243:14351): arch=40000003 syscall=100 success=yes exit=0 a0=15 a1=bfcd50ac a2=c4eff4 a3=ffffffb8 items=0 ppid=1 pid=6659 auid=500 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) comm="dbus-daemon" exe="/bin/dbus-daemon" subj=staff_u:staff_r:staff_dbusd_t:s0 key=(null) type=SYSCALL msg=audit(1163794206.151:14350): arch=40000003 syscall=11 success=yes exit=0 a0=8fef550 a1=d292770 a2=0 a3=0 items=0 ppid=19011 pid=19024 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="setfiles" exe="/sbin/setfiles" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163794206.151:14350): path="/sbin/setfiles" type=AVC_PATH msg=audit(1163794206.151:14350): path="/sbin/setfiles" type=AVC msg=audit(1163794206.375:14352): avc: denied { read } for pid=19024 comm="setfiles" name="policy.21" dev=dm-0 ino=9334698 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:policy_config_t:s0 tclass=file type=SYSCALL msg=audit(1163794206.375:14352): arch=40000003 syscall=5 success=yes exit=3 a0=bf8e8f97 a1=8000 a2=1b6 a3=8fd73e0 items=0 ppid=19011 pid=19024 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="setfiles" exe="/sbin/setfiles" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794206.643:14353): avc: denied { lock } for pid=19011 comm="semodule" name="semanage.read.LOCK" dev=dm-0 ino=9334533 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:semanage_read_lock_t:s0 tclass=file type=SYSCALL msg=audit(1163794206.643:14353): arch=40000003 syscall=143 success=yes exit=0 a0=4 a1=8 a2=c7b21c a3=8fef3e0 items=0 ppid=16590 pid=19011 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="semodule" exe="/usr/sbin/semodule" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163794206.643:14353): path="/etc/selinux/strict/modules/semanage.read.LOCK" type=AVC msg=audit(1163794207.187:14354): avc: denied { search } for pid=15987 comm="dbus-daemon" name="kmacmill" dev=dm-0 ino=6547202 scontext=staff_u:staff_r:staff_dbusd_t:s0 tcontext=staff_u:object_r:staff_home_dir_t:s0 tclass=dir type=AVC msg=audit(1163794207.187:14354): avc: denied { search } for pid=15987 comm="dbus-daemon" name=".local" dev=dm-0 ino=6815703 scontext=staff_u:staff_r:staff_dbusd_t:s0 tcontext=staff_u:object_r:staff_home_t:s0 tclass=dir type=SYSCALL msg=audit(1163794207.187:14354): arch=40000003 syscall=5 success=no exit=-2 a0=8ebe028 a1=18800 a2=0 a3=0 items=0 ppid=1 pid=15987 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="dbus-daemon" exe="/bin/dbus-daemon" subj=staff_u:staff_r:staff_dbusd_t:s0 key=(null) type=AVC msg=audit(1163794207.727:14355): avc: denied { read } for pid=19045 comm="genhomedircon" name="semanage.read.LOCK" dev=dm-0 ino=9334533 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:semanage_read_lock_t:s0 tclass=file type=SYSCALL msg=audit(1163794207.727:14355): arch=40000003 syscall=33 success=yes exit=0 a0=9207d10 a1=4 a2=28021c a3=9207d10 items=0 ppid=19011 pid=19045 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="genhomedircon" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794207.727:14356): avc: denied { write } for pid=19045 comm="genhomedircon" name="modules" dev=dm-0 ino=9333979 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:selinux_config_t:s0 tclass=dir type=SYSCALL msg=audit(1163794207.727:14356): arch=40000003 syscall=33 success=yes exit=0 a0=9206598 a1=7 a2=28021c a3=9207d10 items=0 ppid=19011 pid=19045 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="genhomedircon" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794207.855:14357): avc: denied { write } for pid=19045 comm="genhomedircon" name="file_contexts.homedirs" dev=dm-0 ino=9334712 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:file_context_t:s0 tclass=file type=SYSCALL msg=audit(1163794207.855:14357): arch=40000003 syscall=5 success=yes exit=3 a0=921b508 a1=8241 a2=1b6 a3=921b548 items=0 ppid=19011 pid=19045 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="genhomedircon" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794208.071:14358): avc: denied { lock } for pid=19011 comm="semodule" name="semanage.trans.LOCK" dev=dm-0 ino=9334536 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:semanage_trans_lock_t:s0 tclass=file type=SYSCALL msg=audit(1163794208.071:14358): arch=40000003 syscall=143 success=yes exit=0 a0=3 a1=8 a2=c7b21c a3=8fef3e0 items=0 ppid=16590 pid=19011 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="semodule" exe="/usr/sbin/semodule" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163794208.071:14358): path="/etc/selinux/strict/modules/semanage.trans.LOCK" type=AVC msg=audit(1163794209.147:14359): avc: denied { getattr } for pid=18600 comm="thunderbird-bin" name="localtime" dev=dm-0 ino=9331954 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1163794209.147:14359): arch=40000003 syscall=195 success=yes exit=0 a0=10fb5e0 a1=bfc616ac a2=1113ff4 a3=0 items=0 ppid=18595 pid=18600 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird-bin" exe="/usr/lib/thunderbird-1.5.0.7/thunderbird-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC_PATH msg=audit(1163794209.147:14359): path="/etc/localtime" type=AVC msg=audit(1163794209.639:14360): avc: denied { write } for pid=15069 comm="vpnc" name="tun" dev=tmpfs ino=1473 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:tun_tap_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163794209.639:14360): arch=40000003 syscall=4 success=yes exit=105 a0=4 a1=805c570 a2=69 a3=bfd587e4 items=0 ppid=15067 pid=15069 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vpnc" exe="/usr/sbin/vpnc" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163794209.639:14360): path="/dev/net/tun" type=AVC msg=audit(1163794209.639:14361): avc: denied { read } for pid=15069 comm="vpnc" name="tun" dev=tmpfs ino=1473 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:tun_tap_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163794209.639:14361): arch=40000003 syscall=3 success=yes exit=52 a0=4 a1=805c5a0 a2=1000 a3=805c5a0 items=0 ppid=15067 pid=15069 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vpnc" exe="/usr/sbin/vpnc" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163794209.639:14361): path="/dev/net/tun" type=AVC msg=audit(1163794209.999:14362): avc: denied { lock } for pid=16476 comm="pam_timestamp_c" name="utmp" dev=dm-0 ino=14436583 scontext=staff_u:staff_r:pam_t:s0 tcontext=system_u:object_r:initrc_var_run_t:s0 tclass=file type=SYSCALL msg=audit(1163794209.999:14362): arch=40000003 syscall=221 success=yes exit=0 a0=3 a1=7 a2=bfded3d8 a3=0 items=0 ppid=16467 pid=16476 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=(none) comm="pam_timestamp_c" exe="/sbin/pam_timestamp_check" subj=staff_u:staff_r:pam_t:s0 key=(null) type=AVC_PATH msg=audit(1163794209.999:14362): path="/var/run/utmp" type=USER_AUTH msg=audit(1163794210.195:14363): user pid=19046 uid=500 auid=500 subj=staff_u:staff_r:staff_su_t:s0 msg='PAM: authentication acct=root : exe="/bin/su" (hostname=?, addr=?, terminal=pts/6 res=success)' type=USER_ACCT msg=audit(1163794210.195:14364): user pid=19046 uid=500 auid=500 subj=staff_u:staff_r:staff_su_t:s0 msg='PAM: accounting acct=root : exe="/bin/su" (hostname=?, addr=?, terminal=pts/6 res=success)' type=AVC msg=audit(1163794210.211:14365): avc: denied { write } for pid=19046 comm="su" scontext=staff_u:staff_r:staff_su_t:s0 tcontext=staff_u:staff_r:staff_su_t:s0 tclass=key type=AVC msg=audit(1163794210.211:14365): avc: denied { link } for pid=19046 comm="su" scontext=staff_u:staff_r:staff_su_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=key type=SYSCALL msg=audit(1163794210.211:14365): arch=40000003 syscall=288 success=yes exit=0 a0=8 a1=fffffffc a2=fffffffd a3=0 items=0 ppid=19025 pid=19046 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=pts6 comm="su" exe="/bin/su" subj=staff_u:staff_r:staff_su_t:s0 key=(null) type=AVC msg=audit(1163794210.211:14366): avc: denied { search } for pid=19046 comm="su" name="root" dev=dm-0 ino=13127137 scontext=staff_u:staff_r:staff_su_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=SYSCALL msg=audit(1163794210.211:14366): arch=40000003 syscall=5 success=no exit=-2 a0=bf8c2d58 a1=8000 a2=1b6 a3=9111200 items=0 ppid=19025 pid=19046 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=pts6 comm="su" exe="/bin/su" subj=staff_u:staff_r:staff_su_t:s0 key=(null) type=AVC msg=audit(1163794210.255:14367): avc: denied { write } for pid=19047 comm="xauth" name=".gdm0UWNIT" dev=dm-0 ino=14469400 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163794210.255:14367): arch=40000003 syscall=33 success=yes exit=0 a0=bfd8df2b a1=2 a2=bfd8cbd0 a3=0 items=0 ppid=19046 pid=19047 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts6 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC msg=audit(1163794210.255:14368): avc: denied { read } for pid=19047 comm="xauth" name=".gdm0UWNIT" dev=dm-0 ino=14469400 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163794210.255:14368): arch=40000003 syscall=5 success=yes exit=2 a0=bfd8df2b a1=0 a2=1b6 a3=95b7008 items=0 ppid=19046 pid=19047 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts6 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC msg=audit(1163794210.255:14369): avc: denied { getattr } for pid=19047 comm="xauth" name=".gdm0UWNIT" dev=dm-0 ino=14469400 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163794210.255:14369): arch=40000003 syscall=197 success=yes exit=0 a0=2 a1=bfd8c91c a2=24fff4 a3=95b7008 items=0 ppid=19046 pid=19047 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts6 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC_PATH msg=audit(1163794210.255:14369): path="/tmp/.gdm0UWNIT" type=AVC msg=audit(1163794210.259:14370): avc: denied { write } for pid=19046 comm="su" name="root" dev=dm-0 ino=13127137 scontext=staff_u:staff_r:staff_su_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1163794210.259:14370): avc: denied { add_name } for pid=19046 comm="su" name=".xauthSGkEvM" scontext=staff_u:staff_r:staff_su_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1163794210.259:14370): avc: denied { create } for pid=19046 comm="su" name=".xauthSGkEvM" scontext=staff_u:staff_r:staff_su_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163794210.259:14370): arch=40000003 syscall=5 success=yes exit=4 a0=9111323 a1=80c2 a2=180 a3=80c2 items=0 ppid=19025 pid=19046 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=pts6 comm="su" exe="/bin/su" subj=staff_u:staff_r:staff_su_t:s0 key=(null) type=AVC msg=audit(1163794210.259:14371): avc: denied { setattr } for pid=19046 comm="su" name=".xauthSGkEvM" dev=dm-0 ino=13127382 scontext=staff_u:staff_r:staff_su_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163794210.259:14371): arch=40000003 syscall=207 success=yes exit=0 a0=4 a1=0 a2=0 a3=1785bf items=0 ppid=19025 pid=19046 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=pts6 comm="su" exe="/bin/su" subj=staff_u:staff_r:staff_su_t:s0 key=(null) type=AVC msg=audit(1163794210.263:14372): avc: denied { search } for pid=19048 comm="xauth" name="root" dev=dm-0 ino=13127137 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=SYSCALL msg=audit(1163794210.263:14372): arch=40000003 syscall=195 success=no exit=-2 a0=bfc74897 a1=bfc743ac a2=3b7ff4 a3=bfc743ac items=0 ppid=19046 pid=19048 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts6 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC msg=audit(1163794210.263:14373): avc: denied { write } for pid=19048 comm="xauth" name="root" dev=dm-0 ino=13127137 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1163794210.263:14373): avc: denied { add_name } for pid=19048 comm="xauth" name=".xauthSGkEvM-c" scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1163794210.263:14373): avc: denied { create } for pid=19048 comm="xauth" name=".xauthSGkEvM-c" scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163794210.263:14373): arch=40000003 syscall=5 success=yes exit=2 a0=bfc74897 a1=c1 a2=180 a3=ffffffff items=0 ppid=19046 pid=19048 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts6 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC msg=audit(1163794210.263:14374): avc: denied { link } for pid=19048 comm="xauth" name=".xauthSGkEvM-c" dev=dm-0 ino=13127386 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163794210.263:14374): arch=40000003 syscall=9 success=yes exit=0 a0=bfc74897 a1=bfc74496 a2=da3a64 a3=2 items=0 ppid=19046 pid=19048 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts6 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC msg=audit(1163794210.263:14375): avc: denied { write } for pid=19048 comm="xauth" name=".xauthSGkEvM" dev=dm-0 ino=13127382 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163794210.263:14375): arch=40000003 syscall=33 success=yes exit=0 a0=bfc75f27 a1=2 a2=bfc74dc0 a3=0 items=0 ppid=19046 pid=19048 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts6 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC msg=audit(1163794210.263:14376): avc: denied { read } for pid=19048 comm="xauth" name=".xauthSGkEvM" dev=dm-0 ino=13127382 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163794210.263:14376): arch=40000003 syscall=5 success=yes exit=2 a0=bfc75f27 a1=0 a2=1b6 a3=8363008 items=0 ppid=19046 pid=19048 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts6 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC msg=audit(1163794210.263:14377): avc: denied { getattr } for pid=19048 comm="xauth" name=".xauthSGkEvM" dev=dm-0 ino=13127382 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163794210.263:14377): arch=40000003 syscall=197 success=yes exit=0 a0=2 a1=bfc74b0c a2=3b7ff4 a3=8363008 items=0 ppid=19046 pid=19048 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts6 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC_PATH msg=audit(1163794210.263:14377): path="/root/.xauthSGkEvM" type=AVC msg=audit(1163794210.263:14378): avc: denied { remove_name } for pid=19048 comm="xauth" name=".xauthSGkEvM" dev=dm-0 ino=13127382 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1163794210.263:14378): avc: denied { unlink } for pid=19048 comm="xauth" name=".xauthSGkEvM" dev=dm-0 ino=13127382 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163794210.263:14378): arch=40000003 syscall=10 success=yes exit=0 a0=8363008 a1=1000 a2=0 a3=836308a items=0 ppid=19046 pid=19048 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts6 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=USER_START msg=audit(1163794210.263:14379): user pid=19046 uid=500 auid=500 subj=staff_u:staff_r:staff_su_t:s0 msg='PAM: session open acct=root : exe="/bin/su" (hostname=?, addr=?, terminal=pts/6 res=success)' type=CRED_ACQ msg=audit(1163794210.263:14380): user pid=19046 uid=500 auid=500 subj=staff_u:staff_r:staff_su_t:s0 msg='PAM: setcred acct=root : exe="/bin/su" (hostname=?, addr=?, terminal=pts/6 res=success)' type=AVC msg=audit(1163794210.467:14381): avc: denied { read } for pid=19049 comm="bash" name=".bash_profile" dev=dm-0 ino=13127141 scontext=staff_u:staff_r:staff_t:s0 tcontext=root:object_r:user_home_t:s0 tclass=file type=SYSCALL msg=audit(1163794210.467:14381): arch=40000003 syscall=5 success=yes exit=3 a0=8946f98 a1=8000 a2=0 a3=8000 items=0 ppid=19046 pid=19049 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts6 comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794210.519:14382): avc: denied { read } for pid=19049 comm="bash" name=".bash_history" dev=dm-0 ino=13127151 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:user_home_t:s0 tclass=file type=SYSCALL msg=audit(1163794210.519:14382): arch=40000003 syscall=5 success=yes exit=3 a0=8946db8 a1=8000 a2=0 a3=8000 items=0 ppid=19046 pid=19049 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts6 comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=USER_AUTH msg=audit(1163794226.832:14383): user pid=19079 uid=0 auid=500 subj=staff_u:staff_r:newrole_t:s0 msg='PAM: authentication acct=kmacmill : exe="/usr/bin/newrole" (hostname=?, addr=?, terminal=pts/6 res=success)' type=USER_ACCT msg=audit(1163794226.832:14384): user pid=19079 uid=0 auid=500 subj=staff_u:staff_r:newrole_t:s0 msg='PAM: accounting acct=kmacmill : exe="/usr/bin/newrole" (hostname=?, addr=?, terminal=pts/6 res=success)' type=AVC msg=audit(1163794274.759:14385): avc: denied { relabelfrom } for pid=19114 comm="chcon" name="httpd" dev=dm-0 ino=10321419 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:httpd_exec_t:s0 tclass=file type=AVC msg=audit(1163794274.759:14385): avc: denied { relabelto } for pid=19114 comm="chcon" name="httpd" dev=dm-0 ino=10321419 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:myapache_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163794274.759:14385): arch=40000003 syscall=226 success=yes exit=0 a0=bfc8094c a1=a2f0d3 a2=980bcb0 a3=25 items=0 ppid=16590 pid=19114 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="chcon" exe="/usr/bin/chcon" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794283.224:14386): avc: denied { dac_override } for pid=16590 comm="bash" capability=1 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=capability type=SYSCALL msg=audit(1163794283.224:14386): arch=40000003 syscall=195 success=no exit=-2 a0=925e198 a1=bfb405b0 a2=573ff4 a3=925e198 items=0 ppid=16587 pid=16590 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794290.516:14387): avc: denied { write } for pid=19116 comm="su" name="access" dev=selinuxfs ino=6 scontext=staff_u:staff_r:staff_su_t:s0 tcontext=system_u:object_r:security_t:s0 tclass=file type=SYSCALL msg=audit(1163794290.516:14387): arch=40000003 syscall=5 success=yes exit=3 a0=bfbb4178 a1=8002 a2=0 a3=8002 items=0 ppid=16590 pid=19116 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="su" exe="/bin/su" subj=staff_u:staff_r:staff_su_t:s0 key=(null) type=AVC msg=audit(1163794290.516:14388): avc: denied { compute_av } for pid=19116 comm="su" scontext=staff_u:staff_r:staff_su_t:s0 tcontext=system_u:object_r:security_t:s0 tclass=security type=SYSCALL msg=audit(1163794290.516:14388): arch=40000003 syscall=4 success=yes exit=58 a0=3 a1=8f99ef0 a2=3a a3=8f99ef0 items=0 ppid=16590 pid=19116 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="su" exe="/bin/su" subj=staff_u:staff_r:staff_su_t:s0 key=(null) type=USER_AUTH msg=audit(1163794290.516:14389): user pid=19116 uid=0 auid=500 subj=staff_u:staff_r:staff_su_t:s0 msg='PAM: authentication acct=root : exe="/bin/su" (hostname=?, addr=?, terminal=pts/2 res=success)' type=USER_ACCT msg=audit(1163794290.516:14390): user pid=19116 uid=0 auid=500 subj=staff_u:staff_r:staff_su_t:s0 msg='PAM: accounting acct=root : exe="/bin/su" (hostname=?, addr=?, terminal=pts/2 res=success)' type=USER_START msg=audit(1163794290.564:14391): user pid=19116 uid=0 auid=500 subj=staff_u:staff_r:staff_su_t:s0 msg='PAM: session open acct=root : exe="/bin/su" (hostname=?, addr=?, terminal=pts/2 res=success)' type=CRED_ACQ msg=audit(1163794290.568:14392): user pid=19116 uid=0 auid=500 subj=staff_u:staff_r:staff_su_t:s0 msg='PAM: setcred acct=root : exe="/bin/su" (hostname=?, addr=?, terminal=pts/2 res=success)' type=AVC msg=audit(1163794295.109:14393): avc: denied { execute } for pid=19149 comm="service" name="httpd" dev=dm-0 ino=9330356 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163794295.109:14393): arch=40000003 syscall=33 success=yes exit=0 a0=8333a98 a1=1 a2=1 a3=832a2b0 items=0 ppid=19119 pid=19149 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="service" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794295.145:14394): avc: denied { execute_no_trans } for pid=19156 comm="env" name="httpd" dev=dm-0 ino=9330356 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=file type=AVC msg=audit(1163794295.145:14394): avc: denied { read } for pid=19156 comm="env" name="httpd" dev=dm-0 ino=9330356 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163794295.145:14394): arch=40000003 syscall=11 success=yes exit=0 a0=bfbbec09 a1=bfbbde68 a2=954e858 a3=5 items=0 ppid=19149 pid=19156 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="httpd" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163794295.145:14394): path="/etc/rc.d/init.d/httpd" type=AVC_PATH msg=audit(1163794295.145:14394): path="/etc/rc.d/init.d/httpd" type=AVC msg=audit(1163794295.149:14395): avc: denied { ioctl } for pid=19156 comm="httpd" name="httpd" dev=dm-0 ino=9330356 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163794295.149:14395): arch=40000003 syscall=54 success=no exit=-25 a0=3 a1=5401 a2=bfa60da8 a3=bfa60de8 items=0 ppid=19149 pid=19156 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="httpd" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163794295.149:14395): path="/etc/rc.d/init.d/httpd" type=AVC msg=audit(1163794295.217:14396): avc: denied { read } for pid=19161 comm="grep" name="httpd.conf" dev=dm-0 ino=9331739 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:httpd_config_t:s0 tclass=file type=SYSCALL msg=audit(1163794295.217:14396): arch=40000003 syscall=5 success=yes exit=3 a0=bfd94f88 a1=8000 a2=0 a3=8000 items=0 ppid=19156 pid=19161 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="grep" exe="/bin/grep" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794295.233:14397): avc: denied { execute } for pid=19163 comm="bash" name="httpd" dev=dm-0 ino=10321419 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:myapache_exec_t:s0 tclass=file type=AVC msg=audit(1163794295.233:14397): avc: denied { execute_no_trans } for pid=19163 comm="bash" name="httpd" dev=dm-0 ino=10321419 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:myapache_exec_t:s0 tclass=file type=AVC msg=audit(1163794295.233:14397): avc: denied { read } for pid=19163 comm="bash" name="httpd" dev=dm-0 ino=10321419 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:myapache_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163794295.233:14397): arch=40000003 syscall=11 success=yes exit=0 a0=a0e5d30 a1=a0e5df8 a2=a0e6130 a3=a0e5cb0 items=0 ppid=19162 pid=19163 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="httpd" exe="/usr/sbin/httpd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163794295.233:14397): path="/usr/sbin/httpd" type=AVC_PATH msg=audit(1163794295.233:14397): path="/usr/sbin/httpd" type=AVC msg=audit(1163794295.561:14398): avc: denied { read } for pid=19163 comm="httpd" name="modules" dev=dm-0 ino=9331255 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:httpd_modules_t:s0 tclass=lnk_file type=AVC msg=audit(1163794295.561:14398): avc: denied { read } for pid=19163 comm="httpd" name="mod_auth_basic.so" dev=dm-0 ino=10639225 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:httpd_modules_t:s0 tclass=file type=SYSCALL msg=audit(1163794295.561:14398): arch=40000003 syscall=5 success=yes exit=4 a0=88fb550 a1=0 a2=424150 a3=88fb550 items=0 ppid=19162 pid=19163 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="httpd" exe="/usr/sbin/httpd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794295.617:14399): avc: denied { execute } for pid=19163 comm="httpd" name="mod_auth_basic.so" dev=dm-0 ino=10639225 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:httpd_modules_t:s0 tclass=file type=SYSCALL msg=audit(1163794295.617:14399): arch=40000003 syscall=192 success=yes exit=1146880 a0=0 a1=30bc a2=5 a3=802 items=0 ppid=19162 pid=19163 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="httpd" exe="/usr/sbin/httpd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163794295.617:14399): path="/usr/lib/httpd/modules/mod_auth_basic.so" type=AVC msg=audit(1163794296.193:14400): avc: denied { read } for pid=19163 comm="httpd" name="resolv.conf" dev=dm-0 ino=9330239 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:net_conf_t:s0 tclass=file type=SYSCALL msg=audit(1163794296.193:14400): arch=40000003 syscall=5 success=yes exit=5 a0=40ae73 a1=0 a2=1b6 a3=8943f90 items=0 ppid=19162 pid=19163 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="httpd" exe="/usr/sbin/httpd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794296.193:14401): avc: denied { node_bind } for pid=19163 comm="httpd" src=80 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:unspec_node_t:s0 tclass=tcp_socket type=AVC msg=audit(1163794296.193:14401): avc: denied { net_bind_service } for pid=19163 comm="httpd" capability=10 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=capability type=SYSCALL msg=audit(1163794296.193:14401): arch=40000003 syscall=102 success=yes exit=0 a0=2 a1=bfa206d0 a2=1951e8 a3=88bc790 items=0 ppid=19162 pid=19163 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="httpd" exe="/usr/sbin/httpd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794296.193:14402): avc: denied { read } for pid=19163 comm="httpd" name="logs" dev=dm-0 ino=9330432 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:httpd_log_t:s0 tclass=lnk_file type=AVC msg=audit(1163794296.193:14402): avc: denied { append } for pid=19163 comm="httpd" name="error_log" dev=dm-0 ino=14437040 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:httpd_log_t:s0 tclass=file type=SYSCALL msg=audit(1163794296.193:14402): arch=40000003 syscall=5 success=yes exit=7 a0=88ec580 a1=8441 a2=1b6 a3=8441 items=0 ppid=19162 pid=19163 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="httpd" exe="/usr/sbin/httpd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794296.281:14403): avc: denied { write } for pid=19164 comm="httpd" name="run" dev=dm-0 ino=14436616 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:var_run_t:s0 tclass=dir type=AVC msg=audit(1163794296.281:14403): avc: denied { add_name } for pid=19164 comm="httpd" name="httpd.pid" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:var_run_t:s0 tclass=dir type=AVC msg=audit(1163794296.281:14403): avc: denied { create } for pid=19164 comm="httpd" name="httpd.pid" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:var_run_t:s0 tclass=file type=SYSCALL msg=audit(1163794296.281:14403): arch=40000003 syscall=5 success=yes exit=9 a0=8966818 a1=8241 a2=1a4 a3=8241 items=0 ppid=1 pid=19164 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="httpd" exe="/usr/sbin/httpd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794296.297:14404): avc: denied { write } for pid=19164 comm="httpd" name="httpd.pid" dev=dm-0 ino=14436960 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:var_run_t:s0 tclass=file type=SYSCALL msg=audit(1163794296.297:14404): arch=40000003 syscall=4 success=yes exit=6 a0=9 a1=899a788 a2=6 a3=6 items=0 ppid=1 pid=19164 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="httpd" exe="/usr/sbin/httpd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163794296.297:14404): path="/var/run/httpd.pid" type=AVC msg=audit(1163794296.301:14405): avc: denied { setuid } for pid=19165 comm="httpd" capability=7 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=capability type=SYSCALL msg=audit(1163794296.301:14405): arch=40000003 syscall=213 success=yes exit=0 a0=30 a1=108 a2=1 a3=bfa204d0 items=0 ppid=19164 pid=19165 auid=500 uid=48 gid=48 euid=48 suid=48 fsuid=48 egid=48 sgid=48 fsgid=48 tty=(none) comm="httpd" exe="/usr/sbin/httpd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794296.329:14406): avc: denied { write } for pid=19168 comm="touch" name="subsys" dev=dm-0 ino=14436611 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:var_lock_t:s0 tclass=dir type=AVC msg=audit(1163794296.329:14406): avc: denied { add_name } for pid=19168 comm="touch" name="httpd" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:var_lock_t:s0 tclass=dir type=AVC msg=audit(1163794296.329:14406): avc: denied { create } for pid=19168 comm="touch" name="httpd" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:var_lock_t:s0 tclass=file type=SYSCALL msg=audit(1163794296.329:14406): arch=40000003 syscall=5 success=yes exit=0 a0=bfee1f80 a1=8941 a2=1b6 a3=8941 items=0 ppid=19156 pid=19168 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="touch" exe="/bin/touch" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794296.337:14407): avc: denied { write } for pid=19168 comm="touch" name="httpd" dev=dm-0 ino=14436997 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:var_lock_t:s0 tclass=file type=SYSCALL msg=audit(1163794296.337:14407): arch=40000003 syscall=271 success=yes exit=0 a0=bfee0b64 a1=0 a2=eb5ff4 a3=0 items=0 ppid=19156 pid=19168 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="touch" exe="/bin/touch" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794300.201:14408): avc: denied { read } for pid=19178 comm="mozilla-xremote" name=".gdm0UWNIT" dev=dm-0 ino=14469400 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163794300.201:14408): arch=40000003 syscall=33 success=yes exit=0 a0=bf85af92 a1=4 a2=11ea64 a3=bf85af92 items=0 ppid=19177 pid=19178 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="mozilla-xremote" exe="/usr/lib/firefox-2.0/mozilla-xremote-client" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794307.389:14409): avc: denied { read } for pid=19165 comm="httpd" name="noindex.html" dev=dm-0 ino=14436695 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:httpd_sys_content_t:s0 tclass=file type=SYSCALL msg=audit(1163794307.389:14409): arch=40000003 syscall=5 success=yes exit=11 a0=89afad8 a1=8000 a2=0 a3=8000 items=0 ppid=19164 pid=19165 auid=500 uid=48 gid=48 euid=48 suid=48 fsuid=48 egid=48 sgid=48 fsgid=48 tty=(none) comm="httpd" exe="/usr/sbin/httpd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794313.622:14410): avc: denied { read } for pid=19188 comm="httpd" name="httpd.pid" dev=dm-0 ino=14436960 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:var_run_t:s0 tclass=file type=SYSCALL msg=audit(1163794313.622:14410): arch=40000003 syscall=5 success=yes exit=3 a0=90ddfc8 a1=8000 a2=0 a3=8000 items=0 ppid=19181 pid=19188 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="httpd" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794313.622:14411): avc: denied { ioctl } for pid=19188 comm="httpd" name="httpd.pid" dev=dm-0 ino=14436960 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:var_run_t:s0 tclass=file type=SYSCALL msg=audit(1163794313.622:14411): arch=40000003 syscall=54 success=no exit=-25 a0=0 a1=5401 a2=bfc40298 a3=bfc402d8 items=0 ppid=19181 pid=19188 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="httpd" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163794313.622:14411): path="/var/run/httpd.pid" type=AVC msg=audit(1163794313.626:14412): avc: denied { kill } for pid=19164 comm="httpd" capability=5 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=capability type=SYSCALL msg=audit(1163794313.626:14412): arch=40000003 syscall=37 success=yes exit=0 a0=ffffb524 a1=f a2=422ff4 a3=899a788 items=0 ppid=1 pid=19164 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="httpd" exe="/usr/sbin/httpd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794313.646:14413): avc: denied { remove_name } for pid=19164 comm="httpd" name="httpd.pid" dev=dm-0 ino=14436960 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:var_run_t:s0 tclass=dir type=AVC msg=audit(1163794313.646:14413): avc: denied { unlink } for pid=19164 comm="httpd" name="httpd.pid" dev=dm-0 ino=14436960 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:var_run_t:s0 tclass=file type=SYSCALL msg=audit(1163794313.646:14413): arch=40000003 syscall=10 success=yes exit=0 a0=8966960 a1=8966960 a2=16a004 a3=8966960 items=0 ppid=1 pid=19164 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="httpd" exe="/usr/sbin/httpd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794313.790:14414): avc: denied { write } for pid=19195 comm="rm" name="subsys" dev=dm-0 ino=14436611 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:var_lock_t:s0 tclass=dir type=AVC msg=audit(1163794313.790:14414): avc: denied { remove_name } for pid=19195 comm="rm" name="httpd" dev=dm-0 ino=14436997 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:var_lock_t:s0 tclass=dir type=AVC msg=audit(1163794313.790:14414): avc: denied { unlink } for pid=19195 comm="rm" name="httpd" dev=dm-0 ino=14436997 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:var_lock_t:s0 tclass=file type=SYSCALL msg=audit(1163794313.790:14414): arch=40000003 syscall=10 success=yes exit=0 a0=bf911f73 a1=0 a2=805277c a3=bf9116f4 items=0 ppid=19188 pid=19195 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="rm" exe="/bin/rm" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794336.055:14415): avc: denied { read } for pid=19210 comm="httpd" name="resolv.conf" dev=dm-0 ino=9330239 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:net_conf_t:s0 tclass=file type=SYSCALL msg=audit(1163794336.055:14415): arch=40000003 syscall=5 success=yes exit=5 a0=2f3e73 a1=0 a2=1b6 a3=82ebf90 items=0 ppid=19209 pid=19210 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="httpd" exe="/usr/sbin/httpd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794336.059:14416): avc: denied { node_bind } for pid=19210 comm="httpd" src=80 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:unspec_node_t:s0 tclass=tcp_socket type=SYSCALL msg=audit(1163794336.059:14416): arch=40000003 syscall=102 success=yes exit=0 a0=2 a1=bf852d10 a2=7ff1e8 a3=8264790 items=0 ppid=19209 pid=19210 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="httpd" exe="/usr/sbin/httpd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794336.095:14417): avc: denied { add_name } for pid=19217 comm="touch" name="httpd" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:var_lock_t:s0 tclass=dir type=SYSCALL msg=audit(1163794336.095:14417): arch=40000003 syscall=5 success=yes exit=0 a0=bfb8ef80 a1=8941 a2=1b6 a3=8941 items=0 ppid=19203 pid=19217 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="touch" exe="/bin/touch" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794345.112:14418): avc: denied { execute } for pid=19119 comm="bash" name="run_init" dev=dm-0 ino=10337905 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:run_init_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163794345.112:14418): arch=40000003 syscall=33 success=yes exit=0 a0=9464518 a1=1 a2=11 a3=9464518 items=0 ppid=19116 pid=19119 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794345.112:14419): avc: denied { read } for pid=19119 comm="bash" name="run_init" dev=dm-0 ino=10337905 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:run_init_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163794345.112:14419): arch=40000003 syscall=33 success=yes exit=0 a0=9464518 a1=4 a2=ffffffff a3=9464518 items=0 ppid=19116 pid=19119 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794348.308:14420): avc: denied { execute_no_trans } for pid=19238 comm="bash" name="run_init" dev=dm-0 ino=10337905 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:run_init_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163794348.308:14420): arch=40000003 syscall=11 success=yes exit=0 a0=9465dc0 a1=9465df0 a2=9466610 a3=9468960 items=0 ppid=19119 pid=19238 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="run_init" exe="/usr/sbin/run_init" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163794348.308:14420): path="/usr/sbin/run_init" type=AVC msg=audit(1163794352.940:14421): avc: denied { audit_write } for pid=19238 comm="run_init" capability=29 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=capability type=USER_AUTH msg=audit(1163794352.940:14422): user pid=19238 uid=0 auid=500 subj=staff_u:staff_r:staff_t:s0 msg='PAM: authentication acct=kmacmill : exe="/usr/sbin/run_init" (hostname=?, addr=?, terminal=pts/2 res=success)' type=SYSCALL msg=audit(1163794352.940:14421): arch=40000003 syscall=102 success=yes exit=128 a0=b a1=bff3a160 a2=a47ff4 a3=bff40ba0 items=0 ppid=19119 pid=19238 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="run_init" exe="/usr/sbin/run_init" subj=staff_u:staff_r:staff_t:s0 key=(null) type=USER_ACCT msg=audit(1163794352.940:14423): user pid=19238 uid=0 auid=500 subj=staff_u:staff_r:staff_t:s0 msg='PAM: accounting acct=kmacmill : exe="/usr/sbin/run_init" (hostname=?, addr=?, terminal=pts/2 res=success)' type=AVC msg=audit(1163794352.972:14424): avc: denied { setexec } for pid=19238 comm="run_init" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=process type=SYSCALL msg=audit(1163794352.972:14424): arch=40000003 syscall=4 success=yes exit=30 a0=3 a1=8f8f4a0 a2=1e a3=a2f751 items=0 ppid=19119 pid=19238 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="run_init" exe="/usr/sbin/run_init" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794352.972:14425): avc: denied { transition } for pid=19238 comm="run_init" name="open_init_pty" dev=dm-0 ino=10316125 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:initrc_t:s0 tclass=process type=AVC msg=audit(1163794352.972:14425): avc: denied { siginh } for pid=19238 comm="open_init_pty" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:initrc_t:s0 tclass=process type=AVC msg=audit(1163794352.972:14425): avc: denied { rlimitinh } for pid=19238 comm="open_init_pty" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:initrc_t:s0 tclass=process type=AVC msg=audit(1163794352.972:14425): avc: denied { noatsecure } for pid=19238 comm="open_init_pty" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:initrc_t:s0 tclass=process type=SYSCALL msg=audit(1163794352.972:14425): arch=40000003 syscall=11 success=yes exit=0 a0=804921d a1=bff451b4 a2=bff451c4 a3=bff451b4 items=0 ppid=19119 pid=19238 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="open_init_pty" exe="/usr/sbin/open_init_pty" subj=system_u:system_r:initrc_t:s0 key=(null) type=AVC_PATH msg=audit(1163794352.972:14425): path="/usr/sbin/open_init_pty" type=AVC msg=audit(1163794352.992:14426): avc: denied { read write } for pid=19239 comm="httpd" name="7" dev=devpts ino=9 scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:object_r:initrc_devpts_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163794352.992:14426): arch=40000003 syscall=11 success=yes exit=0 a0=942a08e a1=bfd85ff8 a2=bfd86004 a3=bfd86e94 items=0 ppid=19238 pid=19239 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts7 comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:myapache_t:s0 key=(null) type=AVC msg=audit(1163794352.992:14427): avc: denied { search } for pid=19239 comm="httpd" name="etc" dev=dm-0 ino=9329761 scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=dir type=SYSCALL msg=audit(1163794352.992:14427): arch=40000003 syscall=33 success=no exit=-2 a0=901e4f a1=4 a2=904fc0 a3=0 items=0 ppid=19238 pid=19239 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts7 comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:myapache_t:s0 key=(null) type=AVC msg=audit(1163794352.992:14428): avc: denied { read } for pid=19239 comm="httpd" name="ld.so.cache" dev=dm-0 ino=9330488 scontext=system_u:system_r:myapache_t:s0 tcontext=staff_u:object_r:ld_so_cache_t:s0 tclass=file type=SYSCALL msg=audit(1163794352.992:14428): arch=40000003 syscall=5 success=yes exit=3 a0=902037 a1=0 a2=0 a3=ffffffff items=0 ppid=19238 pid=19239 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts7 comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:myapache_t:s0 key=(null) type=AVC msg=audit(1163794352.992:14429): avc: denied { getattr } for pid=19239 comm="httpd" name="ld.so.cache" dev=dm-0 ino=9330488 scontext=system_u:system_r:myapache_t:s0 tcontext=staff_u:object_r:ld_so_cache_t:s0 tclass=file type=SYSCALL msg=audit(1163794352.992:14429): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bfa8a340 a2=904fc0 a3=ffffffff items=0 ppid=19238 pid=19239 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts7 comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:myapache_t:s0 key=(null) type=AVC_PATH msg=audit(1163794352.992:14429): path="/etc/ld.so.cache" type=AVC msg=audit(1163794352.992:14430): avc: denied { search } for pid=19239 comm="httpd" name="lib" dev=dm-0 ino=13716385 scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=dir type=AVC msg=audit(1163794352.992:14430): avc: denied { read } for pid=19239 comm="httpd" name="libm.so.6" dev=dm-0 ino=13716419 scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=lnk_file type=AVC msg=audit(1163794352.992:14430): avc: denied { read } for pid=19239 comm="httpd" name="libm-2.5.90.so" dev=dm-0 ino=13716401 scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:object_r:shlib_t:s0 tclass=file type=SYSCALL msg=audit(1163794352.992:14430): arch=40000003 syscall=5 success=yes exit=3 a0=b7f0666b a1=0 a2=19e a3=b7f0666b items=0 ppid=19238 pid=19239 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts7 comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:myapache_t:s0 key=(null) type=AVC msg=audit(1163794353.008:14431): avc: denied { getattr } for pid=19239 comm="httpd" name="libm-2.5.90.so" dev=dm-0 ino=13716401 scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:object_r:shlib_t:s0 tclass=file type=SYSCALL msg=audit(1163794353.008:14431): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bfa8a3a4 a2=904fc0 a3=4 items=0 ppid=19238 pid=19239 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts7 comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:myapache_t:s0 key=(null) type=AVC_PATH msg=audit(1163794353.008:14431): path="/lib/i686/nosegneg/libm-2.5.90.so" type=AVC msg=audit(1163794353.008:14432): avc: denied { execute } for pid=19239 comm="httpd" name="libm-2.5.90.so" dev=dm-0 ino=13716401 scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:object_r:shlib_t:s0 tclass=file type=SYSCALL msg=audit(1163794353.008:14432): arch=40000003 syscall=192 success=yes exit=7204864 a0=0 a1=26080 a2=5 a3=802 items=0 ppid=19238 pid=19239 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts7 comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:myapache_t:s0 key=(null) type=AVC_PATH msg=audit(1163794353.008:14432): path="/lib/i686/nosegneg/libm-2.5.90.so" type=AVC msg=audit(1163794353.012:14433): avc: denied { search } for pid=19239 comm="httpd" name="usr" dev=dm-0 ino=10311841 scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=dir type=SYSCALL msg=audit(1163794353.012:14433): arch=40000003 syscall=5 success=yes exit=3 a0=b7f10c9f a1=0 a2=53f a3=b7f10c9f items=0 ppid=19238 pid=19239 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts7 comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:myapache_t:s0 key=(null) type=AVC msg=audit(1163794353.012:14434): avc: denied { read } for pid=19239 comm="httpd" name="libldap-2.3.so.0" dev=dm-0 ino=10318754 scontext=system_u:system_r:myapache_t:s0 tcontext=staff_u:object_r:lib_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163794353.012:14434): arch=40000003 syscall=5 success=yes exit=3 a0=b7f069aa a1=0 a2=1b2 a3=b7f069aa items=0 ppid=19238 pid=19239 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts7 comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:myapache_t:s0 key=(null) type=AVC msg=audit(1163794353.016:14435): avc: denied { read } for pid=19239 comm="httpd" name="ld-2.5.90.so" dev=dm-0 ino=13716553 scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:object_r:ld_so_t:s0 tclass=file type=SYSCALL msg=audit(1163794353.016:14435): arch=40000003 syscall=125 success=yes exit=0 a0=904000 a1=1000 a2=1 a3=380 items=0 ppid=19238 pid=19239 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts7 comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:myapache_t:s0 key=(null) type=AVC_PATH msg=audit(1163794353.016:14435): path="/lib/ld-2.5.90.so" type=AVC msg=audit(1163794368.013:14436): avc: denied { audit_write } for pid=19240 comm="run_init" capability=29 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=capability type=USER_AUTH msg=audit(1163794368.013:14437): user pid=19240 uid=0 auid=500 subj=staff_u:staff_r:staff_t:s0 msg='PAM: authentication acct=kmacmill : exe="/usr/sbin/run_init" (hostname=?, addr=?, terminal=pts/2 res=success)' type=SYSCALL msg=audit(1163794368.013:14436): arch=40000003 syscall=102 success=yes exit=128 a0=b a1=bfd7f790 a2=a47ff4 a3=bfd861d0 items=0 ppid=19119 pid=19240 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="run_init" exe="/usr/sbin/run_init" subj=staff_u:staff_r:staff_t:s0 key=(null) type=USER_ACCT msg=audit(1163794368.013:14438): user pid=19240 uid=0 auid=500 subj=staff_u:staff_r:staff_t:s0 msg='PAM: accounting acct=kmacmill : exe="/usr/sbin/run_init" (hostname=?, addr=?, terminal=pts/2 res=success)' type=AVC msg=audit(1163794368.065:14439): avc: denied { search } for pid=19248 comm="httpd" name="httpd" dev=dm-0 ino=9330261 scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:object_r:httpd_config_t:s0 tclass=dir type=AVC msg=audit(1163794368.065:14439): avc: denied { getattr } for pid=19248 comm="httpd" name="httpd.conf" dev=dm-0 ino=9331739 scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:object_r:httpd_config_t:s0 tclass=file type=SYSCALL msg=audit(1163794368.065:14439): arch=40000003 syscall=195 success=yes exit=0 a0=8e98020 a1=bfe2040c a2=b8aff4 a3=8000 items=0 ppid=19247 pid=19248 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts7 comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:myapache_t:s0 key=(null) type=AVC_PATH msg=audit(1163794368.065:14439): path="/etc/httpd/conf/httpd.conf" type=AVC msg=audit(1163794368.065:14440): avc: denied { read } for pid=19248 comm="httpd" name="httpd.conf" dev=dm-0 ino=9331739 scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:object_r:httpd_config_t:s0 tclass=file type=SYSCALL msg=audit(1163794368.065:14440): arch=40000003 syscall=5 success=yes exit=3 a0=8e98020 a1=8000 a2=1b6 a3=8000 items=0 ppid=19247 pid=19248 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts7 comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:myapache_t:s0 key=(null) type=AVC msg=audit(1163794368.065:14441): avc: denied { getattr } for pid=19248 comm="httpd" name="httpd" dev=dm-0 ino=9330261 scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:object_r:httpd_config_t:s0 tclass=dir type=SYSCALL msg=audit(1163794368.065:14441): arch=40000003 syscall=195 success=yes exit=0 a0=8e99188 a1=bfe201ec a2=b8aff4 a3=8000 items=0 ppid=19247 pid=19248 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts7 comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:myapache_t:s0 key=(null) type=AVC_PATH msg=audit(1163794368.065:14441): path="/etc/httpd" type=AVC msg=audit(1163794368.065:14442): avc: denied { read } for pid=19248 comm="httpd" name="modules" dev=dm-0 ino=9331255 scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:object_r:httpd_modules_t:s0 tclass=lnk_file type=AVC msg=audit(1163794368.065:14442): avc: denied { search } for pid=19248 comm="httpd" name="httpd" dev=dm-0 ino=10640259 scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:object_r:httpd_modules_t:s0 tclass=dir type=AVC msg=audit(1163794368.065:14442): avc: denied { read } for pid=19248 comm="httpd" name="mod_auth_basic.so" dev=dm-0 ino=10639225 scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:object_r:httpd_modules_t:s0 tclass=file type=SYSCALL msg=audit(1163794368.065:14442): arch=40000003 syscall=5 success=yes exit=4 a0=8ea2550 a1=0 a2=b8c150 a3=8ea2550 items=0 ppid=19247 pid=19248 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts7 comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:myapache_t:s0 key=(null) type=AVC msg=audit(1163794368.065:14443): avc: denied { getattr } for pid=19248 comm="httpd" name="mod_auth_basic.so" dev=dm-0 ino=10639225 scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:object_r:httpd_modules_t:s0 tclass=file type=SYSCALL msg=audit(1163794368.065:14443): arch=40000003 syscall=197 success=yes exit=0 a0=4 a1=bfe1fb20 a2=1e1fc0 a3=5 items=0 ppid=19247 pid=19248 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts7 comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:myapache_t:s0 key=(null) type=AVC_PATH msg=audit(1163794368.065:14443): path="/usr/lib/httpd/modules/mod_auth_basic.so" type=AVC msg=audit(1163794368.065:14444): avc: denied { execute } for pid=19248 comm="httpd" name="mod_auth_basic.so" dev=dm-0 ino=10639225 scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:object_r:httpd_modules_t:s0 tclass=file type=SYSCALL msg=audit(1163794368.065:14444): arch=40000003 syscall=192 success=yes exit=6766592 a0=0 a1=30bc a2=5 a3=802 items=0 ppid=19247 pid=19248 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts7 comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:myapache_t:s0 key=(null) type=AVC_PATH msg=audit(1163794368.065:14444): path="/usr/lib/httpd/modules/mod_auth_basic.so" type=AVC msg=audit(1163794368.077:14445): avc: denied { read } for pid=19248 comm="httpd" name="conf.d" dev=dm-0 ino=9330352 scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:object_r:httpd_config_t:s0 tclass=dir type=SYSCALL msg=audit(1163794368.077:14445): arch=40000003 syscall=5 success=yes exit=4 a0=8ebd788 a1=18800 a2=1e1fc0 a3=8ebd768 items=0 ppid=19247 pid=19248 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts7 comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:myapache_t:s0 key=(null) type=AVC msg=audit(1163794368.089:14446): avc: denied { search } for pid=19248 comm="httpd" name="sbin" dev=dm-0 ino=10311842 scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:object_r:sbin_t:s0 tclass=dir type=AVC msg=audit(1163794368.089:14446): avc: denied { getattr } for pid=19248 comm="httpd" name="suexec" dev=dm-0 ino=10321423 scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:object_r:httpd_suexec_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163794368.089:14446): arch=40000003 syscall=195 success=yes exit=0 a0=d76b1e a1=bfe2068c a2=b8aff4 a3=73b170 items=0 ppid=19247 pid=19248 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts7 comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:myapache_t:s0 key=(null) type=AVC_PATH msg=audit(1163794368.089:14446): path="/usr/sbin/suexec" type=AVC msg=audit(1163794368.089:14447): avc: denied { create } for pid=19248 comm="httpd" scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:system_r:myapache_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1163794368.089:14447): arch=40000003 syscall=102 success=yes exit=3 a0=1 a1=bfe203f4 a2=b8aff4 a3=8e6378b items=0 ppid=19247 pid=19248 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts7 comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:myapache_t:s0 key=(null) type=AVC msg=audit(1163794368.089:14448): avc: denied { bind } for pid=19248 comm="httpd" scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:system_r:myapache_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1163794368.089:14448): arch=40000003 syscall=102 success=yes exit=0 a0=2 a1=bfe203f4 a2=b8aff4 a3=3 items=0 ppid=19247 pid=19248 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts7 comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:myapache_t:s0 key=(null) type=AVC msg=audit(1163794368.089:14449): avc: denied { getattr } for pid=19248 comm="httpd" scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:system_r:myapache_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1163794368.089:14449): arch=40000003 syscall=102 success=yes exit=0 a0=6 a1=bfe203f4 a2=b8aff4 a3=3 items=0 ppid=19247 pid=19248 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts7 comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:myapache_t:s0 key=(null) type=AVC msg=audit(1163794368.089:14450): avc: denied { write } for pid=19248 comm="httpd" scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:system_r:myapache_t:s0 tclass=netlink_route_socket type=AVC msg=audit(1163794368.089:14450): avc: denied { nlmsg_read } for pid=19248 comm="httpd" scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:system_r:myapache_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1163794368.089:14450): arch=40000003 syscall=102 success=yes exit=20 a0=b a1=bfe1f32c a2=b8aff4 a3=ffffffb8 items=0 ppid=19247 pid=19248 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts7 comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:myapache_t:s0 key=(null) type=AVC msg=audit(1163794368.089:14451): avc: denied { read } for pid=19248 comm="httpd" scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:system_r:myapache_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1163794368.089:14451): arch=40000003 syscall=102 success=yes exit=188 a0=11 a1=bfe1f32c a2=b8aff4 a3=ffffffb8 items=0 ppid=19247 pid=19248 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts7 comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:myapache_t:s0 key=(null) type=AVC msg=audit(1163794368.089:14452): avc: denied { create } for pid=19248 comm="httpd" scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:system_r:myapache_t:s0 tclass=udp_socket type=SYSCALL msg=audit(1163794368.089:14452): arch=40000003 syscall=102 success=yes exit=3 a0=1 a1=bfe20300 a2=b8aff4 a3=8edd850 items=0 ppid=19247 pid=19248 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts7 comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:myapache_t:s0 key=(null) type=AVC msg=audit(1163794368.089:14453): avc: denied { connect } for pid=19248 comm="httpd" scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:system_r:myapache_t:s0 tclass=udp_socket type=SYSCALL msg=audit(1163794368.089:14453): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=bfe20300 a2=b8aff4 a3=3 items=0 ppid=19247 pid=19248 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts7 comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:myapache_t:s0 key=(null) type=AVC msg=audit(1163794368.089:14454): avc: denied { getattr } for pid=19248 comm="httpd" laddr=0000:0000:0000:0000:0000:0000:0000:0001 lport=33036 faddr=0000:0000:0000:0000:0000:0000:0000:0001 fport=80 scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:system_r:myapache_t:s0 tclass=udp_socket type=SYSCALL msg=audit(1163794368.089:14454): arch=40000003 syscall=102 success=yes exit=0 a0=6 a1=bfe20300 a2=b8aff4 a3=3 items=0 ppid=19247 pid=19248 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts7 comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:myapache_t:s0 key=(null) type=AVC msg=audit(1163794368.089:14455): avc: denied { create } for pid=19248 comm="httpd" scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:system_r:myapache_t:s0 tclass=tcp_socket type=SYSCALL msg=audit(1163794368.089:14455): arch=40000003 syscall=102 success=yes exit=3 a0=1 a1=bfe20560 a2=8fe1e8 a3=8e63900 items=0 ppid=19247 pid=19248 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts7 comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:myapache_t:s0 key=(null) type=AVC msg=audit(1163794368.089:14456): avc: denied { read } for pid=19248 comm="httpd" name="nsswitch.conf" dev=dm-0 ino=9334508 scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1163794368.089:14456): arch=40000003 syscall=5 success=yes exit=5 a0=b72f9d a1=0 a2=1b6 a3=8eddcd0 items=0 ppid=19247 pid=19248 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts7 comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:myapache_t:s0 key=(null) type=AVC msg=audit(1163794368.089:14457): avc: denied { getattr } for pid=19248 comm="httpd" name="nsswitch.conf" dev=dm-0 ino=9334508 scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1163794368.089:14457): arch=40000003 syscall=197 success=yes exit=0 a0=5 a1=bfe203a4 a2=b8aff4 a3=8eddcd0 items=0 ppid=19247 pid=19248 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts7 comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:myapache_t:s0 key=(null) type=AVC_PATH msg=audit(1163794368.089:14457): path="/etc/nsswitch.conf" type=AVC msg=audit(1163794368.089:14458): avc: denied { search } for pid=19248 comm="httpd" name="lib" dev=dm-0 ino=13716385 scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=dir type=SYSCALL msg=audit(1163794368.089:14458): arch=40000003 syscall=5 success=yes exit=5 a0=b7f9495c a1=0 a2=150 a3=b7f9495c items=0 ppid=19247 pid=19248 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts7 comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:myapache_t:s0 key=(null) type=AVC msg=audit(1163794368.089:14459): avc: denied { search } for pid=19248 comm="httpd" name="www" dev=dm-0 ino=14436677 scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:object_r:httpd_sys_content_t:s0 tclass=dir type=AVC msg=audit(1163794368.089:14459): avc: denied { getattr } for pid=19248 comm="httpd" name="html" dev=dm-0 ino=14436704 scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:object_r:httpd_sys_content_t:s0 tclass=dir type=SYSCALL msg=audit(1163794368.089:14459): arch=40000003 syscall=195 success=yes exit=0 a0=8ed4198 a1=bfe204bc a2=b8aff4 a3=8000 items=0 ppid=19247 pid=19248 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts7 comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:myapache_t:s0 key=(null) type=AVC_PATH msg=audit(1163794368.089:14459): path="/var/www/html" type=AVC msg=audit(1163794368.089:14460): avc: denied { read } for pid=19248 comm="httpd" name="resolv.conf" dev=dm-0 ino=9330239 scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:object_r:net_conf_t:s0 tclass=file type=SYSCALL msg=audit(1163794368.089:14460): arch=40000003 syscall=5 success=yes exit=5 a0=b72e73 a1=0 a2=1b6 a3=8eeaf90 items=0 ppid=19247 pid=19248 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts7 comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:myapache_t:s0 key=(null) type=AVC msg=audit(1163794368.089:14461): avc: denied { getattr } for pid=19248 comm="httpd" name="resolv.conf" dev=dm-0 ino=9330239 scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:object_r:net_conf_t:s0 tclass=file type=SYSCALL msg=audit(1163794368.089:14461): arch=40000003 syscall=197 success=yes exit=0 a0=5 a1=bfe1dd04 a2=b8aff4 a3=8eeaf90 items=0 ppid=19247 pid=19248 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts7 comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:myapache_t:s0 key=(null) type=AVC_PATH msg=audit(1163794368.089:14461): path="/etc/resolv.conf" type=AVC msg=audit(1163794368.097:14462): avc: denied { setopt } for pid=19248 comm="httpd" scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:system_r:myapache_t:s0 tclass=tcp_socket type=SYSCALL msg=audit(1163794368.097:14462): arch=40000003 syscall=102 success=yes exit=0 a0=e a1=bfe206f0 a2=8fe1e8 a3=8e63900 items=0 ppid=19247 pid=19248 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts7 comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:myapache_t:s0 key=(null) type=AVC msg=audit(1163794368.097:14463): avc: denied { bind } for pid=19248 comm="httpd" scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:system_r:myapache_t:s0 tclass=tcp_socket type=AVC msg=audit(1163794368.097:14463): avc: denied { name_bind } for pid=19248 comm="httpd" src=80 scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:object_r:http_port_t:s0 tclass=tcp_socket type=AVC msg=audit(1163794368.097:14463): avc: denied { node_bind } for pid=19248 comm="httpd" src=80 scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:object_r:unspec_node_t:s0 tclass=tcp_socket type=AVC msg=audit(1163794368.097:14463): avc: denied { net_bind_service } for pid=19248 comm="httpd" capability=10 scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:system_r:myapache_t:s0 tclass=capability type=SYSCALL msg=audit(1163794368.097:14463): arch=40000003 syscall=102 success=yes exit=0 a0=2 a1=bfe20710 a2=8fe1e8 a3=8e63790 items=0 ppid=19247 pid=19248 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts7 comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:myapache_t:s0 key=(null) type=AVC msg=audit(1163794368.097:14464): avc: denied { listen } for pid=19248 comm="httpd" lport=80 scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:system_r:myapache_t:s0 tclass=tcp_socket type=SYSCALL msg=audit(1163794368.097:14464): arch=40000003 syscall=102 success=yes exit=0 a0=4 a1=bfe20710 a2=8fe1e8 a3=8e638e0 items=0 ppid=19247 pid=19248 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts7 comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:myapache_t:s0 key=(null) type=AVC msg=audit(1163794368.097:14465): avc: denied { read } for pid=19248 comm="httpd" name="logs" dev=dm-0 ino=9330432 scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:object_r:httpd_log_t:s0 tclass=lnk_file type=AVC msg=audit(1163794368.097:14465): avc: denied { search } for pid=19248 comm="httpd" name="log" dev=dm-0 ino=14436604 scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:object_r:var_log_t:s0 tclass=dir type=AVC msg=audit(1163794368.097:14465): avc: denied { search } for pid=19248 comm="httpd" name="httpd" dev=dm-0 ino=14436676 scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:object_r:httpd_log_t:s0 tclass=dir type=AVC msg=audit(1163794368.097:14465): avc: denied { append } for pid=19248 comm="httpd" name="error_log" dev=dm-0 ino=14437040 scontext=system_u:system_r:myapache_t:s0 tcontext=user_u:object_r:httpd_log_t:s0 tclass=file type=SYSCALL msg=audit(1163794368.097:14465): arch=40000003 syscall=5 success=yes exit=7 a0=8e93580 a1=8441 a2=1b6 a3=8441 items=0 ppid=19247 pid=19248 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts7 comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:myapache_t:s0 key=(null) type=AVC msg=audit(1163794368.097:14466): avc: denied { read } for pid=19248 comm="httpd" name="filesystems" dev=proc ino=-268435452 scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:object_r:proc_t:s0 tclass=file type=SYSCALL msg=audit(1163794368.097:14466): arch=40000003 syscall=5 success=yes exit=9 a0=e870b0 a1=8000 a2=0 a3=8000 items=0 ppid=19247 pid=19248 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts7 comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:myapache_t:s0 key=(null) type=AVC msg=audit(1163794368.101:14467): avc: denied { read } for pid=19248 comm="httpd" name="localtime" dev=dm-0 ino=9331954 scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1163794368.101:14467): arch=40000003 syscall=5 success=yes exit=9 a0=b725e0 a1=0 a2=1b6 a3=8f351b8 items=0 ppid=19247 pid=19248 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts7 comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:myapache_t:s0 key=(null) type=AVC msg=audit(1163794368.101:14468): avc: denied { getattr } for pid=19248 comm="httpd" name="localtime" dev=dm-0 ino=9331954 scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1163794368.101:14468): arch=40000003 syscall=197 success=yes exit=0 a0=9 a1=bfe1c3e8 a2=b8aff4 a3=8f351b8 items=0 ppid=19247 pid=19248 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts7 comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:myapache_t:s0 key=(null) type=AVC_PATH msg=audit(1163794368.101:14468): path="/etc/localtime" type=AVC msg=audit(1163794368.105:14469): avc: denied { create } for pid=19248 comm="httpd" key=0 scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:system_r:myapache_t:s0 tclass=sem type=SYSCALL msg=audit(1163794368.105:14469): arch=40000003 syscall=117 success=yes exit=458753 a0=2 a1=0 a2=1 a3=380 items=0 ppid=19247 pid=19248 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts7 comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:myapache_t:s0 key=(null) type=AVC msg=audit(1163794368.105:14470): avc: denied { unix_write } for pid=19248 comm="httpd" key=0 scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:system_r:myapache_t:s0 tclass=sem type=AVC msg=audit(1163794368.105:14470): avc: denied { write } for pid=19248 comm="httpd" key=0 scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:system_r:myapache_t:s0 tclass=sem type=SYSCALL msg=audit(1163794368.105:14470): arch=40000003 syscall=117 success=yes exit=0 a0=3 a1=70001 a2=0 a3=110 items=0 ppid=19247 pid=19248 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts7 comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:myapache_t:s0 key=(null) type=AVC msg=audit(1163794368.105:14471): avc: denied { setattr } for pid=19248 comm="httpd" key=0 scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:system_r:myapache_t:s0 tclass=sem type=SYSCALL msg=audit(1163794368.105:14471): arch=40000003 syscall=117 success=yes exit=0 a0=3 a1=70001 a2=0 a3=101 items=0 ppid=19247 pid=19248 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts7 comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:myapache_t:s0 key=(null) type=AVC msg=audit(1163794368.105:14472): avc: denied { destroy } for pid=19248 comm="httpd" key=0 scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:system_r:myapache_t:s0 tclass=sem type=SYSCALL msg=audit(1163794368.105:14472): arch=40000003 syscall=117 success=yes exit=0 a0=3 a1=70001 a2=0 a3=100 items=0 ppid=19247 pid=19248 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts7 comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:myapache_t:s0 key=(null) type=AVC msg=audit(1163794368.117:14473): avc: denied { search } for pid=19249 comm="httpd" name="sbin" dev=dm-0 ino=10311842 scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:object_r:sbin_t:s0 tclass=dir type=SYSCALL msg=audit(1163794368.117:14473): arch=40000003 syscall=195 success=yes exit=0 a0=d76b1e a1=bfe2068c a2=b8aff4 a3=73b170 items=0 ppid=19248 pid=19249 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:myapache_t:s0 key=(null) type=AVC msg=audit(1163794368.125:14474): avc: denied { read } for pid=19249 comm="httpd" name="urandom" dev=tmpfs ino=1972 scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:object_r:urandom_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163794368.125:14474): arch=40000003 syscall=5 success=yes exit=9 a0=8f7bcb a1=0 a2=8ec810 a3=14 items=0 ppid=19248 pid=19249 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:myapache_t:s0 key=(null) type=AVC msg=audit(1163794368.125:14475): avc: denied { read } for pid=19249 comm="httpd" name="run" dev=dm-0 ino=9330354 scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163794368.125:14475): arch=40000003 syscall=195 success=no exit=-2 a0=8f0d818 a1=bfe2053c a2=b8aff4 a3=10 items=0 ppid=19248 pid=19249 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:myapache_t:s0 key=(null) type=AVC msg=audit(1163794368.125:14476): avc: denied { write } for pid=19249 comm="httpd" name="run" dev=dm-0 ino=14436616 scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:object_r:var_run_t:s0 tclass=dir type=AVC msg=audit(1163794368.125:14476): avc: denied { add_name } for pid=19249 comm="httpd" name="httpd.pid" scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:object_r:var_run_t:s0 tclass=dir type=AVC msg=audit(1163794368.125:14476): avc: denied { create } for pid=19249 comm="httpd" name="httpd.pid" scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:object_r:var_run_t:s0 tclass=file type=SYSCALL msg=audit(1163794368.125:14476): arch=40000003 syscall=5 success=yes exit=9 a0=8f0d818 a1=8241 a2=1a4 a3=8241 items=0 ppid=19248 pid=19249 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:myapache_t:s0 key=(null) type=AVC msg=audit(1163794368.125:14477): avc: denied { write } for pid=19249 comm="httpd" name="httpd.pid" dev=dm-0 ino=14436960 scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:object_r:var_run_t:s0 tclass=file type=SYSCALL msg=audit(1163794368.125:14477): arch=40000003 syscall=4 success=yes exit=6 a0=9 a1=8f417b8 a2=6 a3=6 items=0 ppid=19248 pid=19249 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:myapache_t:s0 key=(null) type=AVC_PATH msg=audit(1163794368.125:14477): path="/var/run/httpd.pid" type=AVC msg=audit(1163794368.125:14478): avc: denied { setgid } for pid=19250 comm="httpd" capability=6 scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:system_r:myapache_t:s0 tclass=capability type=SYSCALL msg=audit(1163794368.125:14478): arch=40000003 syscall=214 success=yes exit=0 a0=30 a1=0 a2=8fe060 a3=bfe20510 items=0 ppid=19249 pid=19250 auid=500 uid=0 gid=48 euid=0 suid=0 fsuid=0 egid=48 sgid=48 fsgid=48 tty=(none) comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:myapache_t:s0 key=(null) type=AVC msg=audit(1163794368.125:14479): avc: denied { search } for pid=19250 comm="httpd" name="sys" dev=proc ino=-268435429 scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:object_r:sysctl_t:s0 tclass=dir type=AVC msg=audit(1163794368.125:14479): avc: denied { search } for pid=19250 comm="httpd" name="kernel" dev=proc ino=-268435417 scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:object_r:sysctl_kernel_t:s0 tclass=dir type=AVC msg=audit(1163794368.125:14479): avc: denied { read } for pid=19250 comm="httpd" name="ngroups_max" dev=proc ino=-268435370 scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:object_r:sysctl_kernel_t:s0 tclass=file type=SYSCALL msg=audit(1163794368.125:14479): arch=40000003 syscall=5 success=yes exit=9 a0=b72766 a1=0 a2=a a3=8ee1128 items=0 ppid=19249 pid=19250 auid=500 uid=0 gid=48 euid=0 suid=0 fsuid=0 egid=48 sgid=48 fsgid=48 tty=(none) comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:myapache_t:s0 key=(null) type=AVC msg=audit(1163794368.125:14480): avc: denied { search } for pid=19250 comm="httpd" name="etc" dev=dm-0 ino=9329761 scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=dir type=SYSCALL msg=audit(1163794368.125:14480): arch=40000003 syscall=5 success=yes exit=9 a0=6b42d8 a1=0 a2=1b6 a3=8f49d48 items=0 ppid=19249 pid=19250 auid=500 uid=0 gid=48 euid=0 suid=0 fsuid=0 egid=48 sgid=48 fsgid=48 tty=(none) comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:myapache_t:s0 key=(null) type=AVC msg=audit(1163794368.125:14481): avc: denied { setuid } for pid=19250 comm="httpd" capability=7 scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:system_r:myapache_t:s0 tclass=capability type=SYSCALL msg=audit(1163794368.125:14481): arch=40000003 syscall=213 success=yes exit=0 a0=30 a1=108 a2=1 a3=bfe20510 items=0 ppid=19249 pid=19250 auid=500 uid=48 gid=48 euid=48 suid=48 fsuid=48 egid=48 sgid=48 fsgid=48 tty=(none) comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:myapache_t:s0 key=(null) type=AVC msg=audit(1163794368.125:14482): avc: denied { accept } for pid=19250 comm="httpd" lport=80 scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:system_r:myapache_t:s0 tclass=tcp_socket type=AVC msg=audit(1163794376.422:14483): avc: denied { read } for pid=19263 comm="mozilla-xremote" name=".gdm0UWNIT" dev=dm-0 ino=14469400 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163794376.422:14483): arch=40000003 syscall=33 success=yes exit=0 a0=bf816f92 a1=4 a2=da3a64 a3=bf816f92 items=0 ppid=19262 pid=19263 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="mozilla-xremote" exe="/usr/lib/firefox-2.0/mozilla-xremote-client" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794381.358:14484): avc: denied { tcp_recv } for pid=16548 comm="firefox-bin" saddr=127.0.0.1 src=35667 daddr=127.0.0.1 dest=80 netif=lo scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:object_r:netif_t:s0 tclass=netif type=AVC msg=audit(1163794381.358:14484): avc: denied { tcp_recv } for pid=16548 comm="firefox-bin" saddr=127.0.0.1 src=35667 daddr=127.0.0.1 dest=80 netif=lo scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:object_r:node_t:s0 tclass=node type=AVC msg=audit(1163794381.358:14484): avc: denied { recv_msg } for pid=16548 comm="firefox-bin" saddr=127.0.0.1 src=35667 daddr=127.0.0.1 dest=80 netif=lo scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:object_r:port_t:s0 tclass=tcp_socket type=AVC msg=audit(1163794381.358:14484): avc: denied { tcp_send } for pid=16548 comm="firefox-bin" saddr=127.0.0.1 src=80 daddr=127.0.0.1 dest=35667 netif=lo scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:object_r:netif_t:s0 tclass=netif type=AVC msg=audit(1163794381.358:14484): avc: denied { tcp_send } for pid=16548 comm="firefox-bin" saddr=127.0.0.1 src=80 daddr=127.0.0.1 dest=35667 netif=lo scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:object_r:node_t:s0 tclass=node type=AVC msg=audit(1163794381.358:14484): avc: denied { send_msg } for pid=16548 comm="firefox-bin" saddr=127.0.0.1 src=80 daddr=127.0.0.1 dest=35667 netif=lo scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:object_r:port_t:s0 tclass=tcp_socket type=SYSCALL msg=audit(1163794381.358:14484): arch=40000003 syscall=102 success=no exit=-115 a0=3 a1=b7cdbff0 a2=4932550 a3=0 items=0 ppid=1 pid=16548 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=SYSCALL msg=audit(1163794368.125:14482): arch=40000003 syscall=102 success=yes exit=10 a0=5 a1=bfe20500 a2=8fe1e8 a3=8f47c28 items=0 ppid=19249 pid=19250 auid=500 uid=48 gid=48 euid=48 suid=48 fsuid=48 egid=48 sgid=48 fsgid=48 tty=(none) comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:myapache_t:s0 key=(null) type=AVC msg=audit(1163794381.362:14485): avc: denied { getattr } for pid=19250 comm="httpd" laddr=0000:0000:0000:0000:0000:ffff:7f00:0001 lport=80 faddr=0000:0000:0000:0000:0000:ffff:7f00:0001 fport=35667 scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:system_r:myapache_t:s0 tclass=tcp_socket type=SYSCALL msg=audit(1163794381.362:14485): arch=40000003 syscall=102 success=yes exit=0 a0=6 a1=bfe204f0 a2=8fe1e8 a3=8f47c28 items=0 ppid=19249 pid=19250 auid=500 uid=48 gid=48 euid=48 suid=48 fsuid=48 egid=48 sgid=48 fsgid=48 tty=(none) comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:myapache_t:s0 key=(null) type=AVC msg=audit(1163794381.362:14486): avc: denied { read } for pid=19250 comm="httpd" name="[220857]" dev=sockfs ino=220857 scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:system_r:myapache_t:s0 tclass=tcp_socket type=SYSCALL msg=audit(1163794381.362:14486): arch=40000003 syscall=3 success=yes exit=387 a0=a a1=8f53f18 a2=1f40 a3=8f47c28 items=0 ppid=19249 pid=19250 auid=500 uid=48 gid=48 euid=48 suid=48 fsuid=48 egid=48 sgid=48 fsgid=48 tty=(none) comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:myapache_t:s0 key=(null) type=AVC_PATH msg=audit(1163794381.362:14486): path="socket:[220857]" type=AVC msg=audit(1163794381.362:14487): avc: denied { getattr } for pid=19250 comm="httpd" name="noindex.html" dev=dm-0 ino=14436695 scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:object_r:httpd_sys_content_t:s0 tclass=file type=SYSCALL msg=audit(1163794381.362:14487): arch=40000003 syscall=195 success=yes exit=0 a0=8f56a78 a1=bfe2027c a2=b8aff4 a3=8170 items=0 ppid=19249 pid=19250 auid=500 uid=48 gid=48 euid=48 suid=48 fsuid=48 egid=48 sgid=48 fsgid=48 tty=(none) comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:myapache_t:s0 key=(null) type=AVC_PATH msg=audit(1163794381.362:14487): path="/var/www/error/noindex.html" type=AVC msg=audit(1163794381.366:14488): avc: denied { read } for pid=19250 comm="httpd" name="noindex.html" dev=dm-0 ino=14436695 scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:object_r:httpd_sys_content_t:s0 tclass=file type=SYSCALL msg=audit(1163794381.366:14488): arch=40000003 syscall=5 success=yes exit=11 a0=8f56b00 a1=8000 a2=0 a3=8000 items=0 ppid=19249 pid=19250 auid=500 uid=48 gid=48 euid=48 suid=48 fsuid=48 egid=48 sgid=48 fsgid=48 tty=(none) comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:myapache_t:s0 key=(null) type=AVC msg=audit(1163794381.366:14489): avc: denied { write } for pid=19250 comm="httpd" name="[220857]" dev=sockfs ino=220857 scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:system_r:myapache_t:s0 tclass=tcp_socket type=SYSCALL msg=audit(1163794381.366:14489): arch=40000003 syscall=146 success=yes exit=4153 a0=a a1=bfe1de78 a2=2 a3=2 items=0 ppid=19249 pid=19250 auid=500 uid=48 gid=48 euid=48 suid=48 fsuid=48 egid=48 sgid=48 fsgid=48 tty=(none) comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:myapache_t:s0 key=(null) type=AVC_PATH msg=audit(1163794381.366:14489): path="socket:[220857]" type=AVC msg=audit(1163794381.366:14490): avc: denied { shutdown } for pid=19250 comm="httpd" laddr=0000:0000:0000:0000:0000:ffff:7f00:0001 lport=80 faddr=0000:0000:0000:0000:0000:ffff:7f00:0001 fport=35667 scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:system_r:myapache_t:s0 tclass=tcp_socket type=SYSCALL msg=audit(1163794381.366:14490): arch=40000003 syscall=102 success=yes exit=0 a0=d a1=bfe20300 a2=8fe1e8 a3=8f47dc0 items=0 ppid=19249 pid=19250 auid=500 uid=48 gid=48 euid=48 suid=48 fsuid=48 egid=48 sgid=48 fsgid=48 tty=(none) comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:myapache_t:s0 key=(null) type=AVC msg=audit(1163794381.370:14491): avc: denied { read } for pid=19250 comm="httpd" name="[220847]" dev=pipefs ino=220847 scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:system_r:myapache_t:s0 tclass=fifo_file type=SYSCALL msg=audit(1163794381.370:14491): arch=40000003 syscall=3 success=no exit=-11 a0=5 a1=bfe20563 a2=1 a3=1 items=0 ppid=19249 pid=19250 auid=500 uid=48 gid=48 euid=48 suid=48 fsuid=48 egid=48 sgid=48 fsgid=48 tty=(none) comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:myapache_t:s0 key=(null) type=AVC_PATH msg=audit(1163794381.370:14491): path="pipe:[220847]" type=USER_AUTH msg=audit(1163794389.543:14492): user pid=19266 uid=0 auid=500 subj=staff_u:staff_r:staff_t:s0 msg='PAM: authentication acct=kmacmill : exe="/usr/sbin/run_init" (hostname=?, addr=?, terminal=pts/2 res=success)' type=USER_ACCT msg=audit(1163794389.543:14493): user pid=19266 uid=0 auid=500 subj=staff_u:staff_r:staff_t:s0 msg='PAM: accounting acct=kmacmill : exe="/usr/sbin/run_init" (hostname=?, addr=?, terminal=pts/2 res=success)' type=AVC msg=audit(1163794389.559:14494): avc: denied { kill } for pid=19249 comm="httpd" capability=5 scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:system_r:myapache_t:s0 tclass=capability type=AVC msg=audit(1163794389.559:14494): avc: denied { signal } for pid=19249 comm="httpd" scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:system_r:myapache_t:s0 tclass=process type=SYSCALL msg=audit(1163794389.559:14494): arch=40000003 syscall=37 success=yes exit=0 a0=ffffb4cf a1=f a2=b8aff4 a3=8f417b8 items=0 ppid=1 pid=19249 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:myapache_t:s0 key=(null) type=AVC msg=audit(1163794389.647:14495): avc: denied { write } for pid=19249 comm="httpd" name="run" dev=dm-0 ino=14436616 scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:object_r:var_run_t:s0 tclass=dir type=AVC msg=audit(1163794389.647:14495): avc: denied { remove_name } for pid=19249 comm="httpd" name="httpd.pid" dev=dm-0 ino=14436960 scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:object_r:var_run_t:s0 tclass=dir type=AVC msg=audit(1163794389.647:14495): avc: denied { unlink } for pid=19249 comm="httpd" name="httpd.pid" dev=dm-0 ino=14436960 scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:object_r:var_run_t:s0 tclass=file type=SYSCALL msg=audit(1163794389.647:14495): arch=40000003 syscall=10 success=yes exit=0 a0=8f0d960 a1=8f0d960 a2=d7f004 a3=8f0d960 items=0 ppid=1 pid=19249 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:myapache_t:s0 key=(null) type=AVC msg=audit(1163794669.408:14496): avc: denied { getattr } for pid=19286 comm="evolution" name=".evolution" dev=dm-0 ino=6776355 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_evolution_home_t:s0 tclass=dir type=SYSCALL msg=audit(1163794669.408:14496): arch=40000003 syscall=195 success=yes exit=0 a0=8e69188 a1=aa35b0cc a2=758aff4 a3=4 items=0 ppid=1 pid=19286 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163794669.408:14496): path="/home/kmacmill/.evolution" type=AVC msg=audit(1163794669.408:14497): avc: denied { search } for pid=19286 comm="evolution" name=".evolution" dev=dm-0 ino=6776355 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_evolution_home_t:s0 tclass=dir type=SYSCALL msg=audit(1163794669.408:14497): arch=40000003 syscall=33 success=yes exit=0 a0=8e69188 a1=0 a2=bae708 a3=10 items=0 ppid=1 pid=19286 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163794669.408:14498): avc: denied { read } for pid=19286 comm="evolution" name="summary" dev=dm-0 ino=6814052 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_evolution_home_t:s0 tclass=file type=SYSCALL msg=audit(1163794669.408:14498): arch=40000003 syscall=5 success=yes exit=25 a0=8fe0700 a1=0 a2=1b6 a3=9238950 items=0 ppid=1 pid=19286 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163794669.408:14499): avc: denied { getattr } for pid=19286 comm="evolution" name="summary" dev=dm-0 ino=6814052 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_evolution_home_t:s0 tclass=file type=SYSCALL msg=audit(1163794669.408:14499): arch=40000003 syscall=197 success=yes exit=0 a0=19 a1=aa35af48 a2=758aff4 a3=9238950 items=0 ppid=1 pid=19286 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163794669.408:14499): path="/home/kmacmill/.evolution/mail/imap/kmacmill@pobox-2.corp.redhat.com/folders/INBOX/summary" type=AVC msg=audit(1163794669.408:14500): avc: denied { read } for pid=19286 comm="evolution" name="INBOX" dev=dm-0 ino=6809503 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_evolution_home_t:s0 tclass=dir type=SYSCALL msg=audit(1163794669.408:14500): arch=40000003 syscall=5 success=yes exit=25 a0=91e8710 a1=18800 a2=758c120 a3=91e8710 items=0 ppid=1 pid=19286 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163794669.408:14501): avc: denied { send_msg } for pid=19286 comm="evolution" saddr=10.11.14.219 src=37722 daddr=10.11.255.15 dest=993 netif=tun0 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:pop_port_t:s0 tclass=tcp_socket type=SYSCALL msg=audit(1163794669.408:14501): arch=40000003 syscall=102 success=yes exit=42 a0=9 a1=aa35aeb0 a2=4932550 a3=0 items=0 ppid=1 pid=19286 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163794669.472:14502): avc: denied { recv_msg } for pid=15069 comm="vpnc" saddr=10.11.255.15 src=993 daddr=10.11.14.219 dest=37722 netif=tun0 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:pop_port_t:s0 tclass=tcp_socket type=SYSCALL msg=audit(1163794669.472:14502): arch=40000003 syscall=4 success=yes exit=52 a0=4 a1=805c570 a2=34 a3=bfd587e4 items=0 ppid=15067 pid=15069 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vpnc" exe="/usr/sbin/vpnc" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794670.312:14503): avc: denied { write } for pid=19286 comm="evolution" name="fedora-devel" dev=dm-0 ino=6814265 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_evolution_home_t:s0 tclass=dir type=AVC msg=audit(1163794670.312:14503): avc: denied { add_name } for pid=19286 comm="evolution" name="summary~" scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_evolution_home_t:s0 tclass=dir type=AVC msg=audit(1163794670.312:14503): avc: denied { create } for pid=19286 comm="evolution" name="summary~" scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_evolution_home_t:s0 tclass=file type=SYSCALL msg=audit(1163794670.312:14503): arch=40000003 syscall=5 success=yes exit=43 a0=aa35afd0 a1=242 a2=180 a3=9269aa8 items=0 ppid=1 pid=19286 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163794670.312:14504): avc: denied { write } for pid=19286 comm="evolution" name="summary~" dev=dm-0 ino=6814465 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_evolution_home_t:s0 tclass=file type=SYSCALL msg=audit(1163794670.312:14504): arch=40000003 syscall=4 success=yes exit=40 a0=2b a1=b219f000 a2=28 a3=28 items=0 ppid=1 pid=19286 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163794670.312:14504): path="/home/kmacmill/.evolution/mail/imap/kmacmill@pobox-2.corp.redhat.com/folders/INBOX/subfolders/lists/subfolders/fedora-devel/summary~" type=AVC msg=audit(1163794670.320:14505): avc: denied { remove_name } for pid=19286 comm="evolution" name="summary~" dev=dm-0 ino=6814465 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_evolution_home_t:s0 tclass=dir type=AVC msg=audit(1163794670.320:14505): avc: denied { rename } for pid=19286 comm="evolution" name="summary~" dev=dm-0 ino=6814465 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_evolution_home_t:s0 tclass=file type=AVC msg=audit(1163794670.320:14505): avc: denied { unlink } for pid=19286 comm="evolution" name="summary" dev=dm-0 ino=6812263 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_evolution_home_t:s0 tclass=file type=SYSCALL msg=audit(1163794670.320:14505): arch=40000003 syscall=38 success=yes exit=0 a0=aa35afd0 a1=9269aa8 a2=1dcbd8 a3=8f952f0 items=0 ppid=1 pid=19286 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163794674.004:14506): avc: denied { lock } for pid=19290 comm="evolution" name="Inbox" dev=dm-0 ino=6778778 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_evolution_home_t:s0 tclass=file type=SYSCALL msg=audit(1163794674.004:14506): arch=40000003 syscall=221 success=yes exit=0 a0=19 a1=6 a2=b40911fc a3=b40911fc items=0 ppid=1 pid=19290 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163794674.004:14506): path="/home/kmacmill/.evolution/mail/local/Inbox" type=USER_ACCT msg=audit(1163794801.068:14507): user pid=19295 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1163794801.068:14508): login pid=19295 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1163794801.072:14509): user pid=19295 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1163794801.072:14510): user pid=19295 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1163794801.076:14511): avc: denied { execute } for pid=19296 comm="sh" name="sa1" dev=dm-0 ino=12865251 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:lib_t:s0 tclass=file type=AVC msg=audit(1163794801.076:14511): avc: denied { execute_no_trans } for pid=19296 comm="sh" name="sa1" dev=dm-0 ino=12865251 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1163794801.076:14511): arch=40000003 syscall=11 success=yes exit=0 a0=93561b0 a1=9356358 a2=9356290 a3=9356008 items=0 ppid=19295 pid=19296 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sa1" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163794801.076:14511): path="/usr/lib/sa/sa1" type=AVC msg=audit(1163794801.080:14512): avc: denied { execute } for pid=19296 comm="sa1" name="sadc" dev=dm-0 ino=12865253 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=AVC msg=audit(1163794801.080:14512): avc: denied { execute_no_trans } for pid=19296 comm="sa1" name="sadc" dev=dm-0 ino=12865253 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=AVC msg=audit(1163794801.080:14512): avc: denied { read } for pid=19296 comm="sa1" name="sadc" dev=dm-0 ino=12865253 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163794801.080:14512): arch=40000003 syscall=11 success=yes exit=0 a0=9779d48 a1=9779740 a2=9779d60 a3=9779740 items=0 ppid=19295 pid=19296 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163794801.080:14512): path="/usr/lib/sa/sadc" type=AVC_PATH msg=audit(1163794801.080:14512): path="/usr/lib/sa/sadc" type=AVC msg=audit(1163794801.080:14513): avc: denied { search } for pid=19296 comm="sadc" name="net" dev=proc ino=-268435432 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=dir type=AVC msg=audit(1163794801.080:14513): avc: denied { read } for pid=19296 comm="sadc" name="dev" dev=proc ino=-268434164 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=file type=SYSCALL msg=audit(1163794801.080:14513): arch=40000003 syscall=5 success=yes exit=3 a0=80502e1 a1=0 a2=1b6 a3=89747f8 items=0 ppid=19295 pid=19296 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163794801.080:14514): avc: denied { getattr } for pid=19296 comm="sadc" name="dev" dev=proc ino=-268434164 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=file type=SYSCALL msg=audit(1163794801.080:14514): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bfd4be78 a2=b16ff4 a3=89747f8 items=0 ppid=19295 pid=19296 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163794801.080:14514): path="/proc/net/dev" type=AVC msg=audit(1163794801.080:14515): avc: denied { search } for pid=19296 comm="sadc" name="sa" dev=dm-0 ino=14607631 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=dir type=SYSCALL msg=audit(1163794801.080:14515): arch=40000003 syscall=33 success=yes exit=0 a0=bfd4c224 a1=0 a2=bfd4c118 a3=bfd4c120 items=0 ppid=19295 pid=19296 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163794801.080:14516): avc: denied { read append } for pid=19296 comm="sadc" name="sa17" dev=dm-0 ino=14600257 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=file type=SYSCALL msg=audit(1163794801.080:14516): arch=40000003 syscall=5 success=yes exit=3 a0=bfd4c224 a1=402 a2=bfd4c3e8 a3=bfd4c120 items=0 ppid=19295 pid=19296 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163794801.084:14517): avc: denied { search } for pid=19296 comm="sadc" name="fs" dev=proc ino=-268435428 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=dir type=AVC msg=audit(1163794801.084:14517): avc: denied { read } for pid=19296 comm="sadc" name="dentry-state" dev=proc ino=-268435230 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=file type=SYSCALL msg=audit(1163794801.084:14517): arch=40000003 syscall=5 success=yes exit=4 a0=80502ef a1=0 a2=1b6 a3=8975348 items=0 ppid=19295 pid=19296 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163794801.084:14518): avc: denied { getattr } for pid=19296 comm="sadc" name="dentry-state" dev=proc ino=-268435230 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=file type=SYSCALL msg=audit(1163794801.084:14518): arch=40000003 syscall=197 success=yes exit=0 a0=4 a1=bfd4bcd0 a2=b16ff4 a3=8975348 items=0 ppid=19295 pid=19296 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163794801.084:14518): path="/proc/sys/fs/dentry-state" type=AVC msg=audit(1163794801.084:14519): avc: denied { search } for pid=19296 comm="sadc" name="rpc" dev=proc ino=-268433616 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_rpc_t:s0 tclass=dir type=SYSCALL msg=audit(1163794801.084:14519): arch=40000003 syscall=5 success=no exit=-2 a0=8050215 a1=0 a2=1b6 a3=8975348 items=0 ppid=19295 pid=19296 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163794801.084:14520): avc: denied { lock } for pid=19296 comm="sadc" name="sa17" dev=dm-0 ino=14600257 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=file type=SYSCALL msg=audit(1163794801.084:14520): arch=40000003 syscall=143 success=yes exit=0 a0=3 a1=6 a2=bfd4c120 a3=3 items=0 ppid=19295 pid=19296 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163794801.084:14520): path="/var/log/sa/sa17" type=CRED_DISP msg=audit(1163794801.096:14521): user pid=19295 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1163794801.096:14522): user pid=19295 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1163794809.593:14523): avc: denied { write } for pid=15069 comm="vpnc" name="tun" dev=tmpfs ino=1473 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:tun_tap_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163794809.593:14523): arch=40000003 syscall=4 success=yes exit=105 a0=4 a1=805c570 a2=69 a3=bfd587e4 items=0 ppid=15067 pid=15069 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vpnc" exe="/usr/sbin/vpnc" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163794809.593:14523): path="/dev/net/tun" type=AVC msg=audit(1163794809.593:14524): avc: denied { read } for pid=15069 comm="vpnc" name="tun" dev=tmpfs ino=1473 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:tun_tap_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163794809.593:14524): arch=40000003 syscall=3 success=yes exit=52 a0=4 a1=805c5a0 a2=1000 a3=805c5a0 items=0 ppid=15067 pid=15069 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vpnc" exe="/usr/sbin/vpnc" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163794809.593:14524): path="/dev/net/tun" type=AVC msg=audit(1163795269.282:14525): avc: denied { send_msg } for pid=19323 comm="evolution" saddr=10.11.14.219 src=37722 daddr=10.11.255.15 dest=993 netif=tun0 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:pop_port_t:s0 tclass=tcp_socket type=SYSCALL msg=audit(1163795269.282:14525): arch=40000003 syscall=102 success=yes exit=43 a0=9 a1=b2c8eee0 a2=4932550 a3=0 items=0 ppid=1 pid=19323 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163795269.294:14526): avc: denied { recv_msg } for pid=15069 comm="vpnc" saddr=10.11.255.15 src=993 daddr=10.11.14.219 dest=37722 netif=tun0 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:pop_port_t:s0 tclass=tcp_socket type=SYSCALL msg=audit(1163795269.294:14526): arch=40000003 syscall=4 success=yes exit=151 a0=4 a1=805c570 a2=97 a3=bfd587e4 items=0 ppid=15067 pid=15069 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vpnc" exe="/usr/sbin/vpnc" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163795334.190:14527): avc: denied { search } for pid=19330 comm="open-browser.sh" name="locale" dev=dm-0 ino=10311858 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=dir type=AVC msg=audit(1163795334.190:14527): avc: denied { read } for pid=19330 comm="open-browser.sh" name="locale-archive" dev=dm-0 ino=11588566 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=staff_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1163795334.190:14527): arch=40000003 syscall=5 success=yes exit=3 a0=b72b60 a1=8000 a2=1 a3=bfab8b30 items=0 ppid=18600 pid=19330 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="open-browser.sh" exe="/bin/bash" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC msg=audit(1163795334.194:14528): avc: denied { getattr } for pid=19330 comm="open-browser.sh" name="locale-archive" dev=dm-0 ino=11588566 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=staff_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1163795334.194:14528): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=b8aaa0 a2=b89ff4 a3=bfab8b30 items=0 ppid=18600 pid=19330 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="open-browser.sh" exe="/bin/bash" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC_PATH msg=audit(1163795334.194:14528): path="/usr/lib/locale/locale-archive" type=AVC msg=audit(1163795334.194:14529): avc: denied { read } for pid=19330 comm="open-browser.sh" name="meminfo" dev=proc ino=-268435454 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:proc_t:s0 tclass=file type=SYSCALL msg=audit(1163795334.194:14529): arch=40000003 syscall=5 success=yes exit=3 a0=b71afa a1=0 a2=1b6 a3=8e6aa60 items=0 ppid=18600 pid=19330 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="open-browser.sh" exe="/bin/bash" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC msg=audit(1163795334.194:14530): avc: denied { getattr } for pid=19330 comm="open-browser.sh" name="meminfo" dev=proc ino=-268435454 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:proc_t:s0 tclass=file type=SYSCALL msg=audit(1163795334.194:14530): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bfab6ca8 a2=b89ff4 a3=8e6aa60 items=0 ppid=18600 pid=19330 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="open-browser.sh" exe="/bin/bash" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC_PATH msg=audit(1163795334.194:14530): path="/proc/meminfo" type=AVC msg=audit(1163795334.194:14531): avc: denied { read } for pid=19330 comm="open-browser.sh" name="gconv-modules.cache" dev=dm-0 ino=10386358 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=staff_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1163795334.194:14531): arch=40000003 syscall=5 success=yes exit=3 a0=b72b3c a1=0 a2=0 a3=bfab8d90 items=0 ppid=18600 pid=19330 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="open-browser.sh" exe="/bin/bash" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC msg=audit(1163795334.194:14532): avc: denied { getattr } for pid=19330 comm="open-browser.sh" name="gconv-modules.cache" dev=dm-0 ino=10386358 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=staff_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1163795334.194:14532): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bfab8c38 a2=b89ff4 a3=3 items=0 ppid=18600 pid=19330 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="open-browser.sh" exe="/bin/bash" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC_PATH msg=audit(1163795334.194:14532): path="/usr/lib/gconv/gconv-modules.cache" type=AVC msg=audit(1163795334.210:14533): avc: denied { read } for pid=19332 comm="gnome-open" name="locale.alias" dev=dm-0 ino=10314034 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1163795334.210:14533): arch=40000003 syscall=5 success=yes exit=3 a0=40484c a1=8000 a2=1b6 a3=920ec80 items=0 ppid=19331 pid=19332 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-open" exe="/usr/bin/gnome-open" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC msg=audit(1163795334.214:14534): avc: denied { search } for pid=19332 comm="gnome-open" name="nscd" dev=dm-0 ino=14436932 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:nscd_var_run_t:s0 tclass=dir type=SYSCALL msg=audit(1163795334.214:14534): arch=40000003 syscall=102 success=no exit=-2 a0=3 a1=bfe91640 a2=95eff4 a3=3 items=0 ppid=19331 pid=19332 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-open" exe="/usr/bin/gnome-open" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC msg=audit(1163795334.214:14535): avc: denied { read } for pid=19332 comm="gnome-open" name="urandom" dev=tmpfs ino=1972 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:urandom_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163795334.214:14535): arch=40000003 syscall=5 success=yes exit=23 a0=3d4880 a1=8000 a2=1b6 a3=9217be8 items=0 ppid=19331 pid=19332 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-open" exe="/usr/bin/gnome-open" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC msg=audit(1163795334.214:14536): avc: denied { getattr } for pid=19332 comm="gnome-open" name="urandom" dev=tmpfs ino=1972 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:urandom_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163795334.214:14536): arch=40000003 syscall=197 success=yes exit=0 a0=17 a1=bfe918fc a2=95eff4 a3=9217be8 items=0 ppid=19331 pid=19332 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-open" exe="/usr/bin/gnome-open" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC_PATH msg=audit(1163795334.214:14536): path="/dev/urandom" type=AVC msg=audit(1163795334.214:14537): avc: denied { ioctl } for pid=19332 comm="gnome-open" name="urandom" dev=tmpfs ino=1972 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:urandom_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163795334.214:14537): arch=40000003 syscall=54 success=no exit=-22 a0=17 a1=5401 a2=bfe9185c a3=bfe9189c items=0 ppid=19331 pid=19332 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-open" exe="/usr/bin/gnome-open" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC_PATH msg=audit(1163795334.214:14537): path="/dev/urandom" type=AVC msg=audit(1163795334.306:14538): avc: denied { read } for pid=19337 comm="mozilla-xremote" name=".gdm0UWNIT" dev=dm-0 ino=14469400 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163795334.306:14538): arch=40000003 syscall=33 success=yes exit=0 a0=bff70f74 a1=4 a2=da3a64 a3=bff70f74 items=0 ppid=19336 pid=19337 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="mozilla-xremote" exe="/usr/lib/firefox-2.0/mozilla-xremote-client" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC msg=audit(1163795334.306:14539): avc: denied { getattr } for pid=19337 comm="mozilla-xremote" name=".gdm0UWNIT" dev=dm-0 ino=14469400 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163795334.306:14539): arch=40000003 syscall=197 success=yes exit=0 a0=4 a1=bff6e4ac a2=4a7ff4 a3=9b2aab0 items=0 ppid=19336 pid=19337 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="mozilla-xremote" exe="/usr/lib/firefox-2.0/mozilla-xremote-client" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC_PATH msg=audit(1163795334.306:14539): path="/tmp/.gdm0UWNIT" type=AVC msg=audit(1163795334.414:14540): avc: denied { search } for pid=19340 comm="sed" name="locale" dev=dm-0 ino=10311858 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=dir type=SYSCALL msg=audit(1163795334.414:14540): arch=40000003 syscall=5 success=yes exit=3 a0=f34b60 a1=8000 a2=1 a3=bf940af0 items=0 ppid=19338 pid=19340 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="sed" exe="/bin/sed" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC msg=audit(1163795334.418:14541): avc: denied { getattr } for pid=19334 comm="firefox" name="en-US.jar" dev=dm-0 ino=10385588 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1163795334.418:14541): arch=40000003 syscall=195 success=yes exit=0 a0=87fb608 a1=bf8cb788 a2=6b2ff4 a3=87fbaa0 items=0 ppid=1 pid=19334 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox" exe="/bin/bash" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC_PATH msg=audit(1163795334.418:14541): path="/usr/lib/firefox-2.0/chrome/en-US.jar" type=AVC msg=audit(1163795334.418:14542): avc: denied { execute } for pid=19334 comm="firefox" name="firefox-bin" dev=dm-0 ino=10379247 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:mozilla_exec_t:s0 tclass=file type=AVC msg=audit(1163795334.418:14542): avc: denied { execute_no_trans } for pid=19334 comm="firefox" name="firefox-bin" dev=dm-0 ino=10379247 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:mozilla_exec_t:s0 tclass=file type=AVC msg=audit(1163795334.418:14542): avc: denied { read } for pid=19334 comm="firefox" name="firefox-bin" dev=dm-0 ino=10379247 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:mozilla_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163795334.418:14542): arch=40000003 syscall=11 success=yes exit=0 a0=87fbf10 a1=87fc900 a2=87fbbf8 a3=87fc900 items=0 ppid=1 pid=19334 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC_PATH msg=audit(1163795334.418:14542): path="/usr/lib/firefox-2.0/firefox-bin" type=AVC_PATH msg=audit(1163795334.418:14542): path="/usr/lib/firefox-2.0/firefox-bin" type=AVC msg=audit(1163795334.462:14543): avc: denied { getattr } for pid=19334 comm="firefox-bin" name="firefox-bin" dev=dm-0 ino=10379247 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:mozilla_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163795334.462:14543): arch=40000003 syscall=196 success=yes exit=0 a0=bfb12748 a1=bfb1223c a2=f10ff4 a3=bfb14750 items=0 ppid=1 pid=19334 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC_PATH msg=audit(1163795334.462:14543): path="/usr/lib/firefox-2.0/firefox-bin" type=AVC msg=audit(1163795338.318:14544): avc: denied { getattr } for pid=18600 comm="thunderbird-bin" name="localtime" dev=dm-0 ino=9331954 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1163795338.318:14544): arch=40000003 syscall=195 success=yes exit=0 a0=10fb5e0 a1=bfc60370 a2=1113ff4 a3=0 items=0 ppid=18595 pid=18600 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird-bin" exe="/usr/lib/thunderbird-1.5.0.7/thunderbird-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC_PATH msg=audit(1163795338.318:14544): path="/etc/localtime" type=AVC msg=audit(1163795354.383:14545): avc: denied { read } for pid=18600 comm="thunderbird-bin" name="en-US.jar" dev=dm-0 ino=10737661 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1163795354.383:14545): arch=40000003 syscall=5 success=yes exit=56 a0=a015638 a1=8000 a2=0 a3=8000 items=0 ppid=18595 pid=18600 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird-bin" exe="/usr/lib/thunderbird-1.5.0.7/thunderbird-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=USER_ACCT msg=audit(1163795401.162:14546): user pid=19347 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1163795401.162:14547): login pid=19347 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1163795401.162:14548): user pid=19347 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1163795401.162:14549): user pid=19347 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1163795401.170:14550): avc: denied { read } for pid=19348 comm="sadc" name="dev" dev=proc ino=-268434164 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=file type=SYSCALL msg=audit(1163795401.170:14550): arch=40000003 syscall=5 success=yes exit=3 a0=80502e1 a1=0 a2=1b6 a3=90c57f8 items=0 ppid=19347 pid=19348 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163795401.170:14551): avc: denied { getattr } for pid=19348 comm="sadc" name="dev" dev=proc ino=-268434164 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=file type=SYSCALL msg=audit(1163795401.170:14551): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bfa14b38 a2=3baff4 a3=90c57f8 items=0 ppid=19347 pid=19348 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163795401.170:14551): path="/proc/net/dev" type=CRED_DISP msg=audit(1163795401.178:14552): user pid=19347 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1163795401.182:14553): user pid=19347 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' selinux-python-3.0/sepolgen/tests/test_data/short.log000066400000000000000000000070551356774067000232000ustar00rootroot00000000000000type=AVC msg=audit(1162850331.422:978): avc: denied { ioctl } for pid=6314 comm="pam_timestamp_c" name="[96391]" dev=pipefs ino=96391 scontext=staff_u:staff_r:pam_t:s0 tcontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tclass=fifo_file type=SYSCALL msg=audit(1162850331.422:978): arch=40000003 syscall=54 success=no exit=-22 a0=2 a1=5401 a2=bfb6479c a3=bfb647dc items=0 ppid=6311 pid=6314 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=(none) comm="pam_timestamp_c" exe="/sbin/pam_timestamp_check" subj=staff_u:staff_r:pam_t:s0 key=(null) type=AVC_PATH msg=audit(1162850331.422:978): path="pipe:[96391]" type=AVC msg=audit(1162850332.318:979): avc: denied { read } for pid=6306 comm="beagled" name=".gdmDOM7HT" dev=dm-0 ino=14469552 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162850332.318:979): arch=40000003 syscall=33 success=yes exit=0 a0=bfdb2fde a1=4 a2=4db18a64 a3=bfdb2fde items=0 ppid=1 pid=6306 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="beagled" exe="/usr/bin/mono" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162850333.186:980): avc: denied { read } for pid=6306 comm="beagled" name="max_user_instances" dev=proc ino=-268435218 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=file type=SYSCALL msg=audit(1162850333.186:980): arch=40000003 syscall=5 success=yes exit=24 a0=11833c a1=0 a2=1 a3=8aeffb8 items=0 ppid=1 pid=6306 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="beagled" exe="/usr/bin/mono" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162850335.022:981): avc: denied { read write } for pid=6336 comm="clock-applet" name="bonobo-activation-register.lock" dev=dm-0 ino=5434689 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:user_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162850335.022:981): arch=40000003 syscall=5 success=yes exit=13 a0=9c0e840 a1=42 a2=1c0 a3=9c0e840 items=0 ppid=1 pid=6336 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="clock-applet" exe="/usr/libexec/clock-applet" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162850335.022:982): avc: denied { lock } for pid=6336 comm="clock-applet" name="bonobo-activation-register.lock" dev=dm-0 ino=5434689 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:user_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162850335.022:982): arch=40000003 syscall=221 success=yes exit=0 a0=d a1=7 a2=bf991e3c a3=bf991e3c items=0 ppid=1 pid=6336 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="clock-applet" exe="/usr/libexec/clock-applet" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1162850335.022:982): path="/tmp/orbit-kmacmill/bonobo-activation-register.lock" type=USER_AUTH msg=audit(1162850343.419:983): user pid=6377 uid=500 auid=500 subj=staff_u:staff_r:staff_su_t:s0 msg='PAM: authentication acct=root : exe="/bin/su" (hostname=?, addr=?, terminal=pts/1 res=success)' type=USER_ACCT msg=audit(1162850343.419:984): user pid=6377 uid=500 auid=500 subj=staff_u:staff_r:staff_su_t:s0 msg='PAM: accounting acct=root : exe="/bin/su" (hostname=?, addr=?, terminal=pts/1 res=success)' type=AVC msg=audit(1162850343.419:985): avc: denied { search } for pid=6377 comm="su" name="root" dev=dm-0 ino=13127137 scontext=staff_u:staff_r:staff_su_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir selinux-python-3.0/sepolgen/tests/test_interfaces.py000066400000000000000000000204351356774067000231170ustar00rootroot00000000000000# Authors: Karl MacMillan # # Copyright (C) 2006 Red Hat # see file 'COPYING' for use and warranty information # # This program is free software; you can redistribute it and/or # modify it under the terms of the GNU General Public License as # published by the Free Software Foundation; version 2 only # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program; if not, write to the Free Software # Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA # import unittest import sepolgen.access as access import sepolgen.interfaces as interfaces import sepolgen.policygen as policygen import sepolgen.refparser as refparser import sepolgen.refpolicy as refpolicy class TestParam(unittest.TestCase): def test(self): p = interfaces.Param() p.name = "$1" self.assertEqual(p.name, "$1") self.assertRaises(ValueError, p.set_name, "$N") self.assertEqual(p.num, 1) self.assertEqual(p.type, refpolicy.SRC_TYPE) class TestAVExtractPerms(unittest.TestCase): def test(self): av = access.AccessVector(['foo', 'bar', 'file', 'read']) params = { } ret = interfaces.av_extract_params(av, params) self.assertEqual(ret, 0) self.assertEqual(params, { }) av.src_type = "$1" ret = interfaces.av_extract_params(av, params) self.assertEqual(ret, 0) p = params["$1"] self.assertEqual(p.name, "$1") self.assertEqual(p.type, refpolicy.SRC_TYPE) self.assertEqual(p.obj_classes, refpolicy.IdSet(["file"])) params = { } av.tgt_type = "$1" av.obj_class = "process" ret = interfaces.av_extract_params(av, params) self.assertEqual(ret, 0) p = params["$1"] self.assertEqual(p.name, "$1") self.assertEqual(p.type, refpolicy.SRC_TYPE) self.assertEqual(p.obj_classes, refpolicy.IdSet(["process"])) params = { } av.tgt_type = "$1" av.obj_class = "dir" ret = interfaces.av_extract_params(av, params) self.assertEqual(ret, 1) p = params["$1"] self.assertEqual(p.name, "$1") self.assertEqual(p.type, refpolicy.SRC_TYPE) self.assertEqual(p.obj_classes, refpolicy.IdSet(["dir"])) av.src_type = "bar" av.tgt_type = "$2" av.obj_class = "dir" ret = interfaces.av_extract_params(av, params) self.assertEqual(ret, 0) p = params["$2"] self.assertEqual(p.name, "$2") self.assertEqual(p.type, refpolicy.TGT_TYPE) self.assertEqual(p.obj_classes, refpolicy.IdSet(["dir"])) interface_example = """ interface(`files_search_usr',` gen_require(` type usr_t; ') allow $1 usr_t:dir search; allow { domain $1 } { usr_t usr_home_t }:{ file dir } { read write getattr }; typeattribute $1 file_type; if (foo) { allow $1 foo:bar baz; } if (bar) { allow $1 foo:bar baz; } else { allow $1 foo:bar baz; } ') interface(`files_list_usr',` gen_require(` type usr_t; ') allow $1 usr_t:dir { read getattr }; optional_policy(` search_usr($1) ') tunable_policy(`foo',` whatever($1) ') ') interface(`files_exec_usr_files',` gen_require(` type usr_t; ') allow $1 usr_t:dir read; allow $1 usr_t:lnk_file { read getattr }; can_exec($1,usr_t) can_foo($1) ') """ simple_interface = """ interface(`foo',` gen_require(` type usr_t; ') allow $1 usr_t:dir { create add_name }; allow $1 usr_t:file { read write }; ') """ test_expansion = """ interface(`foo',` gen_require(` type usr_t; ') allow $1 usr_t:dir { create add_name }; allow $1 usr_t:file { read write }; ') interface(`map', ` gen_require(` type bar_t; ') allow $1 bar_t:file read; allow $2 bar_t:file write; foo($2) ') interface(`hard_map', ` gen_require(` type baz_t; ') allow $1 baz_t:file getattr; allow $2 baz_t:file read; allow $3 baz_t:file write; map($1, $2) map($2, $3) # This should have no effect foo($2) ') """ def compare_avsets(l, avs_b): avs_a = access.AccessVectorSet() avs_a.from_list(l) a = list(avs_a) b = list(avs_b) a.sort() b.sort() if len(a) != len(b): return False for av_a, av_b in zip(a, b): if av_a != av_b: return False return True class TestInterfaceSet(unittest.TestCase): def test_simple(self): h = refparser.parse(simple_interface) i = interfaces.InterfaceSet() i.add_headers(h) self.assertEqual(len(i.interfaces), 1) for key, interface in i.interfaces.items(): self.assertEqual(key, interface.name) self.assertEqual(key, "foo") self.assertEqual(len(interface.access), 2) # Check the access vectors comp_avs = [["$1", "usr_t", "dir", "create", "add_name"], ["$1", "usr_t", "file", "read", "write"]] ret = compare_avsets(comp_avs, interface.access) self.assertTrue(ret) # Check the params self.assertEqual(len(interface.params), 1) for param in interface.params.values(): self.assertEqual(param.type, refpolicy.SRC_TYPE) self.assertEqual(param.name, "$1") self.assertEqual(param.num, 1) self.assertEqual(param.required, True) def test_expansion(self): h = refparser.parse(test_expansion) i = interfaces.InterfaceSet() i.add_headers(h) self.assertEqual(len(i.interfaces), 3) for key, interface in i.interfaces.items(): self.assertEqual(key, interface.name) if key == "foo": comp_avs = [["$1", "usr_t", "dir", "create", "add_name"], ["$1", "usr_t", "file", "read", "write"]] self.assertTrue(compare_avsets(comp_avs, interface.access)) elif key == "map": comp_avs = [["$2", "usr_t", "dir", "create", "add_name"], ["$2", "usr_t", "file", "read", "write"], ["$1", "bar_t", "file", "read"], ["$2", "bar_t", "file", "write"]] self.assertTrue(compare_avsets(comp_avs, interface.access)) elif key == "hard_map": comp_avs = [["$1", "baz_t", "file", "getattr"], ["$2", "baz_t", "file", "read"], ["$3", "baz_t", "file", "write"], ["$2", "usr_t", "dir", "create", "add_name"], ["$2", "usr_t", "file", "read", "write"], ["$1", "bar_t", "file", "read"], ["$2", "bar_t", "file", "write"], ["$3", "usr_t", "dir", "create", "add_name"], ["$3", "usr_t", "file", "read", "write"], ["$2", "bar_t", "file", "read"], ["$3", "bar_t", "file", "write"]] self.assertTrue(compare_avsets(comp_avs, interface.access)) def test_export(self): h = refparser.parse(interface_example) i = interfaces.InterfaceSet() i.add_headers(h) f = open("output", "w") i.to_file(f) f.close() i2 = interfaces.InterfaceSet() f = open("output") i2.from_file(f) f.close() if_status = [False, False, False] for ifv in i2.interfaces.values(): if ifv.name == "files_search_usr": if_status[0] = True if ifv.name == "files_list_usr": if_status[1] = True if ifv.name == "files_exec_usr_files": if_status[2] = True self.assertEqual(if_status[0], True) self.assertEqual(if_status[1], True) self.assertEqual(if_status[2], True) selinux-python-3.0/sepolgen/tests/test_matching.py000066400000000000000000000065131356774067000225670ustar00rootroot00000000000000# Authors: Karl MacMillan # # Copyright (C) 2006 Red Hat # see file 'COPYING' for use and warranty information # # This program is free software; you can redistribute it and/or # modify it under the terms of the GNU General Public License as # published by the Free Software Foundation; version 2 only # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program; if not, write to the Free Software # Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA # import unittest import sepolgen.matching as matching import sepolgen.refparser as refparser import sepolgen.interfaces as interfaces import sepolgen.access as access class TestMatch(unittest.TestCase): def test(self): a = matching.Match() a.dist = 100 a.info_dir_change = True b = matching.Match() b.dist = 100 b.info_dir_change = True self.assertEqual(a, b) b.info_dir_change = False self.assertTrue((a > b)) self.assertTrue((b < a)) b.dist = 200 self.assertTrue((a < b)) self.assertTrue((b > a)) class TestMatchList(unittest.TestCase): def test_append(self): ml = matching.MatchList() ml.threshold = 100 a = matching.Match() a.dist = 100 ml.append(a) self.assertEqual(len(ml), 1) a = matching.Match() a.dist = 200 ml.append(a) self.assertEqual(len(ml), 2) self.assertEqual(len(ml.bastards), 1) ml.allow_info_dir_change = False a = matching.Match() a.dist = 0 a.info_dir_change = True ml.append(a) self.assertEqual(len(ml), 3) self.assertEqual(len(ml.bastards), 2) def test_sort(self): ml = matching.MatchList() ml.threshold = 100 a = matching.Match() a.dist = 100 ml.append(a) b = matching.Match() b.dist = 5 ml.append(b) c = matching.Match() c.dist = 0 ml.append(c) l = [c, b, a] ml.sort() for x, y in zip(l, ml): self.assertEqual(x, y) self.assertEqual(ml.best(), c) test_expansion = """ interface(`foo',` gen_require(` type usr_t; ') allow $1 usr_t:dir { create add_name }; allow $1 usr_t:file { read write }; ') interface(`map', ` gen_require(` type bar_t; ') allow $1 bar_t:file read; allow $2 bar_t:file write; foo($2) ') interface(`hard_map', ` gen_require(` type baz_t; ') allow $1 baz_t:file getattr; allow $2 baz_t:file read; allow $3 baz_t:file write; map($1, $2) map($2, $3) # This should have no effect foo($2) ') """ class AccessMatcher(unittest.TestCase): def test_search(self): h = refparser.parse(test_expansion) i = interfaces.InterfaceSet() i.add_headers(h) a = access.AccessVector(["foo_t", "usr_t", "dir", "create"]) m = matching.AccessMatcher() ml = matching.MatchList() ans = m.search_ifs(i, a, ml) pass selinux-python-3.0/sepolgen/tests/test_module.py000066400000000000000000000023741356774067000222630ustar00rootroot00000000000000# Authors: Karl MacMillan # # Copyright (C) 2006 Red Hat # see file 'COPYING' for use and warranty information # # This program is free software; you can redistribute it and/or # modify it under the terms of the GNU General Public License as # published by the Free Software Foundation; version 2 only # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program; if not, write to the Free Software # Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA # import unittest import sepolgen.module as module import os class TestModuleCompiler(unittest.TestCase): def test(self): package = "module_compile_test.pp" mc = module.ModuleCompiler() mc.create_module_package("module_compile_test.te", refpolicy=True) os.stat(package) os.unlink(package) mc.refpolicy = True mc.create_module_package("module_compile_test.te", refpolicy=False) os.stat(package) os.unlink(package) selinux-python-3.0/sepolgen/tests/test_objectmodel.py000066400000000000000000000032131356774067000232560ustar00rootroot00000000000000# Authors: Karl MacMillan # # Copyright (C) 2006 Red Hat # see file 'COPYING' for use and warranty information # # This program is free software; you can redistribute it and/or # modify it under the terms of the GNU General Public License as # published by the Free Software Foundation; version 2 only # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program; if not, write to the Free Software # Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA # import unittest import sepolgen.objectmodel class TestInfoFlow(unittest.TestCase): def test_from_file(self): info = sepolgen.objectmodel.PermMappings() fd = open("perm_map") info.from_file(fd) fd.close() pm = info.get("filesystem", "mount") self.assertEqual(pm.perm, "mount") self.assertEqual(pm.dir, sepolgen.objectmodel.FLOW_WRITE) self.assertEqual(pm.weight, 1) self.assertRaises(KeyError, info.get, "filesystem", "foo") pm = info.getdefault("filesystem", "foo") self.assertEqual(pm.perm, "foo") self.assertEqual(pm.dir, sepolgen.objectmodel.FLOW_BOTH) self.assertEqual(pm.weight, 5) pm = info.getdefault("foo", "bar") self.assertEqual(pm.perm, "bar") self.assertEqual(pm.dir, sepolgen.objectmodel.FLOW_BOTH) self.assertEqual(pm.weight, 5) selinux-python-3.0/sepolgen/tests/test_policygen.py000066400000000000000000000123301356774067000227600ustar00rootroot00000000000000# Authors: Karl MacMillan # # Copyright (C) 2006 Red Hat # see file 'COPYING' for use and warranty information # # This program is free software; you can redistribute it and/or # modify it under the terms of the GNU General Public License as # published by the Free Software Foundation; version 2 only # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program; if not, write to the Free Software # Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA # import unittest import sepolgen.policygen as policygen import sepolgen.access as access import sepolgen.refpolicy as refpolicy class TestPolicyGenerator(unittest.TestCase): def setUp(self): self.g = policygen.PolicyGenerator() def test_init(self): """ Test that extended permission AV rules are not generated by default. """ self.assertFalse(self.g.xperms) def test_set_gen_xperms(self): """ Test turning on and off generating of extended permission AV rules. """ self.g.set_gen_xperms(True) self.assertTrue(self.g.xperms) self.g.set_gen_xperms(False) self.assertFalse(self.g.xperms) def test_av_rules(self): """ Test generating of AV rules from access vectors. """ av1 = access.AccessVector(["test_src_t", "test_tgt_t", "file", "ioctl"]) av2 = access.AccessVector(["test_src_t", "test_tgt_t", "file", "open"]) av3 = access.AccessVector(["test_src_t", "test_tgt_t", "file", "read"]) avs = access.AccessVectorSet() avs.add_av(av1) avs.add_av(av2) avs.add_av(av3) self.g.add_access(avs) self.assertEqual(len(self.g.module.children), 1) r = self.g.module.children[0] self.assertIsInstance(r, refpolicy.AVRule) self.assertEqual(r.to_string(), "allow test_src_t test_tgt_t:file { ioctl open read };") def test_ext_av_rules(self): """ Test generating of extended permission AV rules from access vectors. """ self.g.set_gen_xperms(True) av1 = access.AccessVector(["test_src_t", "test_tgt_t", "file", "ioctl"]) av1.xperms['ioctl'] = refpolicy.XpermSet() av1.xperms['ioctl'].add(42) av2 = access.AccessVector(["test_src_t", "test_tgt_t", "file", "ioctl"]) av2.xperms['ioctl'] = refpolicy.XpermSet() av2.xperms['ioctl'].add(1234) av3 = access.AccessVector(["test_src_t", "test_tgt_t", "dir", "ioctl"]) av3.xperms['ioctl'] = refpolicy.XpermSet() av3.xperms['ioctl'].add(2345) avs = access.AccessVectorSet() avs.add_av(av1) avs.add_av(av2) avs.add_av(av3) self.g.add_access(avs) self.assertEqual(len(self.g.module.children), 4) # we cannot sort the rules, so find all rules manually av_rule1 = av_rule2 = av_ext_rule1 = av_ext_rule2 = None for r in self.g.module.children: if isinstance(r, refpolicy.AVRule): if 'file' in r.obj_classes: av_rule1 = r else: av_rule2 = r elif isinstance(r, refpolicy.AVExtRule): if 'file' in r.obj_classes: av_ext_rule1 = r else: av_ext_rule2 = r else: self.fail("Unexpected rule type '%s'" % type(r)) # check that all rules are present self.assertNotIn(None, (av_rule1, av_rule2, av_ext_rule1, av_ext_rule2)) self.assertEqual(av_rule1.rule_type, av_rule1.ALLOW) self.assertEqual(av_rule1.src_types, {"test_src_t"}) self.assertEqual(av_rule1.tgt_types, {"test_tgt_t"}) self.assertEqual(av_rule1.obj_classes, {"file"}) self.assertEqual(av_rule1.perms, {"ioctl"}) self.assertEqual(av_ext_rule1.rule_type, av_ext_rule1.ALLOWXPERM) self.assertEqual(av_ext_rule1.src_types, {"test_src_t"}) self.assertEqual(av_ext_rule1.tgt_types, {"test_tgt_t"}) self.assertEqual(av_ext_rule1.obj_classes, {"file"}) self.assertEqual(av_ext_rule1.operation, "ioctl") xp1 = refpolicy.XpermSet() xp1.add(42) xp1.add(1234) self.assertEqual(av_ext_rule1.xperms.ranges, xp1.ranges) self.assertEqual(av_rule2.rule_type, av_rule2.ALLOW) self.assertEqual(av_rule2.src_types, {"test_src_t"}) self.assertEqual(av_rule2.tgt_types, {"test_tgt_t"}) self.assertEqual(av_rule2.obj_classes, {"dir"}) self.assertEqual(av_rule2.perms, {"ioctl"}) self.assertEqual(av_ext_rule2.rule_type, av_ext_rule2.ALLOWXPERM) self.assertEqual(av_ext_rule2.src_types, {"test_src_t"}) self.assertEqual(av_ext_rule2.tgt_types, {"test_tgt_t"}) self.assertEqual(av_ext_rule2.obj_classes, {"dir"}) self.assertEqual(av_ext_rule2.operation, "ioctl") xp2 = refpolicy.XpermSet() xp2.add(2345) self.assertEqual(av_ext_rule2.xperms.ranges, xp2.ranges) selinux-python-3.0/sepolgen/tests/test_refparser.py000066400000000000000000000054451356774067000227710ustar00rootroot00000000000000# Authors: Karl MacMillan # # Copyright (C) 2006 Red Hat # see file 'COPYING' for use and warranty information # # This program is free software; you can redistribute it and/or # modify it under the terms of the GNU General Public License as # published by the Free Software Foundation; version 2 only # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program; if not, write to the Free Software # Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA # import unittest import sepolgen.refparser as refparser import sepolgen.refpolicy as refpolicy interface_example = """######################################## ## ## Search the content of /etc. ## ## ## ## Domain allowed access. ## ## # interface(`files_search_usr',` gen_require(` type usr_t; ') allow $1 usr_t:dir search; allow { domain $1 } { usr_t usr_home_t }:{ file dir } { read write getattr }; typeattribute $1 file_type; if (foo) { allow $1 foo:bar baz; } if (bar) { allow $1 foo:bar baz; } else { allow $1 foo:bar baz; } ') ######################################## ## ## List the contents of generic ## directories in /usr. ## ## ## ## Domain allowed access. ## ## # interface(`files_list_usr',` gen_require(` type usr_t; ') allow $1 usr_t:dir { read getattr }; optional_policy(` search_usr($1) ') tunable_policy(`foo',` whatever($1) ') ') ######################################## ## ## Execute generic programs in /usr in the caller domain. ## ## ## ## Domain allowed access. ## ## # interface(`files_exec_usr_files',` gen_require(` type usr_t; ') allow $1 usr_t:dir read; allow $1 usr_t:lnk_file { read getattr }; can_exec($1,usr_t) can_foo($1) ') """ class TestParser(unittest.TestCase): def test_interface_parsing(self): h = refparser.parse(interface_example) #print "" #refpolicy.print_tree(h) #self.assertEqual(len(h.interfaces), 3) name = "files_search_usr" #i = h.interfaces[name] #self.assertEqual(i.name, name) #self.assertEqual(len(i.rules), 1) #rule = i.rules[0] #self.assertTrue(isinstance(rule, refpolicy.AVRule)) selinux-python-3.0/sepolgen/tests/test_refpolicy.py000066400000000000000000000262771356774067000230020ustar00rootroot00000000000000# Authors: Karl MacMillan # # Copyright (C) 2006 Red Hat # see file 'COPYING' for use and warranty information # # This program is free software; you can redistribute it and/or # modify it under the terms of the GNU General Public License as # published by the Free Software Foundation; version 2 only # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program; if not, write to the Free Software # Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA # import unittest import sepolgen.refpolicy as refpolicy import sepolgen.access as access import selinux class TestIdSet(unittest.TestCase): def test_set_to_str(self): s = refpolicy.IdSet(["read", "write", "getattr"]) s = s.to_space_str().split(' ') s.sort() expected = "{ read write getattr }".split(' ') expected.sort() self.assertEqual(s, expected) s = refpolicy.IdSet() s.add("read") self.assertEqual(s.to_space_str(), "read") class TestXpermSet(unittest.TestCase): def test_init(self): """ Test that all attributes are correctly initialized. """ s1 = refpolicy.XpermSet() self.assertEqual(s1.complement, False) self.assertEqual(s1.ranges, []) s2 = refpolicy.XpermSet(True) self.assertEqual(s2.complement, True) self.assertEqual(s2.ranges, []) def test_normalize_ranges(self): """ Test that ranges that are overlapping or neighboring are correctly merged into one range. """ s = refpolicy.XpermSet() s.ranges = [(1, 7), (5, 10), (100, 110), (102, 107), (200, 205), (205, 210), (300, 305), (306, 310), (400, 405), (407, 410), (500, 502), (504, 508), (500, 510)] s._XpermSet__normalize_ranges() i = 0 r = list(sorted(s.ranges)) while i < len(r) - 1: # check that range low bound is less than equal than the upper bound self.assertLessEqual(r[i][0], r[i][1]) # check that two ranges are not overlapping or neighboring self.assertGreater(r[i + 1][0] - r[i][1], 1) i += 1 def test_add(self): """ Test adding new values or ranges to the set. """ s = refpolicy.XpermSet() s.add(1, 7) s.add(5, 10) s.add(42) self.assertEqual(s.ranges, [(1,10), (42,42)]) def test_extend(self): """ Test adding ranges from another XpermSet object. """ a = refpolicy.XpermSet() a.add(1, 7) b = refpolicy.XpermSet() b.add(5, 10) a.extend(b) self.assertEqual(a.ranges, [(1,10)]) def test_to_string(self): """ Test printing the values to a string. """ a = refpolicy.XpermSet() a.complement = False self.assertEqual(a.to_string(), "") a.complement = True self.assertEqual(a.to_string(), "") a.add(1234) self.assertEqual(a.to_string(), "~ 1234") a.complement = False self.assertEqual(a.to_string(), "1234") a.add(2345) self.assertEqual(a.to_string(), "{ 1234 2345 }") a.complement = True self.assertEqual(a.to_string(), "~ { 1234 2345 }") a.add(42,64) self.assertEqual(a.to_string(), "~ { 42-64 1234 2345 }") a.complement = False self.assertEqual(a.to_string(), "{ 42-64 1234 2345 }") class TestSecurityContext(unittest.TestCase): def test_init(self): sc = refpolicy.SecurityContext() sc = refpolicy.SecurityContext("user_u:object_r:foo_t") def test_from_string(self): context = "user_u:object_r:foo_t" sc = refpolicy.SecurityContext() sc.from_string(context) self.assertEqual(sc.user, "user_u") self.assertEqual(sc.role, "object_r") self.assertEqual(sc.type, "foo_t") self.assertEqual(sc.level, None) if selinux.is_selinux_mls_enabled(): self.assertEqual(str(sc), context + ":s0") else: self.assertEqual(str(sc), context) self.assertEqual(sc.to_string(default_level="s1"), context + ":s1") context = "user_u:object_r:foo_t:s0-s0:c0-c255" sc = refpolicy.SecurityContext() sc.from_string(context) self.assertEqual(sc.user, "user_u") self.assertEqual(sc.role, "object_r") self.assertEqual(sc.type, "foo_t") self.assertEqual(sc.level, "s0-s0:c0-c255") self.assertEqual(str(sc), context) self.assertEqual(sc.to_string(), context) sc = refpolicy.SecurityContext() self.assertRaises(ValueError, sc.from_string, "abc") def test_equal(self): sc1 = refpolicy.SecurityContext("user_u:object_r:foo_t") sc2 = refpolicy.SecurityContext("user_u:object_r:foo_t") sc3 = refpolicy.SecurityContext("user_u:object_r:foo_t:s0") sc4 = refpolicy.SecurityContext("user_u:object_r:bar_t") self.assertEqual(sc1, sc2) self.assertNotEqual(sc1, sc3) self.assertNotEqual(sc1, sc4) class TestObjecClass(unittest.TestCase): def test_init(self): o = refpolicy.ObjectClass(name="file") self.assertEqual(o.name, "file") self.assertTrue(isinstance(o.perms, set)) class TestAVRule(unittest.TestCase): def test_init(self): a = refpolicy.AVRule() self.assertEqual(a.rule_type, a.ALLOW) self.assertTrue(isinstance(a.src_types, set)) self.assertTrue(isinstance(a.tgt_types, set)) self.assertTrue(isinstance(a.obj_classes, set)) self.assertTrue(isinstance(a.perms, set)) def test_to_string(self): a = refpolicy.AVRule() a.src_types.add("foo_t") a.tgt_types.add("bar_t") a.obj_classes.add("file") a.perms.add("read") self.assertEqual(a.to_string(), "allow foo_t bar_t:file read;") a.rule_type = a.DONTAUDIT a.src_types.add("user_t") a.tgt_types.add("user_home_t") a.obj_classes.add("lnk_file") a.perms.add("write") # This test might need to go because set ordering is not guaranteed a = a.to_string().split(' ') a.sort() b = "dontaudit { foo_t user_t } { user_home_t bar_t }:{ lnk_file file } { read write };".split(' ') b.sort() self.assertEqual(a, b) class TestAVExtRule(unittest.TestCase): def test_init(self): """ Test initialization of attributes """ a = refpolicy.AVExtRule() self.assertEqual(a.rule_type, a.ALLOWXPERM) self.assertIsInstance(a.src_types, set) self.assertIsInstance(a.tgt_types, set) self.assertIsInstance(a.obj_classes, set) self.assertIsNone(a.operation) self.assertIsInstance(a.xperms, refpolicy.XpermSet) def test_rule_type_str(self): """ Test strings returned by __rule_type_str() """ a = refpolicy.AVExtRule() self.assertEqual(a._AVExtRule__rule_type_str(), "allowxperm") a.rule_type = a.ALLOWXPERM self.assertEqual(a._AVExtRule__rule_type_str(), "allowxperm") a.rule_type = a.DONTAUDITXPERM self.assertEqual(a._AVExtRule__rule_type_str(), "dontauditxperm") a.rule_type = a.NEVERALLOWXPERM self.assertEqual(a._AVExtRule__rule_type_str(), "neverallowxperm") a.rule_type = a.AUDITALLOWXPERM self.assertEqual(a._AVExtRule__rule_type_str(), "auditallowxperm") a.rule_type = 42 self.assertIsNone(a._AVExtRule__rule_type_str()) def test_from_av(self): """ Test creating the rule from an access vector. """ av = access.AccessVector(["foo", "bar", "file", "ioctl"]) xp = refpolicy.XpermSet() av.xperms = { "ioctl": xp } a = refpolicy.AVExtRule() a.from_av(av, "ioctl") self.assertEqual(a.src_types, {"foo"}) self.assertEqual(a.tgt_types, {"bar"}) self.assertEqual(a.obj_classes, {"file"}) self.assertEqual(a.operation, "ioctl") self.assertIs(a.xperms, xp) def test_from_av_self(self): """ Test creating the rule from an access vector that has same source and target context. """ av = access.AccessVector(["foo", "foo", "file", "ioctl"]) xp = refpolicy.XpermSet() av.xperms = { "ioctl": xp } a = refpolicy.AVExtRule() a.from_av(av, "ioctl") self.assertEqual(a.src_types, {"foo"}) self.assertEqual(a.tgt_types, {"self"}) self.assertEqual(a.obj_classes, {"file"}) self.assertEqual(a.operation, "ioctl") self.assertIs(a.xperms, xp) def test_to_string(self): """ Test printing the rule to a string. """ a = refpolicy.AVExtRule() a._AVExtRule__rule_type_str = lambda: "first" a.src_types.to_space_str = lambda: "second" a.tgt_types.to_space_str = lambda: "third" a.obj_classes.to_space_str = lambda: "fourth" a.operation = "fifth" a.xperms.to_string = lambda: "seventh" self.assertEqual(a.to_string(), "first second third:fourth fifth seventh;") class TestTypeRule(unittest.TestCase): def test_init(self): a = refpolicy.TypeRule() self.assertEqual(a.rule_type, a.TYPE_TRANSITION) self.assertTrue(isinstance(a.src_types, set)) self.assertTrue(isinstance(a.tgt_types, set)) self.assertTrue(isinstance(a.obj_classes, set)) self.assertEqual(a.dest_type, "") def test_to_string(self): a = refpolicy.TypeRule() a.src_types.add("foo_t") a.tgt_types.add("bar_exec_t") a.obj_classes.add("process") a.dest_type = "bar_t" self.assertEqual(a.to_string(), "type_transition foo_t bar_exec_t:process bar_t;") class TestParseNode(unittest.TestCase): def test_walktree(self): # Construct a small tree h = refpolicy.Headers() a = refpolicy.AVRule() a.src_types.add("foo_t") a.tgt_types.add("bar_t") a.obj_classes.add("file") a.perms.add("read") ifcall = refpolicy.InterfaceCall(ifname="allow_foobar") ifcall.args.append("foo_t") ifcall.args.append("{ file dir }") i = refpolicy.Interface(name="foo") i.children.append(a) i.children.append(ifcall) h.children.append(i) a = refpolicy.AVRule() a.rule_type = a.DONTAUDIT a.src_types.add("user_t") a.tgt_types.add("user_home_t") a.obj_classes.add("lnk_file") a.perms.add("write") i = refpolicy.Interface(name="bar") i.children.append(a) h.children.append(i) class TestHeaders(unittest.TestCase): def test_iter(self): h = refpolicy.Headers() h.children.append(refpolicy.Interface(name="foo")) h.children.append(refpolicy.Interface(name="bar")) h.children.append(refpolicy.ClassMap("file", "read write")) i = 0 for node in h: i += 1 self.assertEqual(i, 3) i = 0 for node in h.interfaces(): i += 1 self.assertEqual(i, 2) selinux-python-3.0/sepolicy/000077500000000000000000000000001356774067000162305ustar00rootroot00000000000000selinux-python-3.0/sepolicy/.gitignore000066400000000000000000000000201356774067000202100ustar00rootroot00000000000000build tmp *.bak selinux-python-3.0/sepolicy/Makefile000066400000000000000000000023031356774067000176660ustar00rootroot00000000000000PYTHON ?= python3 # Installation directories. LINGUAS ?= ru PREFIX ?= /usr BINDIR ?= $(PREFIX)/bin MANDIR ?= $(PREFIX)/share/man BASHCOMPLETIONDIR ?= $(PREFIX)/share/bash-completion/completions CFLAGS ?= -Wall -Werror -Wextra -W override CFLAGS += -DPACKAGE="policycoreutils" -DSHARED -shared BASHCOMPLETIONS=sepolicy-bash-completion.sh all: python-build python-build: $(PYTHON) setup.py build clean: $(PYTHON) setup.py clean -rm -rf build *~ \#* *pyc .#* sepolgen: ln -sf sepolicy sepolgen test: @$(PYTHON) test_sepolicy.py -v install: $(PYTHON) setup.py install --prefix=$(PREFIX) `test -n "$(DESTDIR)" && echo --root $(DESTDIR)` [ -d $(DESTDIR)$(BINDIR) ] || mkdir -p $(DESTDIR)$(BINDIR) install -m 755 sepolicy.py $(DESTDIR)$(BINDIR)/sepolicy (cd $(DESTDIR)$(BINDIR); ln -sf sepolicy sepolgen) -mkdir -p $(DESTDIR)$(MANDIR)/man8 install -m 644 *.8 $(DESTDIR)$(MANDIR)/man8 for lang in $(LINGUAS) ; do \ if [ -e $${lang} ] ; then \ mkdir -p $(DESTDIR)$(MANDIR)/$${lang}/man8 ; \ install -m 644 $${lang}/*.8 $(DESTDIR)$(MANDIR)/$${lang}/man8/ ; \ fi ; \ done -mkdir -p $(DESTDIR)$(BASHCOMPLETIONDIR) install -m 644 $(BASHCOMPLETIONS) $(DESTDIR)$(BASHCOMPLETIONDIR)/sepolicy relabel: selinux-python-3.0/sepolicy/ru/000077500000000000000000000000001356774067000166565ustar00rootroot00000000000000selinux-python-3.0/sepolicy/ru/sepolgen.8000066400000000000000000000000351356774067000205610ustar00rootroot00000000000000.so man8/sepolicy-generate.8 selinux-python-3.0/sepolicy/ru/sepolicy-booleans.8000066400000000000000000000024131356774067000223760ustar00rootroot00000000000000.TH "sepolicy-booleans" "8" "20121112" "" "" .SH "ИМЯ" sepolicy-booleans \- запросить описание логических переключателей из политики SELinux .SH "ОБЗОР" .br .B sepolicy booleans [\-h] [ \-a | \-b booleanname ... ] .SH "ОПИСАНИЕ" Утилита sepolicy booleans показывает все логические переключатели и их описание (либо можно вывести описание для отдельных логических переключателей) .SH "ПАРАМЕТРЫ" .TP .I \-h, \-\-help показать справочное сообщение .TP .I \-a, \-\-all показать все описания логических переключателей .TP .I \-b, \-\-boolean логический переключатель, для которого следует получить описание .SH "СМОТРИТЕ ТАКЖЕ" sepolicy(8), selinux(8), getsebool(8), setsebool(8) .SH "АВТОРЫ" Эта man-страница была написана Daniel Walsh . Перевод на русский язык выполнила Герасименко Олеся . selinux-python-3.0/sepolicy/ru/sepolicy-communicate.8000066400000000000000000000043351356774067000231050ustar00rootroot00000000000000.TH "sepolicy-communicate" "8" "20121005" "" "" .SH "ИМЯ" sepolicy-communicate \- создать отчёт, который покажет, могут ли связываться два домена политики SELinux .SH "ОБЗОР" .br .B sepolicy communicate [\-h] \-s SOURCE \-t TARGET [\-c TCLASS] [\-S SOURCEACCESS] [\-T TARGETACCESS] .SH "ОПИСАНИЕ" Команда sepolicy communicate позволяет проанализировать политику SELinux, чтобы узнать, может ли исходный домен SELinux связываться с целевым доменом SELinux. Команда по умолчанию проверяет, имеются ли какие-либо типы файлов, которые может записывать исходный домен и читать целевой домен. .SH "ПАРАМЕТРЫ" .TP .I \-c, \-\-class Указать класс SELinux, который исходный домен попытается использовать для связи с целевым доменом. По умолчанию: file. .TP .I \-h, \-\-help Показать справочное сообщение .TP .I \-s, \-\-source Указать тип исходного домена SELinux .TP .I \-S, \-\-sourceaccess Указать список доступов, используемых типом исходного домена SELinux для связи с целевым доменом. По умолчанию: Open, Write. .TP .I \-t, \-\-target Указать тип целевого домена SELinux .TP .I \-T, \-\-targetaccess Указать список доступов, используемых типом целевого домена SELinux для получения обращений от исходного домена. По умолчанию: Open, Read. .SH "СМОТРИТЕ ТАКЖЕ" sepolicy(8), selinux(8) .SH "АВТОРЫ" Эта man-страница была написана Daniel Walsh . Перевод на русский язык выполнила Герасименко Олеся . selinux-python-3.0/sepolicy/ru/sepolicy-generate.8000066400000000000000000000207321356774067000223720ustar00rootroot00000000000000.TH "sepolicy-generate" "8" "20121005" "" "" .SH "ИМЯ" sepolicy-generate \- создать исходный шаблон модуля политики SELinux. .SH "ОБЗОР" Общие параметры .B sepolicy generate [\-h ] [\-p PATH] .br Ограниченные приложения .br .B sepolicy generate \-\-application [\-n NAME] [\-u USER ]command [\-w WRITE_PATH ] .br .B sepolicy generate \-\-cgi [\-n NAME] command [\-w WRITE_PATH ] .br .B sepolicy generate \-\-dbus [\-n NAME] command [\-w WRITE_PATH ] .br .B sepolicy generate \-\-inetd [\-n NAME] command [\-w WRITE_PATH ] .br .B sepolicy generate \-\-init [\-n NAME] command [\-w WRITE_PATH ] Ограниченные пользователи .br .B sepolicy generate \-\-admin_user [\-r TRANSITION_ROLE] \-n NAME .br .B sepolicy generate \-\-confined_admin \-n NAME [\-a ADMIN_DOMAIN] [\-u USER] [\-n NAME] [\-w WRITE_PATH] .br .B sepolicy generate \-\-desktop_user \-n NAME [\-w WRITE_PATH] .br .B sepolicy generate \-\-term_user \-n NAME [\-w WRITE_PATH] .br .B sepolicy generate \-\-x_user \-n NAME [\-w WRITE_PATH] .br Разное .br .B sepolicy generate \-\-customize \-d DOMAIN \-n NAME [\-a ADMIN_DOMAIN] .br .B sepolicy generate \-\-newtype \-t type \-n NAME .br .B sepolicy generate \-\-sandbox \-n NAME .SH "ОПИСАНИЕ" Используйте команду \fBsepolicy generate\fP для создания модуля политики SELinux. .br \fBsepolicy generate\fP создаст 5 файлов. При указании \fBconfined application\fP необходимо указать путь. Команда \fBsepolicy generate\fP будет использовать полезную нагрузку rpm-пакета приложения вместе с \fBnm \-D APPLICATION\fP, чтобы создать типы и правила политики для ваших файлов политики. .B Файл принудительного назначения типов NAME.te .br Этот файл можно использовать, чтобы определить для конкретного домена все правила типов. .I Примечание: Политика, созданная с помощью команды \fBsepolicy generate\fP, автоматически добавит разрешительный домен (DOMAIN) в ваш файл .te. Когда вы закончите настройку политики, из файла .te будет необходимо удалить разрешительную строку, чтобы запустить домен в принудительном режиме. .B Файл интерфейсов NAME.if .br Этот файл определяет интерфейсы для созданных в файле .te типов, которые могут использоваться другими доменами политики. .B Контексты файлов NAME.fc .br Этот файл определяет контексты файлов по умолчанию для системы; он берёт типы файлов, созданные в файле .te, и связывает пути файлов с этими типами. Такие утилиты, как restorecon и RPM, будут использовать эти пути для проставления меток. .B Файл спецификации RPM NAME_selinux.spec .br Этот файл - файл СПЕЦИФИКАЦИИ, который можно использовать для установки политики SELinux на компьютеры и настройки проставления меток. Файл спецификации также устанавливает файл интерфейсов и man-страницу с описанием политики. Для создания man-страницы можно использовать команду \fBsepolicy manpage \-d NAME\fP. .B Файл оболочки NAME.sh .br Это вспомогательный сценарий оболочки для компиляции, установки и исправления меток в тестовой системе. Он также создаёт man-страницу на основе установленной политики, компилирует и собирает RPM, который подходит для установки на других компьютерах. Если создание возможно, эта утилита выведет на экран все пути создания из исходного домена в целевой домен .SH "ПАРАМЕТРЫ" .TP .I \-h, \-\-help Показать справочное сообщение .TP .I \-d, \-\-domain Ввести тип домена, который будет расширен .TP .I \-n, \-\-name Указать альтернативное имя политики. По умолчанию: указанный исполняемый файл или имя. .TP .I \-p, \-\-path Указать каталог для сохранения созданных файлов политики. По умолчанию: текущий рабочий каталог. Необязательные аргументы: .TP .I \-r, \-\-role Ввести роль (роли), в которую перейдёт этот администратор .TP .I \-t, \-\-type Ввести тип (типы), для которого создаётся новое определение и правило (правила) .TP .I \-u, \-\-user Пользователь (пользователи) SELinux, который перейдёт в этот домен .TP .I \-w, \-\-writepath Путь (пути), который требуется для записи ограниченным процессам .TP .I \-a, \-\-admin Домен (домены), который будет администрировать ограниченный администратор .TP .I \-\-admin_user Создать политику для роли авторизации администратора .TP .I \-\-application Создать политику для приложения пользователя .TP .I \-\-cgi Создать политику для веб-приложения/сценария (CGI) .TP .I \-\-confined_admin Создать политику для роли ограниченного администратора root .TP .I \-\-customize Создать политику для типа существующего домена .TP .I \-\-dbus Создать политику для системной внутренней службы DBUS .TP .I \-\-desktop_user Создать политику для роли авторизации на рабочем столе .TP .I \-\-inetd Создать политику для внутренней службы Интернет-служб .TP .I \-\-init Создать политику для стандартной внутренней службы init (по умолчанию) .TP .I \-\-newtype Создать политику для новых типов, которые будут добавлены в существующую политику. .TP .I \-\-sandbox Создать политику для изолированной среды .TP .I \-\-term_user Создать политику для минимальной роли авторизации пользователя терминала .TP .I \-\-x_user Создать политику для минимальной роли авторизации пользователя X Windows .SH "ПРИМЕР" .B > sepolicy generate --init /usr/sbin/rwhod .br Создание политики для /usr/sbin/rwhod с именем rwhod .br Созданы следующие файлы: .br rwhod.te # файл принудительного присвоения типов .br rwhod.if # файл интерфейсов .br rwhod.fc # файл контекстов файлов .br rwhod_selinux.spec # файл спецификации .br rwhod.sh # сценарий настройки .SH "СМОТРИТЕ ТАКЖЕ" sepolicy(8), selinux(8) .SH "АВТОРЫ" Эта man-страница была написана Daniel Walsh . Перевод на русский язык выполнила Герасименко Олеся . selinux-python-3.0/sepolicy/ru/sepolicy-gui.8000066400000000000000000000022271356774067000213630ustar00rootroot00000000000000.TH "sepolicy-gui" "8" "20121005" "" "" .SH "ИМЯ" sepolicy-gui \- графический интерфейс пользователя политики SELinux .SH "ОБЗОР" Общие параметры .B sepolicy gui [\-h ] [ \-d DOMAIN ] .br .SH "ОПИСАНИЕ" Используйте утилиту \fBsepolicy gui\fP для запуска графического интерфейса пользователя, с помощью которого можно посмотреть, как SELinux ограничивает различные домены процессов. .SH "ПАРАМЕТРЫ" .TP .I \-h, \-\-help Показать справочное сообщение .TP .I \-d, \-\-domain Инициализировать для выбранного домена графический интерфейс пользователя .SH "СМОТРИТЕ ТАКЖЕ" sepolicy(8), selinux(8) .SH "АВТОРЫ" Эта man-страница была написана Daniel Walsh . Перевод на русский язык выполнила Герасименко Олеся . selinux-python-3.0/sepolicy/ru/sepolicy-interface.8000066400000000000000000000033461356774067000225420ustar00rootroot00000000000000.TH "sepolicy-interface" "8" "20121222" "" "" .SH "ИМЯ" sepolicy-interface \- вывести сведения об интерфейсах на основе установленной политики SELinux .SH "ОБЗОР" .br .B sepolicy interface [\-h] [\-c] [\-v] [\-a | \-u | \-l | \-i INTERFACE [INTERFACE ... ]] .SH "ОПИСАНИЕ" Используйте утилиту sepolicy interface для вывода сведений об интерфейсах на основе политики SELinux. .SH "ПАРАМЕТРЫ" .TP .I \-a, \-\-list_admin Вывести список всех доменов с интерфейсом администратора .TP .I \-c, \-\-compile Проверить сборку интерфейсов .TP .I \-h, \-\-help Показать справочное сообщение .TP .I \-i, \-\-interface Интерфейс (интерфейсы), которые следует показать .TP .I \-l, \-\-list Вывести список всех интерфейсов .TP .I \-u, \-\-list_user Вывести список всех доменов с интерфейсом роли пользователя SELinux .TP .I \-v, \-\-verbose Показать расширенные сведения об интерфейсе, включая параметры и описание (если доступно). .SH "СМОТРИТЕ ТАКЖЕ" sepolicy(8), selinux(8) .SH "АВТОРЫ" Эта man-страница была написана Daniel Walsh . Перевод на русский язык выполнила Герасименко Олеся . selinux-python-3.0/sepolicy/ru/sepolicy-manpage.8000066400000000000000000000032171356774067000222070ustar00rootroot00000000000000.TH "sepolicy-manpage" "8" "20121005" "" "" .SH "ИМЯ" sepolicy-manpage \- создать man-страницу на основе установленной политики SELinux .SH "ОБЗОР" .br .B sepolicy manpage [\-w] [\-h] [\-p PATH ] [\-r ROOTDIR ] [\-a | \-d ] .SH "ОПИСАНИЕ" Используйте утилиту sepolicy manpage для создания man-страниц на основе политики SELinux. .SH "ПАРАМЕТРЫ" .TP .I \-a, \-\-all Создать man-страницы для всех доменов .TP .I \-d, \-\-domain Создать man-страницу для указанного домена. (Поддерживает несколько команд) .TP .I \-h, \-\-help Показать справочное сообщение .TP .I \-p, \-\-path Указать каталог для сохранения созданных man-страниц. (По умолчанию: /tmp) .TP .I \-r, \-\-root Указать альтернативный корневой каталог для создания man-страниц. (По умолчанию: /) .TP .I \-w, \-\-web Создать дополнительные man-страницы в формате HTML для указанного домена (доменов). .SH "СМОТРИТЕ ТАКЖЕ" sepolicy(8), selinux(8) .SH "АВТОРЫ" Эта man-страница была написана Daniel Walsh . Перевод на русский язык выполнила Герасименко Олеся . selinux-python-3.0/sepolicy/ru/sepolicy-network.8000066400000000000000000000054541356774067000222750ustar00rootroot00000000000000.TH "sepolicy-network" "8" "20121005" "" "" .SH "ИМЯ" sepolicy-network \- проанализировать политику SELinux и создать отчёт о сети .SH "ОБЗОР" .br .B sepolicy network [\-h] (\-l | \-a application [application ...] | \-p PORT [PORT ...] | \-t TYPE [TYPE ...] | \-d DOMAIN [DOMAIN ...]) .SH "ОПИСАНИЕ" Используйте команду sepolicy network для анализа политики SELinux и создания отчётов о сети. .SH "ПАРАМЕТРЫ" .TP .I \-a, \-\-application Создать отчёт с перечнем портов, к которым разрешено подключение и/или привязка указанного приложения инициализации. .TP .I \-d, \-\-domain Создать отчёт с перечнем портов, к которым разрешено подключение и/или привязка указанного домена. .TP .I \-l, \-\-list Вывести список всех типов сетевых портов, определённых в политике SELinux .TP .I \-h, \-\-help Показать справочное сообщение .TP .I \-t, \-\-type Создать отчёт с перечнем номеров портов, связанных с указанным типом портов SELinux. .TP .I \-p, \-\-port Создать отчёт с перечнем типов портов SELinux, связанных с указанным номером порта. .SH "ПРИМЕРЫ" .B sepolicy network -p 22 .br 22: tcp ssh_port_t 22 .br 22: udp reserved_port_t 1-511 .br 22: tcp reserved_port_t 1-511 .B sepolicy network -a /usr/sbin/sshd .br sshd_t: tcp name_connect .br 111 (portmap_port_t) .br 53 (dns_port_t) .br 88, 750, 4444 (kerberos_port_t) .br 9080 (ocsp_port_t) .br 9180, 9701, 9443-9447 (pki_ca_port_t) .br 32768-61000 (ephemeral_port_t) .br all ports < 1024 (reserved_port_type) .br all ports with out defined types (port_t) .br sshd_t: tcp name_bind .br 22 (ssh_port_t) .br 5900-5983, 5985-5999 (vnc_port_t) .br 6000-6020 (xserver_port_t) .br 32768-61000 (ephemeral_port_t) .br all ports > 500 and < 1024 (rpc_port_type) .br all ports with out defined types (port_t) .br sshd_t: udp name_bind .br 32768-61000 (ephemeral_port_t) .br all ports > 500 and < 1024 (rpc_port_type) .br all ports with out defined types (port_t) .SH "СМОТРИТЕ ТАКЖЕ" sepolicy(8), selinux(8), semanage(8) .SH "АВТОРЫ" Эта man-страница была написана Daniel Walsh . Перевод на русский язык выполнила Герасименко Олеся . selinux-python-3.0/sepolicy/ru/sepolicy-transition.8000066400000000000000000000032011356774067000227620ustar00rootroot00000000000000.TH "sepolicy-transition" "8" "20121005" "" "" .SH "ИМЯ" sepolicy-transition \- проанализировать политику SELinux и создать отчёт о переходах процессов .SH "ОБЗОР" .br .B sepolicy transition [\-h] \-s SOURCE .br .B sepolicy transition [\-h] \-s SOURCE \-t TARGET .SH "ОПИСАНИЕ" Утилита sepolicy transition покажет все домены, в которые может перейти указанный исходный домен SELinux, включая точку входа. Если указан целевой домен, команда sepolicy transition проанализирует политику на предмет наличия путей перехода из исходного домена в целевой домен и выведет список этих путей. Если переход возможен, эта утилита выведет все пути перехода из исходного домена в целевой домен. .SH "ПАРАМЕТРЫ" .TP .I \-h, \-\-help Показать справочное сообщение .TP .I \-s, \-\-source Указать тип исходного домена SELinux .TP .I \-t, \-\-target Указать тип целевого домена SELinux .SH "СМОТРИТЕ ТАКЖЕ" sepolicy(8), selinux(8) .SH "АВТОРЫ" Эта man-страница была написана Daniel Walsh . Перевод на русский язык выполнила Герасименко Олеся . selinux-python-3.0/sepolicy/ru/sepolicy.8000066400000000000000000000054171356774067000206050ustar00rootroot00000000000000.TH "sepolicy" "8" "20121005" "" "" .SH "ИМЯ" sepolicy \- утилита анализа политики SELinux .SH "ОБЗОР" .B sepolicy [-h] [-P policy_path ] {booleans,communicate,generate,interface,manpage,network,transition} OPTIONS .br Аргументы: .br .B booleans .br Отправить запрос к политике SELinux, чтобы просмотреть описание логических переключателей .B sepolicy-boolean(8) .br .B communicate .br Отправить запрос к политике SELinux, чтобы узнать, могут ли домены связываться друг с другом .B sepolicy-communicate(8) .br .B generate .br Создать шаблон модуля политики SELinux .B sepolicy-generate(8) .br .B gui .br Запустить графический интерфейс пользователя политики SELinux (требуется пакет policycoreutils-gui) .B sepolicy-gui(8) .br .B interface .br .br Вывести сведения интерфейса политики SELinux .B sepolicy-interface(8) .br .B manpage .br Создать man-страницы SELinux .B sepolicy-manpage(8) .br .B network .br Запросить сведения о сети политики SELinux .B sepolicy-network(8) .br .B transition .br Отправить запрос к политике SELinux, чтобы узнать, как исходный домен процесса может перейти в целевой домен процесса .B sepolicy-transition(8) .SH "ОПИСАНИЕ" sepolicy - это набор средств, опрашивающих установленную политику SELinux и создающих полезные отчёты, man-страницы или даже новые модули политики. Параметры и их описание доступны на man-страницах соответствующих аргументов. .SH "ПАРАМЕТРЫ" .TP .I \-P, \-\-policy Альтернативная политика для анализа. (По умолчанию: текущая установленная политика /sys/fs/selinux/policy) .TP .I \-h, \-\-help Показать справочное сообщение .SH "СМОТРИТЕ ТАКЖЕ" selinux(8), sepolicy-booleans(8), sepolicy-communicate(8), sepolicy-generate(8),sepolicy-gui(8), sepolicy-interface(8), sepolicy-network(8), sepolicy-manpage(8), sepolicy-transition(8) .SH "АВТОРЫ" Эта man-страница была написана Daniel Walsh . Перевод на русский язык выполнила Герасименко Олеся . selinux-python-3.0/sepolicy/sepolgen.8000066400000000000000000000000351356774067000201330ustar00rootroot00000000000000.so man8/sepolicy-generate.8 selinux-python-3.0/sepolicy/sepolicy-bash-completion.sh000066400000000000000000000176501356774067000235060ustar00rootroot00000000000000# This file is part of systemd. # # Copyright 2012-2013 Dan Walsh # # systemd is free software; you can redistribute it and/or modify it # under the terms of the GNU General Public License as published by # the Free Software Foundation; either version 2 of the License, or # (at your option) any later version. # # systemd is distributed in the hope that it will be useful, but # WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU # General Public License for more details. # # You should have received a copy of the GNU General Public License # along with systemd; If not, see . __contains_word () { local word=$1; shift for w in $*; do [[ $w = $word ]] && return 0; done return 1 } __get_all_paths () { dir -1 -F $* | grep '/' | cut -d'/' -f 1 } __get_all_ftypes () { echo '-- -d -c -b -s -l -p' } __get_all_networks () { seinfo -u 2> /dev/null | tail -n +3 } __get_all_booleans () { getsebool -a 2> /dev/null } __get_all_types () { seinfo -t 2> /dev/null | tail -n +3 } __get_all_admin_interaces () { awk '/InterfaceVector.*_admin /{ print $2 }' /var/lib/sepolgen/interface_info | awk -F '_admin' '{ print $1 }' } __get_all_user_role_interaces () { awk '/InterfaceVector.*_role /{ print $2 }' /var/lib/sepolgen/interface_info | awk -F '_role' '{ print $1 }' } __get_all_user_domains () { seinfo -auserdomain -x 2> /dev/null | tail -n +2 } __get_all_users () { seinfo -u 2> /dev/null | tail -n +2 } __get_all_classes () { seinfo -c 2> /dev/null | tail -n +2 } __get_all_port_types () { seinfo -aport_type -x 2> /dev/null | tail -n +2 } __get_all_domain_types () { seinfo -adomain -x 2> /dev/null | tail -n +2 } __get_all_domains () { seinfo -adomain -x 2>/dev/null | sed 's/_t$//g' } _sepolicy () { local command=${COMP_WORDS[1]} local cur=${COMP_WORDS[COMP_CWORD]} prev=${COMP_WORDS[COMP_CWORD-1]} local verb comps local -A VERBS=( [BOOLEANS]='booleans' [COMMUNICATE]='communicate' [GENERATE]='generate' [GUI]='gui' [INTERFACE]='interface' [MANPAGE]='manpage' [NETWORK]='network' [TRANSITION]='transition' ) COMMONOPTS='-P --policy -h --help' local -A OPTS=( [booleans]='-h --help -p --path -a -all -b --boolean' [communicate]='-h --help -s --source -t --target -c --class -S --sourceaccess -T --targetaccess' [generate]='-a --admin --admin_user --application --cgi --confined_admin --customize -d --domain --dbus --desktop_user -h --help --inetd --init -n --name --newtype -p --path --sandbox -T --test --term_user -u --user -w --writepath --x_user' [gui]='-h --help' [interface]='-h --help -a --list_admin -c --compile -i --interface -l --list -u --list_user -u --list_user -v --verbose' [manpage]='-h --help -p --path -a -all -o --os -d --domain -w --web -r --root' [network]='-h --help -d --domain -l --list -p --port -t --type ' [transition]='-h --help -s --source -t --target' ) for ((i=0; $i <= $COMP_CWORD; i++)); do if __contains_word "${COMP_WORDS[i]}" ${VERBS[*]} && ! __contains_word "${COMP_WORDS[i-1]}" ${OPTS[ARG}]}; then verb=${COMP_WORDS[i]} break fi done if [[ -z $verb ]]; then if [ "$prev" = "-P" -o "$prev" = "--policy" ]; then COMPREPLY=( $( compgen -f -- "$cur") ) compopt -o filenames return 0 else comps="${VERBS[*]} ${COMMONOPTS}" fi elif [ "$verb" = "booleans" ]; then if [ "$prev" = "-b" -o "$prev" = "--boolean" ]; then COMPREPLY=( $(compgen -W "$( __get_all_booleans ) " -- "$cur") ) return 0 fi COMPREPLY=( $(compgen -W '${OPTS[$verb]}' -- "$cur") ) return 0 elif [ "$verb" = "communicate" ]; then if [ "$prev" = "-s" -o "$prev" = "--source" -o "$prev" = "-t" -o "$prev" = "--target" ]; then COMPREPLY=( $(compgen -W "$( __get_all_domain_types ) " -- "$cur") ) return 0 elif [ "$prev" = "-c" -o "$prev" = "--class" ]; then COMPREPLY=( $(compgen -W "$( __get_all_classes ) " -- "$cur") ) return 0 fi COMPREPLY=( $(compgen -W '${OPTS[$verb]}' -- "$cur") ) return 0 elif [ "$verb" = "generate" ]; then if [ "$prev" = "--name" -o "$prev" = "-n" ]; then return 0 elif test "$prev" = "-p" || test "$prev" = "--path" ; then COMPREPLY=( $( compgen -d -- "$cur") ) compopt -o filenames return 0 elif test "$prev" = "-w" || test "$prev" = "--writepath" ; then COMPREPLY=( $( compgen -d -- "$cur") ) compopt -o filenames return 0 elif [ "$prev" = "--domain" -o "$prev" = "-d" ]; then COMPREPLY=( $(compgen -W "$( __get_all_domain_types ) " -- "$cur") ) return 0 elif [ "$prev" = "--newtype" ]; then COMPREPLY=( $(compgen -W "-n --name -t --type" -- "$cur") ) return 0 elif [ "$prev" = "--admin" -o "$prev" = "-a" ]; then COMPREPLY=( $(compgen -W "$( __get_all_admin_interaces ) " -- "$cur") ) return 0 elif [ "$prev" = "--user" -o "$prev" = "-u" ]; then COMPREPLY=( $(compgen -W "$( __get_all_users )" -- "$cur") ) return 0 elif [[ "$cur" == "$verb" || "$cur" == "" || "$cur" == -* ]]; then COMPREPLY=( $(compgen -W '${OPTS[$verb]}' -- "$cur") ) return 0 fi COMPREPLY=( $( compgen -f -- "$cur") ) compopt -o filenames return 0 elif [ "$verb" = "interface" ]; then COMPREPLY=( $(compgen -W '${OPTS[$verb]}' -- "$cur") ) return 0 elif [ "$verb" = "manpage" ]; then if [ "$prev" = "-d" -o "$prev" = "--domain" ]; then COMPREPLY=( $(compgen -W "$( __get_all_domains ) " -- "$cur") ) return 0 elif test "$prev" = "-r" || test "$prev" = "--root" ; then COMPREPLY=( $( compgen -d -- "$cur") ) compopt -o filenames return 0 elif [ "$prev" = "-o" -o "$prev" = "--os" ]; then return 0 elif test "$prev" = "-p" || test "$prev" = "--path" ; then COMPREPLY=( $( compgen -d -- "$cur") ) compopt -o filenames return 0 fi COMPREPLY=( $(compgen -W '${OPTS[$verb]}' -- "$cur") ) return 0 elif [ "$verb" = "network" ]; then if [ "$prev" = "-t" -o "$prev" = "--type" ]; then COMPREPLY=( $(compgen -W "$( __get_all_port_types )" -- "$cur") ) return 0 fi if [ "$prev" = "-d" -o "$prev" = "--domain" ]; then COMPREPLY=( $(compgen -W "$( __get_all_domain_types )" -- "$cur") ) return 0 fi COMPREPLY=( $(compgen -W '${OPTS[$verb]}' -- "$cur") ) return 0 elif [ "$verb" = "transition" ]; then if [ "$prev" = "-s" -o "$prev" = "--source" -o "$prev" = "-t" -o "$prev" = "--target" ]; then COMPREPLY=( $(compgen -W "$( __get_all_domain_types ) " -- "$cur") ) return 0 fi COMPREPLY=( $(compgen -W '${OPTS[$verb]}' -- "$cur") ) return 0 fi COMPREPLY=( $(compgen -W "$comps" -- "$cur") ) return 0 } complete -F _sepolicy sepolicy selinux-python-3.0/sepolicy/sepolicy-booleans.8000066400000000000000000000012721356774067000217520ustar00rootroot00000000000000.TH "sepolicy-booleans" "8" "20121112" "" "" .SH "NAME" sepolicy-booleans \- Query SELinux Policy to see description of booleans .SH "SYNOPSIS" .br .B sepolicy booleans [\-h] [ \-a | \-b booleanname ... ] .SH "DESCRIPTION" sepolicy booleans will show all booleans and their descriptions, or you can choose individual booleans to display .SH "OPTIONS" .TP .I \-h, \-\-help Display help message .TP .I \-a, \-\-all Display all boolean descriptions .TP .I \-b, \-\-boolean boolean to get description .SH "AUTHOR" This man page was written by Daniel Walsh .SH "SEE ALSO" sepolicy(8), selinux(8), getsebool(8), setsebool(8) selinux-python-3.0/sepolicy/sepolicy-communicate.8000066400000000000000000000026071356774067000224570ustar00rootroot00000000000000.TH "sepolicy-communicate" "8" "20121005" "" "" .SH "NAME" sepolicy-communicate \- Generate a report showing if two SELinux Policy Domains can communicate .SH "SYNOPSIS" .br .B sepolicy communicate [\-h] \-s SOURCE \-t TARGET [\-c TCLASS] [\-S SOURCEACCESS] [\-T TARGETACCESS] .SH "DESCRIPTION" Use sepolicy communicate to examine SELinux Policy to if a source SELinux Domain can communicate with a target SELinux Domain. The default command looks to see if there are any file types that the source domain can write, which the target domain can read. .SH "OPTIONS" .TP .I \-c, \-\-class Specify the SELinux class which the source domain will attempt to communicate with the target domain. (Default file) .TP .I \-h, \-\-help Display help message .TP .I \-s, \-\-source Specify the source SELinux domain type. .TP .I \-S, \-\-sourceaccess Specify the list of accesses used by the source SELinux domain type to communicate with the target domain. Default Open, Write. .TP .I \-t, \-\-target Specify the target SELinux domain type. .TP .I \-T, \-\-targetaccess Specify the list of accesses used by the target SELinux domain type to receive communications from the source domain. Default Open, Read. .SH "AUTHOR" This man page was written by Daniel Walsh .SH "SEE ALSO" sepolicy(8), selinux(8) selinux-python-3.0/sepolicy/sepolicy-generate.8000066400000000000000000000121731356774067000217440ustar00rootroot00000000000000.TH "sepolicy-generate" "8" "20121005" "" "" .SH "NAME" sepolicy-generate \- Generate an initial SELinux policy module template. .SH "SYNOPSIS" Common options .B sepolicy generate [\-h ] [\-p PATH] .br Confined Applications .br .B sepolicy generate \-\-application [\-n NAME] [\-u USER ]command [\-w WRITE_PATH ] .br .B sepolicy generate \-\-cgi [\-n NAME] command [\-w WRITE_PATH ] .br .B sepolicy generate \-\-dbus [\-n NAME] command [\-w WRITE_PATH ] .br .B sepolicy generate \-\-inetd [\-n NAME] command [\-w WRITE_PATH ] .br .B sepolicy generate \-\-init [\-n NAME] command [\-w WRITE_PATH ] Confined Users .br .B sepolicy generate \-\-admin_user [\-r TRANSITION_ROLE] \-n NAME .br .B sepolicy generate \-\-confined_admin \-n NAME [\-a ADMIN_DOMAIN] [\-u USER] [\-n NAME] [\-w WRITE_PATH] .br .B sepolicy generate \-\-desktop_user \-n NAME [\-w WRITE_PATH] .br .B sepolicy generate \-\-term_user \-n NAME [\-w WRITE_PATH] .br .B sepolicy generate \-\-x_user \-n NAME [\-w WRITE_PATH] .br Miscellaneous Policy .br .B sepolicy generate \-\-customize \-d DOMAIN \-n NAME [\-a ADMIN_DOMAIN] .br .B sepolicy generate \-\-newtype \-t type \-n NAME .br .B sepolicy generate \-\-sandbox \-n NAME .SH "DESCRIPTION" Use \fBsepolicy generate\fP to generate an SELinux policy Module. .br \fBsepolicy generate\fP will create 5 files. When specifying a \fBconfined application\fP you must specify a path. \fBsepolicy generate\fP will use the rpm payload of the application along with \fBnm \-D APPLICATION\fP to help it generate types and policy rules for your policy files. .B Type Enforcing File NAME.te .br This file can be used to define all the types rules for a particular domain. .I Note: Policy generated by \fBsepolicy generate\fP will automatically add a permissive DOMAIN to your te file. When you are satisfied that your policy works, you need to remove the permissive line from the te file to run your domain in enforcing mode. .B Interface File NAME.if .br This file defines the interfaces for the types generated in the te file, which can be used by other policy domains. .B File Context NAME.fc .br This file defines the default file context for the system, it takes the file types created in the te file and associates file paths to the types. Tools like restorecon and RPM will use these paths to put down labels. .B RPM Spec File NAME_selinux.spec .br This file is an RPM SPEC file that can be used to install the SELinux policy on to machines and setup the labeling. The spec file also installs the interface file and a man page describing the policy. You can use \fBsepolicy manpage \-d NAME\fP to generate the man page. .B Shell File NAME.sh .br This is a helper shell script to compile, install and fix the labeling on your test system. It will also generate a man page based on the installed policy, and compile and build an RPM suitable to be installed on other machines If a generate is possible, this tool will print out all generate paths from the source domain to the target domain .SH "OPTIONS" .TP .I \-h, \-\-help Display help message .TP .I \-d, \-\-domain Enter domain type(s) which you will be extending .TP .I \-n, \-\-name Specify alternate name of policy. The policy will default to the executable or name specified .TP .I \-p, \-\-path Specify the directory to store the created policy files. (Default to current working directory ) optional arguments: .TP .I \-r, \-\-role Enter role(s) to which this admin user will transition. .TP .I \-t, \-\-type Enter type(s) for which you will generate new definition and rule(s) .TP .I \-u, \-\-user SELinux user(s) which will transition to this domain .TP .I \-w, \-\-writepath Path(s) which the confined processes need to write .TP .I \-a, \-\-admin Domain(s) which the confined admin will administrate .TP .I \-\-admin_user Generate Policy for Administrator Login User Role .TP .I \-\-application Generate Policy for User Application .TP .I \-\-cgi Generate Policy for Web Application/Script (CGI) .TP .I \-\-confined_admin Generate Policy for Confined Root Administrator Role .TP .I \-\-customize Generate Policy for Existing Domain Type .TP .I \-\-dbus Generate Policy for DBUS System Daemon .TP .I \-\-desktop_user Generate Policy for Desktop Login User Role .TP .I \-\-inetd Generate Policy for Internet Services Daemon .TP .I \-\-init Generate Policy for Standard Init Daemon (Default) .TP .I \-\-newtype Generate new policy for new types to add to an existing policy. .TP .I \-\-sandbox Generate Policy for Sandbox .TP .I \-\-term_user Generate Policy for Minimal Terminal Login User Role .TP .I \-\-x_user Generate Policy for Minimal X Windows Login User Role .SH "EXAMPLE" .B > sepolicy generate --init /usr/sbin/rwhod .br Generating Policy for /usr/sbin/rwhod named rwhod .br Created the following files: .br rwhod.te # Type Enforcement file .br rwhod.if # Interface file .br rwhod.fc # File Contexts file .br rwhod_selinux.spec # Spec file .br rwhod.sh # Setup Script .SH "AUTHOR" This man page was written by Daniel Walsh .SH "SEE ALSO" sepolicy(8), selinux(8) selinux-python-3.0/sepolicy/sepolicy-gui.8000066400000000000000000000011421356774067000207300ustar00rootroot00000000000000.TH "sepolicy-gui" "8" "20121005" "" "" .SH "NAME" sepolicy-gui \- Graphical User Interface for SELinux policy. .SH "SYNOPSIS" Common options .B sepolicy gui [\-h ] [ \-d DOMAIN ] .br .SH "DESCRIPTION" Use \fBsepolicy gui\fP to run a the graphical user interface, which allows you to explore how SELinux confines different process domains. .SH "OPTIONS" .TP .I \-h, \-\-help Display help message .TP .I \-d, \-\-domain Initialize gui to the selected domain. .SH "AUTHOR" This man page was written by Daniel Walsh .SH "SEE ALSO" sepolicy(8), selinux(8) selinux-python-3.0/sepolicy/sepolicy-interface.8000066400000000000000000000020361356774067000221070ustar00rootroot00000000000000.TH "sepolicy-interface" "8" "20121222" "" "" .SH "NAME" sepolicy-interface \- Print interface information based on the installed SELinux Policy .SH "SYNOPSIS" .br .B sepolicy interface [\-h] [\-c] [\-v] [\-a | \-u | \-l | \-i INTERFACE [INTERFACE ... ]] .SH "DESCRIPTION" Use sepolicy interface to print interfaces information based on SELinux Policy. .SH "OPTIONS" .TP .I \-a, \-\-list_admin List all domains with admin interface .TP .I \-c, \-\-compile Test compile of interfaces .TP .I \-h, \-\-help Display help message .TP .I \-i, \-\-interface Interface(s) to be displayed .TP .I \-l, \-\-list List all interfaces .TP .I \-u, \-\-list_user List all domains with SELinux user role interface .TP .I \-v, \-\-verbose Display extended information about the interface including parameters and description if available. .SH "AUTHOR" This man page was written by Daniel Walsh .SH "SEE ALSO" sepolicy(8), selinux(8) selinux-python-3.0/sepolicy/sepolicy-manpage.8000066400000000000000000000020011356774067000215470ustar00rootroot00000000000000.TH "sepolicy-manpage" "8" "20121005" "" "" .SH "NAME" sepolicy-manpage \- Generate a man page based on the installed SELinux Policy .SH "SYNOPSIS" .br .B sepolicy manpage [\-w] [\-h] [\-p PATH ] [\-r ROOTDIR ] [\-a | \-d ] .SH "DESCRIPTION" Use sepolicy manpage to generate manpages based on SELinux Policy. .SH "OPTIONS" .TP .I \-a, \-\-all Generate Man Pages for All Domains .TP .I \-d, \-\-domain Generate a Man Page for the specified domain. (Supports multiple commands) .TP .I \-h, \-\-help Display help message .TP .I \-p, \-\-path Specify the directory to store the created man pages. (Default to /tmp) .TP .I \-r, \-\-root Specify alternate root directory to generate man pages from. (Default to /) .TP .I \-w, \-\-web Generate an additional HTML man pages for the specified domain(s). .SH "AUTHOR" This man page was written by Daniel Walsh .SH "SEE ALSO" sepolicy(8), selinux(8) selinux-python-3.0/sepolicy/sepolicy-network.8000066400000000000000000000041311356774067000216360ustar00rootroot00000000000000.TH "sepolicy-network" "8" "20121005" "" "" .SH "NAME" sepolicy-network \- Examine the SELinux Policy and generate a network report .SH "SYNOPSIS" .br .B sepolicy network [\-h] (\-l | \-a application [application ...] | \-p PORT [PORT ...] | \-t TYPE [TYPE ...] | \-d DOMAIN [DOMAIN ...]) .SH "DESCRIPTION" Use sepolicy network to examine SELinux Policy and generate network reports. .SH "OPTIONS" .TP .I \-a, \-\-application Generate a report listing the ports to which the specified init application is allowed to connect and or bind. .TP .I \-d, \-\-domain Generate a report listing the ports to which the specified domain is allowed to connect and or bind. .TP .I \-l, \-\-list List all Network Port Types defined in SELinux Policy .TP .I \-h, \-\-help Display help message .TP .I \-t, \-\-type Generate a report listing the port numbers associate with the specified SELinux port type. .TP .I \-p, \-\-port Generate a report listing the SELinux port types associate with the specified port number. .SH "EXAMPLES" .B sepolicy network -p 22 .br 22: tcp ssh_port_t 22 .br 22: udp reserved_port_t 1-511 .br 22: tcp reserved_port_t 1-511 .B sepolicy network -a /usr/sbin/sshd .br sshd_t: tcp name_connect .br 111 (portmap_port_t) .br 53 (dns_port_t) .br 88, 750, 4444 (kerberos_port_t) .br 9080 (ocsp_port_t) .br 9180, 9701, 9443-9447 (pki_ca_port_t) .br 32768-61000 (ephemeral_port_t) .br all ports < 1024 (reserved_port_type) .br all ports with out defined types (port_t) .br sshd_t: tcp name_bind .br 22 (ssh_port_t) .br 5900-5983, 5985-5999 (vnc_port_t) .br 6000-6020 (xserver_port_t) .br 32768-61000 (ephemeral_port_t) .br all ports > 500 and < 1024 (rpc_port_type) .br all ports with out defined types (port_t) .br sshd_t: udp name_bind .br 32768-61000 (ephemeral_port_t) .br all ports > 500 and < 1024 (rpc_port_type) .br all ports with out defined types (port_t) .SH "AUTHOR" This man page was written by Daniel Walsh .SH "SEE ALSO" sepolicy(8), selinux(8), semanage(8) selinux-python-3.0/sepolicy/sepolicy-transition.8000066400000000000000000000020231356774067000223350ustar00rootroot00000000000000.TH "sepolicy-transition" "8" "20121005" "" "" .SH "NAME" sepolicy-transition \- Examine the SELinux Policy and generate a process transition report .SH "SYNOPSIS" .br .B sepolicy transition [\-h] \-s SOURCE .br .B sepolicy transition [\-h] \-s SOURCE \-t TARGET .SH "DESCRIPTION" sepolicy transition will show all domains that a give SELinux source domain can transition to, including the entrypoint. If a target domain is given, sepolicy transition will examine policy for all transition paths from the source domain to the target domain, and will list the paths. If a transition is possible, this tool will print out all transition paths from the source domain to the target domain .SH "OPTIONS" .TP .I \-h, \-\-help Display help message .TP .I \-s, \-\-source Specify the source SELinux domain type. .TP .I \-t, \-\-target Specify the target SELinux domain type. .SH "AUTHOR" This man page was written by Daniel Walsh .SH "SEE ALSO" sepolicy(8), selinux(8) selinux-python-3.0/sepolicy/sepolicy.8000066400000000000000000000034041356774067000201510ustar00rootroot00000000000000.TH "sepolicy" "8" "20121005" "" "" .SH "NAME" sepolicy \- SELinux Policy Inspection tool .SH "SYNOPSIS" .B sepolicy [-h] [-P policy_path ] {booleans,communicate,generate,interface,manpage,network,transition} OPTIONS .br Arguments: .br .B booleans .br Query SELinux policy to see description of booleans .B sepolicy-boolean(8) .br .B communicate .br Query SELinux policy to see if domains can communicate with each other .B sepolicy-communicate(8) .br .B generate .br Generate SELinux Policy module template .B sepolicy-generate(8) .br .B gui .br Launch Graphical User Interface for SELinux Policy, requires policycoreutils-gui package. .B sepolicy-gui(8) .br .B interface .br .br Print SELinux Policy interface information .B sepolicy-interface(8) .br .B manpage .br Generate SELinux man pages .B sepolicy-manpage(8) .br .B network .br Query SELinux policy network information .B sepolicy-network(8) .br .B transition .br Query SELinux Policy to see how a source process domain can transition to the target process domain .B sepolicy-transition(8) .SH "DESCRIPTION" sepolicy is a tools set that will query the installed SELinux policy and generate useful reports, man pages, or even new policy modules. See the argument specific man pages for options and descriptions. .SH "OPTIONS" .TP .I \-P, \-\-policy Alternate policy to analyze. (Defaults to currently installed policy /sys/fs/selinux/policy) .TP .I \-h, \-\-help Display help message .SH "AUTHOR" This man page was written by Daniel Walsh .SH "SEE ALSO" selinux(8), sepolicy-booleans(8), sepolicy-communicate(8), sepolicy-generate(8),sepolicy-gui(8), sepolicy-interface(8), sepolicy-network(8), sepolicy-manpage(8), sepolicy-transition(8) selinux-python-3.0/sepolicy/sepolicy.py000077500000000000000000000713571356774067000204510ustar00rootroot00000000000000#!/usr/bin/python3 -Es # Copyright (C) 2012 Red Hat # AUTHOR: Dan Walsh # see file 'COPYING' for use and warranty information # # semanage is a tool for managing SELinux configuration files # # This program is free software; you can redistribute it and/or # modify it under the terms of the GNU General Public License as # published by the Free Software Foundation; either version 2 of # the License, or (at your option) any later version. # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program; if not, write to the Free Software # Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA # 02111-1307 USA # # import os import sys import selinux import sepolicy from multiprocessing import Pool from sepolicy import get_os_version, get_conditionals, get_conditionals_format_text import argparse PROGNAME = "policycoreutils" try: import gettext kwargs = {} if sys.version_info < (3,): kwargs['unicode'] = True gettext.install(PROGNAME, localedir="/usr/share/locale", codeset='utf-8', **kwargs) except: try: import builtins builtins.__dict__['_'] = str except ImportError: import __builtin__ __builtin__.__dict__['_'] = unicode usage = "sepolicy generate [-h] [-n NAME] [-p PATH] [" usage_dict = {' --newtype': ('-t [TYPES [TYPES ...]]',), ' --customize': ('-d DOMAIN', '-a ADMIN_DOMAIN', "[ -w WRITEPATHS ]",), ' --admin_user': ('[-r TRANSITION_ROLE ]', "[ -w WRITEPATHS ]",), ' --application': ('COMMAND', "[ -w WRITEPATHS ]",), ' --cgi': ('COMMAND', "[ -w WRITEPATHS ]",), ' --confined_admin': ('-a ADMIN_DOMAIN', "[ -w WRITEPATHS ]",), ' --dbus': ('COMMAND', "[ -w WRITEPATHS ]",), ' --desktop_user': ('', "[ -w WRITEPATHS ]",), ' --inetd': ('COMMAND', "[ -w WRITEPATHS ]",), ' --init': ('COMMAND', "[ -w WRITEPATHS ]",), ' --sandbox': ("[ -w WRITEPATHS ]",), ' --term_user': ("[ -w WRITEPATHS ]",), ' --x_user': ("[ -w WRITEPATHS ]",)} class CheckPath(argparse.Action): def __call__(self, parser, namespace, values, option_string=None): if not os.path.exists(values): raise ValueError("%s does not exist" % values) setattr(namespace, self.dest, values) class CheckType(argparse.Action): def __call__(self, parser, namespace, values, option_string=None): if isinstance(values, str): setattr(namespace, self.dest, values) else: newval = getattr(namespace, self.dest) if not newval: newval = [] for v in values: newval.append(v) setattr(namespace, self.dest, newval) class CheckBoolean(argparse.Action): def __call__(self, parser, namespace, values, option_string=None): booleans = sepolicy.get_all_booleans() newval = getattr(namespace, self.dest) if not newval: newval = [] if isinstance(values, str): v = selinux.selinux_boolean_sub(values) if v not in booleans: raise ValueError("%s must be an SELinux process domain:\nValid domains: %s" % (v, ", ".join(booleans))) newval.append(v) setattr(namespace, self.dest, newval) else: for value in values: v = selinux.selinux_boolean_sub(value) if v not in booleans: raise ValueError("%s must be an SELinux boolean:\nValid boolean: %s" % (v, ", ".join(booleans))) newval.append(v) setattr(namespace, self.dest, newval) class CheckDomain(argparse.Action): def __call__(self, parser, namespace, values, option_string=None): domains = sepolicy.get_all_domains() if isinstance(values, str): values = sepolicy.get_real_type_name(values) if values not in domains: raise ValueError("%s must be an SELinux process domain:\nValid domains: %s" % (values, ", ".join(domains))) setattr(namespace, self.dest, values) else: newval = getattr(namespace, self.dest) if not newval: newval = [] for v in values: v = sepolicy.get_real_type_name(v) if v not in domains: raise ValueError("%s must be an SELinux process domain:\nValid domains: %s" % (v, ", ".join(domains))) newval.append(v) setattr(namespace, self.dest, newval) all_classes = None class CheckClass(argparse.Action): def __call__(self, parser, namespace, values, option_string=None): global all_classes if not all_classes: all_classes = map(lambda x: x['name'], sepolicy.info(sepolicy.TCLASS)) if values not in all_classes: raise ValueError("%s must be an SELinux class:\nValid classes: %s" % (values, ", ".join(all_classes))) setattr(namespace, self.dest, values) class CheckAdmin(argparse.Action): def __call__(self, parser, namespace, values, option_string=None): from sepolicy.interface import get_admin newval = getattr(namespace, self.dest) if not newval: newval = [] admins = get_admin() if values not in admins: raise ValueError("%s must be an SELinux admin domain:\nValid admin domains: %s" % (values, ", ".join(admins))) newval.append(values) setattr(namespace, self.dest, newval) class CheckPort(argparse.Action): def __call__(self, parser, namespace, values, option_string=None): newval = getattr(namespace, self.dest) if not newval: newval = [] for v in values: if v < 1 or v > 65536: raise ValueError("%s must be an integer between 1 and 65536" % v) newval.append(v) setattr(namespace, self.dest, newval) class CheckPortType(argparse.Action): def __call__(self, parser, namespace, values, option_string=None): port_types = sepolicy.get_all_port_types() newval = getattr(namespace, self.dest) if not newval: newval = [] for v in values: v = sepolicy.get_real_type_name(v) if v not in port_types: raise ValueError("%s must be an SELinux port type:\nValid port types: %s" % (v, ", ".join(port_types))) newval.append(v) setattr(namespace, self.dest, newval) class LoadPolicy(argparse.Action): def __call__(self, parser, namespace, values, option_string=None): import sepolicy sepolicy.policy(values) setattr(namespace, self.dest, values) class CheckUser(argparse.Action): def __call__(self, parser, namespace, value, option_string=None): newval = getattr(namespace, self.dest) if not newval: newval = [] users = sepolicy.get_all_users() if value not in users: raise ValueError("%s must be an SELinux user:\nValid users: %s" % (value, ", ".join(users))) newval.append(value) setattr(namespace, self.dest, newval) class CheckRole(argparse.Action): def __call__(self, parser, namespace, value, option_string=None): newval = getattr(namespace, self.dest) if not newval: newval = [] roles = sepolicy.get_all_roles() if value not in roles: raise ValueError("%s must be an SELinux role:\nValid roles: %s" % (value, ", ".join(roles))) newval.append(value[:-2]) setattr(namespace, self.dest, newval) class InterfaceInfo(argparse.Action): def __call__(self, parser, namespace, values, option_string=None): from sepolicy.interface import get_interface_dict interface_dict = get_interface_dict() for v in values: if v not in interface_dict.keys(): raise ValueError(_("Interface %s does not exist.") % v) setattr(namespace, self.dest, values) def generate_custom_usage(usage_text, usage_dict): sorted_keys = [] for i in usage_dict.keys(): sorted_keys.append(i) sorted_keys.sort() for k in sorted_keys: usage_text += "%s %s |" % (k, (" ".join(usage_dict[k]))) usage_text = usage_text[:-1] + "]" usage_text = _(usage_text) return usage_text # expects formats: # "22 (sshd_t)", "80, 8080 (httpd_t)", "all ports (port_type)" def port_string_to_num(val): try: return int(val.split(" ")[0].split(",")[0].split("-")[0]) except: return 99999999 def _print_net(src, protocol, perm): import sepolicy.network portdict = sepolicy.network.get_network_connect(src, protocol, perm) if len(portdict) > 0: bold_start = "\033[1m" bold_end = "\033[0;0m" print("\n" + bold_start + "%s: %s %s" % (src, protocol, perm) + bold_end) port_strings = [] boolean_text = "" for p in portdict: for t, recs in portdict[p]: cond = get_conditionals(src, t, "%s_socket" % protocol, [perm]) if cond: boolean_text = get_conditionals_format_text(cond) port_strings.append("%s (%s) %s" % (", ".join(recs), t, boolean_text)) else: port_strings.append("%s (%s)" % (", ".join(recs), t)) port_strings.sort(key=lambda param: port_string_to_num(param)) for p in port_strings: print("\t" + p) def network(args): portrecs, portrecsbynum = sepolicy.gen_port_dict() all_ports = [] if args.list_ports: for i in portrecs: if i[0] not in all_ports: all_ports.append(i[0]) all_ports.sort() print("\n".join(all_ports)) for port in args.port: found = False for i in portrecsbynum: if i[0] <= port and port <= i[1]: if i[0] == i[1]: range = i[0] else: range = "%s-%s" % (i[0], i[1]) found = True print("%d: %s %s %s" % (port, i[2], portrecsbynum[i][0], range)) if not found: if port < 500: print("Undefined reserved port type") else: print("Undefined port type") for t in args.type: if (t, 'tcp') in portrecs.keys(): print("%s: tcp: %s" % (t, ",".join(portrecs[t, 'tcp']))) if (t, 'udp') in portrecs.keys(): print( "%s: udp: %s" % (t, ",".join(portrecs[t, 'udp']))) for a in args.applications: d = sepolicy.get_init_transtype(a) if d: args.domain.append(d) for d in args.domain: _print_net(d, "tcp", "name_connect") for net in ("tcp", "udp"): _print_net(d, net, "name_bind") def gui_run(args): try: import sepolicy.gui sepolicy.gui.SELinuxGui(args.domain, args.test) pass except ImportError: raise ValueError(_("You need to install policycoreutils-gui package to use the gui option")) def gen_gui_args(parser): gui = parser.add_parser("gui", help=_('Graphical User Interface for SELinux Policy')) gui.add_argument("-d", "--domain", default=None, action=CheckDomain, help=_("Domain name(s) of man pages to be created")) gui.add_argument("-t", "--test", default=False, action="store_true", help=argparse.SUPPRESS) gui.set_defaults(func=gui_run) def manpage_work(domain, path, root, source_files, web): from sepolicy.manpage import ManPage m = ManPage(domain, path, root, source_files, web) print(m.get_man_page_path()) def manpage(args): from sepolicy.manpage import HTMLManPages, manpage_domains, manpage_roles, gen_domains path = args.path if not args.policy and args.root != "/": sepolicy.policy(sepolicy.get_installed_policy(args.root)) if args.source_files and args.root == "/": raise ValueError(_("Alternative root needs to be setup")) if args.all: test_domains = gen_domains() else: test_domains = args.domain p = Pool() for domain in test_domains: p.apply_async(manpage_work, [domain, path, args.root, args.source_files, args.web]) p.close() p.join() if args.web: HTMLManPages(manpage_roles, manpage_domains, path, args.os) def gen_manpage_args(parser): man = parser.add_parser("manpage", help=_('Generate SELinux man pages')) man.add_argument("-p", "--path", dest="path", default="/tmp", help=_("path in which the generated SELinux man pages will be stored")) man.add_argument("-o", "--os", dest="os", default=get_os_version(), help=_("name of the OS for man pages")) man.add_argument("-w", "--web", dest="web", default=False, action="store_true", help=_("Generate HTML man pages structure for selected SELinux man page")) man.add_argument("-r", "--root", dest="root", default="/", help=_("Alternate root directory, defaults to /")) man.add_argument("--source_files", dest="source_files", default=False, action="store_true", help=_("With this flag, alternative root path needs to include file context files and policy.xml file")) group = man.add_mutually_exclusive_group(required=True) group.add_argument("-a", "--all", dest="all", default=False, action="store_true", help=_("All domains")) group.add_argument("-d", "--domain", nargs="+", action=CheckDomain, help=_("Domain name(s) of man pages to be created")) man.set_defaults(func=manpage) def gen_network_args(parser): net = parser.add_parser("network", help=_('Query SELinux policy network information')) group = net.add_mutually_exclusive_group(required=True) group.add_argument("-l", "--list", dest="list_ports", action="store_true", help=_("list all SELinux port types")) group.add_argument("-p", "--port", dest="port", default=[], action=CheckPort, nargs="+", type=int, help=_("show SELinux type related to the port")) group.add_argument("-t", "--type", dest="type", default=[], action=CheckPortType, nargs="+", help=_("Show ports defined for this SELinux type")) group.add_argument("-d", "--domain", dest="domain", default=[], action=CheckDomain, nargs="+", help=_("show ports to which this domain can bind and/or connect")) group.add_argument("-a", "--application", dest="applications", default=[], nargs="+", help=_("show ports to which this application can bind and/or connect")) net.set_defaults(func=network) def communicate(args): from sepolicy.communicate import get_types writable = get_types(args.source, args.tclass, args.sourceaccess.split(",")) readable = get_types(args.target, args.tclass, args.targetaccess.split(",")) out = list(set(writable) & set(readable)) for t in out: print(t) def gen_communicate_args(parser): comm = parser.add_parser("communicate", help=_('query SELinux policy to see if domains can communicate with each other')) comm.add_argument("-s", "--source", dest="source", action=CheckDomain, required=True, help=_("Source Domain")) comm.add_argument("-t", "--target", dest="target", action=CheckDomain, required=True, help=_("Target Domain")) comm.add_argument("-c", "--class", required=False, dest="tclass", action=CheckClass, default="file", help="class to use for communications, Default 'file'") comm.add_argument("-S", "--sourceaccess", required=False, dest="sourceaccess", default="open,write", help="comma separate list of permissions for the source type to use, Default 'open,write'") comm.add_argument("-T", "--targetaccess", required=False, dest="targetaccess", default="open,read", help="comma separated list of permissions for the target type to use, Default 'open,read'") comm.set_defaults(func=communicate) def booleans(args): from sepolicy import boolean_desc if args.all: rc, args.booleans = selinux.security_get_boolean_names() args.booleans.sort() for b in args.booleans: print("%s=_(\"%s\")" % (b, boolean_desc(b))) def gen_booleans_args(parser): bools = parser.add_parser("booleans", help=_('query SELinux Policy to see description of booleans')) group = bools.add_mutually_exclusive_group(required=True) group.add_argument("-a", "--all", dest="all", default=False, action="store_true", help=_("get all booleans descriptions")) group.add_argument("-b", "--boolean", dest="booleans", nargs="+", action=CheckBoolean, required=False, help=_("boolean to get description")) bools.set_defaults(func=booleans) def transition(args): from sepolicy.transition import setrans mytrans = setrans(args.source, args.target) mytrans.output() def gen_transition_args(parser): trans = parser.add_parser("transition", help=_('query SELinux Policy to see how a source process domain can transition to the target process domain')) trans.add_argument("-s", "--source", dest="source", action=CheckDomain, required=True, help=_("source process domain")) trans.add_argument("-t", "--target", dest="target", action=CheckDomain, help=_("target process domain")) trans.set_defaults(func=transition) def print_interfaces(interfaces, args, append=""): from sepolicy.interface import get_interface_format_text, interface_compile_test for i in interfaces: if args.verbose: try: print(get_interface_format_text(i + append)) except KeyError: print(i) if args.compile: try: interface_compile_test(i) except KeyError: print(i) else: print(i) def interface(args): from sepolicy.interface import get_admin, get_user, get_interface_dict, get_all_interfaces if args.list_admin: print_interfaces(get_admin(args.file), args, "_admin") if args.list_user: print_interfaces(get_user(args.file), args, "_role") if args.list: print_interfaces(get_all_interfaces(args.file), args) if args.interfaces: print_interfaces(args.interfaces, args) def generate(args): from sepolicy.generate import policy, AUSER, RUSER, EUSER, USERS, SANDBOX, APPLICATIONS, NEWTYPE cmd = None # numbers present POLTYPE defined in sepolicy.generate conflict_args = {'TYPES': (NEWTYPE,), 'DOMAIN': (EUSER,), 'ADMIN_DOMAIN': (AUSER, RUSER, EUSER,)} error_text = "" if args.policytype is None: generate_usage = generate_custom_usage(usage, usage_dict) for k in usage_dict: error_text += "%s" % (k) print(generate_usage) print(_("sepolicy generate: error: one of the arguments %s is required") % error_text) sys.exit(1) if args.policytype in APPLICATIONS: if not args.command: raise ValueError(_("Command required for this type of policy")) cmd = os.path.realpath(args.command) if not args.name: args.name = os.path.basename(cmd).replace("-", "_") mypolicy = policy(args.name, args.policytype) if cmd: mypolicy.set_program(cmd) if args.types: if args.policytype not in conflict_args['TYPES']: raise ValueError(_("-t option can not be used with '%s' domains. Read usage for more details.") % sepolicy.generate.poltype[args.policytype]) mypolicy.set_types(args.types) if args.domain: if args.policytype not in conflict_args['DOMAIN']: raise ValueError(_("-d option can not be used with '%s' domains. Read usage for more details.") % sepolicy.generate.poltype[args.policytype]) if args.admin_domain: if args.policytype not in conflict_args['ADMIN_DOMAIN']: raise ValueError(_("-a option can not be used with '%s' domains. Read usage for more details.") % sepolicy.generate.poltype[args.policytype]) if len(args.writepaths) > 0 and args.policytype == NEWTYPE: raise ValueError(_("-w option can not be used with the --newtype option")) for p in args.writepaths: if os.path.isdir(p): mypolicy.add_dir(p) else: mypolicy.add_file(p) mypolicy.set_transition_users(args.user) mypolicy.set_admin_roles(args.role) mypolicy.set_admin_domains(args.admin_domain) mypolicy.set_existing_domains(args.domain) if args.policytype in APPLICATIONS: mypolicy.gen_writeable() mypolicy.gen_symbols() print(mypolicy.generate(args.path)) def gen_interface_args(parser): itf = parser.add_parser("interface", help=_('List SELinux Policy interfaces')) itf.add_argument("-c", "--compile", dest="compile", action="store_true", default=False, help="Run compile test for selected interface") itf.add_argument("-v", "--verbose", dest="verbose", action="store_true", default=False, help="Show verbose information") itf.add_argument("-f", "--file", dest="file", help="Interface file") group = itf.add_mutually_exclusive_group(required=True) group.add_argument("-a", "--list_admin", dest="list_admin", action="store_true", default=False, help="List all domains with admin interface - DOMAIN_admin()") group.add_argument("-u", "--list_user", dest="list_user", action="store_true", default=False, help="List all domains with SELinux user role interface - DOMAIN_role()") group.add_argument("-l", "--list", dest="list", action="store_true", default=False, help="List all interfaces") group.add_argument("-i", "--interfaces", nargs="+", dest="interfaces", action=InterfaceInfo, help=_("Enter interface names, you wish to query")) itf.set_defaults(func=interface) def gen_generate_args(parser): from sepolicy.generate import get_poltype_desc, poltype, DAEMON, DBUS, INETD, CGI, SANDBOX, USER, EUSER, TUSER, XUSER, LUSER, AUSER, RUSER, NEWTYPE generate_usage = generate_custom_usage(usage, usage_dict) pol = parser.add_parser("generate", usage=generate_usage, help=_('Generate SELinux Policy module template')) pol.add_argument("-d", "--domain", dest="domain", default=[], action=CheckDomain, nargs="*", help=_("Enter domain type which you will be extending")) pol.add_argument("-u", "--user", dest="user", default=[], action=CheckUser, help=_("Enter SELinux user(s) which will transition to this domain")) pol.add_argument("-r", "--role", dest="role", default=[], action=CheckRole, help=_("Enter SELinux role(s) to which the administror domain will transition")) pol.add_argument("-a", "--admin", dest="admin_domain", default=[], action=CheckAdmin, help=_("Enter domain(s) which this confined admin will administrate")) pol.add_argument("-n", "--name", dest="name", default=None, help=_("name of policy to generate")) pol.add_argument("-T", "--test", dest="test", default=False, action="store_true", help=argparse.SUPPRESS) pol.add_argument("-t", "--type", dest="types", default=[], nargs="*", action=CheckType, help="Enter type(s) for which you will generate new definition and rule(s)") pol.add_argument("-p", "--path", dest="path", default=os.getcwd(), help=_("path in which the generated policy files will be stored")) pol.add_argument("-w", "--writepath", dest="writepaths", nargs="*", default=[], help=_("path to which the confined processes will need to write")) cmdtype = pol.add_argument_group(_("Policy types which require a command")) cmdgroup = cmdtype.add_mutually_exclusive_group(required=False) cmdgroup.add_argument("--application", dest="policytype", const=USER, action="store_const", help=_("Generate '%s' policy") % poltype[USER]) cmdgroup.add_argument("--cgi", dest="policytype", const=CGI, action="store_const", help=_("Generate '%s' policy") % poltype[CGI]) cmdgroup.add_argument("--dbus", dest="policytype", const=DBUS, action="store_const", help=_("Generate '%s' policy") % poltype[DBUS]) cmdgroup.add_argument("--inetd", dest="policytype", const=INETD, action="store_const", help=_("Generate '%s' policy") % poltype[INETD]) cmdgroup.add_argument("--init", dest="policytype", const=DAEMON, action="store_const", default=DAEMON, help=_("Generate '%s' policy") % poltype[DAEMON]) type = pol.add_argument_group("Policy types which do not require a command") group = type.add_mutually_exclusive_group(required=False) group.add_argument("--admin_user", dest="policytype", const=AUSER, action="store_const", help=_("Generate '%s' policy") % poltype[AUSER]) group.add_argument("--confined_admin", dest="policytype", const=RUSER, action="store_const", help=_("Generate '%s' policy") % poltype[RUSER]) group.add_argument("--customize", dest="policytype", const=EUSER, action="store_const", help=_("Generate '%s' policy") % poltype[EUSER]) group.add_argument("--desktop_user", dest="policytype", const=LUSER, action="store_const", help=_("Generate '%s' policy ") % poltype[LUSER]) group.add_argument("--newtype", dest="policytype", const=NEWTYPE, action="store_const", help=_("Generate '%s' policy") % poltype[NEWTYPE]) group.add_argument("--sandbox", dest="policytype", const=SANDBOX, action="store_const", help=_("Generate '%s' policy") % poltype[SANDBOX]) group.add_argument("--term_user", dest="policytype", const=TUSER, action="store_const", help=_("Generate '%s' policy") % poltype[TUSER]) group.add_argument("--x_user", dest="policytype", const=XUSER, action="store_const", help=_("Generate '%s' policy") % poltype[XUSER]) pol.add_argument("command", nargs="?", default=None, help=_("executable to confine")) pol.set_defaults(func=generate) if __name__ == '__main__': parser = argparse.ArgumentParser(description='SELinux Policy Inspection Tool') subparsers = parser.add_subparsers(help=_("commands")) parser.add_argument("-P", "--policy", dest="policy", action=LoadPolicy, default=None, help=_("Alternate SELinux policy, defaults to /sys/fs/selinux/policy")) gen_booleans_args(subparsers) gen_communicate_args(subparsers) gen_generate_args(subparsers) gen_gui_args(subparsers) gen_interface_args(subparsers) gen_manpage_args(subparsers) gen_network_args(subparsers) gen_transition_args(subparsers) try: if os.path.basename(sys.argv[0]) == "sepolgen": parser_args = [ "generate" ] + sys.argv[1:] elif len(sys.argv) > 1: parser_args = sys.argv[1:] else: parser_args = ["-h"] args = parser.parse_args(args=parser_args) args.func(args) sys.exit(0) except ValueError as e: sys.stderr.write("%s: %s\n" % (e.__class__.__name__, str(e))) sys.exit(1) except IOError as e: sys.stderr.write("%s: %s\n" % (e.__class__.__name__, str(e))) sys.exit(1) except KeyboardInterrupt: print("Out") sys.exit(0) selinux-python-3.0/sepolicy/sepolicy/000077500000000000000000000000001356774067000200575ustar00rootroot00000000000000selinux-python-3.0/sepolicy/sepolicy/__init__.py000066400000000000000000001107741356774067000222020ustar00rootroot00000000000000# Author: Dan Walsh # Author: Ryan Hallisey # Author: Jason Zaman import errno import selinux import setools import glob import sepolgen.defaults as defaults import sepolgen.interfaces as interfaces import sys import os import re import gzip PROGNAME = "policycoreutils" try: import gettext kwargs = {} if sys.version_info < (3,): kwargs['unicode'] = True gettext.install(PROGNAME, localedir="/usr/share/locale", codeset='utf-8', **kwargs) except: try: import builtins builtins.__dict__['_'] = str except ImportError: import __builtin__ __builtin__.__dict__['_'] = unicode TYPE = 1 ROLE = 2 ATTRIBUTE = 3 PORT = 4 USER = 5 BOOLEAN = 6 TCLASS = 7 ALLOW = 'allow' AUDITALLOW = 'auditallow' NEVERALLOW = 'neverallow' DONTAUDIT = 'dontaudit' SOURCE = 'source' TARGET = 'target' PERMS = 'permlist' CLASS = 'class' TRANSITION = 'transition' ROLE_ALLOW = 'role_allow' # Autofill for adding files ************************* DEFAULT_DIRS = {} DEFAULT_DIRS["/etc"] = "etc_t" DEFAULT_DIRS["/tmp"] = "tmp_t" DEFAULT_DIRS["/usr/lib/systemd/system"] = "unit_file_t" DEFAULT_DIRS["/lib/systemd/system"] = "unit_file_t" DEFAULT_DIRS["/etc/systemd/system"] = "unit_file_t" DEFAULT_DIRS["/var/cache"] = "var_cache_t" DEFAULT_DIRS["/var/lib"] = "var_lib_t" DEFAULT_DIRS["/var/log"] = "log_t" DEFAULT_DIRS["/var/run"] = "var_run_t" DEFAULT_DIRS["/run"] = "var_run_t" DEFAULT_DIRS["/run/lock"] = "var_lock_t" DEFAULT_DIRS["/var/run/lock"] = "var_lock_t" DEFAULT_DIRS["/var/spool"] = "var_spool_t" DEFAULT_DIRS["/var/www"] = "content_t" file_type_str = {} file_type_str["a"] = _("all files") file_type_str["f"] = _("regular file") file_type_str["d"] = _("directory") file_type_str["c"] = _("character device") file_type_str["b"] = _("block device") file_type_str["s"] = _("socket file") file_type_str["l"] = _("symbolic link") file_type_str["p"] = _("named pipe") trans_file_type_str = {} trans_file_type_str[""] = "a" trans_file_type_str["--"] = "f" trans_file_type_str["-d"] = "d" trans_file_type_str["-c"] = "c" trans_file_type_str["-b"] = "b" trans_file_type_str["-s"] = "s" trans_file_type_str["-l"] = "l" trans_file_type_str["-p"] = "p" # the setools policy handle _pol = None # cache the lookup results file_equiv_modified = None file_equiv = None local_files = None fcdict = None methods = [] all_types = None all_types_info = None user_types = None role_allows = None portrecs = None portrecsbynum = None all_domains = None roles = None selinux_user_list = None login_mappings = None file_types = None port_types = None bools = None all_attributes = None booleans = None booleans_dict = None all_allow_rules = None all_transitions = None def policy_sortkey(policy_path): # Parse the extension of a policy path which looks like .../policy/policy.31 extension = policy_path.rsplit('/policy.', 1)[1] try: return int(extension), policy_path except ValueError: # Fallback with sorting on the full path return 0, policy_path def get_installed_policy(root="/"): try: path = root + selinux.selinux_binary_policy_path() policies = glob.glob("%s.*" % path) policies.sort(key=policy_sortkey) return policies[-1] except: pass raise ValueError(_("No SELinux Policy installed")) def get_store_policy(store): """Get the path to the policy file located in the given store name""" policies = glob.glob("%s%s/policy/policy.*" % (selinux.selinux_path(), store)) if not policies: return None # Return the policy with the higher version number policies.sort(key=policy_sortkey) return policies[-1] def policy(policy_file): global all_domains global all_attributes global bools global all_types global role_allows global users global roles global file_types global port_types all_domains = None all_attributes = None bools = None all_types = None role_allows = None users = None roles = None file_types = None port_types = None global _pol try: _pol = setools.SELinuxPolicy(policy_file) except: raise ValueError(_("Failed to read %s policy file") % policy_file) def load_store_policy(store): policy_file = get_store_policy(store) if not policy_file: return None policy(policy_file) try: policy_file = get_installed_policy() policy(policy_file) except ValueError as e: if selinux.is_selinux_enabled() == 1: raise e def info(setype, name=None): if setype == TYPE: q = setools.TypeQuery(_pol) q.name = name results = list(q.results()) if name and len(results) < 1: # type not found, try alias q.name = None q.alias = name results = list(q.results()) return ({ 'aliases': list(map(str, x.aliases())), 'name': str(x), 'permissive': bool(x.ispermissive), 'attributes': list(map(str, x.attributes())) } for x in results) elif setype == ROLE: q = setools.RoleQuery(_pol) if name: q.name = name return ({ 'name': str(x), 'roles': list(map(str, x.expand())), 'types': list(map(str, x.types())), } for x in q.results()) elif setype == ATTRIBUTE: q = setools.TypeAttributeQuery(_pol) if name: q.name = name return ({ 'name': str(x), 'types': list(map(str, x.expand())), } for x in q.results()) elif setype == PORT: q = setools.PortconQuery(_pol) if name: ports = [int(i) for i in name.split("-")] if len(ports) == 2: q.ports = ports elif len(ports) == 1: q.ports = (ports[0], ports[0]) if _pol.mls: return ({ 'high': x.ports.high, 'protocol': str(x.protocol), 'range': str(x.context.range_), 'type': str(x.context.type_), 'low': x.ports.low, } for x in q.results()) return ({ 'high': x.ports.high, 'protocol': str(x.protocol), 'type': str(x.context.type_), 'low': x.ports.low, } for x in q.results()) elif setype == USER: q = setools.UserQuery(_pol) if name: q.name = name if _pol.mls: return ({ 'range': str(x.mls_range), 'name': str(x), 'roles': list(map(str, x.roles)), 'level': str(x.mls_level), } for x in q.results()) return ({ 'name': str(x), 'roles': list(map(str, x.roles)), } for x in q.results()) elif setype == BOOLEAN: q = setools.BoolQuery(_pol) if name: q.name = name return ({ 'name': str(x), 'state': x.state, } for x in q.results()) elif setype == TCLASS: q = setools.ObjClassQuery(_pol) if name: q.name = name return ({ 'name': str(x), 'permlist': list(x.perms), } for x in q.results()) else: raise ValueError("Invalid type") def _setools_rule_to_dict(rule): d = { 'type': str(rule.ruletype), 'source': str(rule.source), 'target': str(rule.target), 'class': str(rule.tclass), } # Evaluate boolean expression associated with given rule (if there is any) try: # Get state of all booleans in the conditional expression boolstate = {} for boolean in rule.conditional.booleans: boolstate[str(boolean)] = boolean.state # evaluate if the rule is enabled enabled = rule.conditional.evaluate(**boolstate) == rule.conditional_block except AttributeError: # non-conditional rules are always enabled enabled = True d['enabled'] = enabled try: d['permlist'] = list(map(str, rule.perms)) except AttributeError: pass try: d['transtype'] = str(rule.default) except AttributeError: pass try: d['boolean'] = [(str(rule.conditional), enabled)] except AttributeError: pass try: d['filename'] = rule.filename except AttributeError: pass return d def search(types, seinfo=None): if not seinfo: seinfo = {} valid_types = set([ALLOW, AUDITALLOW, NEVERALLOW, DONTAUDIT, TRANSITION, ROLE_ALLOW]) for setype in types: if setype not in valid_types: raise ValueError("Type has to be in %s" % " ".join(valid_types)) source = None if SOURCE in seinfo: source = str(seinfo[SOURCE]) target = None if TARGET in seinfo: target = str(seinfo[TARGET]) tclass = None if CLASS in seinfo: tclass = str(seinfo[CLASS]).split(',') toret = [] tertypes = [] if ALLOW in types: tertypes.append(ALLOW) if NEVERALLOW in types: tertypes.append(NEVERALLOW) if AUDITALLOW in types: tertypes.append(AUDITALLOW) if DONTAUDIT in types: tertypes.append(DONTAUDIT) if len(tertypes) > 0: q = setools.TERuleQuery(_pol, ruletype=tertypes, source=source, target=target, tclass=tclass) if PERMS in seinfo: q.perms = seinfo[PERMS] toret += [_setools_rule_to_dict(x) for x in q.results()] if TRANSITION in types: rtypes = ['type_transition', 'type_change', 'type_member'] q = setools.TERuleQuery(_pol, ruletype=rtypes, source=source, target=target, tclass=tclass) if PERMS in seinfo: q.perms = seinfo[PERMS] toret += [_setools_rule_to_dict(x) for x in q.results()] if ROLE_ALLOW in types: ratypes = ['allow'] q = setools.RBACRuleQuery(_pol, ruletype=ratypes, source=source, target=target, tclass=tclass) for r in q.results(): toret.append({'source': str(r.source), 'target': str(r.target)}) return toret def get_conditionals(src, dest, tclass, perm): tdict = {} tlist = [] src_list = [src] dest_list = [dest] # add assigned attributes try: src_list += list(filter(lambda x: x['name'] == src, get_all_types_info()))[0]['attributes'] except: pass try: dest_list += list(filter(lambda x: x['name'] == dest, get_all_types_info()))[0]['attributes'] except: pass allows = map(lambda y: y, filter(lambda x: x['source'] in src_list and x['target'] in dest_list and set(perm).issubset(x[PERMS]) and 'boolean' in x, get_all_allow_rules())) try: for i in allows: tdict.update({'source': i['source'], 'boolean': i['boolean']}) if tdict not in tlist: tlist.append(tdict) tdict = {} except KeyError: return(tlist) return (tlist) def get_conditionals_format_text(cond): enabled = False for x in cond: if x['boolean'][0][1]: enabled = True break return _("-- Allowed %s [ %s ]") % (enabled, " || ".join(set(map(lambda x: "%s=%d" % (x['boolean'][0][0], x['boolean'][0][1]), cond)))) def get_types_from_attribute(attribute): return list(info(ATTRIBUTE, attribute))[0]["types"] def get_file_types(setype): flist = [] mpaths = {} for f in get_all_file_types(): if f.startswith(gen_short_name(setype)): flist.append(f) fcdict = get_fcdict() for f in flist: try: mpaths[f] = (fcdict[f]["regex"], file_type_str[fcdict[f]["ftype"]]) except KeyError: mpaths[f] = [] return mpaths def get_real_type_name(name): """Return the real name of a type * If 'name' refers to a type alias, return the corresponding type name. * Otherwise return the original name (even if the type does not exist). """ if not name: return name try: return next(info(TYPE, name))["name"] except (RuntimeError, StopIteration): return name def get_writable_files(setype): file_types = get_all_file_types() all_writes = [] mpaths = {} permlist = search([ALLOW], {'source': setype, 'permlist': ['open', 'write'], 'class': 'file'}) if permlist is None or len(permlist) == 0: return mpaths fcdict = get_fcdict() attributes = ["proc_type", "sysctl_type"] for i in permlist: if i['target'] in attributes: continue if "enabled" in i: if not i["enabled"]: continue if i['target'].endswith("_t"): if i['target'] not in file_types: continue if i['target'] not in all_writes: if i['target'] != setype: all_writes.append(i['target']) else: for t in get_types_from_attribute(i['target']): if t not in all_writes: all_writes.append(t) for f in all_writes: try: mpaths[f] = (fcdict[f]["regex"], file_type_str[fcdict[f]["ftype"]]) except KeyError: mpaths[f] = [] # {"regex":[],"paths":[]} return mpaths def find_file(reg): if os.path.exists(reg): return [reg] try: pat = re.compile(r"%s$" % reg) except: print("bad reg:", reg) return [] p = reg if p.endswith("(/.*)?"): p = p[:-6] + "/" path = os.path.dirname(p) try: # Bug fix: when "all files on system" if path[-1] != "/": # is pass in it breaks without try block path += "/" except IndexError: print("try failed got an IndexError") try: pat = re.compile(r"%s$" % reg) return [x for x in map(lambda x: path + x, os.listdir(path)) if pat.match(x)] except: return [] def find_all_files(domain, exclude_list=[]): executable_files = get_entrypoints(domain) for exe in executable_files.keys(): if exe.endswith("_exec_t") and exe not in exclude_list: for path in executable_files[exe]: for f in find_file(path): return f return None def find_entrypoint_path(exe, exclude_list=[]): fcdict = get_fcdict() try: if exe.endswith("_exec_t") and exe not in exclude_list: for path in fcdict[exe]["regex"]: for f in find_file(path): return f except KeyError: pass return None def read_file_equiv(edict, fc_path, modify): try: with open(fc_path, "r") as fd: for e in fd: f = e.split() if f and not f[0].startswith('#'): edict[f[0]] = {"equiv": f[1], "modify": modify} except OSError as e: if e.errno != errno.ENOENT: raise return edict def get_file_equiv_modified(fc_path=selinux.selinux_file_context_path()): global file_equiv_modified if file_equiv_modified: return file_equiv_modified file_equiv_modified = {} file_equiv_modified = read_file_equiv(file_equiv_modified, fc_path + ".subs", modify=True) return file_equiv_modified def get_file_equiv(fc_path=selinux.selinux_file_context_path()): global file_equiv if file_equiv: return file_equiv file_equiv = get_file_equiv_modified(fc_path) file_equiv = read_file_equiv(file_equiv, fc_path + ".subs_dist", modify=False) return file_equiv def get_local_file_paths(fc_path=selinux.selinux_file_context_path()): global local_files if local_files: return local_files local_files = [] try: with open(fc_path + ".local", "r") as fd: fc = fd.readlines() except OSError as e: if e.errno != errno.ENOENT: raise return [] for i in fc: rec = i.split() if len(rec) == 0: continue try: if len(rec) > 2: ftype = trans_file_type_str[rec[1]] else: ftype = "a" local_files.append((rec[0], ftype)) except KeyError: pass return local_files def get_fcdict(fc_path=selinux.selinux_file_context_path()): global fcdict if fcdict: return fcdict fd = open(fc_path, "r") fc = fd.readlines() fd.close() fd = open(fc_path + ".homedirs", "r") fc += fd.readlines() fd.close() fcdict = {} try: with open(fc_path + ".local", "r") as fd: fc += fd.readlines() except OSError as e: if e.errno != errno.ENOENT: raise for i in fc: rec = i.split() try: if len(rec) > 2: ftype = trans_file_type_str[rec[1]] else: ftype = "a" t = rec[-1].split(":")[2] if t in fcdict: fcdict[t]["regex"].append(rec[0]) else: fcdict[t] = {"regex": [rec[0]], "ftype": ftype} except: pass fcdict["logfile"] = {"regex": ["all log files"]} fcdict["user_tmp_type"] = {"regex": ["all user tmp files"]} fcdict["user_home_type"] = {"regex": ["all user home files"]} fcdict["virt_image_type"] = {"regex": ["all virtual image files"]} fcdict["noxattrfs"] = {"regex": ["all files on file systems which do not support extended attributes"]} fcdict["sandbox_tmpfs_type"] = {"regex": ["all sandbox content in tmpfs file systems"]} fcdict["user_tmpfs_type"] = {"regex": ["all user content in tmpfs file systems"]} fcdict["file_type"] = {"regex": ["all files on the system"]} fcdict["samba_share_t"] = {"regex": ["use this label for random content that will be shared using samba"]} return fcdict def get_transitions_into(setype): try: return [x for x in search([TRANSITION], {'class': 'process'}) if x["transtype"] == setype] except (TypeError, AttributeError): pass return None def get_transitions(setype): try: return search([TRANSITION], {'source': setype, 'class': 'process'}) except (TypeError, AttributeError): pass return None def get_file_transitions(setype): try: return [x for x in search([TRANSITION], {'source': setype}) if x['class'] != "process"] except (TypeError, AttributeError): pass return None def get_boolean_rules(setype, boolean): boollist = [] permlist = search([ALLOW], {'source': setype}) for p in permlist: if "boolean" in p: try: for b in p["boolean"]: if boolean in b: boollist.append(p) except: pass return boollist def get_all_entrypoints(): return get_types_from_attribute("entry_type") def get_entrypoint_types(setype): q = setools.TERuleQuery(_pol, ruletype=[ALLOW], source=setype, tclass=["file"], perms=["entrypoint"]) return [str(x.target) for x in q.results() if x.source == setype] def get_init_transtype(path): entrypoint = selinux.getfilecon(path)[1].split(":")[2] try: entrypoints = list(filter(lambda x: x['target'] == entrypoint, search([TRANSITION], {'source': "init_t", 'class': 'process'}))) return entrypoints[0]["transtype"] except (TypeError, AttributeError, IndexError): pass return None def get_init_entrypoint(transtype): q = setools.TERuleQuery(_pol, ruletype=["type_transition"], source="init_t", tclass=["process"]) entrypoints = [] for i in q.results(): try: if i.default == transtype: entrypoints.append(i.target) except AttributeError: continue return entrypoints def get_init_entrypoints_str(): q = setools.TERuleQuery(_pol, ruletype=["type_transition"], source="init_t", tclass=["process"]) entrypoints = {} for i in q.results(): try: transtype = str(i.default) if transtype in entrypoints: entrypoints[transtype].append(str(i.target)) else: entrypoints[transtype] = [str(i.target)] except AttributeError: continue return entrypoints def get_init_entrypoint_target(entrypoint): try: entrypoints = map(lambda x: x['transtype'], search([TRANSITION], {'source': "init_t", 'target': entrypoint, 'class': 'process'})) return list(entrypoints)[0] except (TypeError, IndexError): pass return None def get_entrypoints(setype): fcdict = get_fcdict() mpaths = {} for f in get_entrypoint_types(setype): try: mpaths[f] = (fcdict[f]["regex"], file_type_str[fcdict[f]["ftype"]]) except KeyError: mpaths[f] = [] return mpaths def get_methods(): global methods if len(methods) > 0: return methods gen_interfaces() fn = defaults.interface_info() try: fd = open(fn) # List of per_role_template interfaces ifs = interfaces.InterfaceSet() ifs.from_file(fd) methods = list(ifs.interfaces.keys()) fd.close() except: sys.stderr.write("could not open interface info [%s]\n" % fn) sys.exit(1) methods.sort() return methods def get_all_types(): global all_types if all_types is None: all_types = [x['name'] for x in info(TYPE)] return all_types def get_all_types_info(): global all_types_info if all_types_info is None: all_types_info = list(info(TYPE)) return all_types_info def get_user_types(): global user_types if user_types is None: user_types = list(list(info(ATTRIBUTE, "userdomain"))[0]["types"]) return user_types def get_all_role_allows(): global role_allows if role_allows: return role_allows role_allows = {} q = setools.RBACRuleQuery(_pol, ruletype=[ALLOW]) for r in q.results(): src = str(r.source) tgt = str(r.target) if src == "system_r" or tgt == "system_r": continue if src in role_allows: role_allows[src].append(tgt) else: role_allows[src] = [tgt] return role_allows def get_all_entrypoint_domains(): import re all_domains = [] types = sorted(get_all_types()) for i in types: m = re.findall("(.*)%s" % "_exec_t$", i) if len(m) > 0: if len(re.findall("(.*)%s" % "_initrc$", m[0])) == 0 and m[0] not in all_domains: all_domains.append(m[0]) return all_domains def gen_interfaces(): try: from commands import getstatusoutput except ImportError: from subprocess import getstatusoutput ifile = defaults.interface_info() headers = defaults.headers() try: if os.stat(headers).st_mtime <= os.stat(ifile).st_mtime: return except OSError: pass if os.getuid() != 0: raise ValueError(_("You must regenerate interface info by running /usr/bin/sepolgen-ifgen")) print(getstatusoutput("/usr/bin/sepolgen-ifgen")[1]) def gen_port_dict(): global portrecs global portrecsbynum if portrecs: return (portrecs, portrecsbynum) portrecsbynum = {} portrecs = {} for i in info(PORT): if i['low'] == i['high']: port = str(i['low']) else: port = "%s-%s" % (str(i['low']), str(i['high'])) if (i['type'], i['protocol']) in portrecs: portrecs[(i['type'], i['protocol'])].append(port) else: portrecs[(i['type'], i['protocol'])] = [port] if 'range' in i: portrecsbynum[(i['low'], i['high'], i['protocol'])] = (i['type'], i['range']) else: portrecsbynum[(i['low'], i['high'], i['protocol'])] = (i['type']) return (portrecs, portrecsbynum) def get_all_domains(): global all_domains if not all_domains: all_domains = list(list(info(ATTRIBUTE, "domain"))[0]["types"]) return all_domains def get_all_roles(): global roles if roles: return roles q = setools.RoleQuery(_pol) roles = [str(x) for x in q.results() if str(x) != "object_r"] return roles def get_selinux_users(): global selinux_user_list if not selinux_user_list: selinux_user_list = list(info(USER)) if _pol.mls: for x in selinux_user_list: x['range'] = "".join(x['range'].split(" ")) return selinux_user_list def get_login_mappings(): global login_mappings if login_mappings: return login_mappings fd = open(selinux.selinux_usersconf_path(), "r") buf = fd.read() fd.close() login_mappings = [] for b in buf.split("\n"): b = b.strip() if len(b) == 0 or b.startswith("#"): continue x = b.split(":") login_mappings.append({"name": x[0], "seuser": x[1], "mls": ":".join(x[2:])}) return login_mappings def get_all_users(): return sorted(map(lambda x: x['name'], get_selinux_users())) def get_all_file_types(): global file_types if file_types: return file_types file_types = list(sorted(info(ATTRIBUTE, "file_type"))[0]["types"]) return file_types def get_all_port_types(): global port_types if port_types: return port_types port_types = list(sorted(info(ATTRIBUTE, "port_type"))[0]["types"]) return port_types def get_all_bools(): global bools if not bools: bools = list(info(BOOLEAN)) return bools def prettyprint(f, trim): return " ".join(f[:-len(trim)].split("_")) def markup(f): return f def get_description(f, markup=markup): txt = "Set files with the %s type, if you want to " % markup(f) if f.endswith("_var_run_t"): return txt + "store the %s files under the /run or /var/run directory." % prettyprint(f, "_var_run_t") if f.endswith("_pid_t"): return txt + "store the %s files under the /run directory." % prettyprint(f, "_pid_t") if f.endswith("_var_lib_t"): return txt + "store the %s files under the /var/lib directory." % prettyprint(f, "_var_lib_t") if f.endswith("_var_t"): return txt + "store the %s files under the /var directory." % prettyprint(f, "_var_lib_t") if f.endswith("_var_spool_t"): return txt + "store the %s files under the /var/spool directory." % prettyprint(f, "_spool_t") if f.endswith("_spool_t"): return txt + "store the %s files under the /var/spool directory." % prettyprint(f, "_spool_t") if f.endswith("_cache_t") or f.endswith("_var_cache_t"): return txt + "store the files under the /var/cache directory." if f.endswith("_keytab_t"): return txt + "treat the files as kerberos keytab files." if f.endswith("_lock_t"): return txt + "treat the files as %s lock data, stored under the /var/lock directory" % prettyprint(f, "_lock_t") if f.endswith("_log_t"): return txt + "treat the data as %s log data, usually stored under the /var/log directory." % prettyprint(f, "_log_t") if f.endswith("_config_t"): return txt + "treat the files as %s configuration data, usually stored under the /etc directory." % prettyprint(f, "_config_t") if f.endswith("_conf_t"): return txt + "treat the files as %s configuration data, usually stored under the /etc directory." % prettyprint(f, "_conf_t") if f.endswith("_exec_t"): return txt + "transition an executable to the %s_t domain." % f[:-len("_exec_t")] if f.endswith("_cgi_content_t"): return txt + "treat the files as %s cgi content." % prettyprint(f, "_cgi_content_t") if f.endswith("_rw_content_t"): return txt + "treat the files as %s read/write content." % prettyprint(f, "_rw_content_t") if f.endswith("_rw_t"): return txt + "treat the files as %s read/write content." % prettyprint(f, "_rw_t") if f.endswith("_write_t"): return txt + "treat the files as %s read/write content." % prettyprint(f, "_write_t") if f.endswith("_db_t"): return txt + "treat the files as %s database content." % prettyprint(f, "_db_t") if f.endswith("_ra_content_t"): return txt + "treat the files as %s read/append content." % prettyprint(f, "_ra_content_t") if f.endswith("_cert_t"): return txt + "treat the files as %s certificate data." % prettyprint(f, "_cert_t") if f.endswith("_key_t"): return txt + "treat the files as %s key data." % prettyprint(f, "_key_t") if f.endswith("_secret_t"): return txt + "treat the files as %s secret data." % prettyprint(f, "_key_t") if f.endswith("_ra_t"): return txt + "treat the files as %s read/append content." % prettyprint(f, "_ra_t") if f.endswith("_ro_t"): return txt + "treat the files as %s read/only content." % prettyprint(f, "_ro_t") if f.endswith("_modules_t"): return txt + "treat the files as %s modules." % prettyprint(f, "_modules_t") if f.endswith("_content_t"): return txt + "treat the files as %s content." % prettyprint(f, "_content_t") if f.endswith("_state_t"): return txt + "treat the files as %s state data." % prettyprint(f, "_state_t") if f.endswith("_files_t"): return txt + "treat the files as %s content." % prettyprint(f, "_files_t") if f.endswith("_file_t"): return txt + "treat the files as %s content." % prettyprint(f, "_file_t") if f.endswith("_data_t"): return txt + "treat the files as %s content." % prettyprint(f, "_data_t") if f.endswith("_file_t"): return txt + "treat the data as %s content." % prettyprint(f, "_file_t") if f.endswith("_tmp_t"): return txt + "store %s temporary files in the /tmp directories." % prettyprint(f, "_tmp_t") if f.endswith("_etc_t"): return txt + "store %s files in the /etc directories." % prettyprint(f, "_tmp_t") if f.endswith("_home_t"): return txt + "store %s files in the users home directory." % prettyprint(f, "_home_t") if f.endswith("_tmpfs_t"): return txt + "store %s files on a tmpfs file system." % prettyprint(f, "_tmpfs_t") if f.endswith("_unit_file_t"): return txt + "treat files as a systemd unit file." if f.endswith("_htaccess_t"): return txt + "treat the file as a %s access file." % prettyprint(f, "_htaccess_t") return txt + "treat the files as %s data." % prettyprint(f, "_t") def get_all_attributes(): global all_attributes if not all_attributes: all_attributes = list(sorted(map(lambda x: x['name'], info(ATTRIBUTE)))) return all_attributes def _dict_has_perms(dict, perms): for perm in perms: if perm not in dict[PERMS]: return False return True def gen_short_name(setype): all_domains = get_all_domains() if setype.endswith("_t"): # replace aliases with corresponding types setype = get_real_type_name(setype) domainname = setype[:-2] else: domainname = setype if domainname + "_t" not in all_domains: raise ValueError("domain %s_t does not exist" % domainname) if domainname[-1] == 'd': short_name = domainname[:-1] + "_" else: short_name = domainname + "_" return (domainname, short_name) def get_all_allow_rules(): global all_allow_rules if not all_allow_rules: all_allow_rules = search([ALLOW]) return all_allow_rules def get_all_transitions(): global all_transitions if not all_transitions: all_transitions = list(search([TRANSITION])) return all_transitions def get_bools(setype): bools = [] domainbools = [] domainname, short_name = gen_short_name(setype) for i in map(lambda x: x['boolean'], filter(lambda x: 'boolean' in x and x['source'] == setype, get_all_allow_rules())): for b in i: if not isinstance(b, tuple): continue try: enabled = selinux.security_get_boolean_active(b[0]) except OSError: enabled = b[1] if b[0].startswith(short_name) or b[0].startswith(domainname): if (b[0], enabled) not in domainbools and (b[0], not enabled) not in domainbools: domainbools.append((b[0], enabled)) else: if (b[0], enabled) not in bools and (b[0], not enabled) not in bools: bools.append((b[0], enabled)) return (domainbools, bools) def get_all_booleans(): global booleans if not booleans: booleans = selinux.security_get_boolean_names()[1] return booleans def policy_xml(path="/usr/share/selinux/devel/policy.xml"): try: fd = gzip.open(path) buf = fd.read() fd.close() except IOError: fd = open(path) buf = fd.read() fd.close() return buf def gen_bool_dict(path="/usr/share/selinux/devel/policy.xml"): global booleans_dict if booleans_dict: return booleans_dict import xml.etree.ElementTree booleans_dict = {} try: tree = xml.etree.ElementTree.fromstring(policy_xml(path)) for l in tree.findall("layer"): for m in l.findall("module"): for b in m.findall("tunable"): desc = b.find("desc").find("p").text.strip("\n") desc = re.sub("\n", " ", desc) booleans_dict[b.get('name')] = (m.get("name"), b.get('dftval'), desc) for b in m.findall("bool"): desc = b.find("desc").find("p").text.strip("\n") desc = re.sub("\n", " ", desc) booleans_dict[b.get('name')] = (m.get("name"), b.get('dftval'), desc) for i in tree.findall("bool"): desc = i.find("desc").find("p").text.strip("\n") desc = re.sub("\n", " ", desc) booleans_dict[i.get('name')] = ("global", i.get('dftval'), desc) for i in tree.findall("tunable"): desc = i.find("desc").find("p").text.strip("\n") desc = re.sub("\n", " ", desc) booleans_dict[i.get('name')] = ("global", i.get('dftval'), desc) except IOError: pass return booleans_dict def boolean_category(boolean): booleans_dict = gen_bool_dict() if boolean in booleans_dict: return _(booleans_dict[boolean][0]) else: return _("unknown") def boolean_desc(boolean): booleans_dict = gen_bool_dict() if boolean in booleans_dict: return _(booleans_dict[boolean][2]) else: desc = boolean.split("_") return "Allow %s to %s" % (desc[0], " ".join(desc[1:])) def get_os_version(): os_version = "" pkg_name = "selinux-policy" try: try: from commands import getstatusoutput except ImportError: from subprocess import getstatusoutput rc, output = getstatusoutput("rpm -q '%s'" % pkg_name) if rc == 0: os_version = output.split(".")[-2] except: os_version = "" if os_version[0:2] == "fc": os_version = "Fedora" + os_version[2:] elif os_version[0:2] == "el": os_version = "RHEL" + os_version[2:] else: os_version = "" return os_version def reinit(): global all_attributes global all_domains global all_types global booleans global booleans_dict global bools global fcdict global file_types global local_files global methods global methods global portrecs global portrecsbynum global port_types global role_allows global roles global login_mappings global selinux_user_list global user_types all_attributes = None all_domains = None all_types = None booleans = None booleans_dict = None bools = None fcdict = None file_types = None local_files = None methods = None methods = None portrecs = None portrecsbynum = None port_types = None role_allows = None roles = None user_types = None login_mappings = None selinux_user_list = None selinux-python-3.0/sepolicy/sepolicy/booleans.py000066400000000000000000000030501356774067000222310ustar00rootroot00000000000000# Copyright (C) 2012 Red Hat # see file 'COPYING' for use and warranty information # # setrans is a tool for analyzing process transitions in SELinux policy # # This program is free software; you can redistribute it and/or # modify it under the terms of the GNU General Public License as # published by the Free Software Foundation; either version 2 of # the License, or (at your option) any later version. # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program; if not, write to the Free Software # Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA # 02111-1307 USA # # import sepolicy def expand_attribute(attribute): try: return sepolicy.info(sepolicy.ATTRIBUTE, attribute)[0]["types"] except RuntimeError: return [attribute] def get_types(src, tclass, perm): allows = sepolicy.search([sepolicy.ALLOW], {sepolicy.SOURCE: src, sepolicy.CLASS: tclass, sepolicy.PERMS: perm}) if not allows: raise TypeError("The %s type is not allowed to %s any types" % (src, ",".join(perm))) tlist = [] for l in map(lambda y: y[sepolicy.TARGET], filter(lambda x: set(perm).issubset(x[sepolicy.PERMS]), allows)): tlist = tlist + expand_attribute(l) return tlist selinux-python-3.0/sepolicy/sepolicy/communicate.py000077500000000000000000000032751356774067000227470ustar00rootroot00000000000000# Copyright (C) 2012 Red Hat # see file 'COPYING' for use and warranty information # # setrans is a tool for analyzing process transitions in SELinux policy # # This program is free software; you can redistribute it and/or # modify it under the terms of the GNU General Public License as # published by the Free Software Foundation; either version 2 of # the License, or (at your option) any later version. # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program; if not, write to the Free Software # Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA # 02111-1307 USA # # import sepolicy import sys def usage(parser, msg): parser.print_help() sys.stderr.write("\n%s\n" % msg) sys.stderr.flush() sys.exit(1) def expand_attribute(attribute): try: return list(next(sepolicy.info(sepolicy.ATTRIBUTE, attribute))["types"]) except StopIteration: return [attribute] def get_types(src, tclass, perm): allows = sepolicy.search([sepolicy.ALLOW], {sepolicy.SOURCE: src, sepolicy.CLASS: tclass, sepolicy.PERMS: perm}) if not allows: raise ValueError("The %s type is not allowed to %s any types" % (src, ",".join(perm))) tlist = [] for l in map(lambda y: y[sepolicy.TARGET], filter(lambda x: set(perm).issubset(x[sepolicy.PERMS]), allows)): tlist = tlist + expand_attribute(l) return tlist selinux-python-3.0/sepolicy/sepolicy/generate.py000066400000000000000000001452161356774067000222340ustar00rootroot00000000000000# Copyright (C) 2007-2012 Red Hat # see file 'COPYING' for use and warranty information # # policygentool is a tool for the initial generation of SELinux policy # # This program is free software; you can redistribute it and/or # modify it under the terms of the GNU General Public License as # published by the Free Software Foundation; either version 2 of # the License, or (at your option) any later version. # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program; if not, write to the Free Software # Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA # 02111-1307 USA # # import os import sys import stat import re import sepolicy from sepolicy import get_all_types, get_all_attributes, get_all_roles import time from .templates import executable from .templates import boolean from .templates import etc_rw from .templates import unit_file from .templates import var_cache from .templates import var_spool from .templates import var_lib from .templates import var_log from .templates import var_run from .templates import tmp from .templates import rw from .templates import network from .templates import script from .templates import spec from .templates import user import sepolgen.interfaces as interfaces import sepolgen.defaults as defaults ## ## I18N ## PROGNAME = "policycoreutils" try: import gettext kwargs = {} if sys.version_info < (3,): kwargs['unicode'] = True gettext.install(PROGNAME, localedir="/usr/share/locale", codeset='utf-8', **kwargs) except: try: import builtins builtins.__dict__['_'] = str except ImportError: import __builtin__ __builtin__.__dict__['_'] = unicode def get_rpm_nvr_from_header(hdr): 'Given an RPM header return the package NVR as a string' name = hdr['name'] version = hdr['version'] release = hdr['release'] release_version = version + "-" + release.split(".")[0] os_version = release.split(".")[1] return [name, release_version, os_version] def get_rpm_nvr_list(package): try: import rpm nvr = None ts = rpm.ts() mi = ts.dbMatch(rpm.RPMTAG_NAME, package) for h in mi: nvr = get_rpm_nvr_from_header(h) break except: print(("Failed to retrieve rpm info for %s") % package) nvr = None return nvr def get_all_ports(): dict = {} for p in sepolicy.info(sepolicy.PORT): if p['type'] == "reserved_port_t" or \ p['type'] == "port_t" or \ p['type'] == "hi_reserved_port_t": continue dict[(p['low'], p['high'], p['protocol'])] = (p['type'], p.get('range')) return dict def get_all_users(): users = [x['name'] for x in sepolicy.info(sepolicy.USER)] users.remove("system_u") users.remove("root") users.sort() return users ALL = 0 RESERVED = 1 UNRESERVED = 2 PORTS = 3 ADMIN_TRANSITION_INTERFACE = "_admin$" USER_TRANSITION_INTERFACE = "_role$" DAEMON = 0 DBUS = 1 INETD = 2 CGI = 3 SANDBOX = 4 USER = 5 EUSER = 6 TUSER = 7 XUSER = 8 LUSER = 9 AUSER = 10 RUSER = 11 NEWTYPE = 12 poltype = {} poltype[DAEMON] = _("Standard Init Daemon") poltype[DBUS] = _("DBUS System Daemon") poltype[INETD] = _("Internet Services Daemon") poltype[CGI] = _("Web Application/Script (CGI)") poltype[SANDBOX] = _("Sandbox") poltype[USER] = _("User Application") poltype[EUSER] = _("Existing Domain Type") poltype[TUSER] = _("Minimal Terminal Login User Role") poltype[XUSER] = _("Minimal X Windows Login User Role") poltype[LUSER] = _("Desktop Login User Role") poltype[AUSER] = _("Administrator Login User Role") poltype[RUSER] = _("Confined Root Administrator Role") poltype[NEWTYPE] = _("Module information for a new type") def get_poltype_desc(): keys = poltype.keys() keys.sort() msg = _("Valid Types:\n") for k in keys: msg += "%2s: %s\n" % (k, poltype[k]) return msg APPLICATIONS = [DAEMON, DBUS, INETD, USER, CGI] USERS = [XUSER, TUSER, LUSER, AUSER, RUSER] def verify_ports(ports): if ports == "": return [] max_port = 2 ** 16 try: temp = [] for a in ports.split(","): r = a.split("-") if len(r) > 2: raise ValueError if len(r) == 1: begin = int(r[0]) end = int(r[0]) else: begin = int(r[0]) end = int(r[1]) if begin > end: raise ValueError for p in range(begin, end + 1): if p < 1 or p > max_port: raise ValueError temp.append(p) return temp except ValueError: raise ValueError(_("Ports must be numbers or ranges of numbers from 1 to %d ") % max_port) class policy: def __init__(self, name, type): self.rpms = [] self.ports = {} self.all_roles = get_all_roles() self.types = [] if type not in poltype: raise ValueError(_("You must enter a valid policy type")) if not name: raise ValueError(_("You must enter a name for your policy module for your '%s'.") % poltype[type]) try: self.ports = get_all_ports() except ValueError as e: print("Can not get port types, must be root for this information") except RuntimeError as e: print("Can not get port types", e) self.symbols = {} self.symbols["openlog"] = "set_use_kerberos(True)" self.symbols["openlog"] = "set_use_kerb_rcache(True)" self.symbols["openlog"] = "set_use_syslog(True)" self.symbols["gethostby"] = "set_use_resolve(True)" self.symbols["getaddrinfo"] = "set_use_resolve(True)" self.symbols["getnameinfo"] = "set_use_resolve(True)" self.symbols["krb"] = "set_use_kerberos(True)" self.symbols["gss_accept_sec_context"] = "set_manage_krb5_rcache(True)" self.symbols["krb5_verify_init_creds"] = "set_manage_krb5_rcache(True)" self.symbols["krb5_rd_req"] = "set_manage_krb5_rcache(True)" self.symbols["__syslog_chk"] = "set_use_syslog(True)" self.symbols["getpwnam"] = "set_use_uid(True)" self.symbols["getpwuid"] = "set_use_uid(True)" self.symbols["dbus_"] = "set_use_dbus(True)" self.symbols["pam_"] = "set_use_pam(True)" self.symbols["pam_"] = "set_use_audit(True)" self.symbols["fork"] = "add_process('fork')" self.symbols["transition"] = "add_process('transition')" self.symbols["sigchld"] = "add_process('sigchld')" self.symbols["sigkill"] = "add_process('sigkill')" self.symbols["sigstop"] = "add_process('sigstop')" self.symbols["signull"] = "add_process('signull')" self.symbols["ptrace"] = "add_process('ptrace')" self.symbols["getsched"] = "add_process('getsched')" self.symbols["setsched"] = "add_process('setsched')" self.symbols["getsession"] = "add_process('getsession')" self.symbols["getpgid"] = "add_process('getpgid')" self.symbols["setpgid"] = "add_process('setpgid')" self.symbols["getcap"] = "add_process('getcap')" self.symbols["setcap"] = "add_process('setcap')" self.symbols["share"] = "add_process('share')" self.symbols["getattr"] = "add_process('getattr')" self.symbols["setexec"] = "add_process('setexec')" self.symbols["setfscreate"] = "add_process('setfscreate')" self.symbols["noatsecure"] = "add_process('noatsecure')" self.symbols["siginh"] = "add_process('siginh')" self.symbols["kill"] = "add_process('signal_perms')" self.symbols["setrlimit"] = "add_process('setrlimit')" self.symbols["rlimitinh"] = "add_process('rlimitinh')" self.symbols["dyntransition"] = "add_process('dyntransition')" self.symbols["setcurrent"] = "add_process('setcurrent')" self.symbols["execmem"] = "add_process('execmem')" self.symbols["execstack"] = "add_process('execstack')" self.symbols["execheap"] = "add_process('execheap')" self.symbols["setkeycreate"] = "add_process('setkeycreate')" self.symbols["setsockcreate"] = "add_process('setsockcreate')" self.symbols["chown"] = "add_capability('chown')" self.symbols["dac_override"] = "add_capability('dac_override')" self.symbols["dac_read_search"] = "add_capability('dac_read_search')" self.symbols["fowner"] = "add_capability('fowner')" self.symbols["fsetid"] = "add_capability('fsetid')" self.symbols["setgid"] = "add_capability('setgid')" self.symbols["setegid"] = "add_capability('setgid')" self.symbols["setresgid"] = "add_capability('setgid')" self.symbols["setregid"] = "add_capability('setgid')" self.symbols["setresuid"] = "add_capability('setuid')" self.symbols["setuid"] = "add_capability('setuid')" self.symbols["seteuid"] = "add_capability('setuid')" self.symbols["setreuid"] = "add_capability('setuid')" self.symbols["setresuid"] = "add_capability('setuid')" self.symbols["setpcap"] = "add_capability('setpcap')" self.symbols["linux_immutable"] = "add_capability('linux_immutable')" self.symbols["net_bind_service"] = "add_capability('net_bind_service')" self.symbols["net_broadcast"] = "add_capability('net_broadcast')" self.symbols["net_admin"] = "add_capability('net_admin')" self.symbols["net_raw"] = "add_capability('net_raw')" self.symbols["ipc_lock"] = "add_capability('ipc_lock')" self.symbols["ipc_owner"] = "add_capability('ipc_owner')" self.symbols["sys_module"] = "add_capability('sys_module')" self.symbols["sys_rawio"] = "add_capability('sys_rawio')" self.symbols["chroot"] = "add_capability('sys_chroot')" self.symbols["sys_chroot"] = "add_capability('sys_chroot')" self.symbols["sys_ptrace"] = "add_capability('sys_ptrace')" self.symbols["sys_pacct"] = "add_capability('sys_pacct')" self.symbols["mount"] = "add_capability('sys_admin')" self.symbols["unshare"] = "add_capability('sys_admin')" self.symbols["sys_admin"] = "add_capability('sys_admin')" self.symbols["sys_boot"] = "add_capability('sys_boot')" self.symbols["sys_nice"] = "add_capability('sys_nice')" self.symbols["sys_resource"] = "add_capability('sys_resource')" self.symbols["sys_time"] = "add_capability('sys_time')" self.symbols["sys_tty_config"] = "add_capability('sys_tty_config')" self.symbols["mknod"] = "add_capability('mknod')" self.symbols["lease"] = "add_capability('lease')" self.symbols["audit_write"] = "add_capability('audit_write')" self.symbols["audit_control"] = "add_capability('audit_control')" self.symbols["setfcap"] = "add_capability('setfcap')" self.DEFAULT_DIRS = {} self.DEFAULT_DIRS["/etc"] = ["etc_rw", [], etc_rw] self.DEFAULT_DIRS["/tmp"] = ["tmp", [], tmp] self.DEFAULT_DIRS["rw"] = ["rw", [], rw] self.DEFAULT_DIRS["/usr/lib/systemd/system"] = ["unit_file", [], unit_file] self.DEFAULT_DIRS["/lib/systemd/system"] = ["unit_file", [], unit_file] self.DEFAULT_DIRS["/etc/systemd/system"] = ["unit_file", [], unit_file] self.DEFAULT_DIRS["/var/cache"] = ["var_cache", [], var_cache] self.DEFAULT_DIRS["/var/lib"] = ["var_lib", [], var_lib] self.DEFAULT_DIRS["/var/log"] = ["var_log", [], var_log] self.DEFAULT_DIRS["/var/run"] = ["var_run", [], var_run] self.DEFAULT_DIRS["/var/spool"] = ["var_spool", [], var_spool] self.DEFAULT_EXT = {} self.DEFAULT_EXT["_tmp_t"] = tmp self.DEFAULT_EXT["_unit_file_t"] = unit_file self.DEFAULT_EXT["_var_cache_t"] = var_cache self.DEFAULT_EXT["_var_lib_t"] = var_lib self.DEFAULT_EXT["_var_log_t"] = var_log self.DEFAULT_EXT["_var_run_t"] = var_run self.DEFAULT_EXT["_var_spool_t"] = var_spool self.DEFAULT_EXT["_port_t"] = network self.DEFAULT_KEYS = ["/etc", "/var/cache", "/var/log", "/tmp", "rw", "/var/lib", "/var/run", "/var/spool", "/etc/systemd/system", "/usr/lib/systemd/system", "/lib/systemd/system"] self.DEFAULT_TYPES = ( (self.generate_daemon_types, self.generate_daemon_rules), (self.generate_dbusd_types, self.generate_dbusd_rules), (self.generate_inetd_types, self.generate_inetd_rules), (self.generate_cgi_types, self.generate_cgi_rules), (self.generate_sandbox_types, self.generate_sandbox_rules), (self.generate_userapp_types, self.generate_userapp_rules), (self.generate_existing_user_types, self.generate_existing_user_rules), (self.generate_min_login_user_types, self.generate_login_user_rules), (self.generate_x_login_user_types, self.generate_x_login_user_rules), (self.generate_login_user_types, self.generate_login_user_rules), (self.generate_admin_user_types, self.generate_login_user_rules), (self.generate_root_user_types, self.generate_root_user_rules), (self.generate_new_types, self.generate_new_rules)) if not re.match(r"^[a-zA-Z0-9-_]+$", name): raise ValueError(_("Name must be alpha numeric with no spaces. Consider using option \"-n MODULENAME\"")) if type == CGI: self.name = "httpd_%s_script" % name else: self.name = name self.file_name = name self.capabilities = [] self.processes = [] self.type = type self.initscript = "" self.program = None self.in_tcp = [False, False, False, []] self.in_udp = [False, False, False, []] self.out_tcp = [False, False, False, []] self.out_udp = [False, False, False, []] self.use_resolve = False self.use_tmp = False self.use_uid = False self.use_syslog = False self.use_kerberos = False self.manage_krb5_rcache = False self.use_pam = False self.use_dbus = False self.use_audit = False self.use_etc = self.type not in [EUSER, NEWTYPE] self.use_localization = self.type not in [EUSER, NEWTYPE] self.use_fd = self.type not in [EUSER, NEWTYPE] self.use_terminal = False self.use_mail = False self.booleans = {} self.files = {} self.dirs = {} self.found_tcp_ports = [] self.found_udp_ports = [] self.need_tcp_type = False self.need_udp_type = False self.admin_domains = [] self.existing_domains = [] self.transition_domains = [] self.transition_users = [] self.roles = [] def __isnetset(self, l): return l[ALL] or l[RESERVED] or l[UNRESERVED] or len(l[PORTS]) > 0 def set_admin_domains(self, admin_domains): self.admin_domains = admin_domains def set_existing_domains(self, existing_domains): self.existing_domains = existing_domains def set_admin_roles(self, roles): self.roles = roles def set_transition_domains(self, transition_domains): self.transition_domains = transition_domains def set_transition_users(self, transition_users): self.transition_users = transition_users def use_in_udp(self): return self.__isnetset(self.in_udp) def use_out_udp(self): return self.__isnetset(self.out_udp) def use_udp(self): return self.use_in_udp() or self.use_out_udp() def use_in_tcp(self): return self.__isnetset(self.in_tcp) def use_out_tcp(self): return self.__isnetset(self.out_tcp) def use_tcp(self): return self.use_in_tcp() or self.use_out_tcp() def use_network(self): return self.use_tcp() or self.use_udp() def find_port(self, port, protocol="tcp"): for begin, end, p in self.ports.keys(): if port >= begin and port <= end and protocol == p: return self.ports[begin, end, protocol] return None def set_program(self, program): if self.type not in APPLICATIONS: raise ValueError(_("User Role types can not be assigned executables.")) self.program = program def set_init_script(self, initscript): if self.type != DAEMON: raise ValueError(_("Only Daemon apps can use an init script..")) self.initscript = initscript def set_in_tcp(self, all, reserved, unreserved, ports): self.in_tcp = [all, reserved, unreserved, verify_ports(ports)] def set_in_udp(self, all, reserved, unreserved, ports): self.in_udp = [all, reserved, unreserved, verify_ports(ports)] def set_out_tcp(self, all, ports): self.out_tcp = [all, False, False, verify_ports(ports)] def set_out_udp(self, all, ports): self.out_udp = [all, False, False, verify_ports(ports)] def set_use_resolve(self, val): if type(val) is not bool: raise ValueError(_("use_resolve must be a boolean value ")) self.use_resolve = val def set_use_syslog(self, val): if type(val) is not bool: raise ValueError(_("use_syslog must be a boolean value ")) self.use_syslog = val def set_use_kerberos(self, val): if type(val) is not bool: raise ValueError(_("use_kerberos must be a boolean value ")) self.use_kerberos = val def set_manage_krb5_rcache(self, val): if type(val) is not bool: raise ValueError(_("manage_krb5_rcache must be a boolean value ")) self.manage_krb5_rcache = val def set_use_pam(self, val): self.use_pam = (val is True) def set_use_dbus(self, val): self.use_dbus = (val is True) def set_use_audit(self, val): self.use_audit = (val is True) def set_use_etc(self, val): self.use_etc = (val is True) def set_use_localization(self, val): self.use_localization = (val is True) def set_use_fd(self, val): self.use_fd = (val is True) def set_use_terminal(self, val): self.use_terminal = (val is True) def set_use_mail(self, val): self.use_mail = (val is True) def set_use_tmp(self, val): if self.type in USERS: raise ValueError(_("USER Types automatically get a tmp type")) if val: self.DEFAULT_DIRS["/tmp"][1].append("/tmp") else: self.DEFAULT_DIRS["/tmp"][1] = [] def set_use_uid(self, val): self.use_uid = (val is True) def generate_uid_rules(self): if self.use_uid: return re.sub("TEMPLATETYPE", self.name, executable.te_uid_rules) else: return "" def generate_syslog_rules(self): if self.use_syslog: return re.sub("TEMPLATETYPE", self.name, executable.te_syslog_rules) else: return "" def generate_resolve_rules(self): if self.use_resolve: return re.sub("TEMPLATETYPE", self.name, executable.te_resolve_rules) else: return "" def generate_kerberos_rules(self): if self.use_kerberos: return re.sub("TEMPLATETYPE", self.name, executable.te_kerberos_rules) else: return "" def generate_manage_krb5_rcache_rules(self): if self.manage_krb5_rcache: return re.sub("TEMPLATETYPE", self.name, executable.te_manage_krb5_rcache_rules) else: return "" def generate_pam_rules(self): newte = "" if self.use_pam: newte = re.sub("TEMPLATETYPE", self.name, executable.te_pam_rules) return newte def generate_audit_rules(self): newte = "" if self.use_audit: newte = re.sub("TEMPLATETYPE", self.name, executable.te_audit_rules) return newte def generate_etc_rules(self): newte = "" if self.use_etc: newte = re.sub("TEMPLATETYPE", self.name, executable.te_etc_rules) return newte def generate_fd_rules(self): newte = "" if self.use_fd: newte = re.sub("TEMPLATETYPE", self.name, executable.te_fd_rules) return newte def generate_localization_rules(self): newte = "" if self.use_localization: newte = re.sub("TEMPLATETYPE", self.name, executable.te_localization_rules) return newte def generate_dbus_rules(self): newte = "" if self.type != DBUS and self.use_dbus: newte = re.sub("TEMPLATETYPE", self.name, executable.te_dbus_rules) return newte def generate_mail_rules(self): newte = "" if self.use_mail: newte = re.sub("TEMPLATETYPE", self.name, executable.te_mail_rules) return newte def generate_network_action(self, protocol, action, port_name): line = "" method = "corenet_%s_%s_%s" % (protocol, action, port_name) if method in sepolicy.get_methods(): line = "%s(%s_t)\n" % (method, self.name) else: line = """ gen_require(` type %s_t; ') allow %s_t %s_t:%s_socket name_%s; """ % (port_name, self.name, port_name, protocol, action) return line def generate_network_types(self): for i in self.in_tcp[PORTS]: rec = self.find_port(int(i), "tcp") if rec is None: self.need_tcp_type = True else: port_name = rec[0][:-2] line = self.generate_network_action("tcp", "bind", port_name) # line = "corenet_tcp_bind_%s(%s_t)\n" % (port_name, self.name) if line not in self.found_tcp_ports: self.found_tcp_ports.append(line) for i in self.out_tcp[PORTS]: rec = self.find_port(int(i), "tcp") if rec is None: self.need_tcp_type = True else: port_name = rec[0][:-2] line = self.generate_network_action("tcp", "connect", port_name) # line = "corenet_tcp_connect_%s(%s_t)\n" % (port_name, self.name) if line not in self.found_tcp_ports: self.found_tcp_ports.append(line) for i in self.in_udp[PORTS]: rec = self.find_port(int(i), "udp") if rec is None: self.need_udp_type = True else: port_name = rec[0][:-2] line = self.generate_network_action("udp", "bind", port_name) # line = "corenet_udp_bind_%s(%s_t)\n" % (port_name, self.name) if line not in self.found_udp_ports: self.found_udp_ports.append(line) if self.need_udp_type is True or self.need_tcp_type is True: return re.sub("TEMPLATETYPE", self.name, network.te_types) return "" def __find_path(self, file): for d in self.DEFAULT_DIRS: if file.find(d) == 0: self.DEFAULT_DIRS[d][1].append(file) return self.DEFAULT_DIRS[d] self.DEFAULT_DIRS["rw"][1].append(file) return self.DEFAULT_DIRS["rw"] def add_capability(self, capability): if capability not in self.capabilities: self.capabilities.append(capability) def set_types(self, types): self.types = types def add_process(self, process): if process not in self.processes: self.processes.append(process) def add_boolean(self, name, description): self.booleans[name] = description def add_file(self, file): self.files[file] = self.__find_path(file) def add_dir(self, file): self.dirs[file] = self.__find_path(file) def generate_capabilities(self): newte = "" self.capabilities.sort() if len(self.capabilities) > 0: newte = "allow %s_t self:capability { %s };\n" % (self.name, " ".join(self.capabilities)) return newte def generate_process(self): newte = "" self.processes.sort() if len(self.processes) > 0: newte = "allow %s_t self:process { %s };\n" % (self.name, " ".join(self.processes)) return newte def generate_network_rules(self): newte = "" if self.use_network(): newte = "\n" newte += re.sub("TEMPLATETYPE", self.name, network.te_network) if self.use_tcp(): newte += "\n" newte += re.sub("TEMPLATETYPE", self.name, network.te_tcp) if self.use_in_tcp(): newte += re.sub("TEMPLATETYPE", self.name, network.te_in_tcp) if self.need_tcp_type and len(self.in_tcp[PORTS]) > 0: newte += re.sub("TEMPLATETYPE", self.name, network.te_in_need_port_tcp) if self.need_tcp_type and len(self.out_tcp[PORTS]) > 0: newte += re.sub("TEMPLATETYPE", self.name, network.te_out_need_port_tcp) if self.in_tcp[ALL]: newte += re.sub("TEMPLATETYPE", self.name, network.te_in_all_ports_tcp) if self.in_tcp[RESERVED]: newte += re.sub("TEMPLATETYPE", self.name, network.te_in_reserved_ports_tcp) if self.in_tcp[UNRESERVED]: newte += re.sub("TEMPLATETYPE", self.name, network.te_in_unreserved_ports_tcp) if self.out_tcp[ALL]: newte += re.sub("TEMPLATETYPE", self.name, network.te_out_all_ports_tcp) if self.out_tcp[RESERVED]: newte += re.sub("TEMPLATETYPE", self.name, network.te_out_reserved_ports_tcp) if self.out_tcp[UNRESERVED]: newte += re.sub("TEMPLATETYPE", self.name, network.te_out_unreserved_ports_tcp) for i in self.found_tcp_ports: newte += i if self.use_udp(): newte += "\n" newte += re.sub("TEMPLATETYPE", self.name, network.te_udp) if self.need_udp_type: newte += re.sub("TEMPLATETYPE", self.name, network.te_in_need_port_udp) if self.use_in_udp(): newte += re.sub("TEMPLATETYPE", self.name, network.te_in_udp) if self.in_udp[ALL]: newte += re.sub("TEMPLATETYPE", self.name, network.te_in_all_ports_udp) if self.in_udp[RESERVED]: newte += re.sub("TEMPLATETYPE", self.name, network.te_in_reserved_ports_udp) if self.in_udp[UNRESERVED]: newte += re.sub("TEMPLATETYPE", self.name, network.te_in_unreserved_ports_udp) for i in self.found_udp_ports: newte += i return newte def generate_transition_rules(self): newte = "" for app in self.transition_domains: tmp = re.sub("TEMPLATETYPE", self.name, user.te_transition_rules) newte += re.sub("APPLICATION", app, tmp) if self.type == USER: for u in self.transition_users: temp = re.sub("TEMPLATETYPE", self.name, executable.te_run_rules) newte += re.sub("USER", u.split("_u")[0], temp) return newte def generate_admin_rules(self): newte = "" if self.type == EUSER: for d in self.existing_domains: name = d.split("_t")[0] role = name + "_r" for app in self.admin_domains: tmp = re.sub("TEMPLATETYPE", name, user.te_admin_domain_rules) if role not in self.all_roles: tmp = re.sub(role, "system_r", tmp) newte += re.sub("APPLICATION", app, tmp) return newte if self.type == RUSER: newte += re.sub("TEMPLATETYPE", self.name, user.te_admin_rules) for app in self.admin_domains: tmp = re.sub("TEMPLATETYPE", self.name, user.te_admin_domain_rules) newte += re.sub("APPLICATION", app, tmp) for u in self.transition_users: role = u.split("_u")[0] if (role + "_r") in self.all_roles: tmp = re.sub("TEMPLATETYPE", self.name, user.te_admin_trans_rules) newte += re.sub("USER", role, tmp) return newte def generate_dbus_if(self): newif = "" if self.use_dbus: newif = re.sub("TEMPLATETYPE", self.name, executable.if_dbus_rules) return newif def generate_sandbox_if(self): newif = "" if self.type != SANDBOX: return newif newif = re.sub("TEMPLATETYPE", self.name, executable.if_sandbox_rules) return newif def generate_admin_if(self): newif = "" newtypes = "" if self.initscript != "": newtypes += re.sub("TEMPLATETYPE", self.name, executable.if_initscript_admin_types) newif += re.sub("TEMPLATETYPE", self.name, executable.if_initscript_admin) for d in self.DEFAULT_KEYS: if len(self.DEFAULT_DIRS[d][1]) > 0: newtypes += re.sub("TEMPLATETYPE", self.name, self.DEFAULT_DIRS[d][2].if_admin_types) newif += re.sub("TEMPLATETYPE", self.name, self.DEFAULT_DIRS[d][2].if_admin_rules) if newif != "": ret = re.sub("TEMPLATETYPE", self.name, executable.if_begin_admin) ret += newtypes ret += re.sub("TEMPLATETYPE", self.name, executable.if_middle_admin) ret += newif ret += re.sub("TEMPLATETYPE", self.name, executable.if_end_admin) return ret return "" def generate_cgi_types(self): return re.sub("TEMPLATETYPE", self.file_name, executable.te_cgi_types) def generate_sandbox_types(self): return re.sub("TEMPLATETYPE", self.file_name, executable.te_sandbox_types) def generate_userapp_types(self): return re.sub("TEMPLATETYPE", self.name, executable.te_userapp_types) def generate_inetd_types(self): return re.sub("TEMPLATETYPE", self.name, executable.te_inetd_types) def generate_dbusd_types(self): return re.sub("TEMPLATETYPE", self.name, executable.te_dbusd_types) def generate_min_login_user_types(self): return re.sub("TEMPLATETYPE", self.name, user.te_min_login_user_types) def generate_login_user_types(self): return re.sub("TEMPLATETYPE", self.name, user.te_login_user_types) def generate_admin_user_types(self): return re.sub("TEMPLATETYPE", self.name, user.te_admin_user_types) def generate_existing_user_types(self): if len(self.existing_domains) == 0: raise ValueError(_("'%s' policy modules require existing domains") % poltype[self.type]) newte = re.sub("TEMPLATETYPE", self.name, user.te_existing_user_types) newte += """gen_require(`""" for d in self.existing_domains: newte += """ type %s;""" % d role = d.split("_t")[0] + "_r" if role in self.all_roles: newte += """ role %s;""" % role newte += """ ') """ return newte def generate_x_login_user_types(self): return re.sub("TEMPLATETYPE", self.name, user.te_x_login_user_types) def generate_root_user_types(self): return re.sub("TEMPLATETYPE", self.name, user.te_root_user_types) def generate_new_types(self): newte = "" if len(self.types) == 0: raise ValueError(_("Type field required")) for t in self.types: for i in self.DEFAULT_EXT: if t.endswith(i): print(t, t[:-len(i)]) newte += re.sub("TEMPLATETYPE", t[:-len(i)], self.DEFAULT_EXT[i].te_types) break if NEWTYPE and newte == "": default_ext = [] for i in self.DEFAULT_EXT: default_ext.append(i) raise ValueError(_("You need to define a new type which ends with: \n %s") % "\n ".join(default_ext)) return newte def generate_new_rules(self): return "" def generate_daemon_types(self): newte = re.sub("TEMPLATETYPE", self.name, executable.te_daemon_types) if self.initscript != "": newte += re.sub("TEMPLATETYPE", self.name, executable.te_initscript_types) return newte def generate_tmp_types(self): if self.use_tmp: return re.sub("TEMPLATETYPE", self.name, tmp.te_types) else: return "" def generate_booleans(self): newte = "" for b in self.booleans: tmp = re.sub("BOOLEAN", b, boolean.te_boolean) newte += re.sub("DESCRIPTION", self.booleans[b], tmp) return newte def generate_boolean_rules(self): newte = "" for b in self.booleans: newte += re.sub("BOOLEAN", b, boolean.te_rules) return newte def generate_sandbox_te(self): return re.sub("TEMPLATETYPE", self.name, executable.te_sandbox_types) def generate_cgi_te(self): return re.sub("TEMPLATETYPE", self.name, executable.te_cgi_types) def generate_daemon_rules(self): newif = re.sub("TEMPLATETYPE", self.name, executable.te_daemon_rules) return newif def generate_new_type_if(self): newif = "" for t in self.types: for i in self.DEFAULT_EXT: if t.endswith(i): reqtype = t[:-len(i)] + "_t" newif += re.sub("TEMPLATETYPE", t[:-len(i)], self.DEFAULT_EXT[i].if_rules) break return newif def generate_login_user_rules(self): return re.sub("TEMPLATETYPE", self.name, user.te_login_user_rules) def generate_existing_user_rules(self): nerules = re.sub("TEMPLATETYPE", self.name, user.te_existing_user_rules) return nerules def generate_x_login_user_rules(self): return re.sub("TEMPLATETYPE", self.name, user.te_x_login_user_rules) def generate_root_user_rules(self): newte = re.sub("TEMPLATETYPE", self.name, user.te_root_user_rules) return newte def generate_userapp_rules(self): return re.sub("TEMPLATETYPE", self.name, executable.te_userapp_rules) def generate_inetd_rules(self): return re.sub("TEMPLATETYPE", self.name, executable.te_inetd_rules) def generate_dbusd_rules(self): return re.sub("TEMPLATETYPE", self.name, executable.te_dbusd_rules) def generate_tmp_rules(self): if self.use_tmp: return re.sub("TEMPLATETYPE", self.name, tmp.te_rules) else: return "" def generate_cgi_rules(self): newte = "" newte += re.sub("TEMPLATETYPE", self.name, executable.te_cgi_rules) return newte def generate_sandbox_rules(self): newte = "" newte += re.sub("TEMPLATETYPE", self.name, executable.te_sandbox_rules) return newte def generate_user_if(self): newif = "" if self.use_terminal or self.type == USER: newif = re.sub("TEMPLATETYPE", self.name, executable.if_user_program_rules) if self.type in (TUSER, XUSER, AUSER, LUSER): newif += re.sub("TEMPLATETYPE", self.name, executable.if_role_change_rules) return newif def generate_if(self): newif = "" newif += re.sub("TEMPLATETYPE", self.name, executable.if_heading_rules) if self.program: newif += re.sub("TEMPLATETYPE", self.name, executable.if_program_rules) if self.initscript != "": newif += re.sub("TEMPLATETYPE", self.name, executable.if_initscript_rules) for d in self.DEFAULT_KEYS: if len(self.DEFAULT_DIRS[d][1]) > 0: newif += re.sub("TEMPLATETYPE", self.name, self.DEFAULT_DIRS[d][2].if_rules) for i in self.DEFAULT_DIRS[d][1]: if os.path.exists(i) and stat.S_ISSOCK(os.stat(i)[stat.ST_MODE]): newif += re.sub("TEMPLATETYPE", self.name, self.DEFAULT_DIRS[d][2].if_stream_rules) break newif += self.generate_user_if() newif += self.generate_dbus_if() newif += self.generate_admin_if() newif += self.generate_sandbox_if() newif += self.generate_new_type_if() newif += self.generate_new_rules() return newif def generate_default_types(self): return self.DEFAULT_TYPES[self.type][0]() def generate_default_rules(self): if self.DEFAULT_TYPES[self.type][1]: return self.DEFAULT_TYPES[self.type][1]() return "" def generate_roles_rules(self): newte = "" if self.type in (TUSER, XUSER, AUSER, LUSER): roles = "" if len(self.roles) > 0: newte += re.sub("TEMPLATETYPE", self.name, user.te_sudo_rules) newte += re.sub("TEMPLATETYPE", self.name, user.te_newrole_rules) for role in self.roles: tmp = re.sub("TEMPLATETYPE", self.name, user.te_roles_rules) newte += re.sub("ROLE", role, tmp) return newte def generate_te(self): newte = self.generate_default_types() for d in self.DEFAULT_KEYS: if len(self.DEFAULT_DIRS[d][1]) > 0: # CGI scripts already have a rw_t if self.type != CGI or d != "rw": newte += re.sub("TEMPLATETYPE", self.name, self.DEFAULT_DIRS[d][2].te_types) if self.type != EUSER: newte += """ ######################################## # # %s local policy # """ % self.name newte += self.generate_capabilities() newte += self.generate_process() newte += self.generate_network_types() newte += self.generate_tmp_types() newte += self.generate_booleans() newte += self.generate_default_rules() newte += self.generate_boolean_rules() for d in self.DEFAULT_KEYS: if len(self.DEFAULT_DIRS[d][1]) > 0: if self.type == EUSER: newte_tmp = "" for domain in self.existing_domains: newte_tmp += re.sub("TEMPLATETYPE_t", domain[:-2] + "_t", self.DEFAULT_DIRS[d][2].te_rules) newte += re.sub("TEMPLATETYPE_rw_t", self.name + "_rw_t", newte_tmp) else: newte += re.sub("TEMPLATETYPE", self.name, self.DEFAULT_DIRS[d][2].te_rules) for i in self.DEFAULT_DIRS[d][1]: if os.path.exists(i) and stat.S_ISSOCK(os.stat(i)[stat.ST_MODE]): if self.type == EUSER: for domain in self.existing_domains: newte += re.sub("TEMPLATETYPE", domain[:-2], self.DEFAULT_DIRS[d][2].te_stream_rules) else: newte += re.sub("TEMPLATETYPE", self.name, self.DEFAULT_DIRS[d][2].te_stream_rules) break newte += self.generate_tmp_rules() newte += self.generate_network_rules() newte += self.generate_fd_rules() newte += self.generate_etc_rules() newte += self.generate_pam_rules() newte += self.generate_uid_rules() newte += self.generate_audit_rules() newte += self.generate_syslog_rules() newte += self.generate_localization_rules() newte += self.generate_resolve_rules() newte += self.generate_roles_rules() newte += self.generate_mail_rules() newte += self.generate_transition_rules() newte += self.generate_admin_rules() newte += self.generate_dbus_rules() newte += self.generate_kerberos_rules() newte += self.generate_manage_krb5_rcache_rules() return newte def generate_fc(self): newfc = "" fclist = [] for i in self.files.keys(): if os.path.exists(i) and stat.S_ISSOCK(os.stat(i)[stat.ST_MODE]): t1 = re.sub("TEMPLATETYPE", self.name, self.files[i][2].fc_sock_file) else: t1 = re.sub("TEMPLATETYPE", self.name, self.files[i][2].fc_file) t2 = re.sub("FILENAME", i, t1) fclist.append(re.sub("FILETYPE", self.files[i][0], t2)) for i in self.dirs.keys(): t1 = re.sub("TEMPLATETYPE", self.name, self.dirs[i][2].fc_dir) t2 = re.sub("FILENAME", i, t1) fclist.append(re.sub("FILETYPE", self.dirs[i][0], t2)) if self.type in USERS + [SANDBOX]: if len(fclist) == 0: return executable.fc_user if self.type not in USERS + [SANDBOX, EUSER, NEWTYPE] and not self.program: raise ValueError(_("You must enter the executable path for your confined process")) if self.program: t1 = re.sub("EXECUTABLE", self.program, executable.fc_program) fclist.append(re.sub("TEMPLATETYPE", self.name, t1)) if self.initscript != "": t1 = re.sub("EXECUTABLE", self.initscript, executable.fc_initscript) fclist.append(re.sub("TEMPLATETYPE", self.name, t1)) fclist.sort() newfc = "\n".join(fclist) return newfc def generate_user_sh(self): newsh = "" if self.type not in (TUSER, XUSER, AUSER, LUSER, RUSER): return newsh roles = "" for role in self.roles: roles += " %s_r" % role if roles != "": roles += " system_r" tmp = re.sub("TEMPLATETYPE", self.name, script.users) newsh += re.sub("ROLES", roles, tmp) if self.type == RUSER or self.type == AUSER: for u in self.transition_users: tmp = re.sub("TEMPLATETYPE", self.name, script.admin_trans) newsh += re.sub("USER", u, tmp) if self.type == LUSER: newsh += re.sub("TEMPLATETYPE", self.name, script.min_login_user_default_context) else: newsh += re.sub("TEMPLATETYPE", self.name, script.x_login_user_default_context) return newsh def generate_sh(self): temp = re.sub("TEMPLATETYPE", self.file_name, script.compile) temp = re.sub("DOMAINTYPE", self.name, temp) if self.type == EUSER: newsh = re.sub("TEMPLATEFILE", "%s" % self.file_name, temp) else: newsh = re.sub("TEMPLATEFILE", self.file_name, temp) newsh += re.sub("DOMAINTYPE", self.name, script.manpage) if self.program: newsh += re.sub("FILENAME", self.program, script.restorecon) if self.initscript != "": newsh += re.sub("FILENAME", self.initscript, script.restorecon) for i in self.files.keys(): newsh += re.sub("FILENAME", i, script.restorecon) for i in self.dirs.keys(): newsh += re.sub("FILENAME", i, script.restorecon) for i in self.in_tcp[PORTS] + self.out_tcp[PORTS]: if self.find_port(i, "tcp") is None: t1 = re.sub("PORTNUM", "%d" % i, script.tcp_ports) newsh += re.sub("TEMPLATETYPE", self.name, t1) for i in self.in_udp[PORTS]: if self.find_port(i, "udp") is None: t1 = re.sub("PORTNUM", "%d" % i, script.udp_ports) newsh += re.sub("TEMPLATETYPE", self.name, t1) newsh += self.generate_user_sh() newsh += re.sub("TEMPLATEFILE", self.file_name, script.rpm) return newsh def generate_spec(self): newspec = "" selinux_policynvr = get_rpm_nvr_list("selinux-policy") if selinux_policynvr is None: selinux_policyver = "0.0.0" else: selinux_policyver = selinux_policynvr[1] newspec += spec.header_comment_section if self.type in APPLICATIONS: newspec += spec.define_relabel_files_begin if self.program: newspec += re.sub("FILENAME", self.program, spec.define_relabel_files_end) if self.initscript != "": newspec += re.sub("FILENAME", self.initscript, spec.define_relabel_files_end) for i in self.files.keys(): newspec += re.sub("FILENAME", i, spec.define_relabel_files_end) for i in self.dirs.keys(): newspec += re.sub("FILENAME", i, spec.define_relabel_files_end) newspec += re.sub("VERSION", selinux_policyver, spec.base_section) newspec = re.sub("MODULENAME", self.file_name, newspec) newspec = re.sub("DOMAINNAME", self.name, newspec) if len(self.rpms) > 0: newspec += "Requires(post): %s\n" % ", ".join(self.rpms) newspec += re.sub("MODULENAME", self.file_name, spec.mid_section) newspec = re.sub("DOMAINNAME", self.name, newspec) newspec = re.sub("TODAYSDATE", time.strftime("%a %b %e %Y"), newspec) if self.type not in APPLICATIONS: newspec = re.sub("%relabel_files", "", newspec) # Remove man pages from EUSER spec file if self.type == EUSER: newspec = re.sub(".*%s_selinux.8.*" % self.name, "", newspec) # Remove user context file from non users spec file if self.type not in (TUSER, XUSER, AUSER, LUSER, RUSER): newspec = re.sub(".*%s_u.*" % self.name, "", newspec) return newspec def write_spec(self, out_dir): specfile = "%s/%s_selinux.spec" % (out_dir, self.file_name) fd = open(specfile, "w") fd.write(self.generate_spec()) fd.close() return specfile def write_te(self, out_dir): tefile = "%s/%s.te" % (out_dir, self.file_name) fd = open(tefile, "w") fd.write(self.generate_te()) fd.close() return tefile def write_sh(self, out_dir): shfile = "%s/%s.sh" % (out_dir, self.file_name) fd = open(shfile, "w") fd.write(self.generate_sh()) fd.close() os.chmod(shfile, 0o750) return shfile def write_if(self, out_dir): iffile = "%s/%s.if" % (out_dir, self.file_name) fd = open(iffile, "w") fd.write(self.generate_if()) fd.close() return iffile def write_fc(self, out_dir): fcfile = "%s/%s.fc" % (out_dir, self.file_name) fd = open(fcfile, "w") fd.write(self.generate_fc()) fd.close() return fcfile def __extract_rpms(self): import yum yb = yum.YumBase() yb.setCacheDir() for pkg in yb.rpmdb.searchProvides(self.program): self.rpms.append(pkg.name) for fname in pkg.dirlist + pkg.filelist + pkg.ghostlist: for b in self.DEFAULT_DIRS: if b == "/etc": continue if fname.startswith(b): if os.path.isfile(fname): self.add_file(fname) else: self.add_dir(fname) for bpkg in yb.rpmdb.searchNames([pkg.base_package_name]): for fname in bpkg.dirlist + bpkg.filelist + bpkg.ghostlist: for b in self.DEFAULT_DIRS: if b == "/etc": continue if fname.startswith(b): if os.path.isfile(fname): self.add_file(fname) else: self.add_dir(fname) # some packages have own systemd subpackage # tor-systemd for example binary_name = self.program.split("/")[-1] for bpkg in yb.rpmdb.searchNames(["%s-systemd" % binary_name]): for fname in bpkg.filelist + bpkg.ghostlist + bpkg.dirlist: for b in self.DEFAULT_DIRS: if b == "/etc": continue if fname.startswith(b): if os.path.isfile(fname): self.add_file(fname) else: self.add_dir(fname) def gen_writeable(self): try: self.__extract_rpms() except ImportError: pass if os.path.isfile("/var/run/%s.pid" % self.name): self.add_file("/var/run/%s.pid" % self.name) if os.path.isdir("/var/run/%s" % self.name): self.add_dir("/var/run/%s" % self.name) if os.path.isdir("/var/log/%s" % self.name): self.add_dir("/var/log/%s" % self.name) if os.path.isfile("/var/log/%s.log" % self.name): self.add_file("/var/log/%s.log" % self.name) if os.path.isdir("/var/lib/%s" % self.name): self.add_dir("/var/lib/%s" % self.name) if os.path.isfile("/etc/rc.d/init.d/%s" % self.name): self.set_init_script(r"/etc/rc\.d/init\.d/%s" % self.name) # we don't want to have subdir in the .fc policy file # if we already specify labeling for parent dir temp_basepath = [] for p in self.DEFAULT_DIRS.keys(): temp_dirs = [] try: temp_basepath = self.DEFAULT_DIRS[p][1][0] + "/" except IndexError: continue for i in self.DEFAULT_DIRS[p][1]: if i.startswith(temp_basepath): temp_dirs.append(i) else: continue if len(temp_dirs) != 0: for i in temp_dirs: if i in self.dirs.keys(): del(self.dirs[i]) elif i in self.files.keys(): del(self.files[i]) else: continue self.DEFAULT_DIRS[p][1] = list(set(self.DEFAULT_DIRS[p][1]) - set(temp_dirs)) def gen_symbols(self): if self.type not in APPLICATIONS: return if not os.path.exists(self.program): sys.stderr.write(""" *************************************** Warning %s does not exist *************************************** """ % self.program) return fd = os.popen("nm -D %s | grep U" % self.program) for s in fd.read().split(): for b in self.symbols: if s.startswith(b): exec("self.%s" % self.symbols[b]) fd.close() def generate(self, out_dir=os.getcwd()): out = "Created the following files:\n" out += "%s # %s\n" % (self.write_te(out_dir), _("Type Enforcement file")) out += "%s # %s\n" % (self.write_if(out_dir), _("Interface file")) out += "%s # %s\n" % (self.write_fc(out_dir), _("File Contexts file")) if self.type != NEWTYPE: out += "%s # %s\n" % (self.write_spec(out_dir), _("Spec file")) out += "%s # %s\n" % (self.write_sh(out_dir), _("Setup Script")) return out selinux-python-3.0/sepolicy/sepolicy/gui.py000066400000000000000000004060121356774067000212200ustar00rootroot00000000000000# Copyright (C) 2013 Red Hat # see file 'COPYING' for use and warranty information # # selinux gui is a tool for the examining and modifying SELinux policy # # This program is free software; you can redistribute it and/or # modify it under the terms of the GNU General Public License as # published by the Free Software Foundation; either version 2 of # the License, or (at your option) any later version. # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program; if not, write to the Free Software # Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA # 02111-1307 USA # # author: Ryan Hallisey rhallisey@redhat.com # author: Dan Walsh dwalsh@redhat.com # author: Miroslav Grepl mgrepl@redhat.com # # import gi gi.require_version('Gtk', '3.0') from gi.repository import Gtk from gi.repository import Gdk from gi.repository import GLib from sepolicy.sedbus import SELinuxDBus import sys import sepolicy import selinux from selinux import DISABLED, PERMISSIVE, ENFORCING import sepolicy.network import sepolicy.manpage import dbus import os import re import unicodedata PROGNAME = "policycoreutils" try: import gettext kwargs = {} if sys.version_info < (3,): kwargs['unicode'] = True gettext.install(PROGNAME, localedir="/usr/share/locale", codeset='utf-8', **kwargs) except: try: import builtins builtins.__dict__['_'] = str except ImportError: import __builtin__ __builtin__.__dict__['_'] = unicode reverse_file_type_str = {} for f in sepolicy.file_type_str: reverse_file_type_str[sepolicy.file_type_str[f]] = f enabled = [_("No"), _("Yes")] action = [_("Disable"), _("Enable")] def cmp(a, b): if a is None and b is None: return 0 if a is None: return -1 if b is None: return 1 return (a > b) - (a < b) import distutils.sysconfig ADVANCED_LABEL = (_("Advanced >>"), _("Advanced <<")) ADVANCED_SEARCH_LABEL = (_("Advanced Search >>"), _("Advanced Search <<")) OUTBOUND_PAGE = 0 INBOUND_PAGE = 1 TRANSITIONS_FROM_PAGE = 0 TRANSITIONS_TO_PAGE = 1 TRANSITIONS_FILE_PAGE = 2 EXE_PAGE = 0 WRITABLE_PAGE = 1 APP_PAGE = 2 BOOLEANS_PAGE = 0 FILES_PAGE = 1 NETWORK_PAGE = 2 TRANSITIONS_PAGE = 3 LOGIN_PAGE = 4 USER_PAGE = 5 LOCKDOWN_PAGE = 6 SYSTEM_PAGE = 7 FILE_EQUIV_PAGE = 8 START_PAGE = 9 keys = ["boolean", "fcontext", "fcontext-equiv", "port", "login", "user", "module", "node", "interface"] DISABLED_TEXT = _(""" To change from Disabled to Enforcing mode - Change the system mode from Disabled to Permissive - Reboot, so that the system can relabel - Once the system is working as planned * Change the system mode to Enforcing """) class SELinuxGui(): def __init__(self, app=None, test=False): self.finish_init = False self.advanced_init = True self.opage = START_PAGE self.dbus = SELinuxDBus() try: customized = self.dbus.customized() except dbus.exceptions.DBusException as e: print(e) self.quit() self.init_cur() self.application = app self.filter_txt = "" builder = Gtk.Builder() # BUILDER OBJ self.code_path = distutils.sysconfig.get_python_lib(plat_specific=False) + "/sepolicy/" glade_file = self.code_path + "sepolicy.glade" builder.add_from_file(glade_file) self.outer_notebook = builder.get_object("outer_notebook") self.window = builder.get_object("SELinux_window") self.main_selection_window = builder.get_object("Main_selection_menu") self.main_advanced_label = builder.get_object("main_advanced_label") self.popup = 0 self.applications_selection_button = builder.get_object("applications_selection_button") self.revert_button = builder.get_object("Revert_button") self.busy_cursor = Gdk.Cursor(Gdk.CursorType.WATCH) self.ready_cursor = Gdk.Cursor(Gdk.CursorType.LEFT_PTR) self.initialtype = selinux.selinux_getpolicytype()[1] self.current_popup = None self.import_export = None self.clear_entry = True self.files_add = False self.network_add = False self.mislabeled_files = False self.all_domains = [] self.installed_list = [] self.previously_modified = {} # file dialog self.file_dialog = builder.get_object("add_path_dialog") # Error check *************************************** self.error_check_window = builder.get_object("error_check_window") self.error_check_label = builder.get_object("error_check_label") self.invalid_entry = False # Advanced search window **************************** self.advanced_search_window = builder.get_object("advanced_search_window") self.advanced_search_filter = builder.get_object("advanced_filter") self.advanced_search_filter.set_visible_func(self.filter_the_data) self.advanced_search_sort = builder.get_object("advanced_sort") self.advanced_filter_entry = builder.get_object("advanced_filter_entry") self.advanced_search_treeview = builder.get_object("advanced_search_treeview") self.advanced_search = False # Login Items ************************************** self.login_label = builder.get_object("Login_label") self.login_seuser_combobox = builder.get_object("login_seuser_combobox") self.login_seuser_combolist = builder.get_object("login_seuser_liststore") self.login_name_entry = builder.get_object("login_name_entry") self.login_mls_label = builder.get_object("login_mls_label") self.login_mls_entry = builder.get_object("login_mls_entry") self.login_radio_button = builder.get_object("Login_button") self.login_treeview = builder.get_object("login_treeview") self.login_liststore = builder.get_object("login_liststore") self.login_liststore.set_sort_column_id(0, Gtk.SortType.ASCENDING) self.login_filter = builder.get_object("login_filter") self.login_filter.set_visible_func(self.filter_the_data) self.login_popup_window = builder.get_object("login_popup_window") self.login_delete_liststore = builder.get_object("login_delete_liststore") self.login_delete_window = builder.get_object("login_delete_window") # Users Items ************************************** self.user_popup_window = builder.get_object("user_popup_window") self.user_radio_button = builder.get_object("User_button") self.user_liststore = builder.get_object("user_liststore") self.user_liststore.set_sort_column_id(0, Gtk.SortType.ASCENDING) self.user_filter = builder.get_object("user_filter") self.user_filter.set_visible_func(self.filter_the_data) self.user_treeview = builder.get_object("user_treeview") self.user_roles_combobox = builder.get_object("user_roles_combobox") self.user_roles_combolist = builder.get_object("user_roles_liststore") self.user_label = builder.get_object("User_label") self.user_name_entry = builder.get_object("user_name_entry") self.user_mls_label = builder.get_object("user_mls_label") self.user_mls_level_entry = builder.get_object("user_mls_level_entry") self.user_mls_entry = builder.get_object("user_mls_entry") self.user_combobox = builder.get_object("selinux_user_combobox") self.user_delete_liststore = builder.get_object("user_delete_liststore") self.user_delete_window = builder.get_object("user_delete_window") # File Equiv Items ************************************** self.file_equiv_label = builder.get_object("file_equiv_label") self.file_equiv_source_entry = builder.get_object("file_equiv_source_entry") self.file_equiv_dest_entry = builder.get_object("file_equiv_dest_entry") self.file_equiv_radio_button = builder.get_object("file_equiv_button") self.file_equiv_treeview = builder.get_object("file_equiv_treeview") self.file_equiv_liststore = builder.get_object("file_equiv_liststore") self.file_equiv_liststore.set_sort_column_id(0, Gtk.SortType.ASCENDING) self.file_equiv_popup_window = builder.get_object("file_equiv_popup_window") self.file_equiv_treefilter = builder.get_object("file_equiv_filter") self.file_equiv_treefilter.set_visible_func(self.filter_the_data) self.file_equiv_delete_liststore = builder.get_object("file_equiv_delete_liststore") self.file_equiv_delete_window = builder.get_object("file_equiv_delete_window") # System Items ************************************** self.app_system_button = builder.get_object("app_system_button") self.system_radio_button = builder.get_object("System_button") self.lockdown_radio_button = builder.get_object("Lockdown_button") self.systems_box = builder.get_object("Systems_box") self.relabel_button = builder.get_object("Relabel_button") self.relabel_button_no = builder.get_object("Relabel_button_no") self.advanced_system = builder.get_object("advanced_system") self.outer_notebook_frame = builder.get_object("outer_notebook_frame") self.system_policy_label = builder.get_object("system_policy_type_label") # Browse Items ************************************** self.select_button_browse = builder.get_object("select_button_browse") self.cancel_button_browse = builder.get_object("cancel_button_browse") # More types window items *************************** self.moreTypes_window_files = builder.get_object("moreTypes_window_files") self.more_types_files_liststore = builder.get_object("more_types_file_liststore") self.moreTypes_treeview = builder.get_object("moreTypes_treeview_files") # System policy type ******************************** self.system_policy_type_liststore = builder.get_object("system_policy_type_liststore") self.system_policy_type_combobox = builder.get_object("system_policy_type_combobox") self.policy_list = [] if self.populate_system_policy() < 2: self.advanced_system.set_visible(False) self.system_policy_label.set_visible(False) self.system_policy_type_combobox.set_visible(False) self.enforcing_button_default = builder.get_object("Enforcing_button_default") self.permissive_button_default = builder.get_object("Permissive_button_default") self.disabled_button_default = builder.get_object("Disabled_button_default") self.initialize_system_default_mode() # Lockdown Window ********************************* self.enable_unconfined_button = builder.get_object("enable_unconfined") self.disable_unconfined_button = builder.get_object("disable_unconfined") self.enable_permissive_button = builder.get_object("enable_permissive") self.disable_permissive_button = builder.get_object("disable_permissive") self.enable_ptrace_button = builder.get_object("enable_ptrace") self.disable_ptrace_button = builder.get_object("disable_ptrace") # Help Window ********************************* self.help_window = builder.get_object("help_window") self.help_text = builder.get_object("help_textv") self.info_text = builder.get_object("info_text") self.help_image = builder.get_object("help_image") self.forward_button = builder.get_object("forward_button") self.back_button = builder.get_object("back_button") # Update menu items ********************************* self.update_window = builder.get_object("update_window") self.update_treeview = builder.get_object("update_treeview") self.update_treestore = builder.get_object("Update_treestore") self.apply_button = builder.get_object("apply_button") self.update_button = builder.get_object("Update_button") # Add button objects ******************************** self.add_button = builder.get_object("Add_button") self.delete_button = builder.get_object("Delete_button") self.files_path_entry = builder.get_object("files_path_entry") self.network_ports_entry = builder.get_object("network_ports_entry") self.files_popup_window = builder.get_object("files_popup_window") self.network_popup_window = builder.get_object("network_popup_window") self.popup_network_label = builder.get_object("Network_label") self.popup_files_label = builder.get_object("files_label") self.recursive_path_toggle = builder.get_object("make_path_recursive") self.files_type_combolist = builder.get_object("files_type_combo_store") self.files_class_combolist = builder.get_object("files_class_combo_store") self.files_type_combobox = builder.get_object("files_type_combobox") self.files_class_combobox = builder.get_object("files_class_combobox") self.files_mls_label = builder.get_object("files_mls_label") self.files_mls_entry = builder.get_object("files_mls_entry") self.advanced_text_files = builder.get_object("Advanced_text_files") self.files_cancel_button = builder.get_object("cancel_delete_files") self.network_tcp_button = builder.get_object("tcp_button") self.network_udp_button = builder.get_object("udp_button") self.network_port_type_combolist = builder.get_object("network_type_combo_store") self.network_port_type_combobox = builder.get_object("network_type_combobox") self.network_mls_label = builder.get_object("network_mls_label") self.network_mls_entry = builder.get_object("network_mls_entry") self.advanced_text_network = builder.get_object("Advanced_text_network") self.network_cancel_button = builder.get_object("cancel_network_delete") # Add button objects ******************************** # Modify items ************************************** self.show_mislabeled_files_only = builder.get_object("Show_mislabeled_files") self.mislabeled_files_label = builder.get_object("mislabeled_files_label") self.warning_files = builder.get_object("warning_files") self.modify_button = builder.get_object("Modify_button") self.modify_button.set_sensitive(False) # Modify items ************************************** # Fix label ***************************************** self.fix_label_window = builder.get_object("fix_label_window") self.fixlabel_label = builder.get_object("fixlabel_label") self.fix_label_cancel = builder.get_object("fix_label_cancel") # Fix label ***************************************** # Delete items ************************************** self.files_delete_window = builder.get_object("files_delete_window") self.files_delete_treeview = builder.get_object("files_delete_treeview") self.files_delete_liststore = builder.get_object("files_delete_liststore") self.network_delete_window = builder.get_object("network_delete_window") self.network_delete_treeview = builder.get_object("network_delete_treeview") self.network_delete_liststore = builder.get_object("network_delete_liststore") # Delete items ************************************** # Progress bar ************************************** self.progress_bar = builder.get_object("progress_bar") # Progress bar ************************************** # executable_files items **************************** self.executable_files_treeview = builder.get_object("Executable_files_treeview") # Get the executable files tree view self.executable_files_filter = builder.get_object("executable_files_filter") self.executable_files_filter.set_visible_func(self.filter_the_data) self.executable_files_tab = builder.get_object("Executable_files_tab") self.executable_files_tab_tooltip_txt = self.executable_files_tab.get_tooltip_text() self.executable_files_liststore = builder.get_object("executable_files_treestore") self.executable_files_liststore.set_sort_column_id(0, Gtk.SortType.ASCENDING) self.files_radio_button = builder.get_object("files_button") self.files_button_tooltip_txt = self.files_radio_button.get_tooltip_text() # executable_files items **************************** # writable files items ****************************** self.writable_files_treeview = builder.get_object("Writable_files_treeview") # Get the Writable files tree view self.writable_files_liststore = builder.get_object("writable_files_treestore") # Contains the tree with File Path, SELinux File Label, Class self.writable_files_liststore.set_sort_column_id(0, Gtk.SortType.ASCENDING) self.writable_files_filter = builder.get_object("writable_files_filter") self.writable_files_filter.set_visible_func(self.filter_the_data) self.writable_files_tab = builder.get_object("Writable_files_tab") self.writable_files_tab_tooltip_txt = self.writable_files_tab.get_tooltip_text() # writable files items ****************************** # Application File Types **************************** self.application_files_treeview = builder.get_object("Application_files_treeview") # Get the Application files tree view self.application_files_filter = builder.get_object("application_files_filter") # Contains the tree with File Path, Description, Class self.application_files_filter.set_visible_func(self.filter_the_data) self.application_files_tab = builder.get_object("Application_files_tab") self.application_files_tab_tooltip_txt = self.writable_files_tab.get_tooltip_text() self.application_files_liststore = builder.get_object("application_files_treestore") self.application_files_liststore.set_sort_column_id(0, Gtk.SortType.ASCENDING) self.application_files_tab = builder.get_object("Application_files_tab") self.application_files_tab_tooltip_txt = self.application_files_tab.get_tooltip_text() # Application File Type ***************************** # network items ************************************* self.network_radio_button = builder.get_object("network_button") self.network_button_tooltip_txt = self.network_radio_button.get_tooltip_text() self.network_out_treeview = builder.get_object("outbound_treeview") self.network_out_liststore = builder.get_object("network_out_liststore") self.network_out_liststore.set_sort_column_id(0, Gtk.SortType.ASCENDING) self.network_out_filter = builder.get_object("network_out_filter") self.network_out_filter.set_visible_func(self.filter_the_data) self.network_out_tab = builder.get_object("network_out_tab") self.network_out_tab_tooltip_txt = self.network_out_tab.get_tooltip_text() self.network_in_treeview = builder.get_object("inbound_treeview") self.network_in_liststore = builder.get_object("network_in_liststore") self.network_in_liststore.set_sort_column_id(0, Gtk.SortType.ASCENDING) self.network_in_filter = builder.get_object("network_in_filter") self.network_in_filter.set_visible_func(self.filter_the_data) self.network_in_tab = builder.get_object("network_in_tab") self.network_in_tab_tooltip_txt = self.network_in_tab.get_tooltip_text() # network items ************************************* # boolean items ************************************ self.boolean_treeview = builder.get_object("Boolean_treeview") # Get the booleans tree list self.boolean_liststore = builder.get_object("boolean_liststore") self.boolean_liststore.set_sort_column_id(2, Gtk.SortType.ASCENDING) self.boolean_filter = builder.get_object("boolean_filter") self.boolean_filter.set_visible_func(self.filter_the_data) self.boolean_more_detail_window = builder.get_object("booleans_more_detail_window") self.boolean_more_detail_treeview = builder.get_object("booleans_more_detail_treeview") self.boolean_more_detail_tree_data_set = builder.get_object("booleans_more_detail_liststore") self.boolean_radio_button = builder.get_object("Booleans_button") self.active_button = self.boolean_radio_button self.boolean_button_tooltip_txt = self.boolean_radio_button.get_tooltip_text() # boolean items ************************************ # transitions items ************************************ self.transitions_into_treeview = builder.get_object("transitions_into_treeview") # Get the transitions tree list Enabled, source, Executable File self.transitions_into_liststore = builder.get_object("transitions_into_liststore") # Contains the tree with self.transitions_into_liststore.set_sort_column_id(1, Gtk.SortType.ASCENDING) self.transitions_into_filter = builder.get_object("transitions_into_filter") self.transitions_into_filter.set_visible_func(self.filter_the_data) self.transitions_into_tab = builder.get_object("Transitions_into_tab") self.transitions_into_tab_tooltip_txt = self.transitions_into_tab.get_tooltip_text() self.transitions_radio_button = builder.get_object("Transitions_button") self.transitions_button_tooltip_txt = self.transitions_radio_button.get_tooltip_text() self.transitions_from_treeview = builder.get_object("transitions_from_treeview") # Get the transitions tree list self.transitions_from_treestore = builder.get_object("transitions_from_treestore") # Contains the tree with Enabled, Executable File Type, Transtype self.transitions_from_treestore.set_sort_column_id(2, Gtk.SortType.ASCENDING) self.transitions_from_filter = builder.get_object("transitions_from_filter") self.transitions_from_filter.set_visible_func(self.filter_the_data) self.transitions_from_tab = builder.get_object("Transitions_from_tab") self.transitions_from_tab_tooltip_txt = self.transitions_from_tab.get_tooltip_text() self.transitions_file_treeview = builder.get_object("file_transitions_treeview") # Get the transitions tree list self.transitions_file_liststore = builder.get_object("file_transitions_liststore") # Contains the tree with Enabled, Executable File Type, Transtype self.transitions_file_liststore.set_sort_column_id(0, Gtk.SortType.ASCENDING) self.transitions_file_filter = builder.get_object("file_transitions_filter") self.transitions_file_filter.set_visible_func(self.filter_the_data) self.transitions_file_tab = builder.get_object("file_transitions") self.transitions_file_tab_tooltip_txt = self.transitions_from_tab.get_tooltip_text() # transitions items ************************************ # Combobox and Entry items ************************** self.combobox_menu = builder.get_object("combobox_org") # This is the combobox box object, aka the arrow next to the entry text bar self.application_liststore = builder.get_object("application_liststore") self.completion_entry = builder.get_object("completion_entry") # self.combobox_menu.get_child() self.entrycompletion_obj = builder.get_object("entrycompletion_obj") #self.entrycompletion_obj = Gtk.EntryCompletion() self.entrycompletion_obj.set_minimum_key_length(0) self.entrycompletion_obj.set_text_column(0) self.entrycompletion_obj.set_match_func(self.match_func, None) self.completion_entry.set_completion(self.entrycompletion_obj) self.completion_entry.set_icon_from_stock(0, Gtk.STOCK_FIND) # Combobox and Entry items ************************** # Modify buttons ************************************ self.show_modified_only = builder.get_object("Show_modified_only_toggle") # Modify button ************************************* # status bar ***************************************** self.current_status_label = builder.get_object("Enforcing_label") self.current_status_enforcing = builder.get_object("Enforcing_button") self.current_status_permissive = builder.get_object("Permissive_button") self.status_bar = builder.get_object("status_bar") self.context_id = self.status_bar.get_context_id("SELinux status") # filters ********************************************* self.filter_entry = builder.get_object("filter_entry") self.filter_box = builder.get_object("filter_box") self.add_modify_delete_box = builder.get_object("add_modify_delete_box") # Get_model() sets the tree model filter to be the parent of the tree model (tree model has all the data in it) # Toggle button **************************************** self.cell = builder.get_object("activate") self.del_cell_files = builder.get_object("files_toggle_delete") self.del_cell_files.connect("toggled", self.on_toggle_update, self.files_delete_liststore) self.del_cell_files_equiv = builder.get_object("file_equiv_toggle_delete1") self.del_cell_files_equiv.connect("toggled", self.on_toggle_update, self.file_equiv_delete_liststore) self.del_cell_user = builder.get_object("user_toggle_delete") self.del_cell_user.connect("toggled", self.on_toggle_update, self.user_delete_liststore) self.del_cell_login = builder.get_object("login_toggle_delete") self.del_cell_login.connect("toggled", self.on_toggle_update, self.login_delete_liststore) self.del_cell_network = builder.get_object("network_toggle_delete") self.del_cell_network.connect("toggled", self.on_toggle_update, self.network_delete_liststore) self.update_cell = builder.get_object("toggle_update") # Notebook items *************************************** self.outer_notebook = builder.get_object("outer_notebook") self.inner_notebook_files = builder.get_object("files_inner_notebook") self.inner_notebook_network = builder.get_object("network_inner_notebook") self.inner_notebook_transitions = builder.get_object("transitions_inner_notebook") # logind gui *************************************** loading_gui = builder.get_object("loading_gui") self.update_cell.connect("toggled", self.on_toggle_update, self.update_treestore) self.all_entries = [] # Need to connect button on code because the tree view model is a treeviewsort self.cell.connect("toggled", self.on_toggle, self.boolean_liststore) self.loading = 1 path = None if test: self.all_domains = ["httpd_t", "abrt_t"] if app and app not in self.all_domains: self.all_domains.append(app) else: self.all_domains = sepolicy.get_all_domains() self.all_domains.sort(key=str.lower) if app and app not in self.all_domains: self.error(_("%s is not a valid domain") % app) self.quit() loading_gui.show() length = len(self.all_domains) entrypoint_dict = sepolicy.get_init_entrypoints_str() for domain in self.all_domains: # After the user selects a path in the drop down menu call # get_init_entrypoint_target(entrypoint) to get the transtype # which will give you the application self.combo_box_add(domain, domain) self.percentage = float(float(self.loading) / float(length)) self.progress_bar.set_fraction(self.percentage) self.progress_bar.set_pulse_step(self.percentage) self.idle_func() for entrypoint in entrypoint_dict.get(domain, []): path = sepolicy.find_entrypoint_path(entrypoint) if path: self.combo_box_add(path, domain) self.installed_list.append(path) self.loading += 1 loading_gui.hide() self.entrycompletion_obj.set_model(self.application_liststore) self.advanced_search_treeview.set_model(self.advanced_search_sort) dic = { "on_combo_button_clicked": self.open_combo_menu, "on_disable_ptrace_toggled": self.on_disable_ptrace, "on_SELinux_window_configure_event": self.hide_combo_menu, "on_entrycompletion_obj_match_selected": self.set_application_label, "on_filter_changed": self.get_filter_data, "on_save_changes_file_equiv_clicked": self.update_to_file_equiv, "on_save_changes_login_clicked": self.update_to_login, "on_save_changes_user_clicked": self.update_to_user, "on_save_changes_files_clicked": self.update_to_files, "on_save_changes_network_clicked": self.update_to_network, "on_Advanced_text_files_button_press_event": self.reveal_advanced, "item_in_tree_selected": self.cursor_changed, "on_Application_file_types_treeview_configure_event": self.resize_wrap, "on_save_delete_clicked": self.on_save_delete_clicked, "on_moreTypes_treeview_files_row_activated": self.populate_type_combo, "on_retry_button_files_clicked": self.invalid_entry_retry, "on_make_path_recursive_toggled": self.recursive_path, "on_files_path_entry_button_press_event": self.highlight_entry_text, "on_files_path_entry_changed": self.autofill_add_files_entry, "on_select_type_files_clicked": self.select_type_more, "on_choose_file": self.on_browse_select, "on_Enforcing_button_toggled": self.set_enforce, "on_confirmation_close": self.confirmation_close, "on_column_clicked": self.column_clicked, "on_tab_switch": self.clear_filters, "on_file_equiv_button_clicked": self.show_file_equiv_page, "on_app/system_button_clicked": self.system_interface, "on_app/users_button_clicked": self.users_interface, "on_show_advanced_search_window": self.on_show_advanced_search_window, "on_Show_mislabeled_files_toggled": self.show_mislabeled_files, "on_Browse_button_files_clicked": self.browse_for_files, "on_cancel_popup_clicked": self.close_popup, "on_treeview_cursor_changed": self.cursor_changed, "on_login_seuser_combobox_changed": self.login_seuser_combobox_change, "on_user_roles_combobox_changed": self.user_roles_combobox_change, "on_cancel_button_browse_clicked": self.close_config_window, "on_apply_button_clicked": self.apply_changes_button_press, "on_Revert_button_clicked": self.update_or_revert_changes, "on_Update_button_clicked": self.update_or_revert_changes, "on_advanced_filter_entry_changed": self.get_advanced_filter_data, "on_advanced_search_treeview_row_activated": self.advanced_item_selected, "on_Select_advanced_search_clicked": self.advanced_item_button_push, "on_info_button_button_press_event": self.on_help_button, "on_back_button_clicked": self.on_help_back_clicked, "on_forward_button_clicked": self.on_help_forward_clicked, "on_Boolean_treeview_columns_changed": self.resize_columns, "on_completion_entry_changed": self.application_selected, "on_Add_button_clicked": self.add_button_clicked, "on_Delete_button_clicked": self.delete_button_clicked, "on_Modify_button_clicked": self.modify_button_clicked, "on_Show_modified_only_toggled": self.on_show_modified_only, "on_cancel_button_config_clicked": self.close_config_window, "on_Import_button_clicked": self.import_config_show, "on_Export_button_clicked": self.export_config_show, "on_enable_unconfined_toggled": self.unconfined_toggle, "on_enable_permissive_toggled": self.permissive_toggle, "on_system_policy_type_combobox_changed": self.change_default_policy, "on_Enforcing_button_default_toggled": self.change_default_mode, "on_Permissive_button_default_toggled": self.change_default_mode, "on_Disabled_button_default_toggled": self.change_default_mode, "on_Relabel_button_toggled_cb": self.relabel_on_reboot, "on_advanced_system_button_press_event": self.reveal_advanced_system, "on_files_type_combobox_changed": self.show_more_types, "on_filter_row_changed": self.filter_the_data, "on_button_toggled": self.tab_change, "gtk_main_quit": self.closewindow } self.previously_modified_initialize(customized) builder.connect_signals(dic) self.window.show() # Show the gui to the screen GLib.timeout_add_seconds(5, self.selinux_status) self.selinux_status() self.lockdown_inited = False self.add_modify_delete_box.hide() self.filter_box.hide() if self.status == DISABLED: self.show_system_page() else: if self.application: self.applications_selection_button.set_label(self.application) self.completion_entry.set_text(self.application) self.show_applications_page() self.tab_change() else: self.clearbuttons() self.outer_notebook.set_current_page(START_PAGE) self.reinit() self.finish_init = True Gtk.main() def init_cur(self): self.cur_dict = {} for k in keys: self.cur_dict[k] = {} def remove_cur(self, ctr): i = 0 for k in self.cur_dict: for j in self.cur_dict[k]: if i == ctr: del(self.cur_dict[k][j]) return i += 1 def selinux_status(self): try: self.status = selinux.security_getenforce() except OSError: self.status = DISABLED if self.status == DISABLED: self.current_status_label.set_sensitive(False) self.current_status_enforcing.set_sensitive(False) self.current_status_permissive.set_sensitive(False) self.enforcing_button_default.set_sensitive(False) self.status_bar.push(self.context_id, _("System Status: Disabled")) self.info_text.set_label(DISABLED_TEXT) else: self.set_enforce_text(self.status) if os.path.exists('/.autorelabel'): self.relabel_button.set_active(True) else: self.relabel_button_no.set_active(True) policytype = selinux.selinux_getpolicytype()[1] mode = selinux.selinux_getenforcemode()[1] if mode == ENFORCING: self.enforcing_button_default.set_active(True) if mode == PERMISSIVE: self.permissive_button_default.set_active(True) if mode == DISABLED: self.disabled_button_default.set_active(True) return True def lockdown_init(self): if self.lockdown_inited: return self.wait_mouse() self.lockdown_inited = True self.disable_ptrace_button.set_active(selinux.security_get_boolean_active("deny_ptrace")) self.module_dict = {} for m in self.dbus.semodule_list().split("\n"): mod = m.split() if len(mod) < 3: continue self.module_dict[mod[1]] = { "priority": mod[0], "Disabled" : (len(mod) > 3) } self.enable_unconfined_button.set_active(not self.module_dict["unconfined"]["Disabled"]) self.enable_permissive_button.set_active(not self.module_dict["permissivedomains"]["Disabled"]) self.ready_mouse() def column_clicked(self, treeview, treepath, treecol, *args): iter = self.get_selected_iter() if not iter: return if self.opage == BOOLEANS_PAGE: if treecol.get_name() == "more_detail_col": self.display_more_detail(self.window, treepath) if self.opage == FILES_PAGE: visible = self.liststore.get_value(iter, 3) # If visible is true then fix mislabeled will be visible if treecol.get_name() == "restorecon_col" and visible: self.fix_mislabeled(self.liststore.get_value(iter, 0)) if self.opage == TRANSITIONS_PAGE: bool_name = self.liststore.get_value(iter, 1) if bool_name: self.boolean_radio_button.clicked() self.filter_entry.set_text(bool_name) def idle_func(self): while Gtk.events_pending(): Gtk.main_iteration() def match_func(self, completion, key_string, iter, func_data): try: if self.application_liststore.get_value(iter, 0).find(key_string) != -1: return True return False except AttributeError: pass def help_show_page(self): self.back_button.set_sensitive(self.help_page != 0) self.forward_button.set_sensitive(self.help_page < (len(self.help_list) - 1)) try: fd = open("%shelp/%s.txt" % (self.code_path, self.help_list[self.help_page]), "r") buf = fd.read() fd.close() except IOError: buf = "" help_text = self.help_text.get_buffer() help_text.set_text(buf % {"APP": self.application}) self.help_text.set_buffer(help_text) self.help_image.set_from_file("%shelp/%s.png" % (self.code_path, self.help_list[self.help_page])) self.show_popup(self.help_window) def on_help_back_clicked(self, *args): self.help_page -= 1 self.help_show_page() def on_help_forward_clicked(self, *args): self.help_page += 1 self.help_show_page() def on_help_button(self, *args): self.help_page = 0 self.help_list = [] if self.opage == START_PAGE: self.help_window.set_title(_("Help: Start Page")) self.help_list = ["start"] if self.opage == BOOLEANS_PAGE: self.help_window.set_title(_("Help: Booleans Page")) self.help_list = ["booleans", "booleans_toggled", "booleans_more", "booleans_more_show"] if self.opage == FILES_PAGE: ipage = self.inner_notebook_files.get_current_page() if ipage == EXE_PAGE: self.help_window.set_title(_("Help: Executable Files Page")) self.help_list = ["files_exec"] if ipage == WRITABLE_PAGE: self.help_window.set_title(_("Help: Writable Files Page")) self.help_list = ["files_write"] if ipage == APP_PAGE: self.help_window.set_title(_("Help: Application Types Page")) self.help_list = ["files_app"] if self.opage == NETWORK_PAGE: ipage = self.inner_notebook_network.get_current_page() if ipage == OUTBOUND_PAGE: self.help_window.set_title(_("Help: Outbound Network Connections Page")) self.help_list = ["ports_outbound"] if ipage == INBOUND_PAGE: self.help_window.set_title(_("Help: Inbound Network Connections Page")) self.help_list = ["ports_inbound"] if self.opage == TRANSITIONS_PAGE: ipage = self.inner_notebook_transitions.get_current_page() if ipage == TRANSITIONS_FROM_PAGE: self.help_window.set_title(_("Help: Transition from application Page")) self.help_list = ["transition_from", "transition_from_boolean", "transition_from_boolean_1", "transition_from_boolean_2"] if ipage == TRANSITIONS_TO_PAGE: self.help_window.set_title(_("Help: Transition into application Page")) self.help_list = ["transition_to"] if ipage == TRANSITIONS_FILE_PAGE: self.help_window.set_title(_("Help: Transition application file Page")) self.help_list = ["transition_file"] if self.opage == SYSTEM_PAGE: self.help_window.set_title(_("Help: Systems Page")) self.help_list = ["system", "system_boot_mode", "system_current_mode", "system_export", "system_policy_type", "system_relabel"] if self.opage == LOCKDOWN_PAGE: self.help_window.set_title(_("Help: Lockdown Page")) self.help_list = ["lockdown", "lockdown_unconfined", "lockdown_permissive", "lockdown_ptrace"] if self.opage == LOGIN_PAGE: self.help_window.set_title(_("Help: Login Page")) self.help_list = ["login", "login_default"] if self.opage == USER_PAGE: self.help_window.set_title(_("Help: SELinux User Page")) self.help_list = ["users"] if self.opage == FILE_EQUIV_PAGE: self.help_window.set_title(_("Help: File Equivalence Page")) self.help_list = ["file_equiv"] return self.help_show_page() def open_combo_menu(self, *args): if self.popup == 0: self.popup = 1 location = self.window.get_position() self.main_selection_window.move(location[0] + 2, location[1] + 65) self.main_selection_window.show() else: self.main_selection_window.hide() self.popup = 0 def hide_combo_menu(self, *args): self.main_selection_window.hide() self.popup = 0 def set_application_label(self, *args): self.set_application_label = True def resize_wrap(self, *args): print(args) def initialize_system_default_mode(self): self.enforce_mode = selinux.selinux_getenforcemode()[1] if self.enforce_mode == ENFORCING: self.enforce_button = self.enforcing_button_default if self.enforce_mode == PERMISSIVE: self.enforce_button = self.permissive_button_default if self.enforce_mode == DISABLED: self.enforce_button = self.disabled_button_default def populate_system_policy(self): types = next(os.walk(selinux.selinux_path(), topdown=True))[1] types.sort() ctr = 0 for item in types: iter = self.system_policy_type_liststore.append() self.system_policy_type_liststore.set_value(iter, 0, item) if item == self.initialtype: self.system_policy_type_combobox.set_active(ctr) self.typeHistory = ctr ctr += 1 return ctr def filter_the_data(self, list, iter, *args): # When there is no txt in the box show all items in the tree if self.filter_txt == "": return True try: for x in range(0, list.get_n_columns()): try: val = list.get_value(iter, x) if val is True or val is False or val is None: continue # Returns true if filter_txt exists within the val if(val.find(self.filter_txt) != -1 or val.lower().find(self.filter_txt) != -1): return True except (AttributeError, TypeError): pass except: # ValueError: pass return False def net_update(self, app, netd, protocol, direction, model): for k in netd.keys(): for t, ports in netd[k]: pkey = (",".join(ports), protocol) if pkey in self.cur_dict["port"]: if self.cur_dict["port"][pkey]["action"] == "-d": continue if t != self.cur_dict["port"][pkey]["type"]: continue self.network_initial_data_insert(model, ", ".join(ports), t, protocol) def file_equiv_initialize(self): self.wait_mouse() edict = sepolicy.get_file_equiv() self.file_equiv_liststore.clear() for f in edict: iter = self.file_equiv_liststore.append() if edict[f]["modify"]: name = self.markup(f) equiv = self.markup(edict[f]["equiv"]) else: name = f equiv = edict[f]["equiv"] self.file_equiv_liststore.set_value(iter, 0, name) self.file_equiv_liststore.set_value(iter, 1, equiv) self.file_equiv_liststore.set_value(iter, 2, edict[f]["modify"]) self.ready_mouse() def user_initialize(self): self.wait_mouse() self.user_liststore.clear() for u in sepolicy.get_selinux_users(): iter = self.user_liststore.append() self.user_liststore.set_value(iter, 0, str(u["name"])) roles = u["roles"] if "object_r" in roles: roles.remove("object_r") self.user_liststore.set_value(iter, 1, ", ".join(roles)) self.user_liststore.set_value(iter, 2, u.get("level", "")) self.user_liststore.set_value(iter, 3, u.get("range", "")) self.user_liststore.set_value(iter, 4, True) self.ready_mouse() def login_initialize(self): self.wait_mouse() self.login_liststore.clear() for u in sepolicy.get_login_mappings(): iter = self.login_liststore.append() self.login_liststore.set_value(iter, 0, u["name"]) self.login_liststore.set_value(iter, 1, u["seuser"]) self.login_liststore.set_value(iter, 2, u["mls"]) self.login_liststore.set_value(iter, 3, True) self.ready_mouse() def network_initialize(self, app): netd = sepolicy.network.get_network_connect(app, "tcp", "name_connect", check_bools=True) self.net_update(app, netd, "tcp", OUTBOUND_PAGE, self.network_out_liststore) netd = sepolicy.network.get_network_connect(app, "tcp", "name_bind", check_bools=True) self.net_update(app, netd, "tcp", INBOUND_PAGE, self.network_in_liststore) netd = sepolicy.network.get_network_connect(app, "udp", "name_bind", check_bools=True) self.net_update(app, netd, "udp", INBOUND_PAGE, self.network_in_liststore) def network_initial_data_insert(self, model, ports, portType, protocol): iter = model.append() model.set_value(iter, 0, ports) model.set_value(iter, 1, protocol) model.set_value(iter, 2, portType) model.set_value(iter, 4, True) def combo_set_active_text(self, combobox, val): ctr = 0 liststore = combobox.get_model() for i in liststore: if i[0] == val: combobox.set_active(ctr) return ctr += 1 niter = liststore.get_iter(ctr - 1) if liststore.get_value(niter, 0) == _("More..."): iter = liststore.insert_before(niter) ctr = ctr - 1 else: iter = liststore.append() liststore.set_value(iter, 0, val) combobox.set_active(ctr) def combo_get_active_text(self, combobox): liststore = combobox.get_model() index = combobox.get_active() if index < 0: return None iter = liststore.get_iter(index) return liststore.get_value(iter, 0) def combo_box_add(self, val, val1): if val is None: return iter = self.application_liststore.append() self.application_liststore.set_value(iter, 0, val) self.application_liststore.set_value(iter, 1, val1) def select_type_more(self, *args): app = self.moreTypes_treeview.get_selection() iter = app.get_selected()[1] if iter is None: return app = self.more_types_files_liststore.get_value(iter, 0) self.combo_set_active_text(self.files_type_combobox, app) self.closewindow(self.moreTypes_window_files) def advanced_item_button_push(self, *args): row = self.advanced_search_treeview.get_selection() model, iter = row.get_selected() iter = model.convert_iter_to_child_iter(iter) iter = self.advanced_search_filter.convert_iter_to_child_iter(iter) app = self.application_liststore.get_value(iter, 1) if app is None: return self.advanced_filter_entry.set_text('') self.advanced_search_window.hide() self.reveal_advanced(self.main_advanced_label) self.completion_entry.set_text(app) def advanced_item_selected(self, treeview, path, *args): iter = self.advanced_search_filter.get_iter(path) iter = self.advanced_search_filter.convert_iter_to_child_iter(iter) app = self.application_liststore.get_value(iter, 1) self.advanced_filter_entry.set_text('') self.advanced_search_window.hide() self.reveal_advanced(self.main_advanced_label) self.completion_entry.set_text(app) self.application_selected() def find_application(self, app): if app and len(app) > 0: for items in self.application_liststore: if app == items[0]: return True return False def application_selected(self, *args): self.show_mislabeled_files_only.set_visible(False) self.mislabeled_files_label.set_visible(False) self.warning_files.set_visible(False) self.filter_entry.set_text('') app = self.completion_entry.get_text() if not self.find_application(app): return self.show_applications_page() self.add_button.set_sensitive(True) self.delete_button.set_sensitive(True) # Clear the tree to prepare for a new selection otherwise self.executable_files_liststore.clear() # data will pile up every time the user selects a new item from the drop down menu self.network_in_liststore.clear() self.network_out_liststore.clear() self.boolean_liststore.clear() self.transitions_into_liststore.clear() self.transitions_from_treestore.clear() self.application_files_liststore.clear() self.writable_files_liststore.clear() self.transitions_file_liststore.clear() try: if app[0] == '/': app = sepolicy.get_init_transtype(app) if not app: return self.application = app except IndexError: pass self.wait_mouse() self.previously_modified_initialize(self.dbus.customized()) self.reinit() self.boolean_initialize(app) self.mislabeled_files = False self.executable_files_initialize(app) self.network_initialize(app) self.writable_files_initialize(app) self.transitions_into_initialize(app) self.transitions_from_initialize(app) self.application_files_initialize(app) self.transitions_files_initialize(app) self.executable_files_tab.set_tooltip_text(_("File path used to enter the '%s' domain.") % app) self.writable_files_tab.set_tooltip_text(_("Files to which the '%s' domain can write.") % app) self.network_out_tab.set_tooltip_text(_("Network Ports to which the '%s' is allowed to connect.") % app) self.network_in_tab.set_tooltip_text(_("Network Ports to which the '%s' is allowed to listen.") % app) self.application_files_tab.set_tooltip_text(_("File Types defined for the '%s'.") % app) self.boolean_radio_button.set_tooltip_text(_("Display boolean information that can be used to modify the policy for the '%s'.") % app) self.files_radio_button.set_tooltip_text(_("Display file type information that can be used by the '%s'.") % app) self.network_radio_button.set_tooltip_text(_("Display network ports to which the '%s' can connect or listen to.") % app) self.transitions_into_tab.set_label(_("Application Transitions Into '%s'") % app) self.transitions_from_tab.set_label(_("Application Transitions From '%s'") % app) self.transitions_file_tab.set_label(_("File Transitions From '%s'") % app) self.transitions_into_tab.set_tooltip_text(_("Executables which will transition to '%s', when executing selected domains entrypoint.") % app) self.transitions_from_tab.set_tooltip_text(_("Executables which will transition to a different domain, when '%s' executes them.") % app) self.transitions_file_tab.set_tooltip_text(_("Files by '%s' with transitions to a different label.") % app) self.transitions_radio_button.set_tooltip_text(_("Display applications that can transition into or out of the '%s'.") % app) self.application = app self.applications_selection_button.set_label(self.application) self.ready_mouse() def reinit(self): sepolicy.reinit() self.fcdict = sepolicy.get_fcdict() self.local_file_paths = sepolicy.get_local_file_paths() def previously_modified_initialize(self, buf): self.cust_dict = {} for i in buf.split("\n"): rec = i.split() if len(rec) == 0: continue if rec[1] == "-D": continue if rec[0] not in self.cust_dict: self.cust_dict[rec[0]] = {} if rec[0] == "boolean": self.cust_dict["boolean"][rec[-1]] = {"active": rec[2] == "-1"} if rec[0] == "login": self.cust_dict["login"][rec[-1]] = {"seuser": rec[3], "range": rec[5]} if rec[0] == "interface": self.cust_dict["interface"][rec[-1]] = {"type": rec[3]} if rec[0] == "user": self.cust_dict["user"][rec[-1]] = {"level": "s0", "range": rec[3], "role": rec[5]} if rec[0] == "port": self.cust_dict["port"][(rec[-1], rec[-2])] = {"type": rec[3]} if rec[0] == "node": self.cust_dict["node"][rec[-1]] = {"mask": rec[3], "protocol": rec[5], "type": rec[7]} if rec[0] == "fcontext": if rec[2] == "-e": if "fcontext-equiv" not in self.cust_dict: self.cust_dict["fcontext-equiv"] = {} self.cust_dict["fcontext-equiv"][(rec[-1])] = {"equiv": rec[3]} else: self.cust_dict["fcontext"][(rec[-1], rec[3])] = {"type": rec[5]} if rec[0] == "module": self.cust_dict["module"][rec[-1]] = {"enabled": rec[2] != "-d"} if "module" not in self.cust_dict: return for semodule, button in [("unconfined", self.disable_unconfined_button), ("permissivedomains", self.disable_permissive_button)]: if semodule in self.cust_dict["module"]: button.set_active(self.cust_dict["module"][semodule]["enabled"]) for i in keys: if i not in self.cust_dict: self.cust_dict.update({i: {}}) def executable_files_initialize(self, application): self.entrypoints = sepolicy.get_entrypoints(application) for exe in self.entrypoints.keys(): if len(self.entrypoints[exe]) == 0: continue file_class = self.entrypoints[exe][1] for path in self.entrypoints[exe][0]: if (path, file_class) in self.cur_dict["fcontext"]: if self.cur_dict["fcontext"][(path, file_class)]["action"] == "-d": continue if exe != self.cur_dict["fcontext"][(path, file_class)]["type"]: continue self.files_initial_data_insert(self.executable_files_liststore, path, exe, file_class) def mislabeled(self, path): try: con = selinux.matchpathcon(path, 0)[1] cur = selinux.getfilecon(path)[1] return con != cur except OSError: return False def set_mislabeled(self, tree, path, iter, niter): if not self.mislabeled(path): return con = selinux.matchpathcon(path, 0)[1] cur = selinux.getfilecon(path)[1] self.mislabeled_files = True # Set visibility of label tree.set_value(niter, 3, True) # Has a mislabel tree.set_value(iter, 4, True) tree.set_value(niter, 4, True) tree.set_value(iter, 5, con.split(":")[2]) tree.set_value(iter, 6, cur.split(":")[2]) def writable_files_initialize(self, application): # Traversing the dictionary data struct self.writable_files = sepolicy.get_writable_files(application) for write in self.writable_files.keys(): if len(self.writable_files[write]) < 2: self.files_initial_data_insert(self.writable_files_liststore, None, write, _("all files")) continue file_class = self.writable_files[write][1] for path in self.writable_files[write][0]: if (path, file_class) in self.cur_dict["fcontext"]: if self.cur_dict["fcontext"][(path, file_class)]["action"] == "-d": continue if write != self.cur_dict["fcontext"][(path, file_class)]["type"]: continue self.files_initial_data_insert(self.writable_files_liststore, path, write, file_class) def files_initial_data_insert(self, liststore, path, selinux_label, file_class): iter = liststore.append(None) if path is None: path = _("MISSING FILE PATH") modify = False else: modify = (path, file_class) in self.local_file_paths for p in sepolicy.find_file(path): niter = liststore.append(iter) liststore.set_value(niter, 0, p) self.set_mislabeled(liststore, p, iter, niter) if modify: path = self.markup(path) file_class = self.markup(selinux_label) file_class = self.markup(file_class) liststore.set_value(iter, 0, path) liststore.set_value(iter, 1, selinux_label) liststore.set_value(iter, 2, file_class) liststore.set_value(iter, 7, modify) def markup(self, f): return "%s" % f def unmarkup(self, f): if f: return re.sub("$", "", re.sub("^", "", f)) return None def application_files_initialize(self, application): self.file_types = sepolicy.get_file_types(application) for app in self.file_types.keys(): if len(self.file_types[app]) == 0: continue file_class = self.file_types[app][1] for path in self.file_types[app][0]: desc = sepolicy.get_description(app, markup=self.markup) if (path, file_class) in self.cur_dict["fcontext"]: if self.cur_dict["fcontext"][(path, file_class)]["action"] == "-d": continue if app != self.cur_dict["fcontext"][(path, file_class)]["type"]: continue self.files_initial_data_insert(self.application_files_liststore, path, desc, file_class) def modified(self): i = 0 for k in self.cur_dict: if len(self.cur_dict[k]) > 0: return True return False def boolean_initialize(self, application): for blist in sepolicy.get_bools(application): for b, active in blist: if b in self.cur_dict["boolean"]: active = self.cur_dict["boolean"][b]['active'] desc = sepolicy.boolean_desc(b) self.boolean_initial_data_insert(b, desc, active) def boolean_initial_data_insert(self, val, desc, active): # Insert data from data source into tree iter = self.boolean_liststore.append() self.boolean_liststore.set_value(iter, 0, active) self.boolean_liststore.set_value(iter, 1, desc) self.boolean_liststore.set_value(iter, 2, val) self.boolean_liststore.set_value(iter, 3, _('More...')) def transitions_into_initialize(self, application): for x in sepolicy.get_transitions_into(application): active = None executable = None source = None if "boolean" in x: active = x["boolean"] if "target" in x: executable = x["target"] if "source" in x: source = x["source"] self.transitions_into_initial_data_insert(active, executable, source) def transitions_into_initial_data_insert(self, active, executable, source): iter = self.transitions_into_liststore.append() if active != None: self.transitions_into_liststore.set_value(iter, 0, enabled[active[0][1]]) # active[0][1] is either T or F (enabled is all the way at the top) else: self.transitions_into_liststore.set_value(iter, 0, "Default") self.transitions_into_liststore.set_value(iter, 2, executable) self.transitions_into_liststore.set_value(iter, 1, source) def transitions_from_initialize(self, application): for x in sepolicy.get_transitions(application): active = None executable = None transtype = None if "boolean" in x: active = x["boolean"] if "target" in x: executable_type = x["target"] if "transtype" in x: transtype = x["transtype"] self.transitions_from_initial_data_insert(active, executable_type, transtype) try: for executable in self.fcdict[executable_type]["regex"]: self.transitions_from_initial_data_insert(active, executable, transtype) except KeyError: pass def transitions_from_initial_data_insert(self, active, executable, transtype): iter = self.transitions_from_treestore.append(None) if active == None: self.transitions_from_treestore.set_value(iter, 0, "Default") self.transitions_from_treestore.set_value(iter, 5, False) else: niter = self.transitions_from_treestore.append(iter) # active[0][1] is either T or F (enabled is all the way at the top) self.transitions_from_treestore.set_value(iter, 0, enabled[active[0][1]]) markup = ('','') if active[0][1]: self.transitions_from_treestore.set_value(niter, 2, (_("To disable this transition, go to the %sBoolean section%s.") % markup)) else: self.transitions_from_treestore.set_value(niter, 2, (_("To enable this transition, go to the %sBoolean section%s.") % markup)) # active[0][0] is the Bool Name self.transitions_from_treestore.set_value(niter, 1, active[0][0]) self.transitions_from_treestore.set_value(niter, 5, True) self.transitions_from_treestore.set_value(iter, 2, executable) self.transitions_from_treestore.set_value(iter, 3, transtype) def transitions_files_initialize(self, application): for i in sepolicy.get_file_transitions(application): if 'filename' in i: filename = i['filename'] else: filename = None self.transitions_files_inital_data_insert(i['target'], i['class'], i['transtype'], filename) def transitions_files_inital_data_insert(self, path, tclass, dest, name): iter = self.transitions_file_liststore.append() self.transitions_file_liststore.set_value(iter, 0, path) self.transitions_file_liststore.set_value(iter, 1, tclass) self.transitions_file_liststore.set_value(iter, 2, dest) if name == None: name = '*' self.transitions_file_liststore.set_value(iter, 3, name) def tab_change(self, *args): self.clear_filters() self.treeview = None self.treesort = None self.treefilter = None self.liststore = None self.modify_button.set_sensitive(False) self.add_modify_delete_box.hide() self.show_modified_only.set_visible(False) self.show_mislabeled_files_only.set_visible(False) self.mislabeled_files_label.set_visible(False) self.warning_files.set_visible(False) if self.boolean_radio_button.get_active(): self.outer_notebook.set_current_page(BOOLEANS_PAGE) self.treeview = self.boolean_treeview self.show_modified_only.set_visible(True) if self.files_radio_button.get_active(): self.show_popup(self.add_modify_delete_box) self.show_modified_only.set_visible(True) self.show_mislabeled_files_only.set_visible(self.mislabeled_files) self.mislabeled_files_label.set_visible(self.mislabeled_files) self.warning_files.set_visible(self.mislabeled_files) self.outer_notebook.set_current_page(FILES_PAGE) if args[0] == self.inner_notebook_files: ipage = args[2] else: ipage = self.inner_notebook_files.get_current_page() if ipage == EXE_PAGE: self.treeview = self.executable_files_treeview category = _("executable") elif ipage == WRITABLE_PAGE: self.treeview = self.writable_files_treeview category = _("writable") elif ipage == APP_PAGE: self.treeview = self.application_files_treeview category = _("application") self.add_button.set_tooltip_text(_("Add new %(TYPE)s file path for '%(DOMAIN)s' domains.") % {"TYPE": category, "DOMAIN": self.application}) self.delete_button.set_tooltip_text(_("Delete %(TYPE)s file paths for '%(DOMAIN)s' domain.") % {"TYPE": category, "DOMAIN": self.application}) self.modify_button.set_tooltip_text(_("Modify %(TYPE)s file path for '%(DOMAIN)s' domain. Only bolded items in the list can be selected, this indicates they were modified previously.") % {"TYPE": category, "DOMAIN": self.application}) if self.network_radio_button.get_active(): self.add_modify_delete_box.show() self.show_modified_only.set_visible(True) self.outer_notebook.set_current_page(NETWORK_PAGE) if args[0] == self.inner_notebook_network: ipage = args[2] else: ipage = self.inner_notebook_network.get_current_page() if ipage == OUTBOUND_PAGE: self.treeview = self.network_out_treeview category = _("connect") if ipage == INBOUND_PAGE: self.treeview = self.network_in_treeview category = _("listen for inbound connections") self.add_button.set_tooltip_text(_("Add new port definition to which the '%(APP)s' domain is allowed to %(PERM)s.") % {"APP": self.application, "PERM": category}) self.delete_button.set_tooltip_text(_("Delete modified port definitions to which the '%(APP)s' domain is allowed to %(PERM)s.") % {"APP": self.application, "PERM": category}) self.modify_button.set_tooltip_text(_("Modify port definitions to which the '%(APP)s' domain is allowed to %(PERM)s.") % {"APP": self.application, "PERM": category}) if self.transitions_radio_button.get_active(): self.outer_notebook.set_current_page(TRANSITIONS_PAGE) if args[0] == self.inner_notebook_transitions: ipage = args[2] else: ipage = self.inner_notebook_transitions.get_current_page() if ipage == TRANSITIONS_FROM_PAGE: self.treeview = self.transitions_from_treeview if ipage == TRANSITIONS_TO_PAGE: self.treeview = self.transitions_into_treeview if ipage == TRANSITIONS_FILE_PAGE: self.treeview = self.transitions_file_treeview if self.system_radio_button.get_active(): self.outer_notebook.set_current_page(SYSTEM_PAGE) self.filter_box.hide() if self.lockdown_radio_button.get_active(): self.lockdown_init() self.outer_notebook.set_current_page(LOCKDOWN_PAGE) self.filter_box.hide() if self.user_radio_button.get_active(): self.outer_notebook.set_current_page(USER_PAGE) self.add_modify_delete_box.show() self.show_modified_only.set_visible(True) self.treeview = self.user_treeview self.add_button.set_tooltip_text(_("Add new SELinux User/Role definition.")) self.delete_button.set_tooltip_text(_("Delete modified SELinux User/Role definitions.")) self.modify_button.set_tooltip_text(_("Modify selected modified SELinux User/Role definitions.")) if self.login_radio_button.get_active(): self.outer_notebook.set_current_page(LOGIN_PAGE) self.add_modify_delete_box.show() self.show_modified_only.set_visible(True) self.treeview = self.login_treeview self.add_button.set_tooltip_text(_("Add new Login Mapping definition.")) self.delete_button.set_tooltip_text(_("Delete modified Login Mapping definitions.")) self.modify_button.set_tooltip_text(_("Modify selected modified Login Mapping definitions.")) if self.file_equiv_radio_button.get_active(): self.outer_notebook.set_current_page(FILE_EQUIV_PAGE) self.add_modify_delete_box.show() self.show_modified_only.set_visible(True) self.treeview = self.file_equiv_treeview self.add_button.set_tooltip_text(_("Add new File Equivalence definition.")) self.delete_button.set_tooltip_text(_("Delete modified File Equivalence definitions.")) self.modify_button.set_tooltip_text(_("Modify selected modified File Equivalence definitions. Only bolded items in the list can be selected, this indicates they were modified previously.")) self.opage = self.outer_notebook.get_current_page() if self.treeview: self.filter_box.show() self.treesort = self.treeview.get_model() self.treefilter = self.treesort.get_model() self.liststore = self.treefilter.get_model() for x in range(0, self.liststore.get_n_columns()): col = self.treeview.get_column(x) if col: cell = col.get_cells()[0] if isinstance(cell, Gtk.CellRendererText): self.liststore.set_sort_func(x, self.stripsort, None) self.treeview.get_selection().unselect_all() self.modify_button.set_sensitive(False) def stripsort(self, model, row1, row2, user_data): sort_column, _ = model.get_sort_column_id() val1 = self.unmarkup(model.get_value(row1, sort_column)) val2 = self.unmarkup(model.get_value(row2, sort_column)) return cmp(val1, val2) def display_more_detail(self, windows, path): it = self.boolean_filter.get_iter(path) it = self.boolean_filter.convert_iter_to_child_iter(it) self.boolean_more_detail_tree_data_set.clear() self.boolean_more_detail_window.set_title(_("Boolean %s Allow Rules") % self.boolean_liststore.get_value(it, 2)) blist = sepolicy.get_boolean_rules(self.application, self.boolean_liststore.get_value(it, 2)) for b in blist: self.display_more_detail_init(b["source"], b["target"], b["class"], b["permlist"]) self.show_popup(self.boolean_more_detail_window) def display_more_detail_init(self, source, target, class_type, permission): iter = self.boolean_more_detail_tree_data_set.append() self.boolean_more_detail_tree_data_set.set_value(iter, 0, "allow %s %s:%s { %s };" % (source, target, class_type, " ".join(permission))) def add_button_clicked(self, *args): self.modify = False if self.opage == NETWORK_PAGE: self.popup_network_label.set_text((_("Add Network Port for %s. Ports will be created when update is applied.")) % self.application) self.network_popup_window.set_title((_("Add Network Port for %s")) % self.application) self.init_network_dialog(args) return if self.opage == FILES_PAGE: self.popup_files_label.set_text((_("Add File Labeling for %s. File labels will be created when update is applied.")) % self.application) self.files_popup_window.set_title((_("Add File Labeling for %s")) % self.application) self.init_files_dialog(args) ipage = self.inner_notebook_files.get_current_page() if ipage == EXE_PAGE: self.files_path_entry.set_text("ex: /usr/sbin/Foobar") else: self.files_path_entry.set_text("ex: /var/lib/Foobar") self.clear_entry = True if self.opage == LOGIN_PAGE: self.login_label.set_text((_("Add Login Mapping. User Mapping will be created when Update is applied."))) self.login_popup_window.set_title(_("Add Login Mapping")) self.login_init_dialog(args) self.clear_entry = True if self.opage == USER_PAGE: self.user_label.set_text((_("Add SELinux User Role. SELinux user roles will be created when update is applied."))) self.user_popup_window.set_title(_("Add SELinux Users")) self.user_init_dialog(args) self.clear_entry = True if self.opage == FILE_EQUIV_PAGE: self.file_equiv_source_entry.set_text("") self.file_equiv_dest_entry.set_text("") self.file_equiv_label.set_text((_("Add File Equivalency Mapping. Mapping will be created when update is applied."))) self.file_equiv_popup_window.set_title(_("Add SELinux File Equivalency")) self.clear_entry = True self.show_popup(self.file_equiv_popup_window) self.new_updates() def show_popup(self, window): self.current_popup = window window.show() def close_popup(self, *args): self.current_popup.hide() self.window.set_sensitive(True) return True def modify_button_clicked(self, *args): iter = None if self.treeview: iter = self.get_selected_iter() if not iter: self.modify_button.set_sensitive(False) return self.modify = True if self.opage == NETWORK_PAGE: self.modify_button_network_clicked(args) if self.opage == FILES_PAGE: self.popup_files_label.set_text((_("Modify File Labeling for %s. File labels will be created when update is applied.")) % self.application) self.files_popup_window.set_title((_("Add File Labeling for %s")) % self.application) self.delete_old_item = None self.init_files_dialog(args) self.modify = True operation = "Modify" mls = 1 ipage = self.inner_notebook_files.get_current_page() if ipage == EXE_PAGE: iter = self.executable_files_filter.convert_iter_to_child_iter(iter) self.delete_old_item = iter path = self.executable_files_liststore.get_value(iter, 0) self.files_path_entry.set_text(path) ftype = self.executable_files_liststore.get_value(iter, 1) if ftype != None: self.combo_set_active_text(self.files_type_combobox, ftype) tclass = self.executable_files_liststore.get_value(iter, 2) if tclass != None: self.combo_set_active_text(self.files_class_combobox, tclass) if ipage == WRITABLE_PAGE: iter = self.writable_files_filter.convert_iter_to_child_iter(iter) self.delete_old_item = iter path = self.writable_files_liststore.get_value(iter, 0) self.files_path_entry.set_text(path) type = self.writable_files_liststore.get_value(iter, 1) if type != None: self.combo_set_active_text(self.files_type_combobox, type) tclass = self.writable_files_liststore.get_value(iter, 2) if tclass != None: self.combo_set_active_text(self.files_class_combobox, tclass) if ipage == APP_PAGE: iter = self.application_files_filter.convert_iter_to_child_iter(iter) self.delete_old_item = iter path = self.application_files_liststore.get_value(iter, 0) self.files_path_entry.set_text(path) try: get_type = self.application_files_liststore.get_value(iter, 1) get_type = get_type.split("")[1].split("") except AttributeError: pass type = self.application_files_liststore.get_value(iter, 2) if type != None: self.combo_set_active_text(self.files_type_combobox, type) tclass = get_type[0] if tclass != None: self.combo_set_active_text(self.files_class_combobox, tclass) if self.opage == USER_PAGE: self.user_init_dialog(args) self.user_name_entry.set_text(self.user_liststore.get_value(iter, 0)) self.user_mls_level_entry.set_text(self.user_liststore.get_value(iter, 2)) self.user_mls_entry.set_text(self.user_liststore.get_value(iter, 3)) self.combo_set_active_text(self.user_roles_combobox, self.user_liststore.get_value(iter, 1)) self.user_label.set_text((_("Modify SELinux User Role. SELinux user roles will be modified when update is applied."))) self.user_popup_window.set_title(_("Modify SELinux Users")) self.show_popup(self.user_popup_window) if self.opage == LOGIN_PAGE: self.login_init_dialog(args) self.login_name_entry.set_text(self.login_liststore.get_value(iter, 0)) self.login_mls_entry.set_text(self.login_liststore.get_value(iter, 2)) self.combo_set_active_text(self.login_seuser_combobox, self.login_liststore.get_value(iter, 1)) self.login_label.set_text((_("Modify Login Mapping. Login Mapping will be modified when Update is applied."))) self.login_popup_window.set_title(_("Modify Login Mapping")) self.show_popup(self.login_popup_window) if self.opage == FILE_EQUIV_PAGE: self.file_equiv_source_entry.set_text(self.unmarkup(self.file_equiv_liststore.get_value(iter, 0))) self.file_equiv_dest_entry.set_text(self.unmarkup(self.file_equiv_liststore.get_value(iter, 1))) self.file_equiv_label.set_text((_("Modify File Equivalency Mapping. Mapping will be created when update is applied."))) self.file_equiv_popup_window.set_title(_("Modify SELinux File Equivalency")) self.clear_entry = True self.show_popup(self.file_equiv_popup_window) def populate_type_combo(self, tree, loc, *args): iter = self.more_types_files_liststore.get_iter(loc) ftype = self.more_types_files_liststore.get_value(iter, 0) self.combo_set_active_text(self.files_type_combobox, ftype) self.show_popup(self.files_popup_window) self.moreTypes_window_files.hide() def strip_domain(self, domain): if domain == None: return if domain.endswith("_script_t"): split_char = "_script_t" else: split_char = "_t" return domain.split(split_char)[0] def exclude_type(self, type, exclude_list): for e in exclude_list: if type.startswith(e): return True return False def init_files_dialog(self, *args): exclude_list = [] self.files_class_combobox.set_sensitive(True) self.show_popup(self.files_popup_window) ipage = self.inner_notebook_files.get_current_page() self.files_type_combolist.clear() self.files_class_combolist.clear() compare = self.strip_domain(self.application) for d in self.application_liststore: if d[0].startswith(compare) and d[0] != self.application and not d[0].startswith("httpd_sys"): exclude_list.append(self.strip_domain(d[0])) self.more_types_files_liststore.clear() try: for files in sepolicy.file_type_str: iter = self.files_class_combolist.append() self.files_class_combolist.set_value(iter, 0, sepolicy.file_type_str[files]) if ipage == EXE_PAGE and self.entrypoints != None: for exe in self.entrypoints.keys(): if exe.startswith(compare): iter = self.files_type_combolist.append() self.files_type_combolist.set_value(iter, 0, exe) iter = self.more_types_files_liststore.append() self.more_types_files_liststore.set_value(iter, 0, exe) self.files_class_combobox.set_active(4) self.files_class_combobox.set_sensitive(False) elif ipage == WRITABLE_PAGE and self.writable_files != None: for write in self.writable_files.keys(): if write.startswith(compare) and not self.exclude_type(write, exclude_list) and write in self.file_types: iter = self.files_type_combolist.append() self.files_type_combolist.set_value(iter, 0, write) iter = self.more_types_files_liststore.append() self.more_types_files_liststore.set_value(iter, 0, write) self.files_class_combobox.set_active(0) elif ipage == APP_PAGE and self.file_types != None: for app in sepolicy.get_all_file_types(): if app.startswith(compare): if app.startswith(compare) and not self.exclude_type(app, exclude_list): iter = self.files_type_combolist.append() self.files_type_combolist.set_value(iter, 0, app) iter = self.more_types_files_liststore.append() self.more_types_files_liststore.set_value(iter, 0, app) self.files_class_combobox.set_active(0) except AttributeError: print("error") pass self.files_type_combobox.set_active(0) self.files_mls_entry.set_text("s0") iter = self.files_type_combolist.append() self.files_type_combolist.set_value(iter, 0, _('More...')) def modify_button_network_clicked(self, *args): iter = self.get_selected_iter() if not iter: self.modify_button.set_sensitive(False) return self.popup_network_label.set_text((_("Modify Network Port for %s. Ports will be created when update is applied.")) % self.application) self.network_popup_window.set_title((_("Modify Network Port for %s")) % self.application) self.delete_old_item = None self.init_network_dialog(args) operation = "Modify" mls = 1 self.modify = True iter = self.get_selected_iter() port = self.liststore.get_value(iter, 0) self.network_ports_entry.set_text(port) protocol = self.liststore.get_value(iter, 1) if protocol == "tcp": self.network_tcp_button.set_active(True) elif protocol == "udp": self.network_udp_button.set_active(True) type = self.liststore.get_value(iter, 2) if type != None: self.combo_set_active_text(self.network_port_type_combobox, type) self.delete_old_item = iter def init_network_dialog(self, *args): self.show_popup(self.network_popup_window) ipage = self.inner_notebook_network.get_current_page() self.network_port_type_combolist.clear() self.network_ports_entry.set_text("") try: if ipage == OUTBOUND_PAGE: netd = sepolicy.network.get_network_connect(self.application, "tcp", "name_connect", check_bools=True) elif ipage == INBOUND_PAGE: netd = sepolicy.network.get_network_connect(self.application, "tcp", "name_bind", check_bools=True) netd += sepolicy.network.get_network_connect(self.application, "udp", "name_bind", check_bools=True) port_types = [] for k in netd.keys(): for t, ports in netd[k]: if t not in port_types + ["port_t", "unreserved_port_t"]: if t.endswith("_type"): continue port_types.append(t) port_types.sort() short_domain = self.strip_domain(self.application) if short_domain[-1] == "d": short_domain = short_domain[:-1] short_domain = short_domain + "_" ctr = 0 found = 0 for t in port_types: if t.startswith(short_domain): found = ctr iter = self.network_port_type_combolist.append() self.network_port_type_combolist.set_value(iter, 0, t) ctr += 1 self.network_port_type_combobox.set_active(found) except AttributeError: pass self.network_tcp_button.set_active(True) self.network_mls_entry.set_text("s0") def login_seuser_combobox_change(self, combo, *args): seuser = self.combo_get_active_text(combo) if self.login_mls_entry.get_text() == "": for u in sepolicy.get_selinux_users(): if seuser == u['name']: self.login_mls_entry.set_text(u.get('range', '')) def user_roles_combobox_change(self, combo, *args): serole = self.combo_get_active_text(combo) if self.user_mls_entry.get_text() == "": for u in sepolicy.get_all_roles(): if serole == u['name']: self.user_mls_entry.set_text(u.get('range', '')) def get_selected_iter(self): iter = None if not self.treeview: return None row = self.treeview.get_selection() if not row: return None treesort, iter = row.get_selected() if iter: iter = treesort.convert_iter_to_child_iter(iter) if iter: iter = self.treefilter.convert_iter_to_child_iter(iter) return iter def cursor_changed(self, *args): self.modify_button.set_sensitive(False) iter = self.get_selected_iter() if iter == None: self.modify_button.set_sensitive(False) return if not self.liststore[iter] or not self.liststore[iter][-1]: return self.modify_button.set_sensitive(self.liststore[iter][-1]) def login_init_dialog(self, *args): self.show_popup(self.login_popup_window) self.login_seuser_combolist.clear() users = sepolicy.get_all_users() users.sort() for u in users: iter = self.login_seuser_combolist.append() self.login_seuser_combolist.set_value(iter, 0, str(u)) self.login_name_entry.set_text("") self.login_mls_entry.set_text("") def user_init_dialog(self, *args): self.show_popup(self.user_popup_window) self.user_roles_combolist.clear() roles = sepolicy.get_all_roles() roles.sort() for r in roles: iter = self.user_roles_combolist.append() self.user_roles_combolist.set_value(iter, 0, str(r)) self.user_name_entry.set_text("") self.user_mls_entry.set_text("") def on_disable_ptrace(self, checkbutton): if self.finish_init: update_buffer = "boolean -m -%d deny_ptrace" % checkbutton.get_active() self.wait_mouse() try: self.dbus.semanage(update_buffer) except dbus.exceptions.DBusException as e: self.error(e) self.ready_mouse() def on_show_modified_only(self, checkbutton): length = self.liststore.get_n_columns() def dup_row(row): l = [] for i in range(0, length): l.append(row[i]) return l append_list = [] if self.opage == BOOLEANS_PAGE: if not checkbutton.get_active(): return self.boolean_initialize(self.application) for row in self.liststore: if row[2] in self.cust_dict["boolean"]: append_list.append(dup_row(row)) if self.opage == FILES_PAGE: ipage = self.inner_notebook_files.get_current_page() if not checkbutton.get_active(): if ipage == EXE_PAGE: return self.executable_files_initialize(self.application) if ipage == WRITABLE_PAGE: return self.writable_files_initialize(self.application) if ipage == APP_PAGE: return self.application_files_initialize(self.application) for row in self.liststore: if (row[0], row[2]) in self.cust_dict["fcontext"]: append_list.append(row) if self.opage == NETWORK_PAGE: if not checkbutton.get_active(): return self.network_initialize(self.application) for row in self.liststore: if (row[0], row[1]) in self.cust_dict["port"]: append_list.append(dup_row(row)) if self.opage == FILE_EQUIV_PAGE: if not checkbutton.get_active() == True: return self.file_equiv_initialize() for row in self.liststore: if row[0] in self.cust_dict["fcontext-equiv"]: append_list.append(dup_row(row)) if self.opage == USER_PAGE: if not checkbutton.get_active(): return self.user_initialize() for row in self.liststore: if row[0] in self.cust_dict["user"]: append_list.append(dup_row(row)) if self.opage == LOGIN_PAGE: if not checkbutton.get_active() == True: return self.login_initialize() for row in self.liststore: if row[0] in self.cust_dict["login"]: append_list.append(dup_row(row)) self.liststore.clear() for row in append_list: iter = self.liststore.append() for i in range(0, length): self.liststore.set_value(iter, i, row[i]) def init_modified_files_liststore(self, tree, app, ipage, operation, path, fclass, ftype): iter = tree.append(None) tree.set_value(iter, 0, path) tree.set_value(iter, 1, ftype) tree.set_value(iter, 2, fclass) def restore_to_default(self, *args): print("restore to default clicked...") def invalid_entry_retry(self, *args): self.closewindow(self.error_check_window) self.files_popup_window.set_sensitive(True) self.network_popup_window.set_sensitive(True) def error_check_files(self, insert_txt): if len(insert_txt) == 0 or insert_txt[0] != '/': self.error_check_window.show() self.files_popup_window.set_sensitive(False) self.network_popup_window.set_sensitive(False) self.error_check_label.set_text((_("The entry '%s' is not a valid path. Paths must begin with a '/'.")) % insert_txt) return True return False def error_check_network(self, port): try: pnum = int(port) if pnum < 1 or pnum > 65536: raise ValueError except ValueError: self.error_check_window.show() self.files_popup_window.set_sensitive(False) self.network_popup_window.set_sensitive(False) self.error_check_label.set_text((_("Port number must be between 1 and 65536"))) return True return False def show_more_types(self, *args): if self.finish_init: if self.combo_get_active_text(self.files_type_combobox) == _('More...'): self.files_popup_window.hide() self.moreTypes_window_files.show() def update_to_login(self, *args): self.close_popup() seuser = self.combo_get_active_text(self.login_seuser_combobox) mls_range = self.login_mls_entry.get_text() name = self.login_name_entry.get_text() if self.modify: iter = self.get_selected_iter() oldname = self.login_liststore.get_value(iter, 0) oldseuser = self.login_liststore.get_value(iter, 1) oldrange = self.login_liststore.get_value(iter, 2) self.liststore.set_value(iter, 0, oldname) self.liststore.set_value(iter, 1, oldseuser) self.liststore.set_value(iter, 2, oldrange) self.cur_dict["login"][name] = {"action": "-m", "range": mls_range, "seuser": seuser, "oldrange": oldrange, "oldseuser": oldseuser, "oldname": oldname} else: iter = self.liststore.append(None) self.cur_dict["login"][name] = {"action": "-a", "range": mls_range, "seuser": seuser} self.liststore.set_value(iter, 0, name) self.liststore.set_value(iter, 1, seuser) self.liststore.set_value(iter, 2, mls_range) self.new_updates() def update_to_user(self, *args): self.close_popup() roles = self.combo_get_active_text(self.user_roles_combobox) level = self.user_mls_level_entry.get_text() mls_range = self.user_mls_entry.get_text() name = self.user_name_entry.get_text() if self.modify: iter = self.get_selected_iter() oldname = self.user_liststore.get_value(iter, 0) oldroles = self.user_liststore.get_value(iter, 1) oldlevel = self.user_liststore.get_value(iter, 1) oldrange = self.user_liststore.get_value(iter, 3) self.liststore.set_value(iter, 0, oldname) self.liststore.set_value(iter, 1, oldroles) self.liststore.set_value(iter, 2, oldlevel) self.liststore.set_value(iter, 3, oldrange) self.cur_dict["user"][name] = {"action": "-m", "range": mls_range, "level": level, "role": roles, "oldrange": oldrange, "oldlevel": oldlevel, "oldroles": oldroles, "oldname": oldname} else: iter = self.liststore.append(None) if mls_range or level: self.cur_dict["user"][name] = {"action": "-a", "range": mls_range, "level": level, "role": roles} else: self.cur_dict["user"][name] = {"action": "-a", "role": roles} self.liststore.set_value(iter, 0, name) self.liststore.set_value(iter, 1, roles) self.liststore.set_value(iter, 2, level) self.liststore.set_value(iter, 3, mls_range) self.new_updates() def update_to_file_equiv(self, *args): self.close_popup() dest = self.file_equiv_dest_entry.get_text() src = self.file_equiv_source_entry.get_text() if self.modify: iter = self.get_selected_iter() olddest = self.unmarkup(self.liststore.set_value(iter, 0)) oldsrc = self.unmarkup(self.liststore.set_value(iter, 1)) self.cur_dict["fcontext-equiv"][dest] = {"action": "-m", "src": src, "oldsrc": oldsrc, "olddest": olddest} else: iter = self.liststore.append(None) self.cur_dict["fcontext-equiv"][dest] = {"action": "-a", "src": src} self.liststore.set_value(iter, 0, self.markup(dest)) self.liststore.set_value(iter, 1, self.markup(src)) def update_to_files(self, *args): self.close_popup() self.files_add = True # Insert Function will be used in the future path = self.files_path_entry.get_text() if self.error_check_files(path): return setype = self.combo_get_active_text(self.files_type_combobox) mls = self.files_mls_entry.get_text() tclass = self.combo_get_active_text(self.files_class_combobox) if self.modify: iter = self.get_selected_iter() oldpath = self.unmark(self.liststore.get_value(iter, 0)) oldsetype = self.unmark(self.liststore.set_value(iter, 1)) oldtclass = self.liststore.get_value(iter, 2) self.cur_dict["fcontext"][(path, tclass)] = {"action": "-m", "type": setype, "oldtype": oldsetype, "oldpath": oldpath, "oldclass": oldtclass} else: iter = self.liststore.append(None) self.cur_dict["fcontext"][(path, tclass)] = {"action": "-a", "type": setype} self.liststore.set_value(iter, 0, self.markup(path)) self.liststore.set_value(iter, 1, self.markup(setype)) self.liststore.set_value(iter, 2, self.markup(tclass)) self.files_add = False self.recursive_path_toggle.set_active(False) self.new_updates() def update_to_network(self, *args): self.network_add = True ports = self.network_ports_entry.get_text() if self.error_check_network(ports): return if self.network_tcp_button.get_active(): protocol = "tcp" else: protocol = "udp" setype = self.combo_get_active_text(self.network_port_type_combobox) mls = self.network_mls_entry.get_text() if self.modify: iter = self.get_selected_iter() oldports = self.unmark(self.liststore.get_value(iter, 0)) oldprotocol = self.unmark(self.liststore.get_value(iter, 1)) oldsetype = self.unmark(self.liststore.set_value(iter, 2)) self.cur_dict["port"][(ports, protocol)] = {"action": "-m", "type": setype, "mls": mls, "oldtype": oldsetype, "oldprotocol": oldprotocol, "oldports": oldports} else: iter = self.liststore.append(None) self.cur_dict["port"][(ports, protocol)] = {"action": "-a", "type": setype, "mls": mls} self.liststore.set_value(iter, 0, ports) self.liststore.set_value(iter, 1, protocol) self.liststore.set_value(iter, 2, setype) self.network_add = False self.network_popup_window.hide() self.window.set_sensitive(True) self.new_updates() def delete_button_clicked(self, *args): operation = "Add" self.window.set_sensitive(False) if self.opage == NETWORK_PAGE: self.network_delete_liststore.clear() port_dict = self.cust_dict["port"] for ports, protocol in port_dict: setype = port_dict[(ports, protocol)]["type"] iter = self.network_delete_liststore.append() self.network_delete_liststore.set_value(iter, 1, ports) self.network_delete_liststore.set_value(iter, 2, protocol) self.network_delete_liststore.set_value(iter, 3, setype) self.show_popup(self.network_delete_window) return if self.opage == FILES_PAGE: self.files_delete_liststore.clear() fcontext_dict = self.cust_dict["fcontext"] for path, tclass in fcontext_dict: setype = fcontext_dict[(path, tclass)]["type"] iter = self.files_delete_liststore.append() self.files_delete_liststore.set_value(iter, 1, path) self.files_delete_liststore.set_value(iter, 2, setype) self.files_delete_liststore.set_value(iter, 3, sepolicy.file_type_str[tclass]) self.show_popup(self.files_delete_window) return if self.opage == USER_PAGE: self.user_delete_liststore.clear() user_dict = self.cust_dict["user"] for user in user_dict: roles = user_dict[user]["role"] mls = user_dict[user].get("range", "") level = user_dict[user].get("level", "") iter = self.user_delete_liststore.append() self.user_delete_liststore.set_value(iter, 1, user) self.user_delete_liststore.set_value(iter, 2, roles) self.user_delete_liststore.set_value(iter, 3, level) self.user_delete_liststore.set_value(iter, 4, mls) self.show_popup(self.user_delete_window) return if self.opage == LOGIN_PAGE: self.login_delete_liststore.clear() login_dict = self.cust_dict["login"] for login in login_dict: seuser = login_dict[login]["seuser"] mls = login_dict[login].get("range", "") iter = self.login_delete_liststore.append() self.login_delete_liststore.set_value(iter, 1, seuser) self.login_delete_liststore.set_value(iter, 2, login) self.login_delete_liststore.set_value(iter, 3, mls) self.show_popup(self.login_delete_window) return if self.opage == FILE_EQUIV_PAGE: self.file_equiv_delete_liststore.clear() for items in self.file_equiv_liststore: if items[2]: iter = self.file_equiv_delete_liststore.append() self.file_equiv_delete_liststore.set_value(iter, 1, self.unmarkup(items[0])) self.file_equiv_delete_liststore.set_value(iter, 2, self.unmarkup(items[1])) self.show_popup(self.file_equiv_delete_window) return def on_save_delete_clicked(self, *args): self.close_popup() if self.opage == NETWORK_PAGE: for delete in self.network_delete_liststore: if delete[0]: self.cur_dict["port"][(delete[1], delete[2])] = {"action": "-d", "type": delete[3]} if self.opage == FILES_PAGE: for delete in self.files_delete_liststore: if delete[0]: self.cur_dict["fcontext"][(delete[1], reverse_file_type_str[delete[3]])] = {"action": "-d", "type": delete[2]} if self.opage == USER_PAGE: for delete in self.user_delete_liststore: if delete[0]: self.cur_dict["user"][delete[1]] = {"action": "-d", "role": delete[2], "range": delete[4]} if self.opage == LOGIN_PAGE: for delete in self.login_delete_liststore: if delete[0]: self.cur_dict["login"][delete[2]] = {"action": "-d", "login": delete[2], "seuser": delete[1], "range": delete[3]} if self.opage == FILE_EQUIV_PAGE: for delete in self.file_equiv_delete_liststore: if delete[0]: self.cur_dict["fcontext-equiv"][delete[1]] = {"action": "-d", "src": delete[2]} self.new_updates() def on_save_delete_file_equiv_clicked(self, *args): for delete in self.files_delete_liststore: print(delete[0], delete[1], delete[2],) def on_toggle_update(self, cell, path, model): model[path][0] = not model[path][0] def ipage_delete(self, liststore, key): ctr = 0 for items in liststore: if items[0] == key[0] and items[2] == key[1]: iter = liststore.get_iter(ctr) liststore.remove(iter) return ctr += 1 def on_toggle(self, cell, path, model): if not path: return iter = self.boolean_filter.get_iter(path) iter = self.boolean_filter.convert_iter_to_child_iter(iter) name = model.get_value(iter, 2) model.set_value(iter, 0, not model.get_value(iter, 0)) active = model.get_value(iter, 0) if name in self.cur_dict["boolean"]: del(self.cur_dict["boolean"][name]) else: self.cur_dict["boolean"][name] = {"active": active} self.new_updates() def get_advanced_filter_data(self, entry, *args): self.filter_txt = entry.get_text() self.advanced_search_filter.refilter() def get_filter_data(self, windows, *args): #search for desired item # The txt that the use rinputs into the filter is stored in filter_txt self.filter_txt = windows.get_text() self.treefilter.refilter() def update_gui(self, *args): self.update = True self.update_treestore.clear() for bools in self.cur_dict["boolean"]: operation = self.cur_dict["boolean"][bools]["action"] iter = self.update_treestore.append(None) self.update_treestore.set_value(iter, 0, True) self.update_treestore.set_value(iter, 1, sepolicy.boolean_desc(bools)) self.update_treestore.set_value(iter, 2, action[self.cur_dict["boolean"][bools]['active']]) self.update_treestore.set_value(iter, 3, True) niter = self.update_treestore.append(iter) self.update_treestore.set_value(niter, 1, (_("SELinux name: %s")) % bools) self.update_treestore.set_value(niter, 3, False) for path, tclass in self.cur_dict["fcontext"]: operation = self.cur_dict["fcontext"][(path, tclass)]["action"] setype = self.cur_dict["fcontext"][(path, tclass)]["type"] iter = self.update_treestore.append(None) self.update_treestore.set_value(iter, 0, True) self.update_treestore.set_value(iter, 2, operation) self.update_treestore.set_value(iter, 0, True) if operation == "-a": self.update_treestore.set_value(iter, 1, (_("Add file labeling for %s")) % self.application) if operation == "-d": self.update_treestore.set_value(iter, 1, (_("Delete file labeling for %s")) % self.application) if operation == "-m": self.update_treestore.set_value(iter, 1, (_("Modify file labeling for %s")) % self.application) niter = self.update_treestore.append(iter) self.update_treestore.set_value(niter, 3, False) self.update_treestore.set_value(niter, 1, (_("File path: %s")) % path) niter = self.update_treestore.append(iter) self.update_treestore.set_value(niter, 3, False) self.update_treestore.set_value(niter, 1, (_("File class: %s")) % sepolicy.file_type_str[tclass]) niter = self.update_treestore.append(iter) self.update_treestore.set_value(niter, 3, False) self.update_treestore.set_value(niter, 1, (_("SELinux file type: %s")) % setype) for port, protocol in self.cur_dict["port"]: operation = self.cur_dict["port"][(port, protocol)]["action"] iter = self.update_treestore.append(None) self.update_treestore.set_value(iter, 0, True) self.update_treestore.set_value(iter, 2, operation) self.update_treestore.set_value(iter, 3, True) if operation == "-a": self.update_treestore.set_value(iter, 1, (_("Add ports for %s")) % self.application) if operation == "-d": self.update_treestore.set_value(iter, 1, (_("Delete ports for %s")) % self.application) if operation == "-m": self.update_treestore.set_value(iter, 1, (_("Modify ports for %s")) % self.application) niter = self.update_treestore.append(iter) self.update_treestore.set_value(niter, 1, (_("Network ports: %s")) % port) self.update_treestore.set_value(niter, 3, False) niter = self.update_treestore.append(iter) self.update_treestore.set_value(niter, 1, (_("Network protocol: %s")) % protocol) self.update_treestore.set_value(niter, 3, False) setype = self.cur_dict["port"][(port, protocol)]["type"] niter = self.update_treestore.append(iter) self.update_treestore.set_value(niter, 3, False) self.update_treestore.set_value(niter, 1, (_("SELinux file type: %s")) % setype) for user in self.cur_dict["user"]: operation = self.cur_dict["user"][user]["action"] iter = self.update_treestore.append(None) self.update_treestore.set_value(iter, 0, True) self.update_treestore.set_value(iter, 2, operation) self.update_treestore.set_value(iter, 0, True) if operation == "-a": self.update_treestore.set_value(iter, 1, _("Add user")) if operation == "-d": self.update_treestore.set_value(iter, 1, _("Delete user")) if operation == "-m": self.update_treestore.set_value(iter, 1, _("Modify user")) niter = self.update_treestore.append(iter) self.update_treestore.set_value(niter, 1, (_("SELinux User : %s")) % user) self.update_treestore.set_value(niter, 3, False) niter = self.update_treestore.append(iter) self.update_treestore.set_value(niter, 3, False) roles = self.cur_dict["user"][user]["role"] self.update_treestore.set_value(niter, 1, (_("Roles: %s")) % roles) mls = self.cur_dict["user"][user].get("range", "") niter = self.update_treestore.append(iter) self.update_treestore.set_value(niter, 3, False) self.update_treestore.set_value(niter, 1, _("MLS/MCS Range: %s") % mls) for login in self.cur_dict["login"]: operation = self.cur_dict["login"][login]["action"] iter = self.update_treestore.append(None) self.update_treestore.set_value(iter, 0, True) self.update_treestore.set_value(iter, 2, operation) self.update_treestore.set_value(iter, 0, True) if operation == "-a": self.update_treestore.set_value(iter, 1, _("Add login mapping")) if operation == "-d": self.update_treestore.set_value(iter, 1, _("Delete login mapping")) if operation == "-m": self.update_treestore.set_value(iter, 1, _("Modify login mapping")) niter = self.update_treestore.append(iter) self.update_treestore.set_value(niter, 3, False) self.update_treestore.set_value(niter, 1, (_("Login Name : %s")) % login) niter = self.update_treestore.append(iter) self.update_treestore.set_value(niter, 3, False) seuser = self.cur_dict["login"][login]["seuser"] self.update_treestore.set_value(niter, 1, (_("SELinux User: %s")) % seuser) mls = self.cur_dict["login"][login].get("range", "") niter = self.update_treestore.append(iter) self.update_treestore.set_value(niter, 3, False) self.update_treestore.set_value(niter, 1, _("MLS/MCS Range: %s") % mls) for path in self.cur_dict["fcontext-equiv"]: operation = self.cur_dict["fcontext-equiv"][path]["action"] iter = self.update_treestore.append(None) self.update_treestore.set_value(iter, 0, True) self.update_treestore.set_value(iter, 2, operation) self.update_treestore.set_value(iter, 0, True) if operation == "-a": self.update_treestore.set_value(iter, 1, (_("Add file equiv labeling."))) if operation == "-d": self.update_treestore.set_value(iter, 1, (_("Delete file equiv labeling."))) if operation == "-m": self.update_treestore.set_value(iter, 1, (_("Modify file equiv labeling."))) niter = self.update_treestore.append(iter) self.update_treestore.set_value(niter, 3, False) self.update_treestore.set_value(niter, 1, (_("File path : %s")) % path) niter = self.update_treestore.append(iter) self.update_treestore.set_value(niter, 3, False) src = self.cur_dict["fcontext-equiv"][path]["src"] self.update_treestore.set_value(niter, 1, (_("Equivalence: %s")) % src) self.show_popup(self.update_window) def set_active_application_button(self): if self.boolean_radio_button.get_active(): self.active_button = self.boolean_radio_button if self.files_radio_button.get_active(): self.active_button = self.files_radio_button if self.transitions_radio_button.get_active(): self.active_button = self.transitions_radio_button if self.network_radio_button.get_active(): self.active_button = self.network_radio_button def clearbuttons(self, clear=True): self.main_selection_window.hide() self.boolean_radio_button.set_visible(False) self.files_radio_button.set_visible(False) self.network_radio_button.set_visible(False) self.transitions_radio_button.set_visible(False) self.system_radio_button.set_visible(False) self.lockdown_radio_button.set_visible(False) self.user_radio_button.set_visible(False) self.login_radio_button.set_visible(False) if clear: self.completion_entry.set_text("") def show_system_page(self): self.clearbuttons() self.system_radio_button.set_visible(True) self.lockdown_radio_button.set_visible(True) self.applications_selection_button.set_label(_("System")) self.system_radio_button.set_active(True) self.tab_change() self.idle_func() def show_file_equiv_page(self, *args): self.clearbuttons() self.file_equiv_initialize() self.file_equiv_radio_button.set_active(True) self.applications_selection_button.set_label(_("File Equivalence")) self.tab_change() self.idle_func() self.add_button.set_sensitive(True) self.delete_button.set_sensitive(True) def show_users_page(self): self.clearbuttons() self.login_radio_button.set_visible(True) self.user_radio_button.set_visible(True) self.applications_selection_button.set_label(_("Users")) self.login_radio_button.set_active(True) self.tab_change() self.user_initialize() self.login_initialize() self.idle_func() self.add_button.set_sensitive(True) self.delete_button.set_sensitive(True) def show_applications_page(self): self.clearbuttons(False) self.boolean_radio_button.set_visible(True) self.files_radio_button.set_visible(True) self.network_radio_button.set_visible(True) self.transitions_radio_button.set_visible(True) self.boolean_radio_button.set_active(True) self.tab_change() self.idle_func() def system_interface(self, *args): self.show_system_page() def users_interface(self, *args): self.show_users_page() def show_mislabeled_files(self, checkbutton, *args): iterlist = [] ctr = 0 ipage = self.inner_notebook_files.get_current_page() if checkbutton.get_active() == True: for items in self.liststore: iter = self.treesort.get_iter(ctr) iter = self.treesort.convert_iter_to_child_iter(iter) iter = self.treefilter.convert_iter_to_child_iter(iter) if iter != None: if self.liststore.get_value(iter, 4) == False: iterlist.append(iter) ctr += 1 for iters in iterlist: self.liststore.remove(iters) elif self.application != None: self.liststore.clear() if ipage == EXE_PAGE: self.executable_files_initialize(self.application) elif ipage == WRITABLE_PAGE: self.writable_files_initialize(self.application) elif ipage == APP_PAGE: self.application_files_initialize(self.application) def fix_mislabeled(self, path): cur = selinux.getfilecon(path)[1].split(":")[2] con = selinux.matchpathcon(path, 0)[1].split(":")[2] if self.verify(_("Run restorecon on %(PATH)s to change its type from %(CUR_CONTEXT)s to the default %(DEF_CONTEXT)s?") % {"PATH": path, "CUR_CONTEXT": cur, "DEF_CONTEXT": con}, title="restorecon dialog") == Gtk.ResponseType.YES: self.dbus.restorecon(path) self.application_selected() def new_updates(self, *args): self.update_button.set_sensitive(self.modified()) self.revert_button.set_sensitive(self.modified()) def update_or_revert_changes(self, button, *args): self.update_gui() self.update = (button.get_label() == _("Update")) if self.update: self.update_window.set_title(_("Update Changes")) else: self.update_window.set_title(_("Revert Changes")) def apply_changes_button_press(self, *args): self.close_popup() if self.update: self.update_the_system() else: self.revert_data() self.finish_init = False self.previously_modified_initialize(self.dbus.customized()) self.finish_init = True self.clear_filters() self.application_selected() self.new_updates() self.update_treestore.clear() def update_the_system(self, *args): self.close_popup() update_buffer = self.format_update() self.wait_mouse() try: self.dbus.semanage(update_buffer) except dbus.exceptions.DBusException as e: print(e) self.ready_mouse() self.init_cur() def ipage_value_lookup(self, lookup): ipage_values = {"Executable Files": 0, "Writable Files": 1, "Application File Type": 2, "Inbound": 1, "Outbound": 0} for value in ipage_values: if value == lookup: return ipage_values[value] return "Booleans" def get_attributes_update(self, attribute): attribute = attribute.split(": ")[1] bool_id = attribute.split(": ")[0] if bool_id == "SELinux name": self.bool_revert = attribute else: return attribute def format_update(self): self.revert_data() update_buffer = "" for k in self.cur_dict: if k in "boolean": for b in self.cur_dict[k]: update_buffer += "boolean -m -%d %s\n" % (self.cur_dict[k][b]["active"], b) if k in "login": for l in self.cur_dict[k]: if self.cur_dict[k][l]["action"] == "-d": update_buffer += "login -d %s\n" % l elif "range" in self.cur_dict[k][l]: update_buffer += "login %s -s %s -r %s %s\n" % (self.cur_dict[k][l]["action"], self.cur_dict[k][l]["seuser"], self.cur_dict[k][l]["range"], l) else: update_buffer += "login %s -s %s %s\n" % (self.cur_dict[k][l]["action"], self.cur_dict[k][l]["seuser"], l) if k in "user": for u in self.cur_dict[k]: if self.cur_dict[k][u]["action"] == "-d": update_buffer += "user -d %s\n" % u elif "level" in self.cur_dict[k][u] and "range" in self.cur_dict[k][u]: update_buffer += "user %s -L %s -r %s -R %s %s\n" % (self.cur_dict[k][u]["action"], self.cur_dict[k][u]["level"], self.cur_dict[k][u]["range"], self.cur_dict[k][u]["role"], u) else: update_buffer += "user %s -R %s %s\n" % (self.cur_dict[k][u]["action"], self.cur_dict[k][u]["role"], u) if k in "fcontext-equiv": for f in self.cur_dict[k]: if self.cur_dict[k][f]["action"] == "-d": update_buffer += "fcontext -d %s\n" % f else: update_buffer += "fcontext %s -e %s %s\n" % (self.cur_dict[k][f]["action"], self.cur_dict[k][f]["src"], f) if k in "fcontext": for f in self.cur_dict[k]: if self.cur_dict[k][f]["action"] == "-d": update_buffer += "fcontext -d %s\n" % f else: update_buffer += "fcontext %s -t %s -f %s %s\n" % (self.cur_dict[k][f]["action"], self.cur_dict[k][f]["type"], self.cur_dict[k][f]["class"], f) if k in "port": for port, protocol in self.cur_dict[k]: if self.cur_dict[k][(port, protocol)]["action"] == "-d": update_buffer += "port -d -p %s %s\n" % (protocol, port) else: update_buffer += "port %s -t %s -p %s %s\n" % (self.cur_dict[k][f]["action"], self.cur_dict[k][f]["type"], protocol, port) return update_buffer def revert_data(self): ctr = 0 remove_list = [] update_buffer = "" for items in self.update_treestore: if not self.update_treestore[ctr][0]: remove_list.append(ctr) ctr += 1 remove_list.reverse() for ctr in remove_list: self.remove_cur(ctr) def reveal_advanced_system(self, label, *args): advanced = label.get_text() == ADVANCED_LABEL[0] if advanced: label.set_text(ADVANCED_LABEL[1]) else: label.set_text(ADVANCED_LABEL[0]) self.system_policy_label.set_visible(advanced) self.system_policy_type_combobox.set_visible(advanced) def reveal_advanced(self, label, *args): advanced = label.get_text() == ADVANCED_LABEL[0] if advanced: label.set_text(ADVANCED_LABEL[1]) else: label.set_text(ADVANCED_LABEL[0]) self.files_mls_label.set_visible(advanced) self.files_mls_entry.set_visible(advanced) self.network_mls_label.set_visible(advanced) self.network_mls_entry.set_visible(advanced) def on_show_advanced_search_window(self, label, *args): if label.get_text() == ADVANCED_SEARCH_LABEL[1]: label.set_text(ADVANCED_SEARCH_LABEL[0]) self.close_popup() else: label.set_text(ADVANCED_SEARCH_LABEL[1]) self.show_popup(self.advanced_search_window) def set_enforce_text(self, value): if value: self.status_bar.push(self.context_id, _("System Status: Enforcing")) self.current_status_enforcing.set_active(True) else: self.status_bar.push(self.context_id, _("System Status: Permissive")) self.current_status_permissive.set_active(True) def set_enforce(self, button): if not self.finish_init: return self.dbus.setenforce(button.get_active()) self.set_enforce_text(button.get_active()) def on_browse_select(self, *args): filename = self.file_dialog.get_filename() if filename == None: return self.clear_entry = False self.file_dialog.hide() self.files_path_entry.set_text(filename) if self.import_export == 'Import': self.import_config(filename) elif self.import_export == 'Export': self.export_config(filename) def recursive_path(self, *args): path = self.files_path_entry.get_text() if self.recursive_path_toggle.get_active(): if not path.endswith("(/.*)?"): self.files_path_entry.set_text(path + "(/.*)?") elif path.endswith("(/.*)?"): path = path.split("(/.*)?")[0] self.files_path_entry.set_text(path) def highlight_entry_text(self, entry_obj, *args): txt = entry_obj.get_text() if self.clear_entry: entry_obj.set_text('') self.clear_entry = False def autofill_add_files_entry(self, entry): text = entry.get_text() if text == '': return if text.endswith("(/.*)?"): self.recursive_path_toggle.set_active(True) for d in sepolicy.DEFAULT_DIRS: if text.startswith(d): for t in self.files_type_combolist: if t[0].endswith(sepolicy.DEFAULT_DIRS[d]): self.combo_set_active_text(self.files_type_combobox, t[0]) def resize_columns(self, *args): self.boolean_column_1 = self.boolean_treeview.get_col(1) width = self.boolean_column_1.get_width() renderer = self.boolean_column_1.get_cell_renderers() def browse_for_files(self, *args): self.file_dialog.show() def close_config_window(self, *args): self.file_dialog.hide() def change_default_policy(self, *args): if self.typeHistory == self.system_policy_type_combobox.get_active(): return if self.verify(_("Changing the policy type will cause a relabel of the entire file system on the next boot. Relabeling takes a long time depending on the size of the file system. Do you wish to continue?")) == Gtk.ResponseType.NO: self.system_policy_type_combobox.set_active(self.typeHistory) return None self.dbus.change_default_policy(self.combo_get_active_text(self.system_policy_type_combobox)) self.dbus.relabel_on_boot(True) self.typeHistory = self.system_policy_type_combobox.get_active() def change_default_mode(self, button): if not self.finish_init: return self.enabled_changed(button) if button.get_active(): self.dbus.change_default_mode(button.get_label().lower()) def import_config_show(self, *args): self.file_dialog.set_action(Gtk.FileChooserAction.OPEN) self.file_dialog.set_title("Import Configuration") self.file_dialog.show() #self.file_dialog.set_uri('/tmp') self.import_export = 'Import' def export_config_show(self, *args): self.file_dialog.set_action(Gtk.FileChooserAction.SAVE) self.file_dialog.set_title("Export Configuration") self.file_dialog.show() self.import_export = 'Export' def export_config(self, filename): self.wait_mouse() buf = self.dbus.customized() fd = open(filename, 'w') fd.write(buf) fd.close() self.ready_mouse() def import_config(self, filename): fd = open(filename, "r") buf = fd.read() fd.close() self.wait_mouse() try: self.dbus.semanage(buf) except OSError: pass self.ready_mouse() def init_dictionary(self, dic, app, ipage, operation, p, q, ftype, mls, changed, old): if (app, ipage, operation) not in dic: dic[app, ipage, operation] = {} if (p, q) not in dic[app, ipage, operation]: dic[app, ipage, operation][p, q] = {'type': ftype, 'mls': mls, 'changed': changed, 'old': old} def translate_bool(self, b): b = b.split('-')[1] if b == '0': return False if b == '1': return True def relabel_on_reboot(self, *args): active = self.relabel_button.get_active() exists = os.path.exists("/.autorelabel") if active and exists: return if not active and not exists: return try: self.dbus.relabel_on_boot(active) except dbus.exceptions.DBusException as e: self.error(e) def closewindow(self, window, *args): window.hide() self.recursive_path_toggle.set_active(False) self.window.set_sensitive(True) if self.moreTypes_window_files == window: self.show_popup(self.files_popup_window) if self.combo_get_active_text(self.files_type_combobox) == _('More...'): self.files_type_combobox.set_active(0) if self.error_check_window == window: if self.files_add: self.show_popup(self.files_popup_window) elif self.network_add: self.show_popup(self.network_popup_window) if self.files_mls_label.get_visible() or self.network_mls_label.get_visible(): self.advanced_text_files.set_visible(True) self.files_mls_label.set_visible(False) self.files_mls_entry.set_visible(False) self.advanced_text_network.set_visible(True) self.network_mls_label.set_visible(False) self.network_mls_entry.set_visible(False) if self.main_advanced_label.get_text() == ADVANCED_SEARCH_LABEL[1]: self.main_advanced_label.set_text(ADVANCED_SEARCH_LABEL[0]) return True def wait_mouse(self): self.window.get_window().set_cursor(self.busy_cursor) self.idle_func() def ready_mouse(self): self.window.get_window().set_cursor(self.ready_cursor) self.idle_func() def verify(self, message, title=""): dlg = Gtk.MessageDialog(None, 0, Gtk.MessageType.INFO, Gtk.ButtonsType.YES_NO, message) dlg.set_title(title) dlg.set_position(Gtk.WindowPosition.MOUSE) dlg.show_all() rc = dlg.run() dlg.destroy() return rc def error(self, message): dlg = Gtk.MessageDialog(None, 0, Gtk.MessageType.ERROR, Gtk.ButtonsType.CLOSE, message) dlg.set_position(Gtk.WindowPosition.MOUSE) dlg.show_all() dlg.run() dlg.destroy() def enabled_changed(self, radio): if not radio.get_active(): return label = radio.get_label() if label == 'Disabled' and self.enforce_mode != DISABLED: if self.verify(_("Changing to SELinux disabled requires a reboot. It is not recommended. If you later decide to turn SELinux back on, the system will be required to relabel. If you just want to see if SELinux is causing a problem on your system, you can go to permissive mode which will only log errors and not enforce SELinux policy. Permissive mode does not require a reboot. Do you wish to continue?")) == Gtk.ResponseType.NO: self.enforce_button.set_active(True) if label != 'Disabled' and self.enforce_mode == DISABLED: if self.verify(_("Changing to SELinux enabled will cause a relabel of the entire file system on the next boot. Relabeling takes a long time depending on the size of the file system. Do you wish to continue?")) == Gtk.ResponseType.NO: self.enforce_button.set_active(True) self.enforce_button = radio def clear_filters(self, *args): self.filter_entry.set_text('') self.show_modified_only.set_active(False) def unconfined_toggle(self, *args): if not self.finish_init: return self.wait_mouse() if self.enable_unconfined_button.get_active(): self.dbus.semanage("module -e unconfined") else: self.dbus.semanage("module -d unconfined") self.ready_mouse() def permissive_toggle(self, *args): if not self.finish_init: return self.wait_mouse() if self.enable_permissive_button.get_active(): self.dbus.semanage("module -e permissivedomains") else: self.dbus.semanage("module -d permissivedomains") self.ready_mouse() def confirmation_close(self, button, *args): if len(self.update_treestore) > 0: if self.verify(_("You are attempting to close the application without applying your changes.\n * To apply changes you have made during this session, click No and click Update.\n * To leave the application without applying your changes, click Yes. All changes that you have made during this session will be lost."), _("Loss of data Dialog")) == Gtk.ResponseType.NO: return True self.quit() def quit(self, *args): sys.exit(0) if __name__ == '__main__': start = SELinuxGui() selinux-python-3.0/sepolicy/sepolicy/help/000077500000000000000000000000001356774067000210075ustar00rootroot00000000000000selinux-python-3.0/sepolicy/sepolicy/help/__init__.py000066400000000000000000000000001356774067000231060ustar00rootroot00000000000000selinux-python-3.0/sepolicy/sepolicy/help/booleans.png000066400000000000000000002160551356774067000233300ustar00rootroot00000000000000PNG  IHDRj8pbKGD pHYs  tIME UD IDATxwpGj ދNidgfifgnMŻ⽈݋ۍw;ow̎FfFcdHyI aUu4pD?E/>z+Ԡ@ 7$EcX伮B׬Y󋼼<(@ p&CCCZZZ~e~~Ket]# `5>>W $ / .M&rE4@ nT愾@ B @p.@ 7 /|4MCUUt]G6P 4]GM$Ri$IBQ$Ih絍6Hl_d`X2]"0[N]/b(gI$Dun0ׁDx}|xR_Uwu' @~ow?W'T[N!,ͬ{~>?nHO'=y,4~S2tngO?t?eu#ǰYLLNy*ZZxݏ086vt@4<{~ a6(˥(¿?;~#jqe3^oHs ֬B44]c97>;o #cd~~/E"w>j069wy 6ޝ)).W2\<҂থ[6WБW廉E4+I$~w ?yQtv`l6μ$@Ax{1wz29IHש`uC-?w55sT+V7~J~˧:7 q?[GFi>xtvqT34;boGSiF&'Mf,hDe TU#IrjҢh~|G=a׊>۬1dee299EnneDdee37ƿSQ1w#Ix)g1[Ymxff{# h#rq9uKFFVh2 i>ku!6YYYNRfffO ʢSI4L:AAIu-Zj"A84CQn,-0X:jBw.)ύ?q+nsl7]]#7H74m;0x%# G8?cX-x)-)Ũ[cZ@6M(}G6 %O ~?$*CCC=́FFFFSiĢUU]]w9~!4M} b%qUU9|0-|z^U%p1>d,RǗX,ƱxMq<սc_0(&itQdو f+*͇m݊i|oxEQضu XǎHHgƍ %g$t84MMrؼy3񒝝MuUo}3lܰbl6+xMMLLLgʕmmlXLNLfjia]K[HYl.ftشqx Ϧ-TUA~YYܲyD ]ʊ 8922ٴq#Sٻp(Ȇ P p UU(/+cs֭ ,B HdYfPL+ꢤ()yk'blvdVj>Q6_G8affh,FTVVb0ȼg333S__(GCb8ǎcOe뱘TTTaOddt"74PQQA8tǛeIϢ(Fne3&ݯB^^55DJP $a2().Ӝ;w.tJF&3NNGG-Z(/jɉtDR )!xy}!FF100ƃ׳ }}47d`xUVbZ:/Ԡ߰n-?H"Gtyqn1?&,4U#-=wGLɉf%/7͆BaXj%ew-- ~Bj{?BTrssq~z*+*AJS-~8zqxFljk1c86[$~&9ҲH'^J?o{9?Y@󑕝Ͷ[hEE20̌dxAyY&OMMŤm[9/:X,5e9 :A8NGQ4Ml6( HD"hĠT-5A4bXM^TUe3M]uݢ&Kmy~ 1D@G'7;y/K}oߗJoKGHjT߾0!%nʞcax WKtVF0x1o}݌Z(,Egg^4}:xʲj]opAn?T9w24;ski~o0 gӹ0Ku/e8]MdY^d꿦]>u@ՁzgGɉ'XD໒bJ|n`0\7ٟb{\&&s[wv>NwtzIOOgYE x⊂|b/)XJf˪d܁7sAt=X'9|k@1JOOtRYY}>w_ ژ&t]O^H ,f DOVR>1ɡ7b2nwb2D'||RAׅKpMTdggRN{׃u?0veI>wH8B ™&Wx@p-Mfzz>A <4Bw!LsNkEE2MЯ9GDqCu#0((yɐ`2_#53FEH`6Is ˓@ \?Hpn&E8.O("/*C K&rD]MDE*j^Q`zڻ/B_Y^HLb iB1ݛq@ \EZ뜛 C2FXUvs4rrZ6oH0t011AOo/SSSL&ҜNdYm,( X9yN@,l6iD"%u]g`p^t^{ :ΦɎ( @if<3yy3667X,UH4ddJ% @'~{"&&&yg_q:F8n:S$TX,hD$8,]7*}mvPU)).$Ow~wK;wrxŗf'2w#dex_[ % c$T0,f$IF1*(7]$ob%>%dyȲLqq ;+eRo=nwa2QU{﹛v{6>ƹsЃTUq1D"lܰ]9vE$ؾm+P@hbbbF`[{ B<أ~Uv;o=M0p)V\zA'+W,GQ2].VXf&&ǕN,[= $A~پm+%%o[07GHAWu옼e<ø22^iiknG4c˖U,i_QWcmY| h3&;DD"~8KE]v-n}wyG0Mhk>~ 3֬^5khjn,ѱ1$Y4Owp˦M dIbct]p6t:7! Ι%I" I… 2\fKdc$77ӧ--̣wbbb,OFHfffD.TKfBP_jVJfnB@rLWN" /7ҒRQMU|u7QWmD:B?:iAFpi!bOWMB  Xe øŞr@ 5~˵dBdhY}<@ ? r@ 5o4E<@ n(@ࢿqEQn/7Ҙ#4!/{,qTlw@ 1 >qjzA<^e^5 `sĘ&,LMMݍi $1G5H(n1Giς?OYTU^ZO$[S.`.wh'=zt~7]׉b ǰ~.rd6EQ.E48FI 7_b̹ύiDzX,E`&g|?r0GJ5U+װm n?`@uNlfzf;|%=uq%cx=3O";Mv|JD¼l~+~RVV7_=-R Xj̹~~IV\Ͷ;u9N K\4ښzvl߁$ ԑsiiih(l6p8t MSggQF4$I"  [A[>`c|<0x^4M#-͉h" e $IO$0M>/`\.Xlafu X6N2[g^69YIUհll62k]/$D"AGge*:  W3X,J,O?=wab;ł/f|ȲD]m==deg㙙aXm6=L($++ |>/D gM^~? 5䭽o~3i}KHXVV7Sp(Lٳh:,(**b}{W>p8q;hj>AiiPydiiC!6mL@SS;qʊJjAff&%9 ?`Pu0* aZ0LXV֯@vVp<dbd2 ),(n#I& N^^>ǎӉQ1}+۷ u pWۍ,ˬ^eU{`2R_j*IV%l+Va;شq3L.W&j=4|7K~~X,Tى ᄋl֬Yi9ɇO]]=̖[x}},~ ,'P E4gZڸa3`X(**lwVÉdJW=9HvZg:QbBo"&ի6nn&:,/-#dd)m.Гx]0̩s|gqe]?|a0L Twa}v1&&ƹ{/z\]$Ihb[@ps1j?Xj|scX,ecxx>FFGS߻(/cxxؿ14MctlX,vgRALcE{{/Xxdb\09s%ed={uf?qٺxyqnΞ"9. :.gzk?}擳  ]nvt]}yimmcms,J0vZN#GXz5NrJfDS--TWU:gYg!=#5W333éS-(FeA>D|(cc,j烏>d2vZ4UMU"'''5vtvYVӧOOihh ';~z{X,]6%%%dg'rD5Ul6NjacyCC*g8tG+/gjzCYYmmx=^njkj̙38N֬^M0LWhrssyH4,ohtrQ/٬^z [@o_==9EMuvT9Owt 1ͬ^z{Yb]]g'X,a2\O[SuRW[o ĉ3<x熇۞C FE!jhxX,Jt'ΞwoCt7`|b괵fƍlڸ{S[[áG8yw|vh ʼM8pPi::;9BWYfgprfVX[nIOY\VXA0bjzn_y+cd֭[KC}]]gǃb;hjnfxhh$B[[;wy'lD]mm.rrA"PTҒۇ$I344đ#G P]]-bvr=BA'&D"O,ld]rlڄ.bs㌏a4YxDrBGnNU;RUU?*Yjo7066iY.o.UUfEC=%%%~ho`Su&&&bq7md_W)).˷߆;ߝ4kV&##=磷LLFmjsQc4)))zSYYAii cyC=EE4l&TM_?wqNpnuI3v_ sNPf #hN"+Cg^ڵ~T{naXY%TBP$GP(D,:,+7pcN֬Y}w700oIs9/ hzB1^=CA{Q> U]P'sul4ͥښ|>TF;Ԣ2ӱX!Ia0;o}4sQ{Z0L]؇[\TLLLim  sDB!z)t1xW֣d6 &EE ڭ+ĸӟo͟WqeUdgr}2IsC^^U3iƙ3]{Ȏ3WQ(ee{y쬬rNjJ 9ٴ{`(bSm[R\\ŋbWʬ1000@eE) vד祥irssc%B FD1J~^2Ǐw DCc###+h4"65VHw}4yB ȴdr|,UUwBrRILHKJJ"܌ ڬd֣^d2nOkArscf! IDAT\^fjTرc:ˋ)500@Jr2ey+bfl~X\\j-bɠRSS$#=L?SO~8%DNN6& ۍf#l,vIHH 5%GEy9r|5DNXVΞmrKMM5# N~^G?J;\\k_)oW*K$AP3%k_P(d򷶆P(p8<̳k+{Js-N 3(+09p ~l Jm6133KOo/{HYYrN'o zpݼ;}[I;;غe }}{6UW_Ɩ-(>B]WKSOw+E9q$wQWLFvdxd陙 6kOm41^ǥH.ohkz[>.}L&R~wyv{ZF RZ{/ϥe]kY¿\:WzJy>6Fn^.wi%T)QWV?כP-v'W05ڠMC&E)#_]A,8tvt"DJKK1LLMMQQ^&N:ZjY]c3îwO~^.ĨҒ\.b.۷m۰O"wKKK,..aY)+->6Zm۶rׇL&[FCcS[lAPInN9ٜ>>JŶmBtuw !ڊ>FQa!UT |_58\X;@-E)^k[~>/`S:v!z BDd6!Q^x%9@Te||ٌN#1)R(BjZL z՘F>BTj#<‹d2 =o6KKK:|izg?ƦfG6EƦ&Fcdee"sFęƜ@8ajzsm파?g_elc#F1Ve/ Ajn7M_Yo?pЊVArj `(d4in=GsKgsdgecYAb4Jd2^zhTŋs~ԍQJMɯ>tFj%7`07]r9Z|dO]q:Tei*OjCO-r[u6RHX"DM=d2`ddɩi‘U)Qrւ*4 Zz#?H$Y^^y|29;ofTXˉfb|~ߦyTVVPR\`@Ppםio`||R;RIeEMtuuqYΟ沈JRV`v[(/+h4!())&??Ą˞ʺ5?SN$M,zEʤܜWfgf;署}V=QB4;k+*D%i,!!Aac{a*N/&BQ80@%w L-JIEA2%dgemIrwȨ}sB |_^^fZ($$$>'+%lD._QuEXR(Ϥ8/tJRH0il/";#Kd:d$jTqLN 󩩩qс`\12ւTj5`rN

N:(v=: f3^lΞmR蠹dv$!!JSQBFIq1PA`9}NEy6k iAERSRHLJ񒟗Gcc}}effՊ^ QWr?;wSVVl^YXQ(>rёFGGE<)((fЈ&?/jGFbXXq#{HH0߰\3;l&o݁rc]jA ^9JU{;_ofK]uݥQyOŃBBBD6~+y#?زzx\(~ =x!5h4Wڮ )'Djj*_SREHHHHH|H◐gƿvͥ|GJHHHHHHr-aK{RI^^> RKHHHHH|jf(X022LMM- Bz }_j4k(h50bT |=ffVZZ[ 07?ݞFci:Nzzzn!"1xRnN'Ndjz~r IH1"'s?df2`0(5OSSl"!B4`llyZcֆc'N h=~F$"8ki:imkCË2mq+ȵ.]8f /KzzyᥗeliJoDQdo25=z\] |EECC΅(KRFP$ʋy@gqc+#⇛l2dcXr8t$/}G.$%%j@Ӓ.D YG"W|)W(rE{G'{eOCS.`6{8~s7F<*jt?vZ-O<8 ^Q!?sV[dr8qA"*NˢsxL^۷!"P(x=lxCQVZ>p}& qw]P(>m f3BR> YU]ȍWYoJ$a2f![{IIIC$%'ȅy8mtvu#CWyUU"pˎEQR7l ''=yǙ>6FcSKKK<8N440>1AVV&?tPXXgٺu yyrĤ$yIIN{LNgCôkc׮]42<nVrrsx7ꡥ\Ɨz XXX`y9ȽCo:x6mR`06!$~}?nxư?<'OQdR.266NEy9yTWW108Jgg|/BSs3TWWc #Gt:pܱ47QHHHd2!vzg?SS/8µTVP(e9!d# R[[Knn.\@&aXHMIh4j_%CC{MDtZ rɩ)j#?/PͶiTWP(H ?\.'9) %# CC].rc>CAgxtr撞 SP^ZFAӒlZvE1|^/] uܾ<AVd4JRRcmb@^AhhloS%avޠC\C /MG!Ql1PY,xg{[ ~&dnH$B^n.f JLMr%''FbR$%%(xDnN;ogbbPhc=  SUYIZj*)~h,rssP'S4*Q6i B7|%pY7rs{,8?߇(tvu ;A&@OO7{륹'nr9Jήn*axdBr95eaaDlV+iih0p8LCb" I M0LYiVkȐN8f||wb\^ & mTt:-555Ҍ_bePVŭuj 9QZ@U!~1~ IDATˑd h5J :5j\A42jrVqX>Ւjebb|uB4KszzGn:D";v7 cϋ H6})>^a_NYuFU:O(,.ABhf!_]-ORVOY 7d-,|2?(riԗw\q ba4ښZ-NRIKK ;vl8lniajj Ν;`0HKk+ttSUUI.^@Tc&-,--Q\\LQa!=zH\`s-T*X #=2t:Y\\*Dqˮ]hXh4jwc29ֆfRhŎۉ#hkІ?Lƶm0 q/).KhnivSYYRncy9@vv6es;::WXhllj- --rrrBDfzzEZZ۷me!-uzZZZ¨TJvlߎVq2-2>12%%%  )/+@rXpӾ$JӘvxdSBG$*$LJuQU}oF0QYQ(m6z{{"))];YXX9T*;wb67Ȋ5,쪯grrs1v# fVpvXep. )-+%/7(J["(**i%a3~A6"H0fswp.}SSWIIIftt'Np89?izrnٵ 2/oA.sm~22˔pYFGttt3si::8wx8N~^T*5q9LKKd4FfINN?).CDQ66p8y8dfeF@>#8l63jIbb"|Q'繽{94'N(o*ш`jrQ:9pHP(oxAov;o6ټ;vhni!))smmwv'%.ˢGEQ9&LaM!;ýZhkp EikDE/""\t3ʐ8+x}></N`jzyt,QոxM-KVhU*=vY;}?}BRrYRbu;KhxVgfhwgjzzCY@Ln#oȌ_+[ƯOpa`W^{64pķZ ߱-uu? ;oc-硇8s4**c٢(@0Ȯ`2o#';4DQ$؄Vz,2>naCjj*ւ,,//ͽCUer:sj*Պ`@TH~~EE|dg@Ey9p /|KFv(njRvۭ?xˣgC/OjjJ ;v ==lجV^l$1dd}Vj5]LNLp:q..j"5%IKMJ~,g B"UQQζ[d|bwg#KNbsT%;9 !+UZ U y3etg)Jb%Q&٬CU2lÀ %93GmM5) !CFTV#t\Ȋ5& 3:jfqDS~Μ9&L^nN\]+V2+ ,2gה#hƚAX v뭼s cbqr \|>?g? ?_x" WJ@?.Ly17?%#\NFSs fyl';Ŷ[QyE$''q݄B! QZerJKJhhjBVs- 2B|_gzW=r9 rErsBiI C|/]sssN+O=K#CCCجV ?+7'LVvlێFFntvuc5 ŗy1^ӫ_W|D׬7S465o  NjA.D 2<g 3**[&%D4"t D/Q7 ٵV\(HKKfffX j(~*++);w⊬ۉFWʫiWd_ۘ򓕕oox#ɥP(đGغe;ˮzx<26>ΗCqe3tܰG?O,z%(X.3:6,s3q,iXzDQ&&&[HMI!--`0HBDp\280Ȗ:R뻀ޠ瞻Bף((-)ARVRmu@ APRTTDnn/SR\@P\.'==YH\ffZ!P\\-bvv<^/a2WL_ P\Tr @ff&x^ll߶P(DFz:fp8LVV&εq*AZ)J OeeLLLpۭRnJ1f34+?/Ғ.\ȅ0x=N~yJKJRWSrNKrrՕqS@&!D"l&/$%%GGg'SS8Nf7| `~ܜ@gg'dg#W(0 188DCc#ro @{geKڄNZJAzD :5) zJr43yY$%1$'1( r!UU33X,rsrhmme9 4Ξm`l|;n `xxxO'siǙZ_Th#%9eEmM /'-=Tr[l!Ӳbm$&&HO'99NB BĥMOO/ssܹ{7eeŗ%###&6~ReMCvw]]zϸ7BD8P(0͟L)\ AXEA^Z 7 n.MD6*o61DQrSOzyQThBA ?7BP~Y f)]o,U\&ħ,C.K4`]Aaҍؐ~Dx~^jkjeѬY/ K II7eY>C&mki^.KfzvȿL&CPtJ;Zk0FJ}&[LRm(ϕ:R2K܄2f!#7rOZVl˥RPTQrSXnČ_B⣌/'>,%T*cg3J%d5埉==ڌ_B⣎,EV_3 ?oYquf@Z3BR◐5+EO%ڳ%Z 8///Ԅ Ȋ~/?>g_Xs\=+aEo^ L~/6a믳rj8N?VB0ūf%w#&8x!*ra3D=|XYsȐz|(Y!qmܐ5+|44=-3QQ\i 8N4 YYYLNNJbh5Bn#7/7v>7AtH$}l&&&V1==RF^Bjj Ӹ=|^))].:6 \zDFF333~\.d`vvZ bpp9 zyAz咗cttRjE 򟟟ȨƦ&ʢZfgg9q$L4CŒr\.vo-uudeep8b+'''w '*$$&P(D7` Q ,/NvVNQcc34*KKKڕPM 8^gǶmZZbdd!/77{<cX q,be1 ~~?JN$??$w@P008HhRXXF+N#*FA\wȇLF^nMM'sf[Q*y$=.2ɉfIM6jjQOL`@Efaff"F+ʓ5˥,N|UY!)" \V2\pG<¨ݎ۽yӿ7FFx㭷ilj&O?0 E\gRv}4md /,WLtSS,8>s{<"q{<:|Ʀffg?Ga vy308Ç9v$^_į~G3=0sDQĹZ_~aΝkБ#qeZ#DVޯZṽ/`{1jA.\e%łÁsq'ini#7$Z1/8nWsKKlz?G:g什P(338fg/0MQ[g:EQDQ JJyHNNbʕ( HZ KH7GM+$q1 32>#qEQ>nj^k_R_@Zz@` =fP8L8A$xg̲sEQNLZerIb|ʧCw999KmˆrX' \6G]wAqq1yytwwS\\Doo##o~VZM0d޽8u睤zIKMe8]niX0$Ibtl-RZRBvV{졶љUI (8q.7 ,h4r1Ν#77믻CGUUMrr2,^@yy̛>r$FGGl6GIq [Fɓrغ$IA8@YiNt;E с D z8:)VVhmV]"B IDAT~75db޼Z>蘅ښjF#k߽q @JJ2؎@CBlvG\}MOAYP_l&s.N>CZZ99oj Ij:L|G ɄNiI1Pp8_QY EQbyɓ/jX"?pJ*8y IuUU~z=Ӱp!qz͝z, dgeǢ)-)nwM0Xy-YB__=g#HĚ5IA|vӓ0>9 4U䐞l('N$ TfRWCvz阓 dN7Yl)G>mmĎ8wsJ i===c大yvV/|-TW#G"?p2rrr>Pp\r/|Q܏rD8^O~~:.\Ab $I" ySO{fd! 馭IGӜy*\,19J7E!㦗cM}#`^?+ 33 3N=S3ep8a Np8;>$yydLE@HBϴ8_yӟʹY)E@ NZ8!3CS~t:(- a0.hsu>|1_Ηv:NK s?=z7ETs7ljA0̸qsq!N$Fg*%IsK~Q|rOwYqgy\k?N?M̥ L=ںw3󞮏لW 0˦4ͬ6x!;42]W| ;RUU ;+{K۩aCW|Ѩ*P**AEEE_EEEEEEEUTTTTTTԎ_EEEEEEEUTTTTTTԎ_EEEEEEUTTTTTTԎ_EEEEEEEUTTTTTTԎ_EEEEEEEUTTTTTTd.+{].'=g{b55tV eYO:lvsOŬi(l:r If̔~ADE"ў{%IG _2}ځj|.ȲL(d4Db?V8h&$"+`N/˿i;x^'h=dΝȲ|Yr} ln_v]Xvndd >Kxr;sG0PȲ(l{}Նq 0Eľ.y{f;@266V7 ?/e20pQ[0E4;; 8?A27/F7K(@X|GrQR\p "ǃbf^O$vjc3B˸ՊC q{<#G"hZNz}T. F~^Yjx<>~Fj BvG, -&$Ix}>v;`^Oprgx& PYq\4 HӉj% b0c3aEQ{x}>A$ŗj5fAIQpb^gbb׋^'9)$^/. Ӊ^G$<V`(vANgSNuccc pVDr.?@A~>z@ @(Bvc:t jDd8'NGRR &n͆`0 NgTP(H$Ą-+Ft;9h4~“2O'#=ↅh4ZZZZGIa6QV;gRT>O(BE\.>/VuDEۍn'q-EJ-m-|4KE<'bʲ`phmm䓑Qq:x^Vt:-p`0US`~f%IhNwIrEm@eV,G1R N\.Wthlsuq0SP_(RY^vBs166(+/h0koEqaϿ>W[koql{yj3,jh`ddW~{-[4q=vfvًchd^y%"k`|6< ˖.Aӡ( W^e``]PS][6k։ ޼>LMu5w8iko?`dd3];O__l߾1f`6ٞl}}RfDQ_X,h4Ak[!eg?GH<\ntv284DmMMkݷZ[O;[v  ;w醴;v0߽:}}/HFF`0Ⱦe4xz^>P0HYY  xW9z2N|sr1 2l$>\_qvMfFz-KVf&lJfF&]tuwSZR3=O~^]l~]nO?,-b߾||8򫯒[6SVZ7 yW(,( ;+ ͛oo骰_{Ndzϝlo/e&dE&'':`Fz9q$iV\[q'$''wY,$$$5g" ƞt:EwOeʫ.?+)9_x<^{z(.*^vIq1M:ucv/[p#$zGhCVzVH@lo/}YP_O___JJJ79C{Gzz}|-TW7_*-)>ܹ~$I"99fbAӱgo#üi3U4AU[S.M|E:R Hu !k $ed36-kJH4PP2DI$ и?^-7ߌÜlgNb2)55PRTıMDV\FNv6,p;GMUF1npb2?f p7r-7s1>;;ޣIy!RRRصg ={2YYЀhDTWV˿|nJJJ㻏|d<}8Nj;(,,`U_3gPh*k?xQzo`H:Ge^m kW!:"Gx;HNJBVd ?/ﺓׯghhMpmbr%1YO[TX _NLHNN;"@ӧOP]] _#?;Brˊc޽']ϯ[wE onfnf̟gF)NW8  blo/EE1>NQRR}Cvv(rp5 ==ݷ/6k;p( yy|o~> Yg:;1M=,Dk+}<'lo/W`pV^D3K$)ζۿp᥮"d 74nogQ]탴ub̯Wo4!o?K$r嶈,sanVnz.kwHEAikkcsv3ҩ3YlW䖛nBl`E\sU"L|ZRT\)w$"SWɷGxi!I,c])IFdYJB>p$G۷s\. ?>+-%9)ir` B pݵװ}.FFF?49(H(hu:`ElxyG~pISaYIj4m `6|L&Pӳ|Z=?aݺu /qmlAdEAhנ' iq\QG9]deZ D0$ _$qi#NRf<^`Qㆄ(LK4$ǭ!"pZvn' EADXZQd4D~^-bՊLÄBa\ҍ;AQf8)Q  7(ܨLZEVh469s&NWdJx{f233IKK;NK4B @41$1SRiX4fmQIBԖu:->_tJ C\] 8+D~G9} _?l//b?%=#%fe4Tfa[+hF`\HnDY~8zj4nRtdI0~F& &D/Jm]rպSTT,X[bdқ EG+xWx)**DQU*trAPR]MJRHP((^I9qq|~?\}zNmHo_N4o2‚z7/68r)ɜ:u$LQ6AGILH`1iNm61;~ł$zn^-Z-| $''sϓ _ύ76CZZW_[6 ٙhZC;(j %&$DhD 7g{P8}ރdB CO`D<|III ۛ`)))f~jqlx922ҹ0HM_->h;9٬Y*V ?>~lV<&n8EP8L0@"39\NN'yq~WErr2~!~ۿilEvJJJ6NN\:O7? :]'SvL3kAb( `p8wcsջ(qMhA$յ`(~IIIH4˶6-^BߔFQBPlT]FGx<ɴ± ?x IE7N[G $dυ|2nVyt] ̣? $&&^M(Ӊsʧjpz0r878wM$RC(v8t?џyh cںtdY!K^[ ZRS||Le+Y{A{OggSN'!8z,'Dk+K,\HSYYO$Xqnqx4ғH[{.STWW 'O 줧?SW3u-'NaΰLdӿY\}z-Kd2ŕem.A@ӡiqATsTs7=m8+w1 SZ's=zi`b!󍙉<KE(ٳx}>(,(me+CCCbt$99!-:JKK1\y<6$2mdm&ջs()>KӾi~IƯvh,S#/Ɨ)ثjk*}|)oL(4|UE? Է)񫨨񫨨񫨨񫨨|.˛~?f}/QMJEEEEE˲Lg2(*,{UqzrK- չj \A.y_e?s\ x@Xk`|} DZvYq\g_E q\(rd"AEtkß|tdYfb8׋ȯr9!BV'hKŗCV+N3V`0c*?@$젍-;ټK@dp܃=̒^ѱ1q!O>[oMWw%"K\?ooڄlyw+OT鞯1)ɶ6fs!|>?%2lWq:=̳~n(  oq\z|m&lϤ~ɦ-[p>+㥒:UYV {ٶ4;\ځؗC"'QEQ9{W^}P(ׄ˲ yg_]2]}$H=̯5`_ރEaxzSpGFX, J9KIq1:*+*$ή.*jtvuaXHLHS'̯G(@ @vv6tvux¤2n';'RFFF@PYQAnNPnv;12: :jt:K$LTUVa2dʊEjO}Yr !F:p\瓛n9r;vd4PVVxSN\,zHHL GP¢"RSp8:}Q</ `@%JKKD"tHJJBN'jkIIIAZZee,YA8y@0@8{pddf5ml$;+ `NIa`py),F%X@\EEXVzEʊ GZ-\(wt4t G ##GL2:'(-LCV&IXD$ BQN*t}ص{< eX,:8ь?SWHwɔHP 9kJIK17,䖛o Nc, Omxq+;vd8Aˉ Ϝ>}346zhxE>CG|2cζ'';Ae;wsn, Oox^|eǭtt~1dzY IDATox Ÿu`(DSK nF{)77cN=(J'lxYF,vP\X9,,N҂ewh=نm xj3=AB0>?6P%W^}O=;qFxbFFP_}(ቧ-lڼ6 6<^&&&xeadYᅗ^7m`<mGgW7_z,3<2+ F`B^wVYbN|=n뻺|<̳\n"p/HˉX'l[ǟ``hv.XtFFxcux,Ϣ&Cg_CyNmkE׳e)N mQĄ3&r!sEQD4Z-^'ހ$I$%'W/CTF&o-Ns3v!^[JfZpfm6}||4'Yl)\}{62rkи?'ڨC79W4|w,#2Ǜ&u\wTsȂ,\<0 #))q9,Gb rɒ,\PAN0D,UdfdjJz=Mq2'HDmm 8v8v-0meE9Xр``QBjutw֓arדu[Yv-$tvwc6Mey9K/ښZ$'%ߏbtl,V޼\V,_F}|Niidfdpdfs,$(ϧ*Y3|ɺkXt)Sk j(@Nv6W[w0M\OY|9˗-~T.0p{YT0%ɉH=~nXT@Idp" pzq`{_kSvVTxdggt*+w%_ć|:AѰraLcyvo_WFvP8tACkm2M--w,]#ǎ zLLL +2Vfxx3TVQTXĄ}x,k3~=+/ƭCavGlË dgsiv;NGvv;;bphO=|ҁDe `;UW?",db]l  Dʊ!7''v^2ffp8P";d{;de|2>yythq{<  cT*K[ ֮Y38LFߏ$ ɘ ]dgf{pp5kV36~}sQQh4<ʫ#8sC2$&&lh4Z˦eOOY 322@>: $##Nwzn{~T7#Aǒ,IO(eY,OK{?8dsR4ji)VFՁn`CW܇( qGFmMM5322(vEQBGFb2~ry~]NNu&,x|. 8vƭY]ҁG$‘#G(( PXX0iģrV\(;pFrrP,,Y? ?bFaNYi)99?pj;:EbDQ$+3||8P,jh𑣴lc 9"``p:DIc K^^.ZVKvv6)f3#Jqq˗.EFQ8|ͫaѐ j9z('t̫c(U=x8ݦ2<2©ӧ2>NeeZʊiu޽3`vSUU{N#33?^)f֬^EVV&vaph{FMUe%Chp9,^޾> TV( %x^۶222šի(/+8Fs@ @ii QQ^NVvV,iidffWkV= ɻ[ߍ廠Iؾs'===c٨`004[{;̼`O=Eyݭsڏd&b(7AKI^*UY g&jEtjʲLM(7DIi5:+Cj9|(mmQRRj~~iih4;vddty79N[[;H }|sN r{ t ƭ{ ɔ@nnH6H8B( `N (B8F$).( HI>נg*?V{ш,C!}hbe)r_T=],iHV{QC|*۝ґ qf~6WpAL:1o?H1|\*Qԑ+C>Ei}Y>yt]:fcJAiO9Wڂ ]p G_%r_z]Og)NBbv$"su~T.udJ>D[U7 sJ _9FAUo$TTT񫨨7˲DM$z4m`******߄?zZS7(jN{&SQlvvJyM+%˲ /7Db?a;șS/z!(BK.T,_p8|IGrD_c\?kS\j }YҺTur>;\~HYQ×%/ÇLKmw2 ѧ|m:蛥€L$ "Nkj9zclv;qn7:Ϝt 1ko9gÌD"&;:OS3@[OdǎdY{?k-Kj#@_?,gSv%<=OQ:Ds~!_z!V+կqݗTfΝtuಬB+E7Z=1%ŴtbE! L(vzh4`w8HINF$V+% ͆lOp: ̩4ee(Ue&&&XP-Wev;pF#6 O8!))݁l&5Ռn!I;AN$'xp:hZ>S144o7?%##Vm !8uTs x<8<ɓ$%&zq:$&&b6cvp8xgGf3~v; g u ^Eu@(„݃VdtQ%)@J_t}lPݎ(zǑ$ m@ &m>Dvv6:k)))fYi4<()9N8n$242bc` Nۍɔ Dinn.ߏBRRRh48NFd4zXĕl6a%?GezΒ(~dYfhhzB_ `-s׷ؾs'+-C75lR::N^f2]IHH`޽WJ* W?aE\.^-5,򃏶344ĖwbNIa2F~~>Ĺ~.6@LSs ͷ7aX۸R~_hnifǮݘLF~kX,vUntp1@0weɢEdb޽t:l/99 /ښjL]/k.\@SS350:6 /L$ᣝ;W|Ǜp8$''rU.-cNl> '{̢̯<3-DaDnul9Ѓ!V t%}իgmBݷ\~ƛTVTG顭˅l" _ $qaB 'bm Պ,+*ƹ~ױu{?tn:::䝭۰[x㭷,/gtuw9{֯z^?~NbbO?@/HWwG}"%%< tue|˥|ZM\*8u6m&  ͽ}<#QY'CADhko+Ds j*y~mEhܷTWиo?'Z[_7#ZxYYʹw<=#4wn6Zux<m$/77a2\* k&#!*+*(,, ;;D%^k믽P(D0$))ډTO6%K(,,[wARR{eh>q˖qU)/-:1Ae'2l`4GɓŎ2>n%W]=G[oA`O^4 ~}ć;wqS3-N>=#h{U<dfdrrnFrsqF!|>6OKˉz?t0{aJg%v-SX,{Mݷ?N&tҴhB$"sa4 ˉV =HOKS{+z=v׋ l7z!?7-ӿI, /-Lݼy  !yjK d2!FF $ "I&AZZ@/5լYk֐j6ir^wQ*q@)KSTXȍ png{{tqy011(˦jAH0jeϋ,˱C@@ W==!xIó7"b%Q 1!޾a Nى  &mX ~Zf3+W6,,_L} BaUfuRUȸMOrrF]T1, 8'z_ǹ;$!,zcˡ( 2YYpk֐ʊe1͈ qy )Aokl6>@0H8$N6LX326;ηiRnMt/(x<4EAj~b} ^`0꿓[>=@4 ׸;^fVeY懏>;[2<<>~;~Q1O15Dh=>\.I\.Hg9w}~YQ'55y55vJKJ$`NIHKKcXVՑ-[xf\w55yw?0e˸x7D2-\HssKD5@rrZg」:C L*KTrrdAV-Y4;gvgv{vvgvzvVtTs,ʒ)9KQj={~spDUUxԩȊbbS[A ++@ Ȧ- %dyn|Æwc'30tȐa6a2ÁjW!n3~XvMȲ̉XjvYfHa2Ѓ,]ٳf".x1VZM~^>loTU ?8uvY3gbN:|%ٳg_O~g_8Ȋ¶ytz}Ə˕Wo! 4W"ϛK[?9JCz0} fcA|ymݛ?QJ6nG 26I~^y7re2kאˀ1|8YnfvC3!??6+*y| ΟcƓO2i*+ٻo?۶oz FIqK-r!H%+W< K$Aru)/+cĈἷd `<*Yb{]&GEy[m&, EE|~=/gޖqƌ'\pGC V:0|zG$//$OE8{AQ}}<1t:(AUUE4DQ},Dp8ٮyFQVkU߱ZLSQ4MN3]t& UU 3j2V$"(. b*nu9I{!=NUfχ:svJqȲ(RaeC~%)ypubjKϝn$IBQ,KFܭwNݻSOT,&e4uNwͦK8p` |6$X<ӶFl6ޙ>]1Kp(/D"XVfs-xWvZȲL<GEl6^綶v~7+Yu|)NΒ$aO=;H`6KG£&I쭢(b1 ~YeYFQ~_/?Q3aNqQ!$Ep8w͟#%$,fszM܇,cZvzrgX A xG|rv#A--j{b%8sFi_=IEa!%L&!h9fbj [\Jm]='?3gJ\Omm-/<^Tc1K.jZv;\fxyyt:!ylK+c8u --<6m* iii7IxXf-6̟_Qw>N>Kyj\"HF{FT˖l1ܹZz⋣Gy ΝGQ&OzCf446vyX}^|yTE?d18y+#/˲+>~OSs3vO^l۹Wu97l\^{w[LYi)m,?on.-]JQa!>_>gO׮_5Vr.uw,eX0LMr*xGNe@~d 9/]恉g*0^º_2~p EY6B,-”=de&VJ($Q&3FwHݾzk׭' 3,Y"2]B1cD>̖m)).+ XɭZ? {ʰ f;lsݫ'Nf-=% SGZCz=T>jlµk3N~xv3|~Gd:}C8qd ԩL}d ={䋣ǸWU,xYƏG4eg1w,~8V](&ԝ1}:^ F,jXQ#GUAUU}t* }B cLz!kB;p)$;;z!$YfΜ|e+V,gά#lJ^gێܼyF^}e_$"3|pϋ/<  ._^}?kS8HiI)-bGS/`}|LՓ|$T MuUbF9=7-{/FAQF%dE%IH iLDQd*;4=*_eݴiƏhQhSs0n8._~Jٛa"([n26l _UU=NNE/W[,cH"Fޓ4X,ٜ9}"rf,SV%XV$Ib붭Tc=~bl6nKI߸F1e1i/ Cyxxb(eE9hf +fP Aq0f`1|:?{_zh2DQd2e͢Ն!3rH}6={[SԿ6Um=Lo/f.UE$Jӻ7?P*EK$ ۅ$G⺳0^v~_hmkc۶ج66lĂ8^}KʼRPࣸ6#|'7+x%agƍxr:'OGx`DQ䁉x\~'OQ5lG|B~^=(ǏW=tT}c&paA$݆al6Ғb[eG20J/s ,YL?PRZ֭x 6p3RVZFaa!cFdx3edJlD"d21lx?΄ Yl^V=}y&AxL.'Mv2DZv+W2ykj8s,xJ,c՚YbzI0u*#50ٓ</]F8a4p DQ^Ψy,[⮲|?x`D/]?~8w$&DAI y(>@ QTY&AoinGVpM8s;vxu5ycǎԔ$[hmmeua`e텗 NvDU0X b%6t('MbΝ nӷoC K򶵵q:::O@=ٌ58u(.}yN`0`2a /?E$ ɄZTI4Eo= AVV~q:nNPh4:FRqV+HݎHn% Z[py`^$f dgv3 I4Eeunp8tŰlh4 BȲp f3$Ғ<|ht:$IG>]tY.K E li*hA4%/sR󑓓(~TU%7'J8ַDQԣ+Np8͖tx˅$Ib1A/ x7Y P$IB$l6Xz6lY3'+M<ݏj!';A0;E8?=bX=Lۺζd2Fn\FT_ _Znqiq_Sn_Q2^rv믾j x50cytTH7rss7f2?06^t:?n[^^! 1ƣ o```````8~p70000000 ~^Yiim!v2AA~^~^k``````-9~MӸr Voo+߸\_9j~2000 ?"PUUjn\O>X,VxٌbvsM7dJN>͙s0DdYFQmXSO!'8;w怜FITUE$DQDQvMnN( 'Nb˖TbΜ9Cǃix_&DBG m)/+3nȲLd{<ܸyM?#AyY]9Huv>L{{;&QӔbgN,. `2 F,!c1wO5M &nM4D"ΦmXu5wFCOn,q=? Sw("+h*]^*.-mL8|r%ϜA4ݐp!܉ (^UUTUb((bk,& $Yb]4[dO0"g|H$:_vw/ISGhko' ~m|Qvɘ14i2> $ey׿rȲOVr{ʕc4EUUdY' wT83$I?'xIr:I!OUE!H'Nw֝}7m%wҡߧ}{Wi]^|~ _kׯs;f N`0kt9l Щ>wH9MgC6߿/{_IV$(=>TUEQ$I2κx79MG ?WT_$6ۿ&ܫDQ>FIyYi<閩2&w6dI~~>EN'@qq1\,ӛdzO B4551g8p ΝC,ZP(~( deGytttأӧǫq\ZI4f?}M(/+cA2i}eҥL557xw̞9^<yj.׬#H , l l6UUxGٱk=zz\C,m[Y`}$*'x%0s W Cb+WC>֭xWhkog ̛ 6lL?϶l<2e2= [g8s,;wFETUvyճnOd(J[[,7"cx핗| ;wd21g,rss/ |D"VVq6m EQxӧorC|Xש>qɴuvZ[z'Nh޽ztq>3Ύ]y),,d3=͌'g ?_6;wmspbo1viGY]eHO/ѸLcKBF? ]vZۃdg9vUq@>x,Fk[;{.KiӺDG_Ϊ5kXL?J^U}q:zz˗/g>& <6d`~[h@8&כ,IdeyxEm.%K1wTUeGLjN>×/mv{t|1,ӻOof>StK]%}fx-9ihhdl6&iL4SSOʎ?n< pdYlK/QZZ';*,ĉ<9}:;wAU[H$\N^}JJJq(7 u6]p-]qp8GQQ!/"ʩS9so`ĉ\|:6Çҋ/x<;㋣Gzڽz%**!H$x<455xRhjifQT/<ϠG8aNJIq1~?7nޤWyO͝СC9uN0MX0>/<9999y橧;pV3bp***Xa 2?>{Q^Vs}.~>d%3Oϸy&xE 8 g۰ 2%<OF c(hm6=LEO=YYzܠ1v?,V YnG;?EQ8a<'OfǮL?;2T{:ZZZ2EۍrvQ;6@nn.6 D `5=UUijn!b¸q d]N'h"ʳ|+HÎǓEvvvF<(2yy].AlV(H4 ' MvNrPfSc~17oDVdjrnXFmȒ,I̘Yp7p9gQXPoz7o37&pVhtRZR_XLfjt:ɟiD".b0s}nݢw^\~m;v2d rsrq:noԏn+M~-E$ax|xh # "r$L>Lt[Aia6כd1Եp@~^NG jGwn;dz8yyy^fl6SVZ%nbʺDQS3 ӁpZFNmwihummw՟;jhlxl".l۾;v|k?]ǯ*h{7ϳnz]'8~< vf D/'Nc.JKJtgm01!~(=Kj`l޲G3h`%;vr ;7lPB(bM&\.---lشp$QA>z}-V+/,ZmorWH"y¿Gy7mt+Ț5Ԅ* 2m۷cZFQT*ٱkǎgry-#ҳG ܵO3ƭ1.$uQ9`]9HpQPO>ax0$I꒦nmoԏ;$Hw~vsȊƘ~)ҷ<"=))esx6e1yNE]K zX4(7pA_yqƺ Ya6lS9w((ڊngذaͷx`A܅ if3nc IDAT [)t'Oqf:<_=ʾƢ444dXNnNbllׁߏ=UN]H{R}-T]]>|x<|r8.{<` 'vP8LsSSRHܜ}V@,JJр:DQ`0HcSEX-b1srn_~>dy9477SXXO^444PZZJ"MZ,zH$B,#??_odjQ&Hp O8W|51aCmmmE"֭[ZFss3,|R jo*%%x? 絵Ӈ8._D$!c/o [B!~7dg m9/+u2~n{fwME4IxE싣Gt2 srn3dP0S}*Ih}zw냢 Bݿh49IEl[[#F 7~3lV IjOmveXƊ_0ʕ `Zmv?'q; o```````8~p70000000 o```````8~p7000000׈;2bܸYC8墢vh}WUK/R+A4M# 4i^tgUUq[`2! eQ1L"[wA񢪪>:1o^mroSTTd_*­[7d2~lvj)*,VGWWw~bee]:@h4/BaIFY}*b3],˅(,_>EEo\f,cXf 3gѷOovڅ#`K ^پY~m,^l6c$IblڼBYi]566Fill[TT:ݯmQj&kwRU""$q M͸\ üx "??v螈;N vTbaU8ۢCUU"X A$I9$( Niѣ<;[r<$,w[w㯹QCwǯQ_WOYYy:&8aOƯ~M^Xq#pQ<~隷gۗ[pQzd}444RSs .0h@V|]~"rssG"|r%sg!/?@EQHH+v?% /?AoZ.^Hnn.o.#GeWзo_zwzlO6\Iss3h&7'7.׀f475tnFnnEEEmٺ=[7y࣏x7nbJ89z8Ʉ% v:_[T8IհۿS}$MMx^ﴴknV+Q۱sl_3gϰg~v܉ ͛7yw2~|GQ`0Ȓ+8wdtǫQC <矟ϕWYj5W]rCN>͗/ҫgOǖmۨQCKvv6o,7ok^\.'(e47P[WǀHVill“Xu\xnͷi◿bJV\)**b5_96pXP7o۠tDrmQ\Ë/37h İX|qPTs_oh߽CKK3"9>24Sϰt e3gQWWO߰H$JKK KWNsmI"Wd[Y?M<}w-5՚IoзO_ { aVVmqZzӵSՓsYlV+p>$)$SZZb8N[F,'gw{ɲ;6Ymaߏ'+|9d`3g,8u4>gΠiG޽z1h`% ,ɓGq4$YF4V`…^EC}=(7u3f4{ ~l|>e{iMʵ8z8`|_> 470e$E xp:̝3'?79w=@LU56+v?;wͷfH1׷/,``endY& RXXI(-)tPs˗/3bx&AHSQQ*̜C>s2jo@4ƍ͢ Z,̚9qcru9z8-\' ';(29dbl߹B \7_~>C xu5T3|_klx^#T-`hշ3r4=_\.ԇ(+I*w]FV8cӦ2駩:MP{gEQUaCR9`cnjf}tttpEzT2<Ӈ_xܜ.( VONgQXXO%NFHG4В6N2N;7ޠǦMc,]sgNYL&&A@E7?17nd$F#-;$ݡcnOm5662rHN:굟2jHNg4_glk<ީ0M p(yd0?;قUK:B$cJU vI8rZ3oQ"l (L$[CǤ&:}0 M&&sz3z.#'C4<9{W9d{غ};E1dL&QXV^&Mz˖# G =`2.eԈx =zT0ax@]}\'W2f1coW4D"=z`(ĠJZ[[Yl<6mZF= L͛ۧ7n,7nb1xغ}ԞU褳e/\b1rsr3d}b6'h>c_N:6/@u7ul`2 45RQQ~4dl9kغmofw/f F /EYAI QGMמB{ BEa6V'?śF FIH2&UAJ$ &= o6W]#G6 QLq4h`%ZOxl 6?nizwey]mjAsΘ){>{N>fONW[Aުez1qqzY}=PVZʀ3l$jYwó8} yeeذaoK6l6bXÁ#uZ8}f!fւ p:1 ,ctlq,}zIZ!*EQlavVt+]~=tيD",+D<G4ܴO}r݉$Ȓ%b!cZ+ IjEIq[tUU=j](B"@L+=SX,b1]M2Ӈ,VpɃx@$Ae\.Wcm$I$cHɀ zt:BCJOq:fP۲@Mh9 !fne>q9XV"pOVv=y5ۻ8  3EJVDQT\wmϮrUomߕ]|aW*KHe TH*0IAA"W"gwMvO7s_&t LMς*E]Ǣb1|>DO1۔ISrq3sfV&'nG\c+NOp[hƃDٜ쑛>Y6 ׋jett??1^|>:B(S˛(&/uLnl2fbHrNzNVs2,̶/D"A8>p8<EcvYV~%C\b?/c'q!JKM~S?V2sxiK.M}lm8߶QZėX jRUU%ٸr=EPꫮ,g c:?* > à˼y/A/]痏I'wV)_|N2U Hпd{!BB!$ !BB!$ !BB!$ !BB!$ !wwAW,j  fz\.7B!7;]njkPF׉s"&[}{F(r<ett4MvoɾxϞ]w_7N>?r{16:?'<&4b˿t*ӛ6c?/HR_iE7L^]_r|6E]?k߻o?/ϵ]cx 6_,g7Mjޚ4Yr%pTAX`55Fq464:ǎj؄o՚p8L:e2FFG)TUUf d2u`0pNRYYIC(a3&8NBzVD~@4***ll{uVZq8Dc1 ``p x7#q~/5/7i~.@ aDcv0M^> :"(CCXVBibbޭlZIDAT\[S0X M0dppXӤ%WWqjbii?OSS},0Om{cn{;=Gvrxɧ5WÏH36N'HbQv-,\{brشe+2><+Wnq:<TUWgho'pQ{ٹk7 ׇG,SݷSҹvUlڴHT:ӛ7sՕWp80Mw{7i+456sn55v!'OC[R4/f/F{7F8x -w%_3ӟ*O"!jkY08X*TV>?l#G;9r/bHa y'Ţ寨)hBnp+6܂BJXs9|>O[[Brx`|z--->|dBC ٳneٲ u#{x.[n_YٴNJr?K-▛o?̻k׮aSH&Iӧ'~J:vFi, ~za"ƨo 6h4Jrb_i%EA4>,b|7,V+!O:&vLJQA4Ϻ-UEAa<_ԙ峊NMu5==DQg;|0vW\NMu5ˍp iCI0Ϸ'1:661Qf+}d/p?[neٲ̟1mTQwAU[W^?y'.o/3;jh+95baK5syk1vee.ZT|i#i|^;]GF)- ?ǎ'JfKxl * ld2Ioon->7WUd"A&!DJ =<=wͲK_K"4 "D!༏JS8N|2 0puR^^nGUUjkkz믑Xp! &~}1sYh_w/Hg秔=-l6*~.\N{ \n7߶{ Xl)CCo4\0 ]@ﺓl쪙oȦ-[,Y l'fy!4f?'VvvލbMQQ@ “OoU=套_0M6޺Ɔ55(v**"(kb<ۇ7o`\.3[tTTvx ٶ5ZZ[7ԦM8N|ee456puSOZTGT(BUU6=&j TTPQQ=O"`Kp8|t8ɛ۷S,Y2TUǟ/G'ʆ8) ,Mk[^3}wLLTEa 3Wj~Qx78xW]IsS^{?xGx(h,gC׋\f d*?nc7QQQ!P^ٓX|yc&͞t\꺽p5p,xσ(A.tZyaPu-! ݎahf;2kbb`&|łj-AӴKgX'znͺCQNk  p|ޔdsRctLv;>/of; q>AUU؈ Z&g;Ym6۴IQnoȉo@_xT*f28k B\| H|xޯ4=aD(//?r-.8)//5~}RUU%?7! k$k. B!%T/1~!G\;4if>0P/6VP0stM8/uNQ$ !ӌF;@?ij8vt]mힶ,c.w 3?0JG{;^ z^~!-4 }ZK0 "B\.V,ZlD2A>4M t\.a3^0MN:!?j#i4ևXd)UJ}i3i ZB1Ba3u_"ct?F6==H_!%WAGq8  '28_ ΐJp9 tvJ?*+ T mm.c# vJi&_!EL-_s|54 TȩnDtirO$%LHRTP OĉŢk FĢ8:2<2LPW#˒Τ/ JM['JP]UESC#X 4;$ !h#b%R(PT*E12>_ԋ4M Bx^ @Qp(8TUUbgI9E1"PБåyn.7pTNԂr̡( *DE9}" !||>:Ⱦ01HQ ?E秝yUj2<2B4âˉctvSVTo7}}dY"M*nP'N_G { Sд4M#PQAer:ZAx8w\O;ъi"eǎyIBMMG{i9B2E+j8v,4u0X,ZLgJu}72>QPQ-SokidzTU-bUUX,(2mg391ٵ?5}Sr9}t !)rZd"P\( VhXNתb?5g:>5}bϚ̬l̶[B"g~n+_!%ׯ6e$G!Hج6&=bq|2 ʼn}U&oNd٤/Pbxxkh^0DQtbW._!nW|_y `tdTBl31~!"_!/B B!/Bo4X,F&aR)(rl6ۗd4 SQ^?fy)|bhhǞ| Ess3d2M__ Dc147D0[nY3--) EZhOOSc####D"QNz$xM366F42sۉD"b1$~& S9MMM8N)B!3۬VZ^ze6oJ$0 <(F_JIO/'OBĽ /D*(;1 C7`^>#G-9t0Ͽ&&tѱQ~]>/aᇉ㼿cC#ǥ !`9sZC,]}ĩnT280@2e^\Bk.L6C%sxaҥtϥ L0GܼF>#^yu 5\j V$JK[k U\f {$IytBUǟ\y+>6]w5WEYŋH$SQQ%eŲ|[pmyw)\o_s 'OusӺY|9uwOp,Zeh'on:-\HmmR!u]Juu5NV T_OQ+twl x⩧$02:jo*+KIʔOD8]NEf22:f]s\v-G;?EQ dxd@EJ,#+W`|p\`TWWOji2-*995ռKscguE2ĉ.u(MTTb+x 奔 !?ϳcNkhjljbr|z.X,s.0n yW;eͼvlV+ -dEQUχBU-45itwJ0Xmnj;orfNk+lMM+xŗ㶍,YW^ơC"7I%S"`1-TU޻a(++[\SJ$PQbEQh3A{y2t#==TUee<̛7f*z<:Dsݷ^'Qvؑ7o^l MӤX,,ZxWoX/ldd2 0X(> @uVeS- X,TUVq\U[ӊ`BqƠ:uar?%3{溚af_>a&E]'H* L:~EQNn^uv^[ q=6Lqf~nuv\Uϝ%Z犢̚ND1w̓B!Λ&pӍ]&ίP Es !_JZ,456J]@NS'{ !Bq1F"TggBqD"Ϳ0#IENDB`selinux-python-3.0/sepolicy/sepolicy/help/booleans.txt000066400000000000000000000007361356774067000233600ustar00rootroot00000000000000You are viewing the booleans page for the application domain. SELinux Policy writers have written booleans, if-than-else rules, into the policy. This allows the administrator to change the way SELinux enforces policy on an application. The administrator can tighten or loosen the SELinux policy based on his needs. You can use the 'Filter Text Entry' to search for appropriate booleans. The Show Modified Only toggle, will show the booleans that your system has customized. selinux-python-3.0/sepolicy/sepolicy/help/booleans_more.png000066400000000000000000001716141356774067000243530ustar00rootroot00000000000000PNG  IHDRj8psBIT|d pHYsNN1tEXtSoftwarewww.inkscape.org< IDATxetUڀ9F bRJ)[m{o:[-(/šXq w#9!Qtfsygygޙ=#$'N(=:j)<@p`lG}||6l~_dEEE:_  ٳgO<9J;c̘1l-@ R}*-ZV(}@ nr;e2$I-@ &F$}@ H@ @ !+A$1]&n_ Bҳxt  řl[? b;hU呗`@T:Ow~uM_+۶ƻe y%M,\GϘap Y|KW#+ _ ΙO !'}X %ja;:80!Wlۚm?~i^loKJ{5x쎋'ϷIJjz&n.hj,-zGg0Ռ9shB B10ary *l8::pqr$g7 ] F .Nd:pKh~Z, z~^^Df3SY>/KWsO1ڷ5lՊ'ΞVbpwuG8/veƿؾ/\NǶ:~=tmZ9՝^]RE nº[iFN$Ilܱ;ԷEŤgbZQ9_OP.[bPQȁiʬ˰l܉O_3Mt'ۆRa.hn#.^~yVE8jz8~N|}>PI !I2aԷ7~9u svxSY[p92rr%n_ëOOb^gGmeONKgѪ$bzujp;AD`N= ]%iU*Fϲu$ӱmveDɑ~񓔖A?=27meDikn?~ d2]g)HHD0 tR*#@8SӸQL} ʱ3gYZB$VkO 0F456[MłD•d2j>bq=Mق=ޒ2Lf *@n]6o1D ATT6!6|(];v@QMK_#!IvFS?Ɗ |bRQރ<@QTWE(}?eh; <8֡.>lB Xw瑙@dt`W\_8^۲n y~.HZ$;cps ;/uۯpߺאR#eJ^?Zfw!a1}h*&cWsPQDu}Lb=/2"L&S)Īu1j8,]-(}p XU*5I D^QT o&5ݐ-ZH=z4 ⢞d2(pvrZm$\ïNѱFl6T*t888ؕVSuxBJ^G #t''', 5dT(Jf3& RFl6Rtrel`MTFjZN72 F^GRa2[pr, ZPݏ`@ѠP(x/лDR[PVGGG***jtn*SU3gΈU"I z}{ut:תtun0 S+ /I5[,FU^;rVCWmjZϗlFթFu?{s\" 2zv$IL&<\]\*5-q5_ TQRVNΝ90暴 ۶f㞱Qզ@D$\Mupsqf¨[َNZ-CE{$4B :@ 9_@ (JP@ HاW Js[wj5%%7QNNxzxR+orr9^-P|zBT @aQ!fˍ}ճnt{7jb0~~DhH(&:Ok ,V NB.Jx+K8D8h[+"#+r]9N,\4]+%\-b7Ɋ 223<`06 Kݍu2 FCrJ2[׻\&G_^ ޜ9wF(~ P늪]r|X,rnxME^U] r䕐nipCi] d WXkNeT}B7dm\ q)..$7?^F?F[I\w(׿uW?zyyon<n|r+xyyP!I6fixA{8\WȐTXRUɨV_o~AsQhFiY j[]4#FrM#~AsEpP(ɨe*ldG9u􂓩V;~$ xO0VTk!#3asrHNIXQ.)MM9ڮG8MXhX~sJ;48^CǼǬ\bf; sQdWdr Il\ڋ`<{kd [ec{F{}̊UXk֐x$^W#6M RfQkAFEjFiYG/ߖ-gܘ[iٲ%k_Qd斡CPTlٺ5b8PB.Gn8:j9s,{G.sٶc'iq̝ڵmÄ@Jj*{ӓ=~ڴnM~ǟ"I Wp58Ȕ?NDXEE|TZ-oZ[_VVFIi ee8hP*d2+7))r^r 0LX-V %r? :|}j+Mg9x{V*7n1ddב,3kzgot:8~P9 >vղ%cFB.k^%$С];z^#Ϊ}$I"&:m8992sZFGN>Mm),*b-Xw6Ʀ-1|PRRS'rql6Iz\\\0 i3cGBVZ_l&cӘf̛/../F dg琖ATHbILJbϾxzz0jpHNIa֜x{s1t@xXfظ8R҈Ё퉍hչ0Kȥ-GC UFmT<<ĭGѾ][l63ut 8y4Ͼ EK~#((OufYs~JNtZMAa!z`_[ٱk7թ#FfO  dæ_qټu+1=*0wՉ߁ 0 %O<,ܽ11 P(8oooΰ!@VΝ; AЩc' YYYZL&CPϩSXnBQ(qFJ%^޸ߖ]9ֽkwbcc9uT Rg0x(5k(شe  j2},FNzf&s.!%˖MJZZ8ϯ@.ATeϾ L̛'NDu숟/0i$3gX,|ɧqf,ZL8X7 Ib8:j9j"IjRQQ IHLÝBzt歕ClA˹[=w><̳9ۏL&??|}e~Fa|^4NZCfa47..H6c!3vTUިx.ų}N9pzL>HJN&)% gšÇēNHvLrÑc0$&%Dp`ݺtAq~q׮={ف>}9y4iצ -tԑ;wLP@@ Q?o͉{0)<ſ.g \]\ߟ<=psu##3ҲRF#NvL;f,rBb_L?\]\ZUt AlСCDGGSCf4?McЀH6d#9%^ߖDbr2xzxmz^'NI4VJ76L 9% N:ERR[wW:uח.eB3/Z̡xv{Ё={ồ9y4$1l`Ff޽>{A+o@AUY :pzɑG1*fgղ%roaێh<=< 0??_{8x&M=>l(v8km=/@МxzzQVVJyy)᭑d6te&NAſuB[0a<U 9s,NDEEgΜRIYy9%BFF&OѵKgZfV"!1hMFV)lش_oB\$ImӆxCWTKpP 3I>w_}qQ_S)UDEEѹsg<==̤vmC`` iiiҮm;ZnZZ3%8q]vi&4 C ܹsaِ8;;RDbKxX8*lWWw*??pjl !F$|};y߯0l`***xGgE;O"U#¿_WWؿ?>J6ΑG^HLNf}=z4*:1/hfxzD+s 1UGϳK`@tԉc+&_k|ɧxzzLjOypwWFnx`csLf쭣yٹ{7>dl9<00lFg^p=rD^*WvDv$"<}{j9s ڶiˡCpuue8hjŬYPHD8u1b{4`ru >>Ȑ٭ Ό}<9X̖:A#~jgvm9{[msTOz'=RRy6s<>5DD0G0M_xxq6~Ѽٲmjߎ7N5 ?__d2-[`̨ٷ''MVP4Q/ZLQqqy*Zd-x!jY\Rz'N"$8777=e6{w]L&^{m:w{Eh~u3gqh jpY c-Z$EsHB1zF:"BN}FA.Ye-d2y?шoZծCU#pUqZ:W]3hZ1wcZsgホM"55 ZzJzZ:V@5II&BHIIjuLff&eeeT*\\\l@Zj>ޤ$ I֝J˥kTWƚ/Ro{e2Qv5RV*űETdTr} 6UPjjʠzz\ IX,Uϣw}-*)d֝-U*K姑 VIP*v9 F#Je[U> =U/gYPX_גm`[),Sdeg*#/6!!U+}uTf*ښUݯjLW9Kw"rS5U n|dԿOdd=Z5;Jε֭[k׮ƽe CJTdkz˱^doU7^kz73Օj{ |ꍳjE!;ӨWCX *4'2CqS\ZbAR5:%m[0ёO>E n |NzU&S7:r\ B'.q CQbw!.IKThMI\=Oh\)U7ʔVd7CEpIر#& RFAVװ_eB!W\o$IBRc2rSW8F!*nNCVV/;Ѻ 1QPTwKBDNnMjZ( (..ŵҺL&JH`4h4-QZVO%@Qq I -@AA1[)-pvvQHIG _O_Ɗ8hpqv_ײEK$(ztr5͆Jf2l6qtt&] \ݚ[Pƭ@pSФٹٔ}@P B;~>bs@ hJTzZL$I"%-&U憚4/7o@ hR/@ mie7ez3wkÆnJ(T?:U*u/ӤgC#WBSĉCر} |k8nNKQqٙtܭŨgо'@p9PKW@7>v Ex{/)ͫ[N2 /t(Vv#9_Uq˰. lAjZj+**kviٲ%# ى٣Uqx{3 &~׷/ +-+c՚L}y !!1ӓpY 32ӫj%ΝKݝ~}\oظ8ZGDvs|O/.éߖ͕11 AVNg|qSHj]L&vJƐ[@LoW&=2n]";"; l&S~Ro8RjltJ:"o+V`XtW|_|yl۱GFffa, yy̙7rd6={PV^Wf^'-=={׸ѧg~:vD&c8p~bRRRr7>uVx*V! Ilݾ~o嚵Z;~%SM`ɲ;Og~dw;N6^N"ɑ+l9yͮ|k&w~o2Z *:js jDu[ N9qw$$&}.&{?yyJI#:].&M+V#'Ng*;xg?rIOM.=<.Y[O`ՐAדsw6#(+&g(73pLf5t F2bP>K~i0o,>xw2[o'+;5?e@L?͜EmKH;wqq:wNLt4v_!o8vOW^g滯$_|:]ZVF8f{ddfeq0>?WCj\ԑb|}YlRRSkćcXVf͙KbnF=oSOֺ#䄣7WW8u z=1 & QXh(aa6Ct*>z'/K(1$SҒfWB5;Fe)~'''.>C\\\xpvv_oF#g%GHp0Ç %7/aC0mL֬[/<7 e:j^Μ;ć_OMKWЮm;FQq1:͵Iznn*<=+/((@׳snJ%^-8u >>^#W˖deeSXXbańTTT)I'G-LF-K@pҨ4srHNIϏG8u }{\wth׮NT_TkiN$4#Gs)'$B<믚_ ,*%*$Ifխ `'Z;mƨݗcOsn~:Fv ", -;xcP*;~?_z֥3~ {.̞;}cٸy cFLJ%Ks̙T \CvwˡÜ:}GRӏIO?Êk/صg/w>^y qa0٣g&61D1a„""" C{\5frvm`4qpp`AA?#"صw/:apvv"OO uw7GC@3n>7GoΞm/(ı#<LFV}~Dx#8(!6+/~KnyٛǏҤǞD!WmcǓʱcGf pı&͋J BVcXHIIf `Cu8`2 \u˙3qtt]t8\A/F$=$IAgh;~_LXfZlyIrxxx`munѨ5u@RcZ.)M@pi}={bEu_HNIZï#V =Fv@VMSأOl6SVZj_g0` 11l&x{jݝа0?ϳg"]: ~= __?^BCðllܴ4?HLJ@.WBt6n?т>6Fyy}c@Ax{ͲeKl7[6󜙸pپce[ 4ͽ=d @h4PVZzѶ4 \ P*UWm&1-ZH.; ='mZ \|~}\ց@ee8j(?uk| nn.i =*qE|cArIIMKq_>dgg_}USEP6I%\rhnS}h_q@7z@sr-F4[#vܨ49vpl kث_p"@ \B nTy-Ufɇ@ 1h6Gi@ r@ \Mc@pqĆ@p  XﲧhPh,P@pnNa\GP.5Sa!6_JE BCq{wZgU?@p)/WUH?͛ g6cƐM=$͟ ; \y!ŸV+CFo@ѹgooٸyK3KxavuoILJf57)|gd2xg2ϜxbHH|9[ ʓz)}^g{ˡtSRSҫ^pt)dff_ˆ8qU1Tsdd{XJBXXO?r__~;EWAbZMH 807Y7f~RacW1w˖XX,WtNj^ck\ˌz!(-+lV;rϝw`<ˤ:yy{㹘l._Ɂ덿!;Θѣx?T7d@剝h4Vy6¢˪:'O2mL$ deg si1H 'UCLW5iY^ݺMMm߻o??x?Kg_`0:z$ic5v{wq#Ư|˘ѣhۦ Ͻ .LFӓ^~qmr]qsu=hF '}{>\_7Dޜ.~E3o...L&{m_|-yy ÆxRB[̋=˪5kFQ#:h4|}0ͼ.]d^+ʿ4p񇏠j'8(lT ʒ0-<81nw?__*%"3~MBB"&OQ<rF^222ٸe >>~ Nn- s,DRa0V$+')2|.\̟O~~>''GnQ#n]߷߱I|Aڷkj<ӌ1n]RTTT#~}`ʧM&4Ջǎ^=zpQyEo*yɬYF濶RZVJ#U*KJX7Vk̠[F0f(23j;E|:$I̚ ǎ~?@VGM澇e@ݫ<r^ʶhbͥo^'777'^7,8h4|GG5F_/HDx8>t::)OJbwSp@~dr9ݺѵ+; }Z剉SKyCV7I7ߠj2ny M=rI"BY~}~0[,|,X+wO䯭:x0'Ob:j]5F2Y>JRUٿڰić w_/x-|G߰6==Jb}v`…sDuKH@ʲ cf ;vn$U\)19R`00Ĕ߷+}cE_~)...>{ f3:yӓ6|v GoOLY3$$}|#G|o2o? 2N;rۘ1=sNՓ6ϧ|dWC dܘ1L~ *=/^o}{:xNNNk?MJNiyj!Cpwwl6s6!R>=ϞO<#8(0v˸cfx`I>¿z?7nc۠ >R;vݻׯe2| !zB`@L|!4j 7F* JEzFnx1L|p!Dp)^OYYYq̙yl:y?n}zb̙7gg4VJFf&yyy5pw ɩ\jS_<ˤ[.hCYYYɑĤdj͕ rP*QTTW_͕QQ,*j׷={E輊tŅqp +;VRZ_s\i٢E|m,bΜ=k@U>Jy[̿n_Gc .:MەBKK9y]l룭u8sişxG!!d5UT9sL+?I޽ Ugيtڕ6CHP0.`40f(ڴ`8jq(m6\-<)--9sꂗWKݗ/nsL}jkf2~;VWKZr]wl*vCv 6lJq8O6YwRRѭkl߱44`F͍i3f+PdͭrV.q'>{1k{}//_=%deԛ^};WWϘ;=aμ>)*.bF \`ַ8;9QT\g;Yf -dhZ 3g\b"l6s7@VBZ&((-W}֩ }1:J94޳f;de{1TDlJ֟گղ̢E͜?KzN2 }^4/(I$K6tblRyyy ?VU ՠ䵪\bH&{:F&I*++j6}TVtܹƈ~TOb(kdRT^R#z.Toˎ{@ ׭J:~%KێeVmI??qEiK$zi>o߹{y'/NQL&\.Gu7|}󋈪hLzP((߫]*ƨ*ˠY>4kZ;yqjMu+ŨO}eX.$ۅU ~m.V4Fv=h <1ԥKk\=+WֻΒ 3 ҏWelѾmL&]JJIITCkvF2ܼ}`ѣYb%NTTT0f˪W&YWm y OoZ40+|f3C jn1Ry'gt)RJLܹ Wj0#ADRN)~-6uv%lw"6B_aaKk0}}z:y{Ը0},rXayKVv6FԴ4,Osrh4,[bܓNp$%%et:N176?D:wLwo;ƹ_IR_Lz^}E\)N{,Z^uD=^KCD&?{U&lz@-ti *WWWTP+•jCAzkHB $Bʦd%Pr>s'3gr9g|K+qBCaiڵ|8=5؀̙= {;; MϗUHqVoW*hu:_@@=k4ܚ z79Uycia/goX>GF lDLɺ\߳+ ( `ӓ‚2*++Ӈ[u<|غ}$%'ӻg<9v< W0. QXh NGۨ(fLN_i'~3?`լ$8(-۶3ʗ; 'O!ɨ4ʧN>N_TW^u+n&=5o,R_A3\.ZN3ʧ+u+V<3DFDE|㷲o:ZhoRXe `x gS1O*`DDH,T gI0肵Ă@;s~*^z]!askkڵ`gk؂WPZZ7pU'bXi3ϰ VذǟDvN vdw[&QmL++qdF(gm5.]C#KTNr1oZa'Ǐk+ իu'NH;NxKOKKKBء=M)$%鉋KFi'5Yg"_c{۶TQW__5k6 uU$Z-7nhP(Nh4h:f9o춓~LFyu5H`Rgch4JUC.cmmERP(Ӈ"7nT*ňD"(vdVJJLFϾY ZGDDֿJRR9Fzty]]x|ă8wӏ8pzA_A333FӡT*j,,,hNLU@lMƣRLt(ZP¢"_q0ZmLz4N, wƭ{w?e"O̭ 83cYk13g+ G뛢1ߖr*6lB&vO:}+qLann/ٸWk|رGGG?h;9k֭gܨ",,.rJ2 u6r5"Qk4lؼN&"< 7RbO?HLoc=~:aa;vcϕdoLn^%%%\f-Gza##-9'>z{Rѣz"#"d Ǔss/pQs@$cn}}پsWDFvٚfdZ_U^o,j+_|'Y^g&CV(**ӓ!i07sLO*RYYi4!ߏ^yWء=3^'k7lcJQQ1o.*]{0x@BQv)K闂|tE,YAզ>LFd 0BҮ;g1ĞJRWzC R,ZZK`ȠARZZf`Cee%OFaT.Kٙk[|YY W?D|Z3rmË[g\b Žey9W=}gXܧˋ)Mfӓ1-q߶B"ggr)ZZ9D@?TԛlŒYqnzҰ xnni\.租Wevd2W_ymv"Ξ@hH3OۅXq#v6SZZJhl+HRfg_ ;'Rɑc햀Ldx8!!;۶39:ba_oFKo:B`ێrf͜6mС};FzS Jء11_eرՃBbPT燍 fff8992?ڵmKn^@{ϞsrKZV߱D9\N,/&vk8k1}:bۺoͲO4̘g :1F=hFC//&ϛI$hw7 &23gpڼ&7״ Ur>?p\A9wܜ?s}- >io[xߨQX߅\@#^|wц@"r {SǛ cEŋQH""n@3B/ cTO 9?g@a$/hVD"BL4:|)z봃&O~ _@@@/`acCԿM锝=VGY"t [[{~f4Iu)RiIu@~f/^ؒVAFΟ?G.͑mh}gOpSARgpH$M`u/YaWSSZ%WPVVΉx32iZuq*U*8h# kii$ 6oqf_Sp\z G/_@ձlORW9Z9p0rZ'/WTtZMs$kFaؾsW]J%- 뎿6NR icyT*v,qߎvGzF&KzG\gs|&ɹt YiI>Z.fKÇ$..ohݖ6r%CoN[)WSٻ?baC>Rraj5F ߟs.p<mZoG?yJR^%mY(JL~kkk328{7WW}#Iz֑ۗR6oNǐAS+|W\Dۨ(ztJl\<tlNXpȑFˤ߾=wLaYVsyDDšu ~l !U*ZZݺvk&hQs1:x!,G"8( .?wǎѣ133ѣ$%>:=.^rFag7h'4$Vr*?׬#9~_W[`o#|{[[rrsYÏdt_?ѝ/\/]΀~}~R8x5'Ǐ9|NNNڳ|> BG}Ή$'1~h~y%*WߚT*0WBT,]'xW/~mч]۳mtUVڻG<Ɔ%WJ޽/ f?Ʉc n4_'OҫgO~e%YY WW֑tҙ.cwhKee%.gc)**f߁\KKc 4[[[[hՆCP]]c6SPPXXMZ}z3֊0G:Hg_̧݉L8.}wwK!YRːPTTKQ]Sxjx˩Q0Yd)JϿ+++KiYQ:ׯxr&C.]n^gxVdlczԨL5:~ZNk_S]c-z0R??_BC9"|}QUE4zIkiiz=sEM k\Mggg}%H$b9|(r䔫~fjjjNxzxAuu5I))ԊÆRXX*0//OQ(o׎b 췳CbeNNdfe# q +k++\]]h;^^-,,D|.[[[qqv6¢"֬K₷7 3QZVj6ꓜb0|&pD@v>6-"[[ VNrxzzDIՅ0sLLt(JD"3 M{} b!zc&E&9yӑ9yy\KKDDnǪ0_3  b˶`":tba 333)ƍdrZMQq1ׯ믷H0n, U+|}xyT/Ægf^[]ffȈprd=x{{tbW9y4? N%j*Eu223IJNwpwZ& 㾚RÓK}gݝMlC*-|yzxҦu$/OK+G?_L~2rPj53_3cHuIHV yy^QۨC0Ïؿx(Qø^y;2Kt5fZSl'a{C0#ωMqTȕ͐R!Wr%(CJJKIUUUxyzpL"eܸqKKܼ|rcfn~zC2yg{;;\] ),,"0 Lrpuum>a|رG{/ 'db!A8;;텵ĊN| Æ ܅ 0㩒˙6y,,,ˋ֑CdDAٵg/jӫGwΜ=v$С};pvvׇJ<қSϧ{׮tovM^~>@#prr",4с~ }x"Bt2{ϗ c|7  D|[X`)$4$geb\'Ri窪^Z7q{pd~sLoBD"A&accsrAGZJhRՈ-,n0̽^jQ(X[*;rgFVC,U*Zɟ,dΞ;ϤS YZh4h4Cr=2}h{/N$%5v$"wǎѣ6t2I)g] }IɫJAL;/1 ZҰ4gB`6H\dRP~>x {Q-͇'.>P\]]ٹg$=##ǎDPfzdr9HHpQ<Wg9׭gjvً ZMX?yR_nF_tddfѭKڴ4ʋ??.[dyZmFidzzݝk nFR]3$:En^E&drǞVP]Szu 8s,=jߴRIii,2 :M[RQQϿzS6}RV^VSTTIMKCӱnF222ؾs Nq">=QVZʺ ڷt)(%{sr(+/#)9U!##57 ad2v ޘ 'Oqx,'㑖PPXhҺM)-+LƚuIMMe՚\xImJ= c8{}PYy˖W[g),*bddfr">Sgp%)5SSSÒe9u f톍h46mJLƉrXf )]g?p…7:VmD.+ IDATŦs%?2)lϤZaͱ4n󌱦[O/عk7nTxrIM/]$%%l߹d<WTUUQT\̒e˩ˉIJj*99eh*޻T֬[J6ʋJ4E-fkjjb  ڽW b&ägdRwz L$>€~HJNf߁ :А[OFOHP0q#X[3g,&=5A}t(|gC\x VKii)nvpkX,f[8a</^èj]|%^#{19DfTUU!Qմ$<*^n] ?`a\KhH.Aft:t:>^WCCTZ׮w09 <N;/?Vm$Z-Y9$%'Rǔ2~h4T*FIϰ'%5J4>o.b}\x JEuun>#037ŅaCܶ^t>"NnkB3FJLL5 e#XZŬR(6%v~ZMXa7?`2+3p>}L;;sgٞ=H^eh*ݻgΝd㷴DT"8Dh4Hր=CL ]|͍T{~Et@tK7nVZv}t:-)WS)*.&0 wIRr2{Їbompqv槕6i<6**+ODrCGcpmviՆ ^ݻu3sOMsL'"#"e/˹qҤ5BBag?ojMٙ1ONO &ۑ]p0?'>oG1sT4UJz$g; ~NlˠBl +9F$RRZJzFJ"!7/ܼ<*+ojyfDfLo,OOП,Y: J] S (?l_ RI^= ذ MPyrDFfߦur1:އi;w{ЪU  aæMtؑ}IZMuM5#n(a$<5!!=w*X~~~lݶsss,--`ݸQV^?œٳH, ё˖#qϏ [[[,_H$b1ͣoHKJxrXN>ccRRZJG  bO?؀<һ_ϿDbE1p66,]RV8zY99ӷO;88Lg|TVVң[7F+x/M}PS{Ҳ2~e%^bښ0nNVv;u`æ899a%YJb¸i lll(ocې Xogco[?Vowu sъFX?fn(|K! '9| g?puu˯8: zտp4ΎNd/[aOk_aʞN; }Fa`- e">GQTTĊА<3ۖuKBzjĉy)W6veiiI.T&N^hrɺ8U*mud-j(  yu5wc]]_2\`X'_}'$8;[j~k4ZbJBS@AВ}\.G"yu:rm%MBow24W. ,$}5H楹IJJj\AAAIDx+q lkZMafff4W7ɍܰN$ߔw8MxdDF(WaTa۟˃|رG[% bKBCBy~~H9c:9)Os租#ґJj~OSC:C kjjj(,*c9xɿ~%m$:D"a!t-ILdy)AIKOg9xu6bgoO}Ԅ IJJ)sxVdٷJErJ sy-{sczkׯ'yo7}j:x:vt*njWH,-/>c-\|[ۊ&:NڊE`aaӦ_2l&8:2%W`eeePޞ^,YV[_'#3ӠNy^֑|;F J~uprr>$  cWT{o ߟOw ^ M5eJpm" YuJɕV}xG)yjԫɸ[.`İD7y|'H$\\\5s$6OhwǾBh7S޾k._I"48w J峏5<3q"8t#)9}0|}Z[[ZvCkgYQPXx[7Yp[hNF|ݻu{.޻v'ȣF#((,4L,1:eX-/``899Rط/a޻;py̡sN\NJBՒCRr2*\};2Yƍ~NgTk7lVkTv3_r[mq`ӓЯ/̙=ҲR}ygxlشRikiipumťQ}uCGvGD)؍v\qbȶZ))p晾L]tK s]UJRCVQEFD0!ݯVyv ;Y:~VSuF榬JIvN.vvfEH$s3t İ! ;z8EŸa"j(ݣǏs@T;fgk;# mjiNoH$2NK^ aۈK8LuafV{VwwFzGӡ6$U1K4wa}Bwsxݝ3aXr9;v;;[pcXTTLt(9s,XYYqL"nnnmIVɲ3rކʏu* 5ou:<ҫ$jqST`- ۑ]/a~,qVpsB"6K;"z;3ْIL׍o>zּj&?= Aռ)afubFTJ"/?KKK|y(Jsr7#̞Dbcsa>vTV KKKǡ#G(**B$5$;_?N:ü!-)aӓLjioݶ$ѷVz{ o2qcF(g'q%9Spy|vBfL@Xh >wޚͣ}a՚5D6ʭ 5k1)$%MHT*PP\?HDaQNzEA0cX߅I7f4/&", OOaCxۖE :.\H^PXl_6%/Ghѿ/l 4%vs1>:,Յ<_/eqtGbfffU*soO7W&ғr5l---YtF}}wYR0z+kZڍq;黱/bTuKբh^O~սZѿ >CT~A^]9yOђ}\.G"`~SZ! h+N4%l;EG2a:{Pڵ.nӜz((* fff_bAz'!?˝gsh{o]=;OK! H$2^   +{- ;IEK"=-G>ă6C@@# thߎvq9Zm^T(nVJ2^5oNෆjFy0eӼOTwJ緪ꎮ9{?0yNQ]]c`N''7\?P(eVqfZFoFeێrJe5lJtb>O:dLaLYoC#h4h ԯjXw/18.gc&{d2Y9~\)V%8{/_U*=ܔx4PB`L.j9Hs ɩ9</H++ aaD32Q̛KKRRSy۸ɿ~%o28:8Ƭ={h4Ddktlߎ0lؼYoϏ7fżbf9s9U=JqQ1YjїKL$B{sf$3_˯N'",;py$ddf}nN'&K/H\|C1l`+*潷G}ZFbm%a[v]/OwNLUt:t*njk.h yDFٗ_/` ѷO{HwwwN>ÂdtôWItTR)'޽/@g'<\?1ƠL1kI<{s:Fˤ[.ILdy }OZz:+ϙij۰;{;:yz_N:uҗz_"JQ55M[booRwaumK/;G"¬3ڶQOR*(RP.St vC4,͙+ '))'^%Þ1Mƭj|lllϗgoP"-ގ^K2uvt~o.l\o4ʔ_Z~=))̙;Mg6pe4 yy}m*+o4ZƯVq_Npr9b.^w#vbD"AVGaac\.')9?^zEdT*BDT֨ np^"ptt_S$_JHpAѠ֨>VCl)ɓ؁7x8}&VL~  Nxitҙظ8ڴfpW)Ǖ$xfD鷎ח~>Jn]ѽڷ_VҧwoƎ~M["mn/MР|k x~dΦO<ҫ4 D->=>{1'ypqqj5VZØ2y2..OhFƮ={)//Me6T޸aq".'+/M%487Xf-}MhH0nחWM駞Xljm:NDZXtӦ X1ѱ#9|W:EcT:u4R_7*@HIM%"Je,BSCXp2Z K.&gh? ;ɵ4|||% LƑcؿ?^ G'Gjjj5rv|K J8u.Ͷv //OZQ#G߳mFׅ g%-#P"QԊmp :tWsrQ(9vj^}R)~/+ݶ-.\@R,;[["177^={Хs 666耻^^^䄕h*yH<{ggg WWZGF`ogO?d˶d222(*.sL'||177770d2ykm T*5i]Y9k)ZZYVhݖ\D"ZtzF&}<vvڶY['ߟj.^>_e%Ɍ[[[.^L\|<=joʤDNkS IDATNx{₋3UUUdr--'NW];_.\hHyكڶiÙijFu0-goވT*?-B.;i SZij9ČmS.Sh3}CDp1jhEsA._I>0YP>\qtrƆޟǶ;7~ = ukog5ud2 G e_,֨+R̴qz::JͶPOnnޞ:PkqD.+lHNN$kwbVKiY^?I|;R^q%^'}z"|^h4Z~/s Cv3EGmgu6JJJ#+'⎾֛ϿœCУkWlɵtR^}emԩp* jjjQ( nՊSwċ?h!Ay5u VF6*UWݣκlkvhjmk[gm{+ )K$!JJH@b'Mss{ν܇7qz;;߲_^4_oonCxzzPV-RRR1k6iWJ͜EVV~~ ח1&YW^`@r"*Ë{ SŽ{xyzVVѳ[7`}{dtdM4j5f,/kkV^޽X7||;:Ui~ ^<f`OI c>+JKOgޏ ptGaaam|QXkWEN~1}H#q w8t{FPPf@@v6lЉ7xSΚ+Ip5b;pgPXXv0 ZrjjbmmFa엓 #бË&󒧇* mk4O:G ;ӧϤ?W7Ol WC̚ZEZjB'AV與;m[VhŅ{V6vz{P BDHp\x LFzuIMMCLh[n5jɉǎkT*ٹk7^^4jЀZ@,2ؠpv ۵ rR ^$6T*~5KW\rIHp۶EQBSHUpqҒQHR(іVÍ^B*aiaIP` n5\qrrQseER!ک>d2Tj..ԩUk@$  4$<HRΨ5jlЮ@223Pk4nՊА߮PdR׫) K!C&EFZn8Hpq(X tYm7hDL-o'$bKj؛ȷEAff&uP;4Hv_ ,,,paa}r9r9޸KN88cogGZ+ͥAd$aauWC(gCVVV ZJ?pܹsdKƆF coo6>lƏ3l>.~3͡Fs;`心9s#8(ݺU[ocgg;˝ݳOF򸗑X̤iyyG~~-0yEynݾȂ_ͤK玏]gŸ l۸DUzde <}6YӦV畫WVz,==WvujUjGRѪEU*Oj⿊fM;V77o&r=!?t謊BN=K~~>H$ciee*nL֝;i̙3 l] /V-W%TۊNGJ+9?//?.:]z(W?B$66&F h4%hJ4{>[caaD¢^@o I~ w>LZE,B,{R}@!~! s뻟,_EEբC,gdfWQFѐ@~~>:p{p,le,]?PXTHj#ZIIMEEK/ W* r߾x{irMUuE<=jdFn\zu:6/oE+IH#%[ ^:WYD!k³C*5tҙ^J2/?28sQ-j52K6G#8p)79;&REau5!&6W !.$ D-7s)TҵK'ɹ[Cߠs 2zc^>AFE唩HRMۋK0xhh/^jծE.9{^^^`oOjZ ۈ=yvDҺ#11_Ni3A&p/#Yn=g~EDE1q4lImϞ;oGl*|}}zKȢ~D z~[Y~{p\7/_FYSYP+o }%:2xc+s93g0q4Z-))|9n 7o :]tHxzzȏbܱ[1㑆:7o2~dT*5}\Z/^oR2_gᒟGE7ѻ|o:s. {M\IVV%%Zd2)=wc䧣hղYYY4nԈK rꆇquw)k}npNY,~8L7d+R*aް琊=w[ز};n߹˥˗Je4OU*Q.tc˖YYswzߺB|\vWώ?0[&-4%%L0ӧbj W9pڴkٷ;>@|}|؉*mR[[ƎŠXr%8Iy?A̘2Xѣhܰ!/^nxaxzbrXD" ŔPV-B v4m܈fLL.]*2e}V&WLHP{Khu:rrr8rxm# Лg#?Ύ /EX(**b׳aɆf&ǨOFR7<[n1ٌ5ӧ=Q/|N6iۺ5cF"~ v^u{7hfMQ֭ ⳑfRfˋDFzoݾ͜s2qWWx̜=zyy2h sf~yp~~/P(@0[Q.s&ӉW=$brjj82uo}k+K"j:sNEj-w2 x`C琊D֯=u#0 /`qm{s@P-_"c#_rD ,KKKzO[P+4/D_=666+j K D">lݾ{{7…4Q񅍍A_p?Pht²TXlO}z#W~zv>?vFeA$Q1ѵs'~?~^ M7˱cؾia 0۶na% ǎ͖4,bU1:DRm,teegg DEBf8--JϱHYܯ/f~Ma_V"Dfk-KE̔=֕:ď@#`\=ЗDM.>J uüxPLNq7;sHUöte~ܺ T*X]N+j{};vvmoxQ,]WB&2q42pM5"!.  Ds{]ز};wJl;K@p7)S1vhlliִ [w3(,,ޞ~}{ cnZcGƏWZ'777]@JZVoU$%'# 4:Ϩ1cy][6BQqf"++ ??\ŝ$rssiݪM7fΝL>HD> ٶ g)|&v{{y7$<==Sڷ3[Ǟݻ1z{pOOO>SnVVܷev狭 fܹDJ3--.֖>X[[חsrtnR\1K=*۴M7bL6|Jm^b%7_ W'ˉ% 0_90);-V3Ė_{~Lo<9d?8x'0W~5.D"Cauxe'CѪU|ꂯ\̝;wLmllh԰1O]磢RAT"JD[Vaa!R_*h4XYY\UjX[Y!ZiOӡR5rxzӫ?dr*S'j }XJC˪jb1"ʺbyszZ-zRY,y CCv< x<9a=jYn7"J%66O/O>ry"P9»!aoP(iSTvgX̻oO! /EX #G1}OOT=O,2"|L[ 2ˉ\*vU'mw˾L[{un=єٸ)/\|b幗Q|*~9'1̈́wO;T5?%% y ȠE?lih+gRDO Z! J6^Y]jӲ<@LLDTVɆ24Y3;9+UZ6?*]TV 哙Tje*z\}/)r>v oEo?Wñ'h|N9㓒ɹ[Cߠs 2zc^̐{4mԨJ[+={tI.[{I>q>sʼ_՚x~Sx0F6;smF ~)_hŹ޽ >h!8=+WYh׺|gW;;;>I[:rK~b1f.#ЯSf|Edĝ:O>F*>T~yӧnjת˗ο?nD81q'iܰiв%C0V-Z~GpP=ueOjd|^osF^Uqq0ed6VՔ .!9biLb\ U%REE;͚xfҹcjת7.;s&Nf2fK˲eۣV4as֤h K,ެ.fM5k帱كs.d+i^OgC}hG5 yX*m;Y!nՊݺevztF^/7^}^W0͡߸wT:?<53rp&Νg|9v ڳ-۶3f(F}2X,fM_Ə/]֌=lRSӘlF)Xi3 KKK7w~ 4ƻ/ii&u%)9wzPM+MiT%,;撚ƗSR*W*6$Dcaa#`ذy3GgF:6oƥ+Wpw7=;'kqbΊT iLYL^8z8AAf#Fڵ z ^2N^,g_皳0cH$koݱ#33#GU[ee򋊊|*)j¤V̬,e$_*%R\U7>;'JIwtzY3'`~+_s mP^=BCԡ{gYtb6VtsK+Ss6-)J2,D4 qc=;k_oָ;6]g"HC*C&QXTzSO#H̎2ʒLV6f>Z6^l%c˝HIMA.wgņoeeI-d>0iwHNkK͜I=j Q$*͏^NOWN}ؿ_NJ!& IDAT[2w<"#ur^< CWCv,_c #+6ѸaC#YYh4RRSÝ_-GVs7)S1vhlly][8hKfp\ڙYYt:rh&-۶I3e7gCUK=teVVVxyyT*5ܱ,[܉L7[ 75jx*uÜ|OwΛɓqpF"1ɫCk_^4:kp6o{͛65z|?W]'99&p!222Dذe6$%![=5pqM _k@0r ] V҂uKʏR+}!;vG G.6o&##ztcx#wtR@ɘurtnRwѣF?=\ڿof̚=%%ZwO?)&>j䙦wZ}|٧̘5++KvĠ?i 'Mkk1..( L9, Lx9~b+ TעUVoݶǎyg{f'g^'{{edH_+#++Бe2 6+((x|VbLVu*Y^OfV. ڠRt&8i| 9*QTTY dD"΁5/˳CV˃y8;c@Djkkv*P*ΥedeeW&JZZ~jc`GAֆ dRBtZ3W^Xzzz~g^! _x:WzJ $Qb\%ّ;i4^MX~= 5,^yd5Wiw q~4 7n|b9vZ#3>!.c ϒ<~\b6/Yer5w TK/..4>[Ǵ7.A|lv3'=-ed|j5-~}r3e25j57[^TrwRQsijnL4K[әMSQn.'^_fեLi.Ȭ9Фq#(*.T꾗aԯ{?ɂ-y::}er3k74o֔*}Q;_zxtssT[ZiЉ%a&gbZ9?\S )^YКؓ' mݱ[ҰyK?P{XImx@i;M9v|o̙} m3a"-ڴCgD7mN8vJ%e=v4ޡdff0i46a#RIϾiԢzӼM;|}0v!XI/W+m7\k3U@v(KxU:6G[+&\rd4Sgo`fpuB߁ ISѰyKfY922ٷ?MZ海iӱ 7J|sW^^}h Pmi-ʜlbeЫ]]b!Qv D"JSB>MbNҺU+^޽Ҽy۰y~g#G1͡pT*.\Ĺdԋ00*-2mDV[_-Iĝ<0~LY˯XYZx;ؾi ܶwww>Lèh6^Œ?\{yy}ohXa##?ի 7ѭKgꆇ}5Rl>˪pu8GYrTL/˖3X֬@~A^{}˖΃Outܙ͛ްPSVO{{;o@6mص [.D֫ޝ;ٽ:d^ۇWWq&Yj%cGٽc۷}ܳSgΐO߁ک+o ;y=o%*m7燦5f {}Y5QBznvbvNL/0ȕ,#]<"cENGQd:x dCrvvfӾ][.O7;~YX֬&LhprelPly: ~ϴ#G`YaC>BO·殻Iɨj9JƍAj *``LfEX|Zm5۴aWәtdz='OFsyؽE?LuOL\6 NΝ@ tĝ:ENCceeSs74?FSVĞ<ɥ˗9u M5_!aoQeNuVD֫g}y_@m z|wpʕ*mhբh֔(9vv1rtaat::w@XÃ%?xZ-N;8RRJs{{yqi.]bV 3+[#ZAZfϾF*Ə 觟Q'O{$\ ?C6VaؙiC2o}2_$R+bgbLHd/fGqYӿE#'//[]>\AҾmvm/\R|hn 3h֔ڵ~ #XgRD링_MNҕ$޾Irj7o >:H͛y98IRr2]:uD\]\ѭwp``~XYYP(KP` h<}nr"գY߸r҉_  БլIPڷk7we4WvhH0 ϯ&M7<ˣib-&(0_oo\ D ")9P8ӿO<?pwsUfm #HZZo}F BPԮ;w8},RZ!tԑ$o&80!;;QQQnyyP8+6e[-aiaYV^^F}pwwg՚5XYYbkk˄1_`+eϾ}xȾS+$;;;pናVH];w@Y |#!EYAE@b_{#͛Iϸ%N2ꓑpu5qXLP`a!#NNNԋ :2h>H$&sW#8wUC]*=VPPhժUVrs5YXX`a!0PzQ*4kݖ+O# Q*4MqjF^=/)ʪZ <&BdL& jC& }. !~! TVvN6b1:ϳ`]xyz"7i.^2[ӌ3IJjuL:䇖1kxs̡hx>#hj֬@RR?.\Ğ}슜<}*c>UesD g*O55\]Yx oaާۏ)f~wik.Mժo =qZ{w_,?g,3)"" %"<^^3S+{#W7,]qoDRIM__.8k#АJZlΩg&I:+WINIaXZXʊ.Nr<&А`$^Hw{7 w77.^LfV5\]9u ڒV[5NPP(8w6lݻԮU5ֳ/( 88.r;RY@pPyyyA^5}}ظy uj❷ߢ۶"rzzRRSqpp 7niV&%Q+4[Q+4}ɭ۷,Xs/p7)0.]bTB6l¾Hw7wؖ[ѫT*Vseuؽw)ԮU JVs<&gg9vvv,'$p4 lEVe?8sK ,nݹpwF ٻo?(Ya#1qxceeŦ8p0.^$0 Db8owi醺ߴXkaeee$E`ێw 3r999ZgRՕ6mʱ'pws|-J\Z!!W6lxL,nSn'Oѡ};vv딝cdϩg͍wx 2̨?v+I6xڬ=ȍ<4-yT3e`uz=DQkXv=))dgg닏6n4GVVfhJ%9:s_2ץPRVcٻB~߹kׯX,6DL,R[[R)E?7|*1jذy3gϟv"c9vq'ٷ?..tGG /;kӚ_.^\.sX,\7ԡ{&`go+ 02ڷm ۶a5FTZ!!t)ZO^3)Sѷ+IuT(aʚ3DVSC7bYCُRUo3oe~{1pѱGʂKп/*#Gq,&k׍Ƒ{M,^Bd( ~^wFיkh:X<=<߷7?.\Āgvmbb`?4/ZLΝک3pQЧKxzz`:oo;j5ZOIIIuB$bO"&.F߻\.G,MZz:0n$ gϝ@pvPj耫 "wrB"1䄯>>[J¨@YÊ/4 GACX/߻;6 >ކ}Od2r9<^5) {͚q"6{;;R)rgg9y6Z4k1lݾАer9r耇; WW<=< qf"4t' ##A#Gw/7q_+Wp3. /Ӿm|}}h͍RiӢYS6Pɻ?FT* ~Fڵ(**2uRo9ʵddfҢYS<==43._W^3!Yh1}:bW &>Cybʠ+99D>DX=>>&U\.3+k2J+ܹs ۏۏۤCJt1|ѧ>( \ )ەpv6d?wOm%quqLJo`}ީJJ4zu:]u5ARq3*U1[sD֭KrXTjp\pU`ooԉ]N[7#Z4oFnn.~)/liV-7>0:izգkf.xyzqUHNI!#3( ˝u">3rrrEINNffHllHNI! \.&**.~ñ14lM~~>i|1~,^;w9_U>yW73g+CLJGѼiJZ\CߠIFL6sɹ0:|QQ8;a{ҳ[7TҀu"nlWϞ?ٻM[2rp+b˗+7-,,nR^^V3IF̝= {kkkec6ѭ+׮ӥSLJ8d#s}X?p_9|<5mIV⥐ae!Q+#}hIY{z!:LF"N222Wn#5IeXXRj9/M7bƬښL2z Nf*srx{ W?LE&R4ul\kIJNd! IDAT Qt҉cSTTdt{yZ+JUEJ%h5FFMzz:!\n ^6ËqvɎ? %5_BCqvx ۻNŋ8:8鉥%A +NNN А,-iݟN&#""DVo/yGwP* DGҪEs|}ػ?׮_'{{{9} BBVuB('$pf"cki7Z %%wҕGqQ1tԉ0,--tVb1o2MJ"#3z6=bkCG䈓u# 6GկXN:Mpp0͚4!<,qV]DZ1h ҒQHmըQzg_FկO\J DG!JheXaE֯OLl,ǎ@&ѬibO$%5&hn5j>c :ԙ\|6ib${Τ؉h4B8ۋ}p#vRH dkkKݍK\IRBCIe&UА{M7F*ĝ|YoEvw(w}h̜B2qtFsI:q:ϼ?`u(/ cFugȍ7ꛯ=.ۉ?={_"(**jS uCVOnSUU%I_huO_oG 8VTĔ]uYa7\/I j#~!\.U~HGl}h(5f3>Nq8gGBjI~*H -!m$~! /B!B6DBцHB!IB!D"_!hC$ !m$~! /B!B6DBцHB!IB!D"_!hCUqiY)Q}^O\\<:B!D3Z%عNOB|"*cja۶ޭGk4-2ݎN'҄B6l،Z߯%c':=*OQT\LgMoqfvރ$:*Us:l'L,]./ZLDxg<=?h~< EY~=pNwv*"#۝qE) )1k+Xv* }GrR psya\/Y^'<,\sΔ6;u񗖕jp:[&VZes,^O>=p_{F_yNg v娮b֭fEjzװ3t>k6v01N8ە+9t083^.yy<Ӥ2t`Z-jf3O=_,.԰woRWX,Vk'OͷR{j4tzesu7xS#V宻fE(}qдO\&믥pY̝K=n[o-zʪT԰l Z*scxlX;y:R%~v9~)Ҳ2ț_;>S5NӽϳZmݾgqM}윹sڵZ*V+iz6ۙ\/i1L5^=c:.X{2it<܃vn:wȝ#FFzz}n]{ 1PV^̩y_Gn~r8^Z[noMڍ`ێZϫVę@HHCa֌i2~cLv0}lN'G6y"ee|'ȻW t G#<< Dyys<];fc@ HeUQL;mw}vt__| IV t cx.:q0q?eL z=ysX+6oJDxGcƿMbB<}~>b?lڄ`k(߬XAdv\}Օ z,G'ХS'XAdH:-sїKa萑޽.q8wτ㈍aǘ>u2+W(s&cGxOm'[**Txm.$awx\|nƭRx{>#[iV'yʪ0 l_16:WV^O>EXXa!!u ߮\d?aue:wާ\bE6os_| E(iX矝C&_bkHOKq=c:O<6ڼe8MꩩGxcr}!y3f?^7U.ٿ3$w pC1y/!88Fj1׷)I,sF?VdQ#"';1GQT\ TX\;nxpuDx7^?VSZZJqq îJJr{~_n7zAAy5IiiiկOow<'O'~7\dgeD޽ӫ{Z +V{n\?d0I:ft&eC޽rL&ƌɉ*rKj2 \=d|-`6oʺ׷7;^1`9YZ,q{[Y~}pϝwbZ),,r ~̣/[!bQ\ԣ;i5[r ?nGko2ុJHH0yr NBBԿnz2;p,={ޭ#ヒvCxXN\LLqpYRShUׇ:uHqI n޽]ԣ qu\.@^^@B | +CX|V'|ᒓ,r>z%Ǐs﨑tPP<Ƒdފ KJ}pz]r >|ڤLNV{ҧW/ }GQ]SɁ^AxPkm5xPw5z,*bOxk|p 7(vCMM [.`Z-11QYUŁ\Z-OBtEHxXl29L&qqR[[z6mق~d2@tTVjlATd$ؘZ{???B)(VqlC ^/뒞^˜ln_رk7lWϞM >%dߠnJXh(Ik_{hHHm8m>6drߴTe99|*z=6 o7)8:oUPPȄ@OXh+WJuTY2V3Ga=wDGGqVb˚UW\1민DyE=+^JJL}h 0: ?ytn_x DVsaFLy`W]qPwv (0BVO~~>;way-{> `.xr3av rM7{'66 ij;nSFCn?Umn@@;VїMhH(AAZMn]O{w"۵H9\7Hro?"5%ZMRb"Z@zESjccbHHHᰓ@dd@q)/fӿ_?ؾc'~~~ ~2~~~XmV̤]r>'; )Dǜ_!RQQ(tҙw#22JwBVV&;p l6 hޭ+F_#""HwoАlv._ѽ[WVXXUXVRRcУ[7RˢBEk{.dggѭKkiudgfQ9|Z$ǓBeU%%IKMmW]*eQTt:_?RSRZPRSR鴤bXiߞ_ڨMƱFM&֮z2ag>6Ǵ&nw|f4hIl˘nꇟ0?ze#,Ї@bBHWv$ v4>:2bL4$D4_3%t:}z".&88ꐑ|B &&&Ąx %(([HDD>>aӨLp JjJ 9YMUzZ*"!!VfsǑFRR"ӣ[W2;pczӔd>'$87֏4Җ~Ç#G^t??ަ8}d3L, D70zDGpNޡCUjf==A ơCs][~'OeݗŅaϞ=N+**j_KO =&NV~}zK^YV**ʹ;u(;|Q#vC㷪b3OKoZ_˅jm"!8q r )rVYט h48#~!j$},Z]w=^*gF5?6K'B!B6DBцHB!IB!D"_!hC$ !m$~! /B!}eGiN{HO\\<:B!D3Zl6͆nѣѬB!NU^o۾hZ!-h#ҲRtZ N?{k4Cy;oko{<ޛKk8|OyJ^}V}y#g&N}~WϽ"Ӟź555tq1K|fN:ۇL~ASt:V-ccbmAՊK,g?ąXZn'\kg=gKEi/6[Ҹ?\.}ijp4H6qI4|qcxWXf WK.Yc(++ə3)Y1ݿ3 %;G$=5Ν;s.|}})..aeʌX,VJJJx\17oFR{c֥ e>k6N£L<~`0pՃ4p UUDGGȸ<>e*"LxxOFXO|?`>V1k?-{ +1[2iV'yʪ79繹Z,k\;j.ރ܃yٳgF}bW>i'?7 p'L·+W5#<,s :H~]Vj5ӟM;o£zjȻ`^7q$?E_.au f\T\̫\/ԭ~x@yZr&I؄8[BRr]SwtQj1XnܟU*U| I2? oWj9mj܃>̨wӣ[sz^LhhCJ$"##w08!xճ |R!hC$ !m$~! /B!B6DBцHB!IB!D"_!hC$ !m$~! ֞8B߭s͹{jxh8z~F?z$~!FqI9}lxCPx?eX\AA^߷((t>!ҲRjϟԖw{=y\U5~!uΓkcj~^ĥjq\B֤Ru$ !0_JB ˲u1OG*TB\ ܯ6+%O;ϱ"VYi[⯨`߁;BE9+m IB!. X4LVǏNJ>-/a [LTQYɓ'l̚u߹q\-w2[~b<6C!fZٴe3~~~f:ddg^cEEZj  'qOdgs0/'q UquvlG`X@iY)dudMDFDR^YQFVaFt㶟д߿B?EAVLHp%ŔJzJB\LDDDIKMtw"_BՉ*OYY)8,ZcD#nSV^o2Zd1IKMCAB\t_v4 zRz4wCyZjq8*~F#Vɓ'QL^cj澰033AUbp8(*.BVハ>sI@`@ ~~~hjF}B!.x1lܲ?np vM[@|l?nƶ;8yVl6V rm‰'Zt:tWAo !.C`5RcjORxliߟofymS !04_#PNFłZFQb@B\<5fbcb1 DHA>~b%-9ÎZ&)!'~Fl2g 4$1Uj(9^JFwT?i)$߸V}T1WVx9B\(;կHo򾿟?Y2=ދ` 3{11zĤrl /-%B=:ܤLtTdC=9/i|Z|B+V8JnK$ ! h;ϋN'F !0RPXx^<~]O7v^p8 / j bPh7qQSm/ ( F՝C.뼊K !m$~! /B!B6DBц6;NN8#l6p8YB!ąům۾>QєU3G0}Ϩ 7;sASkеs'\;md2jm/X5kRĦKxXXr盔فa_[V!#w)B-&vqi>u c0[r7x$3 rp:t:l6zg;VĴr##=ݝEpܸڜ/O7\3gthj~yڒfCzdw8Н'@% 6l،k-~ ^GNf&F ut֕y|;)x#})FӓUkְ`|Xd)R[kao)/ %9Sv*,\6g4<\n{=y/U_Î]%K1|KV]oWdz}NRfMlظ4>X19Y?a7MTT$'OVԳϱw>|?t&G, !gkΤ&R>Iv7Ⱦ8VT;siq:L$%&0f|b4\W]ÆѷwoF_>p?Mb3{2YSΜE]H++.Ҿi=?n+.GrNN -%JכI>}ۻ|36}4bc؇Ht21>SGG3u>NqcЃ}}ƴqc:Zv͂2~C<Ѓ$%&~K !g7L\}tڕ#yVbc .~}ͩ8\x}nwܜ8\.,㷦B\XZ<a&QPxdX^u%Ӟ͛FaeEպ=˜Q#<>^ jI|iBCX- j\֟>Zd"%9''Ҿ}Ё/ppXluJ,X)~G,[-wq[šVyZe؍ŚkyW f!<9Yrػo/!tTWlݎZFѸ߫W^eƔj-4ju\ 6_r8(⾹tѶl>'LZ 3*kۙ:s@`@@+G&B{yK䓜iZMIh1}ƱVmR\=%Lɓ')-+CR[k&L!D[+Vul"Nmkjxo3 B)l!놜0B\B6DBцh.?!B\zcoIENDB`selinux-python-3.0/sepolicy/sepolicy/help/booleans_more.txt000066400000000000000000000003011356774067000243660ustar00rootroot00000000000000You are viewing the booleans page for the application domain. Selecting the 'More...' button will open a dialog containing the SELinux allow rules that are turned on by the selected boolean. selinux-python-3.0/sepolicy/sepolicy/help/booleans_more_show.png000066400000000000000000001042041356774067000254020ustar00rootroot00000000000000PNG  IHDRjt'bKGD pHYs+tIME  iTXtCommentCreated with GIMPd.e IDATxwǕeL{o3%@"$"EJZ}/"}}m\v+ZDo@x~`3=L4C **+˗/߃D"˕J% !@R)A訪EO 1cY/^H'z(WR5pCtgg']V)"B@ 8eYO c(UU@  я@@ яD>@ jt%F'&6?R&SiM < zYQX\qT[,fŒ3lG[+cxj6tibl6:~(pZ GZ,b:rR56٭t6Jg(($RB`1V˹L.*겁>F +djlxI(<|ٍHi]=j. xǨ5EM#o}7}I_wץKvu7ͷ~jk_.ೣ_K%ݒ,Ytf@hJE"oaYFeI~ʷ?ٻV[ڶv.蛞 a #Dz(?o=w6ݰz+䗟{>4 bqm߳Y,bϿJpvKӹf%@mZp:__zev #֬X+OV.vf#?! <x  |?}߼xp˻y걍?AoR]<|zF.ɳYo2uIMuP$Dpftr^AwwM|KN$I&ŒѠ+/?sȥōMNұ_|዇:zLRNMD 򁾗{ HR&V(^qcLCO3cA(Qॆw`EQdIٱ) !DQc(6kŹp40=[0sCӹbyf.Ѽ&SOy,ݖ&iǥcl.'UEyt!to~f[,c׿M$U8v|ljz3(!YQt6U3cl*8Fbq ̅l6O=;g1VE!-p+Ȳ]"/'Nmx^{5­#d`TOGehzzv603wibjlb]Tplr.ɢx=QZ;ODq@d08;,qG/=1tͯә$I]c6,Fᓧ1/>j Uj5- ϜX,uvw{nVGrEQfB2$XvML2٬Q;[kҾ|(KʥK3ڦMz]Σ'OOL ry|*tKemB5l-6Vow}Gtwu" V1BPUU@sXEQ 3MVCE6aj%rD!SCE: `EA1;(i'U[@E^L_$IR21ŏvE HL! BݾVpIQBD,;FC7drCX_Mo?^[ƸC_ YQ8~rN6$]=1ͅ5ZT(~BoBHQ!*y_7ꚭO 4[}`DiO_UUU%FNbWA!v:v{ch a~ />R&Ƽ @xP~1MDƒ%@ ,/g_-H,R5dYd3e*PEɜfK]QbBFQ/STZYPa]oI'AhJE=H]p68rzn]C5õwnl.tutwܭ>5̈́f;EA\P]LЭs$D"+DGUR**Mwor\x\>E]UP(h&.|4 b@I[*ug歷MtY XQ E7WiLŃD6ufE?!,lJUdDQWbӱ7ĥY%@i}IuHx;f2HUU(UEeB*T'>. vTZ6JI-cmbjDߔ%eKŜn3!Y.g2Nesy}/$I0<<002 EQZIZlfܣwNGٯxAj.K$7B?޺wV7Nwfh(H@YlY*X,KHiHo]I8tRݎ1%a_W\I71>|HRQTBfU+W/~\>_*3tUB@`93tC }^fff+Rinn^! Q'Ə8n6f3ucBV@}im4E5cϾ^IC7sPV|B 2̩gdY&@hFUU!*z_~JŢg=7yhZ|Jr!Ymjht9N]6aXq,ڭiJԸ* b1^࣏}BPV=|-J"İ *t*_B UUز}!Go+T }]UU3O=m28 Ck*Jmۖө֭[9vkX,'?[7oJgoZ"jufY, ˲nZEBneb"ZG>+hl6;Q,CY,889the8O86ǃ%I˅1VU<33{^ѦMϡGhz٭Qe_́--Ew'D¢7Kvzw50ЯG0yĠ?ڶ GŸX,tp;,/B\CCg17mZ,R)ͬYz`'04=>1޷}t&#Iҋ/PTU7odZ}_CQbV+4K\8[Xy&^foM-=o͛)0Ƹ\.p8N{Fkzax;*js ZBf-m[6$i.f3AyE^4KƖ-j. +z=>VJ%p883s..54a6jD#I(4W,UE5LzfʊnZ~ GTEsh*-z=nDz>li;!2{+!*JZ#'c|Π7(v),>z4 g$YhC}^؉/\ǎ=vhT;ԙ3צ#. z{@+Ӽ?D!ѹd`I<'vp:h4-~ӥxBUU͞%Y*b`lVaD!fB4Er<_uRl,&#Q_ߚ%͈ઁh(Bh6_>?< !\wobK~>Iԁw-ff8-~w N__1\ eydt9.a`mkoolМv Pj===s۶o_j5>;joksss*p TV+G8iꩧnimf!z6\nnZ^f/GMF\zlhk ~_K{G;0ZeYef gX 7 GYձ:tX, B(dZ t:]RD#refv`4jjBZH$0(xL|>ɤ,bP(dr'k ^[c-fcYVlx.fEqRl2zP(Kuk:ii5Tn7f8!-^bAz=%Nx!_ȋh2nhh4>e1 ]./Z!kVDrF !y!_Ul.kښgWj"EhZw\rYeKn&jT'x^->XKyzh4جVp2L۵T*&2澿 rd4 L&S:;n3?]w:M65(&gΝ9g^Y!,,h{qV8!1\HDQ0 d2vh0ޮ^g]peE-Ho>P<omi%sFi( ۓ닃_5{4|(,j64RuCtc@r*UUԉ~c鸑ыϜ*KB=ݽB,d4s^ ޮPɷr :wޢ迻bWY`~(bڪCnůo(iO ^ֻVkӼ ГL>4m٬V@-ȝdR5WQ tE,ˢ ֥]C( $- cLi_*0 h4 "<.O]r ǵr|Wn Bڴp f#sm5, ͐~z{3ne\^vI鮠]VyidA/A*MQT_o] X އ2B$nh]->MWUF@} M慖1@ ۢ?˲L~-XTUƢ~%r 8NID@m_ ^ #8pEcJ"!MFάgIp'z M7:RU~xv,X8QO^`BD%.ELl(jXɸ@xDQ[pE|~x>9Vv2x:/(=%wM ,TWY\.k6[R"t:B1o4qïF;k ">o ƺDݟ@xE={9b1yg/^Yxў^R(bFfcљW𚕬NƛN] k.B@.^0㛝muIz񸪪kV?ЪUڇn쩏8{l6KFEH;Yz*0lҹ=#_x+YpFw+rPVJtӣP(߱sW($i"TVݰY_/}vk=qዋz}}s>L&Szd4әRPS,Kvjmm:wnzf+h_v{|XUUkb]H/^|٭6 ~ڟ}}_Z" sڞss;wQpzɓ*YNx@MZ!0j!fCk^O##F`<2: 믙Mf؄b+Yp(υ ,/IC}e-\=E1oOyϽs?|Sn=dY'9?3k뎝zmޓ[z{۰~}l*p04CC,z=߼"+ml?ow^v!D1 tJX]jy7 j_V.w[@0iF!ZR_ˆG{^kHWGoMXU|'>O 6[Rah5d4EQ PWZvѿ`+_ U(jj%-@ ]L&S>ORc}jZpff!qm$'@Xh6 hqi:H@E R)Yt:N J5UQ^%ɨj2tNl6fkZ6l静&@ ,LOd IHg.fV+>)SO=s!Iu:<|Ȱ +W>X8<4t)膍GeYZϕ~cv!˻hY?ejoб:結=>RFx$hGox<j/^yl2_ Nza?/WӼ@KA%U*!q6nUVәjn& VZMeR.bQ% [,WU5E=X*/.5|:Pe1[Z%_K 5|f;zAӼ!l*sT**q"yx>""EQt*5Ñl6DN95=C >p4Gs\h&J2378|1Z~z|T`6 Uk\(H۾JrTҲfs'^{.˲?`) !dn\hnl쒪b0`;;eV 46jX>aɓ' /P_FIxiltbrd4]n(o;fpeYJYnjP4l4)W33BTp\. kjs.GƯKRT,v\x.Ͱ JL^=! hHXT0E͆fbuju;h8ɰ,=/\. CzMU\>7=;EUUy>IK2,Mӥras8;71(l#I\hX*oK,f(xP8t[S)t\.;bб:O',E8rid\֠7[휎 L::xwGw.4qiF_1. ^H&BP5J1iB8rijŗH&d*|G/.űqTUZTp5wiG*9T*1 fv]G:58.Ei ˲hPQ}:j⊼lEQ @x9VQp%G#(oK>_sfBQ/[tL\.j5viN$BvNKJX*VkU`R'lFK !-.T`Er89N% EQJR֪biI aw0 r,fKR. vt\>!4)hnjd*Y癧0nf! rnxr Q4M;N[*GƪJMv:Rh0nݡ(/ج6aVsh*vx<֪ãùB.k`֪cqydYp64x!/Ř)ұ:Њj~ri=.^'RD~.$j5 j~{)k% TZ^4 ˲clblbjBQ^/ b^'㚚o($X,.IZkb GjRHzIH$IlISF|YmhX.ήٙ&l)B|>(G$EQ*VA$ilbP, yFƈ^OJb Gù\NawX-p4\Be|j|lb,zܞJ0q^д(YxGkdixdX*R"&X* yR1/t8_0nD^iZY+f?nwۻ":hkWiKr] sC!JMcY-EX]͠7,6^ԷA9q>^[-VN1,&ɠ7 e1 4MCbX-Vɬ`,nhY^0 4CD˲QQHD8Z-f/0dbeYg2Eѱ:83qd-f!d4qs^SeXeYaT:;&scL!J+MEx(Vd4v(JD)2͚Ro4y(=I^`j m^o DP6˲Xaw jkL<zQOS40VUXf7MFia0dYfd4i+-feϱ3Vc4E,{V+EQ -zs&d94iMQ|7yf%Z^嗆UEQdID"k^8Ot.^jͭ.;W]}->ah HZ8y1jrei.Zg;O%CIml 䅡iZ7wDdM@A$Y#,]į($*kE^". _ Z8Kp.(Q \_el!$Iƒ}\h"PUlZ4?yrE=rJ ;UUk(\7'@ 1H\:Oj8pe?\pz$OOlzt̙!׋1e:p C7_pEl/˥5$]NGZKg26> nȅ@ z 9DomRV''!BQU(綬 ./~_:"Lr4Wk$~)fggVUp8L&ېSPoڸKU՗_z)[U@ 3H$VcNyq6b1VUUia jz[.U֬^ m(YiI ,uj?3٬U叶mw)@dTEQ !xX%6@PT`xqX*vvv^WIgϝ cc+/ LY:8X.ÑHZsݝ_,+"˲JrEui#ǎT*]w@0t'Żo82raYU7 -l_,W{@Q`x,vbpݠ=wM;:ڽ7Ƙa/&≚$96 Ξ?_Ȣ_6߉%@x0d3SS->^n$K &r  I:wl13J{Ϟ5,^ܷsnpT֮Y~O.958]> ƒhaǮ]nccclٲrSN=}{/8ukמÇhWgE_{o֭_Z:}r.<6M4ֵ|ەViQ@0Rlp)ip3 cKjZ0}Zjqm $iݷZ>y3˲ˏqjj\\'A-qu߸sK|5ŒNG/Z60QAiPo]@O>wb1SOc?pP/muMS F -^__2Џ ZP}˲쭅WR,t,zm$ "KҲ­~8mLLNbL@ n{ A#EQT2i2v* ,FkYy9NGD?@ T@ O \` (*V1VTWEQ"U*@"*bwoн1cUUTE^e-j{|^A*` k "C I|Pt:Jb4otx7nxd2*EQp$\.ߤP,)yK\=3Cgz K>EUO>v~nj|/{cFv=_(LLNXQf.Z˥%_SוΞ]th4jvEzEdOo"kn$Ξ?o6?wZ~uk׎/[aϭ/dY:{nwr7*prjJӵ| mm&T*^[bzХrytttQD"9߇1>?w^q/{-|K|)# !\(@A|:Oܢëo d2|WgMj58=-+dR[Z"*>/XnȊsssQ](\.].\(j,.(*gYy#HT nךW*NRZ=fYagfcV`/?y!7 Rl6N'MQT*MLNA:i?1V]( Z-8=-IRg6s\`z`;n2z}st&L&kZ[kk"fsnR`GGANOb̲ځpeY j &)O`:3;AnQ&jkkjmt'ssDb1ιPHd%IR85jul|B%W*:jOw( m6U&:Vx TZm9q+J[kD\mzQȑT*F9,C:;)KR (nrbP8b4;;GFG:'Nb1e;ۇΞXZIz1OvCWefvX,l6]'*J{{&rpfid&5]]HZJ,Kv\(l4:;:R8.J\*9򧧧]8oPEQf~:955t(;v)GG8oa6Ϟ??;7733{E?ujrjbdzuhĩᣟR}ɩ3CgGFG!B;NR,r:qhyB(V*( zTQ]{ EE?=v 4 ]ffǮ‘'m6+˰Je, ŝ{xYEUiFھkW.-EQiaڭ=plHp dv݊,Xif UUzq}tehY8iAN c@ p̐`Tbqݢ(:s&8=qCӂ Dju8 :˲,ð6>>:6]vdr}K/#*VwO$;LTUٽo{hi_1uϋPceYi)Mw0x.gS.JTjMϏONX\UUUX ! UU  .z=v2h6T*V̅ BA$aq:oiTh,bޞΝxs$I!j{[@_߾V,_GOO?ixf|>UC+=hZB ꊑ)K1UU':n&_,ⱗ_zI@`94f->_ozvq:pp4ux":Q z~ Dv.JP(f2v0Ɓ@p`G{; J%cT\>W*G*lj N'rX,fFS@__[kk8e>R6aYnMfK$˵zmf6^(X5LmmN(ݥ*MS}yt##+/#dp.+--- BȲőL&#KޞBwAi3(xthgg{#\].w](ޝ"!)/t=]Şޝ.{渴[e3G̀`3/&&@!+U"+J鬮L6DrUYQ*;wR}6Rs^cCCSccU,ˎ3uphnn~iil2556LxO_o2d2.2c]BZ9,UXU,r:凧bXr*BtrUVT{^M0Fɔes9UUA$\NܿzgT뙘 ^^]]UW[{5+Z,;;t##0f0Ɓ@`|brONME*+WVWT8Ox\ɩt:3>>(ZXXܹP++dj&S,K^gaqx ryIOg2"kwIYϞ Bu.\y`(GAEO=/p_~AYZZz^h48Rq'BtF**>̲leyߞ= aXcCiF, Bl*Z<ՕL&322sK&"qU Vuiyp=Aa٣G _|G8b6ˊjpήpqlv9w\Yup !3˗_x9Zh"~ xҢ~_Htrz2\1dP(,,.ե麺h$kz=B ]gYqWCaWv_OV =)wք,WӲFI|$IhfjvrGnw]mf}UB48D"73;[S]9Bt6&&&-KUU"3M`PQʊp.Cvz:F)!wݛznKUѱh4ʱl@>  uKťX4vz{L&AEBh(|ed*5;;gťѱH$ ޻766p80f{=pX20$.--Oܹ#\~maaqiy0Bss^8]׍)Njdtthxcj0J`"ݮd3p0,gYE*|!j{JeY1߯J,CH$dtueBzBLb6{^36>>08f++*ҙX̩dNR䡡a]B l2e٪X2|htl|b`p0F*+v]Qվetu.ܝBm@wdt.3Y0,5ё5HUUl ]揦$K{M#Odٿ( eUY^pwhk5ٶ[\HP<?|6 jVܦYqjG1xX5kUt޽d*u`߾ k?||jYScѼ5;R|Bt]7zsqR]O:޶-~ԛPiNFZSoMPJ[W]9t7ܽ8I~_]No,G;!KS O|Q{ncKgwmfvNF Yz.Gq!d>k(tM##NYOXLۮ׏^6xt&bq >P6Rk2imi/u65?:њ;1mQvqyoܔeYUTcGvgv>j tӏU3,~+WڏG;0/UYiߦ?#eJt׶688J{0֯8=IZ&5jmJ?)7 475A=!Z,!Y8}!d2}l|ra۟ 7F ^Et5RtJK:~2&af̚k߽HZ!j U{6~0 #Z/K-,:v/9R%{օ~J6[p?#gdݡ/Tk`B?BHǼbĀ|<`P Z,J{Pc42ҹsg8 Ye0{?<%#B? ?:{u]WUu\sG~Bșsf{>s!^v-66o՞..-9a> Ir<D7]n,~\hxtTQg:3;f[[Z>tP(B+l`ܑC~c~նB!z7iLFz5//ys\UVT?^r_O!cvF>g~/'&'ǟ}ԟpc0XkKK:fFncGH*&Ap:?و\ qW] MΒ(S/__ݹ\^xٜJVɕULd2I(e0v>̶633S_WWknfB2(jL&Uu9} GL&Mӊv5Md2:!VQ ɤ3t84M[Y]5tWVV$IRTayMvjP]m-ٳ{"V5NV I>OR[fQ3Qff=rr\>/Z,6c6UU}/ϫiiD].˲R]ӍP:!DlfIQd2E(q\QJ$I n#D]YYdn9NED<!++KK/ds9Esnw:l6pat&m6k1iL"Z,t*m]N(\.[E"˲A\.0rfY# 멇/_rlfs:\.p\TJi&t*ʱ++$٬VÑJ(;-..!Ji&QTl2[b&5M'nLҷ@R)UU >nq\c}[u]Onwmy8N]]OJ'&WV,ǭO^^!$LboCݽoeen`JS>㸅źko  -ŗM&kkϜ;74<\S]})mwf]r%˒t InuxܷG(!\ʲ,Ehph3JΞ;o<_r5uwq]{z$I6>{z{E%_ycj'OlɩP842:iڙs痖 %@ax"qΎm;cSS\|9T޽wohdbLKfv 67x"񓟽j*Dzgϟ_y3hۻW{ qk1g^|ν{ uugΝ3̧Ξ_X[ fGGZ?ua7oVWW7JαcЁeZ|N$]\\2;tkyhd4ϛl.g1=wʲ y SSӍ w޻߳F]KvGv&T:}XKF`eus,XIYKܹ~Ɲ{pexdtqy]&zTU}Ihqn;~ak7oTbd*DU5_Hyq&;~,{8T*~2%iaiyqq) ;N =na/ݼ}Va^<:6xWUՙ{~IQo"0?07bb*z㭷Y'VB3gV1MU^ҙ+W/t63ȊL,\rŨəSg$Vww ?puUWWV&&dEX,?Ox#ܺDtB?qy3cJL&b9+-6f.-.㉪XucCSStٷQM053]ڿfã=fYar|<OөLz9Z?ҡ];;۫bP0v9Vqlb_I.$yw.hQH)rЁGF*߸12:]BPC}}uuUWGLrL&lZá(Z~箝M Ń?k/'IZZ^^I&á {vwڹH2 vFGF5M K܃tSn{wWgSc#tpxDUl.(JCCCU,S:ۑbmm u>w=>cԾ|?0#=ݝLDz55f) R}{61Z|.3VbNg[kKssI>sݽ? 1)\>sNh$)m6QLLMQJvwuYE8WVVGF$ID"<]de*IRC#"+1 SW[c6$IN$rp߾rnqqIL5UMW ƈeYbɤ3,gYͦ(qg>0ELg2,gYQt:r:IҲ,+peY0$b6yAH?(a#O\任:D0,-lI3n;ťl.g,2$!Ju]1&AC۷mhoEqhhhvn~GG{o_ 񜑏c拗TE#&u55 `T"Baa$I4M0 UX[KkG{{; TReMU&`c<'LeVĩS9@,#˲(17 Ln9^QͦJP01,:5=-cotڵ=:2:riIR5R |.e٨BHqQ0#0"_xfhxX "Y &*m߶6ЃDX@ m[ێv2}O!T$Pfr3ڹjvv[,+eYQ._P__W[?P a,X4^LfX^zS33~%""Dzx¥=Ĥ0`qyee`0f.gdȤӲ,r9͖(%if[XEb0ft|>ݻݜ̝Tfu26LմK&_";q.ν{D"(^zKCphm;h!th$Rhm--8155db1=<:Mp6m{[sDxAAXfqm--g_x4˃Q/DzaZ[^0,9t I/^ 6ۙdYnjlxȨ q=< yϛL],`Gc #ǎ@9tl<}V?y"[[98h w@?awaMj=|1L\,ƃ20 1+b],˨J)5>kʯj0,F^\ũKw(Q6c#G&!DQ՞^EV[|#9:!O)b2No6)XQU$2˲,JQICv._ӂK_b;F#:i cvQ->eB2:Ρ.){dQEul6%143afqR'RﴵD*+׿fJ4zq\t9 \|no߾p<3;;66r[Z5U6649m55iU]SfnIHP}]m*Z]MBbywqkT2ʷ& ܩGF4M  9tSs(9[~Ba0B#OHf ',uM?f5GGZkjcM[-AXO&#Mx5Ț#\,ۚ%'sSfcٹН+k(_7_\ڵ_24<299_/?xttʵؒM~B_A&Fvr4߯ B<8rya_(^|ycMv'XҞbYzt:OwZ/Ctvvo{qf** ];>Dc+"kzyT%-SS.?1~1S JTP-dZK4fYɉp0TS]fˈ"977l诩sv$_"&≣G4BSSS55y k<.rP K3VT:US]q\1:{+]JGY?} >/Ǘkk>K/ۼхTYi7Ca0ܳlk+(/_?-JyA My\> _oBslYdr.q7񊽓+,a,o,YD縀?r9]nK'&kjcx5~+ori*F澾$%K6 -[ !nVyw6X)UYJNtM2L( Xhs5 c Ômfg&yd0K/}E? =nJiG=rB(_ٵ,EdY/B)e06LreRx"AtYlwy<cvyi[1Ɓ@0BUr~@~@~fsPJ3L.%%Y;V Oaeuel|h}@k] *-VW8QEh1ޭ%{e[QuH EWUhhbij~UԙύξхvX<!w^(`6;֯}b&}63ξхu\mH`\RVIN#N8eY*H73gR:==c=owC~#ɉ{Fm銚/!>GUԻ$ 2#Dƭuogg,f,/p&Wah9ذ͎}P( Y ^U]Je SSM -e)^KНw%:M׆FN(aquP,E_p:v=HRixoyDAݵgwמuvby~uu6x0b<ϗn/ZYQa Br-rʐ2ҷ~@d+e^5BԆ~YGFGdY%wJNk]u4C-OMO\._ˊƹ> l& 1f,{Gg24'_1ݺNڷo#(~FSt]_\xmޅ$YɪZr[|e60AtNB+U5$Id5&sU[|ssvcAh3Яz#vUɕp4l~;U}rEsG664ܿXmvj1/!.ܝ?_]pyTN$Igϟ|ҹ_x 2 &!I{ܞWv68րυJV^" tlRhllph[߸wJ(xc3^,E/$DcY(;g|NҥZX5LeY!FBRwre!q܆كm~@~@~eR;kF1<3L+e\ oPA* Sx*-OOM}~ǃqJ\<›/"trrJ5J`2].h6Пpi~fe)Wu`~avwvUWŠ`B?щ =SBUJŗr:ox+:5M_O4Bi >ӱ -[5M[{J(kHeEV, l]规RJu !e+215iY2q:5:ՠ`c6;cۗ5]Ӊ^҂l.K1]vzl}\-7vΖN8!T!e{5[躮*V~ɴo{Ýt~ām~@~@~@~B?eXKT~p>a* Oad2^c?ؔ(-f?=3ǚYK$/"!k`GMM54lfeYm?IPU,E$'?$Yյξ[Au躦ix%\Eq.˵qB4lM]4}M e-*F9ݞJ` {Nt]מG!DB\.ϯ RJ(]uR>PswTb&Cք~753U#K3S -e)"0TEu=s`B]]]|]dx㸦@7K6˒ !I0,bcB?ETuӝJ'1 .x dMYt]7 '_ X!!cov(:v!y xOffZ~x&EV+T1 Xֆx"!z<|~iy2\i2k≸i(vczp(0fF TWS;;?7;7t8vdUYVjkgfC!BHtn~N%[{=yAp89R*IR&X]nWY_[W ftόEV>4aX4jjkG*#&TX -fs]M>ٗyM&}@Y`M&&`1O{H1~gC )[z;=>|aAl4nUX~VĆ~2 -1ʿ Db%&,~؅Ba'/g˭&Wh<_( Xe0@ev{ R!:,o}^T"XaeEQ|<ϳ,1WwR"ZODi].fu}k~#? 0 cLBp\֠垬Z6aFBIDATl!#o ~G J+D; ?AX&~MӌѫO齍tWd~I\:??/Z=CPJGFFܻKtauteX\\t2ðֆҿRWw^gXLE8POGᑑÇ֙&>=_\pRuc~~,>s2jzq,?mnjڳgfe_q w)]QOtztbۑSp,[zg]׍tZQUԇ#N/B.c0jlh0{==KK>={yX>q:_Ȥӟ[3٩)Yo~FRc$65ϿT*_7HVmOs޻K/]q*~cQB;;;g'uD`xԩ)E#hΝ/\ NRzMS[]]ayq G? qB^;w舮߿<cTVF/}޾> o޺u]?{—X4Ǣn%S]|];w}]ݝw=nx}v ޾CCx">9=ŗVk0pƠS%IE}}X#oG,.-:pg?Çڷoo7o/l'NﵷoYΟFc^YmCCQWE-uupd>*|kk]sS;gZkkZ[^~'O]~Cy$NIXXXP$inn྽c岊fq0ʗ_ޯz;۬U:΂$c})HR8,E:!qRV0\P. a$j<}:QJgQUu\$Ie˲t]w! vZC+mcA<ƨEAh6 u˕ʘ1|>Ng漿;#?./apX(ZFw7W(r?zKr$Y+M6a˥-w'c1>{x4ϺNBy$q=Iƞ+w\0 _<4>58D94{ޗYbu~,L! fW!#;:oOa2g,}'EE|k"czRI<5>BkZШ(JdTwuqa~kլ 1-q &Ox~\Q7lоci[bHIZk% 3e9Pf,\J`dXǪ~\^ :<\BP~FB2y_q_7j嗹 HMϤ̠GqGϾ浧bX~i~[w^xKWӢ{VGKXVl6nn?s.n?|N+(d Ϊyr9EsIhF6)3٥#]T_Z?oyt$e:=$vvo݁NO.fC!ϲc*~FF0srV+!{<:icҶ C?__Kn\ܴZԟ_fbyTctzη_G \৙pպp`0W=;I !I2}ӽ+%Y5 mWzy3OX[pYҳ.fώcL_wWmyOJMcU8tf1wJ=Ntp9Kcu]!оIU*?W#ICulٽͻҪi4nn|x/uP ?sOw?"cFMMx㳯F w.k, IhlTGdpTJEt_yD"jGBJ*9{ d9z 0OQUHf)шFn/iZP!Bl5ۻtiX p[\R?b@T`4֡fۓƍP*%iD#ԟ[$KVŐ$ FDd`&db8O1)z*b0srZDE{ ID㋆svPeb0a,2shմ [t(_?8^'a0\\呴$I AC_o@Vn7zYEre~Qۢe9k4'ư}qh8Gɬ%+/[Eۖxx1sr^~*wtB#/2Bfs)Ċ5=t-Zʡc'/E(+lU*..UI ͉gU*E5njn͛' 6 BqI<2 \UWpuuX,(Jt:...jTP(0LT*z=LaZ1LUdT(J, fRFbRtraŚuLsTFjZNs42 F^GRaXqsVZna`0hP(ډ:R/͆+&JF ]* >}ZI0 (d`+++_ոV++pp0 rX$a2ZFE^*w(үSnП+ł +S9~v?ɳ ( KKܶ5$a6pY +U-qU_ TP\ZFm; 5nP@D$\K5p瞡ێnZ--"E{$B @ 5_@ (JP@ HاW %ل-@j[7W7|}|)ӕչr~j k~w#RY 7;"SCGa0 5pss#Qf-[;N 6+'OD.ITMFƟEBIT\4.-UN w7K{n`ꮕ,VMd"=#b1Yknsdh4h&>7rF}{)si7=B n(*wˑj"{Wbw/ȭWB)mjíӺ nd W\kNe}B7dr03ASTT@N^6:Z7A! /Po|1|D>s" yf!W'HBX,fҳRoq/!Cd/}_QT>n]-n#$#3 ш_ Z-vb* yل6d<7W +-FVzM#~A}IxX>Ie*F(W\KDE'Sm6w?zYgc4xHȼdlS0LL9":u脇~DFD:)UJZhYkW齲GXb%EEL?M8 sIW` ž}^~ Ƴc+K:} -O?W_c|g,]eYr%i?xĤ$$IrȫnszETa[qZjmeP+rPQAVy#0r4lؐUUla`~(U*6lHqQ1... <(O_!өc\]>sv#˹QlڲԴ4c`fΞKQq1͛5Qw @rJ ;w/q9rz4m҄=b),,⯿F$EHpUZp6> _};oItd$|DZ-9[_ZZJqI1eh\P*d27).|~r1ج6 %r` yyy:jMgYYxV|7nX,degՐ"853u:Q;~(=~]װ!Ç E.mNӲys:wX%Ί}$I".69Y&R{ Z xgN:Ef((,d,_ng݆4?))ڳ__zvcvxxx`0{zF RSzٌmğ'11[,̘5@<=<(.-!--@&5=֭%!1vA !)9i3f]#ӺUK"#X,ٷTZlI-سo%̭`4 qZ6>djTZscPZ4oX,L4ܼ|N:󯼆Agނq)V#jeڌ(((??LmL:kZ&.:៍lٶ`BBi\cxfzfϛ}Yq#q=b>*0sBiӆs߁ H %O=Krjj8ϭs@_>sJ<_y ZMZF3f7WWbZ&((CGp1$INIXV> BCBY~=sg},^@9squ:egِrEj0L̜3D||/SX>ٷҲ2ϜM~AO> |IzF:$$탗锔`4qwsw(~wwwZlɈ#( V3=zf+ʠC z3 66*2U6;S5b/$uNyd#IvSu_DLJM[ХSqJRR3G݋{$%'ILLd㖭ALҮm ͞ݳ'oזwЪeKv'SHĀ}ݳ'm;wrTꝁ*п/QQtҙG`4N aCr9C dӖ-h.|}|!44@GݿǿGΝ4?,d嶝Q O|}(--&H2;R3ZZqAſq"7bܳӕ 9} n4d2c28} (JJ(**˓d3/( ;;ǟzҤI4vZMFf& it33INIaͺ r9$ѬiS}I:PזP#%~ŪNTC۶m%##7kN@@RRRBfiҤ j¢Bj5npqmƺ h4ӏgϒnG.Jʞ={BRՐ*NVDpPZ-]$d29YHDP` w/o5dLJ'{^tL"cҿ_ OOݳ'o5rv3gϒK.]HHJb3޻׭cDGEARr2]G?v["Kݻv%Q#6mrY_KYmdfes6&訨sցr@Ejr;xꉱLurxInnCCB5$%'sivT8ktTqwsGBƟl2: *)N'.;!!жM+|o_˞}O=|- 戳]L ۶/|nkπF1W^۷O;u%<ˀ~}kycؐ[{!+__Ъe+ٵsZgNqYf8pOOO̝~L6 J$I4o֜N#|>+qA1d\LVmL[F5k &n|٢y3NMhØqO1fS'95g^xISK/hj+oSEKit4{ Ō?~-?M17 6Vo]C D&ѰAǎ]yzX23{| j{Xg?g˯aC+XQ=͢"z};Fxyy9<0ͼ{mCkg kb3 Z͛7On]BQe! 9It4 ^_oFA.?o0:zV+2|BhDrޤVPȫ"\E6F׌F#ZVlٱk\?udHIId2Я!l6RӰl֨ILHl1Irr26 p222(--ERn RSR'9)Ipww'$TRNncc4V}Jem|++łZvu\/̬LbZT[.;*Wl#\U~*:* *x+ǥP($ ]<*~;oaq!H.VG&+TlARZ?T(Lf\\4U$T*rF\4 ?*ʑ|* G+_*3 y'YÐAwPP3'"q4-[d ^++TR0WV-~ECPa,͊*QOT|VThDEU*ך4iݼy*/(KDD-[ʤ2fsM[\{[NVzzӮݨTVҗ6~RT~g+S9fC!;:Өׅu8/$@PdrGqqE%EجVT*U_>nl߸xi\](pms=wҫlW6QTّb_Pո1wBvOhp0cdb\$њ$ /vٸ^SLo) 3z)n΋ח;Һukf3JFZbUb^ Bp̹ HZl6_7Vϭty$(:[ZZ7G*m"07/*.",4l|}ZaP(QTTgu-0( h4h[s 73J¢B[B(ӕaSH |֕2]YlJ} Sh]p_װAC\}$(:TrUp׍nGR]7v;^^^-5A(}@V@ %IԬ,JJJ+TBPMPE :Uz/kc$I$&׷@pS_Tf_-7u2y7d2-@ 5uyc^dK*9v(hDsO`<\ŴJϊ(**ZRd?@ \:m=/4yI4n?-Wη{.} ֤AjX8s4-z"WBſhRz]#SPXD{wϞyI)̱|ROC\g7^1L7 a,+oKU1p`B}}4d͛ILLaÆ 0ww7?@N.%ߟ^qqk ,G_0\Ii)W➻FGDF'${^ҳGl.+NZz:ݺtq\l<|gGn; g>DGuk|O/*éKI8zšRILJB׳qV'^J$@&p[$a''Jv18{Gv"L~4p(,,DT`Y:p.c}HDGպ`Yt)VNw/%K?-[Ygd\0j%77fSӑ&ѵs'J0;bԘc*?KvM֭d<8_=S\\|7?5VѸ$qǽe+W||ͷL40xH>V+?O?uWv:2D&#Wis]WOܐl`./TTO@V.bpi{'>![qσֻSTT˯Pc= oHkN謹Gnp=h2|q< @b߸y O><aܳI)))qKϼ# /Q0OȠ瞡U ПƎe 3~e t(AѭK<4LǤl|<[o@T7_9L]d7F{͔ ̉3Y ܨp*Lw.t C0x@[~e 0k4>`<7o&3+^q=4u-5㏿Vs6>R6oƑch&F:q8xUEhH0nnnw?ǎs ^zu^|Y~7d/&кU+Rށ.)-e}L'vd,[;Br-Mk  doINIR^c<#GlL1ΝvF {3OW#憫/OO8y4zv+. QdDQNZ:o}/+fb IR6RRR\JHzp4h"ƃ~ nhxhΠe@~L:ɫ/k2j Ϟe1)it܉А7kG),*exyV=I ZoznߎRį'O&0 o//||kؐ, X̞7BC|LI*j5d2:w,K>wh&)9 :S޵ e:];ue5'g~RoI%ܒ\!+Ģ(ip|N\0N$v{J ̜3'|UϦM <ȩ=v۶އӺUK##kؐ}лgJǎ4_;oص{ko``N>]3JS!tlޜ:M9p'O#UT*z`ܳϱtJ>wt*R`߁ :wxuz@ 1Qs=FGG A-Ԙ 7k`Ņ~}PZZ!4fΝtDF4ݍ`|}}0 hܽ<\y|T!ax@l0#;6&/G3fzWB]_WT\AfAjVqf47QUJ%2~}za@VKhH1mp)ڴnCQ*DGFЬiS"7&qcZjIF!s(aoۖ2]YYsHBد/iiiڴjEۘ4 LFtd$JѦU+:Dzfc~tT$w"<,&Q8mݲM#*2^zr B;8IL5dͼ3db$vټyID4NǼsD&Kbr"޾$$&^ÏJMUpQ9£oQu&>>wxgF R$2"uٱ{7}z]ڣ@ %^"ׇGťDݎ%ј jOkuEv>u:7Me["LvAQ#~Wn ~-@ ԩxyCA@ Q+@ Pַ@ 'Nི[gm\.6Gid2GY#sL \Omj0?xSh4Kw,u6Mp5;Sg8~2_ޱ@ ~u#4 U89~;5ܵMr޺}6s?>,'N.]gP($4hHYY'eEm9{w7wzMii)3gh4ף'>gKĮ;9v ^DEFVB.3r:vFuCL{;JXX8k׮fӤIS}{ػor] kZmЭk,s?777 jt\\\ѓdbڷkm[d2~Zlvn NlDnnZAe] ${g4 ov~:beVD4`يh4|}P\R7w֒Rgݷ?={ws6|QBчc!>{ LC>B]IIM&5-{t,#Ů];qi?oߑF,]lx1lʈĥ{..凓vم}`ZIKOUV}lmcڱ{.<=x򉧹{}xzzأcĭT*x򉧉cv=YLJqcFTvoߑ|d2 Omڜ?8(h֮m~vʱcGviO+HMKdgg1j=7uE/%JP>_Jfkn;CuѸ`6 \qӧpuuyte\A/F$9$IAg4ng^=vfJZ,4hb8۫ QkjZj^VSߋ:wm֑D`` 6_WWWlv;jUy{1l۶ƍ# *'~8VǟrbPZRXg05gf^6nO8K]HHjMDd$GSpjˮ|b?OBA`` v֮[CqI1.<< i=댩xxxp爻ؼe[ ;vf5@h4PZRrɶ4$$ܼ Q*Ul&9͛7O=zG`ZYm6+zwFqITZVVBqssE͕9uGR׺=6-k 'NFJjZ=w#++w - N*ٕDWB}պ^Fo7no.ח[#vܬ2>vqUo ث_p"@ \B nV99-5Vɇ@ 96Gi@ _r@ _-c@pi6⚟#lnF픜:)/jEkh(>mؿ?ڠk@ Kp!3}G̙s. E&#_?ZA^+@ \7K~MrJ_E n=CѤ d Id_φA4r$9foPt:vJBb"{֮P'^+lvߓxҫoSR/(셞˂ŋIMKsz6xN>}ٷgo{0))<W5B.Ͽ!##ZV'YU)~Ėc/b-+CR5v,CvBoN%Kwy4ed<5 mJױ#g^ UL|c iЀ&>W,Ruv͘Ge=tѩ/ш^aCHMK'#y8J226;gd%$7To;~\کD,V+_| s#Gs ٸ}rI֮_C8>Pe(!!{mZ(7*U5;(sw ҋDFF2hYso{]Ɨ}5kf;STXVZ4oNhf͝˫/GtT# ݷ좢8|(m۫[y'Ie W(yJHJ_T)1 Lk˜G`4x|xxxp}h4aaX,yח}v WóOZ. gF|<<|sx|1k#U),X}w|֭kԫcc5LLJBVɇyޢiݚ;gİam۴[ά^??CӛÇ3QTX6߷nnnĤ$~4{JYooo, g).)чF߉?r̙*TӳGˆdێ1&|c뙧{:9ކg /# @@߾t6 Bḯ9uӣn%IۇFhAAd2ڶaud:`ƔUphHK͍Rv;<4ww^zuZ4kF;Cv)ޙ__Jee34nԈFص1m8q$v<9|8c< @Vh6|?L?h48yCAR _||!!3ṿh\\+ JZ"-=ajҋXf|=~<<<ؿZN8|d 3BNN.vF^FI]Xn=3f_3M$%Annnt}/*Bptr*?8zthV @`?=5Pnn$$&V/^^RB>>/&^hWPuqO8_ *Eۏ7YY,]O?^ӧpwaNy4j \48}UQo զە+RIc.('VQ gqպѨQcd2Y{&gN;?@>ԩ،Fͣ_XUktڅȈ7nDfVQQ,^۳vzh0 6Mٵ{7Z-QQ8xXWЬiSXIPRRʌϯ!Μyٵg/>^<Ѓ%%%5W&2"K/3͚þh\ vq$233 ƱyR/(o^ϓm4:wHzf.}۶h@V-Q*1y4\]]箑xzzV߷VtKJJuLZ-~~ kȃ͛3h@ >K퍋ƅ`5mŠUJke-$RTTD^.4 ^^^L2\Z}Hio/ZYTI<ݺva2QΧ#;#%%dfe;Mϙl#G ӃS >Cݘ1kwϞ{^B.`qFm[u(,*ԙ3!Vq gRRSMϓ$IL9KZtKΖ^w\KJNv*]79.ǥ׬:;~aFɅL͊.szbimK9r%"]snnnyie2Yxr9Z_ juIou  ;J22nvF{5Y_=/,1zTr^8+t1.` 5-k0V*ˤViFSWb.X52z Gv"$!pRd),,Cvtؑ6mf撘Dbb~~XrVCseضc'IIoCL6XV,ZLQQ^9b8]:uBT`JJJkqjȷ}NtV-ӯO Xb%$1d@\]]Yf-%%% 66 ,$MkZ6oΌYקM}*rjYl9YYYNYY'N"9%͛1t-f̜ŽflJ8[mㄆpם#())aيh]=r$JdqI ˖ %-1}5gҨQ8# ceb2>lkp.%$8_t>q;7Og).zs!El4ʱX,קŨJ湧yLE:3%bڙn+o/oO`ړMV&>}ɓ$%0y4rrsYf 99ڽ̬,F#)X->feghXlyŸ'NbILLEt8qPZVƲ())aҔddfEq v>@۾s]KaA /޲u gd͖ؾs'ydeg͛L2۶SXXĤ)())e55uIvڍ` ?|iFf&&F>+L2|rrr4e*e,[2#I.l߱]\yHK8p5$'NUENNLeϾ}lظ\էׂ+R t n2FzAlv8vv]+ӓ{ŨZ٧.ѫu]$؋v,uD IDATdUd`4ëK9ǯkkЀ~ ѣe$9d+/NN93wxij~r!z` )++/q"Ӽ y7:x7ݝ,'zr^*~+ q^\9\dqj7M%FJF'ĈF3[a?{gձ&l=,RmmoKwT-up/IB dGȒnݪX_4YO{lllX\IJ"; jjjXd{LtKd%E|uҙ+Vq%6D5 >*$OO|>3ft^yTVZ7n=X}:ZDY^6() GoiiiIXHڶ7lڄ[NOL 5ƕd<=qqih4=w-[󄳦3n Z7n`tv(F'j4Zoc}m'-2 j͑Ťh4(F'N7\.ZoJBP`ggS;2E,nXT"DQɬ* J 2zeJRR9Fݺtʕ6 yn.{zΝ8DEư!wNQYZJ͝|:̘_)[.8::+H`fffpt:J]7xZSgxT*:VVV5{ `Fxڠj3ͳjGDc-U֮߀L.#2"t+qLann~Xjʣ<ϠAtG'OFΝj=wޗ>MM^az:._¢Xvڃ۶a`F6:7o1dn 8HJ2Jr2w7zt릷w5#^RZjϏBvÇ _^ҐKk<پsy ߏА%&RRRJ븻1b0D"I'`=0~_TE@@ptps 0W<^5[Y|52Cr}oB'OƦ={kۆ7_{5#GJQQ1|}TJ%;v߾뗣@R藂,Xb-]F}nB&uxYtώBQCivm0fH%p%)IHva)s--EK1_?lmm)--3g_ ,47OyYؐOii)cbLn+ J1=Ξ@vN. CGҥ-BC3j$ncw2pËfCvm RQgawn8q קGƎE-a[ ywD:t&`ooO1>>z6:A KAd2>><;v4EEzpSDFFNQQ ֘VTVP*0~~weك.:Bqq1>>tԑPQQi`#>sH.!MrJ ^^0rp?(99gdqQF}si#H6 'ijoι30{6YkPCTw4X 3DED [ss榈Vь9SpE̼vkSQomyGlaALhZlɆMp *2 ssbc3Ut4AAl߹\b1ݻuΎr'$8-q صRgATrf&NNN߰QoC61|'OF*Үm[bc'p]{Qޭ '$RV333IZjEvmo^@@@@E*RYYiAUUUN4s Bdn=-[꫄Nս-o%#33s>ALx4r;!27'tB^|bTmߎ;qq8DE5U͖δAmjsC|&k//ξ>ӦL?o! 0yh+:~x:~Lj&'-"T Dla,T# д4I,ŖMfS(j8b"i$CϜ" >_gpH$oj֬_TVaoes,1>,TTٷp9F"=+h4%߰_WMR(*.&&OG࿃s%|Vǒ]Iw8h>d߁Mh<:>tחBn_Rij;4w!hXGmQkR%K)+/Xqv_Jdѣ5Hu*4Iܷ#;'{G~y)WrR@lL 94I:ɇbT5໛--&W(F׬i 8ɓ={|*ƎpKtph٢z ***IzVddfT*4q֤gdp$ngϟG&|*-ݫ%lܼNǀ~OW+t>.IUt4]:u$>!LڵiW,8pPeһW/Ξ;L&LJ0V]򕫸<$qόJ"aur?՗А}*p--Nء|i5Z2b0>B^~>#4$%?#^^s%}.\x<===bfff<|еKg}؅KRVVNL8|a]`4e]Fǁ ʫ˔,~v!nZ~?9cX:2%{{30țB5k)JRb=i4Z-7oasٴuR[[[HNJn]mߎu6bkcB`Ƞ\IJf߁\/(0NZ-쥼aCgP&ffܰƍX[[Ir_SSZnxT2ELq/Nqq_+Iz]r9~_W[`oϰ! ﾿-9,'&0?՗]:wߓKd/,^̞}o>̘,XĎ]oGn( >K%JrcF_RXt KIA0x[`9@nuJ<{2g㖭t%((wDmmlXtޝϾڠl35АFxݺv_E'{j"Nq˞}F[*++Yx)KQQ1{ZZ.c@~M 8Q"|}|n[Z^w "ǑoAg^̧gr5om\$Uчg /MRɂKPTT̂Ka}<;v (j:E/ZRoE"ʊ#FQZVf,\F1.yiL-[ֵ+eFeAMjt:]ǣzǟzlDQq׮ #J%<,ˍ*RѽkWdU\KK[.XH$ڳ."ðVT|}|pvvWD"!>!#INJaQ6liI ~x{y䌧^TWW/!A 4"BA֭I<~DXY燳YY<=l^!0!> WWZDE>n r8Ȇ͛)(0%f蠁xzzhÈ\mب{\ ..)se%%͎]prr4쌳3~~$ <лiHnV$bFCao-Fq5O'bV)J YEUUo>>9yi;;;llMptt wwqvrDpP{=Aii)EEF'냧'!N]]]'+;d<4IoiiRD$23qh׭Xڳ`ߢH?$'7t:173'7/ki:}oo/D"mbZ fmg۞ϧ7n "3+b_ןo%0v(AHP~>CYy97nR,R,&7/ܼ<\o]&}`ogA:ETZBn^^p2y15jԇ1> "#H<ȕK^Jjڭ#+' j 9~$Æ !4$gggX۾\aЀpWMBb"Ur9&~xyy"*__|}4H#(0vViۦ ݺts8;:agkKrJ m۴ ggg|}}ؾs.g?y|:wHǸxΝ~~>YFFDxX-"8/<"DDqev݇/cG2xo̱D4?Z .2_?:u0oe"anfNXh`N9CTD:Ƒx "kۖ"ckcC}J""< WڹϞՍ:w~SR FVrf&^799&&ȇa8y4_?90ᆴZYfK(OpsϵR#O&Þ^|焕؜ {v-D3HKݍ{s,8'O&<(ZBºz[TNhjuŵJB!rNJN:_@~i>DѠh ˱dt՛?-EdƗ4}QDF4O޺0n>:wkwaM8:xɝS9ϳ9ōLP[ZDE1kh>:3klf~cXI$weM -?yŌz_@@@@@1B#_@@@@@1&IKHBʀ@6Z@@@@@@i X- 6ZPp9:5EI]K3-zVV4xD4I/-"0GQ7r"Y#4  仹d2u"=#oUd̘^JoG'+a%1etygSӜ|HS I j-,'ygO\ѣpvr2.=#@9ĉF<_Z֔޻X̠hOsҾt  $*:.:HFf&ڴu= Lc /\A&{dȠ_eqô:u`\KKS8ZlɾIOw̢6cx2"3Zԙ3k^|}|pttl|}}9|8gΞ#'7iI ]:u"<,Ԥ 8r4OOFAuu+IJNML ]t~v)KJ^U eJlL7Tj-IҜBX,r=eU=W77RD]߷/:r7WW6B/!!F<>t]ǸcPصWWZvmےxℾ \]x27*̢S\-[Dߟ~UzvvdZC4EF\vn]εki[R]?yܼ<>L.gђ?FYY9 ,FqYa@ղnFJ%e32ft:6lLEEM)ٷrXEQQgϟ'5- N;8~$kJKY -=| oIިHJNa`d2}*w'9r4cHKJ((,4ici]IJf݆QRRL&cur.\?F%Б#?%KOH3g),*bddfr,1Os%)kQSSâ%K9y4d?h4lش*c ˣJ&cդw= -) ot5ZW+~v/\%OJN[g"S٘IB#id`icMq7?R:_}.nܨbᒥV/^+IHKJض}xWgTUUQT\̢%Kyϱls;)d%&sRSSYv*(/*5g㯩ы5:TG3Կc.._I",$?w4&=#ZGaŪ&M#0~T*vMB/'%5J&7_|s.\JZo?_~ ~~ n[/:@LM7ZĄ͡S.Sh˜:p1j**o>ao}!ӯVڹk֯PL >}a|ɧtБ7Cڵ3_~ =u3(CS(t܉|=۶oo4/u9$%J!BQ7Eڳ`ߢMjԨc-+bKBCz~~H9b9)OS租#ܑJWUUtC; |B/ !tM6_Z"E*-F`~Z@,iGM26qHzJ]23k4\sҮ{Xj^ok֯'>!oKzFe_w]IKϸolvLMuϾ_WhHMM S^~{Xk֯''7mx.gnGs!MAk^|Dǣ啖 p&STTz1A&CWjF"F57u: ]ܚ_j[lٶ] LL&3:UES4_7R,&,4 ֬[|edpʕ FcoNGuuojBMVs1Ý037'.6kkk)]9_Wۀ BT~s/mW\/SXV+t^N$Jq%͇܉mN {wG +5FtV*;vfo,@t>_| 55er@Nn.eLO vXaB2EN>Mx=*]{RHNIY6x0o_زtf~0-oѹf:Ik )Sؿ-XtVVVŢ Π<}{ 223 yyiws`Ƞ_ '''JKHHǟ}D"Ņoɩg'u4Kvk_!pw4MMTO ٱs$̟;w JObj7II8x>O>IRr2{cNj !>!4G-톺OͻΎg7 443ys}Zt@g0|P<<<ܩ#;Ʊsܱ>B>t(Æ ᳏?Ш2ib۷c%X-泯o899Rسw.b)ޥC\NJBՒCRr2*\};4qG/Me(J^KKӇk.. :j{>$!nr!lj >C[ak%\њ{1u!,-̉ tbV)J YEUUT}HC$ݻ_VI {wGtZtMMYy9 \7̆ɋH$s3?Ġ ;|(EŸa"j(Gr@T;fgk;C UjiNoH$2NKGniVh`03=W;#t :IoÇ jj*R)-ŝmX_^pw]6= \Οw`fn~a{,**&U4>{{{8y nnnmIVɲ3rކʏu* 5oy:֍~}r5ոM%5XK,vdH\r=Ώ^&ÞnVHą#A>MAM3)9xQևCSoXښM%,4A.u;o{wI۷%=>>>Fi:<&gFf1xyo׎_Ƅcff?ύ_>rEbNqqiKT*󱴴ۋ_R$;'s>wA">w }^KX*ERZV%}|QTTH$l'̞ Ғ&>7ޤ[)))A" bwyOoi9~gG'׷ //9}$NyxstBQ(|ǼwxgV^MTܺ+&-=_d}5$$8i'7-PTWTPSSCBIHHm?7wD"EE8;;ԗys)-+鯳?9z/\Hdx8&~Ǽ-E :ϛG6m^PXl{o'ww= Ņp4Zfn C[0{ iN>;9xqc&&Bnnׯ`R괘sJŻ>4H7\Gw+&ILvvt{(2KШ4U*FOeYK1n9}/ו{c|75⡪niZ4-ËuIԯ'sssQ5'gSh{o]=ȫ177G"8*H$o[t:r)|wi"#h0uøh(Zgc]sniNߋwz((* fff7_bAz'!n)M差L՝@9P$0ySlj&Jzv@ff~6C@@#G#_@@@@@1B#_@@@@@1B#_@@@@@1B#_@@@@@1B#_@@@@@1^OIIb; <|?u.DFDI8 s6sh 4B gNCꏤR.dVɤHڀ~]e?|JN97Rc&8Wb\Տ$}LK玝% FégY+I\KKs8r46C࿔&KJQiX{*h4j8ʏSqus&jLI!|'m۴fێq?Zm^T*nVJ2:_>ѷAQSSc[|hZo'~^Çپs7Q 4_{vmZsiy-oČϏgżw ';7ƁÇ).* 2+VRõt~u9kw77-]FpP vvvګlڲ'O"HӗL$Bdͺuxo>_NdxڵH,-⻯`:sw7^2H$ Ġ)ǛfOZFJ»|Goǚu+tnj3gm*|x2:~$--JŘ#GZz:. %*2/׭^={2?  ̹|'osi~5.#C,^yhRƍC˯@g'i,[gβvI/ҵWvҾMTZalش{{{J%kaPYi4e2D 3zӨmݱ׵GIJ^U eJlL7Tj-IҜBX,r=eU=ǸZ-> 9rrHK#;'WL[6fuFL5֑»f;p \|FC^^>ޛIe;(A!Kׁ[`ùpWI/Ǖ$x~8鷈ח'xΝ:Хs'ڶiO.g46m&//'''6m 1i/MР|k xqDΦg֍W^D"Ɩ ύgn&..\M+:x&Nř)رk7 <7L_?:%$TBBqUгGwBCذy32m*= GkVltt:۞M'G6d0/Oѱ#:xW:EmTڷ3R_7*@HIM%2"e섯4]ݲ:FÍ*٣;#j_u~9p/O©gٽ;'NDP|Q]7L!61ٶh:\a%Bp6>+9el9Lfcb& Ut*|xeT `}4dcnfFFf&)<ѳզRqvv_p 2i'̩3gG 4W(wc`Kk6LFka,fcd|\KKǛWd:r{@P` ^^8:9RSSCvt 'O`lknE(>t?,X-[ί Ƌ&@xxaѪeK =#qqvŅ\J%Kڧ^yTʌq^{bZy7(VVVX8cgk @TDfҭk:bccCN^养;NNXY;@"nٳ8;;䄿ff"*{;;~e9nC&AQq1b㍹a#˿^k'nRIЇΡuL vvvXST\LyEҰuLͲ@V"j 32ճnnk2gggo> xnn|G.L&3*lmmx2 t|* $ ~~8;9퍫 .TUU˵4;o_u~9paӭkiղ%Ϝ5i8mHR|rQ۾"`hڇ:ȅH'&omrGk0'&ЅYT+5dվF+0 rJ>>8r쌣#666|lD桡_rvvB CmٱjZ~[;2¢Q̓&Ũ5jt E#Ǯ3mt$΀RE$ԓnj5۸q!D.+ $''KWر=]TV KKFϟx)Wx/M̱&<7oo/4-_gw IDATB֭=r.$2<Ob֭G76oJVNb]g ?>k,,M7zV?nkz&<7Ͼ{j 'UUUu0[G{:-fffl޺ɠmM߲OVVEFw !ۑpoGN6؍c_gšk5o@HX!QwQ먫Zlkm]u[}mPպW{+$!$%$V}瓏&y99=^ck$vmٵg/N{{`g[=ò+5_L0GϙK^*MdUhHIMNf޽%wnjl &NfMVJ"v:uAV舧m[Nx٪ŅQ.vP BDXh=wLF{u˹};3qc-&$8"FCy핗W*lݶoo7jijϴD,2ؠpv ڵR A($6T*e+{y$,4mۢ֨BPЩCR*BQ`eiIR)!jKqwsOdXZX +NNN *{n U*d2];uLJŅzub-D"PYHaF1DFFMzH$boooN&#Q,deg.[hnAP^'&! ק^ݺaiiI:u4Ny{yѩs`cmC~~>M4&48 #Eѐ~.:BHz Zm$_>PVII ioWעe}EEEzW* b>eir LUu9<= ^'-6a޻NNNVKD:tҙ3g͝;wpvz:H8v vD\lYݏ$%99_Y& fWX |}ٱ{7tbb?y 6\IJbʄVٶN1Xr|t2ڵd }_Eyݐ/ɓ,]o]Xj5GBd+CƐao͵d|}}Hei<VKZm37V ]:v$=vXCwk;a"*O>,^7Ktد3яFc]7< ^˖EiLJHZ=Ӓ,4nLXH}E9##t劉TOV\ʤ' r$WbپCjV!mŰ4Ċ+iyJ3e?92N!u6lތ7oqRY6"Pʊ_RBzl{5.dT/^h^[W?q%Bf$_2}d~]p%G6mt2;vkNP?2 ?__8t$Z[v֖݇џd`~,Y΄qc fxy@MX,f#iǹsETd^}L|1f4"bJKK[a!!;5iLPP&M{.UPN>+pv&,$py:9998tڶ 믾'#>ΎX(..fW3e䉆rƏȏFP?2ׯ39S''ߏ>]ִmݚQ$'7FmۍVQ< eu5,,-)--y&FmԦu+BCdƾuٺTe"7n0kl&ǘ?^~Yӧaoo^^~>/ _2{w8+( #P5z@- 8KaDHd1yJ5n nameI3nPr3{;OzLtг[7n<Ə[ov7Z-" :6cH+g.^HfHO">]_X[ ym.''Ge2b+u:F7@ӵs'> /5*W "Rm;19Hllhڤ1_uk [ٶv ,㏘_k,`Jt*H$ mci++;(&g[=cvҢ[o}0eWk%BdfVҪںTLz۳!o]iIl%~~$pH8?o#&؅ iJtxRlxs=l9Oƽ꿿ĴcvVVا7 af狭 eܼB*3=?.^-~X[[WsrtVJ /^4K=ǴM4fA }U&NFPP J6/u_}{E߫A @{D͖c/`|[+OzٲO?`_+"FcPkTD=^4A|rj\Kyɕ `oo_:J JTH$۲JzP\FZVGW\ X5Q?NJKKKl*qeNVCɩOEM+aUh4T*vvv,VňDjbjzJ۲E mS#P<9A?jYa724sҥ*ݹsWnFԖǢ|K!ǡr(Y?cK+ Q0UPnYZZV;< 쭓;YVlb}:Kll_jj'9<j][[7P()BjFZ,7fKVOBxS"jᾢ"$^T^ImZ ۶omJ虳g/ P+[9Xt*?O^-eo"kׄי5[v]e*j8x3zl}J?xl9UQRRofk<#2k$_n^O_JbbUTYϻ0SKu}VsFSJtf9{VnFFx4nJvLtL-j%k4hUJK5RȠ?dh4\TZ֐FRa.jiYszv tz%'T*QeC9Ƭi_d-ʇfm/bǪtVM*~W*UBd&*lʲ'1WGK!1oMQTC^ϣ)}s|\kC2N.1(TUZZJAA_\6ʔP*yh2&ke_*w|Wk۶3|9?:|FsWJNN.CF=E`%Լ{g=ȠYR[Mri߸cLI8ʉ'^U8z8 {{_}Lg[qYlmm{7>xϐ[HQ<ąYh׺|gy  פ-8E?2n(~[.yB߷/}It=~O?T@1GN0[.\0:nFo Q=FF߹ó<M|U˖&~Bn]>#< _כ2?yQ}j\%LZyrʹ9f2V ~?MܑIG9Z@Vb(>|='Tkˉ4ʥrj^< O./Ӱ!_uV|5m }ʹz=JK/1&fMeʆrHsLlӫ/_!5-}@AA!=uAH鎊GntŬ6ѳ{7ك'OcvV6s,b8ۛˌSߏ/ƌ慞=8}W\T 63ӑԏ4qcѨմkӚ~{|JgO|HmmO8ʥ˗HxkP!t%-[Ix9n>WG[)8Jy]Ǽ8pOzΧuV֍ 6ӣ{7zzhX,6}++KJTelmmN&#/ID"tZmdn^  ӏ?bɘ0vLdGJ%zY~tzJ0y*/À~}bd_'$8s/KҠXXXrƿ/⻹s  丛+ z1}Z.s9s:q"H$?yy`YbQ݋&Qn>ІrM|Ef&~ *+fڌXYYҵs' ;a"X[quqAYddee` oRǓOǟ"[QTT􏧺-_\?`q:`aoԟzBCl gCG,*.䪮W/;[-2Ydz=YY(UkJBә|X p7|'jW\\Lqq1fm.,,D&! ;6Wa.OjyXZ-,s*BٹP4;_(j5jƢB LɊ1rEE'2&/]T;w^x<( xS"/ !~! Tk4صrn8h4^rhڇgbR?-^R>IݻW#*l_H@ӳ`[/R;$&%l?55w J/))t>Yx)jZ_9G@'iݪΜTS%gr/]ܼ\'p-ż25j5w6[^TrMwRWasij^K6K[әMSan.'^i_d-ԥLi.ȌY_ӴIc<<).)R꾛aԯ{>VƼe z":}Ur3c״hތj}aT8_zptssZZЉ% ex<}6Ζ%p~4hRRtJvM=3` 98%˖ЭWoVZMii)͞mM±c6nB\gk y=]Fmpg@Y;M>vto̚-ٳm5n<-۴CqbqV:|B;w2k|:z,[e)$]ʳ;дUk7ذUl߹qM1k6ټWZ< )--{^t:R$??.={ @ff/8:t\I,yyÏY2VZ͸1k)݌ zHmiٶ=7o2Yf-OdKއN^ym؛0,&LBl6M}T*٧[ }xhӎsaπ]ſ.3l7<k72 UʒRb }g3w dZF,:P ';`35 {g8:uπA„Sk 3ƬӏZaptD2<ܕCyj-7@M zO;xJ%Ȣʔ5IcnՊw2s~A֬c7_Ɉg {}gΞJb"*sYd2 IJaL0VWkKJj*Gc?;l,,-Y8N9`l^ĤDnڀ{'.&5+h}+zooO6]Cru4 ֬efr vtҙl^aCTiC͇Xg._®={w:c&_L!yR{mPPXW^ݷdŒ%y߷YGΝyE Æ1"c5oӆm;puBtܺݻIIM>yy@ ~׮q91U˗1ӑU3۷lcvoז;qI 3`];u#x9s,Gceт*MYw}nw'J\%+ViFB\IR>!A֬([z5˃2я_r:o_,gggn\Obb"۵eo1qT󡹹%Kn؀f5hOZ '[F Ǧ$ F:07/.=.5*~geeChH0qbZ'P-eL8Db871.a|as%<(gs~&AP`.N<=APPHQq1 ǎ?qD_?8:9RRR&++pYC9;;;lllAT 6+J8Hmpw#$8vmZ!Z,K{+%׮qa5iݻddf(6//O,---rɤ899!wr2NNNxxSn J$X[[b/0 ڷ#''J͈c՚| [qtt\]\;9!ؐŝwiѼqbJ~~95 WW<=6;nRw ͚45j%;::RTM+ h_+++LXS,m۴aSTd(;~Nϩ3gs  6!G8qY8z8];u^ǎnNh4eۼmmE±cp'Nдq9c?knՊ ޻șsgi׶ Q\IL49q_X Z͛Q?2u6F / *"NG[?<=Y/\ILD3g?z>;~/Udfe~&<=/~j̇殨NH$&sW#8},B]{kQTE?p"#(**bHDxXZ-6mdgg{Kq,-,AleE(sG8@xX(DH$ܺ;_ 3+ 7WW<VammM(( N=˪5kyual spTB~~~ko^:P|i߶ 666w/Vv6;Umȭꄇ~&ꄇk~Qy qYnUTTĚص{w%5vCpPV*_]9ݺtf=l߹۷[*ep|;}Kmm),Ttr بYf-p'<,H8vۙ]#{8IAAܺ¹ dFeȷEHXM*AMdΧw@p{J5 NCʿx2+~_MjZ˪kƑfٺm;RmaιwOר̽|~e1Tx<Ď)..⏭۸| ab' E*Ƕmr-9Ǫt5si֭-2? Vnw;v&*";;;vDQq1_B ##ƌEVn&߯/yyyJ:U7Zp;=۶ѱ}{}zQ8Yl+Ve- hW^#33dddcnm ggvL*53b\jj̹s4k 2vD~^C 2ɥr7oٳj6lތRYdR&*"Ȉz\B;wb>̘JT%899E?; o//ztʡGXv-.BPЪeK}5Z $//Fݼ:v۰e$&&2wB  d˯{quqᕗ=kOfMl JnF^HIIkݰ}{GH8z}BNqtt0?o"nܼI6UlEr:w쀵XHzNʾSPXh"P|[ 3[F.# m_^xzxP(puq`_9W%ӸQ#Jv222?pw3|1'0׸x\/O<<oJԭ[b:j ]r9 l //O,--M_K/KKA[>IJ˃t!oEJeЕj"V"Z,?__*G.cmc{Us}BRsEn޼I82}Qr6c|IVҢ^2{7і{J5Rk^is1o%N'g?X(e?Xqdaa:ӬIS`oJFYTchgRr''eBE 8(J] ggIMM%8(_<{j+`mm ~4kҔNeG3Ϙ3-'ccmczIIFpwzڅMQQ^\t!AGGReQr,Z}BNNQ`!L:l ii$]Ť^%%վ~:O\X Hsǎc6|}=+b6$2CCٽw Gq)^}ip6!Z4kJVeyck4mҘ SV{n;|?_"&! gg~ -zvJ]дZ,Za݆ٓ9;wnFF7ʘ/* o wLiڤ1|lXMzt+t> Y%HmKX_N$ON_f;-iJ2,D4sc/#3c3_mƣ7ymNүeؘh6 VX8F(T^͕G~;iڤ1f|dffu\ILB.w2oՑý{ \]yLF~~J*^Fr9._!%5[[[$66TFYTD{ЭK'>=bۃO3r_TR*V*T15jܹCXho#U͠I\k/O/'ioKxX(r_Ql }^'9sxyyaiaIHp0Dpws D%q/v2QQ&z x_P=RWHXXX(6jVJ-e\r@ ɓ C, ;;;@DTdD bck4lЀ!|NZlIZZ e+ɱ'کXZZryb2^JI!#3 1=bkCGEF䈓" 64l?Ahh(l IDAT͛6%2"# G  "ݻv!>(SZ%44+KK Vvt/c6$j/]sǎF1HRd2VX GIe4o֔cH}lnnx{e;)yA4A9~/\$$(fM޵3wБ#h4BC8s,vǛ~{t5۶RHWF%WwRPdRIU&<^n&MPJ| 2G7sXhgMfߙ1m "lݤq#c6+6h31R+:F7 Tf֡3pCxb03zo#]ol'v}uN\=tWZՋ?Auu$}Ѣkg:? 9R\̔G]u^^#I j#~!n7VM~HGlsh(f3~Nq8cGBjI~*NH -!m$~! /B!B6DBцHB!IB!D"_!hC$ !m$~! /B!B6DBцHB!IB!D"_!hCUqYyeeGQ}^OBB":B!D3Z%o߱ NORb2*kfe֟٣Wk4-N3ÁN'҄\>|Z߯!s:=*OQ\RBM_ٰivtӪ\.PiKn."*2 Soh4j l"֮[Geeqqq).Fӝ]vg}g}s|"**+IINYrlrVY  bwߑG*BFLrVط?E뉌81eeeNikee\.g3h+Wqхڥ3,O?Ls:߭Qck^2ECn9jjjqٴe fEQl^5lT\nϚCv0 '{^bQQQ:8cO{թϺo7QS[e=[cbk̩M_a}73 $sz SAa!e>Ǒ/v|6ܧk'\.ggO}O%._ԗ9sүĴk^QUNl6NgS۹^~~2`=r5Ø>k6=1{t>XaҴLyޙ;pݵtҙF"3= >b!=u#󣼢S'ڿߠW^r8ZVƈoMM`\˯VeQ<3\s?YqcO?c-L6'!!?o֭+7\w- >GW=J ;κ?w~[vR:x0g`0 cC̚1`Mx'2'|`UU߰)>œZ.sN67l^=9R\̅sˈz-[xg|DZ}NϚ墨0&O?@Bu8!#DFF`2d'رs}mL/_NUu51L'۶MHu튿Z"c|%c{n]:af?eL z=ysX+6mBTdw#GꏌArR"^>b!?l܈`+0,_Ntv\q٥Z ,CC|t҅e˗.N˄Ĺ%X,~w62p>ַμ0A7O̊ʜؼ厑>SֶUv^Yn)8n.?sӀ4Z ҺEEa& ii,]q4QWTOADX}\+V2Ol'vW]z)>vM_EQ(*:LffW٧9;22J232q̞1Ǟxkmڼk&r#rs9ϼ?ne=rwzj#~ӉnT>ɝnIaQ%%\w0f3À~ 垻Fcۙ ߏ>sn&d#"';1wi7$. j0?zɉpBuD2fWR_3vxccф{g(\.eee-.׀~}=?~SH ~DjJ _>y,+Wg\3t)ԥsgJJK~5mU^=HJL[oz>XƱ$|*\.N&eNel67}v+DdõUP?\].Jxs)}Jѣޭ+ x#?ɼrˈ8t{#3#IN}J>}|7?5y'1ߟs 6jn6x{5.V' P d~'=- 7x~ (0#&P3OXX(>2{ef3Æaᗋ2L&Ϻo\P7c '2"ؘ˽:lfB=DMxXmw}\@BB<ٝ:Qp"'%&OmmW?G %<,6nΦ[0[̞~ݎ;`Xb!}.̩ƣ֚@?$)tN #3ĭϭ騪-*Z 9al?TPiejKoAdDDݲ8]8RRSyy# ;wnzݤ`SBM& O|\D4zšlic&f{-˙9gV9կLu׹"&L 8]N8"#XjTRmL;`{S%/I ]vŌ TTVr䳮$ڷ+993cT}o`4j5r37l$w 5q%ug'^z5Bp+nj5Icn|2i;}r}\Sqk2c& qqݷAAaXO\kyw{b:Ip#xgtq[,?k8e)tܙeen**+-p8jbIIJb3q4RRyߚu򫯒ND…{p}p! 鴿#,+q+& BB/(`-Ʊ%%&r-7 /|鐙ǦŢ/l0S^⸕BzLkr?5wWa9X*Mguy}E'~+gWAQ!.e+VORRZBXϴ{a֓Oydu";;_}Nl6R6dw{?_{ -?ԤLrr&Nҋo-rW\#n.99넇QXXđ#żQqp84mWwŶ}-E_]]i߀imyZfBLL4CfȈJJK$SG۵#88@tΡCf&fFCE֐ */vQL&PGhգA'C`@ M j4D~}  '$$b4V٣Y#ItvTUUa49 BCINv:c TѡC ՀZ&%9NKpP0}߉kqq$%%t:HJL":nJbw88`l۾_3glvdwD(  B{}Nv&S&9\C EQޭ+Att4UU֍Ntñcǰ$''Vg")1ѳ-°;z.bbbb~)o4@=GXTUWaHK#;!<,^=zY*EEy.QS[CMM-=w#;;ݺQS[N#S'9?6D2Ө(i\2hv2ù~[,*̌ <\. @zZg]TNzZ:tlVqs _I86HĚsnY&22f񘑖ޤ9NBOu9݌-~@#"؏cCӱ)Kq&tԯRңu:~}GbBguЁBC %..D&$$_GTT~~dӨLh FzZ9Y7'̌t@ERR":Cf))Jԑee^(2"kr!O=at&>~,efd\dwϟ17g7v٣Mq;~3L, D/pȖDQzr umG<|乤( wnvZqqqr_fF23NirdЯ$}foL򧑛{C=74~j>$6ՎpXm&_-DZc A-`O(uٌF9 Q;BVKRuůrnT _k|B!D"_!hC$ !m$~! /B!B6DBцHB!IB!DjWV^FYQ$$$Zi!B4Uf38> !$ZK4|Nm[ILHlBтV9/+/Cr9sFM\1tG'μ4Kzo/p /5BP~>yʪ*^~V]wO<4&Nƞ{W<<u~tu> |fN:}DAaS.Ol rC{T)dsѦ>_=5>[(J}1ޒv{ ğOl6+NGhcǏlyݧ{ާ 9k/իY|%\py|29Byy9ϜOQϚAgϾ}̞1x.6rtڅ;wOII)OB|fLBZj*ϿO aC0mDO+9ӧ7O=>}ElLg]$&&0m$rp~ڶ|ɓ:gg{ڟ8a3L&-5?lඛo'PQYFrb&Mdp8̘: +_M&-|)0A:ggO? ,Z @bbS&> dLl7 !>˜F'bw8Pk48N>ŸĹGTCA02cM MZ;Q!20Q/BՐCX.PZmiR+Vh2Q_q״yy8NfNœgyOjj '՗^?svN1,ʻ?TFmٸ9g߾߽EkvP%# B5MQ( ׬ѺNP(rYBQ^ɐg)׭k;u//!00FTVC}.=8qvE͞iQT]fZf [m;ݨ 6&ë/IDATN(nŻ~WOyg{|$PSR5ilKPk4xnn]Dϫ7Zl6oPz(MןF]7zj5+ǬDŽ0W+$Fry8^r'IQA.%"NCHT*H a)4r&;N Ə[QPJ3ciܟ cF"-5y}l*jZܿGޭdۭt5yO"ύ+]r}9ZVak6m"?e<5{~Ͽ3NeŪUR6Lb41 RU]MEe%A$mL1Z^p=M'5%]v#xr3|be:"#"52{Sd]n**+=뢱_˔ѩci!88ŵînqY|ذq3gͦn 67)p8jb1NxݺvK;8OJr2;O< Z ;Y3.AAaXm-_:r_}?nōJbԘK/u"\"ǝ=۠ dx \FQ3sݾrкԍR٥lJ{IJJKhKlL4o|jbp7PTtYOaϻu㦐 XbVYވo%% ­rd2QYQǏӱ*E+S͟?_1bixޟo^g^8w&fFpvWkxWiͩM܌汆h44 4OV߃'sۍf9!łN=?ZCoB4fۧu֣Wi.6uc`'SVV{cM 5ϊ`6=Ͽ"5%h޽iŭ}Z՟Vv荓D${ ._T:vǎqx f7'1Zl003n=6^S`ՒSI&w j+W3ʺ';j߷;((t>!熲2RSjϞԖw {x\NV5~!}ƓkcjqVĥjqݒB֤Rt^$ !87]JBs˲u1MG*TB =mveGO:ϑbl6iiW⯬d}ݿ¢"E9-m IB! X6L6;GN'Gx>--e݆^[LTYUljnbf<;Y?mi13Bllܼf3;tEa=SUU@Ii GX-DFDRQQAc'r9 I DFD8KjuqO۷hZtБ2jjj؉ 7MEUWZM BQ^Q[Sǎm'B( jTB()-p22  8(4 ** ^OFznCiՎ@Ug>IOMtbZHO (0cմAyEMh5ZRSIIJo$#=IBqNh>yp8h4zHKIZGǢќ2raZp:]*F#6 QՄL>cj澈;uUk͊餸Z~~~ Olt ~~&e AQ 0}+7 !8ųaF6cn6nLrb m+[wlcl6ٌZ&((O۶Ozjǎf|]$VFH9O"r Y@~ڶM/L~AQAAFV+jEQmOXhI Zc0iM~aDc'#5ӁZ&%)BNF)j2` <,qUj(=ZJFwT}`` i$߸V}LqTTU8B+;կHJHl~`@ Y;y@ދ&#PSW|iUVՑ &ebcb=M&&ɩ~!mN"?#B__ZQr["_!9Ax6PNVrh4r_!Ĺ!<,¢Pzz".IxX$~!VKpPVLF%8(+8($~!EQ0}} rgU\r_!hC$ !m$~! /B!B6䤉rq1nOfyB!-~oc4R7ly~w<^bҽk^5nd2jm/VYKxXs7M_S^^NV Sj1ym+N!h1o߹ o 8_o2yl||4|vr[,)fX,V<\wt$~EQp:g!7nd6%3 cݿ?{Epppus8t:4j5I|FZZω%_/EבөF|wkҳGw۶aؾs'~|h߯ԉ=7~b]t!WS\\ǟ[ؾc_-]=t:VYHJLd?ǟr(zԔ|\|{˾&NF+Y'q#F#?meؐ!wPUUEAa!\6j X7l߹@XZNd՚5,v:?hv -%77ldtŽc"!^} bb9~'~={KN6-}b43{jÜٳ!|ԙٽ;:drťr%pab  }%PwF@9QNtFJrW\v)y&mggub@~_oz3 \L HJLr𸇘2>S2uG3{~3 z;vb'2xIIN:B!NIo 5Kٽ;Di  c8-?xl]⍌'"OVǎطÒKD{T,c'ƫj>do֛[51!Z>byM߷׬_B3ګb}BQ͟?_˛-p8Ph4{<̘2jEV7Aۭ`A!Ӊ(|Mw:^m3͆`83g1 rdB!u':dz(ԔOjoJ@I83Zm2g)I?NYy9ZLP`B7}WX5W\zE`Xٺm;5B!~ߔ{ DEErCtB!A[B!D"_!hCPwB!m?$ۜxIENDB`selinux-python-3.0/sepolicy/sepolicy/help/booleans_toggled.txt000066400000000000000000000004661356774067000250650ustar00rootroot00000000000000You are viewing the booleans page for the application domain. Toggle the button to turn on or off the boolean. This will not happen immediately. All changes on the application screen are bundled up into a single transaction. You need to select the update button to apply all of your changes to the system. selinux-python-3.0/sepolicy/sepolicy/help/file_equiv.png000066400000000000000000001401051356774067000236460ustar00rootroot00000000000000PNG  IHDRah>gAMA a cHRMz&u0`:pQ<bKGDIDATxw|UϝK7 vꮺmkY "`QPzzT{ϫ!W @Çd̝;g;s߹瞃˛`0 pr8݁LKKKPPPJJ B%%%vt*2н"i|FUUP@ N#,,˻A UU~b kdpd 9{OPCp'nw@@~!14K4`f@PU(hGߊwJUUUUij[=O'ZhciBpj|3 Ƙ0&hyhq=*:EQDI#GYq{<,,ˊ±챃oc|?c !cF$͵ x<<2k+{(Jz$UǩC[Jk Cp }0 EQ NSUU>u@>vӇf%Y^oaHzsyݖm//Xh0.wFr{=wߖ۱k_z:ULѴ(8Ai(aQt*ƒ$ŋOi w]ulTBaYnc/>PRV^Ux<#^ Ed2-zW?#dg66ӒfhVE$eeIeY!8B,ˊ(:c,M:cAwPUancXF: ع@/62Be_qN'ƍ?_ǨЊZp\>OA) IyEQ Qb/7[ƖVںήnAeYaY&&*pU5EQ!*wߖ//]nOahn^34.:JU8TZNS0FG#*fjI쎯~\bϕu)#?2, YZ;:maBngf8.!&}_Q$AC3Ҡ4pRtCs˻.kBo}MD7p;?:sY Z FL=;}>$kBcYi.9\b/YIϾ^NK=i oڸp䱣>o歏uձ(9n]¢y̩oX wu ð cWyuܡQyU_Dh/{o Ïw?]z cE)jk::n vTճ,CSwkU7wv~<ƦEe.5=51? GGE''z!x u|n#rnϱO8 ^⢣x[o_yehXV"Dz wu\qhTTuuMM<oy1emwuCSsW̟=ԇ?o4MNg7zgAv;`1Cggu;~VV#?ӏw}q#rۺ}ۮQ#䂻yqw-ܼcO6/h޴~llnmbG+8 r1CU1EQF^V`(RUgn?9|cqeUK Xw>hMk./"(Jd4VUbL!ı 0,tvwW4abU;&CK3RYvolimhjv{<6ZZnFA:n9}l4Κ4p y'F lJe^Y cDYRTL!D!Xj6&wXTx:mnmolDfhe]nOfjҤ1#QTEIאblvzgђ[ t)B0671#>Z@wp>1F;~_|nҔĄnGrӓzA?#cf ƪAG0#Ǎ}탏&c|tO6UVc/-X:gDQchw8wh+>mH|֮ s\vzx10W_0g_|}԰! h8YQȡY04òbN)|4/4Ct@-16 Iq1'Ox ::c##.=cՆ]ó3zb5$ȲxM׏q,`)gh͛G!I!V0 MB۠t:AUc8ӢE(<"bLQDz 04(I:XV$Q9~(x/ź d2EQBB@Sl4>[Vn;0Sۃèwt&#Zm7 MKd4|?u!-mm.д"_>c8a\n7YVDQ컞cvM"|gYQBAUUǣſŪi 51cLSHUUi:y(=)=rgiB0ֺ-2POݬuRe '˲^}{"D`F,+v˪J} /xˍ[0+cLf.;5rof173MQT% "|4/EE/4u ,;$ z2 a9C>/zSft=€ptOӴ=!@2_yBHE% i޶7!I""ޙ LLJ ȊX e٦榮0B0Ha(2fXeMF@ ݱhAa@KpO@8 UUeN7 ~e'| -:MFSOѴ(t:cmQQUM[[_y('>o&f;G(,I2EQ=)sgAgGGpPȱ|83L@!t:Uć<cLӴfZ6.9)OM:%:**`'EQ^|M[$I޶=?""[n2,2U?5XTl0a(Y]SgO%Yz v#>> ,*^Je9/˧O/WV^~K/aOK>p^8^lL7WWgqFAy<%^v𧨈ygy<`{PuiIر{ׯ+ytY,Mu՜Nw<ۊ$K'{쑿f2u:EQx<|qIiP`(_WXG)&mڼEZ,10 ah^7"7ࡢϿfعkwIi)1l..)C~VEQzܜI55+*?(|eBYxnmY/>ѠF 7y^ U{r{C; p04-(:S q:PVjww%ŒiS'"hn&BZjJvV5kSS vi0SUՙӧy/osKkUUۺ-%97fԨÇggfn۪M!wtMȈ-7gvxhhZjjQqOchBAOΞ9}ĉF!3-%%Sgh/PxVkbB,E;4mϞ}7^wm{GdžwZj`74q ϫ[acrO9oksskFzl 8)!1&* cu)F!ovǫɉI[͞m~Z5%9ࠠX{=)!a ޳'$8xƴiulqgpf֊ta0Ƣ$4M;]NIɲm<c0lMueTb㴌"Yi5ez[ssB(wFѧ}:~@@IzahӥiAdae68#?j#x<d2t'L||7}ȣ!`n)@Z(*ֳqY%=j$E910B0&Qx9/$n2*DG BHUAԶX")g`d`̬9xB,˵5 tY>VAUUzkɠUVx:o=zf) eM 7LViEU@Ee}G0`p,_Y\\w3r}qwDS]aPJ|/MQ--Sh(r:fYEy~wl6+ =ϱciQUUKe2USyx|0Z8I:teYN'K0$=j'Agfo pG&$K#rsnjp9\\[Wo1 #I04MK}(jdG+.Ə۰ig7l#cD>gn,I)cRnq\EQ1DzU ?pl?斂]nzA9׶)B{5 >?dY͞}Ἱ,WC P%2 Ujݽw'N,-+=s[,IMIBɲ G{oqS'Or:zqeVګLLH^ZM˲,IYpWDDk Y/~8™HffQ֧x.LfS}}CsK /ϽҾBYu|m]EQ4M˲|ݎ#(?(vO4}x4w䔠҆6iGǡ3UEYE^H"chy>$2"?/8g ڲ-GUUu[[;0 Pޡey)xSɊRZVއutuO>lnh4=á(8kh()-;\QAӴ~㦝w_~ő!Uie%I:\Qq(aO>p]w&%&>SME9\Z2kB vk4s t:Ѹ9/orsRb"@ay+QWj~hJTL&ATBR@ $I"+6+I7BHUԔ۶3fhXO>ozb/M͏??ݖcӖ-?,ˢ  ~XSVFzWW3u;9|^[ص{Ok[fwFaQ ?r ZJJ˦O(Ay:A=w yh--e#_zyƴiO?9u'8N2@TP#I[NnljʤL<)3==c%Kss-ˊ*L HZxBL9~^eŵťG3>™G{ޒ$)!I7EQN˾Z?>\v0 }粲2wշznMQQ[n+)-@~AAfFNӼnۺ^[fK}C_}7=_7m]t{(mv8ӦL:$n;[ocǮ۸i[V xxBPw=8(HQT!RDxxmO2*.)mmmC!YYlohhlj0"BֿƎ%˒AoP8N/JlFew8 =M}W`@B($$DoCO'E!UQ?2&ݸ?OMeCTUs<,k^^DqάY zh4XdtՊ(+2"𰎎iS&]?<˯Ərl,p5^tѰC0DGEEFD hXXE48EQzn7 riiMa0$+BCBo4"7iY,4qBGGNj?L|>AHOn7 Aە`¡ii~Շz/S pݼǃx(IQBm/?~+ٷnOqEl?9wYAӇ ߻{A 0$8.ƘiI> ǾλFGE=ysf746z<@(rk555}gZjjMMmHp\ֻ &OݭqcI,mGGGm2CBB'|Ot04# eYxxqWW *jnn8V͙;ﶴݷ?;3!x232g_x1>>fĉƎY(b7}11џx<<(!hÆ sݵuQQ"NWHHI{틋:T\\RV6$;_UdxIŘeQ+.wHϧ6m944bݦ-(P񡨈 R (f=VШ}--dffD7tvu%765[]S[QU*IR]}`G"|6:*Ri6(0oa(JCt:]Ww]FCTdht9]fp7$'666ٷb /*) S!+*BBSReYY-KEUU|llcSኊӦmڒٲyuQgoYvyChQx#8M&̧m`0t:NqB8I]UU(9R!r-]>oZȁV`Aёъ*:h)jX33XQ}L?DzCey8Au:k|)*I^i-eNyLF#(˅1iZ4/I<<ϲ`PTȲl08SYDYQ0zlj-Au(A`eY|w& .ǣn9+2Bnk_`m(x(YE]r5%2#pwj$I~m=b(-ӋQA;]^0Yx;chixx^p\ZS!EQ)Җ hBtIz.9EQ hF_"MQ (g;z' ~0YgREIQ38A{=cnױ2Z@_wgo 6ggwkǞ~j}KSu]w)]K 6~F04E+Z /B$豃d~O(8&,!t:V\asV@>a@O PP`Qd,Տ8-1@x=qd4?k*VTb A>vfhMM4Ms2ț@dPt߉=UQijn$^`@8?ЂkkkIα6>G 5K팇M_/E sUUy7 MӾ`| tWb(-n¯K1njnohd:!.bhhY#xza}"!3#nNIN=l6GGńE`s2lpphzz^ m~~~qɩmmmYY u$%4e46%p:Z-ˈ#eYiiiB9TU%1!>adm~VlEBCÌFS||<(*.6^+5К& qWWMZQ<%]}j^oHƭ{C6O;}|j^*!f٫I Q1>*> }Uh'zJ~}{gUeӵf9@HwFN#=XU~9P7_[ARo}]n߅%|O@ tou?9|kU-a9bB-mmnAxIJUe/zdL!($ AvLzVEvƪ : sމ !2 K#TzWgѿU*ڄ}]hFSB|?UDpM|JcK!.Q"Cd G&Td풞Lg7G_ueaef vHJtXmwaa\rE1mA*vzl!2D+f (Uol'sg.dYgdxQe  c(I~P$cK !2DRFV)-(ؽNkYmUDPZ`-%71k@hd#t42'N/1@SȢZt|;'$C!1dGGb0R1V~~VlFQ1!]"se( Fуd8UoYĖ5 :;p - jQǓ d)*F(p 8 mNi|ݫ_m8xKy$/&LW.A)g`σ;"2D ( ?Z%8>P0( F@R9Pkڿ#G7$YkFPφWFz|(zꪑz$ a'Տ^ηW]W(o#ہ.i*7/oZU06aUͣFǻ @/k2d<+/;@1XEȯpth *uE{DU-ɡ[&= B Șb#ccNER(cEIEUQ cQƲBv$"8U H-Z/cAV-zz|Y E eYEU{{i'EUR$c^3*pXӥPZg0xDDD*XfOYG]<_UR$,XRG’%*v GRE[lp7"΄1lzbQ LGQ՞DB X- +lf]x#GnQ$18cЄ;c|ۣ;=NR" )!Hjj~B+1@F'Y:F A)&ݝW m 41]ߒ]=*c}_;7ִ;7xq?jgǴt2z$_8Ԇ|Q&P¡6Avt9ZŴ0ÖrǗc,dQNAI!@U&gFZ})~i._}Y}0iy0}Y3Y~c-(~]`}\7'@{LH5oZ׵\7:+<׎3+u4hRqgJU`ъf ,oS㞐W.إFsye^1܂-R,{nm)wH _߾u _~btj:P+B tJ~W[Ǡ69ŝ& )c1Tu1/FXCW6qq]ծ1 U/jg~Udk; Ani"l\)\7:BQVTYO7wW (jgGCU֬r139B-j`K[Z۸F-m sbLW+sԴ .;ʨgYO]1?ܹQjl(v|kJeJeՁClc6#㑔6NI-U>XSaǤt9fI QQ"Y0?]UmEMH(o~y` 7ִƝifYsSbI;매YVуP$)0p XJNdR :rC8#䕆neC^jq.A yI mlvaocPVP'ŽI0j8A[TfP'ʎ35٥@ީ!]n]%ڽM#0A~ڢYXv# gH@u'tagb%®=='/rtagRfdZ%geZԸDv+] ] 1(p42)GB3" N^m쒺JR91FCvK<1"b(i.IaƉfbaߜ0Mu+ۄHqF+99!vّY ?mV . P,W:= ,e`Qa(d324vVp0qnqO?8F6#CA1.zӼW\VIHx?pmN%7֨QmX.v{.nԸcu=ԱIvv2ƘvTVK h8B(χNӭX tQ#Νrcvå=Jy14PL +*^}gE,%366#sЎvM4p#JW[ɉ5MpjSR.zDSjqI.&p?q SPS uunFc,۝repȀCz[,lumN%vO]Pq[Q&EO;y)ONtU496\&6P0$ +MHC{v\!zDKUVT[nwc_<ۭT)pJЦy p鸫yR;&PQ SxDU10(F.AgU`LLSF.AUTLQ`.Akr⅛[QCF)m)cܢjQITd(Ct'c8ҳ]h88JQ+L:%ZYOK u,]ECq U z*d8J *Q#mm ^TU QV+ekM!;&?]bQ":ҳHKPgWez#,( yDլ܂;xUQ1@)*`sU8~pz#}p a@Ђu4 $;]1TS,zXaU=K8b0rBb@UŊ ݒ_oQBB7;)z 0 do;&Fˀb0( c(EhKO۝204Rٌ6t jf!W :?MQG4l(#  !YV=%1!$+bmW WTLSHń*)%m5,0rehc`A  m.X 4,bvBS C!?#0ã6xܲYO4E!EŲ ,M4H 6)SQ~TE!lSGat R1uGX*܏rg|bb+M!IQi iZE=%g)jd:<="CdFnAM Շ[ib3/dmLIO#,Mif=  QL:ZRQGk#S=0V060M#FД9LIO"sdL:87LElCq U.lputJ-iaz t\NլH.PJ{zd22 Ɛ%zb{_+J 95-T]We>2%53 )Gdbu MNZ'y_W171qt"s:d\ihwʻ]:渵%n)$1(,T *Br4%h\*#+=휤3u3,#*s>^"sZe8ʸ]eW1$9YR@ E#oMpV uEsbaAL?@ :'AG?I!=sWo(@8Gwtt"1 E#Q !ǔk!UTRޮ.;|8<,,(0Pe}"}! !EQbv1M~˃@ }M?_/m~kklw, /0 C9RUwڵ?oNIIȑ#!k8)v.b_Q$@(K/4%9`0hcҽM4&)1ҲMyy**ڹ{{9yݺؘQsƍ~Vko5 ,^rEۿ?00`_^zE-_###[[[ (TT|а]{voޒoZOGS BRAƸƦfhtdmmm}oش15%%$$h4~l?KzҲ,ZqSUu}VQqI~Ag>Gkvc0qxyۺ--5d2#ήBo/xV8SeYT\ww{}զ͛Y?tW_h4[-kY⫯vo/XѢOuz}}})QEQϿ< "3Q')p823/斖ꚚK..4 ˾:0 `ڔaaW^~+*+v{WWWqII[[˲mm) IMS(?po 뛚M&B0wӦ=?[b9???R\--{uMMiib9}5W^u:˕ g&(bI"p9:G>{$ۣf!Qx z<0V%YYh ?wk/͊|Ti۳22\nfk;:kjcikkOh?>1FhnniiO?Į{ QVeq utt(O O!Z@Qsf˱1@B3N/ORبH 2 7]EQ_V]gZ-NɄt܍]K ez}7~Ͻ V>== (QU5,4t҄ Fk[q}qcnj+˲6f_immiڧa'N:%+#c~n=88X+!zڧ{鹳gi<%Z/,%g^W^1 uZ0.۠{clA8!tǏѣFΛ=ۛ򨀢nkOrAq r ЗvS(@8|sgCGiLz'$]=d6@iǶ N'Dz hi}DQ' jzk@}ʜ!)T@ yׯm= O|{Ȼql@QHsu>_Ĝ։S(@8|kY Ss;pNpV0o@  LBl.@ :'Aǯ~?_7gySW(0of2^D졟Q /Ei֭IID,xsϾ}cGdI< Bdd#~'_n[+2=0Eq0 4 .k#Gp:])/>l|\\ǎ%Z%g JwttqG!ITUEA]38Ѧpxx,;ӧ.Yoc4h:UpV+gM1kK&/\^Qq @|`brJMI~ KWy[~>˲aaڰqVh@ %'22F5Y,f sUhzSޖ̌J_x 6&p;HIJZ/y zAXwvvyм46o6dHKk낅/`apPPvV>iҋ/2b}{**+ժƎMҷ3FQ?(9bx.v8/<{OWVW{<}|O >]$1!~ƴͫ`n Aعkwm]M7\?fԨvay)IF ޿V>R'gǻ\.ch4RҪ$;5%óO=)⚟qCůơ7~_cGQ5zx VWW?qqxpf_3$8aͶeV$U-tϾ}99&M|/jizÆEq}MW]~Ѽ=^EEEF>|şmشym6u!!ZݻoqV!g^_YgΔeyӖ<jVכLƉSêU ]|@ݞںԔӋf_Yg} Kbcbc=gsࠠӦvww2OI&Kp EI8̐o b=0QUEopJ u4oa1(JSQUԳכ~,| =AA@ ,d86%=}Sgy۝@oz@  dI b aAL?@ :'AG?_QY tE=@w@ ~DdAesW5kWT@ϠV=h#\於m#k!TUpos~Y~vN%s^!$G~z0Ei˸4|cKʖ~Dmw!D4: Gfowr{<˾tW_ N%smEo2*CVUxݵ KJ2K?$I˟ѢOKJ2nE-))->%9F ?v3M=G>h;z/pN㓯c۶mxnNKkkeU#~8oę3 +~eBa{!n߭,PXhXRb^ =jQq9Ԕo$'Q#Fm{>B(--asӭuث(6@ ~0]]]<765{O##eEnkkUf ~[AUUWkyEN|ۖ@QG ldc#ýۚV.$YX6`gFF:qj4M{3kZآģ2Q)I/;;9VQP ܥj^@U Eı,\8o6,v=aU T@8weAa4gēC iȂR@tO b aя&9O^Q9G?OaF;+@8蝯JJ[Z@emܪ ]ڟCOy/,˲@ggWZSWQMMMh*Ӵlwt8x+6mܳU8= ;_?Ͼo- EQtZym4M!S۳iʉt6UTgW'qдwI7~/Z ˲&^M Mk 3W)hٻj),_ŽҲҸؚ{VU׸ܮАo@}⻠~ҚޱuuuGq###gXh漭[~7N39)U?mٺ>-5eٗ_[[[xx֭iھcGIiYrRRggW nnneÆ⒒@ɴxҘheY">.eY@ 'skޛ6 VWL0>hxY]BXÇ}%H p?:#`0m_OnN&?s4DȈ a""h替[N EEFF;x}CdkS3O;\Q1t4k挏-NJHHMNv\aa%evM{]r1.Ӧ@hH%]d ִtἹ&i̙ LF!^wrtuu|m^Ae=VQX}CCKkkСjw¯EEU0MYY]АPv7[fDz&x*AY752""2"{!vj 8ThRU @8,בZ~ O?~֌3[{lz8f">wz*'e?.c5Tjzӷ@.@8eO`e4C>>+ )9oQjc؁3@ ~o&X@8 ~d@tcKOHkO؇>{NGNkp^cZ#M W<>FLgᜣm,k4aAN@HQ-vKgj9=(IK}2L{kmۛP)x---%4ɮ'LEe(^O[?k},()+斖bi/o}о 'S`ǟв뉉`j^Pò, kkkߵgwTddfFFsKK}CCkk[VfFdD ;s y+(.)ikkoW|ggϜa4 **rΝ55)SWW?oA9/ňEE]]],˥t۷WTV  MWV=㺺}U\l̔I5}w5zHUt:'MأhZ`1Q`׮nqc[ZgfDG@ ƌ(K/''&pݵ)'HP~(ٙ@0wovٳhg.YEZj!ClZW0};l/(ݖpŸ1c>˨H'o8`QqƍiZ>Y8%)酗^ZW8pࠢ/4gE?+-+7UU3gLvwiUUW>|?n՚5vco[9//o붡CL.?wN],x?"<?bYvɲϳ2mٲUU"#7Ɋu-OWX cjzH 8R-_x`֌_|MJrCww|r=aܸ?=`nNۧM:n̘k =rCqq_Əp]} pࡉlj4bx7\7}ԛo FA!$BIYYxxue"&`aں'캫 x訨'ۜns>\sn]sgzDD~$IRsK#A3{7ߴ~ƹsf=p=g|k~Yw=w?l6[yEc.?ƴi }Ux$Z  LJۓoҠ@ceY@Iv;AT*󼢨( Ʀ&ۓrxA XUTEz}eUտ!7''?@$A ssrl~^nq{JJX8(^][Wp8OP``~Πe].$TZVI ct8nmZS԰!Cx{9H֬IKM3fTW=߭\zMCc^?wNcSӪk>㸘^VS[B!aP FCxXت֤$˲A0/$$8>.+ `9!waged$&?K!6`XϽbSs}wݩ}a.$+3c?~ o=U3ӷ| %,4[o][?v,C3W\vr&fMJr˲0'@8蕯HINNKM٢$Q1 ]nݷߦ4K'20[nO?^mW3}< 8c-lCGUdԎ:Neu:,ZԐv]EQ0eEgM'c$Ii( ˲ڟtq6$@ ߐ k #~ۅ2hY0nvO3c`>o1Skdǘk{S8o&BeY5o~9"XI^vڟ"}~9CǓ쳿OOZ1k'?}Yί \lLGOlφAp_?sR&LUTeppR)878.aAL?@ :NAA+@ U_:!cHtWQX϶JK *%g~FO>}+cYB= t'yA WuYixJg%Q)@8TU]p8::,f˲t4M!p:###GQUVEde\n7VUԜgٺr 765Qe4f3p:fp$% A|Zjnݴ)S;-/J{Ge_L0d2 BMckim۰iѣxAQsϾ}˿[9$;ްq*11_}흷˖v%Ktvvs ;;;?kUJ )dk޳w)J DQ7f?f0KJaO`ٻwDniE-NR@qI} KWQ{O{>tǟ.nimѽ=[|J@ &z~y:-(Zjny[546546j-h;u8Ҷ}PUUKYseZEQwYZҞkֺܮ]{8.M^VoUU>pȲL?@8}uh|7nޜew8а0Qqdx0_~li'7Lw|u֬8|`&_~CZ[۞z?UzZ v #G~hE\\x`HHDK(;\>z~̚9s?޻9<_ϿѢO뻻Ι=s{9wD ro=rdJrb  LJHhmm;gNnΰشN-?t))B#G4a9cQ"#[[bcc mpn5'7W9"9) c=eĄysfMOKHO۳w_m]] iΞ1#+3C<>..;+fs8 IIq11ƌ sTKa9qm^=^?I/,˒,>LU~yvORQ(bOE_%Z"ȉZҥ 3[oк_kawVQZ`yWQ{fD|uݸo](M^x5GPuk@ 0}ƶcwj}=<ޏ__G(WcY{sb@ * ~@tO ~Lrm1TN+Kz5MR{cPUUKzf@8;/_o /o9~ChN"*sNc= hۍ3I?mXYUxhQ*j;5ᮮ~I۩(9)ڶ7&6;:w8Vv޳{^eY;zUU6U\;zbx{H|]t'[nݰiֶZ-7Y`Uu5= PTիJ-۳Wս4}yyeu@8/{ jg( Q)mB4Mk;/~XMӀMS2%o?9Ek?iڻ+m n|' 3hN)MU|/ n7W4( 7>)>7]}d}+/lhl\d$ƵTO*߻h7N}}5kw [m=}@ ׿}ǎDeKMFGSuW@׬rFGFs4MoݖbYo񆵿6uJb|em6>[$Ix⥟oܴlljZt`h xȈ{̟;wά>[PUl1A?wv~AWuo9<'+.e;{Td'\k*=5ﵷ'%%aw숎>Z徻ڳww?o=e^<$+˷ EQwHNJB}[n~Z,ss~qSsW]eks 7F9b5mzēOo9.6v[ؘ?YT\R2k ^_W_W8xh\yŧ-9T\2{ a/Yw;nuQ fS&OlOFzÇFx}'O۶wyg !,o-y[䴴\~ ov_XX]]]VVCnشXQښ#?n+w:? ~\:,$^w^ue``k!/gfdȊ+Ji˖noX'n3eҤ;nBa;v9M7%&ݷ`箯]~E}t}kj7l,*.yᇀ 55O?#M&7$+[n.-+_˺c κKkjk_}㍙ӧGEFw}***7gXk[[~A˯/(bckj v`ؘܸ 6bVVdX{HO?o[Guϖ-R]v-E˖]})IIi)=jǟ.>X\ {/%&$|"Xo;\O?+.oimuݲ@GW(cFtɒ ?8E$&@8镯OgfVU544$)11,40lߑ1fȠ(^o6~Zo2Lvy1F]ue:NU]ߟڹk֏=K. #G ^PPTT3) chz!99;w=sFqIfLCdUW IM7\o1mՕj2"##hJNJ2iRqii]F15%a?5""|K許G;nw8Q#G :d}~wv2ɉy?tqVfƐ жYǎ/nedDĝߪS4m4Eg=\Qzϖ ܼYC"#YK.ILonis!!IMdQ}C{\ߋWQ'3y255ׄkW_|A߻.=80l~qLLwۛͭP^{͇w]wСn2( `h jF7=,,L۠i/ܹ{hvO +^E Kˊ+jWz A;ofbcb|5Y۶=%%Yku|5b*6*HUE= ?n?WUȮ0VQeZOmG}ʲ`遉"M OFx2S|뽜G Pgitk1 c6Lϐ"d,izp,䴌L`yPlDdbE>G!@$+0UpO~ӊ Wz{s ~f䎾YO,- 91~Ӎ؎o @8;|B $쇞A77[CŊ*"˲&'̀&:}Qz㛧hg74$X?4IDATI= UUeZ}ГߗmUAUe凫kjv;?\Qv >h~meEѢ[PQQYN_ӯ>>ߵiZ[:wx퍷 ~}gh-~옆iS&߸q=ӧNv]sՕٙ?dޜ9i)VTTܜ{^q٥W.--;TT4zH~z܅g|Y1S}æM9Æ74=Ҳe_~ V޹kw~!gw{M0oO<%%;~\yg+.-KKKy>H! / ڷx|䤤WڸisLL/ /,+9C燇 klld ?vܽ{Ͽ455ߣ1Mm!pHv ޫޖn䤤>Lppp၃-]>Y N- Xz{?[+ .XPәL 6eL&Y`_Q5jĈƦW^o8r;wʫC irE%;_|嵡C` z-?48ǟ~Z䤤g^xA/?sY}oǏ ?ؘ^|I6@8cKL$JҨ#ϝg@d8ݤLp8 Ο;W~~~Ο{;wFF'͝=[̸ kim+*.nniimkP%5%yi9Ceff^rхFaBywM8.0 @QF v-btTTVFƺv;g̈ߵ{(aqƍKMIۺn/8xZZ[-qcϝ?uǵo.'( L652"b=0rb1?p`Iṹ >>aOK}PS[[~b LOMy{^yWnDaM5m5Fx<^|Iv+.%eƌq:]ڡI2̾BIbS>'Frt*yIdlfѼ(;?Xm(Ykjj[Z[N u9<,EԔ햐q3{tl?v܆MaUU﾿PVb18.<P7,FUoy7v^(օ7_)X=uv.:|}M@ts(} oYO;}ҕUB8/"b~l*b;wbѽ?fT1֟k/BW3}f`2m\~q\tmyR/vgz;\ps/CkC_!8^# JoN"d/n`&:`FW?iw804=1P@79Jðpi fx>='4ƽ^Jm2z[N=li_v*puuuN |>_sKK_bkt#?>:恢1)O+|?D}gy/({k }G?'zq+{zB'JdY*9yaSUUnmCc*(*ں}{KKKR;,-FCKINX, ߮\}N<odggi'-,mllAqi6P;vꏃ@s6mu7 |6Ys߫?uQ2/"# _~z}9|OV0CS6uڔ =v '_򁪪~y/v!ChƲ55&1᠎,v: Zf*MMMbKN-z~IT_w N@ΒWL>{K>P}!g'=1nXW(mp%IzbztT!]xC;"H?H?H?%Hra LG>U_ D]R3$f9]OJm\g YKzPnX4]%w9BHUUmKz;r^p9^MmݑG"EQd|>q]]bIEq\UUՊ=~p!iljEa!ee'KK !--E Jۍ@UW{޾~d6PE۸iӈS-ZO#’> <)1w!f[WW|xXWQYR>ǁ}b_?/@7t0444̜1!;WOȲ5ӧgex<#nB(uȐwa1=JVĄЋy!/_ۡ믽6<"c<";5wF8Pɉ x:뿘Cط=^e^&ݶV0,%4cm{h~0mP԰өk,gڎ~Mg4 ಢO ͪ2 sKZ{HsQ5i_ Q$uADoT=5ң _q;Տ1|۞D1kCCBwfa:'`pe>qdHJ_v+,Z̲\hHB?m8neitx՚>۷s8rsUk#$%&\pqCM[m>~??_933?SwM7Y>yTyyAYÇB?p`ɲo%I9cƌkY7E x{?:jؾcҲd򫯩:{֬S'O>QRr#G"RSa-ɐQ5:{O5x[tҵkϞQ#G8] PUuicNjgz`Z]JrҖmFfgD0ƪ}_,^Ï7l'f3yhv AEmege!UMCmim _rtQwyt*Mm#fPcܘ1}L=}iG]S)u斲S'N|F!dXEI;7zMFclLLTddSSSiiٔI\nbnjn&Ίc׮@зWn۱l6+f$ԩ)&nA@m6afhp:-,_|͛+*+9zᢊʪB!e 3lim :L9FcxXG\yUQPh4|^hhhtTW =aّG{O'6P ^z>.=r䐔ؘSL>narRS{]%%)922bҥcFb6mܤjP޻lcnj8ndvV¢ãF2it=M299)`7u`evԻQҨbSOSeAt~4ܹw-j_..d:Ƕ.7.rzsOl6ZB!mQ{}ԣaUUQ,F+Z,ގ70,?"1;4`fs龎ET瞞`KBݼSuB)TXߘCm'?eYǵ n^zng-q^}KoŠ6Ke0.5Ԫl2QE`6 w#R ijnX600P X4My>2"٤gŞBoћN5}Lzu\rcJ\FN1{򹈁궧=Dj7I  5U՝uOvJj"#5uO>ߖQKka;w cB{;YVVW_y0;vjc\ZVjBCD{Ͼ}s IIx;Pg)xp!466vI$K ]˲<h#>6Pg)>_~BXݗ88㸯Yxaj9" *n튕.;no7zuBUՋ.z7i,]"0㏯n="#~?O9BDED3zݏB`0//#fdvgzo{5w]%+W},꾧eyyESSqWl!8(b6>rcrrnOUu5ӧ)0fjjjBIJ9N+((-[R}}W^A>r?5";88s;wYL as nu:U-)9w, 7v,[m/(,Dm'{tx}>E۞~:~llF'm萬!!$oݾ=)1q.Y f2oR,-+=xPSsӃߟ8xP\O7Ս7.:*r-&N2vj\Fzz#!d49BydCAG\lo=p=wޑ0hаԔf^ZIjG1~.g N\fg/_k8QR|muRwINj__ 4M;v(0:|pxcj#M# yEgYV/01Wݫ?^^,!>o)3@Ӈȁ궧}@:GRngϜa.j߶Q;fۭ?Pvwt~߯{ "w00(oi0—>j\[Oq?dؗ-j0?^Ae~&"f0W*--ayclLFr{T=Ϸ>l,=ahWC&i;cUUkk#ۦ l!|>˲vd4@=BEˆO!,tK~ Gd04U-Aa}M4(5mOihliȁe^4^:WXS5D鹧퓶! (0hҖzI#cZO=moѤR } v9Ow lۄMh(=G@OGwwkV:!~uۢ^J jCgvm"Xm0JQ4(ҧՄ٬bZ}>(!"#J8nKVA&ԃBF#B #,ɲnG=N !giv i&: =V ! ~M5McպaƼٳ!eɲocGEeO͟Q$nGOb6h>DZR7Lujeں)'3f|l8qg0EGpgyQ1F_|!, ]:a@j*;TXTd6Ҫkj>3I >s|]}deE].5M#&fTW,w߯9QRr[[[+*lv{6l6osǭDILxQ.Ѓ&M`6cb?v݌k/>q"6&GfFYb}VnmMO<(DZ_~PQkM0~'mх;t҈tUvێVeȐ}9|>qe65=-qcg|> bSI,fڜ9+Vu=<-[>u/vʊʊiS&r1s՘1} ۳w'Oֆ|^9BHӴSU4M斖`j-_z=3gXúL&p ,z 7cƼ6mHJҜsN_``A4!|>_^~O5644755=ln9+s# l2kd70 xƎ/''::jpBjUՎBC\_hm6(FeYl2L}'&\5l2557koi0j2֮cYM˧O}ѠࠦfHyEeFz sɲ/oAu<|pPUfn߹qyUXzʤII6,+3sL4MS-0Ir9].cBWUUege566:}f۾c$qqn{DV+ yS[T IκްА܂|l r8,xvAAa!Fsf{UcTTVFFF^Y""":%0 dY6M eE><,4T VeQuu7$%eȑ,yi''$ij RT14$j NH M,?vhӕ4sƵAAC**6rDVLtL\lLlLLB d+Xotߩ-MӌCTT 7ClV[B|cYH@0y'|=r$IC#u M**֭[333%I_qA Y=0ncqht\VMU=^,veUU!e%I*>Y:$US5rx)0f0 cTUu\tal2p{^A^|g?nfm[,lVxDQDњ5Ms\!xTMlh4NSQƱ(IϬ``>}mw0TJDcd6Вt{mcc)ڶ-@RTQaUUowN wUK1 UV5uH۶|dYG[y]fzZ[_0 F{YrDA0,+< p0Pkk  pDZqF4]s_! 9vtۮynni QA A` dEnlj4 ]=&4M%\US%J͊UW__rbinn.)=@9rHAQQ]CXVSeYQA&O 9V|\SRVijn?#ZZ[E|%n8T[W[rP~+N~nh%6x/=Uv(?j}$*:zH2LM]*:rTEU[Wj^A~yں:eϲ1RU]r.+vz}'++0Ƈs <QQ lljlhlxvWTu x<r%YNOVvv<Ԙ7nDYƦ"Gt!;ì[ub --n'F#ˆ BDU1Ftʯj$`YjhOɒcsbH??drW!UMj$ͭ-0*{p84M+,*fFYa,c5MQ5UDFy]1Ʋ,;{^jEe]EIJL7xqqx֭$AfDzًHo/,e11~h7$ɲl/v&eYY4A0n d4J/!`0#Dg ƒ,svy\,g'u1r{,R1/+0r.疭[:M !ЈǚdEfY.BA@{F4BF4I?X,NҡI=F4ʲjGw?(46Άӻ0V%:*!$.@mڮ鷟%Й>5tJ$>s7UU}gEuhP#~03 zm6i.R%幋RQ'a (RGK2C  55uu=0:YZq\OM1Vb9@:C1Q1_`1[zEBd6W^zm*!ܢk߶y8@8h\= X#sikѷEt\hw. $(VeIEQZ^90rݠ*oE!,s^4`:$EO@uמqqaa,ӬǚF+!!,H$˲lyO@5kVDD`ܽ>a(I m6, V?"}99o>IJbc4M 4cI~S A0`4f)q\`@hEb6 Q1F&?pࡆʬ!!Fd4jB^uuu! lϋh2-fbed2٭V|-w\5nh4[,vb1 ;} ,tM UUݹ{ϣy %  ݽgoppPhH_|_hҍ[644̸jB׋[f^x~ڴ:(p8r>-i`g4ʵY?QEٶc;pPͿl6?_{!Q?0zȖ 7Y_vɲ/tWc'`K9ozѷ}vy{.qrsWAA㑣G_}}!dي֬ݽg/2 7}pQpP0ǎoڲu-xÏ**+._s O?TK8?:K?`;o1|Pnm7ߜkސQ#F<(.ndvVRbkjn/hq644҈68!;=Ѓ6nTګym׿~'O0b1 7_QSʲܼkqc(RVVV8'3:-5?:";!}> UE%8[[]nj^t577[zuI[b[Z[B!!vj0TUz}$=D1Vu CKK%wK:/,˖\]{0Myqæo1 /Y~}Tdu^88Xq}OnBUZZ6iℓ!!?>nX9xpᒥ[n3=b8n'ɩ f4Q~qa1W>|h``@vfW ٻ?m~XWZV6qx|~a}9;9rؐ䤆ƫƍmhhPd%-uhiY#ZZZ\1~55f9=-->.n޽k`QC&SFFz^AAС'_bվʪM  ҇.vl6>eywv}U3.8c6QNeY6 JWQu!%lkE:2_8;=sE+#wp!4L.ix$Iة3l۳<]mK%nBOuܪFA*E4{3Ml\˂s0- cS55(g46r~^xI0 t6s>DW[+?xs7=파M/hN4`&lMXEKcds9&p iڂs#D!% LLֶuwζ874BcC4c& S*C4ĢNLimjãce$I"v02"L.c1 XePdFW/!SwkZ@<65^qL,> ihjs1,de!3Y|,bB-.TkmI{K3OebD[s3׬7|:pYl };֯e۞<ȃ48>s)JtGyonY $ecǙ+&}"aN_{w?|)0ea&KzWa+.FiΎ "]wp)'QE{f?prwq393W{)? 6KFKc#]vuxxVŲ,-elr_M|~V,^tEQUpEW{+~N?Wbkϋ,˸]. n}A7OMu+97< <5˗rQ90!|'hknGܱn [֭&z7M49v,Go4M/0 {hjh`qo?_ Iã`Y,D =Ɓc',Ksdž_0]h|ctMYr9sadB>_`۞46 |jkETp;"cCsg `'D_w'o}t&eY}>6ZKUxܘO=pa˅$ "ڟ^$IBQ gΝgrz2)mAM*P,xf)>v=_ 4He.ff\}dMN8i {z~7p]ls nj$zДʛl}Wx4D躎$IrqnhOAC,aL*eMCQTE`AWHȶ88nHBpI>1O=t?H(eK8!pXfRiݱt6{dAgS3Iey駘IogxIomwwv20, q*,lmaEq4cV5zy{pown!/q@ c~TsK.,[P\ECU]Z8XŻ;1LdtaU !Z.U;7˲W3 韛?K b l=W 'q\'^W{snkWَKuڔHC+>8qppeYt4vy 5cNs988sςbKVmB̀,m@mp3q+NB㰷b888<(SS<}3Í0 b,/otr$$>?~4tv=nA*BO" S.d3qK ס`̃C=J67K$qV7 !da-\DSc5_7#^yOMO1xa1.X*lx,NKs S(֎,7oz˲" F\.^s]88\ IH]yJ@Ew}~MX,>t[ pE/\7`gN z7}zD]OL ntr>^ʺ%_x;$ ,;͒$!/F\&D-OU7 i:i[Td庶oemEɭ0HU/"Ʈ5MLӼi@keeFyB7 \\>c{4m$3;t*u"@O5PofTa} r8Gn24bEuUŅeJ%Ri}w0p+Buv"zLu4ۓV `5 IH~ga֧Q .*Yׅ@`5,I Dڞ$I$ΓZE$]",&y'\7ȊeF~ D&3X3)|^r>.; !Hg2ܵ˖rMG'%VhkmSu ITL&K[kM+t:U_ !m 5I44\ 119?#&X`v'ja3 x( Ke mFزi#0084W YiYIѧ}bt_ != _3gػ?m-cŲe8=sahnV.cc 1D܅3; D7Lfh .Ja "31Le{B!G/oy/ I5?UVw~>L.Ô5SG[os1Efbb'N\Tkn&&&9¬k/\`rjUWxx}Dž!~_P(.QJ?8s?]7f?~q2R^Vx ,#2, 188H2DACۃ,E[QKɲ\S2OŇ۷"I'N?IG$g?']Rv\և,w'Nd}ԷB'={pT[bly/r111_~``޺r9p#$eIEӲ1JiLܶ4M\}se<|{﹛iLoMXDVBm;>\*FyȕV.;~6N|]FFGiomeAO/򗄂A&hii ϳ㣝 Ɲwlm#ɰxB^?Ç B<ЃM!;vW~'e8x湧G{ؚh, d2*Gٱ#4Mcu,YǎTU垻"Iű'ضcc׿ftt~=ܶz+~k{{[Iuۅ(FxenPUX,KqӸTH,2dY;]T4v[oIwg'dO `s!}>p?>Wq]w28xG*wcl|Oqܵbܲ`brKX@H?#=MӤnLdjzgzѱ1b=݌166NKKK{wn?WɱyIpT%b2~oOq(Ad:9CgxxA:;W^eמyO~s2 HR  ^}5,bAOkV{x>z߾ӧٹklmĩS]#GpJ2˖.AoɂE üx0 4M(q4RGG{;fkz/]eO05Vƙ8y_%l˖;oʻfk[m2DIY) kڎq_߼({0 "0kVgtlL6Gss6l`M\j$108H{{;kVwAs)=F.C$]tvv"e100+زiK."׻vq.|1FFرsBFmc"?ٟH4\q4wP3 Ύo'sǦlٴ Iػo^7eF$d!333r92,|>S8z|t:룯 0 x<ƃϡ#G8pRikVKET~( 5)XU**@:T*q9R˖.#H\"$sah=E#cLLNphh DC˖.e瞻b]pK008Kذ~-YYxK-B$>wA%օKѹ=)EYH$^\.# xm; Q(f)&&&(J$NX$#KxF斏nN<㡭pM47xB+W,G4Mcێ`?y|?.z,`߁;9z%a{a<}m4MÚ3ϗ^41 Dz.Z ef&akϝ0 <m;oukIUa\.،a$S3;?h+^'ckk+^q\P,eFe**GX$cJٱsRV>p?pQb--lڰ˱'0MeKcY`,[4^& wlٌ!VX,hok#erIYj׭m;X륻 s^qed=wɒEdt|r&.\hL$I&lZAFFGtwhogѢD#:;pܸnfzf;7owƥ:3^/,!${\.355BkL\.G*"ϓ/I~UAQJ,瘚"$ٗe\.`0 Ec1╶tb(NfzfDM|~&hmn!xXl)ݝxV\ASS#m-`xd˖nB(0trr{OUUkTǃ}黷2Eijj4M\ΎvBpMKZ["  zhmma|bx,J81`d2=ޱ}tv\ǻuLfpR=m72<̂^ Cgff)Z[\ɒIK?zڰahlVÔey,WUUN9~C)-F{x>u 4YO2ϩ~{_5a~Il8!,[諸+kgīg;o!lEj<հպSP$+W-  ]<.(@U﷟_qZSrB!4M##+2@Mj_`ե:Jy}4^A*eQ՟g7M jYƬ|(ʬ[ 0`}s͛`jj~Ƹc]$MXWؒBpkWzg,Df Pe=])Es3:q pkR=^kJq_BL@SiڽmZka<psTTC.rr|Ű{r;ٸR5n@ pSKYn/>i]T<S̤fRфO4$h7̫u3R>WR IH5][a${#`÷|"M/eqpD-Pz-#R9 Is-L[;Zp@0ҙ4n8~! oNLV>Zz|nˆrw&$tsJ%E9pUJ#c#98888||n+~˲pݗ.IX?)sOCH0Fd :'KaB{‹%lޞ!m!/]5x44dI$>]9ep(LLUl[!"vL0?߲,4MUU6mX$K/B2|W~4y_Mky8vl=wŪ+jjڳ?OyGimmu3vpP!󵯾HkK .E*BU]Lz{YzI2,DG2iit1lMa 0kWIysC3 .EUoZ&cY C4g֖e{O>LP0(Odxx!mDUUv͙6<}`&DUTT7~Ȳa?cU[uVZy;qppvfmJ !px^ErTjf*šUxIg444} :7lg)VEfy_Pc'FNN<$f?\;Vs5Gut]eY#Gr՞#m}3g[ Ѯ]<ԓ|[؉o0>1v(KXɚUX|O?8ag>hnnL?eGtb˗ɗڄܪ>yK%ʚƖ͛7T x<wϝ#In3f)AX8{+qI5ںzI443Ohh`χi5/Ν8xP0SS!ZIR}> >~vɊBATft"E{09}N@1M3g8yrYg9ؓaeY4X,J.'͒hh NcYHɊ<F,InPq/p 0$F,bbr` b&-Mx<R4Pp(gn7R` @2!'J1::㦭 dO!N  2 ~D#,119v3QiSӤR)z{ٶcnC/eRī?-ݫ>::xi{er*涑U.}QM׷˥ R*ƭ:DwW>pQg-v>ϽǴɕa,$O× TUguDz֍ksܰ^]}b>}WJ5gYiT**Ks8ۋuř}>].{ᚔseYbA᪔Y'@>gHoYL&!wp(~gPrpppV$1 ):\kk;uss?/s&,Y>*;̓wn8@37:_)S9|9ry# A+I>2aw/vTQ(i??EVs 4 ~g Y;88|j8A.T*ttn/b)I*'$.Q%qsƂ<,JNy;88|j8i>aLdjzB壙:gӬokYa>b:pف_uO"mG ߛ[|r,y~!r UUeٱ>enʆDC@m!pF~Oe2Vk׊(_:Qs\Wʆ3rpp\/˶} %a]Z络t=kn WP.mAg]t˲;e͞lj-V?z2`>?e>>Mӑei?XE\YmK(u ej>t+!0L]pUjƛa4MCڻdL„5 Zi ]ǹB`WLIx<;!De/Qw;88|.;i"+YdYfy׈E!z]6hw$L ;Jg]Vax,6 !8~${w^|bYo.rz5'?1>1#{a`p˅a} ix3gY+jL6?%㽼|p8ヌ$I<LOOw6[K&6W1!B>eY_Xl)+-7BR4/ ^.YL}roK^Hʳne;wf a|/~ZB w=Rj=3x$vFz|g8OccwMgW;&&1oDYs};{Mk$%Jy~00 0`^x^]$(i2:6,456( bq$I1  \6KX?|+W 2cXEkK3|grQ I$Q]*i`w؊t{˗! iY\.rV,2:::+ͩt~?X4 {W_>. Y9z8m9zOsV._ٴa=ce4Mvsi^-} zzz4ITUd*ɹs9A"  219I.4M$S3DR<,-MͨUUI&x<[˲!DB!(5. rYTfd,P(J)J>8Ll6G\" Fx<OL099I<' 22:JXl6__[ٸa.EB{8>>NXP(ގﯥ9Lvj~ ,#(aKl)kmmxn,o}s}o}Dr@!SS~rd9Iw7M]Y[aTUaúuλD#|>g _qyt`ݚ5[yLMOŸsf^kڵt&#>X[5eY~9J2m}%aYV%?brrVx~,@i;4_}ӟvhjjxu4jRZa2K/bYT*Ŧ 9qPMz?o$ Zq7~g24<#GIRlX4<n'SO&5ccWIn3OX{|]YxBG-G|IxW"}܍, e˃*Ks$;LMO~={y>~cr|k'ٹsPI~[߬Gw P_ +lWrB_o/'N4MB$l6[ox^{)P\>Owg'?%8z*Fټqņk%!Җm;v 2ݝ]QUEQhiiT.hkm =_WmO2׬Zţ<^lb>,K|/hBYOedڻwppp$̻A\+?.E($xz߽|o?o.=p?\;w1M]p)|y`0HX0ttݠP(tbt|RYrM;~d2Eaڵ|cŊ3<|h$B2dA*Jzn7k;v]d2b(K/Bu]ș]>MP`|>ؼ8HCڵbD>_ӖJIҬ퀠ׅaS3zm &--lٴMzA+gI>+/{ EJiwkhΎw~U,ETEs-]L0PWXtIm3-Q(>"WG ~35=]k~]A$&A{[B>ܾ}%E|}rm3MbDTv xxVz*e=tuvbFeBd[nWg~s.򫿢X,b&a(4˅K%8@!A:! ѮX@ @GL<`ǃnXUP.k`YȲ"?x~wMqfg{2$!UdYyJwU%5VOqvoe Xx_z/ߘ$-7qa~=֭]Fe~P! J2.E4ч;tb;ߦ`(KuG2 GD/Kyϧɓ! 6_3gY|9훼\ CCy</zٳ_zf qԚNA[k+ovmdQdˍ,ɌONi~2 xn B4&5;4Q6V;EQBl;gΰbr. ] 22:Q(=ni4—$ŋAzPU.FGhmiT*({- EV!_*`YVm8}Jyٳw/!}7p`m@*jm@(*hm;v\Zn N9˾(l˄W&Aˮ%b~GGG innb޽/ihsq_ <:|D*fzfo7_g~ز ;U+qQU@ ~$UQFXym;vxsfN:$Inک#yy=݋$ :;;g)V' nv,8VR?ϐ$%[ĩSĢQ:9z8nN>_  WSj U$ʚ*;>9b֒%KfisIgܐ핯e"p8CA0LccchFC(47S*z Egfè…adY"R4BOc"A\fxdx<(Ƅ-)Z[S4t&CgtlK(bl<7#JeDኂc ! BмZ.k 2B|V^3 t:C$4\.G:!i xȲL:X,Fbd2&&&iii\֘vXY҈dp8Z9 X((JxnFF-7,Q,ߏiZ %[HpJX,LhL$$ ]י𑣼<Ӵ?N"@2bxd8$FcrrFb(5H8LC<댍OVPqM ^/D#,leDCCmFQ[̏519i3>i122B:!PcMӘ&PD令R)=w¾^zyd2 !bYaYQKSӲsxtpp}Bpshe[mW"գ^Vi^rlң\&b\w6{+{$x/w| өi_O:1ߒ$0KzmcwoXuю•c.?Ԏ?${Ka{{ on=Gקq<5ۖ|uryz?+?ǚUI&_;…}=xwX `6DẩF_$qy2;|VItUgxEmg.?^;7gXJ\8|vnU֭o? Xys=*ta$6W;ؾh+;۫|t]#Plw-XEOw7=ݳW׾aYxg|6p<ЃI=.CiotfnYMd3N\.Q~OO<% S>J2kj/WקͳK'J~iqe%(_Ev~ nQ9pc4%$S)0%IZ)˲!ppr-ynnt:z&0 uL.eouu$t:8|1 3n}˂i>'>Ke|>_?JLRɋض~r^Cu]#JՌ|><9fdF./sW|ئx+5;:l@0/ 9d"Q,$ ߏQ1a;ʙ( Q(eEYh t;uYg $!2Ms׽44$f&aeLMMoOntY9|A*Y$#+2H6ӽS?X,λozyo;33Ӽl}Ab.*OEek)*49|x˔HRdsY~ћ~qvfs]މv'4=3$hVs3>>F.#H ^/nZ~=eYc&T G8С e;);?H: wYqUܬfctOxٷ/۶H<րgdd]innL055("2ccy | $!hino!P),  CcYhEx+~2F) 444Ū8j'78Ul[Pzz{b5tuuS, ydP, mSSS(BKK+1>>eY455otnP.+,p)@gNјhAYv܎,ɸ=np/(5\n7FN:LLL8֖VJ2GF+ុs䘖yK_.$ĈD"l|/$9}ǎAHF֯[A.#<7Gq4MtvvΜr11>GFy.]Lr\>GYJ"'r1\.eaFoEU5@ c>QsXp2wmYΟ#v>=ʚ=i ׭dY0nCp9B0oYBr B<G[ ]㔊E0#LNMΎ\D"QyGikk'5t:M>ZxGhiiևYfcc]F77tVER E)ʜ8q !I}~R( B!Z[tNlr}yTU}ŋ`¢g~VFGGX;XE.ԩ,_|i5kەu:ѥpUh˒ku x<'266F0$Ҋ hjj&l~\A btW9l$L`rjVhe|>?+W"V|oܰp88?MkK+VUUϟYS^fŋ×[lgO(*GD"rk:hf\n7LMM^x=^&&(vg&@ej{B!4x5Xx<^&&&J% ȲZQUf^TU6XwqL%=3oN%I"ݯznY@CQҙ4rq*x|E T:$$0]#owh8,v{DH#S?̗N" q~>HKk+w}H6rP ]`ddNz{شi Rmx^B ,KDъ 4{&f:洝X4F `Ӧ͔J%Goo,%Qh4:7?մrN`|nfffhkk Xi vIKK+c  `Am5~$-VeV ib&`&aV(bUQqݳ\꺎(s?eEA%dYðC"+fehh~IK]5,lZ.)Jv1 @Ew0t q {n0$> LأThUvQkBt]GwNrٱ,d*I$VYQUuV=7 gvg!߹t]g``i=Z*q\YVu}( yMG5܂e\vݮ }K]/r:/%ʪn Y|mgԷ/SGJ}|cIu̱vYkNpùE_B/[a*V9{tbY-FӱFp!s6l6[W^~v5džUq;5|>_@1Kv3P(EfL +,B@2d@E;ײu?lDW4 W2zdeE4[&[2 isIdNx'g>r 7YzN/{M3|A3_ʋ/= $BV韶U7Ci ESBi Kv1] ] 8Nx' a$]bE@%'&.LsSi0=3hז!̹BN| .^wNx' w;oH%rCGpOaQ0Lvb+}e_fI w;ci wm\I'?dYYҰ, _K뒰,;iȸjq a"jܹZ>e!ô>{5-{z9_/]SMOZK9aZf4uˈi]/} 4Tyֹʑ/gDe:_U)% x(M4 A֨J2g\׽+ɕl{\xbUO!W2YgQӄlnF7. &[4ȔL _cpLlɃ/L@bٲy `s$Xe}JdPҮ=t\l*EWMh|fc,J=Aֹ" uz( 茻 a]κ6e/V*J%ޫeڦ6yH tϤX@+K_O[k+|]aLI3kCA(hNsH&,h*n;wYIBAgrj( ҘH:3HHuS5 -gDq+jfWyYGl*A6ta[J~[~l@p#%Cde-|csJd ]~. UJ&1ϭۏaTN'y~]_=sC㛛<<, 痬VnUw)5 Y<<[Dz W}uMyzu*ͺ-T% s2>B^ 4Z, YfYn7ڣ._IJ@ϯVkeRуfiu)onOٰID|rma÷6 yJ.j}ЬKjٸd;=WOw%X% ܪ>/U<,D$ܼ~^U̺rRwsxvydt]/ڗie]~ TN5gվnL b> Ӳz=t F"ͶiWrq|pM&Inв0ACCFRO|2sGl aͣ) &U0T n*^UPE ayd,/@ԯ?KȌg49 Vr LYX 5Fe]#K&Z#.xbUθpټ %îedYCrmu 6yeRpz+SS[ ˲h(4OfH ,^.nTNg,w- -a70cכ;*u{2LtbYuT^Vy ><%S46I NypisS%Jܽ0DF#_6/KôVU%^dQScE>:C7-<aV*<"Llg K[g1_H,1/ yd\bI xTZdKsS%f+֟{zOX)04g Ǧ?D#l^[S)bZԕ83Qbmʅ2KblY˚%S{N|3l_(&$I477ؘ_$pV.YXnԳk"D}23yT!SYseʺE[ą"2%dp̲V/w/ rg_JIx~]ֈv1= <"L"rrHd`aۏm_1 {wKE]54' O(&e"Wm+|ܻ([( I`Y-jE83Qx\@qsKB|e] ~X!Q٪[G,(j= .B*/nqM!'WE芻.pԤsAd2Ҙt\lܻ(*Ý( =<6c+—ղ,Z*+Z$39Ze[B[ ye6h ,lr03y]fE%d{D\fXdC3- miPlͬ=UEbN wؼdF箾 z׭4_F̤j_ .Ru\J_z$ [-|Ql\2S%5yn\fX.30Uf߹<{&4{s&K[<.+\ 7LC@, x@lѠ7ƣan7ʰl e?3i5IUZ*nEB4[l%A^;b2Iۼϱ\IB"鈹82T.Үi~g_읩3 8BDFM=ӴG]<&B{EkD%sI Nh1UYYHJc:sBL0-n*Q6,vgi tݳ;z++l 08Uf&cSe&a‰"mns(&SeFSvz%frBHB ផGΒn$?3G5g4vgi>:e"/?G7-8ǭH<*mq4mO>iʂU> GSFlywgXë Όm Nh 8e& &˄2 ݼq$?nb$UbHγY^=ۓ](\>E 3EK w茻h D|2>4o`%@3k=;Q[s|FC3oMt&OmɪLꭻ] aLwG"Wȕ ˳\U5&2:+j=X&9S8獣) Yz a/<{n^R[m|V Sh״Uq]Nz,l1DFc23֐$xTӄVYի,jD2;gY_Oͻ3<2[xd"! $lEEMnnвW˜FH%a/ʺhZ#[2>nXJiDHA;|= ϶|Q%y!39I[n+dQL\(& ͔eV՟P695VDjJT,Ur|X#fKtD7-s:$ !DEˡJ'$a$k!DSHe",?G-4êu/qj_1h2H >:E3,>B*ᤆ, zn.hd Kp+%ĉ"!L-T7ntb2eFg'JQҬD0[|t&KI7)hs89T.2\ɋ@pjna k0:>͞703g&oKgE` osfDd>aZ5t'Aprt@`oIfoK3M ɼёbeAr+ nyc%Jىi F vާsV}Lt^(e?Yb,y"`FeAg&J+f"OX 3k_U%О=2^u2Vh卑p|pEZ*-^<[Hr*re" ~c+* Jo<;lqq\k@%K>PW1+骕,omsbYx ٟW5qϯ?Rmjq:XPY9+j},{fk\׉[B\ caQXmAIKU .6k57W~$ ˓->8AMު˸wX̓F-mQ{?9leyRm}$B?/1%Iv= [q-3OLf3[#*矶O2/VOW/yߗ?:.WuWVYeReõȕdsHܓ&E٩JD?XU&♧)A6ho:3"4_>.d-ZK}^X/Ls5`Ϝ.ͰWմϽo9{y*0xP2YKjq:T;xÚݑVWQ^ϵUo:lYsœ .<3?_ڄxM2mwfz+IipseIM]]]ipLfQߪQYϱyegaKҞyw}9\=Z)f/.ݘjjGym_7=xTڎac99x*52%ݢ>fK仫 fq^H|n8Qb\TmԟzOo s3OgŲ Ri I<ݛ'z-+f2>@%:P^iy-3*C7 ӂL8/0|V^CϫJ !:2uiwppgmo|i)1MᥪR@bڰtۓI׍>DܯGӂ{91Vd2w5zlw<2Q\I*k;}(i3˽H q&+ôE]t^;b*caϜq$ţoxFׇgVce(K=b˂a=I ue~u0E+ËaA*o}3t\l]+^=\=(Updy݀7kgɂ׏XťΈNKk<2* b~I p_#)Zd UWgl ؓ9{r695VACGhɌNmr5yhiKprH-Ç* ~ ~܊ć28U'eI(|cs_LO{~$CK3lӓpʂ&+&},cD]ӵp ξ60e]&{+=Ӥ mPA [ 3-£ xDwOdjGE&K)֮[;0]fE=x2k;W*W]?YXY=QyxYn15غ$H<`Q9Ӟ*l;Ѕ}s;ՃI83a<1T;$]!vS U, Zm]d"wNt5>AvMsfȣ+ 2W82\`w9b~Ntc-x]Y׸_ƥs,9>:Eq7E_ݟĴ Pbz8.?g&J(Ӝ.sjć2$:[l)̜zY_&_.Yy>:EIi+qU:ͅeAk; [R&gwpvLˢX6 3iil&.'mW Gh j ];QͰ(f5颉* fSYRyD+mF3lz"*"pAlb]SŋcF*}n!0) ϯ\\(X,%XY1U6L%fIYV=xNd4-Kb:SL$DDo/=2d .F% P6YW&[2 GTQJ*&<%!=BaSˆIlbYLh\1=JE/G&W6v8tg/ /W]}t*DͰN=y2%vbvTͣK5 `/M/f/nI_f$kW+jMsV@dV'yn=,׏$L"]0lf+T-HRc?wTg_(Vcr%n] I+ϑႽ' ]0%V0M{bR,C2ESȶ>T3{eM1to6, ~Eū쵀_A*q ss4g]wuQ⪆ϓ/t>MRB%_?|ItV/B ~DFg-̀ګM&K925׮'>Tm[Vgg5*M}29Obz(ֈ:z'"氊OxO$6?VjZM۶~z0-LGhdS^7Z۪7*j+qs} 7/βe_ W}nF3qlЬuaנb̥.e;kYu|i.KZ.,Y鲰EUtÚ7 sխJ|mc&7[e|w5Ylȵ0ղ[xɟJ՚hh\S5gp=]ZG,j(!fI Vy ye'KLdtV{ْXZcYM84'[4i,k9F˲V/S%t\ ͔Y9w.G*oC_m^l[k(+2,c[6[,6tyvMDHe,an?!EeV(W\2g:Xap֖/[*/n1xDE5`_5MNfu\Ćn?Ebb!qqΑa a91Mڦ{l;LE #I2n: [)ƎR9fצCTIClrB_]~wKdKC,Hhl I^Xc(YX4۸LcHSY!ƹ2YVqW?5, Z3|mcf銻e n?z %5^񃏦xtyEWl Xx*^n6 +yya}`WM [)j yl#=/K|٤{'25nEͳk(/[JY%T(' 9\<,Xc8ÇGIy~gNM޺>ugQz{"]}dIpv=-ʺE20m-p{`i ɘVMҦõc2K AL*o.*C)LbUptwmdEliʺӫ#O %\?V-͞[-63yh5>zY´mʹ TX#W(jO[칐cl:}PT0a`}y6yMYepNmWj.ʆE`GQp+& f8;Qh9.p/lX=2b4f47{ASY_Hғp P6d:.b~'@#qa;Ӝ({C8)^a}mo@Oe0d^gF8c4ᕚ~9pH@GWyleNRQC2AO\ɶ?8e(jɼagJ&Up˴G]D} J2nZ(!hu)=R4+AOMKX%ň|x:24dy-;1剒}̗^Yj esme^'$ :HJPlj7PȖt6T'DMfঠY5B b/_2*tfZferq1֘ET:.Z*SYZ+ޝ ,ltg0,X!UO;Pӂq>3{/3jnI*5! ξ ( l20YD^z95^d`ֈE3:aG{Edrt@#sW_=0=E#eAƐBhpbH{uv[+ .M0` `RuwȌSQ7//oPltQG/BiZ4 @ׄ`X`AdY.*gtR鋰,OOQ!/F{BJ W<&Ũ`mOvtZ9~ u!%YeXDCt XŨAgPlY.ED>SLG TDP0D"! `YO:0!%R Z4rrP8O!>NёK%wR @hV)%~i.D]CQDJ($Ht@! uK|W??"L s3~Knh8=`T^}Y/FaUge3fK fzFUyJ$wD#ɤGˏ B̟Wco䲨RgA8TG7?N'G%Q>G""7I( {5!:%)PD{j<Z"=o&v}dˍ^̄u߿AخWVwڝ|?2&p 7:~$!pWyL>f6O;~&E''դLsVX`R)e7VBCW3q51^LN/sKΰ쩳3ht/RH3p7O}:zn07M&+^N%C&$5No9j"hebz1^LH?  ybMGȎW"ʒh>j&H52 @J;A-j??A* Ӌbz1^L2,OvEnhckR <4ďL r E>4_+|rOn- |ɇ D[Vp>D#@0xG8;!Dp:YmH$+׋f}χ'߰|'\tZM4:6o~,sA}v>z/c+pIZڙSXx vg~Gvv&066Nnn/G̹s$&$b6پs~ݶ\x.P_{Ťt(+C"055Em}=oRFA&}`sⷿ{+uu\&-%Ą|>::;X,Hk{^^|;Nss Jwmt*819ɡ#GHJJŌT*e;IOKyWHNJl2}V+qf3a_D8l61>1A$%&P(>4s. /QQQN#eDػ?/ٹg/Μl2^ywh>R[W`0s/PW_ORR"w9 PNu( `$Ncl| #ǎR[M"+35V imkjd"*+ʩ\Ǐ8m¤ʟSQ^3dvV^/FW_l2a2POw:صw֬&%%VK͕ZV.[L&vZq8 d‘0jj5a<c+&L&GfJ Pm.RRѪ5l۱L}j FVdF\.7v ..RB`tt>el6s%%QTXm6&&'@TR)qtrV6[^ׇE155EwO/>^wlѱ1>:ֶv_̌ /Z!;;̌Lf!Pճ?_MILd2!J?~kL#6-B(py]xhimja2cj&jjy& Q)LLNttn'&0اa0Zxh4GH$~ttu t 044LO_/zѨ@ 룣#m `inmejh0PS[G$!%9/r;XUŮ=}}Y/jj(/Ok[;vh4r,rᅬN6+U/cyͷ|$''j23308H_?wkjOM+j5|;¥K ϣ?3$'%!ʐ]ݘ&;:?1]\FT>0^8&Vr(ϣt<~gHLH =-5W!HH  @TI0f"-%LFzZu ( N>V%''{6ݨ*O\\.GTN{a|`yvfb.\ͪ$p:yH$ا{좯SgϒhDz{p84008c<G\?<< l&11za~~#׬as/+V˯pƍ8u ߾ok>FTVTp\g_?Ϝ$8{z(/O9q4CC{^z5TJ6lD=ʋkXt֟><_{IΞ?CC|ɯo%))qERIJ˙29"錍 zO~ ΙsKmGFYXYLcUp'[^ZRTXъT)%lV._SO׿{wHKK<>#{"PVZ_a6/sZڨEV399I͕ZV,_NQa!o>$ TPTXWx.:").*`0(+UU(Jzz8"f ˗-eNQѴ 9dr6owMBV+j˗3}[Y<#ϟ\.7ZTC"snN>|tѩGޒܵqCLx^HT( FFGiF*d4ր?,OV+H͛6rihj"#=VGVf&s琑L*% r0LΙ4YA "_׬\I|\A x<Vw}}(JJVٴa=PUJ?8{wKZj*?xihlbrry%sMutvt0v+XJIZZ֭c}ZF@ǖ614Mǯ~}'o_>5U+. Δ+)fΝ7GnN6u,Y$ؼikW+Wt19=VRn/T*eEדgUj~r2=p? TƯ VRuSGT"Iinm:]d2z=Z1g)m;wRݛ7388/~6[6^F($R):!GFXdfdp.";v&8}N/"7)lXĄ^z}lߵU+V9cfa!HlH$,~?#(Jl6-m<d2)'&0 j~ߐŋIOKCѼ`@סh񐔔p:(U* .fsl}i)drFFG$'%a4l8].RSٹg/|rSe`n7?ůܜ<@ gyh4>d2V J;{>4OF  b $&$hpݸ\.,f *Ut)) tntZ-VH$BRb"V\n8fiHl2|L&Lhd( J%^\>E bvӤnL&#~:!jB!Jq8NTdrfSlÚ=1( lTT*& ݛM&SjшsFrZ BnGRq8ttv?SX;(ˈX%6Kc1 Z9Kd2r] #O˜<}O鴱|r(YV'o3hٌi## FF1V?OtEߣN% ]{,ktr0 ם604ég˟u'D\|bBkjHMN!=w\-{ׁ4tZZ[IOK'>>g1FÜ9u .Bە:D7|~['zӖB~W*!~ A^}fmٿ 28azl9A.`?\>3gϱAXp||~?7CDjgdtF"7]shEDnNv}?x{۶|ccc܅8~u{ȼnmru:s]{24ObU5{]&99LN9B`]c] M^n.oæ J[oa1yj4Nǣ?^cC rK/F*"xLF2S019ɉ@"!33Ą BJFz:%sp\t/{sY;;cuNf* TjJc0xt$S6Ʉ^l>nvy!"\z_3g7BTҜ<}I||<崶q13gGm}=X] r9٤$tbZm570@wwV k里ÉT*%5%153rsA"!%% *j8Yk)))QZRs>#Hpttt084L?2 Vݛb`h+|~;:b1^gڵ7>kZ_ܜ*+*HNJB232ʦtkEjx )/ǦDL-´:D"r.\^ή.JKINJ؉7LL&#+3.P GOo/ΜԙRF#@DFߌD„/ZnY:{W02:\.GRB]}}#-4]VPx$cfff,fnCtb8p-O<pL&>1 ‚HIN޾>(*,tCjj*e)3޾>j5YYbqqhHIIATPTXH'>>˗111AcSPXDд.*( 0d>MZMJJ2gϝY|jFadd\2ҹ\saVZIb!+3B-.b1MRR##TW_fQZRɦ޾>XP^G"8J/ZF$hǑ!7'ZCBB> '; ֬Z^opys4 j̝Kww7.9EE,ZX^|hmmC*2o^ MM+^b2%7'"kjhmU+WDU.]REKkF!)4+Ntɤqy YjU3J$np#D"! `YE}""$׺j#S@7B0Ą6Ft#^zUO=uݔD> l 8].~_rAHdVk8I>kuY9/ +/t^uetm׾Vfv8>;^"w'.Ԉ|\ۉ)o6?]k$1m44։?Lch={$/7› u7+Ru<}7Jsm^3ׇN%?/) /r=|*MII+=J8bG}G!~+Ox( >m?B|w| gt;Kv ׸Wi"#~;D0dxd6^y\ٻ߳o c |5E(bddJWWwl.P8L(t 044;v项aSS  p\l6&س;:wFohl.=vWSS[G @P0>1PK#GO;z 2199+/Afn7bbrۍgphw&IFo2.-r\vDZOMf9NNJ'"YF'"rpa0Xl)m\T*O?f^~3ȤRQ(Dظ~ o084fC2sr_=Bo_?,ILLNrϖ-T._" %im"yy#33:Ν_HOֆROizD ֲjŊXyx>[Zr&.UUs/%'+/ԄT*a[LMMټUUa~' ĄJ%HTJqQ }~R):\] @(PTF&# rQTjdrEhxIHG:m،Fcjj LD*AӢjQx<^¡eNH儦J-&|>q II.̊exoZZXl * ǃ\. " EDnp8L::;J$!&3:^yիسw?oG,[ "-\q\.JsPTǯá#G#1hHLwe=~$ht9Axa%C7jTJ%/Gl6 ˑ{dB+ׇ\&CMKMaaU2+U1hji+p8L9drr99=q'ORYQN_?oصwol3``l}]^yuƑʤQ$H"3:6CV2HOwߣkP[[/[Zٰn,vEE~::;)/+C{%_iW7;_D6a{Ш)*`00<299h4zpdfd`4 99Z펆p"5%I4BfFFl;>1AKk+zHrr2drq]184 Z$edd8 c1L?''ǔN;%9p8L52W"b!م}j2|tu`6HOKchh޾>,\;x< 2Ӱl F2ӐXV:H$bXYXP餿TbbrD` <‹x<Ah2iW9f}_DDc ~G\.?}RGD􈈈ސdwwKQa(""(y>0""hEDDDaED>/5]DDDDDKhEDDDDDD_DDDDDKhEDDDDDD*n7--7+ xDxO[#b7ǟxsssiu7}dמ$hf B(|`:rg>s<@8m+bAFn.rq.^띥 x^Ξ?8qon}\AjJ2cێ\%9) 3pmN?Hm}=IIQ6^\1aN:͞}GRqiP(wDFI}c#@ Z0P(C?yހN[>"iwJߏ>*_DcS3$7'JuGD::;ys9zֶ6Fq7Z] 逑Q{z0 =p3gb1[w9>_,3gڬH$H$™hjnn5| Zf͌`,D"р&z ^g$3T.XJ@ m^gǮ(JsYB0 ړOR{ _Soh7S2f}$Է!~L^w;wT*e|b bu=ff|X`VОH$w8122Bo_?< A_{=C0#Gcjj*&:z9r8}|n7Aj? p8ڙP(DOo/O0/oFH$Bx/6p +uuttv_j\WrNg_x3D"؟P(DqμrʕZ?AA~>F>) #d|TD"Anw,p8v_Ͽ \Wop87ۡ..^Uw}}sWj(;KƔAܹ,`מXm6N'O>8Ne, O=8R6oKU>z\#=H(b߁\&=-oT]3dR,3Ͽ2 XQD\.iz;:oh@#`4xgvHMMnc(*,ֱs0 g|{{H%l޴H$BQa!nYYn|>?)Fw"_s رkc$'%ЃfNoNqY"s72D hZr[{<:(-)C1x{rV100gyGyG1ttuRGÆ޳ͯ?MFz:i4&7M--457!Jٶs'.!6nX^޴l}]v;D"!!>>cg'e'"n. :-R E8捭o#ݲY4_pVXMٵ{_:;`9~E*' ++Ȋp8xH$>/nۆ\ %%wmcxdΐ+j|p"\RU5WjCCyY2jk͌VkXsx1̨T*n^]H]CxȑY"J?9El۱HzZ-cE$%&rR58j"$hAj5-t^ ^ۍbjAzzN))dddDCyz QTXH|%("IugD"TJ%7m[_[&S#I Bd2뢞|Pܳe3/)lߵ \nweefb2hԤ*NCQJgbrKo~wel|,~nq1}vJey:dR)f F궦LOJf:4 9JdRSQ匎F( .Yºkʤ z,39YY,( ?NGR2Q(Tg˦drQ*lXd4̟@ yylXU+V0pφk(/cpx`0HfFwm@vV) t,^6n )1 䤕E]8 Ė fRMdgQ:$Q`4jHNNh0dB8p0餥"JH B{G'SS9E7,bt:- '#=Ԕd9( 0::FJr -.fj% "DgOgP># rQc˺tґʤ4>L$'#?/\rsr)P8LUeN>0cJ;վT דhdAygΝ'#=V'1!.r zdggQ_@oW$%98W^{9EE5p8LRR"sj4dg]‚9˯bNQ ),bEVr1L$ǓMbBWjkILH@,ˑd SH^^.z5WRWǷuR)99j!JX,A<O3bs Ξ?OrR},^XIA^YYNC"ζwݤ ﯽ#j5T_d\lvYYY,4[ZmdgGzZG?AN:׿U‘0: w=E"Y#8KV+m+yuκnp$B8"2F,dێ njO%yђW /m.j\ABkְrrzw(+2? 6odl/O$?D„BQnXXx1;w¥K _aZd~Ŷ;nt*Yd2g>R)yyL&vA& \$^ukVcc[zZPή.23jD 2?j=̠P(XhaZ(/^7ޤK 8v;wwV=311IwO׮m>Eޗ'A{qQQT2ٽw2%s1SSr[niV4 DB|3{̭GGn{y6mpM9"""$|뛬[S361AWW7?.6;sZ⩯H$GQ3kwC&}a҈<Ȉ_DDDD䣑Jhg7?~"[E/"""""%B4""aRo弳axdN ~Oߏ"έ VQ^;]=.qp8~?G@4""fokogll;bכ[[yͭ7mnϾ"}9grbpIm`` j c? o}ή-Wcs3̳ϱ;5j&&'ٱkWpIyuKm}=g8W^Wjy7bE8Vt>/;`={}.0 044D&S_8fDBSs ͭJgg!n:3 nrV+ HR;:hmoGT>-gϟg^Ԕ\ TBCc}} zT*76b0Lz::Ie hlna6b+.VU Ry7p LZ'oK0$lG_? @Cc#uuT_aQ傘[lA1 $mx<&cct֎GTozYx1)))CSK V+J d29==Jzbjʁf ӁR൷¥K$$cqdefbim<^+/+\FTCm]=}h4jyjYl3:6hBTΪ D*]tZ-5  Jh룡)ĩ3g  G"FFGXf]?>=P͞ m 9t(mm RR/IH$9{nZp8dgeqQ8t(2j<^I Hbx^RSS;y±'LLN޶L9\xy%%c/UQW߀NKNJeK9|ϝchhreppKfFiB;y^N9l_x͍"ohlJ]=:}*FFFp)$R Y\Zm8yܜlΞ?' ]]Zi o\D"_b||." PS[}D"?xt.VUgrҊL.;ܽ'P(M&~_oy~r9s -Vaמ$''o16>~Cy?91%===D"l¥K45P؈Zj5y&.\ĄuҒYn#}9*dfo088%-5|R1W-Cm}===~RD"aGHO煗_Nv%?n|ayEDj-]¼y%|_bVyчYՄCa\n+̝SdbjE*27ofӆ N ?J{f֯]D*o}뱎tXp8Lcs3Q2 y0D"$ NOBVta232_gd2QXP``IM4NGNu# +7ARb"PE l{a-YLaaO>eJ'?Y8tKyW"3#HаΜa%|kVSU}ďܽy3ǎvSYQ-LFPyXd ֭#si.^- fEAh4j}anJ#>.@ frATGFR p"f屘ͱwPU}TrrA mړVb 7NvV99$'#Wijnn@4պH$RZ-p z D"QEE him7_s)꾼sœsD/"rr|^Vp(DT*iu'BwOoIIYD"Hv;.koTnmH$H,*d-~1w35sRHOgݚ{%bGWxЭ.q1rj4 ILH瞟e@"N!r H$LZmx}a"hdOLtb/g=ZۍfcjElIR 9!rUYBN@ dc>53ETp8GJRSSqk&ցV9yT*SS<olV\rRP(jtocJ ^RG~o[i?V5cZjJ4.C$  x,YGƂO|LD/"r֨y7q8!IJLd54py&&&th4!J1T.X@˜8uz_X~Y E̓Nl6y&"'O}櫙rLbBRcOpƍ sYOMk>.UWLUf3p+uF&l߹vrsb~:Ctl2V_:qڍ\&cAE{ pis[زy^$REgd27mpI.YLo}FyAb2M&*}4fZ&>.{Eoo?/ihjDP'Oo PTMJbԌb6ڱ{BD baՊX,揔g˖"JFFc4ȌFsK+q$omexd$z{$99j?7Rt.r {oIITTNpHJL$++C㔖`Z_)C'"1 2jd2Y,E l6hM z\4v! 8N %J@0V VZ-&1T|SH8Áh0r0 Y^'&Bz S~X!ZAP qN3 B!.Zy)ﻗĄDt:- ` h4h8693@ rRt|jǃRA Ch\.V~w=,_1贸V]n76 ^FFRM%Aj!\.sg=׋nj+!ihZ@8fl|&*o,lkS,P(xLZ錽_x]N띥#nb6t:Q*UjO+ٰnD>'~+/*Ro>#\TŤJWw7?HM}p!;xW)qqv|^$WTQ1( 6_4]>SVc}! O&?пW23CDDDDDDD_DDDDDKhED CpFFFpA}Cm-=jqٙ9~AΞ?]ݷhV)"e@4""w ^}[ s#b7Nvr5P5W8s܇>{ u {|._©3gK3]{qr9޻޾>.\a?s[[!"e@'"r pankV}!|qLF#f3<**ٱsnT2338},r{l!##3sEj5s^]{nj‘0Ϟc%޷P(%7'JGgVbb˗FGj4<ЃhZ'&G*Fصg/`y!._&>.^ϑcihl$';FGCc#>0Jr1dݚ5=~ѱ1 Z|Bɾ@GIIIv5#~ȱ㴶L^^.)ɬZěo餼l>{離UUFRSysۘ&<^/nNwO/eʕ\@0ȥjNSSSTUWcY\s2 UUw/8trsrxwvSV6BD"!Z˗ sذ~='N7ڊlζflV+w|F^} 4 Y/-e~/ZHOO/5Wj륶^ 8M֮^Б#lٴT,3eeH$7fnq1՗k`0d"r9#hZHiu,^LJSs,RDT*C&zl~)>55tvvͼZ 1 ByY)eҦ埏dD*GIhAQuᆦf0tuD= &3 呙3g΢rYynGF-ded`0Fc$$ij|R LNGg׬<].y%sILH,[qZZې/e…X6/giW1Oq/"rD"^/ *d9wBI0x^r9tatlńB!0lز.֯]CNvS{JB"RU]+5up82'DyyqY;:J瓚yHJL  ?`0ı'DD@("7K ݄([l&?/t6]܃VAq6rsijiԙ4&"rG=N|In.VWc2g]defj%/7rlvlXy<, iwt244LB|<[,446!JWRBa~~4›\hTܹ)*BRQXXT*h0LIԌhl>˗-rD d2h V!+3x"y%9=-q8}܍b!';a{zdg8: e74 GE.#f``rs)+-EՒh ?xhjnaj%=-bdhpB"9)ED"(/g@vvj5=D",|.D"6Beo jED>3oϻY<Cdg#>W P:͛6~∈2~o#Y4ZO[j "ED4""""l/"!QR}b|∻EDDDDDD_DDDDDKhEDDDDDD_DDDDDKhEDDDDDDܖV|lIY3;[!FwOu: m7TDf4AΞ?-144imkcjj:߸] y~F"nZ445Ajx\ 122a2˸ݞ~obUՇa;sF2>1 7صa~=~_oIȗK՗yŗRU5#c7L755l8w_{;f# nN͕?0cʫ )g?1v-K/sR_]g%6펕ɵC!B~_\[&7ˎ]ٽwyòI"'N} 8q ###k}}^sM-j8r8T. 997nf319ɦ¥Kj6_R'Of`h)._,]QHOERb"˗-cdtNGXl   , 8"SS,^i~Z-O<(zt6/_&11U+s ^{-g23c'N†uk1(LD'Nr222imkի@Uu5|?AvV9ٜ>{Ą,f3Ob] pϖ-\.?N[{;J|Rd2>;wq%&''YjؽȊeK)7oW@D EP1<:ʂr6;mAm]=twpQ|~?K-vx,$??/y|bs/t?o#Xf/ZHWw7MTqAyY%%'NpB9sH$,_NCS#6l!ڸ1crsn7K瑛|~)ٜ9{`0墢)t1:>ƺիRW0 Tp:8h|woG8Nlk!صg/>RQV6ZV敔0id\.j).*ˉZfՊt:/Fa~>K/B&],3#?xLFSHuM jukVI;վܲB76bRN=ST˯w -~/%sG&ߏ#-5W^drr`rwc N:EY|;rKs6[#Gx)*`0008+׹5|$&$CvV欨g""ߨ`5~^~5ϛǩ3g CZTJ%f RD]:z&gΒD"!ގLMMa0x7s/D~~> Qc(9">{֮Z {/O|~)*2V!%%Ka~>ȤR4 * لL&%"D3+λ:B{XB!l\Az8z=`br7~8B'yO[j."aݶ=SީD"a}dg HJLweú1<.&&&bz]˝j__Tn p8)/7`ttRnG.1)˗q9 9=p+\>IvS]SCD݋jHTT*%G"1!gP$VQ-+V,GRJSs =8>1~QxWnjΝ@wO/wPTm;?0_g۾J}colz([&Q\TDGg'zAφu8y GO<( ~z: G3_ZH$ƦrGΠ O?aAE7~|7.Rxce-kxo?q{dgeRU+W_V(7\Ώ~Ff47~4Y̌ ](.@Tbp[ZmF/Yp8l"HZjeϙ7A p8pdeg"HDŘ~T"rˆDIJL$p]dRgphL&VںzRR1 yFƷr Z&yH JvK_?`\n##wvx<,^T0 &%%,xo8U%"r;4000HRb"&`0HBrR˖,!.Bt76Q>DOJ8HL'99%P(Ѩ,('55^~\-Y@Zj*{?c;Ρ#GKR)pL李D"0t{zTT`hlj&-5H$L$MDX̳tLHH+ D@&"Z .\d2q{<ܽ‚|B0E"hBZmA/319rdgeq}o  /Ey|Ցťjv;2ި@aA`~W{>RSRx˖.!5%{199  J=a`pDZJ*_0it::)j5pNbATݛIOK#EeJ p^+Wضs''0Rf=XyMl~ z|qn7~ ډʢ`ukװE"++p8L0DVy$է5w{۷SXXH[ZJ  Q餯H;־E}dbώ]YXYI~^.驩RЀ루;:q8,]Tʉӧ& ʃ߇lƠ7pHJLt^ >a4휻p` @^^z208R䑇h4҂f### DcjGzj4d\7j]A#GJbb=0H.VW308HZZ*x=l65YbSS2:6Ɣ hni \Frr<֬\V_4:˵e& r w-$HnN4gnq1(}05xNj}իVR155> 1<2y% Fl6."3#ή./G"ՅNM8摇`˦MX,f"233D"\b`pA z=Jȣ=H^n.;wq[Xd 흝Փ#=' b4HLHh4RQVD"`t:[<5Vbٴ~=)ƦfgQe% VBOo/il޴Azؼi#kVb||2YHfF:]ѥ28.232bdtysR2w.LNNxR[K -YJ(DfӞ^HLLdgq:l)v N|e6.\aj /sy%H$`ttL 33OIe2?M~ )[L]]=)h9΋WD$n_w!`͊ͭo o 1!#3 \xNQlR r,67[H]RqFF(/MɄBѯZBqARJ?y3gG?C F#iCJ<`lyThBTκ>Y.`$ȏP8 B.' P(HRB`t{nFM{#oAoןfúu\̑ܙ>A;{|Ga2__po&oχB.axmZD|гgީ߸{XTYIGW<<G?.ߟ Cݳ\ŋRI|> "forղ_'ݾ>mB7+Hp]ttvTRdeR)&>TRgKH$vdRTj:>f6w|TSd.ݨLg"gmm/7íth3DB ;+AϵvZQF4 r J~o[}D"A{gg|wӃD"aNQQt?33L&iOk?#O}}^q(ED&uZj  hh0ifrҊ";39099IrRs'23DDDȤҨώ;B!dn8/wRIZjQs!CDDDDDD ȗ| 7qAom 05ٵׯq⥛?9{]NrIZf]s\|QxpIغ{ttvA WΛwjiw7gcqP(3J`K$- Ɯ\$Ă:P(pĜ~p@͕Z^xUNgS~ZގxޘL^`0H$pČ_$vcO r8xhim%pnSSS`V.UW36>>#tfK˗9"JJ sVtx p:q.C(r:g pRM-VN9秷_=;FFGcA}~?^7&@q՗k}r{<17?Wԉz/"6ήnV+/E?7P({6e_?lTz~w'sODLt˖2<^yuVVhxamyA0;v.˯O=$/*i{ٻ^E*IOK;0x}>xQ:̥j?IJLAkjb׻9qp kd2cc;p݆gUj*,tގZ+?\.^tEB|ǎdphS`34؉;T½[6omebr,ؑfڍc,(/;rwNCA:+$''d"=^8q.z )W8u4^Դ׽>z}Q FF}ɗGBB!|p4==f{fvvoLgWxh4FGGg&Lݞ8ɩ3g8|֭S&{'pPW_ϲ;R9c>L %1yT*-|Gع{y,\0%GyqصSˎ]q\n,Zđcp\L27|sdgΜL4ǿmΞ Ɯٳ?!x- rssټe ##ϟ79gH%SH:>[ާ YVzzz9u ӧMcbpڵ: NŋR9c'eV?K6fVn=g w,]Ix)--I<;qOg=<<3]S)<(Z‚|x"8/|"+L-).h,Jqa˖. ??3uhdҤ .O^^.+*Xh!nBrseL2r|^_:{ZI1%cZ),(]. Z-0r&luk$ r9))*\;'U0 RQ^jFYNӰXp(ByYtbz2{LLFD\}LجVJ)ϧiSvaŝF;Nv9  _w/%ţZ%ib._F~^.CCxuxJ1Ms)$I tL2Mpܱd)E$J@8fxxqCܸόMGk0(*,$R̞Ŭb1 X`!u/2uL.w~>sfҤI2o\*&U`6),, /DQaL*/l6Q\X̙Ww­sCUU_tĆ 8M*w._]+V\2n344dxIB)q[N+_'Ѭe ߺLe­3ud9&++  Vx>SO<ƂyZż \:=~oł^Qxˣ%3g5s&lg:ŗ^ѹ/ׯʊe8},w m̪_& \T*CY~R֭] Ʒ7 l~} 7w.yqZ[4y288O\4H4J:jFEט G"7m% Uϝ}~{*++jl_}~??寘 kN9K闽L&yc[ӧS][[eޜ(B,oo"`6X,.;7mJOz EExnnZZ[/š#G9z8yx>hmkthW_omr FWR@{?!;GWW7NIfb8yy}gxx\N'xW_5`tP/O=Rq8A]“|bŗ^aX,?oKZ ^5GC bݎߧ_%UUٵg M+)+-`j֏himl6kSY9zou*WP$x"N /Fltuu108DAA>Fw60Ol@QahdYGqQ:NQ^Vơ#G)/+tFEersbx=^8b2i] Qᠫhƙ3g1M1q&>ݷ5W3s >3xO9s'U}*|>zD"ɏ p9]сf'//UUy;O1mTls9x0< z5ӋHR'(**l21<2BWWF|?~ɄfŊfT*jBU5yiS0dgɾ<|>y;O/Ʊd-dgx/-s^??dڔ)F7JDQzhllS& zzH$nBf,B`p8YYY8_ӍNQTT^'#$?/B#! I&tH$Fs+#z1iD@N.#>HA~FFF2uG2"t:Qd_z?Gqa S_GG̜1 ^D2AG2?p008H4Eדާzz{pQ `X #nΞ|cf tuuc4(**d`pH<cvL4N9ÜY3iljf͘M&&ws/xl|{}lxQ(}~?~vˡ#Ge{7'H`|y ˘7gGb6Sr6oy)ؿs465aXz=D"jjx&:hN{DDs}x&,G47ofrE9S&O~9[Zxcoصg`%ߑw( W"c;H$(*, ɿT*̦ ##ܵjafLszaJXz5p__s^zUN=ÿSO{gRVZGQd}i6|QvÎݻilnbCAj@(ӧ}]p٥Wrt͝ɓb1ѵI_/|_]Sbd2ᠤgy\dYG"$LLLUPUg1{LL&#`0`4yU @K_$7LجVtiLRh3OM{ggrJKJp\ iNgSTXf<H$Y!Hx",Zi񆆇llxTUS[{FSR\,+hF"бHI:dYN^I;H4 \NL̂yzm*fwdӻ"I0ed9nf{r̛G__3=ztHRGrt/~AJUUX,:XxϜ3Yt)6V$IعjuH֏H&w pY&rsrXRW_=kV# 4֏$o=ӧNciTUv(#+ˍŗ_g٘6u*;vfE FDQ,^_ O)L&~e4&XH$xW裘Gߗ$ S1}zfr3ߕtfg8x6oynyIrsrwA"ͷ7aZXp!OloE( F>?=kjɾ}vf]x)(7]$(/gێl޲Uո޵t٘9l<.vٓ\lh@$, ?ظݲիVGaۛ8x%{._NY|9==457t:X,M&40z̟O  ˩ӧQt:yArsro=0Olp>wsx퍍STTH[Gm_3<<ª+>WUr1r5rŝH%Eioy'I}}\IVVh[=`ίۑ7Wߍ۟gDF;ŭZҒb4MAnn$Ӌ!ގhdhx U<d>hO灁<D^E!''X,F$!F$ ==f\.N2hƿķ}A @㹼~(Xf +\N4#I* K<xMD~^.6egc*'8NajJ%??z99u(&"^T,GF$ۗM$h4b6tfZ4M'`fDyD.FH?&t @' UU+z|>/CC w@uM-?%w,Y0gB0ZK/GɤT˲ᤷÁhX,Htzzz{ӝ\n;}~?hǃhD裏FaA!C 6}}8CQUE!dax 0<<9ڋ>E4ŋru446? (EE( `LȿL2|0@ l"b6n苡aZ[۰Z-8&mB0T*Ӊ<~W$IV$FB#\liRѦ/ gl/\kLi~5}ܽzڇ6 p~+SsZ~NUu57 z嚚/_ߐņ~_/p\WN2"k(<PSsu3*g`i|yy ^n" ?GiIɗ^V" 7'3f[ʚի{b4](̜1V] |;~A- TMl2 Ai/v"DAAD ˽RUSÞO>E{z VZ_ɲ/\pkAkjFT_w8=וJ_~55Ѷ޾}}صwŋsQN<Ŗ{s eܵg/5@zwO4 } {_w%H0<2˿ k S:|.|]Wv>AܽłnCR)={8rxzH=|& !eAv|v줼nN#‘Ef(u~1H"ضs'gΞjv/?9jc.N9K,֏h蠨~w3$/EGgܜ9OK::;p\twpaikkap+On5Zh,ƫņ r1qǒ%R]SKNv6F}.//6c'N`2ZڳO#HL{~מ=TP]SC(&O~3kjΞ;koI0$ۗMmmGɓ(BGsK WݫWgƵ757GsGlx Gsy|^/v{z~@0G۶_~bs6GGTVZIMm2y^[?ކ].vC,g>s!$I! K*bpk]kv>q/Aet>xo.uu]Nx-N93%ώ]e( G =q_k/6ɾ(z I3gr8LOGQ/^7ڔΟpPXXُnQXX@VаZ;xUUlzw3]]jW^{P(^Qfet88|hzNvIbddW^{UU+yÁfCIdp޽V@x=N'r!77OVvb,f3;v玲+FUu ̜Y.?OƷh ?/ᯱiy㭷ӟC>ێ`0xeM>r7DIq1SLF'2 ֦NL<g]uo^g=>GFxVdEAU5?himHǒŋ{B0OR4a|MSYEQ=kw,]djPXXٳ1m'O"''Uw ;ۇ,̛7' ɾb2oLүe\D<$e /]:*kh@5AN9l{P9c:@0HSs3eg^*gLO(/n=L29smZ?o.,=3@4׺_,}>8z8-$I[td۸:L&eтH.sJ2BQbO"RXPp}'|gp] x{K7Bcc˖.aw( G# QRR9s2Ϡ-f3H9f1g,FB!ϛǔI0 388HyYlVN0w3+gdɘFg^s8wt0{,*8_w/S&OΌv;] )-)!O0ct}^#'Nhim|ΟOnN3sCd2QUSKNłn`p2ΙCuM-5(Byyy^^OYI x9f܌baŜ>sf.7&m;vŋ7w.'֡j}V1yҤL= 2}T 󩩫K''> UUHqq1Ϧsw|RVܹ'GۛnnH$8tǎ=Wx>;~zM˕0HDij |^/& S^VF[[y̟7Y֡7Vmᰲ TY0>P[_ϤITNFup\3~1s | ᄋ/|qxEQrc9o؏Xܿݗn,+Je2܍xXDCWdJR?w-X+0ri}Kͬ3?W̗/BU5^d}}'b>AbuYЯGm/Buǯҋ!YZKUթhl6MWe\3Z*gLJFԥps&Iym9t~$Ǐp/IW(-.n uq/  " 7p0pF[]tAn:za@zgR~6D~GNR {I~ 74C Ɔn^1 ttg~A6DO離Yܹluu?yy@$\;~ҕ>;v"fAnmso|{GOOOcp $IBDx7 |v7;֔=$I p1:ځBSK3'Ϝ&]qII:zz{ih? 8^/T2M'INMyí{AUM n`=t_fy u6v!3VǙzT pw}~?]8kj%s6/^PSNEgW7Mxzstt&LRF@vQcX1 $I::P&aE$I YmZ.4UCI a2پk7On[(.*d)$It:IMm Y,fVȱc{tp%XVN9K,cVe%g}q/ 4ǂQ]]=>իVr98Gc] R?ڶNa4I˗jWY'8'mwtz1D1里@&4MmA4UEZ$ z;:,˘F/\G084;mݽ獍ٹ{#!8u4--λD" pHO&=~n"(iln̹s,?իVյlx PUE*5NiʾuT`6(*,bd"CCC)IqW] c(+)Ct14`0(z@hdjb2K{jBSUTM#uuttt룳\lhl6hmkce~ݽHĉSXD"Q~BIeZ D~A摘Ы_$rŝmvFFF866"7'HCcp8M'Wկf3e9]M`0L&(2fBP:k״|KM]-T_y"icUTM%مNc޽PPP@ YvRp\n7gHbqZZ[tPY3eٜW0_~AAID,#L`43w HH<>J-ttvTpy(fU2u9FŋĜٳp홀L%"';;^$XOɄ^'B!rQd^"x=GF%Q=^AedEp( xҲ:1 Y CBϞz^ Bu5@B FOٳG08 UPZR̹ U455PR\֕jӦMZr$ ܞ$IbhxH$fcMxnz" J/ x6fU`0dFunmc=5Mtpu]Ǡ7PVZz<CC]րV IJ?~4E'Gqz=,>HT!JeʙL&' N_9whAnUS? Mp?;~WǟKK4b1ByeuǚK/o3a %c c/K[UAGBJmAs;<:V続[;OXtJA淏rFy_mu An*EdK7 @'I6;pEQn:.uJvb .J0" 7i&Ngz Yml6G՛`0"--$Iج66 cq7n<H$nfiN.dwj*dG$tr3 My)hr}z|>n#uH$LOo:vf|*"0<2, O4lߏ)}>O*6R/ pⴹ,?o}$IB@Aŭ~"gH~AAa6DS p[Rx,hlJޱtN{d2C:,{lT*/W/+ |Ato_/##L@GW'QZ\2O&]09spUӰ.$KDSK3}~?&9Bc,us_UO,'p8.+طDAn[dD"1ITU%IRL&LtB0#T-7`ʹH$(-)fH$ 0X{K\q_2$루6::q:#"0fD(d4"2p@"$c2DcQ"80@?e8[6DAvfvId4L%\1A}LF8h' &Giln HPTPXbfP8LCczD"AYi)8NuΡGQ߇j#0|yAڸT> NgS5lo6e!X+=4a.6^$QTPH0<2HOVzEO$X v>u.&WLh4^0" +X^!D"BtzIJmkKH&IRhJ< M0hNґL%I&h(جJɽݾtVyw >s*I~A9SjΕK:@{^\ok%`_O+GA\. zt! ;O$dL,b|(xso0MSzA}$p8   Cu| v]~A`61M_Qj Zm\:ޞ^AåIsK>  "  |/  " 7v$ ,idt:]z2& TMi"#F*zt6~ZHAA>7a ͣ |WeJk[]6JJYH:r9i453a2)))IrD޾^|>k^G<'ctAUUщ'ņF֣ ݭn4 LLEK[K/WM60-F1]KEyr4PUuº9}K/jm@yZ24wMUU^zU$>.Kz{F:88˿ &fdl$!W[_OccݻEg8VXӚ  WrO$U+Yy睤RI$I؉vr( gϝC`V '`ҥb1N<``y I>s!L&#VnfΘAEy9n5hjnb'ȤD6;5uTNN<[Z-;w!8tٴs rr8y?'O"?7vSZZhhhaL:sAw$Iտv~H~n.zeX`>5;@EY9eeqq̘>_X4FUU5~ mmR*^{I(gʕDcQbn/).OU<|LEyE}*Nb!L {/yyg4TQN $H( ܽ4kd䮕+x s9^kְh %%rתtuwÓ=ƚի9u hY3gr{iikg…<̟77xAJrto^vY{֬ ϋA*WmO$?y DqQ 1;wΖ-ܻf FӧM0<4uǾFhQz1<2FKkؽf͜IgW:IG<ɓ*tv3 ilR;:xMdH$TQiNT C4M#Lրt5TM%RTC]}=oAQ pihldiMz&/\@Ѩ' |e/IH]{paXhK/b˙x' SN6nl4D"A2d4"rdNN#0[v2BQd$I"Dx,lFQG?vG.IhF2>,#rfdh4m Nr::;yWs p$It:fsߚǩeɢEzR^/X 41c>a(gEX,}O}% t@&x_S-9~ߗ^Ȳjly!I58u>?+ҭ" _J˻v34M#//9t:JJ3A_3}4nI {Au@tc' _LĘ1AA)@[]AAn@ RFa{T%tEXtdate:create2013-09-03T13:19:37-04:005%tEXtdate:modify2013-09-03T13:19:37-04:00ʚWtEXtSoftwaregnome-screenshot>IENDB`selinux-python-3.0/sepolicy/sepolicy/help/files_apps.txt000066400000000000000000000010631356774067000236750ustar00rootroot00000000000000This screen shows application types that are defined for process running with the '%(APP)s' type. The description should give you a decent description for what the application is allowed to do with the type. If your application type is being denied access to a particular file, you might want to change the label of that file. It is recommended that you use one of the types defined on this page. Note if the label of the content that is being denied is owned by another domain, you might have to write policy or use 'audit2allow -M mypol' to allow access. selinux-python-3.0/sepolicy/sepolicy/help/files_exec.png000066400000000000000000002044321356774067000236300ustar00rootroot00000000000000PNG  IHDRj8pgAMA a cHRMz&u0`:pQ<bKGDIDATxgtG~TA V%i?3s瞙=w~οֻ3ttOy)zoA ]PEN$%5I1P;bǎwּodXa T*uvllou]Mߛ7oj|Xʞ]NJLLLn/m_LUM tp4lV6;th,( pر( dD*Dn t]ClV+vmB4 bP5]q:7tH4J2v!KaEy@վ}˦719B~cg΢*ycMg͛`Qdt`^u%<8K/0 N tiBn ."# osBߟ`E)+.G:A`!~lo##LLNFDQy̝{ }/"kW47QU^Ώ(i:Hg~R^~}>JMe9C#cqN8%N3FhNei ;8`x)>yՕށ! t!ŅONN$S)|^~cLϤ)-*GHRH ߏbhY d(gZZ4%V &&tA`x|wbGyrfJ ) 0`:|NkuV,GDB;GD,Oyىju Ô󯯾$$IʊYw=nBO6Zc'x桭\/s͓gqD2IEi {eȒf͛DÀ3-MLQSQ+|.ncU~[|'y,WC$> Mu0}QnF'e Yw^`tDyt&n2>5s<Mܷv5eRU^J]U~K$&&w*aP?qx?K.?k[711~4àg6N45sI/"Q[;v$IjŒJ=3Q5-yq;njNLqem[Xްƹ36 CglXݫ RWUAZU?ʾ#Q5MkWyu9q%bq;AaA>?Ue3y11 gcg&/tQZTļJ>wP8a8V/]EQ٬zfł( ȵ?EY't1>9a$SAJ0&H`>&V-G5V)FHҸ4Ucdl8>GpmhǗE$n,$x=n*KKh\OwjRLKD;l{g[ذrYP.?/QHk}6ǻvհDcqNkvqXX[͆UX n|h4ƢynYfиpc𸜸].J C3 >u).%Xް{E|>ux"nnzrZ2[с‚|~A||6K,lɵ T:M"beҪJ*ΤX[d*=3X˒(L:"E N#"YxAB"3[ J(L @@4l (VUTU ,JffO&5UMgy|<<ۖV5 CǢ($iYED$I$VQd UӈH$IҪJ0?|)ϯ#Lf )5EQ2;LLbA@+쾹9ͦfłb.ÐE67ĵaج+^0 %Q~Pٺc\YlVe 0 y0/*K:zdfG%@<$W{NaSlnAu,OUyƌvt`dbn0 fivT_1+#uos /LE׿?HUy){_s^f݊eTcQ,f!5cbbrsAzLLL`%T]..<.'ynW|\lh&&&^WjKW]B΁$I]@nobr;q'Ba111}'&'h?>+2ɭA5y~$I"\Qq:8N&' B׷Rm/5bXzR)‘0ݑBf׵#d6r$]G^^90e4Ã,"rhoG{br&'' hz .Ea@kEQG)).AQۺ|8Cvʑ$ R&B0lMӮg"i_1'E1F< Fu! ;D16.( 퉢 }VŜ+dn2G% Ny(-mi=9CÔR[S;ᅬf|bbf`p2ٰ022B(f(lڸ1Q ZZ G1<3S|4PߏELNNbQ,hH$ xnAh UVyu|}Օ3y4ǏsLS}n~]022½-O0byg|֭u;pqv;DA8u ]]/>٧BdYjN W08I?A<h$3 Yk]qh ccc }H&StwD8z85h;OwO-m,Y@o_;vY:#NiS?qMnq6jYb9G Xx266Ns|s;:Xb9αg>!2kV={?qh;b†u().~OEE^zf{NCCC|ɧ=wX,o6.J{9vwJo{00 wy1 ښ/['8~$Μښ]]|ɧTVTPYQ1'o-v,f(t9)/ ??AaQ!~aasz|N[{ ,#2XtZyXj%%żǤfzxÏvGuU%VZEiI 8{48GDٷmXs|^6L_I9ylAmM ,_Rw~MxL4EK:M0ɓTSY^N]M ˗-z Jq)n7EE,_2:/t;O$vӜ:um̭ɭh$Fcnz%D2^rUsK+}|' s)4M#eҥl###QXz5׭BW7T: "==|RjkPUϵFE|J*++$0q֯]ŋݍ,K̫eXV,y>B,ucBff[*+oGUe%W?!(Ri:{ذv ׮EDNFGg' ^/ ((~b;.6mGgEtаxWdtuu#.`тș8Njk.W]Lm>: 2>˗6 ˙&R PW[CAA> O$bͪ]@/TTVX,V.HPXd(cX6,u]2/O$8u =?O.&&'D"ut!JKJp]s9N:ͼ:308aTUV>sN{G==jj~1#W@ ur!1>9cػo?d% xnvŧ}(lXD2Ɏرs ),,`IJMwz8tŋx4 U4uf)(gт=~ldQj"Krn}^(SRZD'DL& PUD"E36T]7rN.-UPU|ll3xBJY8>nLdI&N!h_Lk{;xmԙ`@Muu<}v\ , TU iK:3ri4]C@@Q=FOogD;w166μ:TU61d fSEhtp޾u>_便܅SDk0 EV8~$D395Ea"'l4/%RVZ  P_A<2Ɔ̚|q1ŧl6l>GQQcQ,TVzsVS/gEDjkk(--atl|Ca UÙzܰVUt]pferm748HmM255%e8.C^}Uc}9 S9\EQ8o_~Qٷ'NW/lsae>Ǫd?_z^6iWLf|$/~aeem7ffG<}v-CuiҌ;¬}R)D5;gdߢ(t:M,C%.7t:vQ,AlzfgL$awPRX :{,K9캮,!$&$I> ξNR^9DQzZSyki\syͣb,ueu}wRRTX( s~ &Jb;f&|})v /05=MSs3O>( |{;ۗqYxQijnwʟOX`EQc'Nv*FYh!o. |7HΦ{7tɒ H4koc?LiieA݅ gXo%%X PE095ngtt_74h<A@UU\@~ hcXb (( yh[n2 211ϗG 8cctttd yeY% ˯墠X,F$   O$t( PE5܌_ǎ //ŋFc4=jEEZ;iio'NagȲgW_cbj/>,(^ ]* Z]7P,6l6,vb1CKg nBR~:^e *j9ʱYr%Ϯw3::>wGMٱs󌍍_qJƌN"$J~Z~011A06 ĩ (7U&&ws#jkjc_V2_"+snj>`u|'feQΨS!^~('O=A `!>AG_}ʹ@Z it], BUUyZZp]Ⱥ5sm$QjfJC$I}I T5c|v++1ZUfK1 x<$ILkͷF$jٶu &_%I$ yF# +-chh^<^ 288DWw @f@]M ۶n?aٰv- >v 1Hfa(b>9O<حv[pcѢEUq6h4J1롤`Ág]6x2XD2iCOE_ݟ_7wL2/t^F2G92bc9[ `rrѱ1Dc1"ac|F|V(vǓi0r!+ hNIq6`(Dxp8$I6+Dt0HA~> Cm6ʰZ,  1== PP̣ccaN'$16>f26߉I  O5MLLy@kkEoClٟ/='뙙  E?KeoF*0==͡Cx<[ޜE4Ucpph,zY:IiIu,s^.Qq5+wgE6vZ~f!dԌf*omF}&&wY?gJ}i'0K #rܰ ]裏]&l~ P+;a\ݸ`}wҴ{{\λgWw<]w~>NӔli971KZu7Rg"lw}=X-ٶ-011$I3X S|!Tj3" fB?&&T i %m/"^MLb3Vbbbb3\,. v\2ou.LLLLLLnk ~MF$Bnಉ8%DsTdbbbbrqM#.PJD7̙lV-q-|%3 xZDu~򜦁 85dd"E &j*#Ӥ4NvGTAynuvLLL\Y)!Bqlw "+Q( #(N*/Ufn6(BK!0t.- $_3XWbA is" ,WŒ*^t1tD2%$QBETUYkEQIMɗ3~M7P5MrL0ff{VEQ ^O4MC4E|4 5JHU $QfˬO33WEsٯI:dG204Nz.@}loY +yKU$I0 RT|@\{M(de:( Lϒ=zFFgêJsu`X;i|0 D"1sajg ɯb5&&&_+ #`J@$oRP <裬[:g(`Y6إ1ҳȞ> 89Aٳ:|?g۷ >?C#8xxۃtp-dY K|itAp[%Қj #^zU}!jkj8zÿ?݈099ɉSYrH {'c@Cb]*?"3ŋ1>1A8j}z;V}N8u>VWԟ d]Za*op:n횜ͽWE<4vgh\ 7;~'O`xd6z((S<Ӹ\߉p$˯S)..٧}k0,&&&_ ~P5Q~. QVVʏGfchh>AAA>?0,˔( X!DQH$0 0Xlۺ5W#KCCAeyxvN9Ciq %LMMcaap\C!zp+V@Dt]n0 Lɳ,LMM16>&> V dZED, $qRϝy_褱s] DJ|3~1jjjHӌ( %%L@ fl|h4LOO319ϗ///WTd2s$wxz=DQlv;0 p8$SI à ??n&&&_ W񫚎-?( ɧQMn>r:i/OЅܳ~=_^yѱq kAUU^{-.YB[{;xڬ|}P ,X{gjzgz*)IDQ~+D"$O?˖6jZ㌎R]UEyy9fEH3Z?>fqz+62yIv{n6ʈ$$hN:eK ]t()*bpx.Sl9AVZtgm>|8O>8u NQy'.>-8N>3 ,`^]-oA,Ce*+3B"(Be6nK$S^VƷ.7uHaYc#'NfIC= `:ɓHHYY>-I6y'p:[<6}CB<glg#}! ,VӦKsQ+͒Vf<g~h4wxu={0W?O9f<gՊ,Z|;Y ֯]CEY41==E ݻvJE=v&&9t| (v3 ]׈F(k<w/DP8Laa˗aYϖ*#K"iUEu45q=`ú  qմ E㏳dIDeK瞥*vhj:K2bF~RTXcgtS}|t3p]Ϭ;;.Lctvuql<9qxX,NiI u5躞4 I(u]uΞ;4D!z{{I$x=n ,Z0 RYQ]v;GȽTp$́C_W=֭YMˊK||Qgpbr}fJ~o9~ xmsb6˅nGuhF.@$e3Nt=J(Ν*6S0&:wb$Iش}-8t3goT2e ~/gɔ~5c7JzpkƨNQ'9;Y0x=ՐGt4-#dYFE4M#H(念g2Z΀-LX,xx6*+*.0Zܻa֮T:M"gGiI w~嗿?w2"ftE0 cS:XfVAZ-82KJ7\H47+ au,+n:ۿCE6?Mͬ_ 7=?&rXڸ}?<ÔcZtNmM oP;0?_022s^qݹb9Y yeS]]MwO;/pi8ƒA((x}[ i>®={zg`haQ"I26R F.58|NaQ,,]@wOOf8+˜ECXU2BeNXGs@qq1ϱm CG4Juaj4p8GnG*Yf5cc7U暮!K mG8phѢY7N GMie3p8L$'J14~%E~0}(J8]8N\.'EEDc1FG(cXBd^N)"(R$==aQR3نa06>{F ci/}}8N>?3y.)aK<'ezrǞ;vA~>$ljb}>4M# Eh4J( 5fpx͆B$BZ3e966NII1TqV % M2l$IlV+C#QdQ@00PR\܆a015bL& G"}`0 8t(ᅬ@Bc'Xv5E}>B0! I|x^P*._^199Es㾩iwg{KMcXqf}dYc457}7>DE|ќgɪѯVۥee/-95jĕ"[Ƃ Fyr},\0P(̯~;y *+/{)p4LIq yf<*6Y@Ļ.`(9OxwYQ\TDIqq:`~]pvrqu]%Wͱ2d=U,r:& f"d2c.ߘջEq-DQ$I- JHRD]WۑH4B0,rE2Vyxtۙhf%s›\‚y`̷֣2Z,Y111b #AUe_w)|:&&&&&&We|bg<&&MnL17;E)4=0ߕ/-t]'HYm.'H>Ǘj`0sp8ٮqLUU"LxVtKjbS:+ EӅj% Nr\.7;E"a$IfI$D5dYF%dEF%;3!ňBƫc Qu"TEVp:$ dYn7+JxxT*M:BQdYǟVWn\O&8yvVLK9B֬^{}[qiu&:ٽaf4=9585zttth4J 䮠:$#c;w M 8yy45fhh(:HC($wB> ̙LX姟|= JظeIk[+teDQE8fjz]IEECA ]'?Al6;hߏ,  QZZRǞ@3QDGFGp9]Aje2dhhI).* x}[!`1‘0vi5颰]BUUP{M/67u ExyYiR)P5?_1 v¡ȲLII55w:Wէtvvqܜ0Pdbwu]Hf-f T*ͱcGJa6FFG195I4BW'%$S)ϝ%JQ]]æ{?111;D| @UU5MM9q8u}9LMNbXXne*vMimm7Ğ((djzW2==l~…υNO(b=HmM==ݙ{<97GaxxY0kV)eɊ%ߟϙ3'SOq{ps0 \‘0gΞ!"KrQ$Q"??wDx=vh_øO磨|>$F*m$ ^/COϽ(磺|r|y>\N7j:M(vE%m PHIq)aSYQ$x yyyDQTUSTXtU[Kɲ̼y9pp?D2AQQFc311S'I]m##TUU322̑씕3>1Ʃ'q84.Yzk㊂_EȳMm6+yyy8*+aѢ0i_EQQ\.JJJ륲^N9EuuM澒j#/χ(j~VN( ](nz,+>FGG p"+2àǓMd!N0tpgzA8Fv;;;(++'//ݎ/χdW/@!n4K-…NFFG-S*2ӷʲ̢imkf nI;fLMOqqFF)/k]_m0p"tM&[P]]Ck[ ndf"*tX0^N055IEE%eeQVW_زy Y1ˎ^\5YsdYF48`ZUU`?fֹdI$MS̶?Б%9I$3XMH$PUurSut:X,֜UUuά/+@!:_Ȓ1'MI3[f|q2].$)woIH&4vmNz􋚦"IŁ~>C{qJKسsyGg !cԘL&ZxUPUH4BތRt2!J0ndUg4B:gMt Iveccܵ3~A.[*b96r=Ȧt*Irn-!ο#fWɧ(WTi_m{-aKfw$ì}o^kvw|lٰqeU|b:m-:[VN'b3X,w͵iEQ.;2SK%ERN}]nw7`558ΜPo_馦 )v+;2``&&P NNW$Iu溂$` /AVH]'L2̬Cs{|zTM% nuVH@s3~AQ7ՊjO[,x=^] 3~әFbbbbbbb#J3v暉77˙E.R)Zڨqyc綵w(2Vj p5{E?j!A[{{FElFbq"($QQQGͻɝF2+:QHRG3MEE*8^jgxd2<7PojKF2s_y ;wyO[G4]wޥsBeE9n]wL&Y`>6nt:}!PP(Ľa% 055Miq pBKkVbU AR׮%/bi ee:rX,4#Iwi֯ls3CCZƆkN>NMM MgϢ*7lf;r[&UU#SYQߟ abb^f9q/:lXWxɩ)ٰ~G#ZrxBAEa(/+LSm[ghx_%B0o--m|}|'457Yp8ySp ٽw/N W_cphqZ-!":gϝ؉zgOo{e^/nC7\(,ZMx|.*+|(gzz>Fww7ǎ;Xt)WVߪ3楗AK^zU,/^Ǐsn6Ï?a޼y^]~?n*Nǭ.o$d>p8j/  `Wx24Mc4NsAz=TUV>zO>N(&2 y9tdAD"WЍL|r ~(a( Ա(gT:7E%lݲP8L8eENUe%_ϒz6͊.׭eú)‘Mgϲli#PP=3ښ֭Ya319O֯]eKTWUR\T}njϫcՊȲcxg9yGRW[{60+5h,ƹV#H2O>'NBٰ>z$G8JmM5[7?˯h0"^ nu~#10p]ltuwx (qIV%N $Ct`rj󝝄Caql>V,_ SQ^NYi)+-jfE9y1m߰l96;(tRy!^zU>2^ט9"|yyh0ZZ8in> LgtlE JPgk::~?v=:%Ŝ>s&Vs&HyY~!g244 YVZE Xj%Ch3$Xj%~?kW0p2dc'NfJvZ[hkob8utp|>߻`X`@2^֮YbAX8p05UBa[Znj~ 8?NSs3y^/tv^ NxPT*ɱ'Yr^V7M5 GiI vu <p~e>9̞{y@L~fVuTUC2J% C_̃}[I/bd2;5kAGg'~7G).*-GqQќs###wPSUC>H, ¢ X,$S)B0Xm[jDŋb(**"zJj9>0UqIUYMH$8z8;)+-GuU%ee t,drF+ Ҋ`@g,ߌڱBGG u55̫rxBZZg`ڵXaFMLFTU%]˗a:穩޾>b8@}4>$K9z %  v| \ꢨ5VF[[^x"Xzv'N288LYiI!STXǟn.Hi\Ih蠦_ X`>n+wX<(TUJYHWONukr*_.; _5lB u9ʌ2 t:(sF:W:7{@ _v]I&3A~_Q]Y>sY:UՐ$1דy* "IsWR4MCŌVCM>./K g-]Րkf__UՌam8[ht$I0 $0<<@ZUw0 TU᭤]9yc箝7W˖9&IM\\/:7{Q[S>|(gphXn]\o%^m=?NdbbDݎf#F`kjn?A{:O>|'Xy*7Ht=G1]ۑu]<Ѓq~<ϭΒMR^Vol&( m˖q{}:Kw$[ EQnأ݁ x&L_&&&&&&w7111110])MLLLLL"LobbbbbrqS_4n*,i  14<4F3G.keu)2>>NbjzzI&'{-|tz:ĭ~,ۘKaddv Ìݖ~M A~L8sdϙ?ȱc귿g n^26>˛O1[7 ^~u=2'a;q&&4N#(DUU:w|庮{^y?sDslr2z]y}<+O*.njk[;~)"kmQ8u +W,' 244L2besnATWVr  mR|2v;;;D"Ӹq<,[2Ο拉@@ @Wwn{֯ ֶv:;/PS]Eŗ\K NU+V9=5]GɉIy쑇\C9ʊ˨(/nbrۢ]ݹva:N>o_~5.7bzz~t^@$j|RV+mr䩫Šb;qD"+Z3}ΒzC,kld`pb2E-VX>ca?p߽*CwF ou~HӜ9{X,妬SgN(V\bhx KEbt IL0t:cŋ9B4tli#ɧƭ|yIN8bۍqV,_Ρ#G1 |E~w{9s, -" g>8ɺkYpgXl##LMOٮٸa( 4o{gΰrrb8rLV,?`ͪU|gLɉIFFG9y ?o. nSPP@" i:6nw/ʂ8p0?%ή.lV+RYQA07$q@\k n+h&G8yUՈD4/V׿ i##8 bX&Dn$0?ſzJaic#{V,[vYd,wߣo`A{={8s6?,^R~P^Vơ#GT^bl+xcx&٨}&_-D_7TWVva  Ѓ[o~KiI 8x s)ڽݞq,X]{{=\0D2$ r 6޳a˯ I2HAovnX?<2 1L[AQȄUӹhF+/{111ICbt])LAMu?4? Gɩ)/ZbNe:yhV*˃[6cX xǹ{Q1>10DQ'&DD*+QAeg4 Qu3Mgiz6 ŒO CL&ouݛܖA ȵӉ SS] >%KX˗m(7/{?8q4vU+Wpn7r1|'E;D<6:hmkgrr wvri*3}˶[r1ٳe˨瞥}䙧ggsZZZQU?ww=9 3/@ d d2t޾~\nO=[7?,I(BE,?m[6gA N:t&WxJnx\ ~B$Ibtt1CA `ͪUۗ^AĽv2s*I‘p`"##tvuG[{~?y%Y JDv' Y1Sa. p1tC70t#WnB6_6QUUIA~>+W, JЃ[w/c5TTQ3AxH*ZZ6GXb9֭nbrbsکHH2͆"ˌh5MGSUb8CC8 1<24aDX-VTr Ens |>ha\N~?V`( LKk+#vv{ Q݆ @*Պn%0 6< TUTvH$LNNy躎Ţ0==8 SS:}w|"#5 #7IhgQ 8$Or9V# S4K?p6C44s9n{%N;΍'ݎ,TWUAO>diDiniajj/‚vx9!+ =s;vh,FŔg>ē ŋj* zs LR[[89~v% ;~^5շrb1^}Uc- _xR2dϾ}XLPH$j8NDQpQU9N4j""(NI&Xm609  #I"Vg> ߏjjEQvHłjEtdYKeMӈFȲОalj'\. dr3N, QXb9aNe9wcbr;]i, (??33ɶkb(9-aVgQdY&LL$m(33 h48A%}K2> r}Хy6I*$X,8dYFUU8nϤR)b8Ι4 FlF"p IwPu} 7Ͼ$Ő% vYnعk獩V+۶nsRE:gkv 犢湳 bPf 4e ϒ$]54 8U)".իV,+_&&_H&6=Ύq~qdI ߟ+u6%9{k—u-vk_g:WR)v}{xxVDQfa(c=UNf{p;r En%K@6]MII ݖۦLn-,3暙]ngy:&!(R[[Cm)gc.:E.&&&&&&w7111110M`U/^7[M 3M ڹMMӮyt:M,J "Ng{\i&#J:? ôk01Nt]'H|ed*E"ՏerL&o8~J<gjj*P*&ǸnnJ?)S7}Mgům?rGvo+)={_n:O?EEu~3W_}ҫ1}Mo8)&&'| E àx"A("NQYQI̹v FcTVTL&i?Q^VJMu5.,/tZ,_Gz=TWU15=M$!JQVZQތdAe:8MUe#cct^#PP@]m-sd*Emu N6 `$q~?FE?#Z[Xz5{g``{֯8r(=d H&Sm>hBϝ/-jky? QVZXBeE9$122JwoMxWnwtnu55(ee (/# Ӄ㡪QMuU5|љa>}߾ 464\;ͣiC$SI,+~]=ȲLmM5p8̅ndY"//E,IDA̸^qt%% L&X,T:v僚J"dzzh:/\@\n7nXӧYȞ00x~Ǧy(/+bp1:̂yg8u K,s*+*Y*(t,=JwO/G$roer&撆>?L*++`,_mv@9y4,klD zz{سo Ggr?QUY[xŋo% 0 'Ofxa!=0ȳo=¯~  OPRR̿6**)+-#;:a}k ?z=,ih  211I2dʕlw#ߑH&D"Ȳ̆u8u4? |1v-_I&ڽP(0xWq,_Ғ4M….B%L~ZQDSU^ LXb?ȭ.˸aU$C,'hZ&3 A@!F  P_K[^VJee%h~͛n"Hnm|H$t0H[{;,kl]i:L<`{/oB=w˖R[SaοwYyudBfm#\L_&^"A<02%AD$$DT:A&`K2LmnLe)cNSQ^)/+\ xt*(@,3 ΣhNz$Ijyp8BiI SӼ9r@A+/,ù}!ecPUݎm[N3-O>%>vK3O=Ia @, 0hwA%\N ( |?%楗G9z߿.V`q-SSӬX'Nѧ" "mܵx&&Ōdb`pCJJ2$!+ 8z]dCCø.∏g||/ ˑ[|<DV32:h( 8ǝYA>VŸ˅->Vhy_y -5Zdxd@lL c~0Lx,3Hx<l6>H$%%a2q:  c3<2U`Г㉶T!2łV! 208H  11ؘ|~?CCE.r{<gۈ/_8 Lv3GFaㆂ  |eDALj _A#" c(/^e[T=wߏ,h._-t3<2I(Ӄ[>Y EQѲߤott͛HLL|lDme\UK/fbk7n SLg].\[ˮx%~˖,yhm[T]8OCcyyڻn<3(& {1j"VKxL9x׮!f"u0dn')1J$,_hSgtaگ}fu-+/B;lC)**$;3HҞ^W遾ͭm"I*|Kn p B|>N'#B!Z& p8^SKKkƑ ~2nQh;YpZk^FvEp8'smzz{zQuvFFGWp# F8n qN`(͖^@s.2obcc5c:/Fj*'ts'q{ܜ=wV B4wZpwQP(btԎx좾{> p:Q`0s|$pD|>zcsK-mm>J0r1669N(bppg XM ,x}>|>}}( v]܅ ܨQ IDATa9сD цG}+BkLSl\_}?8+Yl\뵵;$^zy_zŋQմ ,zb%jJEo_.L&fF8"@FCVfkjXz =wZB(bhh;wxXl\B+8u #h5j.Y^ٌe ohmkcޜׅK8|( SLaY|9흝|>nwۋ$I<3$%&[oca3`2}r(9wUU(|ߡx$P+)ASW_"{8A_L2\.;(cޜt: ؘJE||<918yƦ&V?$qxܑ+і6g>AȊBbR"?Y|kj7g6%%ɏĂys;g6.Iϱr2ϡ#GQ+Oz<vh0tb~T]ª'ϐ'N¥K_nٌhnIX`%%? ?뷒,˸=֮Zٳ9t0)ɨj3 Pp^I^nZ@ ^#9)) VCb4o2`0mCRR#y/2׮ߠNGNv;vPή.~?/^dnJDE_VsBRQTtvwʫƚ7r%u)RukW d2h4GZEYI /\`0lssf#ݵ~lL, x^V4u.ں:*.UU( @NJR}.{f :޾>j5ob6sYz{{ٰ~=]]dge!I#vQWIPҒD\l,&|Jnng_])/+>AΞ)S?SR\Lk?y IR!Il-XHrѮ]#$$$`65c:WoG^n.f`=nE!7'b2x7y~dgOa֑|W²LrR23gLgtԎ`h0RRR̡#Gտ{IOKeph_{z,^Hl|,D2#LG@\(D+I%Ijt& ̘>QDG}_iy^/x \B~?5uNGFZ:#tu`SVRXaؘ;vҊh|"m[{q).*dd$]  66Q+WVK{G]aS)--!9)m$'%GcSN8EEHHaRSS&vDx&cc2ɹQ(-.h4RP!?/L;fJ߾EQظnmadY&.>kl,?/~RVZ0G#_OwOYYx<N2gph< 7[Zj4(?˿'΢ ^OgW7]]]L&RSSIBrr>Lo_?99ٌ;12:Jss JFWw7$$$͛Pj!#my[Ba::IKMh42rԄ /'4Fv[zCCgZZf`L㌌`&5%1\.6Aol$GrrM76<*n彯( >/:l}?LٻC!0S&2ŋ!4ahSV ;kTUK/<Ǩ \sK }wY hnis2y&YV࿯ȼՃ2ehj>3O'-%!#;+ۊ,E䋠/)66sj')#FQ{zihl$?7X9Mz$  LrR _A#" cD~AAx/ A1@||;wN,pʶw;߶uGq܅qssh n,x}=nV_ٳ_£ŋ\|޻_w>zں:=H&乗 m\\J~oO ќaY& (JF! eΜ;}l`0(9Cn'z`E !IR$׋,˜:}ںzN''3~?oV!t+F_/^&rb@e>7Gd߁fw/Q0Gg}ʭʲ墦_0?qq+-( ^@ pz{z{m燯έs@ SEQohM'Z߭C׮s wvr:Z(|׮] /!Irrz=fNθk`0ٴa7[Zr mK.WVs)j ֭!..W_Z̀wZͪ'@%Ih4:8t+/k7nc-G;&#=g7oq —$I}kȲ̺իiyaYb9ettٱsgIOKꦵss_ `0E )*,dۇYtuw388ĖM8|(kj"}عrsrغe &'+*G8p##|;ߡhw/B  /7d]ZfsQ\Ee2ӘRYIf^xn+FסhPx^^-IزiOnn.lzP(Ç$eKJL$//*rKUU\´SxՓy 7`֭L:1urfOʴ)S9s֭% 9v$]]?b…܍;h4zr;btvuOѣ\Bk{?K~h:[$Ib3ϐ9G[) )TcN2#vsN3[>u*]=ى100I(ZΟϊe˨ohRULdEjz=SL˗K(Ȫ:o5z$G{;𷴴 Ņ(J $ ItVxR ?/^YUO>Shn]"˘L&RS)*,d``P8JRj ++Ɉu*JIOKd\NIN!-50vh4 8bL&#L:׋>6Fvv(CI?0㦳|ly 7&RIOMEebcb1Mdfdb%KJJr2*X?o.vmmFʽ[}~w(/C2}T1 2<<붾FOo/))䐒|cqqLF23ZN `2(.*b13pߏFh";V ?$  ")w%U%Itr jjk x<^L&EEDcbl6f"C$Ea#L!W7nd")1c'Ng~:;tvuJ]}]]݀V,k4RW_O5^OsK 3g̠]{Ru*3Mte? + c gwޥ)9[uIɔC^nii Er80E;r(.*")!"̚;mc5d`@A~IIT_XH} 7 aYAVd²lB`Ν_$.]̑cHOcxxNNYI1ӧMcG;~TR]9ӦFFFFG(*( j% k^-YLOo/GgJ}???$^{->h'iqi>_4{a~$}N֭^EZڣDOMMZ͚UOQR\LXSR\L^nCCÄeL IINf``Drr2}ȲJ&6&B3deea6&~$xrX(nTrs)*,n388H8 Zc2S*),(  QR\DNv6Ӧ2rHnIOK#+#d*Jt$&&lmHM#)1qS㡭aFFG_H& 0[Z˯7!,308"+ܳZ͟'ݬIs+;} j,}){7ɄI\= FШՓ tzlXvH;~AGͭb?s|FG_Q#M/}8RUU4LgWׯc> ܽ;ʆ,>M7oNqA=|(.WtuwGse~{z{{v~BeZZ[ٻϞٳj0W !d#vyocGFrE?ua._3_}܅\ŊN8u ܨБߘ@QSKA~> $sfC 9q4*WKm] aZnQfמ=n-YFIKKcu*̞}pPQ^꧞uxwxoMF.ZD0ߧO=ta6_˗Y|\t.ӃdfY:suk`mF?Ne 000SOzFn673s{zYl)I:r˗OwwkV=EՕ\|D֭Ylܨ%+3kb4~rP=ǿR>vqIMM%;+SgDνO"##՜=$IQA]]<pNZFRSOБnRRSYSBAOo_o$D"[?9?̌>Lrw@NƛMeUWb]8*+i76FEY*+*9~$ L2Ō(nN'{ƛ7zY9c:>6Fgg,Jf)T{>INJfԩ咛ɒ4g,4j Oc!6&7y7jع{sgf9* xL8r׮3,\0ʊr;$I"';DǿB@3gb0HJJmۈ{?N>ڵӧǕtvuSuY'. [" @Mi8},/]  P$t:9YdgeQϵ7Ѵo^:woQZR$EtTj:5BQN:s܅J2::륬 擑 `cJeΡ`0JBQ^V1 x<_K 2*+HHH`Je%deeĬ30M&f͘MOx2瑟J"))̌ V_:imogll FC^n. 8xI^N]wlLӧSVZ##=Y3f'B5JeE%RSI٘9c:iihѨcylXnVW˴S^y^ZF'VR؀Vet?@cSphjn&/'ysPZ[Vf_1X"Ԕd{zimkcll VK{G':E PTX^CJZBIRiii͘}ϛKYII\JJ2IIT*FGGh&ZhZ232ZXv\?@LL K/b۹Z][<1q&R ᣜ:}E\ӧCȟpYX¦QTBaݗZBpbb,M&FFF9},~ZZhnm`00k ~oGߏZE8u,]]\|瓛MIQXVF#sg_ٴa=EdgeFC9otN>͢ DAAE@Wd9\ 9y4K.$&&k7jv ȸE3AL2} imm#&BwO-mIܱj3{FZ'(+9>+WHOK##=iSHzz]|k.\$1FZj*5u@oK0}+ $&DR9rhC" cUWhmkV͛͜=wxf&ep(|l,GN8FՊ$=z?So}na6?wcX0YmtMNVttvr9>~ݲLGF1}:xn284DFz:ee(LBaR9s] 2X,fD( P‚l;ν 6*HHqv$zoh$%9)ANNqX;:̤8+͟P(l&''ZJİhB?}<mm/ JVfiqE#I,˟ʂte ?q:ߧ&ôBlLAҚ[Z+DRb׺}£EQ\n7sn1/tQP&&dYvy|ZO~^^e4EffJEՊ^V)*,|h5šj}h :|&ntۓ Ơ{;oEQpFQ0^[t|x0X,?m@w$aX& <$jZinNXA#" cD~AAx/ EQx&?,˸n -pGe6- ini?餭㎴. ucӋwmI{Gv;/UΞ;s|8~`>44o p%vk.AxA{zi!zoK%w``p o( \r5?7;~K/Ru (==^}[ezu ۄB\u*W?f}tuwG_>z> ?F{G>99`0UȲL7~KPM1<<˯Ŷ#ћ:\B:s|6 Gp/}[{;ԙ:r/ZQu%~?/CT̚9 VBu 0E\rL$¥((,ZQ;: ,^FRST:dH*-dgd"bcb/388ĨNEy$K磩&K,ݻٽo?qV+ g5+ƜٳXl)_ŋtb[Z ̛;$n67seZZ}>]gT/^ɕ+"ǣv̟G[[;=,^x}> \uQRr9w"nNG( w))*̹x^ϛKrRg_vGYi)/^dْlڸP(`hxxCPɲLGg>eKr7y^f͚{>(f̠qz d2r5uuܨ8N'ϞFʙM\fYshmkի$%%p&4ud>E!p)fT]j20{ҒQT($IGRt6BV}.፷fttm~HsK$WtJr2CCx^B;v0o %I!l6}ܽ'ڇ:ZFh004<[ǘK`ߨ;HNJ<pv|wp7jx7x퍷ghhx`('9y MMlCL&h4&;bЯgڊ7bxdFvEo6*~B8\Ry9 `4`.\Ķ#}T*:P(HfddFHᾌL-YNlSۇᠢ H"IPh,E~~Z-ӧMe |>*(*,l6ގFEQ233X(j~? L@OgWp@ NSs3V52rx m "I`@ CrR"))~g08u i)F|\II̟;xkFm$իb!6&މgh W ʊrlW$,(d"91iS+b1 2 ';$?0+8xl][eB0aYFG qILLd)b6Q=[yyyM/jzZqqsf͜N~^fרkh`0PYQAMm-gϟ'jeabbb]{5sy\|#G+-#>>lRSWOCSj(/+#bC1wlFFGR])o@ ӦM%=k&55摕I}Cή.شq#3O?:_ZR]$fLε44DV`U^xn+qwvp<.]t*++38Nࣝ\z58L25~Ӆa)/+%99UUa2}TdE446hXjU|2p))(BkkF2T*ewL9NY&/78ӦN3<ц8ܜ>LQTUEEYY eχ^CFeeYE&e@ VEVy%E&*BOo/}̞93rw[NC: 2.wb Ct~JFA$nW bccx|Y>k߷[gm{+/t8& PUmFFF/|;/R^VPL"}O[/_ԔŰ(~4m?saJugPM+nst:mh4h4; %I,<|ww ᰌNER  ݷnp8h4"IjߏNCA Oݸs@ wQ@t:,5]wjԇeU*n@|"Idfds~5:h5,fx* /7 NtlM|V{ol[_ Z}5-7n(8f_O7JBs$I:$Y}7 ws/BVV{ Cikogph#IR~;V=ݫ 6A 'l"2 `'==s<Zc@o6^Of§T*HOBљ|A+'  6vǢ=`|B^QZ~o]m8Xlp݌o-˅TgᠧsY(/5c.kZ^ëw3p.]̺=koo~{zx=tuwG_ \~(5u_=54򫯉<ۂ?^yqW5kעή.ZZ[P}NdǮ]_fѵw>_~k^~5CN=[wM71B~RRRhoo'fCR؄(r!PRRLHY5\. 4dgeRVZ@k[ccc &PS[Kii )2RPW߀s| ::;8}7[:o~{-]s8gϝ/@EyCC\(LqQf!jtNg'J`79vVӦq ^v %%vnBA~=nz=EEhZ::;Bk$%{2O]}=>24 rnOII1^ZZ[mK)U;\ʼ9s͛ di)lzzVQse'4$1WсdbxxFl6}e0wl*+*x7c>FRR( { @lݲv&??>222HJLW_#66֮^EFz::))dS\XxG]0 xo~KJr2S*+8x`CGg'+/hdlA(by\V_ØFT*ud`0:{^^xn+W$f̘FA~>,344L Q;̏p{s׃,hj/[w"`I}ClhEQsqE<{dYb1iټѱ1 (*,d30\͝CyY9?KšVٸa=imoБ!~'|3fsEQRyB0{LfLμ9sزi4Z- |9"G#3#,\0H;\.N9 tz{v ;wfhx kʍZ ܨ+ OoX$1wl w_z2}( FǧӨr@ ׮Q[_OVXFHrFL%"ghmkd2M] FNcJ*ظn-:6ة`. N굇twuuXc5U1N;2r2rsx a$4HHٴ4,f3xwbhx3fp8 b0QIZ VPTѼ7jj=kz`0Ęc`0ZFRMF(~$ha^/ZPdǃ$Izr;~AL\RߖJ=emhxłFL&^X, HO'66߇`Nj(h4q:8ǣm.u|}z-zj5w$lRYRox]n|>?'myݢֿl2`{P^VFIq qijp:TVS}:W^Iby|>tzEINsi|>3Mf¥5437zȊLvfI54`Q}O_Gll,5uua6IMIa֌||nܠ ?@eE:6̛ԙ$&$n$//#Gt&5u̙='W#ǎIʼ9sD-Ax<MM̝= 8v;ͣKUU咔}skV=ż9vϞ\</o.]¥K$&$P\\ĕjzz{h4$$$zں:4j OXkT]fhxҒbRS9z89 ))*2"```q|{ZYə1LpZ V>LQ8p!-5EQ% b11 |>,f3qqq'EnjIxF#pۍ`@x ȲȆuk))*&11ZM0>6F`0b4Ae> 1~>sn$`_###[||;tz=&EQp{Mz$|+ǞRSRHMIyZӦN XDIVSQ^.] AAʈ/ A1"  9$..Q8J( 6X^S&H*xrsshll⍷},>ڵs>KbbN8~VCRb"*1>jݕ2p8L_?`t$` 1!!-11K_?hA&))ɟQo_z‚^HL|,3::J DC_?j4jb`geB$FFFtȲLl6l65wKeN9Kfް>pEQi>iã澣(T_)?u Eg6=+΢ꦦD֬z8{60׮b1v)/mcph׋baܹFՕjO'||0IX,ş0ITGt`<].hnV.[ƕՌoe?^\8[B^~5 -̚9:u ΜARSXK+x::PI*lț+$ͤ$' ͛0zEjؾs'}E '~=20B!,ZysywN5Ʈ={1h4{^v>jvҋ/騬͛\Q0'NBR3{LT*,=ܼL(bɢ\|ӧPAwOS**D:^@ (ӧ磤?OtuwSY^>F(6FflxQ-O? m旿9O=PIX^V/ghFFGFN9Î]T(WCVɏ~Ȫ'ysPZR~c̟ǼsXh!/j Pw_b <|C`6OKXvAj  G`гnj74~jZZ۸p)Ɍr9.\^o/ygYV|…gS '~+),l~z#Sš( NS ydpF% 2uJ%#գ(iFް>:r:;;Ƃ^o^FFFfjimk'%%ۍ}l8zoq\ؘ8+X,l6:hãVZ }x2e9 qSg())b-_ko_~qVd7GxXp[nk%Iz9/Sn_.̚9%= 艏ыs{_Ao[wb~AAx/ A1"  |+}W Œ9{<\/ֿ__< fu)Μ=w{<}gvՉXt{.GvQ@Hx( n˅,ˑx~?Yeuz=^8P._J_?o$s x JgΝ zx'ʍ\;~ȲD'?gAvE0 SQ|~?ccc\.|>?;.TA;:~G_?@fΝJ ޑi- 2</Z.<n=tv~fqj(B Qqܷ]4ʲr Bى(x<^F}}^KL@?@}cc4!mx<ЂW]g"!zS7;k&v;g]l6ipXT_NEYZ͊ШlnW_C?8@8rd'?N^V,]¯|><^/+- Axm ֬"fts$$|H*==T]J||Y||0?R̸ERbcEE|ъᡐ$'x^Xftd@ eKymh4 7=MvVo.#3{u||P8̼9sZY˪'1[6{>n6c0x-$ltI{Zp N:}i"0y<WF),,$jU$Ib`Ͼܨ% ihhh.ǠGM}o000dg>$ QXX- B?q^N:M|\<ŨUe? T*֬zӧOaw\1}Q(0?J54Z ˖.!11V^zF#mmL1%( ٳw}} 084DeE9?wo`nDRR]],^ kײ` ¥K w^$={8~^b6S^ZʺիYd1]=ݟH'^|8k,<3T]d(l{YfRTT_zg1{Lϛ-e!ްӧ]9z /sV,_zx}>v܅N'5%va0>u o9y4K-GQR\ G 7lpW6OI7wE{%WdJJҳxBfNƞ}HOGV{>| ?Y`##;DFFF#^ϲKXt m\fhxE 'P f͜δSذnQ¡0Jbhxwiî={ɩ7[T* Q,#ɋiyާJErJ2iittt"I~I/X{8sGRIdefNyYrX>6F  IOK# 2g,NHyi)EEa͝J ȸ#b!7' (-)!!FZj*K-I!#>LQ'2X,/a' cp:??Re8 7/Z ߽ wY& w~bcc?͚4PJ˔^Ght5wKJL/20Eaf*Ũ),SW@]}=_fH;~AA&5(ε_AI$I>/DK AAx/ A1"  ==̘6Kpy:II~jP($I5P(FO~C0dԩ$%%FEa~>ZkkϽk5[y~;ػ.++"+/{|*u{G'GCQVkOԡ( ͕Ցƛ8?''hljБttدmo_U{u? 7ɘ}bdt?D.jo EQ8y \~kׯsrgns{cn]l~,|n}6pSɽ^ݕk\Q^?5޻HoMM79slt@wnܠ׮$-\RYSh56_G{Ggj͛^SCIQ!#{|>V._$I7/ Z^|{ ,YG"I*/\@Gg'--aZL&nܠ@ :Yl)v|Dll } c.x'hhluܽ'W@ɳ[6qF oIGXt 99>jjk9}r8J##=g夦Ɓ>sdgOwL$_*kPSW+.12:˗-C~T*ׯ'9){qVΞ}]~/]BVf&'^ްgRu*l޸X&2\,f3mmXx1zFTTr9;:X8> (BbR"[l,],vC&Yp=:sʊ N=˕kCH*MsK p8LbBo1 ;{6sfͤLV=qX,wVIdgfa0Xz˗.a=4RSWGwO==[K=f)Y<}s.LK`6Yv y9=qh(-)R.Yju53Od28u,5u<3̞5 l?nCaX_;EQa!]=ص"9|WzOoXϢHEcJKdSO:G[) r 22eINN" C{^<7@xilj"fh4:Ѷ"$ ^= 008HZj*Vk,qdefFjr2111ٳ| gΝcJE&׮QR\bFՐά3e!5"5%Ғb222 j{,Kxr>x~ }Sd?#7'p(L-؉~@bb$=nnN6jk\ӦN+L HNJ^3^hLOKEհxB::;0 ?(z, dgeQQ^FDLlL %oG ӧN~E1miѕT*j J"=/UUW~M,7ursrPTHD|\doyo ?t,\sclv:P8+}?yƦH qYj(+-%66y(9"z'?/7چ=>0̟cYpi$%&p8Rihl՛MYhtpD֮^-F\ܜj iiiTV308,̜1BRSR$5%Dsk+P$N:â HOKu z=ׯc>JwODn,wc[|<1rILL J7͖6]FEp{<^,&yy$''J">ʕ=7 I]=$l~߸055%< |SHF tQZR-y_èTX;q,u(,l2JRR3MCQdnxݤ3ohv{شayy\nTVFKk.232(-)l6tZMJJ2u9phZJIJJhs HN%?/5rfhh$J"SDt2O_Z\NBA~###䓒Bo_L$5%;PTl630G5K3цdRSs㡭B!zHNN0MJ`_D8d4j5o0M6W=@կ9c:+/tvIOOzdY硷G;5W^`&9#De((ܵϟٟNv&eh4dge=L/BV`pE1m}3j#+ Xccw=*+i wt/PNQЀAo-&I;f@ x#&, N<% z~}y;o Z@A"wGMT*#gsj{PA _A#" cD~AAx/ A1"  A9>l61l/2;wrU$Rz۴ʾ$I\\tnޝ=q܉t}I")juln>og?8kSAŮ$0 `{L?ts.@$E`ʪ_~Yz@ʵM@w( NG{;\,,-=7O 4]cye:l&N )E667PUxu]`skzH(a؎0loo>EascH8竜( ~?<'nrNEUŘc~ad`0Hh2:1S3Ӭo31=Nz\a}}u(By677)^(Ki{ >p|ͭ-^-+T*?gRi#_iZI64M~Ow*337( 5$It(޻¥,,S(drzk<Üybhd??A\׭5UU+Cϭ*4738{w~@c4!0 uƴLt]# fr/+ͯM$assG ( E=oht&é'N҇loghjh ɓ|'Ikp\ӴX&8yM=~_d2y$I{( <19^m!y sB'{8E8IU4Z h밹E}]]^Q,ۦhI$|>\#Q_W鬬R(hin!HͲeYTEݧi:ulˢ@qid2Tz:SSOL&yhkifeu!2uZZ0._D"7XZ^6 n NG{LMMZ ʹsDOOb#I$ޤ( [[ M+˩i˲Nm۸;h-b~q'0 MUeoY[Ύ lnm1:>FWl@9K(wETM÷3д,|>(e*mp]NqlELK$Iw'[Vy.v؇/w?i9;~5SCk0vQz+ W'p>I$QPJCn\;GUU[ ÷̚{ݝ|\TP)$It1رQ\|$jjny- _\$Iʻs6hqF9t]-fAuR=C4i> :.~_~I$Bb GD"lgYZ^ۗaiijacsBpWۢ( ph$*$ItD#QU7nY mɌOB*<8]k(ZP~I$鎹qS5|>5W BҢCx;C]%ɰݖ_$I'm*Km`T:L$HHaL~I$q费w-w]*:$It/k簿A2K$ImTڐ~I$pXx-OT)zs2s(U>D뺕*MӾҺ[VH$IC*,G=qFhij&/ Ad4zPP+4kUQho'VQ^xAO6{  237mt Gml.V+:q꒵0;?"BB>O0$ hF.؎C!'  )E,\76HtuvQlEz$I{!ivEQX\Z"Np\Gd-F Dz,Ns%kƴLR4>mL2ܯfl4 y&&'|ضMgG Īb$ Fhg-BulۦUkD ۹,k_VK$I]1xwos]c9F0daqm:B8 ^/ I".YGWG'|zM1Mt&sh=B8eB:&ˢi:,lDM Lt&OQ(lmmxucLh4BwWձ8c337K&>gTK44MCU5<4=(%I{þ+&^C4edla4M6YGlfXXX`lbTկvvv:XB8L \\M麎Ībֲ@u@ @*,ddN&'Hߵ<4MGSUN!du!7H9wt$I$I_y,.ڊY0u LӤ`0!hq]]0|P4M|>>]GӴJ@wEwꊢ061#{li!!]<۶1 u(M4M#*.aT>[4?<ʐ@˲<߿k@ͭ-.\($I{ͦQU` Ƿ﬜W.  3 \Jw皦Dv|=+ӧ0ƞi;iݟ5S~@M_$I7b^r)d2 >-+|,G$I|qc Mw2K$IEAS5̢I(B],BULfBx瓁_$I( UUU3oly ޽ih$*$Ito(Ñ.UUY]Y_$I7_4`wKN#I$I 2K$I7 $I "$I$}ܲOQTTTU-M$UEY!7Gy_m$I;ᖁ?399I6=LiCi Am2Y'*;-crr<܆X_& I$Iilѱq<4O۸(\|Ύ  Q]]\G8{w?KWܵIDATOc&a=0( W]gkk@O8ayeǏSӄB!ueI~#?3 ׇy[$I)B*uUgW454?1SzG1@oEWg'eMuuzh/Y4"Nɬ377z$ s>Bwwg~Y4Mook?ܳp^{twus>GpB> m4 /XrHwulAu^zJ]g?W~ d2grGY__Ʀ}iiG?!gϜ5"'O/l'NX4Gt*++ds9'Of~a464H`G*t TEEt8畲& <M$c|bqN-DUUI!T3 |>75b($I̡~EQ( |G;)Nzӏ?N(bumkwG \rp8SOٹ9gf8yx5}W237GUUdT:͉^txNc``p8̿u]^&NM<($jj8أXEmī㜿pyB =o?Qxv%2<20 4559q8|qho#)]GsS\tK4-B]]$ n rP}wmF44M/owbߵ*{Q>"ǯ7/inn}$Iҗ( ÷ǯ*`˲[Na|ϧE|H'lw_0 ]/Ϛ |l{xvai}Xw/X;U_yCiEQrRiv2K$I_/,g.wBCJ{{[e$I$p|6Ũ9y$IR=~n$IU~E$I{d$I$6d2kذa%tEXtdate:create2013-08-30T12:28:19-04:00(%tEXtdate:modify2013-08-30T12:05:05-04:00xȦtEXtSoftwaregnome-screenshot>IENDB`selinux-python-3.0/sepolicy/sepolicy/help/files_exec.txt000066400000000000000000000006161356774067000236610ustar00rootroot00000000000000This screen shows application types that can transition to a process running with the '%(APP)s' type. In SELinux these are called entrypoints. SELinux controls the executable files that can be used as an entrypoint to an confined domain. If you have an alternate executable that you would like to run in the '%(APP)s' domain, you need to change the executable file type to the entrypoint type. selinux-python-3.0/sepolicy/sepolicy/help/files_write.png000066400000000000000000002277151356774067000240470ustar00rootroot00000000000000PNG  IHDRj8pgAMA a cHRMz&u0`:pQ<bKGDIDATxgtv~iw$ AMV]oj%HƭoYkfVkZ=jJߺSyOH#=ޥy?]99y"3##2bGر;7KKKMTJ B&ɜk0^KKK﫫Ο狚JVٳg%ȑ#ږʲi7;s66666663 J8~1X(2a||@UEaal+al&?6"` }89Y/>!Bsv6ױ#y+>u"eV| A '0 Ӂ"O$EDcqnNgHe<DAӶ@A0 p4atXnq\'aIg}^dI0M((xnv;ׇ\l }OG$qI4M?s(8d֝rH^{;;珿u֮XBo 穯᏾,.ʩibh: f4}'00g &qq]apdp>{P+3Ko7 CE;u0_{AꫫH8 d ş~[8Á #1٬% R,_iBw R^\ȌOP]^N4'J]YVF\NeňDb1~~ꫫx7x042F"0dY̫ *2aPWU   @"dlrwi^wo`bt``hpMEY SdLPOIQqgT#3DQrahY2xAIQEMȒt_/Ai @}x{*/L7M660(-*c1 !"h>ޅ(,nYMjў}TV~$i+*X| ?w{Y{a v<GYqk9y}ij*xv;,INw3(`p)Vo226(lwP~oS 0M0hmO,7ߡK "}>zܷi'v2:>,KȒ}9v=@O"8ܻt&q9OMdtbg{jVkoQYVF}M.ק^"]1ME |coaqKUU9[&5U?>p)v:Xjkۅ$I8T`fTր@ڄo$aYAkբ뺵`8 ޲QӤst;`a ~K X_KV?tkWrI+\VUH$u0e%^WW!ND 3O3~O(\niWLJ;0MꥋQӁaX=p*(H TEr!",Lg|r 4Hg,AA8%Jr:g>e3/B7tC#d2Y73267@g04:n>Z߿>֍q5V.*>d7`;4Q i((2n703̯((T8lYQdZ ,Y}NCNteC<~v?DcŢWϲ귱~L>ڳH,iebjL&ˏ^ aXW˷zPχў]NV-" KUQ$G]U%KZyoNeEo?C2O-d7Oa岼\q0(dYZ{4gI ziidžUyOP7o`AD:&i o=Dbqҙ`C!eQک`cs# ϱj:uV|Z8UCEdצits^4Moς(#Ta8ԋ?ӡ^MDQ r4@^ ({wO@@>,,\9UEL=G9r0Xܲj̕^s0MB3>]ׯ fcs0W1+\63Z׿ ੇKx]󜗦YbjPmq|: =6660M /_~ϛ^ʼ-6_r_[}V%"VEQD0po-.H ]ƭk>G"kSZU6w&0 s(_;00 ]oy͗y{;屝 *1≨Ұb^5losq E$Q ]Z\v+aoy"$S dE%Ȳii+|{ ~A78ͩr3m0L.j Xa3~8N(dE31 ( \43oݰ]*H%QA{EA]b$y7sd8~Q/SK~}^}IM@5,ciBR&L"0ngV9W FٷmRUYy]G:ΞE%FOA(LD1*oYU͵Ʌ}-Я'td_'&عk7xX|%%uYoY5{[(UJiqi>m4%t:I&ҩi rmF9J,g5ȲLOo/,[6d&iECGPTTDmMef^/纺8|(m4/hbE:?qa`RG\FFFAOu|c`K~hi\I(N5~MŞPNwx(WGrI8O$;B (pN#cct9sh*& ¬c.0>1qrbG;\7=d2Cf*']h>K\YӴci )$IH(]n|^2==(t8D+,sst1IFf4ٹ{7_+GGEΜ䣏?kG $c#_VvR3M;>|,,^x\DNf߁bi,mx#d8~ccB3rumziB6Cˌ02Ҧ מ\qiOwqp$6ҩ,s{I&ڳL:M("Lmqj6o?bhx*71>1AeeD={108HMu57]!Ҳ`[GqI~?@Ǜo'eKp x|a1|F:˞}{fZ֖fNwp1EaMV^D0i8î={PCqqo6#TVVefA" ~Z,nctPS]-[pĽϯcnEQD4T,˖ELh( EEEJV299A0!ŬgY*4 UF}!@\u:ı'yxڴ>np$¶vO32:slX}\lױsq\RIQtwp8f]Ua0< `br~‹yaddʊkKM5ׯCwt[%"c|sp֖-w߻F]3Y>&" l6T.R$YJքBќCAchh-wo&K4C44Gu^} zz{i8mmyKh,'8t(a]Xx1VX΁C@u5 qN>͇?lg'+W,|NN:,ˬY>>^{-~--; QYQۿ׿=orV\u @4w$ 룾|u<īoA}}_wDQ`:wJ  L[oa& |2>̡#G8z84̟~Hwwoubbʛa pq>3{ECIq Ÿ]n(**4H(pݍ& 0t3g#˲uMyf?,_Rwn\<:l%%sjkjq|/[z]R_[K&ѣ|>Xt)5tٳb1-9rG]umYP<C"kV30#mԑJI|u-G]Qjo.#>z] ,_Xr֮^uk9C&/HOo/555,_Ɔhٳ:N<GEI1L^,^kY==ȲDSc [q8c?{'L캱ٖ_>O}]gJiiUgO 5]7_ 0M>c֮aڵ#Gp9[k0fzzAbhh>ND"NNO$D"x\nY؀q߽[8qN Nƌq|>MOOT2˩YAQJJJD"iG,ZT(U ~Qy00C겼 %%)-)a…8xl޴=w [[ma+W$YfDQSx<_ܻp|Fun E˗.! p d2DAOc|JJd*kVdUۋ}dlU-:yDc1 SCUe8c8NTU\&GkO=~LLN8ɮ={2>>ӧ9|Mxn:ϝc`p49g;;-ZH 4M<'N]E9zm,jm2r0L0H$].V\NǙ3\0h1#? e״6˅䓝H,nkᇈukI|m;l2ʸ00$Uձefڰ!8~?:t(%%Ŵ67s!/EY'IPQ^AeU%'P*"LGŒN)-)E4R@If]74tM(.*r)$eTVTв`o%ې%l6ˮ={mB:Ξ%Lq10az8r8nΩ67c&Y<$ pl?W~ Э?Ӽhk:.`fjjPׇ8Njkxn>ضq4f3d2U:){-}s_UUUrd2$SI֯]Cii)e"+:|d*摇"g~45UUlw @adU8.;`Z[0M Ҷh!M rQ^^cuK/fݚ՘&TW[28s^/]ʪ+,6ivW_bi̒LNMRVR6|4D1 d󦍴67S_[(t[ʊr.\tr{)+-ejzUehx` yh΅Ajkjhn^@(pP\Tı'bu456j\1r!J"hg2&&&PUQE8pD"A" xYIHD<gbb˅ 3kLUUzPS^^FQ(DqQ3moVB!:ϝcrj**q=OLPUQIQQI̫ۢptb˨h[+Օ~t]cAc#Kڬ5 EɯOq:8׽)Dyy9a**u5ˆVHC|*(D ৬իVFzܰM@]kaq{nvCa~#155Ux<^IL^z%sf5LIfrE\W|EbKΝ:|?g霵 +0YO2}\Z]L5ɩIΝ?ǢE(+#^y e藻N.m)~("z+]7CQvA5kxr1*˘_߄,+'ܐE1Xnccyqt/՟sEFpf1]|z])k ~-\DkKM;:m,h,fN9JF2*m/au6% OXJ9$uާjs˜G4?AuU5HX<߯EQt&M48^-et:g*<KҒRJK4κys_q(y[A5۾$ײ\ryi9_XPmT@9k61oogݑa& $h]86Wpc'ev+-66_eiC&attԞ\өi,e7;+6666_i/tY\t:,oz66666?_،4M (x6c}66666/BH`Y? MjHunR.U^ 3^MGxwSIDAKQSQebsȅHRLNM7CUU) [~r-ۘfn4M٬j&Un{Ҭ(]3¯c.F;DKvs>qrފ%xy<Eu!Kb2==u5uَ@2$Hvp̸6LsXF0Ms&X_fq%rsyEMf(rM;{@VвYdY·Ý\-[bcchSii^EmODq8l{3. P\\_/EAY*\ӄ$ eVN>˿9@ib Gl]]gaޝL&k#¬ArGdҸ\NnwEu|>sLMMs)xEЗsqk֬Zɓ?(8u_|?imnz:w(9sGv*FY_{pxQnw ߠuk䟡h,b]Xxq~p{,_GzBgۃl; .sTUV**HEQr1::O~ s7˗-0>>N44lH$Bqqhs#dc1_UX*gY85;0 4M4ur'1[Xɶ;(++ejj?NSc~*dY&|8N"`]׉Dfq iCC\Rz]ΓL$u t]UUI$ q,Ea߁tG,[pIB @qFG4EE!~0s{6?=8?/_s8WuU>;>]Yܶ]`v8 }[ݫ1==t8dddc'NŘdמ}@uU%o>iEןc:w㡧kV矷Y\.{/nj:Ξ𑣌15="+(·u$ID5^oYl)+/煗_aӆ,[cccsZÁB2 x,_&Xt)H4BII aphMXz5$]{?yh??3gj?#JKJ8zE s :ESc##I"oywyྭ|>FFGٻ?O>?wh?s{ѱ1?0U%Ic˗.eI"xt#tPQQNWw7'Nf޽,liO蟲mJ>E*&Ͳ~Zo111A8N' 9|}}DjkklU,>-PWS `fL\||mMp\OPZR|^n7acCw/ :5#y0w&.d"kik[ľEt QYY>G?7mllnݻV8EEm|xd22TUettb>#OL`:vf Lg Jgy8?ɏⶉ@f1 ]8yt&$IG XUquѬ-pi299 PQ^NQQx"A,p$iAgTPP4Pr{h8ۈizatݠI8q-u Nz)).f:fxxAuu5Uephin%xY<:6F4PVZ$vq:ʹI0Mڳ?yEϚ666_=A7Ms!^.QK8a EqN#i݃gݺ0 u] _PUY5k=쭣1K|T\_ťmd+-_wi וSX`-3s][4~_0x6곱 YSK;NJ/=0ͼ˕ka-L #y]69U?&( s;i^ݘK04mut_qvU3G];R]]9TamlDP]_ԙ=ۿ]~_ Uk)lll<0/IҌ#6$b`CBi8N(}Cncdx- L$tbi tgMᚂ߶2;|ԭɈW{ono.wL#; Uq-)7YXBs(NLO+L Lf+ Xt=n{U%l۝gi;6I/79ͷ Pŏ?c:"t8ovhFx4LqQ1@fg+i$ + r'# 0LP.(wзp%/^ V0iB򷱱)A I( $~/A!AWEv' YRHi5 ƛ}VAO站LYfNiKB1Uq;DRY^EQjMg犪L&c7,N&ɇUUsw8`EluEQ4MGfX{Ƃu칼Rx"+ XlI6wT:>ܲ$pzY[},߭J$3iLS,D(ʍ Y I\Ϲɧil6Hʡ:Et]\I*9W4 Qp|eQP3qEiղȒa^F$q!^{-B!A`-X48L'Zj :´ :CÔt:B1{Ǚ>zo<,b m;>Bܽy/H?/rSZR=7ۃ O=LG(c066ظ~=HښP$I}i,Ͽ+/gʲ0pAPd [Yt L#~Yr(ZuYY!Jja掋>z|?hWo aV>ihoUxp֮|pTrq ,^|]|7E^{M=N tOII1٧/|ǣ/ SLNMRRTLEE9<~V^u,VY|V躞?.H2,ɡ24b$S)%6m%$1LӤD"9u4e1=5*A<gdl MII%,fJH7m `&G7 óDPTT(d:`vHyminY̛7ǎsg;YrNbxdt*M&v~߿7hin&0<22=y` xIF)).(__٬F:=jQT)N'S=\.KE  z(/`xlp8Lqq1EP&t Fu4ML4*Gg|bNQ_WK*"dp܄BADl6Kr16>N,rl|) >ѱ14$ ~‹DevrjT*E(p|ONvez:̢VۺL`xdl&YM#2<2ip8+3O> Wyq.0vI&3iLӤEQH$w4"  lV|vVC@%s '(2W qݜ~wM׭eo019IqQׯ7G5|]Z9uMݨOv&QUYEzFFFٻ?h/?bI$3z/͘9j.\rl'o6~>9$wmIWy>ضh4w󭼚xx?+$I"i|;ߡ A|s'E˖.%sQ\N'( /H<ԓH/DIq1 CΚ =AVgfLMM#qiܽ۔L&yG9xLScDY|7vBb8Ee\N'o_2^D2IMu5xkYa:$~-Y#C0ػAEyZ"R.Ғb~xx<o d-l޸zxzWᄐ"0<|,m$Kd深iܗ3KTExq9ln9ʇ?{ٽo0 gv22:wuy |>T ]4d2–GmB*Xd1eew3=a>7Xb;!5\'O =u9]x^٬F<lFسo>{ LF) XҌ4ndQ$Z&.$L㓝>o+}?pJ|^;]d2uhmiO^@ ÇIg2_/*>ٵ L|7eet{{~y@%EEE.,Dª|Ql9Ro}9Z[Zdnajkwyv:!{^46~ukV Xt)R 8>O<KJd]Y}$I9_z'L p:x^\.aO-xOvBq"h|MtͲ4|^/e;~s]8N>t-73OsT;SգGI&$I*+il?麎$Hd[|f .u]ǘ+++Xv kWr̺k3g Q,i[ݛB4t]Ktt%iٷ#ǎqA|F^蚕L:C*Be<ׯgŲe{꺎"+X[aVLL $͒L=VDqQ}4MIL 9L5iRVV?:MM464 }!K[UPUղW T:?:y?30tӴf2n7%%<3,lm[܌YZ8ɐNQTP0C< Y{t_@*.xF8LRA"P0H4p t@V\N'.-0 TEtPU٬ܩ4ae<7Y&HhJ384H}]t!\N'8g t]gl|⢢x"1#\\Q^^(\j0M޾>Lj4M8%iE(ipsϳwng1x'Xv5eeBDQ g|b4š@!! :S|x<1_Qe75=4M`0$)ooSx=&&0 R''ℂ3f5‘0`0^G53q'?eŲeP]U H0Zb cx=YenhzKfcccs@GG܂l&K'Ymy˥+ܾw񘁵 ϛko[-Q/Οzpa2ꥋ(_˕>}_n/Թ>&'(f҃a\L'2ĩS;Ixͷ->\,8T\M;vEZfb8zes7- DS_Ww3HGQ*+* Z  MZcv;01p:K/WW\V+ K {F9Q(/lrƢM ׵5Ӿ{wW4wR4- PYYHZf4iGʴswN§|hKE?.UԳ~r(/bΊWyl\.&/KkW~V٬F3!gYh~&dH$(vn"@VȲtGw., q;ds!ۍ`X磩|IXBTfg0 Qd3LM I}]=%%7;6 P]UMuUΊ N9zDQFǬ5~BAkF]ipn0'0cLNN!%%8#p|666_MnO0 )wi˧?mllnS Qq}~d2c]EWO_~$8Nt]q\zkZp8wvq:qL4b1+3 ,txdD1 ( >H$UtT**ϣ drQ>MtkWBGobJ&nI@u )]$$I$IF$[ Gٸ~۶khhh(HDYY97MIItCLOOu|}y1 |>̬bһ1x<]ۃaTUCr|4{~ǖ-[W?Nia|#Ѵ,`ms[nv|\Is<`jz Yx`<8Λێ+L`6wmښ:RSD6{l!SZZwѧaZ5<imttpM ĉc iyMR)//r_\s5}\!8wCyElY4 ϣ>"+3~H2̬MPM+g6CIq)06>FeE%XT*e6 +rL^>[?)"}/dOv}a͚uR)z{{b t8HVTIA$SC!ov}*C311';wP_[=woA4Eatl4MFFD"n*ʭ0#IyE0<1>k/``0HmM%bQSD"P{IN'm}!Μ J$Rͧv1+%%<\lzG~ APʊJ$I"e~a4ŋ׵֒/[;D( uNSFFص6n_O`͜WYQEqQ1ϟp,awo!JŘ~=\p[ ]Jhs*(TD"`jj~KW'~JKJ)**ƯS'PO[{aɒMYaAF9pUU @Q8}3-_UULØgccyqXϕϡ!S $Nc&,QRR,(iAlIHy#'$ eNQ+$v_/I*"x"J^3 F-j㓝#2kVEQ4]gllD"pPU Q^^q*p:lh 1M˅$ :ϝCTW4A4My"P^V;nw(R\T<t qcttօ0n(Yy^*++ GˆH  };~y[$'`Q66'?Nͩ'q:^ 8,{.Lr{ys]p84o$*BeBesyY9-ttFUQy'8r0==ݴ, |~26E2X,e9y(/@\JSӂ]eg9 l~Ϟ֖4o3>>FYYHI008@QQ LNNp<ҊRP_w*Kdnw+[i$Iy5Y.š,Hc,:TEVp8Bj,˳id2A$Hk0 dI4ͼC;]-ccya&i-ݮ\fA 9( H<+ (Jv@uQ%-g@WH΀00/̑ [gd2k{,]IlYvb:<3d2A@Q,͋.M2}էa8@B_4zzzw_UU/]B&\׹g-DKUYe|s9V$$Klcsr;_mvW>_߹<+]{xd)֯XK^1+$IxuNŦOb}'nn Yw'KֽB8@BI AVLdJd..(w\s# PQeaV~ :xfe,\yT* Y!TVԹyfE{[|olmll&|d.EdQ UA>faPi,sHU%^ >V{%Z+?dM! ֚,PnkS#Nh ״K(VZB#0,#0QGh(q䏙̌s #XTٖh襱AV7 $l Y<7}AG!}nT8i*wVb<޷q\徆9zkY&ŗr 0"WڧQ~4i.wrB?ȓ˂{|3+C,uͼO,rºa~5 Enꐊa\Njj|Ajg ~IDu r'cQen ila2ZJ5f]UK3dΎhpM2cIg.K:;FM^BqTI`ySb4e{G"pW"p'NxCd^O (lhH;;w-sJz<+N1qQ|2. RP=I:GRlhR9(z7.4I-"?>D[b(LjTָPe0iL5澅~&Lc(hDJ7 + GRMtq"+ܸUTdwW,uS=)CF3u.nljR-g,uIJNG00a~:lt>0-&/h&K.q͉$Ͱiw65(ɜLrz Imʪz&+uN|oU -Q(TTSVV^(S {pUXP`Z擹kz"1ytIN $u9k<,DLo2CV7Ie z'3,ry()NK@"cpz0y˝<8H_FY©TUdƢOa5&<8@-?a|/~<RC, RXh"E;93$$n@h3#) D"IEBw_`( f25E~H$3fJ32|TҚ3+B49yryd֠}(oυ&V~j L'tIp2Ah&5!M |L'5ܪfUAWe^ 4<{Nm3f8īP^ o2Csen&є΅ d PW}~&֞{[*5fEk)lǣٛ2g1MfA|ι3NDS&3,(wPW&lZcIhJeAjT[ܯX&<nZFRIkD$]U&TUtF%3J8O?Řq̚銑TT* #,]i2ّ4Kj\;4tdeR4&T$YjCqZ*T8N$΅,~DTӃ)˜yYipa{HR-uS_*Kpr' ʜTU Α4qr'Sq *Ȣ@KMd+v0ԬqnvfF\ Y: q[ ,qKXHR'nYUZ2̡{L',pXo2~K9p"zȢZFN$uڇRTU\xTcKsHD4tRޮi 5>Coa:dܪɁ$Sq*$ީaBxSb:sv$E-QPN1ɲE]J83p("iI@7LڇR3e50:uE* SY30uY牉_ԉ%7`ʠfdLHhtD|N1&-Ry.J%ZaʲZ71bDSmG&TU旨epͱN2E}6B,4̬N Veɂ_oKD2މLс՗D Y޼sMK=m-/=7͜S!s*̟yy),/PD,tʋTP(0Ԉ3w";B*gmfO綨xpir[rAc=M4ƲkxKv%OBK̬BKYx)3¬]H7F=jǎL˜opIO0Y!@PHҠ{<6sKQôlz'2eպ>`v{t$dtsV;7̹Kxx/SMG|\+9WXHp+G qJy;r\>:Q#}Npi9޶TD 1ek-[t&g.& ə߯ޘIL@;=@Dh2jy~izHf ΍Zu'N}_z4)RY#?ÿة:(k+S>1ҳ=ﺒLeTܪHKpJgQ ݴTURYnbiy%< IhҷTPUp5/h[|vJdƤTBg ^ز {En۪,αHu&9gKXEȢ>3%7INovz;ML/fNkYq5~_䧨(t]*["]c^saǎW0d27b+NPzۛO%u]g`ptƽ9MNN299uEc1‘u3߱X3 Q"gƥLMMH$M$u__Tu419I8 H+f`p0:χ?؉ӷjB&ephMӮ+}2"J"b:CCd.8G23ŧ=h3M^~}=?1u}y7/;>>1o(F)ze8ν:r4=Jڛo16>~]盦ɶv!l}_"t"K;>ىat=N~K&6p1/\ s1~u{<|s]]:~b##?xcQ,v*,[G˯D~P7MxWxŗy9~$Jcs ғY>/==Ht{>Fc4S]Uũ$S)j #344̱QU5VqXj% rQ&&&Xd1XcǏ# U]l6GHXҒR4{݄:iBA(--a_ehx˗i[d*EGVXN49u#-ZȼzR!tbϟU> ]]]9Cii K8vc԰|R!NjJ&'صgô42 {#f֮(9Μt2^=EŜ(q E`0SNλ!"E!V._U#=#=(+0 $I嗀 `irmdak `TWC0<< /07m$26>N*bak+LLNr!qvG($+a:<3O=իQNG:d2"466PUYɑ(//'NPW[K(4{'ituV\A8T{lgΜ%xXl)o{cz: ɤ3:|EUYj%pI3ĵkVsa%M?/,d%]IrL`eiIVΚ:}? )).Zi4M?q4Y|9E;kW ~]9vK,a߁sצ<㌌XjwU+W vOFYY)d5!8E,%Hr946LhRӿ_9y޾>ځ" "eG;?o~{"( [[ö##LLLb2Jyw(/+1'&etl2 o?{ۃa,˘IyiCCäRi?A<6--9z˖3O͹J%Lrt;u$Izz{H4n"˗-N{i Gٳo?tMMݷ~޻]{2::墷)TEeʕeKwf,j#f,ncӆtw}ɦ ؼi#+>ضa'LyܜYݾ" ӤR(z|{^R?`jjᠩo<5b0+W,c|bo<5z8|(  GiV\AYii9z8ܽy=C@+c^}-,] oJ}ATU%Gc|A A@Sc#5ܿ^(;vM˲AFp><0o^=Fjޛ|7OS\ko_{ơÇٳw?;:i""0xH&zz(-)&J+f=wS_W J.q9TUUr EAUUN:M dgpݖj0DL&Co_5V_QYQu .p߽[xྭTfݼ w\yGp]_SOP0($qNwP\ѱ1'XBqQo݊ (UۍIۢ,]f66a%m$Idphɩ)DQ Ik HSLLNJ(Σ*tMhMp|>Nδh$20D<3fsu]nPS]ܵw??0 FGfq{8s3oR]]癘rvf_5 YF#`EYBMՇX>0J'P((  319IQ(tS&o6SS,] @8fz:L&adt0 u=m&;߇?xVTWU_$I|ٯKEzq{8믳t45* dX<3O=n`dd–4+W,S ȃR\\4lFOoM OLp,nNn̢yk\Qn,n# {^$QbV9|uu;qGr֖yAdY?MkK3/ٻ399M00'vsjJ,YG_Rܩ)4eKhx]7'<#~_κ轢c'0195;w28<̓='Olz,]=ɪ 8x޾~%  r I%Yz5cc:ry?x|Grij)-)a޽HSc×*8ۙ& rr?( (©v.^"imB'&i?x"۲>::ΐL&㣏?a߁\Nke8ܮ41޼^yzVJKJyt:;wbrJJ72 YfX 0p\ֈ4dǏ:V]4CD<7p\($I$S)24'Ii(iҩ4.!zk ;Lrq^{Mp2fQUQ4Qf>_>XD"p:lMzeʥv9W*lCmd \{iK1'YPf~!e{~a~@ 0[-z!rJsiܩЌvc`p~^/ 2d8tjkjnvlln)LӤ`0pv]BfUUTWUl|ʢ ?ll@y\}|ձrmlllll locccccsa ~;[A؂↭3 tכs}p8Iy$SIB'ضƆG?6Z\u^} ~>z˯; \DT 455rIvC}]-LIw|Cb8<$I|>319I6!Jq9 j2_O~KJ@q6_O<bjjd2I:a:ɧMӄA)n"ͼ?8,O" %@E#/]}{Ν]ܞ.ߥ$JED{ K3# 2TJo--9qL;3@ss S&Wqy /RZR=n~[^*'Upa:c!М~n &##stttƅAoŪcxч4` &,1UK```.g6 FaphG9t.mHD~~J~N 񈢈妤N]n7J%)))ӃllX0~*2]]ftRΊFez=998|'OSOR\T(c'j $^<^(R\X:z]a&M"SfoͪJq?ݟ~AD }=c$Zt1F$:dcXzttv"IyE:sӎ_`ܹ؝N=Y`>vcLI@Վ?o. PVVʩ3gyo,^$<^/qatWZE[[gϟbttѨtuwRx$"gϟ]k ( Q]qZ҂ Mh,[ҒtvwTF#xQ;&>.J^bI2&#yb5@Add.1B}CNvsϺu2<^}Mz9$/>UX,ֿ.U&KsK W[8r8Iٷ~ fLSQVFOo/!HKM p23DGGDŽ,..t6|%{zz#*^GͥlݾsQyؾsmdfdR)).ՏMo:DRR"kV7Bհ`5'G|?mmLo3+m ז$t^;wۇ ހj5}<|_\TJKJ͉댛f Df1Ʒtb(.*#/'P( #a=aGR]shnA26EQdά I2bJx`pܜRSSٿ+]]]XXj%uu,]rDŽepQ9c:lߵӧZ}lxQ~ ) JYtI:Hc.}9c:Fn$D^zXnOKR*HO3L ZBVj$ JE("I"Z4NׂRf,JgKBB8YVETz {Ⳑ$>|D  ? ~P(I":"^O^[VKKT^NVf))76ᖭx}>^V?*7Z zFE ;蒚لcGQVZ”*N9ö;3hG8&.I`(`].6ZMrr2:;v"b!!!Qq8F~? 2p:$19E׋, tO\.ׄk5$IbfCEAl6&7qQp`6c5 xHHHP*ؾ |edd36t8M&$`ddNGB|ͦ-[?^~X@0565}H0ofБ&%>Q9~/~|K̭#^c'NM 5/q\ƛD'ogW~SkoNL# __im餯@ @8fǮݼq6$dppp8(>sRfcEOcs3P׋' ~ K}A$ITaX8OΆXλAfϚECSCCCL>_db<u|>1[҂! p8D"NW4lfӃ٫z`~c+WmmA Sۋ5</DID"1mp8?ORQf` ai$ r*q}>44mɡ(NH3OAyahx }߹>$Q]SCդI MD"2ӹcB;Ψ͆JgǮݴ\BrR=Q`U+V(xY`>T*zz8x0S&OZrsr="b6ٳoϜ%=-R.vT^Uf\\KzZڄ^j:% ˜ppmm̟;K˕+n}D"mr]P)U8N^-RR@Ւ7!Oo/bIgtvuEW,%_'uٰzz{ﻏNqy$yIn7wBVtb͙s]k c4? .sϢVcyG8|6RS?Tihjb]x<*+*1јJb:tx<~J% ֶ6!HTyA:ą$dznjJousUnzr줢>N^n! 1\Ο>BGg'MM/3OcZini!..$FGGs xQ9Jo_##k3c4FFh`;Q]S";;y3g|8q4ݽ=RSG"SU9)& IYY=ܳn-sATR*18Nvكf:6e ?|o[oP(X|96P(D8чbْ;X8{\Ww];N~^.#=~ SVZ^|4vÒŋ۟5ӧNa.ӦNG/b̹s\fbM5g/'/7gHIIf,?'}䶜|fgbҘm7:\UEIq> xޘG#ǎI[[摖zsZCnn.~RDpך5$''jP*UZ<JcRkTޠGRh%9)AϏrL7:rsrc"$ZWڰ$XX,޻5HINF$ *+D" z=*nz$"DLsڠswc~225$@TbXh0vj:j/ D|/KA'5%ɇ[Z" ^"IbDd+0%!!aL7ZQQ*$%&bZ=s&ld4(J{F%nx>t:m)I'N'= FD$QDZFRQMDQ$ v{&aN<ŻoukY[or(Rs2%EF̝={pXШfgsI6oƂP* //ɕUs58.؉$A^n.Y$&Zyغ};* P*c>Q];>`0JĒ@JJ2W[[ #$%%HWw7y">>8bt8x<$MPF滈@tw466P(4c'Nq n߁$Ca6~TP($ χn#3'Z-,?BFFGILLDA`lظ̜9`0ȡG2ʌ IZZK/fTUV.N:۸{ 6vZMB|<ĩlٶ^x>&+ {(/ĩS1?D8u 6  nusunJڛob2JD"ObBAUTJEr%qb5?,>ӦQXP@ Z-]088;6a`HMMrqJ%!?sHMNE x줸e5Iؽ#.VWZVy/# ~1udJIJL4~?#*rfwBQ+)  :Jx<\(.,jhp:]! @NN6`8s HGg'$;0M$'?0@G'ysssZ,1[ZXьVK)))4B`xxUUtZ0]]2<eaٲm;CCBayM8NK6~wP(Ėm.100g)OX o/cKo'\x?Vv$! zclkkSL(GWw7˼ahni JŚKűr2֭YShljϏ̷5kQNdt4: B^?gcW^cdt4f>m>5 |ʾ]cFv")6r SbJnx :ӧcikC!:\ wnS9iSLfl6N'>L< <( cB:ܱhGs /]rmVG|mXBiiiܵv ;vGQa!*9y ))  hm ^|YLF#]̟ /nϊHOCRaٶsy9Yy8L{G'`%/P*UL(~VzqIKMb`fҧbhZFV Yp%%465T*122EDQd3}T.J" -T*up=}ĥ:&w/`Ͼ}OT(ch%̝=:λA@R̓O0<2ʆ?~:::t2=ȡ1[jw8xGVԿDغ}@shQEbU* Ϝ=ǥZ"bR ծP(d-v*Ys*Ξ'ܽn-p:7=|\J Geelߵ iS>}wYCwOG#!!h5ii̛;T^/_jk+ E,͂Qn yvًcxx{I^NwgΞd4RR\ĊeKHOlx=w FCjj*MML\ysزuCC8]N^}-4j5**hn磶LZ]]ܱx!3gLg9,X]M_?)( hʊmD9}:acVlv;$fŲeGF[A$ZZHKKewra[B&?w흝7܂|=6kjK{R^VJOobiȃ‡[>Ee7s{G))BGW6221SR\DqQ!R*$;; ^R`0`$`xd‚20MHJhDQϼ9s%Q ?@@? FJ>NR !>T*P(CVR/Q^ZAm3dgeCSTXI M4Ƥ /[R)͔=j}dg3}T, a{zILLĒv;6?nR !>AOvV6##1[wzj(,g̙?ysZ9BwO3Ma-MKMJh鴴\aCQ`P(B4${tul0$'%b4n NSqq1@B>ؼӧQR\̬38xNFV,_'bg_l>A.<#c*FN>hArR"W⣏?i{z)*,tEDIbpp+X y\edtN|Qֿf͘Ve4Aؒ@tbu 6[T'N̓s)~1Q$  GzjZ|jl6 *}\hHA^M[pME`ARU9Ҕ*|mXz5?L* ;+O3gL'%9,^Fso÷(76#gގAoVjj. 9p> & xQQUCa?N~~>1?e4j4\Bzz tuw3c_ =h0~abX`iidl6EvV&NOyY) T*| f*A :e Z֬FXE 0c4JJJ8NӘRUj3\MB9lZ撘HnN)d3w,$fCJR2^իV  jĤDZ̙5 %% b4Y0o*d&&b2q8L2IHINHa(J7)X, `Ӗ\4B̌ {\22g$Ix^Xs*򈏋gʔɔ )-)&/'A GT)#++cs q:]T^NiI1CCCDDLHOO'q(aTJ%J4rssl6iddggY3HJJf}W$=-2 =j/x=^t:sffrU%:¤r"1VB^^.IA$fE18SYl1ŋlnpxt|CAFm -[/h$adtKBWz~?u~oY0.,v[_Ɍjt?9?|rgp8@2%Id4p|_borm-8_z،CFv#O/,?%|' ôžDOt%͕Wnn_T/`-É&anbo*/%{֭C$/,@nNg|ynj&  EI" !(U׿۫cRFܨT*ToJ A2~_򘔑fGmedddddn#d/#####s!;~ۈHgf)+]`~l܎|#~ 5TM%GFCcJTn˴wt{^V-_>ocyʌ\ETouLNUA7ӮH$Ś6u*i͑ϙB̞9/4vΜ=dd_DA!Ik눏CTb6n*~ʵk|flݾ35?kVټm]=_O_;wr1u{*Yh!}}DyG>|(|WF|>߄v]Vycz"222^?={o˲uΜ;$I_*V{T[{~[ .Q}7} >N+/֑#G:,vKVF&/^nw0)'磏BTUU&55|p8Ljj*P5wnrs8x@FKJr2j('!>IE++-謝Nmm<: % A pyl6;Et/QXZf-tR)6u }XvBwO7#v?fтLUF{;vva9t(edf},Y+W[9w ܽv-^{?lj>>pD|>_T"b5 ܵf ljnf_U+VȱEN';쥫u"IٰsfDR(JAP*231}x&|<|U˗' oVKrrHEET*AB@Pgfݚ՜:s׋Œն6:N Vd"j!?/RZgx˽N?#j%5%bnuVD"^mcƴTN %%Idb9T*{zjD"RSi@sǢEˉSeʢsg6rd")1ܜ[87=㯭.QXXNc?o.1bH$$I  1jIG"^pE%"cE Ib/u2r UUr*BfϚS#33D8r8gΝ6u*=470cT"0HP(D(b(3Dbtz=u\XfcX?w.kjlVXލ^'5hkk98~6HK45[DT˩3g8{<=µg!!>ܜlJ{ZV._FvV6R؈ǖ+W(*,p1JKj4Ǟ"5ӧka}{~~>F/Q~żsBP`6IINf$$$084 ETGiq1Νk[$J@IqqqqZLF*`0PXO("lŋ̝3,|̘>3B}C#[F6j%̛Nvdg夡vTUQ^VFUBaF\r`2Ys*̍ $'%bAQa!%ET\M¢ (.*W[ d2r)Z^e)̟;F.]eppQrs)*,AOvV-!YYl45Ĕ)3".LQa!V4&1JEy9qT\ʢ^Ϭ1 45իQ*$'%Jt3O=^E~  ޜ:_(쬬ϕו$@fFgVD"\+w-ycfdtAA~~lj[3O+ qoc?ĴS?22737;q+s#!N}/U*JKJ0ݍފ333?7uRPNoV+VkJyL6 >ݮ%%Ŕ|οCF͎Cy|Ogg+/>75]8N"HB| WdddddaFFFZ-q2]PTXV dddddnT*)V22222227Dv222222㗑medddddn#nTGzIOOg~?u \nr(,(AV::@{GiiF (.ܜX9(J2IOK}gMO_/HS%%v&$zL(B$AB Mx}^4j 9$%%p: ?NG]}NB$IUjDI$ 3ofX{QFb``^Gܧp}==dg}ubq\Mzz:z;jfhx42Qn*d/CRTP@^n.9}yzM{?@޾>*+*ěoV2u7 ;w^g$Z=~1oN>ogf>*cٷ>Arss&O0g,AAz{1oJk+gΞ {ٿ22338t55c/'sgGjhjbX0edo_O$UۼƉS CX-N'xxW:eJLn2ouÅ }E|:m?},eJI)B!^{MjikoǠM|ِ7A >̞>b8u!rhP0D˕X˗Egj5m |Qz= ǃ$Hh4 =>OFGmlC^E D ~s_Pp|n Q(Idge3Oc4h4QZ-L"?/~?AwOvpp\.0 cטŚA`\XMBB<(rqfFl6;#̛;N?@~^.iii:[Ux>KK2yuϏZ\;Nvv9ٜ<}b&$˵uՑʢbM Zٳfxh42oũӧeŲex}^3 ֫ۯKj'nwmNjwtxr*6BRD!(J ԙ?Xλ7|9$IBRϨ͆JBQP(Jt: tQ\wv (B;ճevyxg{֭1<< @$ARR鴈H(BױqfQԨ5j:-.\dѨ|7Tlr?@ @k[;߿2{}L[{;;v0FCc#oڄ`@284ğ^}ѨwZlߎ`c>{VRKǛfdd&6o6n$"\aݨjh %J2v/"֨wt}Mh4h5Z8}]= :rG#;tuwΆkh@o`޻R9bs`ҥ׿ϔW^Rm-YY׿O==w68A$ 3gC4j p@ JBs?iByxgt -ANv6<$/>,%EڨT*1M^"3#Ohr]]ZI<Ӽ3s YKFkR=s+/Cb6(,gLmd;HOGP(={? F32:0MHhWR ahhd9h@TqQ:Lb`pARR"e%TVTxBtZ- vRAA~ӦL!';L\iϠ0֮GR_@#/7\ /щ$>£=Hk[;CCCnjJKq]L /S[_O_?!Rs ̞fh^W̌XۧOqZ-. Ao_APܜlX0o.cNQKM ?撕%%%3f0!Ξ;Ok[;ӧMchHJL$/7'V޾>23t\̕+WihjbO+\CTR C!41'CC KFF:jKBBJۅcrU8lzz{$5%~*+*HINBu5jr/גCͥK\SbRL&Dbl΅T[墴Nzz{X,̘>TGYjIIf*J%;v\-\@jJ 8N&UTOkkz'STXZE(f̟KfFm`B}RRRP(&kVٔU˗xN12:‘cq8̞9ӧ9w]f&144LB|UUUttδ)SHNN̹󴶵@JJ 6S&O!"3Op\.Ѿ7| 99ddsJ(762:j#==ӦҌRl6Le$z=H~Jq=ijnfqG^N.'NXYd m/{l?}îic DPĖR$I"h5?Dsw|\w X( N.F% aw6<15~'+p?_2}-\8~0٥AJ%@Qi٩O mStu1N]cWA,2~ި-$GIjU׾ vkm BD"": v$$TF?}>?vX[;=K%hnGA jg-+*T*HߏV^->ܧjKVt?hYQz>}~?Q|y>k}z+J"*pz#Vs>Mh隳_sW/SkFi߲:ݍliYvZ//ᄄ J2FP=ח[>"X.##CPO`2ݾ]F泐AHOOՐN"ꗑmedddddn#d/#####s!;I$Xb EQ;0ۍf6](  ٢Jv7HroP(7"tpN~v_S䢹vB76rD>dddn!|# Ìl`_χnGQ%IfLp8Ev`id|%ϯ8_Iذݸ+8N}ںz~>OrGFطoHD_o#?x-1'?::͡Gbp&nС#c7kWF>Bu565300DŚ/̇x݋Wj[NŭȡGedtt{8"oo؀w|Oe$7?˯Fͥ?{;WZZH[{;z$'%N 99)ny<}IՂ^gddǏ308@IXwt0gL.bw8t z)-)!#=ϕ+W Cb2)-)FR108HgW 388Do_NT\.(2erzYYH`W[[q:]䐜DCC#jb;{V,r-[8"])/+%#=O×^?9==dgBF;INEQafWx \~ֿ?p?3Obhtj "UXp8V).*")11ɳAR̠Q|>i g61JIGgׄEX-~?-c68T)")1+Xիw}^b$PQV.GGgN@iI }'Oc2urpj5*ʑ+WvEI\wc֌X⏌j1L~?jQЈ$|E"rd$%&b4x<1G).,"--ISs $QVVz>sӎ_Ej.]r&/7oz*q\ۿ{֭W_E  0r)DI؉L"02:ʹ8wԄ`@%fr]))M&;Oؼe+5; ٺc*۶h244y~=VFm6*'oM?=}}z9{x?/>,[or7½\[˛a>{I8Nyx7P(|^rssIINͮ={IMI]{DhI̙\g%"Fزu;}7dޜ9E%c5=Ƌ?wc\[oSqqw~,c1+-7{G')1;]i{̝=ںz^ilj /-۷xtvu1er_3st::;iDR1<{_s2mdxXz53O3]t:9~$w]_GzN=!>>FҰX,JMIg{Crs԰"445Qs2>[<|gQ,['{$ %I*s /]9s(,,䙧$?/p8̢ ?~"O{G=4{ 7D~~O?8,;իVKm}v<$ s1Oʏ&qQ;qϺ$CI[G;Ggڴ#HOo/u ش[>y{hmk3$ʼnSHIN& ϝ?Ozz?Kܽn-m7hW?E<ԓT2229TQO=I 3BA\.7 $&Em;).*' /7瓒|H\ZZ*hZZ\t7(/+ ?֮%/7gl=qIFFG $$xo7OzZqqq޳M[3OS}t\4jn7,_BtE7r3000䣣w,`A@T*ULMOPh !"0L  1<<&"((j1!ф劥7(JT*:!xq݄#.2k T*f e%dgeb4c<C\Ѱ|R23n #F"&JhLQ ۍR 144^C ęD""(16[ FAX9**Z`(##՚  F###2jg6&ԣR*Ȅ#h 6ME: P(Q(Qkزm;?x?Μeޏx٧˫VltZ-h4 A@5&R `2(*,$3#YvTGR P(0FP(;fu"G$k)).x>8Y3fcZn 5%eM[`)IpS:SNp0}4v2焼E,]+W_bZ3Ʒk A`dd3ta4y{{ Bѽ{I%c2ШՄaz=gϟ' p|$It"FDtzj`0G$ .^$0>Aco~?&iv% DsK o_NA3V{s FCENG(ON\\<P(hDRxZBAV_' o, P/#s;Q+p>جvV0 |~?:_QR\̼sHINFVG?EE?Z\c4j5ZHDDӎMR%Qq( L&rm-7?% glJF!Az@RF+_r2̞5At/F&] z0P^(I8U՘M&6NO||$MhW(&BP^vP(L\|:f0p$fߏh$LLf=?4..Vs$ ))16 5iygkM,R}t-3 qlA@NQ џOIZZ'ZB=VvY)7̫b8k&M=I>}Xڽ_kZ?~OKM4 ʽ1,_l6_׿ʇ~c4|9ftj9^ϜY&<_`(DJr2S&WHO0xBA~ SF滈 $Zə i":9fNp_@ @qaEE}J},8ާ`(Ȩm}]FP0VoudddnATQg/G|c6"=-&22_4medddddn#d/#####s!;~FH$B$y$AŘJMhGA  tFUE BTlO"H4LؿEQ (tX] B רjDB$I]' ""UG$`,ܰV}Z#b}ca<~4B$ xnP,bdtl9271$I"7 P*T*ox$I" (q>q=~_,Yü:re8ygidRE9k=~ΑAoBzZO6N3g9x0S&Of`p7׿Þ}8y4CCCG4>.\fgcn];qIV'Μ;DZ'N'ĩS RTXZWKBo-۷͜<};:hrӦ"u l߹+_FF櫱evO@uшm==/4CCmJ&:p 1ъux׭f(݃VL52:RAy/^1gTDQdマy&_lbmdffV{.ؾs'ECS{?,|>=nvK0{L'N۟5.DH$LOO/~ΙsؾsO>(>& z1чojd^h4  288KPUܳ  z}LO; zx'1 ש(/cre%Μ)޻bf7WrRǎw*"`2227ASK .REFz:\O^n˗-n'p8#43 Ck[;mi_C$GFp:XV, Q)UAqF"H__=4_ +# acf8qqvT*k~zQ(232P( DHNNDvV& λ<# ESaxdϏ#++ oܹr9ӧM.j d˶8.}AR G?(f``p$BOo/@0v1<, ip:b2 Ii"ܴW ϝC_?gΝ̞9B@P'̚1BA~n.ǎ`,?8. EI*\z.֢T*Q*tuusʅYN0 M&RIKMEQWWF;;e/# D8},]]Ȫ+|ֶ6 CC74֭<||CC AzzO=?G}}=qp6`IHeK`BVJ.m;vbc[68hdpp膎_B/ RO~C,Z9gMxw %%g3gqAa'I9^[144 1^O[[?\\;n:Ɍ^<0qMTa21ͨUD8N'Ys*9w6P1Ȩ&Zh2~0222QT*wZɏ^zÉՒ)S]ŋRVZʏ^zN'oWA.VW3OaXƍOp{<\n D˕+%t> :&B34<Çk? /7'f#='''`5 ;@~?g& qqyA~ҋ\ȳO?ŒŋhljbܹDZZ*ATa28pA﹇G~&M|Yf^WԔ͙ây龹snN #'' (8O())ч$+33/D"a<$%9SgӍ]M6uuz_mYX8>@I= ("~f͘NyY)O?U, $'c8u sDRȎ]2erL6,Z EC%Z qqőPYQe-L<KB`p@ (T-FQVkP(DQDVG' c{j*f1=(g2),(AD3±WR$F D"T*{_I8x0M-deeF( È`0$IQjB@ @0h4ns$s ?yVT( uU( J%5.j{oJd,_tlH@ѠT~rIMM܅ l޲m:Z0= V|=*u̡jTJ%%E?p^Ϭ3IHH7ч" k^.TנXj%`xf3@Ɇ7rG ̤%|~F2Ξ?2v ,v?L[[w,ZD$b˦[HKMextQtvuIIL:FB`=~gzɑc'x駑$w{tV,'l[rsrXs*f͜w6R))).K@2j[- ƛ<,[r'NFR;Ցz심kvKב?!GG!D+WPTXȉSrv =vA m*lxl2TI $9));ߏ >>͎5CCh421L8z $$I bXp(UAıv!AAjjJL`xdո=qmﭷ/ݘj !Ih aHNJIJ~l6iIIMAT208%!Nw]x^.cחj   xphDIl2(6Ԕ~ߑŒ('>>G{GG@]Rb"==ad2b2F$rItrj+u\_!FFFXZcd ^otRՐ!%9R?`xxHRKgg^'yttvVkbj}}D"222FGIINHINOFzήnN'))ɤ$'34<;`$"D&-58{zP(dfc|>-WRFzBB]L& vB4 H!, фfQXP?JH'==!IO /7'f ôMX =n\r_FFFN$p<,^] ܳ|~G;ǗurT  pǒt/]*F~zeddw(ott"edddddn#d/#####s!;~FȎ_FFFFF6Bv.BЗJ- _:._2WA|/lw8f220 7UR}2jkrm-~}DBBQ Ban76p8|A~?Npr-`˅j;:k? x>@˂kfgL"XE\c׿vM'Bڿ nFdL[EN'n`0k0@;֮̚9FC[[;MMա`6o፷򫯲mNj53O؉aϝ_|D+{}Ll3Ix<|8]Xl1p8~D1*rx<۷O c8 |l1; ʽ_h'?Mgg'a"NÁ( D0ew,fc㇛II}\$pǍۉ% ٴe+3MW_I>{AvVKX[oNcy$'DT^NSs3HщZm| 3gNgݚ5!~ER {IZywp\dgeqlݾQrruڳ+WILCǮ={G"̙5g$ 3{Zv:))I3gL'>.>DƯfXMcS3 p8LSaxswsIN>'w[G 䏿ܴwqݴ2kLRSR8vM  QR\̊K3kΟ1ct.֑M\|tJBӉdG'cP[WOnn6j!.Mʦ-[PUZ9fqy.\ZKK=k&P/ Q(lڲFKZj*[f322KkΜ=:]<͂ys\\K /]Bu vxx*%V+nֶ6&WVLI(cܽn-Ym ^JDx{{zV\ZHDWWE<#;ƦFfϜɪ A8۷Rdx|^lv;w[3Sٳ\Jcs3E,Z%jY0/q`dwwٳ(.*٧$//VߺLVf&W3j!(nl&MɄ?>GF(-.f߁S]S{NnfܴorA3308;RUŨƎݻ@$ fܜnhjbڔ)(A! D#M&Y@__?cjdgQ9C}C#쉖IKMg saz]Zp\|>  EVGRIINAR22>>pQZ-QJ|ؽTU)((@VG  >.nijnl2t:Q f͘Ak[qq$%&V Q)--ѣk\nB S&W҂zl0%$$ I RrmEzΞ;/P(̜П#(JC!Go #D 7) sIh4A.֡RE_Aj4jYpj/_7%I@6 .J6%FU$DQj DHbt뎝>$$23Yl*^Co_999TQxQDH$Ž]D l϶n;VnvV*QUdee~E.BJdgϝ'kyI E8fϣR"林˅` lF!(X[{NFm[o:9~$'99AadBVp|*(.*"=-55z̚^'5%897?BL&I]}'m:fϚŨΉSʢKhU_065s9ٸ=nB0K,rzB0餥IvVfte";‚|*'U FDlv;+:+M?"C"ދDRlu9UWԴ۞>={v݇>;;;gLNtהT$%JDo >3"!@ɒs$ț7.2㋸q(?)*,$ LI!7' f3 2??lYIu:̼j^UU{% HnvvrP  qet:yaJKJ& m[`2l߶wsp˿\X.ggPTPZRRRD pٳk',CFFyyd/%8vRx233acm 5UUx=8];wRrr0 ,.X̤v-_=ϓN'ҒRV+99X,߿$,ˤ\ۻ*<lڴBAA>^GNv6yyyR\\DIqQb|ٞ=dgeGzmEQǕ;޻_ޗiĖruu\'Op8[Q;DX޾>N;(|u{sq‘~soblݼ,.z=<?vw \&4MK[?[uREQb||Cw֭Dhu7E!~[g^u[) ~cۃMpPN3b@ o~?Opԩd>˹F5|8͛(*,Ï?k7n07?Oue%;o#۶n%+3p8B4G?~JK9~$"2㟑McShhlh4FjUUOBvV^ q5[|nNǿ8Ak[;~>9vQ237~'<׈F|\QGII1?Ohims ^{% 8W\Q8vO{gtYiko'5I~^XCo*4 Jtmf h0 ? a?Ě^~F_cLMOyFv?9o+_nBMu1 TUTp \JJJ f p54r~n觟COo/;oXfQ^U$$8AiI1/\$gpHċQUYjg}ŭf z.W*YYY8yWЁFY\\$;;MhljbCy2)iu:vݻBUL&VDssU~'SP “L4`Znsp_`R>>r!:.ȗO3;7Ocjkqޱt:}_狓'9s~Aϳo^N=KK[=JYY}<}ZZ۶y,6I]Ask+##dge3cttuݻʼc}ͱ3@4ZZۙɋryf|;QZRL^n.?!m2;;$LNO!Ȟʼn+>'Ec޵.'$x;>bp\7/@q@#  qزe366 :4lތC^Z)O'ɉ+̌ *6C8X,ΆrZ[ΦKA~>cLNM24<ܘL&d|Q]U $ BܹgJ ȉGIQ1&&&q8HDVf&cclV6Ǹ܄$IȲ`1<<ˇ'V${v?%Q]UNCUUFcr%ѱq^U/ |4h4RX;--0>>t dƍ \40]l6m݂,˄BaFE&gu  3ݍda384D^n.%%46513}cMȞ]8yt:{bnn / Ģ1rrٲe9JdYGR&Ѻz$)`N`4RR\Lyyh$z6n7)))?btt nH4V;Nv;y98SH$^Ǖ՟L, ?8ox<>Gijn ?ݎbasͿ?h`l|Cىj( (/-'l6B_@GWh4Zړky G"_s>#EaCy#É|$E.IDATcU4~.Cx<+5+׮syAcJc\K(qp tvwG``l|tW *:|RSwwE zsزi#X~ ĝj`y壉)))TW 箚vIIq1]==B! q8aٰZl޴ܜzzX\CņrlV+=x^lڄttv df墦 =LLN*[ľL 󘛟 ?L!/'l22zY232p+N$ 6ٲy3~(/+d2!I&^Ғb<ssp:`hN6qZ} UU[sТ$IDcQ|#==-OMM$}.UU!=׿}/*ʛoASIv>^އO+2MFz:h4DZK8)]uA >b,u%IZsT  < d  EQxz ;r ZZ}k} gfo~}WO[A~uҒ$If#G>4K{~~?ϯ~nx0 \z-=Unc\vmC(yw w+Wqԩ=ȱOZܗVE}D"[\~ׯ}oUkOKk\q*2328w^MM/ ‘dd37;GvV&~ H"OopqgJ o.##xi9wK|Kyyǟ[##%uu9--|~$kk]Xz=oI{GW]C'o8u4)))X,;qnFc-U rE&&'|ovm8Nv;9R_,jUxWrp:hԙ+>108ȻP5kwC,NK?$S\THFF:u LOO377<tEv;9Z t//>3-סe@ 立 TUT׏,KzlsG[gF.Xnsvٽg1>1AkGFy"X ]ʏO˟_RVGSLMMSW_OqqXj\.wsEZZH48wS&f^yY X,oۊd-:::tXXX笠}{299bZٹ};W]h4m }t"#`QtӴ,Ts $ΟN!IF[6S[]W. FaA>ٵ0(_K CH +/2zccc4l$77I6:ܰDCc#mv;/:Kjd4)/+*yAK~5ME!ҋ/"Y^%zߨo /7U^<}\~,)NTUAU>x=23ٵ};nwtup4240 7RR\LEu)/cXhhl䕗rxDnjX}%itm[07?G[G;+on|RRDQ*Y\Îm[Vs HbBk߾m+ףތ0::Jvv6ߏ+OLPTTH8_c1 BݳF]}#cdggS[]"׮_P(S룧;"8ڹɘ|_4kڵ( oٱm=? .F]lkY\.Ǔ= +j$IFU?[ގiLkUfjz𤺟ʯuJ|'%dáO+ˬ>Ho?oܯ^'b6Q%Ϊ޳{fˬ]kF,`0g ׷j2Itt?XW``˦M,s_{妿~&yUOloЇD,{g{kʟI7;{Al6󋟽AIKx<. &x?hoqw{AV?_{k&&&ŖUU哣ǸQW$IȲL(7oM?rWJ$suFB@?7 G"rI%IFfcvn&'+{$I*~Ƈ|/v cp|mqqKVr'YSAw #WNMO32:3%v23F4288DWw7n2268x{wNc|b o:x陙)p9dYƕB37733ح6F#xTUl4^o@$f ^/4UC+89wM&N:GqeCy9xYQUQ;IsQS]yO`]l6n6"P[]۝w #n9uvv9ܼܳD4Fei0/NpɄ*wnKOp:Rp8bxdǃb! 3;7KO.uK2;;HRb0BAN!:ۘ|#tuw'ygr:HH$'p/hy~GB; H$W\Q8p^ziljb-x9YXXڊ(ɠ&r+{}99c1faaUQ)-.!B4aSTP$D4h4i,f 6 ټoկ MUQ5p8Httv222Jc,?炙łoK^ntIkj! 35=M X0IӴd/ <:FK8S3<OsK v!Ǚ_X 3#DOoF`0'wկ*t:]*h$(,,.FuX,~?P 5 GkZrnyJמ% H|US !2Ϟf|>vl=b8>33q\le3{q҈+q"(dgett:V%9`AAxID$!a2w=HHaX=ikop(Lmm5˹r:]݀Ħ8ɀW/.m/IXp$;͍l`0*@t:=SB!rsr,LLMFIq8 zt::g^,h¢;F|YRVM ܼu޾>{x$zW&&&.]UTT< O&IXX\  ;:my$rt4`4"/Vb(`#FQGh4&_Ӗei@b%֭5oyߝ] F Xg`~a. XijadH4`@-=HT,AQd=8X މ (MMM_AxtTMU!5M[V]'V+%IZ5B-H@0@VQ7rWZ"h1ꑸ'_[~}atmjb: HHmZk,`k*Nr(jb@ #sm#=o0pXg2<Z #7Υ @qv`^vw $38D"nۧL& wO4&3N31w; v!c4en~P8u$ ͎_Axtv)n<e4 TMK$rj*x|#I.1P~AᑹW ?t3S Ҽ^D(db2tȕr3u^Q|>EA?Mӈbdg'S7 瑌9%_Axrl:%K$$YMdA`*3+$  |g_Ax"^ Z^w9K.'_i9wۯ(JrNV%뱂XGAxr'&Y)+)`dlM(/XUvx.rsp:ATMþb{] HHw$~1MȒLaA ŷGUO$%rG}% Ċb؊QUH4B4%(f̦D`O jԽpba`hX,FaAvX,?h0`/ xIDf!M#$rb1& TM{d"z (wo#YFUe!AQg"7'{zwPU!FGǰ;`ِdMS[\K40L$R9ff$^wZ}#F<&=A]|' Ns?F1yw+/IFGbw5-Rjj#G&czEJr*Օ}sVvHjm@K)^H^7UUoK<'%55 lVkx:??ϛol晽{z<6Yޮ$IH:/u\ MA5Gc1:9ܳaZȠٹ9Jԙ34Ng ~MVV]]LNM;h褺h,>f=}\ztVWGFF:io2=3C}Cٙ,CC(慃)-)>K8&|7|9.]}LIqy99|96aZ㄂A'(#/7W&;++y˃L&%fgz^8xW^:f?){ ͋c6fgg),( +;{q232op Kfٺes񂔨[ue%aZxC:<^q/ |[ŸQ߀l&?/NO _#G8|& 2yZ,永H_&EUey6ԥgٚ.H<5_ʙi<7^~$44HOO,0:6,DQ)+-Ae&&&Ishݽdefv)-)Nvk,tz4M#ހD5TMEQT4UvEwO]=ݸnz=,HIqKUe9<ayLsK zp8, ߚ5%I" q.]B__;vlcΝXV&&i/s F#g}E]}=6g&77!JMHIqxt'&l6'O҆f;- EQhHZ4Npc6(M--Juq5Z,ŋwtɞݻh6$pGW']u322Jvv`* BaA>3qdg37?ukL$jRR\㦹3I<Ǖ" ?JPk7hikedd={v?ЌAArWt%b́cD]]'>_:X,N8d2% :dI&( &19}yvoiX`6tzqdYFe ,c\x\A!I`YGc1^L%IZL/lX NNK_~=1v, !R-32:ʯ-99bp $IeYb$ihv؁`@QU =.RM8`eF#_]uz _h\U $Zu^jqϕ]"FazHD[{u LMPV-A_A6IENDB`selinux-python-3.0/sepolicy/sepolicy/help/files_write.txt000066400000000000000000000010671356774067000240700ustar00rootroot00000000000000This screen shows files types to which a process running with the '%(APP)s' type is allowed to write. The description should give you a decent description for what the application is allowed to do with the type. If your application type is being denied access to a particular file, you might want to change the label of that file. It is recommended that you use one of the types defined on this page. Note if the label of the content that is being denied is owned by another domain, you might have to write policy or use 'audit2allow -M mypol' to allow access. selinux-python-3.0/sepolicy/sepolicy/help/lockdown.png000066400000000000000000001426471356774067000233530ustar00rootroot00000000000000PNG  IHDRah>gAMA a cHRMz&u0`:pQ<bKGDIDATxux7% /8NfMw•{eN9af&c;f~(:6Ik}Ȁ5}Cǂ88џrIA4aƘ 8B0m#!9Jܕm۶m%!lD_qjB ~k(?rs;` ڔ3d8bXVce醉Юʊq4MӲxwB1B1 eY0i$PX۶mI%Jaٖ$stƶ6`w/E~! {P|,4 mۦinYzQ8.3g-\ivӂe+| I"Q_Gs￯tHkϜ=;o15]g!k. a BG[9WwVFT!˲aDdǟWT("I"ƻ^4 eit:Ͽ[5d@acs>^}뵗s 0mYap!@1 ô,boFZaݵ}oC#lp,^og=p󍽒vрh4tCQU˲ ggvt4Ʋ`kSS:ql^i5Dc@{gMW]:mrUVO3򃯾_x+;+#-Uuc,_4p+׼k/:eYeY_QsA}~75)qݖmrCz[,>Ȋ:vYU_y#Ə,AhyM]qʢk9e-7~3wAM}C{gegꌏ>O 66늋ZZ<#syݬ^nݢP~%BYQFpə>T})O3\b•gΞXs[,ː89l|||苯 zys:mO<և񲋦D8%suE{>Mw?ݼEna@TV=wߝ>Bxۼr$% ?{=a) F oJ[1c^V`Ū7A&~_y]SƎZi5~\4wNtV[bO\~iIQYSǔ߆mcCMHmRu)g0ƂWUo/;lϱ<cr:>8Mn@jj`6Bc93چm+8RkGiPT3N2MYU%Illimhjqˊ*ˊeI2MtS>/f&h#aC ?-quMOcSuӰl DxyW:WJm576iΰ qQY)ϝ8zef} ) c(._w?S/`!}l<|ڡ< w?W(\t)y9յPruyB$N7rclK! 2]NGVzW<{OF䤣Lu`r8Bሦ:Ͼ\aӠ~; D7 Ͽ>˲g>F/iY2,q+'wEUYtUS-e@ѻFQ'utf2}wv PX%1vLL]{y ,k'K>0 CC  ˲$ hn|Z.]ilB<ǩ2mۺaוCafJmp7gY`t0߫%SG0r8X1 j7]yɰZڢzX1@o`gY6*C2MK3b ô,[lۖw{ŶI!%1m۪2 CceUeym+g-  d$ ' 6Ʋ,3 -El{5U8CƤںi"}^{3i84MQ࿘5{MdB!uL$lUD2߂=9P[?OcgYbG1 71 _bI`Y4-眑@Ϗ,$ '> d^2) `8wR! #?+s@~^$۶]˲UUt.бPbhà0M3l`wd!Q!?yPsp=!Q?0$$!} sH0bBtwb1^%iGݣ M+ض}8tBʢ}ԨQa0\Ce%&$[#!>q_{>].DZ,|POKn^x }2]8<<40Du`5X!d1޶axsB]ӻc8{ר*?oي]׵fM Bi[ DqK7o?io&0dl/i+@ƻ@hA~2Bxݣ~0<ܺMD Fueٖe!a{An/QL[!]WTV +-Db@Ic^ mB6˲ iff6t~Y?lF 6tQ%mQ?f1fFV41 '9Hxxo۶a/f~}gN7t#*˂ e0aeGwLJRRW0vt]r!m{W9dY>tm`B'˲hko=w02 Ѯڙ:bĖ`0+;c( BHEEQgXֲ,A/KKK-[t9Y YMBB5M v alY\n}BB|>9HŲiZhI,r:?̞,SQT\.+[Z[7y905]$QwDX8β,mJBh᰼B]ؖK޹Ԉ&;\۶cYiniX~)a̛0r l).)=|' yM[6u# {kM2n/g~]U]¾}K|>͒MS)m;>ѧ KJu_pGzbڐ 5UT5??#꺾#vuu-Yb⸱6oݺ(#==;;<w˄Ǝ^jMIiY~^qc7n\ZV.+JzZZ0*GqI!$yɨ@@2,˰+V;jd$9ֶMu9 ˲-X ׮_5ĄԴ!}ŗn3j3/ڲt ^{'뗯\t:-lwB('+59wngԴc(*aXeY0~} N+?U5)kn;k#臟|>l萼>}R xU'hIu ]'͚=g%Kn)9#Bϲ !r:Vܶxʤ6nYqK0}TRb"0M-}13O+Wr 999,._nƒ/& ߸I׍ƦƦ;v;kNe4P@kJ nj|ign@mWm{;o}l khl:yO:Y?njnʈNyVEUKK5M}# 9|xvfְCrsÑ0eY^>ѻ_ѻs}vPy!0 2gqڣ77ފп߆M++F q[bGeBB\ӯ_AUun>!F>y}z蓛c&[CA,ðA(IrWL7iSǏfc>j`^7m"+N/*.)wRS %eeƏ=ȩG=j-[O<ؕkֶ="Է oZj,!˧Nkj$%YGo~ _u5d;=f@=c,}MXGLgy{74=*w^}ͲloA:򈩗_|qrRR[[{(D#]]!à 9$}^$fa$Juu <+ǎpђֶMͩɣF ﺺBIZjssrǐAN;Ă`0D nFeY5Đ"bfa"c9MӊKV^a>.Kf(2W<`@aVF0CJINRU-1115%Y^ƻX4P9/ Ƙe5Urr[o+,6u(Y_. Bߏaf;.gqpH(I$m(bY剧8NAmv4$tF"]=q)D"NCu۶G("1TUpmUxmٙٱfywݶmmg^x鴓O̴mr:pxTUD#cYp8,<PQ A`D#?AlX]NCll AIA4- ,v! QEPXQTzn5MDcf4}nD˅1F^GU5]I:2ٙtBKCb-]dСcxH ^[[;y< 9v/^o޼yooaT#h۽t^mۊ!EQ(vvvS Bd0L(ԵfWKӆeYVGGG\ӵqfar Arc9۶B ׿Y iZ9Y^ Ȣ=G `4"+TC#cB Xw-0fОӞmbi~7`whcfF;`VbBҒ%Dۜ 0שׂ3 "q\aeg㸸8bL8WJ_ax1n`xA1F.b‡83 cN///1kd⮱X70@F+ ~Raߣ@LVQVdT!dBHm ށĝ_eY@0H4B41Z$2|+BNJuHںz:9=-=%9O~0<\NeY*PWB9) 򷁼Yt8BcSD<&7mT)6f0y2)܄9vS69BÇ7Pi\ S(JJ?B8S(JJ?B8S(JJ?B8S(JJ?B8S(JJ?B8~!1mL7v[Ew OȁP(Asҏ1t C#?;cA\.W8uzĄ}C}aYu:h B9X(D7o߫:=츄E4!daǑzHc-9g^ozy we斖fp1G''%wsېBPbG]EmEE> lܼw:i.IIɱ,㸕V? /<_i UUmv\B !dٶ(~;;;^}-[ȣ))gvvHv4*ʥ]ߖ_u_p~vV/񸯻jU^mۆi_~CnnεW^6 4z .\$5995%c_}aS.8u6p={?o~ޥ_q@`ơ{H?w7 0vw}WO>.(O>Ͼ {O:ԔoܼNMINr|%Kyus,/8W^cGq@UՔ?ƛoпn6{iۧz/qwf2˙_o/*~S&M=oi^|A}}oLLB0ܬ\b/=աPw2lgWNMM4mqgv}ͷ 8K/x-7mʔK/ߴeK>}r%Q;++;;縦P(ޮBjj[{;qO<Qӎxf8wo ;w-^7+3v,Krxbc[27F>0^zirreYdeَ$QWZ2xЕ]$9s} qqq,"N8?.s 8#UM3MoA~VfFJJr|Ǔ'woۯL>99٦i)|VffvvNe_Է`! ;zԈF v?!<ПF 8BP~'sq\쥕ZZ( YK0$ W? s_?mڟAWیca~ȶOyP6)Bs8hgYa{Pm۶1Ԁ ӌ%$4ms|y}C~t_ePOrc,"˲ݳ)?=+ٽ{ן$M̹hݤ٣=߫SkI~^>`(*B2e׏ 0M4ͽ[[v!Ijw5лS(KBɈ/>SϾȣH8 i(AlYxĚoMc ;].S0]tvׇ۷ƛqcw%A"@7oްqۏ>H+-JH7MaP(BN٩( `Tyz<׷XQ!9)L˲cO74d[vw$%&<_]Si˖8II<ظa&QeEevˊ:$J]=<İl\vTWo޺5.p8MU;iM&$$)g_|#(7911*uuuPrY#؏ $9s:0^G$a++Yo/.V^3$%$^I6oٺsgeYx557p8 ,K ysoaZZ[_?0XlڵW E;e[mSU5%%eU'ܬg]t¸qos#aIr,ZB0Ͼ 1Oܯ ɲh>‚>!#ʊEɧ9KJ^A𣲢]<}7뇶yEU̟?bЯ?R>w(ncKW_#Xީ[hcyEKFhKKQӦK/bjj'p}瞿K~ŎUӶm/D"|1ӏzKJlݦ7GUӆ1QU=::;>wn/LO%o-+ 0(7lx-6 ?:픓j投G|ʶmUSÑy`vfVgW[F._1aܸG|j; ϾKNNBٸiӢ%KNלy_| 79vuvuy=̭kh  ;;fϛ7u>l֏1=a+WɲܼrH4Zد'|H$zRB;kky⩓?n…?ΙwG"Ͽ*+3#--0SS+BhFB|S=:d|_nnn;egAYɲY,r7{E7lzn)'=ɓozi{;kk_y}FGG7}C ߽߯wܞG44FCBEA,+j?>Gt `8i^a?看?o嚮w'kUU5  &.?v=w9M‘m[e TUC!۲0H4j&wz!3#CQU4#`IӑSEUm"sB˲dE `$00ׯ{JKM5 CӴ{UU}9|/bVA~^Nv=XYUu)JggeY"ׯ"1L4MEEQȾ;ۆae4mG{7m "?.@`۶"+YV$I#p8lZ =Ba2`8.cGjoo2x amWZڱӧ^vdj,cF1̮Ų/g~ b `N=$EQ-\m{ƻf}W^⫯ᜬl˲2y99VxpFFo1bİ^zi},,ܶ!Bˇ c9a0P蹗_^n]zZ/QG V\ZJ~\(. 7:>kIϿ=?8|K/ /7O;=c55}w~IImpw8w 0 #+ 0ɲ,( ;wEєd$k7 4-cW}imk9Nr84Uu:ax<`&;k}rs0믽_߂`0XW@0ƭvuu>71!AQTcB:NfX㈢Dzajimmmkx<`4vd'P8F23!,˶l˲MM/?듓IqGUu|\\RRe˾Nj/ )11. iӴh aE,AK?0ia"I^ BiINU5X%n$g2[`YDZ+82LE } U5B_s9կ^p{4=\~q~}@C~\p @u蓛FO;r[wbfBwYnUp8K~sW4M!)!{rb}EQU,84EuXgXc>:ݪB_84~akC!d[fbBb|\a clg!F_?&BR4!0r\{E U@^lHGj̆`(0m;!>1>>~խc˲pnbXk[s %_?[CHEEeۃ$ չu60RRRcE´~ PUը,ek|BJ5Zb7 A,noo--+|1 tƶm#X7k@I@&WYY]د!91PH׵Դw5M#N,ƦDDy'e{ D6P(,,F&NX9-qM6d+^ H@Ԥ^$9#?bd]׉%B07~[QԓO<7q̲,zڤԔd0Jr +fn>Ƙ<[id`QQѠc:$m۾Y?p,N9K661CBpdC {},]ַ v{5#y5aY5 3޶mMWng׬z}(vo^z6ðÇ 4aŽ!XgP({ Dz<ϗU}ԑ'V ˲HxEs4(aΟN23zwtwMDh p@1$V>lQii,˺nz3oÇypHD/dJB WP= !IlIFLBmhPamٶ> dND.*)^T4jĈ^yeIY$,K&aAp\!<0$iVs'BXxBp8X%wmt8-Ay9x8c 457۶m[m\||\S斖Kgfx/g~mκ:QDQ$I2㏪郞Zl90dX5u.(aΟ:eY۪[C;8mj;$=&HLHHKI5L#;+9sXFRbyݬYJK{ɧ;FqӟxG+.4MEU{]`KkqG}ʉ'|.8wz\lmMSy-"53J2]&f@GO?J_aflŊĄ+.˙_liyyiiiiicx9_߾y}rKJFriӏ֯N }%~oAAvf$&ue^_Ŏ 0MӲl B 1$iÇ 뎣8r۶+22zdgSyRӳ22RSR28C,{ĔϿ9o¼>uU;lۂ(WP;"50t`׶rA5M2-A-˪MKM Ÿ~bA^o|||Yy98We[^tiGxҲήsH(+IOuԴ#:;;N8pYQ#G%%&$'s![#BP?wiz3haaVCQ.[ %95Oo>K֯4ef4*wvuq7bذ_U1u^ii.ǟodYQUSUUG k/Y!A575]1e+eg@YAfffzP8\9o~^$%öYQdE–eE‘azZhIuA,X$ Ca0vkoӿ_tI6d@2!lF^r;.g8\x~?՘E%o Kyhزm[JJ 0+W޶lhԲ욚|#O<''{ɲ;v-Ea}:㭷.^!P~.] mJK**-ٴm{IYeKKk̼>/Q u->>.7;wzxC /wtsY(d;΁շMNLH+3#Cr8 T]Ͳ#N5 PRSjkkKJ7mXo~azzzzB1qi ea}^oܜtvvNJKMKKMu:9YY')11wzBBB|\` B]|Zn}k[E睛r932z''%efd3r/W^QY[WBԟ4fG[GqI-J[ZZzeoƔQuAtcu]ݛe+Wfdduy}ru]߹vĉ} SSR[Z=$U.)'PTRZ[_PקO;655-K0uБ;/Aò,Cn(ݽGe )LɲvTU%E\.e#( 먨* Hr h849#AG( z=+Hn$vaSu8nX6 8 *d'p$B\bѨ"N (*Ii(aUElr t]WTtʊb6\Wu娚F`(HV néi"(QEcYcAmGeٶmӉ¶$IAA(.05M݀,eQ 0MY]}A#wR+~{߱$/K^i,ۆɗ!˶Q7te`wU\-TrlUpl'qӦ@ p%w_Kx%nRm &3}/g1c5o̙ ^VHt?=t,ՊS3~{ ?_0)CbpΙq)(Ze(]LT}Nv*;|`{~1-ˊks~TVkEP[zWmcaTm? y˿Vm)!GK?kBPz8K̻$.~/k@|moov:S(~2v].!ysk맩B ~/ /DW{Ⱦo)"g!Ph$\l-˲a4$'9d@(YVHa۶AbW{"e-7Ăql8$Ps,g,N)~0޻_uߺ4XX%Mqi) 3##^{"1!@bݯ<D*}C$OUUI|D}~(Óx2c%˗׮!!'~y'kY&~)|>WTn^H4rVرu[QBBB{{O?#9F$)6~r;Q(E1>.t]77$$$EqHmۂ |ހp8|^/ L|^ npGt6>>޴G|2HMey޹Eź|>Gtr~aZ:kgY6\N'| 5w\N3KȲl\\rٶq .KήeW$&&vv'|t$%HNx>D ?@tb@AA1Ƣ WT4Ymoo7LSӴ?ᐎ>!C~V8vTϿqcFλ]sG^`PԔ>HhͺÇ)O4q;vZ&'';WCF 7 WZZgg?X[Wo$MMs/3j<ܹÏ?[P IҬg:q8 RS ;:(Ǐ۸ys~>moڼ%77g݆ `3 ܜO23&W_P^5O>|ɲ]ѣN']/XX0z䈼>}n۶faC OU5rh̨YYkׯ^T9Çkk3 r8p~(C ͽʫ~=bx;:;7mI`$I|M;:ee_z 6ٶ l6MfiZm B,,~㦏?^w\fqI Y[socF_xYQW--ws/Ƹ3 CѨjxr;w\t'}nZDfϛ7o.mضzƦV==3PoZ[[z񦦦_QRZr:M }yey :iZatP_]|yqiURVV/,;-_YUɧaY>^hy}iko#N}gK +wxn3v˯>SIU|Y$wtt|;}ɶ>pμyVxwyvTUH1Q('e9~m{#O=rRQ̎^}k֮{>~97ܧx\yunO{Ƕҩ'~=j䈡C;㭷P4P($+OQPT5 GeYuEQt]D]!)!fΉ&_pƍ$vu^PX8f(DX1 #*˝ 0 Zn}Rb(I+VFd4ykjn.-+s:/B6]7BXVH$"ˊiPHyտ#nzxM4˶ hjnp=<ϩ{?o|gjkƎvF1bdanM}⒒쫙ww"re˗766]!%9 06 )Óq\EWxsEuu^ue~~(.*)-$qK.=S/Ye6EQǍ#I⇟~a㦌 /1l([Z^>iֶs<}GU+kuu/ں!1WZg_|r:㍝u?nnipܱUUWY[ۿ_ֶvQ-ذq[Zl>ti۶52 ˊ2zu6 2dԈs_h?l1~IyE g~e.ܱ#5%WZam+ڞ{>Y֮[ʉ'+/*)?v,k>|O6.7d;&jꎪQ#JSu%;&M_TR'߰iG *˲?̞ٗ_ ;ebu\>gcimk{7# JJ.0g,ʊ-K'Dz<%(˲a(a۶c,WGE8MH(B!L홙ٽz1 c8l޲ɶ8 {r8$YVr[oAP(#lh[UNਂ/Y,vw 5;w>̳!IO9D0x5LA(xye9ݛBD`&%0w?ׇ82O60,UTV2zgrT[7lSm.koxtAHr85M+Mgg+98ON!L싯Ə/&!B&PSssf^uMO|5?`Yv|||ss3bv+?;Vu۶Lt:_|9c|eE"px˲,IR4mim,a?eJ B9ȲP8&۶01Ev:Ncs\]}=s7\̌^y!|sK I:,aYVcce[<D "1[ZZ`aZZ[UU2,c&mJ2MSp$"¡m(_?w0PTmD ||[< `^jYmUU8aw?8w|gu\zH4vzlw>0.8ヌVTuСii_}Kk$Qz1ƭmƌ^mlfM1ƺlF Ÿ6caY$'kzjj˫k^{ʹԴԍ6P8+-ⴓO:dpiiyA^ǟ}nYv~};^yUIIsvu{cƛo={ B$I&10WP(uvuɓ&;K.~eƌ1F=Ѓes/PU3Ϝ~O>k?egeUԄ¡p8|g_wU׮]~{㎙[0M4M4M۶TMy!r ck羥Wx?JJ~ѣ?K amDQx"I/^PU]#}ԑ-֬2xi0LIii~;vm^{[zuƛh0 7NB`YVzEۦO'ǜB_8ȝ $ZMMMΪvass$&&jd!YQm/40LI,Ꝟ^ZVF-ꕖ*.-miix{">9$%m/"Q-eYp,j,Y,)q >K,w^dgHP(ۤs :oxeP(o~YJ 1eC1wKDm-[66-lL¦KMϱ lnMBp ,1A)6ƴP(I?ƀE#'fnweuToA/.{nV?+HjegG BܨA悭Mw?)1kݐfc!wŊnhζhZ@:edm/-:}mmRx1S']}mk k)>ƷGU6&z6` 7s}f}y纱N͹働gS(ʯ Xǿ.ZRԼmSuw9`E&'_]R&fUsmEK\{]01wceY"3I.PC.Xթ]g8rP[Mfz[.ômmAeR} B9(1/:z@O+iΆΰ8e>MYtg=3,s[txkULC6"ZP1!53)JGŧ92S)~Y N/P;:d 0{?ݢNXݍىWY ]JP(K/MNNmʲlGgn۲V9.cTn\nS6.,QhgMv(IzQRd?YsmELуSmmٶ¤TG˫[}%r 2m<"7)9i)(3>)aD ?as<`ra"wb N-հ @,BAY|D1uv aL !hnV ex6 @8ݲ!Րxg1`H10!ʹB!B@3lDPohNa/G}!jBA@0+t@1 Ơ5"!ŀȚ;@t5AY3!{+qC$Cmݶ $ec$P`Hr'Y{ ~qmC1B{BjZWKK|\0d($'9X_yu/w٣F te۶Ig<|ϿyI'$'[pcaZED*jZWssbbi3N;eԈhe} ]BeYIZa>{ؐQ90 X@%.kwuB("8ycq˲,JIJ $+eۯM6l6dTYEI$ !yaEQ+*]N'˲,0 JA9YWWVQ|ޭ۷_͝]u\!I-TEP(#IP`?~8MEIKK;c;N< ;ǟ#t]˾5K/INNzW]. ]O2 j~>n7(IWkƇx5M3M_*-+/?o|w_Q vCa9o^yp8$GYO>~8nܽ=r:9-99os\gqokiiO;hTB=DyEEB;: 7pG]4C] '~1qM-Muu(9gyw>cr?̙'pkg8; q)} hQIW\ 1l{..)y޻ 6x+Vpqi67d{3|q_p9cO?S7ozE"g_xr[w_p$҂1mm횮;zGLq?QUu_Zj|TmԩNO?Xֲleyx m7TT5+351>a< 41)) `Я0/cm >R~ 0BeY5g޼;{ .,kԩYYIcG۷/ﶴ7tF`Y3κNTRZ+---5UŶP8 áPGGa tuuM?rmۯM m]sCum} D:::LӌrGgg8D ƌ,{5Fe%'+SԎEU,ڱ8ޑ0Y\xʉ'ꆮgu=P۶y8J?7@ޤ9;P.]tРALA+˝gjJj{{{YyESs>l$<ϯ]w^\ZV]SԿ˲;*wT铐xAdf޼u!C"h~lIOHf0 lٺuGU웟;rGyEE~^~vV^O 7eefqѣFe@_QYn?%q~px=<иzZxX]sGUUfFFWWjjzzziYYEeޅnԻWzbbϸR(?Cl;$.dʡܐ7o>''%۶-IBcFMxָFQ:<]?m$^US1I70eT{X),BA`ضm,O(c, (JtOrp~ 04M.clZ&^ [2Vݑ*2ж=CWA ݉(?~!˲c@g7k2m;7˓; ǙH,0RO2GE۲!8| ۶Y}^|paI?Bx?QdlEDP7=`cRt8UI-حŻ!0$4M]׉Sbvj{J{a…XN#W+h Mƒݦcs D[pJr2ֲ;@hbogHRƚcl]~J8N& r:7ogY q$m I8 BkmHg执茏'˲xpt:^/ p:{.ٶ- B .!I~/..n/>#>>p8,\\΀/<|^>04M̙|EHt8]1$v;۶-bHdZq$CkŁݽ2$B+\zv;aYxm{o²lW0b#L.\~}EsC%'%UUWo+* Nkוm{QyeW^ ~,K*Q]iĄUTeytGUMMMQUÜ9ǥTlݶ}ڵaoXV^P(4wں$A/Yq̌P(tÏTJIJ޴eϿq\|\@ظe۶u7$&{>`ZϿƉFiyyEeefۊoNmoTQYixy b(2{v'},W@ ?D#̌斖m۷sx,*.)^:0--ry;kRSR\.WQIɜb t]Y[=o8VTb*iڏs흞~gBPÇ(kom ?oڵVQUmGUk{m|M--))Ƕ-^,*GҪ-X_]#0D#!+iimzR7yWQ;W]7ey4mEE6mzO=|F޲4M3o~Ts?Uk$'l/.nA#,Ð ?1G\.P[[dE{J,^23y lnlnر;{<^ۖ,[6qGv/\󵵵?/$'%~wt~(6voLɫ96~ɧUTrǝnk9'&$>s9 7'!6' !Q%![BlہK/=Ro:" i}VTV~?pK[ۺ ק\wՓƏW5 t:RSB`ܜaCJ[vݦ-[Ə :~r`f˲+w(.)u9&L3i3HfFFWgW~~ss/LKQ˖ggf 4SN9Ǐߔ f\|W_~Y4]dn㏗$)..yUE4p0A=cY3ϼ ,ZteqۭIIfIvGSs3'%%-`YON\}'7650gnVfn/`ѣ?ot\]p9W]~i+V*+/766߰Q}m^+t5byo9ԓoM=]V䂼+.dUU#$N_7i˖6b;VYshoe˲ݐ81y⊌GLt֩tqWOso.of2tcʤ7\c:*??7\t: )s۲Mm:-01nD"aUQm& ƭkZ0JviyyEEi~_QEU,JŎή.2(-gnNͷtyqi#0ܜ[n4ͪjC]N;DIDAT2x}w9f`(iZ(aUGӲ.=޲u[||\RR҉{]wBQ& WTʲbiZaDe9*>1Ȳz%eɲFi*a*)+limMJLP5b۶q܏>l<ϛz8Q5*--y--uiD"@$˙o8ӂe$z8ܭtD(b躬(--_+3PƘe00,pH^B'&Q>pܱ(~gضO: -Y!E#Ǎ=ڶw>Ah¸ 6_JӧϚuc c:#83~?iX32z{<۲Bxn˶ BxCdge}}QSsSnvGuoxN?!> wzKBB(~eY(JC;zwkfRRM àI31mv[ 0 s%W߯ߑSX-~?DZ4332Aq܀r9>?pp,wԴ#{DQ瞻K99h)';yi8N ba Xt~6o|bbYs/[>rZrR].0MHvRS`JMs{ߵrx-I0ɇ^%ʛ@׍$b -h[KEQ"oe/~@,'inf$%o 0qc Èiݨ{8wR?/&BU.@ ޵-h{)WL,E/!&1F`Jh.b5=֊1FdgWqe (F!/lű!)z2.vEMyQ hv7]'=՗{'Uu/ۧ,ҖtPT5Xyj3y$/klh,XЛ4)[h[e{:80.PZc?Sn{ι~Gۈ;Z\;zKHq:CYF~~eGTU{Տ8BجS&M%'WpXuI21/BA$y1EJ4ס֥8 ôz`}Ƙp8,GUX9UUMäc!r}Ixy]yJOh4#\_.::yB^E\-]7`3(9p>9;A W\0v^dІ'I\ +i <h3 V]Ql|E 隮U_üaн\ +Ƙ'\\3?0u~oc'hapד<[6: ?h^D!DwEU'sW|jҮǧFcb D&y 2MAhbnpQ#At :˲$(DQ7.d\o =>D"h-شЎ|V !e EQh+e9UTyDܕ] i5ܺ:zCpyyŀϯÆi˲"&"qMOS?Btèr6b E/q\]}iɊک(J$"?0M410"IEQ,D"C4mC ֝,:vl!3h@% HWE(].RS[t:k{+;:l6Q+*+EQLJHPT!`\[W(b۸y>0 TVV#C22L9h -3Lcc _DkUUz<Gs">MVBȾ[o?zϟJFLH CFBq@`݆pdvNM[m޺~W^{}æ{/,quɩOJJ?-=Q~eqqA"B[ZzʪƦFQ]t s.1G=MM,~zuuuE$/^f/&Oǟƛuuu+C2TU#XILL3<|hæiii;vzտW)((/hFdZ,P\Ϋ@#Ƅ alVnWU}WQ'٣?/%99}oXᇟ#=p ⇏~?3"q2gȑ>\~fϜ9ec}o~E6n:vxС{߻?ɓ&W?4g挽1MjrM6UhUxkpFƔɓu׷sÆ~9|@ *0'~Ò_쩨\_o]xB34rD朙3i;Rj~fL1mړ?qN^^AQ{746 3ߘ?B޻yB22$Iec9Ypbz<+V3V+JEE=Ǟz,c>Y?_1+ fwm‘#2s횦E uA~p;Џu_J#?48#$J,[˲[$"EcAygX0 QhYuz_4))gO`08g?Z})}>g~ֶ6CiiEQvxGƏDxWUt)q! 2~"QlV̟ 6!Gd0LBXEq"ȴZBxAI??8JAHQTZ ayAxcd&0`%Kq4i]׉iʊ`dMoFdfOВ#z'u9uʔ{u`qi&11A-t0$!H%0ED",ik Wuy/((я' ͛{} yeK9[;wXvw1,/5jجaGff> uL}ׇdddɚ;vy=I0(AI<9zOQUaa D8mmk{{Ż X,Vuy6ly>O?n9;g?geM v2i҆Mkpwݻ}.0l6;fz{올/}~޳(;/tイzYU65,]l%klj[ot-۶q,GˊAb14reuo?|lK-mʪg^X\V^1w뮙3=;~/-d #|v* Z 4nuz A.t83'M2x$ TTVjFﷵy^e5Mnv(.- vGaY6Ǐ;JKN0JI=vjfep؛>7qZVQQ_0txЉ~IJ$%''wtt׏vȲ$qWS[G<72G88VNIڿ?V|k[[Q$cZlݭ>.,)-oh엒x]P8֦0.S7xY;:; /.[SS >񴴴`Hq Ѥ(P\v}cci:B0 ]AXG~čt@ @/"fp$"3 q\;$ѻgV;1-XQY~t8LBK#ME4E8V & C${c:ZTUE(zG4cҝ1C&"0 gv?s F6B "Mp=*+p~hO0 |H<AHR$(,3pY=GSB_e7rzI$kIzA'eB?0M>C>24 NNtLM΄g],'x!&!̙W0C4X_]S uzݺ Ǯi~JiYQ[-Ą$A %ve/Ίp!sgn3 6 3w2b>CCDĽVUU$( fr(WbƗT8Ӣi*ӭ(As[-Y6}˲|]kѓjUU0;>єNjݞCxeR4] pBt|—, uuJN#UV=Za T|al6k(&1۬V .9KLL8EaFcap8/;h}}}\\1!DK PS[r{U NV5:D=vrwtt].8X=|$Cru-b2Me@9TUu&]4ykiixN`HAHte Ì>Nڥ/B9|tb+1(%.cl&A#q\s sneGJAt,˶ֹ].QB}k==oےD.3}0Lc"'U v|$:g^->l8r,%aIKo")!aʦfKw8mY B'NN0f5̌(/>CCGh.0l頋>:;4m6ou8h|nv{z<z[nKظfA~kkaRBAMSt]D¦i 4&z`ieuu6ΞݼUՕ))ɂ !4nj_*(ƛ6[o8"Y$I|q=zgN |7߸v[aAc4Znee嘬\}f1%hy+DA{})) ` 8p٦inڲpAcL$˲If[~ÉW]5aO׮;zӂ ZUV^q- mVaHݕ̞x+&'&޺pӎٷ~3Oܼ6xpFFzqI9Z7o|ƴܹ{!CWo[pسoϾ}'~u9yG#2kjE[V =677wLӴl%%ko6nZ%QZim޺Y3KO V:qW^MNJ[j[N7ɓTMßYW]SsԫggmmMM 40MUUAUW_~V~ӂ)II,˾?p+*nnX=vbϚw۵goss溜γ̃Ʋl0)(]QdݮreD3_tם{Ąοܼ^&OdC3啇N-*vmih@7 cIl?fLFFba9au5Nz6[kWɉ/~v#Gyާ{AꚚW_$B4]9"o1pǏ{+:UVU%2m-iQ#G⽜Wm64 1_L#c|&%%jzn0|^o~j~~}5DQ4xr9>߾c+f1 1Mb7]=s+.Yު,stKǚ&E՟ݟF% 1d`Ųxں{Rzر^\ylU y4A9~RLU^e[[[oeiy/^Ry2c,6n 1 8-4-/9{-}ezCK7]ϳ/,9^Z@!]/}ﶴ+>-aϱ竮4-(<23s'utvvt#s( XxI+*" rDUaF c̚>}@jg>rDӴC H9cƤegwtvWTD"rs `ٮ<7_;fkDYy[[=:s8?3ljn9pё}gѢCl|iߘ?օ7. `$o;{vAaQ{GGmmmgg0;kNd0֊w^QeU?}o }nvn!3;g]u=ri[,zq\ltƎ5poh}^rdzLc]qZkj|qGY7wnj/5ޞ{ѷn߹~EUV#?t2z3=wwLl4=b͚5jT8 n_=%'%yOQqDUU$3]g NjK4M+=q9`Y4`g-1ǎgYv=Yp P;41B pxqqEESO9"99 3vfMqqqKKKGG缹{˖s50܆G oܔ>hE!̿aST8?(-=1i№n/ֱ,/%_;'ĄqZZZ:;;;P(Dpz|\o(.)illJLHp8co̟ 5k7m:g,0^hhl,-++.) UUW766!sr+**X]tםtvu6/.)9<h ;;;Yq(nmk3w}Ih)=qbΝ]3nݟYgۯ:5ࡂ 7 0@Ŋʪ\\ZE p\Nk=ryG}c]AAAӮ1Fp8Jw-˾A4m`ڠc%3f{;h_N6"(11T0 ӈr8~>xnؘ_P\R2bx nzm#5rD^䤤ǭ߰p~j5p~~uuS X^QsݗqcդI ج֦@v}W,{Ϟ^c8?} BH]]|M8ᳵF9|O׮;^\<0m@[{_# t!r\]]]Yy]_\wo8cNxܘ1sgڴuݻyxw58cn0n?/"k֭YmmXol|7gϜ96++)1quo'xY3fL0!۱ka7ΛԼyUՙÇ18#| 1"8Ą՟|Z^YӍ ,444N?v=v<>.ni |'v羑Ao,9\ta&E tCsLhәLv1csrsػo̙3_'2f{@p=|Ν;hxB(ť6-)!IպwAD"! i0 `DZH{ <($pNAeC:,2eYVUUͦ* fƀ$fW ڋQuQ 4M0&D6~!C9eYYmVխSU10c]-K8@DQUUMt#LbȲ?on]x TUeYVSUD8cZUeybD"3 C{B$IB)|(LD[#H8iUDxbi3ӵ@=qt"B"lXEFHk u]WUUEߠju #&[VEהtm14V+1M g " RssSUujsP ^{ՠqG-۾bVUU5MJLJLLTUL;?!DQ;Ac5/6! OY/yСs hɓm "3}0xOҿ'/ZKS`YgLBpגv~uQc^FgG;3]^?C7ډ;̺;7~٧;S*f:=@N-y.sn;BW{fuJ7n^=A16 SQ^{Mz;Yڿen# B?LDC6Let*Gs G}LXyZK=;;tzև蠤Ӟ:{u[#tZfdFQ}!m+^-.w۰ַ:"Dk8=1itRz_Ouo%y{h _~( )=}dQi$\nXE$aչ!(a4UhBK@^B?Ƹ͈1 ޙZ!@0L[[ۀ~.piciZrbDJL5 ~A\>_D~R/9!\Vzi!hv *KyA!s @@>B?9ρ}~s @@>B?9ρ}~s @@>B?9ρ}~s @@>B?9ρ}~s @@>B?9ρ}~s @@>B?9ρ}~s @@>B?9ρ}~s @@>B?9ρ}~s @pAM0Ɨza\@UWu]8[*BlA8s @@>B?9ρ}~sKp"\y| zs,.V0Bwac2!c8z^X eĄDP}C==\ xa @wZ?%4  b& VV#v#F0ֶVНiȸ"$;jj")Iɲ\<ʄL,/4͋0Ba#ai^o&Aa L. 1~MPɅyϗYڤWݦ0 0c#<6_i4MB˲#&04Fc=0+F?yc|Z6 C4B 'BHt"=D'Jg0 ˲<U?"- !/r,q\iyYɉRQYx!yC R˅`$4L{ݩS NJ#Ӊ( 8>`0eB0ljZKk(= B?>$si!DQ:EUY757#0mmme偖AX񱂢@czEUek[+_B7f\7*+B0mmgD{GY.BDž#ֶƦƲCGXULNo%EpyPUU+ ê  P% 665q xIIcS˲_rc6 `0_T #\rc|(p%Px((R]]{@m]][{ua::}`2,aAa&]xKKFe5alLȊ5*%x> 5{ukG6rʪP(|KkKkkMu NCV6[Z[[%'L?)-5L;Ns ~Ul& dE$IB1A<ƈ^jZ,m64MCYSe1q}TA5c zUSUUih5a8xL,,*JINaF5~؄xU0ƦJ89Fn@ﺂ1XӴx|΁}_Ja55VT5}࠴%y.binne`#~?>.VVd32BXMl6ۀEI I6A4QA&'ج]/:Dz,u{=pN>!FxΝYYY^cp%Wvx>PєA$7j& ͗ -eYa5]3MSq("IHBDQ<=rҕȁ륽wTM8# Y1g'b XyB c45]xc`玝;_?0!Du㏐k,y=ڢBx^cvMbBLbޜ%F'mv6KaH.i}؁/E{c%A4It^'/!@7))!EQctŶ˱ N>(/I+tb)BhgfF]#{ҼN5ڠ1h#10HpPIVW 1#$+ z=y2C(z狫ohhlj3 .ԅ?Ɔlv #H&uYmtR[S zqE/ !aB ]v0眱'u G|S6 9@YhOroYQUMQ/<i QMÈȲUg5M\'n$4#pg$EUUUNSv\p1i ]himڿIH4P4}'q A>[ޮh Q ÇEjʲL806- `o}0 !eҦf4EA6tH]RS4MUM1 aFUUMӬVk{5+ {}%&& E񥿽gp8\x]Naal6.dpWа?'w1,3 v%QTTaaZG՚dK߯_F֮Mrv-1VUuӖYGaDA cu8%I(6UEEQ0F姿Ձ--յcF$Y$$gmjj t88WblVf4b8vzjd$Ym6h~SiDQsA8,644, سo>0o`PQ75*>.nl[ɻ,ϻa?ضcg ~,BȻeZ̻!o|{}}x<Ϟ9#cР,Kta'GQ]w}җ^>p,Zxm7.ؗUUW8^Mmm?.9)q-'oزswݫiu\ i:o/S(ڵVYym7o>xȝwܖ>(|{Lvm~aQUUU{Gf<7iד>p`AaaqIiMm퐌k^mLt:Epތne{Yo?+(,r][}iV^yr߻?5a8EQ;&#=v$#h29hEw=~ѣF{"qKIYs?߱\sU|gѢ1YY^"rss`d?KdxVekkjjxA {~vڬ]߼O>yi>8#ۋuyMMFLNNw/,6tCoٶM׍9f~;s[w6Ui\s7HtxqNn?xo1d`+T=|>xܘѫ>~+Vz7E=j'KDШ#kjJv/;nG"P(‘p8T !d(4q  G‘ى n3O/,4mS&Mu.}Pcc(Ϛ9|OKy;ƍe,ˆa0 6t]Q`( ÌD"YYYRwt ]_|1"s(aD"p -Vn_a(_{T8U(?\M߿` fye1+͛Ι>h`qiӧ%'%mܼ9ᰧ$'WTT^{8?m@)'Dzl+`]􃇾o9[n}Jrr9yyu3g(aѣF=~vZrat +*+zu$y>0''oNJ\5er 5=sʊhoo_g|:233-5u_vx}}>2j#Æ]3W[W7kttpy{kZ̰,Pt~ɧ'qpj2 :@4MEC7TMyVTӷJ1Rj;(.=ghFaa"cCE蓴}4ʲ]qDu]# aM)N{Utb۱kWCcS֨QIIWC?ɘ{ ѐm>/Hdn/щ2t epqgAMA a cHRMz&u0`:pQ<bKGDtDIDATxuEj_MV"{BHB.wC8A⮻duўQa#pXd3鮑NO[UxѢE$Y%m:0eY۷oҊm6M` q\޽yQBeQ?LRvUCm]xcvAxc57!~گo>w28pQl&B_Vs?we۶m{4!6 o'|-amAa >3CG'R>lp(c%fS*BȲ,0 Uy%#!diY {7ƈRBH:T!$<6b1Ux۶mJ X ˶d}9iaS[ER[mſ'݄~w^7s/ !!$Ibu{y|r07>y 5MXn񲇞YHT׫ޛ;yEC`[o_{uC66p%sg[n `L0-KM!Q&QӴ,˒$Riq$"2~۶yoà VmLzd=~>@lt.XϾ_ff쪩E$w߮:!ЍZuG)M6MQj^v./;3t4-AssvVUBr2mJ1B흁/hHi}hƬouPG>q1UUTmA=rmBm^myYU^ |͐SY[׻!\ёQLm;2RS>o}cSkGgj?;3`\[ߨI>ٲB-[ LMNԯ/4?m<54<9cko]yY=4]^?`7,HF?j8BP8%6l`)ermgs)9$3з{﬚0fz9g>[}FlMmJݒl #}Ăe+_ >Uy痬\SQ]3fG^|&H_]wSvwũ~Sso\qc,9MO;iUus]U7w.>TUU_AZJrmcu^PԲ`JB ٧౗((UԽw cb (ʳo@]x) (})i=ryKW[osu!DA0E9AP8-59龧_X'EtZ=yuMM7еHDyv i]u_:uԣmw>g80%iź;+-~c|.q2҆  }^0F ;o2L ұÇn^֬>rY'N[yQ+oXr‘O~ܤ y_UmK(mnmW7_sENFzTQ1elBô,D!Mrp(JjÆ/utPJ.ӧjN0u#T]r:9cmjSJ0^y;6Jmj[p[;:tMc]^pIzLSQUYv4645+QbjSK,vʲiUu'=y1o|;-,p8$Mri%\u٣ [Y+-Z4|p0PRaE%I$MmR}M UuRB(g۶n( DZ ]Z7M7\Nc("IQ8N>x`(L_ȶmu yަ#r)N`tg)W7ȓ_vᰁZڢJ,9Φu((<U))EqڵP~?ea=l۶nFmS`lB"D)m[UUX$REUyBh+ CJ09(1V?0)U8JmImڼ|jx|15[7Mqgui&(3M!~u1&# [T N6-=eۆ>kFUD ߀=&r~𻡔dgY(ZղwY{ eWRJeY"Ӵ0!uZϜ,MwߏMωYHJmN8wSvo&b~) |? Bh)0Fa)9OH4[Eضv:,[U5vG Nq (L = ;6^pP|q~J#> a(B_!cNlo4)m A|m}z>~h #0EHy>#-\SWivE~?59`?3YT\O6-?qmQD^hmkU1h 6@clF}C}(jniVb 1#pȥ%i枓PxBvSU55%tkSr7468 ڶc9J%CvZzqw-[eۢ(eX~"*Su>fٴicGt~ZP$`?iM~B1:o4[]v9mcy6Eu<ǯZړ53cKYw5 j&+#-JOK_zUgGGZj~vGE'dT!?8f9dY$ !blʚT RjSV뺪jiia8Et(bn?8aެ4LFQd &?ݖ  -*+ߐ:qIIirǪA !m C4v}C_72g5 .YvoذhRYǍkwƌO},iYa2X7u;mۦ6FQvyTv;wI{xѱ$IuuiɞF4 zuo#ۦlѲ?{q'%7m^f<;]Ԕ]U׮dN9)z<7q##h9A^ocd[vjNǰZ7nn464*7+t{mЁGR[Z^:e'dƜ"Iӏ__^eL~7m2qz{}y:bذ7zIG6vG̪*JiIɶ~9gɎ(kuHmr73f|Jݴus=/gÑ~lQk>q * 3Msg~Zkk~4}K.]o>{7SRRN>a|׫֬6d-Xxpw^mmmpsNNJ,+1yRt:eA9繥VTUU;zd$xmm5rG>c']z;x~%5;&M _| Omllڹ2%9y{P(>ix(7'[t8  jSܹK'NrPqk֮p󭈢tO ӧN-,,8N;-˚ݼP8j͚7z瘣LOK2xp޽ ƌSO,ZT~}ӧM]f͒e].ÆSXL=ss?nGnvq}3Hp$2p@Nƭ[~M˷l࣏2=d%˖4k֤ f̜f-۶U=i+1dOjm[E)9DY#(Eaӹx7O0~ݺkϝRtc9B[^Ž,[q y_tƍ?~u[nkOКuhhljo>իԹ.BHcCA'1޾t{}ŗJd'xEIm&lx O?UwwѣҾ3i C>i_~MSsKAAI'dggmS-۶j9l { :wqq8Apb3|'yG~9\#?Gz<QzEEaC~7~YƉȿ,]ǔԡCݻ|i7oy}a:>`@iA((۾eYeSJ9MC)(rqDevqÎ9racǬZ) _%r%;[n/W2bܜlm?c4zԈ*GlCcci-_c̘ޥJrUUܜl~pHTU##7z#+\ݫ y0q?Էgoc=r˲BG1ǟ|=Ǝ#?_,RY544q>r%\ #Hg ij02 7@`UUsʎ{㱇;Cմ,K;v{.ZR5U=rO>nյ={;^oljrsm޼wb5r =_>@ t:#h0*]6jS!D)y)"4M߲e֭-]k_|͢%K'>.--O>-+41'+߯d oQa֠/Xŗ,[_>ÇYjuCc_vȂ=jk|I~Gm^1xЀԕ{6f4tӖ-F =j$!Dv+كeffiz~~磈%'%DORBMuenQql+b^ٷ7]xQss8%%{qͷݻ'Q6M#Zc|?y!?1x)U8csrϻV{d? bٖ VDQ4LEI G"Sä n2M-1f:zcq|ʷo`?AbeCFZbmt(p\8vr$8Bm;Sd# 9SF* :ȴlX"~t);kj8FQbJ^N^VfV$!8B'"Bruw!=x47 +Kh?02د:˲\Nxw(kОKrz 7j@Clۦj̖c?XOmү\wP H4&dys\.a񇸜NC RM !6_t$LH)x(~HKq322ذxo"i+ k#A~v~Ýb'6nysA"c9;|ߚnCCCB}vl٢+N8&1[8N$v{0aނ >v{^I)u:V`9.nڼeaM|}wȲ3>˕UU(:N/ !^-\d5y҈m~2pN#].IdYFu/&%CBN-vxw\lA`~mlI3~NK[qR,xk)=`t~Ysw2M:~d{.e_ '㔤$lJ !>vNj,QXjJ=< u#;/g= ʆ t%? MC \UU-4- GMMӎ=SO˯>i^_xzXһWq|Pfziֶ͚mGň0!μrs uCWUSSۿ_ocnj/<ܴT$bGxrGE)'pԤIeSUu̓mjx..²nsIMNͷszݳN?'~ͷWYsI'~0obrEQQ+o`ᢾ}t[ne|Bf`0 _xy{^|v۶]]SC6MSӴZJl$k&%eYVcSsccpʪ*eA]e=3òmAػVSW GfӦJ(Jg IiY(چ16M3 N۶yp8‚>#XLF jMm]LUEQD0TֲC;:ZZZC)I2MD% 9;*nF-Bmm(,C 6ܹ+}Y * ٔG{GGsK`mlZCAL˪WXs'bGGi^ws[lʊ];M(77 lG"hT&b1 TU$s\}CCGg'yQ{*GQ$I͝(4 9duf7AjJ\uœ>wrEAXbǟ~Q2$QBɲ`N`465=IƦfv/4}u뫪W\z}U];jc< \yU}Cr1qBaAgQ޽9_~!t+IثW񙧝1niiYju,[zm}Cʪ>{>vbf~^%^pӭ˲#$F% Xro)y Y⒋٘>dnUաp+0M^8N8窱Ę$%Ͽٳ=nw H䐤 65]۶rs/[Ç}sJ(fMm-BK/z55fK[-70˜+O~ygSSRvu]ٶm?w݊WTzgϔ~tstD,3 gkjj_x޹.^n>v%|,2>‹ +.^IMI>F F{֓O>dР[s>#ÑȊUm8ƌyG/7ߙQWW( %}7eO=cfJJ_/Zf-E'L+--΅%TAYO=G?3Kn[Vcc|QO<>~q~w>w~zk[[[[[ lkk3M# @]@04tfɞv]*}7?y@g p)'1!HdqSj뮸'~O;f} 7߲b*k;[ZDQ$K/u҄^7ygޚگ"/?#4M{ٷ,;('x㖛}>_gܳ:/gM9Mͷsf~ =jdcSS G"&N;vUVo_xu]|aeB |7&>f\˴?Gg믿)e={U| 𽊋ǿ 0JLQwfvI7z_/b2UUmlj*$]PsuY޽ܜH41vnii}{G{3rfǃ(Kk7lڴro3rp0㜲|WR:¨ԓN?jDM9}wۿo:s>}ϲG/ܺm_3rĞN>}]8Ԏw{w^W_SF׮_?'~ 5˲VԤ70)GU1U= YS[׫HO߰ig>lPUSRSB"uz*z{^qs-FJrJiwQ#F$'%o_ѨbW_yEaAAqa#߷l7nX#j=zdee0qܜyM9rRI>7Yc\P ؔg=v$ݙ3N8^ =_IuMu? Qxsƻv0n(l/lÆ"CuXysss /5UKMNqݑH4%9!y9,ݫf3;eY?G~&3?_t™9d@ߗԣ|;o:lph BȔbݎHDQQ#B"1GeYf,7e(EёÇ?|caGxb,ms ԓNRc^EE1UmSNG"={R4M ¥%%Ç-˴,6 VvUQÇc:ɓhtvkN){`6^ҝ|u@ϔ==B6nt׽JNNZEyሩ#/l߾-cF5MSXFz;_K}> uO=\ƍG1CA]ӎ=};d'޲m'MYDٗ_57HU._v[ PTXPW_<+֮[t:[[[siR S#:eʋ׳#qS&|R]HԶ-1mQ7m|W.^ryr׽}XSu={B̌Gp̑GRJ5U1MBm= G؉n==s۝wEAoʬoh2h}>(mv< /Kl~y߰q駜rGcFڹ.ӻ?ow^^n$A)J4L2(x[sW[{{ƍÆv$FةZJ)GP8;D^a89|yop(?T7LI歭le߹Ko6q1Uݶ}{, <߻WqrrmMM<CmYUUO>rubɲe23ו'.b].WeUc5bx[{{(y> nڼ%;+RZs; K__V XWV=rd0\v!dԈ~?Za4x@Lի99rSčMM]U>Bp/AlvTQxC$˲Lr_9bxt7cI2MSuYm˲lKHDm;vy-}znoo'H!N!QdY6--TQ(ENUζSx#t/ؽQۦHd]4߷Q.YWyWA (ƘɈY]avVETU^E}:mۡpmDM 6fL8ay/^$ ⻎b,!ahi #BalTs|`(lYd郺q7b*XQv&Ƙ3dР`0h^ >jHUيG[mH…I~W\:ٽn/,b?c)5,޷p8TU˯(E*ֶ`Ѣ$+P514Mڋ, z{;{>wjڽBNm6QX?;6 TGPW }ob%`~6!D) O;XL|M(]Qmp,_ě9yٙ>AɢWW51/{vWP윲U vX!oU*r Q{Dv8$4>6kZۗorb1Ӷ!oh?GP8~{<}MYǏ#0;==QYÓYS1QT4 zoK{zVSS۹%;`kEBj#;NYрbqm#_5 W?pSf$ϝv ?}zڟ. Bam[G^n/H29)%';g$Iy6e[LUd (!,;;;kss zPj6oԫ>BlJ5Mc}i~M30FԶc9]9Nc9LS_;/x8ރ74}^?w1ҷYQoyKgg,>ZZU%IJIN%TtttZ%bQA+AⓇXUАƚaEQ2S?لUk萡~֪6ĕl߱u㲊;c1U‚n;ضp8`c Mu' mԶdU!P8dp^z,M- uͲL2u]ǍLm˲|㭷-_fA)Ce00!~Ov:Ax4#¼ >c<Ҵ$_r8) k׮dNNΓ|U]S *jhl,,oÑ/_Ikky t:n7`џnlhRZ8j(QUf[8IyCpu}cjjguN畗^:f(Mf]NmO? B?<)D_xլ̌O\85]_|;$D=xKKmi)׮{DQ,!3φ 6;2Բm]PLͤ ӰMޝeFz-X|Ŋ3ߟ>#Xg5#>LӴH$FH@14M 9$G[{Oy^8ffqQiuuQEF" 99zʿ_֗557|ކ Qcyn>_u]Q–-Us565'w;IqNm\.s99>7#=6a{bx4z#F:6YB0YV^6tV4M%kYV Tbp(DdYo>\s򕫨mwtvoڲ!;wCCa^Lj:!4 .Ortsȓ6h)J0oh@=+\vmqQ?C?Q[W?z?sqp]tQZZZzZzmm펊H~ӦM%}J"ח/_rɲ囷lݫeر-J46vj2hPuMuop>s-[9 )ɩk֮TE7o £F٣De%7._2/7.mniVUs{3A|={lشg5AN~?W*]}>^.k߹}Am;^Ga!W5 CiZm[rTUt]VJmU.'''/7`vo[0MB$I"J9gk?k(phmhB%QӴ߸y5kf|{ l[M8#xXئ+v4aȁPC7`k+_`>B|In6>؏ >Uk{`;}D?$;| v%Z?qScL~QЏvyc/nS0kx+xSο>xȠwue^`sX"–m.:Q#Fq=e8c^jՔ~Gw B{׿k׬o**(PfWmJykƻ?Q8/gC<vm_r?ljn曂 7\݂6lSeWy)'lƦi;v[8@EK,^l@iium /:~a7mz\NgTsTb1`+j}֮yz*~:::yA[֬]7ls:>y >U644Қ{-^vV^tiuJQ?{wP(555; y>#=---M$o9=z>hrEW_y>h4z)'⫯KKʲ, 駝=8.O8=Bw |3{%wv뎊)>I߾ znܰ쑓1dEN󫯿vy >rcؐ!i;nE^}MIt=?‡p8 cP0{<ӎ9v9S}^o0Rb1`HUP( "h86 #4u{3wTT!gnl;v >T^ SRKصKvȥ%(e=)wc/,[?ЍnMM ! Ԥ( -HX׍p8lS[QP(FQ߶)`@‹-{B*vr8S\̙$!B"q\Rb81-ˈF AX,ep: AUUYNLUA`uX-(,ۖw8^/BH,#ƺ.2ywtr1 5t(-Y"RU%Qm[7 Yv"ZiAa 1OA F#J~]>"J)A6 &bز(B㮹1&Sm)w[m¢8_(嚚?6nĆ#J sxbR!ĦQJl`AeX׍"kNSS`& Gз~󤱑TW#DZW^ί^mLjkq,fӴ4ĆbOnXlL{ʔRd]QN"TqK MI^}U~AeCNj\C}>dY4,kȐdª/[~RUTd 6,c<!,Ղv{?~OKᅬ!"8; ,("Ja?_X=TViiR9a8kiDЏP8\ROi{,q\TVTl*,(y!Dw zyt=rmjf4(f dBYͯ͞ZEE8:ٓu`E!c1/;:ꝞJ)߾c[Ϟ~?R|>;b NSx:Ƙڶ?重z |h$9%I|‘+)Q}<."'{<$x֧NNzD8ק|G !q\W>B毢$}/W\|ŗSE7㡇rʲ,⮪̀i 1OeYei ig>)`]Ӟxˮ^b4M{s ݯdȠ/Zuu,;}4<FR[״G|*3## = IU5C!3%ɔ0 ue]׃P{{a8-Y|ڵ|EGL IBh@i_ H4`((inYow/Tk' UTt?l(ʪjQGGgzZѣ.⪚fVWW 93- cL}׮Ңw 4eb%gge(n;%%ò4㎟z\9ٶq\}Cm~#[v{Rҗ,[E9 e3z~?w&BlN0!x6a>w4>cO4R|cRQDN'u˅0>~ v^?OjѼ K|6>mGr{ΨÎw3^6@n~cfogf`^t0{8kVlơmd}!`g1n?6GMD$kO#˂~j0G1*-es<`p]{ c@T ѿÑ~=Fԋ/&?l[;OND~1?6yXEE>SSyy5 Jb~Z*!? q8JJ"K::H(dD~8br|w䑞AH}>1|-+m$I] 7+%:Y BƄ UWGE=(H wQ":y1"q2 InCsz5JXs晾#^{ G4% aA/{-fz0MىA?١>O8۰}e {ŭP.L fY؏J"J~O6&OƖůZ%~7q `yy㰮wM c bE1Rpص"J ~vS (8zVx lr]^y7~E$Q Doq8Áҥѧ6{1?6MJb' pP@X!t];7;رE3}Wp,FSR`F A`;;맜ЬY|y˽.?0~?r8 { iBR䓍Öů^-~4c <;7u6"} 8Pҽ(3bp?MS}cǺ//+.z_ QB^,[y'zW_N9\a$0# :;iVV˗G}*-?;ygt!: _DA/ ۭ^rIo3fc yN={Qoh&%A!PuO}uW! //?IIP@@B cm։_|x u1f+fBa"/??vȲ{j~v#I_ {!Pqr}+oǻ/ A2T c7\,vϞo+WRV2nQlda`M~zs۷[}P~ 83Q7:P <0F؍pQJuS7Myt6J(QJB|lL`?iI)aӖ<(H!I,_!(n۱}6X" I !!Y cI9B(%I2LC}D?~vҶ-Jk@Qu0ƭmmUJ, Um;mڲclfumMg%0-G#cg(TTG(!3`?#i1UF<+13RYU]q+Q A_?={1F>A)XԸjj]kjlU]9B[["Ȗm[k5MD#-emش1ohim8G`L`cSC$y}HdMht1Uصc\}-%q&M֬_vdY_d!D!`9L!"۲SSSnjcgESs~ ݖede\.ۦeefggd 0]h4wWPM~ClWa?D?!ߏ4݇͜tuU_~~un%FȴB?tS~7gp,+GG}}i>@O `_cBH,xײ,˲\.Kre盚W^3t`UU !~!IBAE&?:k>̳&h HOK[rUJJrZj'PU)g~ἅۏ9HJ錙ﻜΩN*w455%''%%%oxԤ# cp8֕{/ML\t>ԓNt:&BiSWZsM;Դo1|X0;o<~qK/7 cqhڶ>쿌=ZӴֶϾSUO9e96q)EEUU.ə8CcO>v(+W;(͝7{3S !;*v_hђQVfϿP'-_˯457T?OVUOxLJz=o8S7n\rUjJiz 葟?l⢢.83ذqS0jo郞]XPpYg 2d9۴LE<FnNΓ>r_Ǟ7vLnnyg=xРdDmmϿK!)DRz\q%`upr gza=/ӎ;u@Yw͛}%_~s3M#'3֬[wI']|Gv L7O+.*ܾ}5k3O?w^?W|4kVzjAg~accӑxgǞzO4}Kp˭oٲ!9>_'X,*J4EB!C7BmKTVa={4Sb+WHM˜4q͛ W=ri555E--sJJn$?%%9 28aUU-"[Z$CH4jYv, #@G~?Zhq~^8 !RS/]ZگD$˲b1U J";nofK T}}B'v+;#cwݵ`9YY>`Ν+W4qBvV9s6nskwXUuuZjj+*F)c|e657;_j_#Bjji))NY0M;lڵ G11%99;ͻyNYAF^w֧mxM7D"Q磊t: !id0$ILK7tA*pv7]8I0F;NvW$V#B,e9>ulk!y=49$)^i۶ qq0vdY6 x]1!l<ϳgAMA a cHRMz&u0`:pQ<bKGDqIDATxuEjulM6đ(zpw?C8ÂBe7luQMa!G<<<NOu[xŒ$)eYшimmm ((( 8LܱcGMM \TTdYaGU#㊋xQBiQ? RG1˲rzcV_σ ~wc?sG\:oGaqBR8Xb(BeBU!vOs;weYeY4!Z oc-amA?a&=J)Ñn68yB(D!dt]+ 2 0MQ<{1N) B`,I"󺮳MvhT޲,R%14ݴLƾTM%E)bGWCn*~,y*BH$6nsֱ:O>,uxO\HUAwM-YȋpD.Sx_t_՗ #ݪ|3ODjQq!$QT58B0FRjM,Ju]Q4Ow?چWXpgfe`y7t=,˷>5iΊo]4mvŽ!6QUUƇs>o M~E7_wY #B8C !vBH E0L4%Iq$aDi Ų,А5e| 0zfяNe9WٗƬ5P$={uM*iaM rO90D(ʚ΀ia bQjˆ(Gޝ7. UYQG eY&Bhˎ -HSq|7BH`/Z:`7#[ۓ̴Ժ&jYa9z[;TqM](^ǽug$9ͭme[麑\sIJ,ꛚ_xݫ/8cko]{٪;{radeg}6wQ#&y> >h#ƔR48۾kϜ-/$#(Wf^MCc{GgUusUշut^~ɉ 5 +VO>ؾOF~vVVZj>={0r4:f,?K:d9z` #j^vSw߶`W~ͼns!Q yEAy!;@-Sf'%xA^QiY&OmlGn)Ƅa9y wwƬi;|n.I+חo۵穿17uߚMn3=5yx@(''3r}uWaהm1lXvh¨2oߺsהqWmظx՚_ ?S't5u,V:ϾwW%'$k2SS" OcY Dm!IJ~Su{?-G3J$;TnQ1nPQzvJ8Y5MU;ਢ"D-ZEx^@RZf0v:-횪PTQ.9Ԓ>aȊb[hqQEe9v0*kj9m o|8a1=?i;rz#FuFÊRs8$vIKiE);5z6QU9β,M%QAuMDA`c?bfcTMw:lFcDHhRr8z. Cl)`,]"[.]tj]q;{.>5"G^qE>|硔J|DB0LMH(֭>c&m[%Gl{_Բ(G0B{#QJ9-R8-."TV(}\a!EQ`>Qʚ85{nf4 caf KAu `ٲ~.EU<ሌ{0O!JiLfod~PB2:|@i7?oq8>ea(*Yg Fմr?atuW8zb ~mW#bQ?q$!=3r: rvv|~o8xp$ym.eQM@zj~MeeĪGG D)%XE5 WܣiQp4MBHRRF89idP_d_6QiP(U}'q ,c9J%nZzrWl/N3uӲDQd˰OEn9vM͛;ۜgzoYP88p?{u-!~ =>ua~z, #s<(}Q9yր෌-e6zhLS1Ff䤔^rGEdE=*GIw!1l2n$ !Dd!vU?GZ4MQ$]mEt}_Q1ZVrGR[ښԨJ8 ! 81#m pIII&O 8%Ŋ"m6]1yvoÄd!M3&j dnVqvqrt]4f$iΖ_h@:²,ZaDvԢvbnI :$N7<(5i:B]FEYhYKb=39B SJ9lǙF8N;pHDVWıeY.׷.ɒr!n,r|>u=n톎Ä㸶ffk?;o(wxɧSRRBPeUnw\lvcn'}}D]vq:i$rn7!4ME94UxtZvvL8r ~ۅ .|5k7\NHJJܽrͺvr{yGQ}`Q]na}nvqG8B89CB0Fi%efueӖΆycYt9꧔<"¬8TC_DN= [m9}{|y'L^ egyx=UMr̸}2gOeeD}w##\U,r:owgЯmۮ\x Ej}@DLLvva7m(/?3[ZZG'͞dٲe+Vw`Iɫox'͞9^vCO5s%6lB}B/oNNvCZ|GsL4_a۫k:_1tȐOjeI)DfGQ0c6m t׮۠z}Cc}]IfYpB6(qՎƎEキawrݍU$h ˲^mҳOGȽ<8n̘oͫoh:yҰ!CN>q_}ԜO:yRFFFƍQEٺ}{RRj~oF(>lXqQQ(Apby^S=s%<أaص\~?[TXxIIN>lw_Viĉ9]|e˷ؑ4lMnڲa9bxaA~递r$¶oeZR5C(qrn߹scN8v1Ʈ^q .҆r9=q洭v (?rİ ;&L8㧎=r=cF\_3WZ>v(BHJgfd("qYਂ(zj9~iǞx\O~¬mqܷ7RͶpydCYi~!tɏ=ɩ7ftnNs/ds>߯:ةW\rIZjjkk[0 GA]yXQTvw=ȃ}nST#|LaΝwEB$UQt͙(y眝R<%9Skj-Y%j^z G"ii$i!RM8N--l/Ƹ3ظy;U]BIIIYxI^n [ŗ_WVUzI%}322*vBM44.ljn),x.)113##UgYu=aPJÑA:}vm-F7fT~^nMM^MvC&''Z+s1[9bQ>p`I~^.Æ NKKU55%9==MU,KUTfqOB7RBu՞¢ƍ˯+_qiNӲLJQ8(Dn7qP8,"8zec#Dbq݋.JMI eEQvKBH4D"lv ;8. aakGv)]Ȳ\vƸOA(REUY4rjcSή fWB8D"`DzE,1r4~<p8LxR pi!;:9Bd9jQ!D0x!B!yP0%QF lY}MCZZ*!DtY{o]EE˞J󧥙>wu= 'O`‘gBbev?6)7QJh^n ] >(fEdWŎ bج+=Xu (F-ӲIi(IAQjI3-#+A݆R*!4En#~竚 Se)ɩ-$Pj !Z][k:&D%Μ)MLLܯ bca8vGl8 nBNC!Գ;.,==]ӴǞ~&%99=-_of~^"]ĘZq([n{7AeuuZJac6euuD񻅋V\5i==8nGEœ>u75â>0vHi˯vRSSٴ _Dg.Fw |~;=dmwr ;|z6I |QcSdoVxg8l5p8l;  ,X].p8(G?p=[Ν8a~dێvWTV p8ؾx'x\.ϻhUk׺nJ#e}ɜ:t8nn;B$n]zvqx&I!5vxw:lAămzXhvmz$IRw}ԏypfn?tk)Ʞr8>C>=vN}2NClp״[~c;|0Ny(%x=>^t,GnP^5b/m(+:xW\ /74 :K.j겳E1M0/546Ξ13N˯>i>E_z|\\ܧ(6 (-%0immݾbcW~gY_{|G+vﮮXRr+.7v_ /LNJIR4}쩧wVT~M3X6UVU?.!4Oc/" 1FlJ}0;xޢTe+Wn޲ '94[068 B" iYl6Vl8?k 2BHU //$9)l!XXu0$IuQ-~$%&;RsأXx BhcTU!# ^f+]Xr`0up>_|AuͶlɲ7p=넌Ixt?au%gLgşٳ}!b/.#4Mxקw|nnN8fb/AlhuMm$"X :䵷ZhcO>]\Tͷ^y+WO=+7''ˬЕ^ZV^; 9}s:㉧}ͷW]{橧|>]wlrYQ޿xswmݶn8[,¡K/ /PV?_v\eUUװzȆaZUSRNbfb]Ri646544H6[gg`Oe%x UUI7i@@4ɢݴ,AثV][ GfeH$b7M0F# *"I!縺הU1D"aI:::DQyĮΨxuԏ A545rWHnsWүIg};={/:N9!{9r֌k׭/۸s~Ï:qcHxƩ/v293#c5k֭QZ:09)i՚}8斖ee]0 ;w굳Oz\A6oVI'Qy斖ǟtY `=*"{aF)zރ.a-v?zo>@ h|w/LJLTUyn~quW_! >SUƎ,BnL Ƈ}|T:Tʪ`(tõ˯pΙgrwك1}wq_~ܹn3p=$&I7oy[u%qϽ1̝7_$MEQ|7kjB\yy7[[n.*ﯻOw)'z]ww߷o1].,G.ͩ/NL?ccK.ษSѨO?Bcc#ҋ.~ђ7<7^;Bȇ1M?\_g}C+~%%&yک#GD"x!BHsKi'4t~:cCիer҉njУ565]y%onmm{_SQ;s'y0Ą]s_~f:艳f1 399ҋ.%TAN5ǟk`I8fVM!?\8t\ァ7fo{[C~)nCqc,~+O>q1v޳bO5kCƯ5b=3غmIO8XӴt];zԄ\y--S'M߽;W|]}qS؃446VVVoYvP|]w['r≃Juۭ^sϽspɳgSy'?3zTCccggg(:y}wߵ{ϞU_a0&jj74̋?q~7nCbBBYƯ=bʪ>X>EE?pz]MYR9*˲;ynj_目r4Eihl?[aǟ~ַ Gc7s[}1F30dP]qE\yşx͛W^ͷFqnֿi¨SO妛>=UU_}\ǟLzmw|7FN8c mm6 Prg{} _}M9YaCr2s+LӺ+ TU]4qx]ק|DD OHH<4#=OQcIMIٸyg5|0EUB7ڢByv]wU}.﮹zPiom5]OLHP߰lȑ ~?y֛RȆa<<W:qqq{*+*-OOOxaĉY7O6o9ةP19)pbq`q]}] E&J_Zr"' .Stri%^0UuDŽ$&$hv)o;wN?^_SqcQa&igLqry=YYYŗ&%$:]p8Y.*r]Ӵ.(7'Srr^y!]wUi)o5kǏ+ (g(1lEĈE1%%yEU2 NAyOPRb׷(r4jٙW^{ !!AQP8< ";i!]eY%Q14-UX{>_ggLINf'WRS;A(̚>m@ (B(=5|Fs<+phF(JLH.3蚞Dعn$a^/&!ۋ B.  6=+3sa"c|?|ox;jƊ21ԲDQ,߼Wh.0778({jjjPZjzAJO8XJQ%*B ?_߲á0;rfا=w}O8-q FxŃf'J:!Ĵ,}s!+2B.BƦiaՀ'[$v;fh]@II)Di݆ y}RM7$QXUuNo׮'* iYE;rTOQBBeYMnװ!Ciݕ7 ɧmln;::;cO9d/+O.gEŮQ#G8=Ux'5zֶ`0|g y֌Z]՚[ߞ-[ #*m6(_r:[Z[.^EUفncUUAx+.$?//a`0dBݯa{X&3Qɚѱ&lC`i3W!`~6!D) N;XL@[|~uT-˲l+V,$f˯Gz?}]}EijnF`ӕNw؄W9Ȋ: S yok[Jzcc$! ݻIm6c>s&R? ws\ @ gͬv/vÇ#F99Bv;bۤIX>{vp4J% {47c)(?b`lWa=6l/)z?< !gBn$HU MdY.‚ŋ hJEN͖ B$N'ffd( Gy-^4b{%cI4M[zEVVNbBb.!ôLQ p}d+bYVSssrr2kDdYNMI eaC|m6KWTWVT:ai55Ѩ"BA~ –elخB3ӱkWEUĤ$D-t[[a ]=X~r$,d 5J#Av;yׅ˖aY&|!alRGG$\~q4!:.yXU| 6!XQĹs?dqD;٫F^+99x46Ns }(s`s }p Jk58 Fen2vX:F,jƦݕ{aIjY4MHOw8\qyZZ*cnص|'NeϾrΨx=RvcmN_~|nk]4iRO~BFzt86no5bpp8zK.-D"ax C]YYI)+@-]Omg6~Kv#"77& z~jϰ,ߛ$YVVa#GÆQlfCeoݎϖNױ,#U ƤNXۺgvgzv,@r>y6sY\lcfeu}Yٸ2r7n|~C>ev)dߴ}<CAF4GQ%6Rq8^y1UUmmm;ﻶ6Mf͘nY'~'MKz)'wOceYxΧNSXDqg(?|G[:f/.:4+kΉ61 ~wq$Iz'y]gw/8~|RR1` C/,([ܟ.A4M}T|rQ0B8ASHH@"A8!?%)EoIc#W{c+-͘8Q?^;0 OIIK n>O*up,tw cP+OD8zFG{Q$b?J飏_?YQ<+xtiU]Pﱘ__t'۷x>矷|@0xgE"<~weYIk֭o(4-S=ẫ ajQӲtCsJ\l H7tZ6M͊~q1w{\f߾ƲnD)2 ںw VϷ IBcXse!B~K6hYVNF!ba^wO. { t5l6c)Bu[+2g KL:7mjHόM2b cEqm6[Gg'joo8|c{GQ#OjJ=?Qp?tס(S&$P7FP?!DrLc~ݺ ӧcR`F=,)sQ^_IJ;:P$WNJ8N0{M"O2R6nTuwE?F@ PW_z ,)IOK[n]Qao#O>US[7fԨ?cq_?SNlզMC3g*^៾ n7uuزWua_T?| {8Q:6ٰ^jw󓒓,ˤmhh(W@)f7)!>O?))Ͽώ@՗_{/[+.OV^s1yl(I#^feubBmRnb1ƦanГ>G)˻+V]E -aɬj+N^ L+x?=Y,bëЏqil^Q몪+5Mz}}8k`YVl%}嚮{=]Ȳ(<iYiNSQU=쳡iL;z6-j!D$EQϳ$Qd+f_?i~^ʷJظxUUV߸?c= yW5u p9[e-*6[gAП 8RȁPz/X[tkW=s 8[x I0owvW v%vmlq0&? x7].qlKG6fH$.]`HRMq8 ek{ ]?)gsg#@J3ƖEB(JĆ~F({*+/򪦦&AP؛(LFVKƲlcYT}Գ=s7o$I[{}ӳp47K2|bmV9|%ekv0;wn۾4Mˢa"DAu`qǎmAu]4$l~i))G4t#Xie6(Rk֮s\gzUlٺpȖؖD-*:[0 A!ɲxƎ gӕ9^Ũ෢ct:9B|^_M=sqqyǍ]piZ<ϧm4uSNv)w?s|QawnY^#9Ʀ;ok p⍛6Geaui/_iƌnoo߲mA/^tTԼʫigpN5GH4l6'}z'~OÏ? wܶvÆ^x9}!4 ?ϿXf]}}n-9Yw5/Y| ~9gܳ5ĕ~M(m`0))yi<,I4 Q]Sq\(4aB~^nD !4e/_vɲq] +*,شyEC+p8[p#}^kN`\^nCSBw/~7%Q8Ĵp8ꔉ꙾}$&&׷bn>`@֛e>‹}243N;u ,=3iڵQYP4H$"rSSsKkK(4= YԒe9 #HDnjnz-r4*$[xCmrr=7q|SUMMnNvI~;+*Ғ[Z[JYt$%&ڽ;11-??&9)O斖{ҒΆƦ}!vlRNv64 YVJ 8b׮@@䤼\EQA۶HIISTknM 6oٚRS[WTTX^QF΂zݞ}ǎ`(ؔ5I7ʝNSU՞_v;qi*b4McciAeniH#(<ϳ8QEˌFlih4J)eyn!VTf9΢0 6Rqnu=(l=EQiRVnaB,2 yEQ$Q4-KuΊK izp%xjp _؅j#z{,sf@ZT^+y`^%> R=s~3؅XXr½`ukmoQz fYֲJptJ"EuWbwPwo##Ac}2K-r'bϪ{㸨^tAkhhmk+00 vq\ hll7vaqمsgƲA1\0;o>? )"G2YM vqVfF$u4uEu]-,(hln9,Rŗ_{mڵ` !z~yBHOGGNj/"s97A|Ѯy6;;ˢo.[}:1rA:fڧ{b׮;gUm틖,$$$$Hq8NDDG4p[S||1cƨˡH$_|$> pxʤ%rGW^z(xΧSOxBҁ߉矿_sujJJGgg_|YWW7k쬬!ceqP0Ɔia.n{Wmb5U}篺^g4)-UUwu\%g?8Ḗ]wYܷ/FhRE 0i„ʪ-۶galڼ3pPfI'͚wmڴ糡8̝;w쮪e9 slNUuueUUUuq:)G=Ӌ̀㚚ʷj; a8laͨr\w  @@܁qD?~;w#E))=RJ)z19ZnLDdJ)OxQ\i*:q\ZjB}&ҔBD?c\X۳33-:O!$ "RS.a#F4ͦ~؟eYg f:ʔR-ڼi D?c˲~PJM!M˲,EeYQap'W_!űq!QB!c6"'m8}ز,J)q{ &!k,?M؍ݫ!0ĴiSJEQy>QJc9Bll 8XPyyUb.I81 , ȖB9>"ˡp&I,{ޯQܱdŲW^d_'(BB<ϳ@gƒ(rPJ !?! {PFŋPr\޸1cTUmii/;E9Λlg^XPrɲٙ'MشekMMM w￝/UUU}M(({tM߾soO>Of=Ӛn<f͘+G!Ma+cO=0MS?p֭W^{ EQ0 cϞ;+DAb5M{'/'}. ?3ϗ; ~Amm=89s>⫕V;(_⦅@YE/]>JOK{ŗ?d+^WcSz_Dq~B(rO?9bذ|gQiӊU>y҄:A)_x5W^n}^9n3NuOQ7{斖ҁ32/M[[|_},0 cwkׯ?S/N(Ə?3 vعf믽朳,BIIJ2x~x)\xn\N_|ufFFaAuS:Eմo7t@vV'}m;tw{%r/[U]=qQYaӖ-k֬[j;)jko;ft[[%UUW>OQQ 1^uecSXRr/FDUUv{i77qlͺu N{;ڼ]*AD"gΧmt_o#GdpB `ȺKdk U(UUefy$aTUs8L$IlH h#nJWkƶbwAѨ6 8qlAKIbC?-AUU8ێn7txM0!l<ϳ<jfIyy.vUFYeFzK ~$ft}{qv83 #??XR]=ߨ^?6d9 >,ynjK)eH7~"|b:GG.,x6- !(_k1G ;K֭[ B[4Hn%tEXtdate:create2013-09-27T12:18:10-04:00=%tEXtdate:modify2013-09-27T12:18:10-04:00AtEXtSoftwareShutterc IENDB`selinux-python-3.0/sepolicy/sepolicy/help/lockdown_ptrace.txt000066400000000000000000000023411356774067000247260ustar00rootroot00000000000000Disable ptrace capability on your system. The deny_ptrace feature allows an administrator to toggle the ability of processes on the computer system from examining other processes on the system, including user processes. It can even block processes running as root. Most people do not realize that any program they run can examine the memory of any other process run by them. Meaning the computer game you are running on your desktop can watch everything going on in Firefox or a programs like pwsafe or kinit or other program that attempts to hide passwords.. SELinux defines this access as ptrace and sys_ptrace. These accesses allow one process to read the memory of another process. ptrace allows developers and administrators to debug how a process is running using tools like strace, ptrace and gdb. You can even use gdb (GNU Debugger to manipulate another process running memory and environment. The problem is this is allowed by default. My wife does not debug programs, why is she allowed to debug them? As a matter of fact most of the time, I am not debugging applications, so it would be more secure if we could disable it by default. Note: Disabling ptrace can break some bug trappers that attempt to collect crash data. selinux-python-3.0/sepolicy/sepolicy/help/lockdown_unconfined.png000066400000000000000000000655211356774067000255560ustar00rootroot00000000000000PNG  IHDR !igAMA a cHRMz&u0`:pQ<bKGDjLIDATxw{+ 9̤H1*, β-ݳ{ٽM3r-ɊrYdsUM6`J$뜖@>UB!DP6mte01 8eB!9*p&P~p8wBqR)D=J ,MwلBqAOOCBTVV( i !Sjz{{5MCQ,:B!gDuN'eY~BeYBQJt@_!((iZTei:$[QsڨVUU'>ׅrIm6*4gYVSX Q O?4T `EMU*Cx=n&&GUWM秕3 zHgB'RQ(-78Dy @*&RSDh 58rAww6]2R<L9 TBpyq/SYY)/'( #cxپCtRw(cht&?b~xK,p̪=Wռ+\aM36n}ص ڪJTU_Q)8Ɂ#Xhjdm_|?$P9vV/_n/ ^Lފiv +eL,(Nh{K"EQ8;G ݲ\Π,xАT i(±N$i\۱t2,iM$`r#g$S)54q9ibVFGƦ4\`Q<>JYϼzd;o}7Ǟd,]'b]eY4./FF9zp9r9.YUQs05UTFW[veomB2BQ?|a? #LH%Pϑ XX~bͥfb2Jctb}h~ްt:͞ q/t== wpEy+KZ[]r6]<{bqΦت_YEzشs7'o} 5a٦OއӊU 7]u9~G#chNW+/^}osZ?-nOks ոN^o#lXeW~+< :}h{x|!!2 0 5(Y_?wpTΞ>r9׋a4M:PtZo 2cZ0Mnr.]oѶL':XDK@cm aw(YtQ.'042J*ᰟ5[dr/ħ*ڎmχTèaYeѩ)>/9`O),3^`av:IRlۻ^Lblbj*ôuv2:>AY?ť˖zRrA<,6,$|a+ݽ1-2r9(*kW맞C4rMVE`&%KU`x˲wgIk r @UULBSUzs[*/ò,ڎq:u5Tz~F,B"UQw(nw?:f%أfLJ{xl#':y<|[heb2J´LjkhΞ>:{q;,_y u8v5xp94\_Wl].+<˷l_"_ikpf1M=7ٰW"ۏ%-g~C=wx-DwlXCKcDF頵,Ht6iTGXE"P.hIe(@ ]hEQtR_[ͪy{6v|XʦMe˖GqvJ=l]P }-ӧMSY`Y&Joe[o _deS)eZVl?c= )-(H~:rͳHjQ?Z0}}lmϵ0i;8sK&\([#2Vr8!gź_OѦ8Ĝ}-8fovBq(O^ԼBpE9Pֈnө7,|B|cw>2BQ:p !⋩pK_d0 q8]R.zE6G\~!}`hS15Z_\@ n'N̢i>4 H"}"P( Ll#DI4PrLK燪|HE lNG JaNO9;s {8܏i._vrr]שjT]!?/(T0|6tu;LNNb&iIgp]d1 0 tE:A44U%rdmy0L&B| nhg Da>O2oa0!> 2NΠj~EEU?g^F\.* 'kpלA4U,xќ!N(9$LEUPun;GK{ X}7^wuuedYt&_4%piջc sHd26nG:W^~9-XeHhf*g?uB+鰊'r1c*k;A6emD{t>Sμ-"a_Mjl\.8.tMC>^W9 ^ut~ _id,D"cOή|10f˶,l6K2²,R\N`;:wI8@WOY֖i:֎;ko՗lhF-@ߦiN?";v.>o&Tjlx0H$Y +~ȷ54]ᑑ)jj19U`t^\NT2 }iQTe6 VTUSQT\. gy/EKQ^VWCOʼn۾x>z3F&֯]fӖs]wANvj^} b˗-,|::;ҝwPϋ$ rW^L6'b"ըK|:+<<ظy3?W|k_5-sVRM0rt˗9Ʀ-[{>ߧ`Ɔzy7xrK/]c``-$ N' h+.@,7r]w044LgW7N7\w->˲zœ!IQUƎbhlj"ZH08,8s^yᥗ#gppwvì]X`!M|Ӎ,^7~a.XoMOo/}̟? q 6:kqq+Ys*~Gǟ\6?L,r9;ٺm;~7Q C?pL6$[mcak+K/|z6_{,]{?d q{햛ik;Ά먨(g˶eY(1/]48騪ʮ]{rt)mm;hjloנil޲KV,gxh t\t$I'IGgOtcm^nIeMMgKibT/]1m8Si (9?Nng?!TQ /LUep8Ļ|0˗-eexq#lrv Gp 3b`p8Nt]'SYaH rM ,ۖ// ˲z|rL,6NS#ǎo fy6V,] 0xښjE";wR^^Ƽf9Je$RUXa`&aN7cf>ӅnZ~h\#ӣilh$I:ذv-]ݼF.h>cKx<[,Y68A(Tŋٵgo~=]\a5ռ[ײ~DsSp-Ba^EU4 %ELQT[WΎ.:#OM ׼ӷFxQo ?{tJ2TUq}Nntvur9멮0D,]jʂ BTWhn'e($SILj"l{i2>]s5NY%˗Τ#rWR_WGMUu~֖C iUUTUVQ RV 7\fC](`q:,_J d崴̣UHT*f躍:뙚-,hm̯gyvjkjXh!P5,Y߇㡪G0ۅl:!!Ea`HUVO7٧e>SU~dbo$422[k֬|B9zg?4+Lj~pӜU`U+|h#er">06>Fۉ6,\rsŮE0Pѱ1~oP_Şlrc0 4UE> p+PUAxq>͆} zt]/r)0M]קZl2]0- 4Ц_[xiړd2͞oP h޳e˖X/L*Dl=LM;r*~UѨo8-OEgY9SK,?}e>2vݩ}2tuLz|5DGGmLXM"rj:Vzf̬=(('3_wzf>oM{څTUE%_Jgp:eVP6%066{ X$)tz!rzr5Mukנ<341MilGϥжFr?\s UYxl}N˛I8T!5jB\TUΎg,ᑑb;jk]C%x'?ЇvO$q9Lx<ҩkT TӁi ,oYtϗ?B\T4MG_A(f_Lnf6l6_XGr|?}Ewo6ӉͦcY&s|[B;oxu]Bҥ{=^E+Ja+”_pU '϶wL_1l(,hY _+n,anglo!!$Y?״Wqa?kQqԳL}qBM("I$޾>o(  *,~r}3=+w7o.G2BY0X\fZ2*oŦ-[Yp!qA/[n@`'\.~>znr2%^9Y:u~ۚ͋絯.Tg{良_'U dY8dUQH&:rh,F*"111I</$36>N|uq2bl|>Q|e>z޾>bSSi H&9|B"`bb\.8##g!͒H&1-xI11>1񙕿0ag_Mdj*>gMZ6#+kzsӲ,RԬQެ~1-ϿnEApDp˼ʫN_{'~\.'J@:!U|/c.W  Ǟ h ש 'ۉǁD;^oaB~ҥKXlnC5TU_wKv?v~J"iqQ[SS-2Y30shؙs"̼qjصCswcqwQW{r `YS1e<=eB9϶cڎsQ]YJ$/N'\trr1Z;mݹ3wBQ`ݚ5351Mms˲TaxiկRQQ^\(|?[noX飄CCCl޶ XbfY[m3T*O> ]GsS#a?8؛y2`|/ӿo3F>uݟ8οFshBt()Ռy'oŗ_!ÇO>sϿdJ֭Y/(=\{1qRUY9c~j;:سw/̟7ӎD"Q<*++ A_d˲˟ dxLk|ڎ z2/^2$LUPWWG:"J b)*+Yh>T:EUe%vRTq`Mhl7z|s"AkK LLLxhh' 2eQUU75Xu 6m .¡DTUVR__)Ψ"OL,MW׮]Ӊ1Tp픗C6mيe2:-[sn偯˯W~G{ \T=l޲$`Y'"( CCOzFƸp\<,lme޻N,+K/SQ^΂V g3DZ6>شz v'~zq9GU&QnFt]454 Qx"A_x^^- [Z8rvaw~?審j~*+>6]'N155˯or7cc[Z7]=]ݠ(}}N=ޚ1<2^xeFFFHg2\|˖.Uqp(>+₡Bp7ֻxYz5 *D骷ry}?SOsſGz{{Ѧ'11Mc!05Սj;+(,]\}啘//;wΟEd q]wvAW]qTU?7r]wE[g';Nt Xbn#Y(/ޢ8'^x3,DUʢP|HwwNnڎ-]ʷ LFv#G)/+#TQQbbVʂA=F4C-4„YoNr/_n6ou|_grrJx|V;\uSʜRH$32';q|X}?{Ey9K/fK[:W]~9r3kEQرkN;n  Ubtlt92}ukְs.V\EW$ bٸ[햛Y|9u55Ŏ]ٲmz }[X\.G6C2$SI;#GpglLlܼ믽fFwp8Xb|& r8,aa1?=n7w~;ucc`{peQWSC:-ofC9v^?_}~|{̎]y7(/.wv+}Mt`A+lݶ]I3l߹xtڂfCqCXկiw~;+W`2rP֛o&p8WtQQQ bS[SMsSc!"0pۅ~}B6_+|TTT0^HZ.h #GTUV/_288kn6i7ǿ6?OQ?P(__?0D LLL55Rdbj'&F~ꛚScj;iϠe"Nz\r& 'u_255E&ߧ2RI$BnjjdfZ{autMˏnY^>GqM7횦[Go_M "NN9LUUOH)(l:A:!LL&mJ< kR~_vk}__}w{Ǟxk +_ݼ**to%((Nn#LL&rTݦci5TU-Vkd3$^"*N8</ZH<lZqr\$Lj`m躞ߧd2Y&'h:=_h~Jm(nk #7s]V[S(lt:M<G44U#L&I3M'Ʃ4?l\AvO'yMcv{ v8Io62 DOO7z׏np8ZhiNÉa$IF" `>&v~C}N~xp:b>B|_c2 Up9|>,λYm6-hXM2ɼ WKHM7`ona޼x. L ,_ 0Pŋa&p 1MMe$_j&eQUYIuUU1„/RcX(CQXB[tq#G&.y?βZ0l6jUӭ jRVEi( CC8vϛ`MM5l:p]p{ع2֮^͉6;.3k}p~G'}y]'zn׃jh頽 ,x]po n+1=_MM W'nƊl=n77 GXb=$n , Z.rv;c"qwa&ͣS rWk}.bfMu<=UO?Gc՗u8(6;nOJ4MkKˬc ^l;3(O>6]g4k֖',Zgonꫮd3oUU H$C4s:rAV,[F:DH$ga%\}mšlڴZhɳPEA;~}>J- c|, [V@D+N^]gh]]hG<ֆHĕtIL&:]ǬX3:ktm.3&6l8m)‘imiL७]|c*v#_ܽd~.t1;ʼnX\.)1E_+l6Kxp݌t:TVVbuNtt~njjd924^UUI&LFN &'' 83ʜniۨDCCCXTVFp\R)GFPP(ǂY˸f\}nbvtIҙ F4erx<X15My"P1=Id4J6oxH&l6&&'q:L$ *anvF,n#c=v7~WS|osߍͦƲ,.7l6;kd46 |^l6cO?L]m-#Ų՟sEf$ nQFF.˟Ow>8)tAۍ >Lf{QTL:cSS?꫘?*T5iL|`0+ej1<7Ӷ5xiCäi¡0>\.lrea|^/8v\.קN\PÇѪ_U?,|~ abMqڸeaՑ>`Us|b юGGDٰ˱1 l6̚%K0-t&brl uppw/g_F.GHkKzhH#|*<.۬plņf}^/,+_{^|]{3םoqr55˂|mFa6ͣ,a8vNG̀*~S^VFEYYq^r2|YhjlU&Yl]ßӖ)LeYY*< , )<6ŲL7 Z[z$8}lYEn/` P||TCȱc̛͙ʟ?gopx2z@{G''#SQQ#G(֝( CC?x TE3'猿As1ﺧPOScc~l}P|^x-v, ]ש>2eeӎW!ΗӃ4y'VYdPA;p }T }FO<ׯiXf]nXc8Lv$K/U}?e9}{$ᖛn*mg-6}$׿ UTy/N[oneN-GrzU?`)`|UDWd((T~B(c{Ud>ai,sK\|́fq6k$v9m]s?06>F:4MtM?V ƟC[E4%$Jآe<\ t[9­eyJV-dppص~iCe\"ir!6|+x i?LGEEa:d~855sa_, p}nEQPǽ$LP[SKbdt>B}SMwNG࣫eV5d*Icu%߹Qe!DX6/X(L^B!>:ϔzD"TWX}~.7GatlH8r=m;v04< (x=VZ>(UxmXpacc,\zց.bS1&,ZdN8+U9~ۅf/FQ&&'ٱs~M456MOċ#}eDq;N`Z& [FO* uTQ !̩Fv'adQ|Q *_z3155cF-@a1113h4%kkͷw]. ?0 _rǭņuk TTTG<% !(m*lsafA6una@_|Kll6oiQWSËBOo/^kby*LMygmK/2UJ6îKHs39NP<2S.Zt:Gp~z]X}*cchBUUVZEm;wHg2B!ąB, MC.(*\^z{{YhL&C_?~/?`e?ܷNn:;;1Mh4 e {cb2JUU% [Ԉ9/ز+p]\*Qhڎv9߲cX:]u%TTsUSxwxoF2 !P('LI@/]ݝډIo%0c(ҙcr2J}}6]e>at8Xd  Q_W 9zHqۭݍf:rn 55'4` H__? 122v-L(B6!'Xl)7\{-r3Ͳm_s M 2 ![bS1'r\.*+OG~ͥ0llA`aBCBeF+BB͂e3ݜM0`*>(g2s3G,LZZ?eB!Χ9G|}fZxsN}1 ϫJEEPGcxxMܟ\!&鹘]e,ԑf1nO('Գ !BIUQqa՘G"Xf8fAB!>) ϊe[5%?>=MFRgB!>쳤zw 9t~HKn-!s0+q ӕsXIi;J,,_%;WP3*l?՗t:] } 3:zi_|w`M hӳj֩R޹T( (//??PY{XV(1o;?/0++ю˟j"Y[ k@!9rZq~u|lٶ \z)=rrlٶcmFuFFG#6#L?0iY8TEe< àѱ1Cv084tnPAn7t>.t.ҙ4g:y.\x˲xŗ IRx<Faxdd2E,c`h-_0`Q&'&gph4qLLNE4v6b,YW[ܚ5䮽E߿+oUSD!D!g+G%PWS/eZ]G9à:y= Ħnߠe<߸M[36>ش E"$311k+yǙ$ qUWo0o^3zCg2~tڬ|u2ފ29 ӣ7wxQO?_k=G%{ X~BqN̾qmd\6Wᅬ 򫯡:HW_v;w/_p?ɏ)/+e<~wl6C0HӔ[*$.U\‚V,T&"[og\|9]l޶F&''ywOXzj*lD"ukË/199A]m ~B6k{C9˗S]YCh;~l&edY.Y?ɏb9F6֯#tkzA 誊bz2_=x'z 2/O0(| (` nb5i6Fϋ!iz>4-TukyHR]})iiVXhNk_6 **irʕ̟\C?p=~HGg'?|{eb$ |AIۍra&qdsY,7Pu\ÑGyztou`pjr^p|dMnŊ(R S(*>4M4 $p-K/s:n>'?qibz=p(*>Ӂ%glٺr?{j.xAQXt eTWUQ__Oe$†ukidᠵ]Wg]**xXs饌7Op?r+rQ@`h%:Lo_n ˅Etn7K:ޣJez|a0:6p0M&QeeLFx<\N'dd"A0$:Nh4 JH 6;t:M,6r(nL0 *+#x=bIh,FQ$h Ӂg*>i|>'x(J<>etl4?Ӂ$'躎bbrA6%Jr| BׇqhǏc477{/f}}u%!|=CYΞ'yfokfeb׼39{gf^kk8ʕm2ߎk BS8Gf;l|B>7_(D+mm/g\rI !8oMCnjrK7@߱M7~!6OLSNB"12Mp:]}5+GK]wַ0/M !(U՟One9c #G.0P%ŲXM7a66cu쯽26>AOo/e2 ="W^I!öys۝w:_!JD!UEQO~NA$f":qi}.l6,MDz,,L\L&T>\MUcf*x}^nFT%?={ظy q2T*a`ɼ Ήa&6ѩo;( +y2 }}2,W]~ib\dܚ5|#`{#[`2u/_pj~\.Wbc&tL;vҫcN8\sUMxn6_Ǫqf Us=_bżqTEa|b?<UJ, ^|e)l4M#Jw&dD*@!T|$I(aYVZ_QT{5, ŗﺋɟqw*~Ɔzjkk ٴy 'ɤ3$)'H%1QX,8}IMMͬmKe;Dp&ܽ]5|99oWwvχ*\w,\+ΑaӖsS FM7!X_}[8S|_,BSeY8*#U:|f*+P5t:COo7c,]sEQHRl۹QeiYXeY`xd/ʉ 6oJo_uTUVevhnnzBPò,BaFFF8z0 ,m* sA2|^ߜ?˯e<|c2BwOG0sR 1I_>gq f @!@^/mocxdUXк}ZrY4MH(D}]p(Ē%f$IV,_Ƃ|TUUf) |:FFGF G„g%*eD1{hXtpE9in6fjl6 l6';p455͜2_fjr]i^@߿ŪC_!.bso藟>4M6}5M5siRMof†˜IΜcF4,LNQˉ`ѱ1|>Q<dLEY9I9#G,c|bt&Mue6H !() @ r&'IS|~F,rF@?t*%(J2~0 ښ5P(i1$3IY0Hgw'06>F<2H80@~Mel|H8\va96,/ :y?޷@h;qAxt]#Kf~r5UU :tD21g ?yMPD"n'Ndttl6K<f/S8)/+A àvMJ~!_s$H02:(xnPWTd*ƦLLNH$ri:z-4~!{gV+Bۉ㘦ISC#[Y/0 Mӊ\a'R5uր=px嬅5kY˲t+392hm۶B/?{iY|j*rZ_SuZKSc3S?>2g@Z !XEMu5(|ʅ3TmBQ\}6Y: BqSncjj {@*BS5P Ht8~JiL&#BE!EƦwqe*/+&'0s#zӉB`U>ƲueY}JB/A{%# !%P /B ~!H !%䬍EAU *1L?P<:.󙶭*b3!ɩc> !3( }NbSS475l\\|L{مcՄC!LX`ř H9s`pgOOrb \9iLLLb2Jn7L^z˗Q[SO]meiV4Myصgccu팍Ml6/Z~8CM#000+ذ~]1br "0ys6^o\ukr=qۭttvPOUe%o_O{g'{?7@ΊeX|6T:~Lt&M7\χh[Pu9ByYW_yǎoXρfҥC!4Mc]k;TH8mL"䍷fjj ƭ7De$"Bxp8;9ͷ4 ؼulڲ4xWF,hmvQWWK$r*`ETWUt:Yx1`_|G"Ċ CIl߱~q\475*N8a3R)^zU~_k399Ɏh?UQyw!fjzzxͷhm Ͽ2--l۱Nl A=JkV_ʎ]9Ƌ/eY\2>>q!_g ~˲Xy ~m7˯CYz 'ٺm;ee475qUWaZ[m#P[SM8b%L&(tvY0ȲKi%fۯ(/o|;Dc1~90eA.YLuu5SSS8xbr*Xbe)U>~vK*b5\a}ڲ,\.}?;@QUX|9 J(/'hA+#qUWqttvfimmU+˹tժ G᧹+V U04^~w{341 UUeΝ߷a, 0p\C!~]VXd4qB!>M(:l6ˉ8A<kel6(mǏ}_fw>?@]M W_q5դ3iFFXh! u9Fo_/eeeTX̟aD¡ àu~ v˲ 0[n׋磻H8DSc#]$IZ[Zdr^/==44S_WǑcǘy|?Ǐ`ҥ[^2V$### ǩp0<, n7u((̟GuUmDn:Ujj8v"n*¡UURiXl)=oo֯|+B!.b022i&kѢEgn(`?"(Ūt04 Rp5]x ,da'`(lPz _u+*ajM?sQPX-EQLeFgffncffSaoQY)B|zpc&LS!sR==\}hVffk3?kf>Wܙ|Pk=3OB 4UsS\˝mL-T?7MaZ**%BxZ^MʗT'>˲hiOe$bMB:Urr8a@Bqn} σc!?"R r%tEXtdate:create2013-09-27T12:15:22-04:00%G%tEXtdate:modify2013-09-27T12:15:22-04:00tEXtSoftwareShutterc IENDB`selinux-python-3.0/sepolicy/sepolicy/help/lockdown_unconfined.txt000066400000000000000000000015431356774067000256030ustar00rootroot00000000000000Disable Unconfined System Processes By default any system process that is started at boot that do not have SELinux Policy defined for them, run as initrc_t or init_t. These domains are unconfined by SELinux. Other similar processes which do not have SELinux Policy written for them run also unconfined. By disabling the unconfined module moves you closer to what used to be called strict policy, and locks down your machine tighter. Disabling the unconfined module will leave certain unconfined domains running on your system, specifically the unconfined_t user. If you do not want unconfined_t users on your system you would need to remove them from the 'Login Mapping' and Users Screens. Note if you disable the unconfined module, you may see an increase in the denials, and if you have processes running as initrc_t, you may need to write policy for them. selinux-python-3.0/sepolicy/sepolicy/help/login.png000066400000000000000000001162461356774067000226370ustar00rootroot00000000000000PNG  IHDRah>gAMA a cHRMz&u0`:pQ<bKGDIDATxu|GՊ-33Cf&M]R233'iff'!㘙$Y0c+mM>_N0ZZ3O8Ԅj \|0Ɲ!!!\KKKhhhzz:b(JiifjuFF(,Z8XMKK۷o( BHea{C$T*ZBK.bt~pzn1Bk_E:g^گ_1|yCc.˲!Bmp")0 } !Dߥ~)+EQE!B3jwM躱 v8Gh5ӵN!bF ðtBԼ !$˲G]9].J2 BH$IywdcD0ut !c8NEzipSE!.Y[0(+V'GTy}G[ =q ønZVEުΑnPC(I,Zzv=0+=y>\촔~5d@Fxe6cj5O°Ay,0#Lq{<Z!DEag^jikGe$w c$Q;}nDUj5t{MRղ,n^V} iln^LMCXeYE=R0F J(ɲJy$ɲ,jBfYVˆCe"pWS98; atHQp)!&Z$3#%YQ:ݶ=[ldDEM-B |'`#AeINnLI[Z!NA"TEGYnGd)f&&"\!#n>z]Crk-_T]Wa$s,9dPb\O q(qQʪ!0Ej\zݐܜ6V֥$!ZРȈf(v+"4$PjFGF07:AqA&S`섚ZڏE)48hPv&:6?(64|wz#>xM qn7q?9Y#b\iG Gqgp6pQ !,,[Z^|ϿFttfϜ8>gnqjҘ󖮸j}ܐxB4mYYYncmcblݳ^X}ذb?wBkwN}S˶_5cZFJ[{u ctFdw:?;Н_7nP;k| nwb\;XRIq,Jq*Q<48?d2JɊ2s򄺦cѝv= 7S/ᲙM=rV^Dz HV;\p41{ꅃG}TDذ(QaF 0)$>ͻM9/OO;j~nar핳Nzj7=47}k‚1n(aV#2"HQ3 (GW>!D*;l^6bn2`N2%"BBy8Y::NT4Eu:mqK4Yj[Z.W`ZZN(:V:S1p3Y̠͘8w;3O 3oُ*:~L\TGe03ƪ:86*RQ5jnmolr{<,ǪT*ӕ:qp#˲EvCpvBtͮy~3E}w1C8u+Çʃ!#n.\櫅K5&=%y߿p:R~aS@׋auZqc FBF1"1 3v7?ʠ%ŭݺǟFF\:e#"B : to×?,s(Pvug56ذ%<4DY3'MxpSƎZrMK[ZK01h8STFCJbj[H ˱p,%SgNW - 1̜fvuXnNfrF+vCp$I y[F U@Y{=9cǎÇ>"p,0t:jVv{zߝ涴9 SDz A |!y8Ӊ鴒${< yСCI1FVQE}F wq!e( ,K/ya4+,Qbw{1OA{rD_$* 2!Hd0Ę(]nQ1KW("B%3'JOi5i(![팛 Y89 B}ɝp9G3s3oG(bdʲ"nvA9%nx\ep$SQB~t2.'mcV?˲tHB8 ]B_z@;%</zcY "%I!ˡ ʲ|Am޶|>~qjkoB'rldxFmuc.J7p:fgwjIIM  d _X!<jmk-+/c ra3!!A! G444DG, /a`0|ņ8- ˨ AfYͫ#"AP1 яB Q zCScoN{tWt8킌9DX˾0B$ɲ|]${->a;::EZhm;K?7bYEWDazE(B.=>'EAIՅ}E>3\ 奏}3Ǧ[ %16d{gX8v(Z-F Ec,aaὯsyN'BH"AkAg=)FF eU*~jX$ɾg ]Y+*yZ[BeYS<&Lp:O7SөT*B$twjp QThL|zLV,rBar~#( >Ѵ1v BI̲ f0cAjXCD-!dgfcL*Em"8NOJxmmmE"Qaֹ}Nah5!Zh$Y6 h2!$i.ZLR*զ-[mh0z}ɤyIuZm@@^eYVL&)8`2󂏢Fc4io_Vh_2iG\źyÆ˷lQ\rTS˫KL;(^.r23Osm|cgDžiḛ ˫x1(*f<'gcy^; 'Hٹko}Cb=bP0, k#FPvtot LO[m]:sF{Ph2͸d^Wq*sƎظivaF9#0 BtΖf5sp^}aaZHAh$Ȳ0 ;^VsU}}eE6e?q}7\R$IVAeFQmm,ljn1m#VYs а!Cl;8m䃇͜>mtN\@(hl?4gd9&.;tx@V?cHQv0YZ w7k挈/^lڔ-P'2qvs٬KF؞7cK+bc׿oؼ{lt3\.;4ϲ,qq0BʶX,4 +V.)9+.U5O(+//.):eҺ NFVq*=(77;3/9Q^q͕{DQ֌>|a7l{`NvG֬[n>_0fԨ}WT87wtؖ&=-u܃y1*Nv0"H:jl֥IIs^lmm8_yG._(zu6WVn۱ٳ߶cljCyj%$$>~5^EQeYE$Q$Ij޻w顡!]lI[0Ҳ4awsKz(JtWb?a,߲ϲ:l46U^,I$zNGq8쬬VxDEGdEh4cG9bݒrt<9-&7^Ou] zأPJ0WQT*^oЇ7Lٳf^~٥vǎ]{dg9<%9I z^3 9ٙr7XQq* \yQ#FDD˒IJlyeeMm-DZ.A9b؍_W`w8RR&NwKKJZе쬰Z=㒩i)!eXaY^~zG$o{cА'}+p8jFZZh2 9b9N7"C~r +K( zEp\wUY+WxWT !N+#=y.Z̖Y3.qiu#sۭٙmfjKg\oV~8f8QR:kk)-5+ ǰg]hz$I)Il 8bժ믽67w,7omniIOKcY6$$$5%p+W| B`N2V LbKN9((·`3iXǏ_Pj|vrrV-,*nlj0L!!A,$j3$DrW0qGvt8AŪRnmDG_6R(bVFE%MMΉr*& EnusKKaQi)7p$IFԶvsCSSeUuɔc4RSRNghpN=v,-%%;+xى|ܘy<#G [.tѣ:zk";+KQ۶7$'_PXr믻NyRv@^w6Bǩj+cSR]g_efH.7dyWss8$$7ߏefoǍ"JwZ"m-Ha='(0PQ>z8!S*(tt:V&3˲V%RS<WW BJJ2!DQ,"D<$aT*UNvndd7L~pcYv=C"N5`(tȇD?Ec7vӱdO4UkdEv{݂-{֡c,bK[ LDj@zfvN5t;ǯmc%IVdhNa-펊scܢ^.l*B8: äUTU]]1REӫjM\Si,`Y&.QX'N7ϫ%W~{,beBb԰I:B(+ +c8 ?,_gd?U`'Z+`h\mcᖦQXS@a:^/kχ1#IRmmMjMtTt$}瘥u;/( BEBG9ݪz;zuӍw]ЯiPcYYQBGR O91!^Ŷu -i.mGtHSv8, 7!<888!!A2d<--:`0x<a8KA$:qrNs$p,r(ǹn^(%GCVEE;nZD8(z~PӺݞ^7p8|#G47t:술뮾>0q(to:ƘaE5yvRv]Əuy6%H?sD]2$)-5J:!$-5}Nh0ʊLUϿ_njn9wǭnJ8}0 M=]$遇2{+f%xIINeN0&b 8gI&/+y>&#=o^{Kt֖=WUUr,bA`Y!=@a0dxىOl֨_ϛw~ӡ.SQ3<_Pze@Ӗm:t5WDGaB55,,RDQ,8ZRb68Sτ?t߽))}fa:Z\@0Ʋ,]|a0spN2xf+>ZVu:ݎ] lsGjJǟ}|{^АAz]!İPc0Z˭p 6 `A#D(,ɲqzWE~cE33w޳wѣGt:^WUW}U51o-7x}^8=o߹S$=h`."h՚VK#6m޲t ЈanƷ{#&&l6:i_lN5r_}p8tZCgXx]Sxٴ)SdYj47oj5z>3 'hI;[Z[1a˟Z-ϫ^|SΘ6{rʤI&p!RW_i;Ʀ&:˔IsfN>wwVk![CEU 'n*'=-{jU\|qƥ9v8-Q81 cw8npe#eW^|aC-]i4-۶ܽxb-(*w@Nvv\{k^}9s c}CŋvW^xnaaO׿|âqG9:e$It5W^9x@[pؘ݈hVS_ߠFJ,˫y0JVwlZvϹ̦q4H +"l>|PebM$aB'7_͝7p0Pw!vGͦjZ$#+3?ko<򗇯lX,Jp:|,Q#B_{?]$𱊄 ,e/>pp~}a¢Q<˰';X°(LA?*,*q\/r.K뮹7ެy{332jjj®>xqj5Osʤ$yܞ-..vİϾ^ x!>.ceeQs74)m=)8#JuM63<8HϊO>#"7ox`;ώ;{0bV2˜}Edrh4TRZZ]Sc2dYi4򊊺4IkMF*)!⒩S56M?ᝠرcРAGѸ=)ƛi2}vZZKt:y743,(7+1q,Ϊv87?**jey#/߿8.&N%6a(Fc@vVϫTӔJEgQy!vjFv =y^VQ5o }V-dZM2u:0NK[,EQTKT*NrIjyeHLOaEh4j"킠Ѩ%IeYѸn:30O=|ZJm7dZ/98 }thgL60.r!ARaLDIB҂V{i> {6I1Y܂rjznq}OLfǻ>v\Boբ\@]XE(Zڷ~0n}е NaxE1ƌjS'C>/Ց ]ƞ`X&u9 Lq:􎀾!K轨0}֥S\mydYv(& +K2B&p":-{SsbfY5|{9dY AqMM11p.n4Qs .Sq` nn|Bo]. 3W+:9n<3xw9?>%tAzJNwF0tgzTZP_3No=fFm{2;3v!)mu-r u}zu=oW!^"?,^x0u+N hʊ 8ou.r8x#0/]}+Y zOJ .a jj D%'xn #))YGFF!R2툠ؘhFt9#""B1ѱ N#*:&8(l@9]NZ!QלqrUL488#nwl,˦:NQ]K11F1..^\ :^숈DqUW^Co䆇JLHe5"?~;reBcY oߕycnnefvb,Z;cb4EIAHptM$8!xϲo2.'zWiuOt'~ݲ,>E O#EQ\pTYEA3p țs&4,#{9Qli=)4ͰS}<ct~^o'^?'dav:ΰz=r8÷zot,Y<$8`0t zEƸϿp\)Iޮ =qf5k33XzNLA=s~E|`18i}|3o~Mm]zj]6lBxXX{{tQFQi/,.ϊʢи#646~wLNJ 03Vֽew9_}LN .$Ò%,8pePoe9w]WY}Xx띠ԔdBB'g~l.]#2+׬,_ 79c;䇖dg8bY>q\=z ti[o/)9N8;{Fa@`tWe/갡C̳]%NB |gBM{Bt2ݵҮe(8}NݻNǟlڲEVKJ> Ps=‹g]NJں>457=:< s*nVX^Q'w~( -ڿvbioo~hO?9b_zy;Ʀ뮾j%߸UCB657;;ګSS_z W555lڼ6aFc6[|=Qkkx`@Nsɾ[;|h6[6eH[=vQ7G!p^0xСn˖m&NYLv-9IEmmmrs:BJڻhS;O]}dž2Nlؼ+@ Ͼ8^v|_wKKt`0nc۔nl>!~'"#7~w=ƌIJLk4Kv={nqp8#!ABCCƎ=fԨ9݊oyYw _P #GfLv ,{ם_{c̨Q7^?hug>mjbB hɱƦ%%}WNv (wZ͇W8j#ugZjj]}]tT$]HDxxsS s7t<&A˄-!ᄋ;yǎQ2-*t nY9+\h=`l>T*˲n[rEr,v[[Ld4:FZ=r0311,ì]>aNt9u:< 4! AA& L;hyF D$EGEffdDG4}juԔ4e:`  ҷTwƸX#JJK'0 fnRl2o4$q1o~Kkktt#N2l{_x4++;\ye~aAaQrRђct! # ZB!,,4>fk3';L65+##,,4-5UՅj]c;7)2~ `0,}w:cܽg! .!eYwh&M =YhCZѧBBX.ķXvoHߧȲBzizУ7zz#72,{orG0)K@]hB+=")wsug PN >KҪO1f{ n!= ~e{Y%zT>1U~Lbƛ;B~;@mU3#OxA>>8 {܋思o8^?F]J};k82 gnoD>Q!7= O{u+ Ȼ;x*|e 4J4:z$,ەLVDZC F.㚚=nO||]T:lAݝ97k#G8gN+ʧm0oqݼ~Ӧɓ&ʴ.J ߸IQKM$}'Q[i^?ѱLG=*-5:_V^0vh:%I2iRx)Ol@7v%`q'T0B7ާ[Uk.YAhբ񽢲j%=V9>w?pࠠ 歐 ôkkk/X{#$I^qaI|ܽO>E]J,ɽx'˲\wtݰyko`"y/>zT 6Y,Ͽ%KBG k|9{|r ennOOKkim 0~eRb"q. ׬]iC8pe;TUUqeUUsEn])II_~E;]᛹jjk^y ^[qS|\\t-oieqNk9Ye[!n>x?UѱcF# NEWZ{D_~i?,^w~tŏsNQ74gLh2AD//_jwK:qxY_{=BUk]>{ѣǎ-Ү{f͜zm^lhl8a<ð ёssY |{\&3=#2"";+3000##=0Є|NEYtYb^tYoPVɓ&z<Ј~WݻǏ(K/->Zn;n%`]3/D՗WT"fFAwռ,ɹ99Yfs^BEn }ZZJtt j$Jy+vbcRF:n(5V!$((Pռ:4$7 \NVHvܥ z}Ee%BH; 'g&S5W]vzqpppuM ]HGMt99koǏ-cv;v3zTnNNT@SjiiAZaEVz'L8뮹zꕥee^9%ݱsW]}}Iii[{[NvV]]K`]Ϟ%[m|l0LSsӁlXLttv!d6[N'Bbמܷ$#p~aQacSSoPwٹ{ ~꫶n߾ow?h4=jԈfΌq\roΘ6qUK-5sƒ˫ pʪ 565y\:sWV 4pUu fjjk OW5rs?ˢ⣟K/E~ϽuÆ 9VZ0̾kj,VRy9ZRbYrF9|xJr285%eС$gef^][[PX:mdZUUa-]b@v7p82-kjJJDD8[0 r͚+W ɹbc;l)& [ qcL!!!)IfsFaӖ7n*)-; -5eN3w@C{dsUWEGGEFD,^LR/t:YiV}}P`mzچƿȈUk֚Lg:^VvZ=h`nNV֪5kʬ\d e֬[3,Z\S[g4*++ǎ=ju6Θ6+(+//**JLL<!j˷n~ՕO8.Dp!7舞[4QNtOݛScLwlkzc5h-RBo( ˜(pI#Yuc_0{t=yCccbg.C@i!YQz맅}}7go{z澏}. Н|2ut!z.=*\@zy WmkSEth߁~B?_{Mw^_7yk `KV! !$wWdYe""A"BrvEQ`6yTrw!UV]/NvU ~=HT0_Xm]N&BXWozrav1M7W_tZG~w~=o>2=Uo D}fXcp|z(³/dvۯ?^{mS[tZVY[PX1޷޻rEb]rέWT,b̸5/^ !$r,ܵgooр^XTڊ:xV%K׮ "Bh݆?,YBn;d{];t!\T|q;~ k֭\F~Z|Νr?R /657ʫ~\z֭6MqXѣ}(mm(> ð,s/l߹ ڦVڵo}x]>?z7ul,;o[ZZ_{ms/nv!o"?_"lzm;va+*&MJOK -;q]8mSB9wϙsw-[K.;yɓ&),ض}DŽqbcEQZZ!4t`ӥP9n̘k23=;5g' BAAZfؐ!MMM1,ǭߴYf3**|֥0 tp t9y"wMI"B#{nPEeV0ng_~YRrW^zzՋ.=cnB4cÇo( 鴵uu!Q/]' 457wmmQsmJKё1ѳfθyn˒2-,DtZ-r--- 4С8;K5{DY3gW]q]eI8`p.;%#z,?ׇBÆ imkHw:&--- â%iF㎏?<")IomZ'qל??۽?@]?}E}LN޴st:O}3z,>s2?)(' bv{[q\N d=M>1 ˴cA͆|rGMd][&nY|:ߎqk[#DG]p"gV o4IZ(G(7LϴKwy2f^r}v2w6O>|מ}o,3>Cx;î\fe(^{U^uoYo\=sEQ0kׯOgL@74ۭmmOn^kimXkZjU\J͹SzEv%J;;;B};\ko7ӁZZZEIjo7(/;t/JRaQqQQIk+*A$!߿f݆b񄠶%%t~:Mž,+--y+=x|ׄ*I$It J?RZqy-7o;].yjjkɲ\YU5ww=O<ͷ+*fcl6oZ+*+O;D9mcB9ӧN1[,+^A~_L9G=O?G 2|/[s\{MzZ:+{f>rd5qN۰16&U+++%Y>t(Z3:9)uԈz'*vUrt/ڮ{xpʪ@/Ѩͭ{WmG/Ò% ä$'?KVu݆G}A8|ȸcRj`%I=bb}駯 6[lݾ}9Y)I7o WTToWl6VSv\/1#8(㈐%˗31ē5jZ]:ࠠe''{ZILmm 'Nhmm]a=h"WZua7l:rq}ϼQOJOJ\ >,$?_;a O>}ί8fn>߸yͮySpй?B*hz>Kx8!W^櫯##"X>mG=t"#"-[HaV-=^:fȥ+Vh7pptjgJ0 8Wl 0FN#ӧNs8,wUv0/oTdn>lذCKNxC%˰B=/qUW!}@6L+, dSa5AłEwiI757GFDx|J & yBaYQBRqu_"ϫÆ޳74TBu:$) {AQS>}5%KxEGf˥3.1 |W]t*rر뮹<(vӅ4Ǖ|\-FQEp =0DDD*~W_qźkW\r/Qi€9sXӆ~o+xN_z000^$i}џp"!4zԈo?wnXq:cnj^i%%9>pW=Kˍ7vİa+VB1wME2%ͺtΝ7orrn=LuMMђL_|Ūk,G /!h8~i'ܽއ$b4EQ.\L&S@||܌׿+L8!;+OUW\_?R0jkj>e2_yyw1G]}|[\.O>Oz7֮0+/F|9q3ǯ9|ː=`}~;dt:iT{$":vFqo©9E#=!$=lзǧzԮ 6/]JPXT7JtD=x=̙;''ս;[%K&y?LOK{Wr;8"""hx7U[W7dР_}mђnݾsמ{.qz;^fY6>.!Z̛g?TDG?Fا_|ȅl߹ĸ1cy;v펎X`ɲŋ,9|yCm]ݳ/8c-۶/ʊ@򭐻ذi9ӦL>lWDGwtthڼC㝻wWT9ݚreع}/BbBԪkKtǭ),r\r1mmϽ5k.WhQ[Z&MoXxc=6&&**jɲW\6;)11$$1iȈDGϚ1nV]sӦL6dpAA wޓ; `ޡkjʤ'Nm¸}Uk[ ?Ʀf塇3f=!IZV:Rk[ ߂Ӡ76mJ;RSot:++s^!|9YΘ1lW_x^?l`n.˲o.!tsaaa-[].X*$Im!5 zswLtb 0w Cg_|{}5zaC[Z݃ 2i]>{j5]e:!B_ϝ\ueHO5#:Ȋ,w?kjVma L2W^Zl;/:F1r7_}eɲ}1,u:P٬Vn  Rq\`IaBCC1_ީhCv)mwsƍ}wwY-AT*ճOoqO<̡|^/+2BferfgfrӍ.A BjZ)@V2]T|o7򭐏?̑̌=#[ڦNwF~;~7yoɲss B***SS#õZm]}CJr׸iEqyEeFz}ܜjJRjPLtG;:t8?"+'3ӧMz:2H:yKV\n0~nÏ?ݲm{QqK=zwdmشȑ[n?8v˲< 'w[N斖GDFDl۱^RZZ[BnF3tАȈ쬬斖ȸĠB22qQQQQ&L`6$8]˲,\}bF!JCcKg̘>֓ں܎" ihl}iS&Fn;)11::j@NNxXXb||fFdCcc##3Fn1[&N?md:*IЛBξtS4a$K'M|,TKcxˍ7,;aXFqˍ7piw8RƏ=Lp2v{JJrXh̜rK&bCg[뼑[ [LNs#x"~Lz.C]L#S7ܼ-g {Kn1}}ڣv=.?W9u-٣=ΠGUQN:Ƙeq?YwEt6Ǭ.O TH~p ~B?[؄FޕEe=NC>>Gϯ)#˲wdDk>!WdYtp"^9Hg1lL /7"03?s#?Yv]Gh>N͋hF>]hw+''%ѱ扢HMs FzR( -޽gVYhqMmmvVV.t. ݡC|0 Sz_|yLc2׻MNJ2,{sQwQƻ(255-Xti_z `&1>tq+jk23Y-,*w {Nly7<{=)=^z:[t!?,YZPX F|bѣ~mb-۶͘>ϾyԈ=ҵ8'B3/RZVs#0O=< pYƛ[{ѭwnڲ_~nơCλvUs<_!ےR~yB_~ͼ(/ aaC457+ӧN=ZRrF+]!,,eک'mڲwq߷};w742&pOAa'i˖rڑ#âϾHAa\\{~$Rټw~V,iϾretB~jژ9:~ع}FŗKW,c7z[tWq:I~srߏQ#nNHOGy<'ܹ.AJKM鴭mǏw\|c>2zH1`?^qeed%3OKLHHJJ,/Z;.t5xcGNMIF R^YwTUU۰QԔni?I_w-3GYfMSs38lzއ n1zȬ;oMV1{ڲmѣd~QQW^6{@N6A}E9p:vyYBuB ]wn0[ZBZ64$8p˯G=whيu5u11t!QMMÆ NOMn<ب#e"#"ZB 4F Ac%IBT\XhB(66Vp ,sWS[po.a |NףsJ Y3ӧLٰisiz`ҥ fΨZ~}k{;rNRBbCC$Utĸ(?SܧxxX臟|fZ#""ƤDe߲u˲BLȈc111$2L2<<h* 'Y;:"#" Bb8֛nzRSӧ}ee'R)<,tر19czllLU])&&>.,.1}ZttTLL4ZF;]ZPUuhdYf{WkNZ+ظzem]ݻ!d4].3[,/tӖuHؘ/;ZN`ݭmS&OܾcGىnӎjkoW8[tǏ[]SeؘʪWnljnrFp86!dn7\Bh߁s%K.Zr"?Za,pQ!ox=|` yԔ쬨(:6xaqQNv/X0a8Iy7yW3/?RP8cO?r˶mE'$ٷ̻|XPTtԩ~mۋٻ-[^vOއ-]|n?^n1Kuva;6ot:"|7~EQZmBB|m]]fFz@1:*jQS&MΪZmӦL3zdYf?pv ætF{Yc;Ə{͕W[ǍkޔIGEFEGEiڌ4V[Rrt홙# ݻh4a|ZjjoPy+䄱cJ8(w@)u'q{u7nk~ǏsUaaƎk0hѲ0Ϟ{?5Sh];¾O1]tWToFߧw> b}Qw6oh%]mIPݥ_q\AtgѼ| aEػ1=ދ 9L}f蟬 N-&~gֿwhe./:c.w ߁~B?w ߁~B?w ߁~B?w ߁~B?w ߁~B?w ߁~B?w ߁~B?w ߁~B?w ߁~B?w ߁~B?w ߁~B?w ߁~B?w ߁~B?w ߁~B?w ߁~B?w ߁~B?w ߁~B?w ߁~B?w ߁~B?w ߁~B?w ߁~B?w ߁~B?w ߁~B?w ߁~B?w ߁~B?w ߁~B?w ߁~B?w ߁~B?w ߁~B?w ߁~B?w ߁~B?w ߁~B?w ߁~B?w ߁~B?w ߁~B?w ߁~B?w ߁~B?w ߁~B?w ߁~B?w ߁~B?w ߁~sr#,]_B×A#迿~Q~9~ VU]Uz3!pKaP#L~a\ FFp:Nǹ^aQkgtv!DGDEDqSFZ>?G68w0Ʋ,Dt5g"0eXcixTd%c@@V%:"ȲtpEqjQII]&0 ޾?o#LhXol()=6i$ZOl1>tn.*0 #KKp1$1CHQ5ϻs>,!y2]EcLQr9,XQ. " !UNE((;sFQa|/ɲ1Ȳ0 ĊoI9:{Uz,:ЭqZ$cJ㣢(W:vodY& A$IB);"YIDATcy(҅,qV0²"<$tCN s@p8|(Z"B@t\+3]yo cLϊֱ`شeKaQw0 =*EK :v,W_O76..x[teNibYB!BJjhlTEʲh *:Z(JrRF3w( !ƦϾee 2}z`F$nFeLp:9.-*.+]zM c 9.67J5,8c8q /R!:::vn0LwVoc,JbYEyiY)˲;Z][#2]&0, 8UbX,fY Bu55:*J}۠gܽڄ(²lKkkaQFxot qZ=ZRZqZr#Zo @Qq!DE@ޔNh.6YijGKJt:흷ݺv=ϾGOZRr?Tqֶ6V+}e%.&t۝.pPm}]}C=LjRrpPPbi%%hw8DIlhlt{32y/tFY|E~A) ޻\r;V˟xy/$yƎ7= ZA!(Ȳ,2˲;w1KF<5 ;t|5wQϿ""mb!JH/,`bVVUfgFGE(;#&tl,G Drt:]PEeEQYVq[;:B Wٷ֌k߲֭uVE;`iS&(/f+.OFcFzi1"H!BD Eł[v ,˨#t:) awXL:NQwP1ƒ$EEFzS t:ռ:",ܠWTۃL&VV遇.DũjulLLSsTnw'/V]~DzM2966`Ŋo0``n.FSq (-PI2N!pѡTdk^櫯+'M7ߺ\ t߽ ĄPFCy71F74DEE*eYY}Bٻ+22 0 h%IB8x0۝dG:vÆ,r S&NLJJdV!#$ɒbd !, FNGc3^ 4=S))>^v{pp0=0!hTTj1fR%IQav2UU|``uW_a4KN,DJNJ8~܉ 펎  KKKEDGE6ՅDFDx1446;v 4@\мc8`Q !eӉ18Nt^,;].QXet,z}/Joi $I/3cِZpט(yI<GݎsC[w8v;`6[BLe pQloxΡwMǸ;zYgxEQx;iPw P}X7E!{~Eh^9E1 vUo^ۑ(,擴'X%@peYla(,&'646g~p&%&Yֳeo&pQa&:*WMwjt s"А0Z\\Od1[ .*l)WPIDQh4z\3.ZM:wBQ>FCY96t9 x|!Dͪ1Ɯ(vG!DDQ9-˰A44 y5ϱ1faB_Ky{"DR!8B=Nu un.,FFD"|{uQ"  cԠjbbE9a^P31²,7X ("bljy.BH1!-tO.8EQB:ιCcG;G_( AarSBVW(6[gdmV0 5٦ȝpb:3MI8tt]u|{!zdYsXz;cp _0 [Zo$*(rǕWU(Wjey*#6y9Xtv;5j5 !Ҳ;.(.w`J'j{rG:}`yaT\ǩjQZmo̢E')Lq{VYZ**.fZY]nn'cEIX-?9>$KI S&N -+?鬬v8 XVzaIjqX---UG i_oz}:*9{ JU][s@ASSW[rx<,4c5nʲ\X\d<~DKkw>aX;:v)dۋJGѣ.A8QQ^P1>RTnn?zt ilje䁌 ~) ! 3 Y 3rlPPPYA,1Qz^QvGEFGGD dJp8Oy/,‬áRbNOhmkkln 0wQUyUUjIU TBB6YB"bO〸 Ι?92g3˙j#s[{( De!!Q $$ Pq(Cpia^[uX?q}W\,;?BLCs  H cXUUURRbMLP(I:.tDI$縖V#y(0LxK'(1 ƴLqx& (dc,BsK xBQ~=Kw dYW IBJA !㘖se؁UU4BP`0ز,q i ~Q'<9|v0vH4'9E*>![]&;sG,{ܞ{S7 JFCE^ppkT) eH;Bn҂вls#rjmvp-%(ywթݿaJ?B H$u7۶>MB* r3Bq!Br@$_z0@QTS(C==z{owG"X( 8βzж,S(`0Ƣ(fg3)I\1$J?B P;*Gmc* rKnߢP(T) G->I?+#Zv0Nnxrd^7 [Jfdq?Q+$g m\/B:}Kȱ,;Πuce%Q 0VuάS(ʝd'%:wʨH8'8 (W\ɲ,xĢd<&?{܉ֶP(8nAdY4OG\x<^ oGkEiLٶm۶"JzEIbYIJRMB>O0Bi,<I!adB1@8Dz,e}^(dY]!$}}JK&AQ%Qt0ۯ^ sss<t]$%\.i$.tDQvX%Mii%) {0LOOͥmGk^xnq]?߽{BqqF(T]SC۶ild˾Uhc?K-|0(_;-ϛ[j( Moe<|x[ihj^bY?xQum߼}…Z 2[9e@.Y٢=jOv'gLzovEhlɒ{66%s>=gֶ?XɓdN]PP>s8[**ӧMF=B cq00+W,wK&UQomٶ}O>Q_]0-eW.Z `峫?޺ {^EQ^}}iY,۶Oa}O|5yβgϝֱcFYVgYO{ǎ54,}g왟*G\2q_hA$Suǎŋ/<ѣFQѧP((CGlJK&l޲nڼoIJenL(._u⢢ mm_zGE",pݪ&H((iqAhj>5uܞK,Rvwe[nim5MhuʹS-ɿtW/7@,60T4im#m =P  vTUz5ߟWy칯sr @(d޽Y ~z$3gj͙{ޖVǝ1|P0>yr,0L}cGl9PuPeҤQXlG¼pϿX.Lu=.KRqq' ǎ-9c[Ŏϝ$: BY6,K!8.HUlҲkDz Ee!dYyA6MS۲ 8Tuxea} @tݐe @Bz8SUAHdj05jcY0dAKAp:0 LJڑ$2Mc ݀Y%SfY}R0DQ0M!&--k_u/ggeѲ ^njj+A2麾r@iY(Z*B"UU%jA0e 1H87BdPjTeO$Ď$'WӴD !-˲o #H@uӄ,"qjGQTI8xRoIqqVf&} r/2 ^@i+.(P%YB>)yIw򀜺fˆlL :E yKr wGƵз'Zxa,92)*, r'm&&wq;st(w{8 7UWn.cf҅E roT{!gAMA a cHRMz&u0`:pQ<bKGDIDATxu|G7+,33Cffj4en)wz^)mSHI8+-q^MOOF]ir̙jt$BBH[[[KKW[[HF}ɲi4$Y%IB!'bY6!!, I0ݽV!D(T*FQJ\B]dYnB o͋'Ngw~9/_~!ԍΆ~lA%, RC Ȳ0(*W{W,˲)L3 CeY 5Q֍e+ПDJWN( ݽr3 rf)ըU ISUvJ2 (JZ:7!@)0uRjѨ9AiT Jɲ,S,קBNA%VNAF)|p'^^7tz q0F#˲(]Uڡ?QdźGϔמzb۞̙,V[jByfBl;tt-o?F2eXtFv8,2 !@(SȔ 2 t> ;C !lj`vcv^gn鴔{A4$I`0[r >iU5[~˱,+KST*!0($T*KVP(Ih(eYF @RөȲq\iEeK[[ pD9*,TE96?$~V{TXZmVf)7Fo8{JD_^pm~Y9&B'c"N{}׹ٳ^ytD14(0:"|9?pfvRޯg3PJEIdY6h妭=_ FҒ8i7>r/mعtA!,_um7}ٷp:eJjrZ,&ٹw*_׃wq:ztH^}R94(HfOC>O>p7}l<?gJ٬V z$˓F(k; f8N`yA)I|뮘t1>ʚ-;L=2@@m߁G3|ln~ed>tdÎݭm[jQOFqYŖ=5,^f>aAV oF)0zV$jeinmݽrF)hE9 GFJѠ+N'C)J^2;,SRSqZZS*SYjmFá4g^?#51AEtڪںe:.ɲ^Eb1{]3y⼥+zđw6mh>li VVTUf!!NQd0Le[ܷwxH,tR6{ZRN$INC o#Sj9wp |Ï}l<ϜG+.gRy-^j~Fb\lqYEKk짞l)/>%+!zv!^FN%(a#† ;v|ߞ37<8hN6mOE)XitNq8L)Ӣ?*l/#S0ZeeYv FVTAp:jJyrh)ZSPBC@vJeQOLglimS*{! 2i9Nhг&(N-FcYAz]IE }L>f/ee |jj6:QNg񌔪cǎa%bdYJwQ*˔eِMH{R!,<ϲ,Q)6FVKm0y!cͮW RƲ,F:sHfOw:BRemܮE6ըxx!̀^qFl4l,އ~/˲*wt8DQrZhﵢjR[L5Z5˲vy%wL{:_L^R(6MEph4 èT)'JhXh7 .+.ts:u 5a0(IJ ! atu[ Z]X\ܧgO $d.459娢g)sΉ8WT*p:ʯ 8ٳ~e[[+*\QNKTVf)kll_I"JZ)+ӫ'֪KKʚRSo=u/NUjU}CKz2@H]yRRq;v 5r+[ZAKKI/(Я!fUVUGF WfF$s!ò jLAassS^!Y99Ҕd} jwPvFC(,jTNeYVr8UMR+iɻtΥ,zcVRk4ZfΝn5yL&Veh0x{FJ^Ѩf//_-v[k,ԤjEQjMMM͝S @Xe90D445nٶ8ej>fZE1 f//oUU]S]Se2 uҲ>$'7d4ʲ6lh5fo`s*m8NV>&/Zjjm6fcq+r`[혷paLttiyyccS>򫺺zApo'2Ðֶ]{0 T]ZFՊd492ClJEQ鴇Y|JRT[ظyh0 fFEIyyy:Il683fYV+7ۓem^"dI 7 R]ɚ*[vNtD%#T՚eNj ZT]S;q¸Y~w=)1c=ZRV6y„}z+nkɲl0ŋ|IZrrΩS=o,Y%2a2Z6ɲҨJJK>VGSyjUz47tMM=Rp8U޻:##[ZZ7mj{JONLذsf#'Mlhh:qjz'3 *NZrZj!n0d;z$qR0"#R2gKuMSM4kfXֺM t'23M&Td p:?Ͼmjjݳ<$Ҹ1c~䤤cǎ6dnJ%F1$QBZFoXhquMqfG+ؽdn ƌ>rXiY$%4 ]L9_-[[/=z> ~Y?t1$;$I:v2ibP`X1n|,D3G3r+Ŕ&/l2zڴаm~aS'Mt?˲q,q02즦W$ Uk>xȴ+yGqI3g rrs aƎqͮhTtJOOMNyg g\uSi󶒒:qM 32 _PxБ¢3gi˶֕'&~qDũ؎ $+577_1erLL{fuuuվ[T zAdI$I%QQEQ,qѾ&e+V5ŋ?ȱF _|}'O`0ATv%I0?!t^ڐ!hQmy_}D}6H(`RvפZV<>y%ɒV:x֔5k׻3EOlw"#o9+*22: P*m'LG+J6 ~~fyIW^1bݽwԔh4j`MFcZjrTooo8cTWMZQU5h@IY-(**-+8ak+*+-Vk\\ȑî:9'7WKNKM +)-s8'ML#,r 2Jr֯h6yߟ~jO9f\5jj4Z^2lZJ{i4jq~~ pum˩{λZA4Jjv5;Γx},V2hAnĵ6|UJGvtF BD჏O7m1?p$!) mm^l9w!Ԕ‚ \|ž{_9u2;Cz4A?d{fLOKkhhhiiq:MMWLbyt:p/Cy^}>x^zAhpXeYaYc)8r]{LFbYj|}ƍ{mw,gjY,V)XVũDQZ>t @=}rؐ!zLCC|}krrNn۾3-%EP, bCcSxX(XSymVS vR~=Qwڛo8!,5uuضclj,QKKعi3EVFt::#G;RXe2}\J%Sjۓ -Xx$M8࿟0-5E&'7467776N8?,Q(x5 esjm+;u6/+75q {(^s5z^ bppp\ḻʪiWL=bGV]{5פ$i˶5 ,8r?_[nh)f(k4>{SJp~nQeC2::r!:vSccu:]VvNUuMP`@rrl  $1..V0D;,,T;s7x斖3gRB>ԬRn}^1en !%)WꚖֶÆr*N$ luMmmVv3 qx(M͕UU%(&74VVWxQa&1>.f?LSRSO矙>aCgde%'&rt:cccNȬba>vl݆~L"򶝻jjkbcXZ~ ^k0]C-`T^twA6J)ǩJKYY%N/>̼ywͪ&cYaC ʇj:yf0Pt:ydjbQՄj4]eopux+?rbc]rm6+C,YF6KjvpPܤRAp:^^^E8X,)Jjmv^Vs2 yIF-t99O=hmkJ4ג,m ?xp˞ϓJg*Rb|b{NJzN$R >JRifp( *h4ʲt8FLJY,:fSJM&SssjzRk\czxĉ.FB%pJVq*IQ6eٶ6 qfs8FA n9;)Kniit˯u?l(22 è9%eYQ]J3q ]_r,+ձ# H+j~he^k_KtȲ$BV8N_V^VQU;w$g y{DXDHpȥ!F! iu(\rpΝj};c*8{[zHd{u~#IH96ΕZ7~B 8Ty+Kw/9w{NEDtop8BC.ž1]nQwB)5[IO@U88(! Ȳl4pu\)%: 2D]uJ^w鲵<po((X*!lLR$k(! q'$m@GgCZpVH !DNÕ[on$I 7{4_9 KˡaDQ,++4F N}Y2dY/R%ͅVXW)>k]ʄJ NSRs$gB(ZַϭɫOխ' ;zl\/C:PJ |}}^,$$$ޢ$PF2 R)׃hDQB8VkH)X8Y9s8^)CSj4YAp h4 pWzS\RpM7Bj(f˹DGE5bhʪ?e2|qAaYQAx97]w]hh2u`Jr󪚚w\}4 `4TTTko}"+KEZ|Yy90,ˊ|Kk+a31H2SnCC#˲YyJ)C(I|ͷZ :dYznomkj5 !j2t~Aa!˲;w9vBC!PZZ&I˲*J“ p />8buM 0mVkiYӧ<\ B$Ir? "9|asx^ӻWkkk\Fwݛe3\$$${yÏ+*|}]qڭ2eFN;d!&ju@AQ%I"E++!DĽ8xhAF^R%O㱰?&[n/-.)mii kll'NDGFEFTZZcYl6gfe9Bcz.<,L[-Vf𯨨LL9~d#'7/40 0"7f1 p:N,fאA< u6҅eVG tt=w$X'uK)3f_Rt=٩k /3Luܥ }/{yyplI\}4+  Ra%QEuw: BkcpIL&S}C}qIZ1C$W[<"!~v]Kml@eVJb>rE{=A^ǸEe*tJNPenljdY~Gk =oF>Gf<I| V`)8;o7~~<BK87ݽb(x{-jwTHZ pvZ <+R*}9~Б>i\.2u8AW3Oofm'#<'vѯWwB.VRYN< _Mo;]hh˯ܗCG.۽;UHp`o>/SJOFFD F3Vu7a14$Te9fP(**4 A I;籨ܹb \\R $ Ĥܜ(666TUWpUW #LlʙZWw:%az5~U{kC誐JęL&(//X-I)(FFFjHeeEuMF vDe"L&/p Bq^%IZtqMmk sv Ϝ!']Yb鏋歛2NkQ'?6,ʵ,Yx{ھs.G۷'+;RdY{ƦܓVWK\MҮWWT@k[ۚKwg7y^M9 y;T!KJK]wjYk׭C(O*933祋=~㺂3,**\x#7oٸtꊇWcJu>'FrOC9F:лWNdfj5Ȩh//sCCy( ۯoNG;N6C֖}޽H_t8`*-+K8ܳg{NsXQYQ\R4CCNRdd=S Hh4\7L^111 E%G/јqlذ%ŭ*Ne 0xIpng9JC4'%&> ?11 /-uCG~LowsK:dxN )(,΢*= 4k=ʲ|NKFDDw_^QZ[[x _a\!7<<"::v}&T'@eeS)))^zJ:z}32عaGdd+*.lii޶c+ȱPCqϜVkԔJ5kW޳Sݻw:|jnڲb弃ߵg{ґ'p]_+J\lᣖXÂ+*cw_ڸyr$JeU{eY޷OEEyKK kjkk9$bIiɉ ??GY*+;So,f/eewڵC$UUUk֭Z*&&Sa2KU>}M& (++]+GNe:@:?.ZX\R4dPQR*K2tD &ڏ?`ӖJqe+R~{/ճwHpfeY=0ڽS#G8}Ve=TV^}Ƕ9 uwjaFwTP`иFջWqc' FFC&00h1{mhw-Hec0lٜNgpPȸCC’SvN̰:eniiHc?#I)?-ZȰ{GƌsUZJm4!z'LV0zNR ?pm#PU $ID)ճw>}YUTN2 aȨADK{՚[n9rmdD:FFG L/j:R|mfɲ1^D??I8Ap5O~5r{3ndZ\RL&/Iwt6ص{ðAAs*/7))h49zX7TTTlV)bnYIyynҫg֤9jX, Y{,)-Ȱ{5Ȅ0gع-::h4t:Q2Nw8fw>xTZj5R"8IVfܵa=>uMMqq GX(BAX6.6>$4jr,ڣ(uNS 8-䆌>AEGZG|2o+^{3պZͦh/i+ʈ",^pxݽȳ\dߟT!{e665]SW7~m˶[B(SY}0,SI:;3$,^*0L9~̙#O\=*3)O鮚{Ouy~}{S~Enԝd* ;"_.;vY!0Fv۩~թ 'eiN!.ŜkY].ؘؘ{]G(*R$²D:U"8l%ِIx{MoɸqTpq]dY>ђ]q6:SNZ3П ٩Μ_ܚ]\J/_}_"ߪmWx(-BNilBKt³BϞ$ [~<5E+[!<<rI:G9[yl6V 6vAwZ{:N+F 2PJ{qFDQAý֯7F~uH`1XmVeH-BSdYQJM& DAj p ض ʀRX֮%6;DغBB@. !^^&YIG)͞ O{O?*}G !$ NTOCeS!)PRpD ˲lN'AY#Ȅ`,@HX !>WJ}X} /Oyp}c!~JR{{ʽYB`*زt:X`~8tԇsρ]\)S ]üy0>|L?!;)#Ȯꓚf,*{ÇAۣ@X"0}: j5Q.::Iİ,uτR*/Ov  |"_}ߎfJf*BȯnIe ʆ.4wb$Iy={9Q\lzZ=WZW~r]DxiHL ,fIm?v J[xᮻxಘ/ !t=~?-}<< ?!!f3(,+F,[h4'RX\ov{\lkhHƵ7$%&1L}`"#Ic֭d ĉR_`PB9g}uC:rp*:O@mvB\uUYڎ]rsOgg/u!LG;oۧ^n/Jg_|9 k:&D騥J,m_cQ>bsw7v|uvF#͝3h޻w_{ŽrnMtِ+?鬮>yrOj>s,#Sq{\juAaQlL/vA/YzՕW7|ÂiIDذyVGw߅eG9⫯߷w7~w֝[b&Lشe|Ǫkj~Xw\{ՉoZߺm{IYcǵZmcc}B=t=R ;'GZꝷfZ?Ʀ'Ǎ>$wϼCy >?B)% 9vlcn߹sWN2aܸdԔd%xqIO?/[g~;;^=Ǐ>i(eNټmӦ|ӣGk'M/'f9z<%t銕ƌ[9kjj>z6bZ.*2h4o9'/yZů,˒,鑚φ746ǽ{8_6dHLt ^ӻWI&̼صLAjZm'y4hny4˂,CP,Y'O_ȑo\}5*LSL珟81qܸnK+.Zuw2hM7\/O?={]=/iQ7^wSU'ss{VZjիedY3~yɁV^;lJ,,nNdfujJHr7NA}]溺0h~>32^{ǡG֮p"3Yw%ǗW+ 9bxZj 6?7bЪ L`cCB :TJrhllR8_ vI8+(,Zdr!l߹k?T*eϹ ػ88@XpՍ5d2TUUY,UUZf`~*g4BXٰi znjZVy͔Rec6mIz֕Y8^ؼ>jj`t8p[~.cZoo $ >.6..73+;4$89)),4AcSDž%&$,kMFSDxx`?!$2"\yIqBrO0'7/o@s:NfWw1详^|1"<샏? =q" {YO뉔yՕW|Yٱ1'sO) Я_Hp̱GSyyJʈFPZmv{qq1^,644λJrR+XrEEU={*gѕ+ɰa5vm_\hܹ{A \1erƉ;n%1!^ӥJ0h˶/=;9#KPq\YyWQQ;B7n޼}gρZV$A"#SS7lڬVGZJʠιJQ'{V?y֮_ښON UO|?/**r!a~^ۧubʲ$BCc鬫W^jlj6n=xWՇ٣GfVCGtz,W]1e%˖sWYY_BDQ<ѻWm;vn߱뮝s>dnJJrrb,wȈpZl7_}y~I$I0n[?~)&zn[%88hKp/^bgמ6m*XrՌWM4Ͼ7f~_6m7755mڲuq?/]eDfGF3;ٿ!7<+p!:iҼ3 8А+Lnll9bX޽x2TqqIhXHXhw\LLXhÆ 4pNdf9GZNkmm1*aH\lLF e)( d.Ȉfpua&̄kes9Q;RSKʜNqcS:o޽zfeN!-5eԈu ,Ku\lV MJLAz8ttFGGS՞Я߰!+*BAHJL4``FfѣccbB5a;ppW_5͠;'Tjr;nXv۹kwlL;uC*)-5 Ξjk낃 src^6((P)q"3S7%';g^z趛nۧOuM˫GZj}}˔_PXxᲲ{gݥ\N 't `Рo+^|ދ|sGhrfد).QB~ DHOᅦΝ}wG$(ҙU$I$EIy2?;(]r$e#g̀Tˏ{'@e-鬫B\%]:jمȲB+(I{]u<$ J?@:BM@"Kp ;iC:w&$T7`\P`"HIaxZ$eUAOes>pHQ}W/oDNǮ's;wYR٩?Ka;F \h!Ʀyy=>\(5Hje5*/9Xq$t i `xY8t)Y#|Rp:`n0@{BvhR@`X۟jxuظ*+aq3A}jk!4-B3經(ãlؽ6m%K`JX ( ;EI>_A UU[|9d @)E_̛?WA잕鄂8v kAt0|8sxyAZZ iHm?x3 ŹONRR 9n6m>{aJ#>f:2˅t5'8p- `v i?H`lJadY !'qu!?0_ҙuYI{z# N.pev1QnBG3d뮃k={1  ZWᮻ`V>||h` F7  > @SSe{{!$DXGry{Y3[3쁃2Jo4ЯU7zvWrޡ*2;e%\QQ 2 ÈIJ,T#"Qϙ|sT^ؽo_YYr08R ê*B >|o۹χRRrjJR_Dˡo/]j4~6 A߾0y2ƞܟ 6'DGE)#mUJJn:=w訁/_ѣS'O=?uǎc(SV\ѣÇ4au3iJ~IV^G0yS/Jd{xݵS&MrꔣǏ>i@0̱=njSMǎyWٽw+?gX_ꊩ>,{ ϼbwܡlſԳ=OUĠ9ܗ^{o+ βS{Jښ흔m,/Ybso^! YQY٧W/ 'ٷo!ii)),O<9dM֌]{N0AӕW&V {5:(=SRRb$'Y?I]Б#k4Q?.Kؿ`!CCB\m@)hϯ7 ]VH F$IZm= o6{͘~URb↍!%BZZZz7ސaӖ[naС1>ޮ2-~J6n!)78SkVuZ-0$G=rr팫[1SsB{WT7ԧ/^>}{^9uKm߹ʩSN'05Շuw5sVT\cSP&?l~E]Q@u:3gٷ3NdVWW lVb@ccf½:|â(Y֣3{Хlk}Z5WO߱kC?s8dAO4)<,nq뭭moq**VYl)&.[O.-*.1lXUuIW^SRZڻWKWT0)-+9SPsh4JOosN'[V^֯OSyy >>ɉMMqqAAp~}~a֬_jiiθ:"<53+k̨Faێaؐ!f_\lLCccz&ql-*)#!>n6-GZ}{Хlv顡!AAKWPT|^dTb~֛RSmPYUC]l6_9u 6k4^=RR֮PY^fͺufRfM!)1aђe&h/,*ڸyqcjZ~AAvvvttG<ߧwk-[r]ӯrȑw{BRP]p4/!]\,˺(wϠc4k!D9ܹz[+G9x>㸎`eݳpOC?21U{7gaMHz~y7[q\Y6|ѵ7dfeB:lZ !T9Լj_^QRX%q87nZ|Ht]”S[Wu:K-߰i q󖟗-Sr8m/j=vkjsNEgC<~Ɵ-5 s?-^RW_>toTƉ̗^{>|uzw=}~'B]} /Z]]0,˼kuuAվᇧ}L3B z x+*+K[Z[%Iaֽonܲ \555o>{IԳGtr5MƉ̧yN{SW_hڴZmBB%˂Lsx:??>.vЀ2N(9Lcwo T)WOo?,һ~x&>6VYnwo(3B_PT\#---5eד:_|K(|m΍7?ߧjftz`eY6 "PR J-B:DQlX^^ʹ$Iv7BXk[`TN=9NJuID w:JgjSV !*rKvƢKT Ju8Χ0FUҕӑdgBB{eYV f]wݽuw~Ń T շ7:Jr)ƺRݫB9zF^D B y@!!kxWw|ȳ@訟"?XWϵfsޣ?: L21b8+avfc:2 (r!aYX naU%][vMγtuecF*N!,4ŀ.9]!nJƠIRe~EGV(otu{#0}YRb¤ 3w9yٸ;wf_$m~`5/]Bk~f]qedY&lش9_M?w?>2<٧p8xںzW]zZIF6 #%CCm]3Uӧ hkk=_G~V[[=AџQIP[['bCC㙂ǎ+Q9)"CHYyyAa! bmm]Nnnfv6?{fŪ5J0w; X}{L}{sO 6ٻoUMu}X⟏;^T\1yy2FSSWw!Y;wJJLxOY֟-c&.6hnn޸yJʞ珟81l萸Xe5!(>Ŀ/^=mZwC/v쬭۱kRSbclM),,2{mں浶t3zĉ>>NJ\lzK4MqI^>[dwK>tР*%vޞN(Iqq?g/ڳx<[n-۶ObjIIvMПDT*T>xl>R[Wѻ@uMu-z$8((&:?V>r䑇ܹk׿Ͻ`ك~VZu"+[2hU:=ioj<;ER!!mB$JNA?vlDDf%QyUqG-dInXׯo߼3P2j}W^:y`OD}Q ~Z4iӯRfYn(I"@}EKf<9ӏb>ޣF ɩ  r-LeVaYAT*kAPUNfB&n9Nw)! !eV+&0 PCJ)˱ ZRK$IS݆m?* f/shH?׿_}p8:3,kDQ]$ C(O>^~4eˮ윓M'N0L{|卷gO\edY>yԵ3;NZ-2p( ݫ5k\Vew:0U]=mM[k+׬Yfͻoh =R{μg WM{w|V~7gDQ|OWVW/]Ͽx@/J`,<|ƱrD`f 2x֭?h\l_~ :_UkBG6(#w)~b+L޹gϖm Co幗^*)->;q+Wݰ%Iҿxo/Iq˯,?__Z5z=C>---, J}hiک)Y,:Xn/.S]֟N@áخNBթvm޺mUf//<,̕RKeo ]wѧwNAהQ<| r򫓹C 5֯((0ٱs׊kQǎ^9B$IjnnVRSs3t>KN)Z"J:Ʀ&Á=!Vb{XNZV8pЫod7$YVמ$I X!ԺVBG#KӞ% !onnf޹+Lkչ*Te^(MM(PFs*ﴲ2~jS޾sעxyy>أj>_fs̙}YCc|>hǮ<ϗlوaCعrĄz{v srLƷ{מe}zzw,[mǎ]{?p`7 GWxeȈ߿exSԊk[pCaJׅƛ&)7W|{Kڳ'/̰!Cv XG8lʬ%˖UT ^8~aC%YfBsW}$'m޺gqco5aaA---:c~1gϾ}>Ec%ǝdv?<s/ݰ!LyE(wvkB|܉l#-R_o[fH vԈ--.},[rScKZ[FҲhҰ)'*?t#G͘>mܘy}{9zlcF=rD# F>U-Ӯ嗴Z}@E|MʼKu&Eܜں}pw&$lڼfH[a#{̔'^%βL)loJ``@`@;omN )b}CXm01':{BCLʫF1t˯Ŀ̬Ҳ;nuudF3jgsO:h01 _M \ZV0 z$K,,{ࡕ̾gҲf~}6˲Ybe,e!EqA:2.=gB||fv򸠰()1Ay\]S:NiTTBCp)8v<#(0a_|=3j䗟}|a9{aSXXoӮaBQFFiiiq8$655@sK așomXĸ?-?SPTTLF$KjIʆ/ ,_h$I*++1|Xuu{}4.!>-˴,&KRsK ee xv ~YZ7}*,I]3cϽJyyѣCBBdYVT7Sy\==2"'d)$$xOWNr7[g ǍnF23WNq)LNJ;zVY`4yo9_m߹+;'W^;6ovD7ٜ/9s8$HKuߖsU5{V  ڹ{ UTuu[/88(5%%2"6488"<<1!>6:;Gؘ蔤$eȈ𐐐АQ#F {3"Yņ~%ad*WVUMKjO=my܋.˸ֻx@kӮڻW$Œs2wqQQ11-'OTnvqqt~} :xɲ⒍w-7_(|aLt ^C8ΡC?k֯~+|[|k5ϾgVQq;#-[o ꊩ=R>wY=j,ˡ#G{ХlYwa4kj뢣"@=;>G[j3::<<,LYHHppUuu>~\'4p@EULpPP}]=B.ZTS[O?@SET*.y;/Iqee.[%lܴ/J{ks !%)f1n;ȃ/YrʤE6mkhXfU*땕U?,IEZd ZmcKrsMAAA&/SLt4˲Ǐgl߱eYYfW_pP$2LǕ25 jZVx{ХʭB|--AAY9`ښ{y7? qsqU~SۧT >thxxc&Mm6u UgL?.44$,,TiWmv{IiL&e[Z[_{{fLi[֭)+/߳o_Shm?,i[(磏Abd3Ndٻ~葻v?spYA2 [)>>=|В;v^?H3VjZ,hp?勗,6oVQYݛ.U*[n'2^MKM Qrgd8nE#O?y1i„?Dfqc;srF.{?<3;{ر_}펝sr9pЖۏ;nFZ=~O>b?,\xˍ78Q;w1 bꝻwo۱foٶ~Yu:]TTdYyyrR)4$dAA!cF LMM)..nnn7fl6˲k0lbb^KNLjxf dܹ{Cg\5\S[3lȐؘƎ1<$8(2""4$D%%&tSEENbINNЯCM&Ө{ХU!G zL&SGw]ǹWlڲ%2"b;àN87 %%Æ!9v/.6vЀ W=u!a,=0LNn_?x*R+**z}rRb{)(uu/G!tq3_9e| t*E~PFɲ Z$s{>dЄ[hIB^|xB2j:)v9W}nJEm/&˴5oөB'^[~ :zsV1Ԗv,"eGp׾GP`Z=_ a>Dص1ȟƉ1!IDATHЏos2 [+$CʄO~he.}/\8B`G!!<~8B`G!!<~8B`G!!<~8B`G!!<~8B`G!!<~8B`G!!<~8B`G!!<~8B`G!!<~8B`G!!<~8B`G!!<~8B`G!!<~8B`G!!<~8B`G!!<~8B`G!!<~8B`G!!<~8B`G!!<~8B`G!!<~8B`G!!<~8B`G!!<~8B`G!!<~8B`G!!<~8B`G!!<~8B`G!!<~8B`G!!<~8B`G!!<~8B`G!!<~8B`G!!<~8B`G!!<~8B`G!!<~8B`G!!<~8B`G!!<~8B`G!!<~8B`G!!<~8B`G!!<~8B`G!!<~8B`G!!<~8B`G!!<~8B`G!!<~8B`G!!<~8B`G!!<~8B`G!u ПRLw(!_RJ忿Q9RB)\@qIq<CBG%EeqMy !d4:jY6MZbXmV ]_] S9(0($(3{_sdC?!Dڰ(Y864$O $yhiu߲οn(PImVNelA](557i4Y[Ȧ@ihh8t^^,iX;5j(F+S9_ٮƦǎm^eEea$Qv-CeYV;?X,Z-I?i.1!#P2sځ"˲.V>m0R[;BJ,˲,CGYeJYqo$2$a%˒L.ܸ[ /6Ze!,rt:tD%Z (^輾ӱyyyQJ V=˲(pYEyjr ˲TRUVUɲ$I6d̑e96&Vt/MdRV;aקc0(ƍp,;f(ƱkAPTҔkҦDDˍҨ튤(^~ťeeBTgZ=ZX\e} M e~BMD! /?eYYsN,)+$IY&0,Dz,757555JDKCCBT :&M,,ee9bK`^8y4uɓyyiT*Ah4ں7}yJ( j5K'#.7RI`NnmægjuM͜q Μ'Ǐ{?WqzN'ݗIHnlv;C@(( :cZZ"QXUՂ(TVU9%Ij:#DBl`P:(_vC)1l^{צNfˆWժT0V4{y;Ukڽ8vODQ?fyޡ\(B SYdI$IbYvϾF!))ȱ>Fi52qإHS,7fy NbJlL_L?͢ vSx֏BLe@7644dfe755 0@7ksss^=}fN/ԽaTB(!uuFeJm6F 4 ť% >fNgh4ʁGYSi4Ꚛֶ`r8 ?,CeJF2u:M9%R|ayO655=zNEGE / UW\"s'!!tQ$J&qV2>k֌1y?#ǎHKݫ}fÖu|ec Y,7[Vjwa`kڣB!$[9HvIa0e!؁`clY-Yؒ9gG@dk3[{G,-FUrYm~i‹#HMuc݂ 0jkjZwEwM˪(//-)Y1VQ^f*۶ONj1`ڵѶm_GX81UUBtPIM B,S3Yq B< ?w=^#LNbA(2@⢢-TQ8c?]'5 O冎B0B#xuØ4!g e pA3x6^r(g>3fk `(CB(|!o?|nǣ`B)7i+\LpuSFAN F"Oc yu&N*<ꩪ-B\P!1]AEQ Ț 1qDQ` 5ݞ7!.(l0c뺎㨪 fEfR*}z0x(˛cI!0꜅c>;b)1tmF cquDQj@ ~ЬL#6hˊ, 1@!PB1>cz'"bL$׵wu?n|Qn߲-<=P6 !44g=lz 3B3k`|}M~?cBȩ:ҟ6 '~1ʝ!bޙ'_$MrϸB<_dYE> 2g^%cLDGW((8EVA%ُ$ɲ|ubbBeYEQQ7ImRU|;} eȱi8ot&/',Ꞣ(_Y᭸DQTqxJQ3 B?7oŷQ1,JӃÃmXccO7YLH:>{"J2Ď;5Lb=7]ϭ_xXO,ˆa 2N#2fMxo(Yc<=>2:rDokaV_1 #!IzO%hmdtðm[ dxtDӴ#Zy;'&'vw]˜3iwuٙ5'0ƭmT.ۻ:,?p`bp0m{ph2b i1`BA Q^Ŏt 7,^ذ,{WY^ (eeUT)olhL,IN/0sB#dơm,]d$S㩚ccCiYLZX*)bY5VWUǢ+Vʲ{pyaƘ"+ne&SIUUF纒$a-G=q:(B8R5-ӱM$Paܒg& yί+lJOd$Y$9ZXzX(QJ;*+* !,G W-_1v1G=۶lv!x Mc8sJK;?̭Ψ1bl.1IxH8܅ocUV(uB?5s"*-]׭DY+wVݣ/nS"S/NmI1e>쭜zD0+yFϴӓ6(w ,!A3 !l6PJ>T?SeaMcL≘S3 #+2~ȣdhxxdttw;KF'z{EQ= E"0cLUʊgd_! c@ 1yJ9+Y~V<1>=t={ռ'B? k}d>ߑ)c3}CC8bێeY}I?i5+E5M:Մ8K)TUE1tF:Ƙ(Ul۶dygS[~oOj||A}]ռy1_WREY5M㹨|{nJ_r,?q$E i !PH4_< }Ɛ ѱ1J"+ /o631iuUUii811Fmq`0{<(gFp~޲~50<}M?pM7\ieYپ}YCCiIɾE%񒭯4͛na[~wW2 _n~) |Ӎa bX]__[5MUUE|,r]w=P5opXX, ʁIc|?i}Q}oswA}7~/42:ڰtiEE7qw{g‹/zo6\?f6_( Ȳ`0ȟ*Sz$If!@/]m6 !Ŀ2قHu]A0~CKEQOJ$Ie q\@ :(ecBEQ,"Im8!BAA}_xpkkk M3fY;oV0cq]UU]Ea l'٬Im,> iinlFv]8UyMOc5M뺮;0t][BS#3G*w-=<2PQ^qp>y/0&b7xQ}a~ y?S ֩AXލoA~?wƏ?Sס'x8 [SSYx1LSh3/~rr>]s\F 2ƘapS]gucSX_h/BdYFg s?%dBH29~0[tB%tEXtdate:create2013-09-27T11:38:38-04:00p$(%tEXtdate:modify2013-09-27T11:38:38-04:00-tEXtSoftwareShutterc IENDB`selinux-python-3.0/sepolicy/sepolicy/help/login_default.txt000066400000000000000000000007731356774067000243730ustar00rootroot00000000000000The Login Mapping Screen has a special Login user called __default__. This record is used to setup the default login user for any login account that is not specified separately. If this is a desktop system you might want to specify the user_u or xguest_u user. If this is a terminal server the guest_u user might be a good match. Then you would need to add the admin users or a Linux group with a different label. Perhaps as unconfined_u or staff_u. You could use %%wheel to indicate the wheel group. selinux-python-3.0/sepolicy/sepolicy/help/ports_inbound.png000066400000000000000000001631621356774067000244130ustar00rootroot00000000000000PNG  IHDRj8pgAMA a cHRMz&u0`:pQ<bKGDIDATxwt\G K!Ћ)MvUWuu7;{vwvNϴ*JE#z-0|$2  E$wHxދx7ƍ{^zYTT76meY6@ |-$)JNiEEE߮%vFO -H,lkkۖE:zٳgSU˲nt@ |HD"ĉUAUULӼ@%`Yv6K5MS3MS@ cZEG J_ 9Y]f_ |H=ۏ$iB?QuL.S~y~oc"U@ρ$Iiipq9)8`aYi*p$Ħi$)$^Y=P$L$`$q:`Xh݁n蘦LD$Si|^`Z0,qocn dI1;G}U(}1-:q ]יY_ ?ˡxwi*iQ_[yxukeYojf#w&m@\eLD$$D"߿CRQZSόE(4¯^#u'= g@$dY̙/$xoV= zw̥Rۗ|ӞeaZ:Zܱ2HWib,La]c(4)4 /@yIU3/:@ِe}O?5$Ivx<}aۑ$Ht:Q~IiqKŲb{eJ))(@TzTF'ssNqA,c&#O>x5)Օt)-*4M‘(ti5!h~laT!I]}|XD,pOv量MqaiPhEiq!!id*EGa~=AGeKA^,STfU d('1 %ol2M3 IA Gؼc7"3g4fMNTsR'_"H&(-eقi osI.]blw`#<)F._"LRU^Ǝ}پ t8xhj$Y²DS3CLw?E~OV~gkyMģXi̬B$? 3%4غw?: G{ N/8*zH׬&Ju;!~8]KS[U}DYq15T:{D U,Y y̘~MS'/ò,=79|DQ6Y,3n0r߻Nn7cQMbwukY0ι$|^/|*JK?Ɗ Xp>9xdn&itzwt:/~*O7r:{L0eQRXȌ)ٵp˲p\,7p1:ukG'v Y6Mt"2O&9~eLev;0D19{Vh, `T* z9LL0L˪%xM6֮\ݦefYdP]^{̺{>aju5yy躎,hn͉3L0?04R4*Sks>~,Ilnaׁ/e̝9wa).D$?lڹ#Xp~Q @$Rt[5w_uSXr9Xc|3ֲb>޶f+h6D1fO .Lv*3c&NǍ㡬~ ˢ ?`t^ .ˌ,{8Npp"|8DӁa'Y{KpbŅ<}u+ˣ0/gkΜ9 kcZtD"f8uTZx5d*=:xiZhJ: k E2FevD2GZE2FQ @@7 6,ut lZffO&La_ ?>ظ\ۖ ,Ħi$i6 UEdE&T0d$i]Rw?8 DIR Ʀi m$IȒ1k}/|^$aـ0TYFuOqmYmr,nr0$K8'Im&veaMeͳyYSX w.I8{>^sW.N@@ay4U̵hZn@riZn`Y&LdΌiTV`Z|nVlrn,ba &.Lg%;gOԁZε% ?(]kba!K2nHxx"SUU^?`x=ߟ墨T:E80[jВey}5cQ#u: n$1<-WJKK(-)sY$Kʘk /Xn3 XHbIbYgM$qy;-ӧ3g֬u]"v{EEu./An` QRĩ&Cia&$Ʀ&~_c׮_\lc8uh4ʉHӹX`'[8؄*i>s&˞'[2{l ::Ap`-۶v䍷&Op΢?pEv܅9\w]/FFgml v EV ٺc[2߳cl<_n`ae(Y)((|$YYYpPUQnW((2UddYÙ;ϕ?YK됤NӍ?xMCԌ\R'N?[GgW7$qŮ'D%,D5z: BkNu]ĩSܵz.4 6~d"ܷv x{J&{ע*,T-|ʊ V߹[Cey9SL>h,}ꢲ+sz{{ 1m}ǎĩS}>^&@$χ7? _'{xSEcz"ӛH I[ػtEw,d465sq4Mcwf"ˀESv݋in `zzzz)++իٲ};XpK2wlvV*+*X{=GK4\q^ǥ 0o\.'C+IH$ ɅVjXs] }Nb˗,aqUEwt]$ **~Ӆi ().AUUx< j*Etvubq9] ji(((@UUR`Yymv2r.ղqJb&<_0 Kooee\*+X|9?u=صP(33{7lg}7v]- N1< 4EsILv鎿 $Ik5d6‘f)@k[Mg3g6.y˖\G";qGqQVs`w8ʢ;p̚9 d6ZΞe 8Ȏ8}UUYhv줽>3n߷ +-?Ƿϔxk~4M ø<,xFN56捷RS];ρCyr7"#áo.~x<}eYL2s=ʱ'(+-e)l.^leTWUQ]U5nOVK7x׹ƅ? ؉޻Sٳo'Nb޽psx&0dTU7林E̶=ya2<OsIR!7g\[S=^1kifC=$/[JyYv줻{ cT_i*Xph=GeTUES5I&D"\nyyx<C|>lFp84^7vhZ?hrJxz=AN56rqp\=wή.,ˤﴜ=K[[;Nd?ev9yM,̘>ǎyNnd̙XdL2Mb8.E | b4Q/_).*TmӚ$8tvH&3{6>[O%˖H&ټe+nb::;jYU+͉h9χa膁a SXX9x0C޳:N\ÑY`ysQUYA8aάY(C'(~xɮ Ӊf'(H$B0$v收Be(^̬R\XLuU5 ',sydYMruTod~,벯n\CCi8xv pP]UɎ{ؼe+Aus=kF!ITR `84D\LAygSyy9N3Wp*"|(*.²,4U <.? { LRY^5!??2.^ᤩ i2k ,ˢ*fj`z48NJJJzX Id9,[˂ʊ LrϴƂyX4MG0eYNjkjp8W}yfffq2fM$G0-wdTUG*b=wS_WGYi 8["q{,]mmtR[ttvQUY nc)S  r2릎\322B^^:fƉy+**^̟G~^gΞ#S^V Or\$DH8N$Y{A4EQq:l64Mò,z{{EceU\.]] 2kH~===D"R188nkd ȒL2O|Ly`&6FuU%>?=es%SP^^F_<~EE,^p8y+1u4q7[ nS:c (/p$ ^}Uk똊jƹ˯W?)3ڎ]8|(? 8q[9Ϋd{YY0&~yG n<$184ȹ 5cքϲcg`cg#nF8ef퇊,ciY1^TKZ;uBYF#v±[0\HzzƢ[X4(v baq{r&욿f#L$zJ$AUU;pMF Pp88N(MfDs>x] E} lf{>s1M3w<.>bl[Q%zu20 ;FpC$^Νoa q"Xv'EE%XX${m*B^ 0N:|+;ڵ~s|Z==[֕[Xl[-I=Hs=u,m6/~/+P?j)խByZX`I/r|z-ȕmYYWgk}W=^|2yƜzeZmJ2?a 1 ?:Xu[EyY?leY›^qxOY*?η%.$Fb&Q\\ʑ맴)5vϤeYa;(nWؐcCH4>h-A@pnV,fΘ9nySdܲn4nnʬc+rKu]nJFa aMAVRj6 ab!K2au-nSQ^ė[gI2kD}UR$HFWOnxn% ׋UAp Phz/ NQa:g݌d湜/ݹtǓYsd$1\Éa4%ן^ /EKD2DUUJv?L&MO _<_ڌ߲,vUK,gng݇*Ǘ!$]=# qK bIKȉ&#oO$IB@O2?si z Ƒ%BE.[@iF n H084@*"Do+%ZY™L &'-"NgUfnOeݳ|I,Kg9ۅיI]>xvM-~]o3$I)$Bo #$lj\NMB,MV斩to\lleYFu4}L6sHDZiTUͥܝl-aU9 ,BUUfLƜY  c۹tttRP[-K2d3Zl?x.Z}g)sd9^{ E-wvqXȶT*a ҸIzz{H81Inlb 膁ehhO#iڸW۱=o߿cɢ<:dYӼʫcbg/2gδpQ.^D_3xurr}4yd%kh:s۶Dp9^u' uD7x)//:[  .b|Yʰi6B#!4N~~X0`0H80t ɖ&gDXz_%s<[h\{ &&YSi躎eLO0tLӚ$gغGrb+On*>rTUeddp$p022B 0 FFNF$IBuYq X@qQ}/1 aP{CsK ]]]H4McpI B  0?RʲLgWˬ\gs^~u/x(,,$F)., {' q4PhMSq:@p;KD<#f7$q)v;,|RNˇ}*x<yIk QR\sO?,cIFӴlNb1Hg Ib;!Rn)?֯W$i+CMJZ8ȡÇYphm'$??}FOyUl޺o> qYo疸*z=lݾJ `Y-[9qHPSUwcxxN>ӂ5kp\TVT‘ghxMls(aƛ,? ks̟7O#q$aq:F*"X cz}==4 c]G(,,tuw:/˭)fTUav} 3ѓqt308hcT;dimesu]OOaY߻g|Zo N:L21}:Mgΰev*+ ?c'NǑhj>a8uOS_Wf˝GQd[.ц Z^/}};p]mΜaM>vT*e,7gغ1 CGr_Ӎٷ3g3ɧR܀}r:I$i/[w<B!@p0#ǎHxJan39^s7ՕX@_HuT:3eitqtr:QTXHx\.I"5˒ăwN(E:zDp:h9dhQ@@n#"ӮLӜ<$ƤqNԩS~͉>map:$It]GٰiJY0>o>;wcۘ=aܹLӢgz3OgێfæِeT*e<(ȣqtx^yANWqț2M[p,줹g|rp9]h-XJ3{6:<ێq~Uie4U-۷3jCV,_Go%%UUYQsj6PZ^~ Gwsu"E^g9lW_'? |$)37IiL, AuCzeeK3%QdΒEx$O=8Eyy,]7QS]MA~eU$>2<,$O( ee7[o Sjky޵o罬(((J]S5?|6V,[GWWژ=k!P7e {/}!Nx,ƊK={:4Áͦg.ee|e>.nҞ={3gu m|hx<夽%%l6(((Kp`GYi)án l?(0$x2EOD2LEo~mW-Lc&/'?/gH(2.yDfP`4̜5n eY HG4#PTXHhd˲ ò,6|>}}8N~_aRPpXE0A4zzz0 ::;T χ˕1v$^P‚C!zzzq8TTT`fxxMQag5q(2 . Nh$ Q_W{ٵg/oU#k $|Y[5/+4+8e4MdII"4BI^h $ٷo/>e˖mi;" ݠh,:ArS^V>n=㷗9+bT\-^ŕ}dMv,W[_W{%5kT>[lٺ߾HmMpn#ܔʗؗ~;eB|Zֱ04<#+z5ciL2uҶcYUdq+c˽9&;~]OV>l٩tѥ 1nGT[g~e01ۿߗfY)ǗE b %.TRԸ / I |)߲,vpOC.R)nPJ@%eYc0) >ÙmE TrbKະD@ *ҵx @p𵞎gwldXZvkCqn VؕIĞ}ٰysx4&ϭhO,㗿m((,ˤR)W=%IB\ﱟe2g$( D_w\hmW]A7q@ tma`l;.IN7)/+Б$D^y;WR)**"/`phD"A^^^oH$f8"O`Zel6B=͖,Iē:> TIwOD`pp$B$N{%N:EЩtH$ EER)yyB##ȒaFFc&:ܵjU`Y+ȒEڰĖ>@ |eL3{ i8q,\0YYs3g8~$y|: CÏ70stΝ.,Ey'g}5fYﻗ߿*Xt)sgƦhtY 33V iKCBL!$c&yEȒTVVOۋ,Y˟9~Ӊad %9ΟmyAdyqmWu& aRSNK3*¦idTE%LH$0 ]74̘)<̝=4?o.η().fێص%I,ȱc$\9dtu,YssqN',]8C`&i]벁8sU0840>o>,?ٟr,oV~gaΝtuuN$T:M:&J3{,~?s,;wG?5չe3Ӯ"K-!A _&Ue@RSsith4 Q[] $i i=g̖eZ&zZ2Vr 4MTEATv{a.[9g&t*aW'w_.˒tiπeZ`e?F]LJ̺~"$NJ2INÁDutC95^(hMA,tü" kSD*ti̟;>x6;t׮B>ZMTi$2n/\ŗ_&/d>v d"iZH(Y 4_a`pS1MdJiST%s5JU$dIʘ͆"gv[z#4SN呇"/ apU̜>W۹kjdYуiZw{"r;3~I8TRiv iϞ=̙3sRI&<N%0$JxHD$Ӂ餠D<:òQ$yq帜.>/p@O2"J Bq^|>#`ٜze4MA~?pˉn?$//A0iR]U&ۋj I  r 2DMIq1ve/I'wSU) $I477O[[I8Ϋ~9;sk{26{l̕:e]YeYH9YY0s{{/{[㎍=sXƞclYc~Opp"@ULeJ%+ EG0tG*߱cco㙥[ֵѫ[,0f?t=㔆)ɲpoBql{@i‘pnvJbh1iB&h 2ͯL5UŮ b/@ <$Iʄurr ݂{,,\N~FW庰TWTKJX@%A, otnKϿל@se|/lp&fEQ@n'ݍ@iLP _p G(~h[f s'.|} N@lݞ YD"LFIO/Ppsi<'"N E4%e 8N;pϏdvbQ ^gM B@c. U}i24 2F2v{p:?_I<w$ >+VQ[S{ML2LR5M͛7Ձp\,c1f;7L& )-)\u;S\\’Ko$DS0ώ]fws~84M̞ô!O?,@&' G"ܻ?~eEQ(..awQXXt ikke挆\D"?dd$D*BUUdY0{֜(:a ]Y.KJٺu3g4Q9,SXXᤩd2?pxi| g8JS̛;soN>iFښ)~{1 Ғ2F!GYifSQQ #~"LӤX,称Q~]1 FMeNl--gXMe9һ{YH㢊" cZ%ťi"0e%d*qB|>(ò,lLk[+>oL)0 [1 N@ujkj)((pGض} Ә1}&HήNHtwwrI膎fEQ%RTTяBNyfϚ {=ׂMpbO `WR[;F_kUO-p\3klj`UU<#r{ >>xjJKgy|#JJJ5l۾`Z&f`z6dnBc ɢL V9<(iH3R$I"G۾i.zzii92e9\Y08t ?n_%<UU5Iq}Ձf),,"h5;!iY0"W7'zn***|n~h-g9v(d2IYi/^ 8+bN2k:~ndK,! ݅餸D2W3I}4.YvYv4τ(8NTUOGwwHKB!F@-'&/G8fppH$ѷHp0vM}_F&f,%I\xǃiz+c,TUX\lD"aZ. vyD"W`0^yBS5,^`hxh\$ ӕqdYA44E~~ .+39rq;$JM0vD#\nΝ_}L%2;p8Xd9dcǎRWWό ymi3hkȹ5y@ ,fYxn|^eXx]]9 R]UÌ398t~Wl ${-r<,^ƔکFB7n&ZE,LK3;vn'<bUx<^^x;}VΞ;f8v(vȑl6|>?(5Wp14rCooO>_P0n2T)*,ƦttvFE vHD}4RQC4C V\K)((zM FzWkd(2C0 LDU3ou]G圜i,K(x?D"fֺ#IRndڧeYg9\8d[$TU4MtCGU\;6 8C)2AƲLtݘn?t]'Ig1M]uͦZE (2df㇌?cWd%QUUͽKOitw+#eΕ3L0Ǖ-3󾿬FFFx7Yp1sfS=~{˝q4Un W@-[Ln$)0zHml(&ƶͫ]پeY&ۮ(GelQWHv.dmTel66ەKjSg ukIrʕ++(fce\=PnG X\Сj :|p,KUp"! OFTTT;p8?w@KV׫Hdts m_|2D>B^_qԑMQ!/'"DP w{4ibWei]!4pj2 iɄ^B,eʒ_|&Woy!oDS6cE6}Q05:Ai `LF렅 y!/䅼B&Xp*[W^vGg2b1Q9ZDŽB^ y!@m>B[#l@$,]RoߕMvL y!/䅼7 t ) $0Or_0-r$M8.I1ʆlāȌ2Ls2{#sڲu@ cve\*q@NMn'3P;~I.',(k,uMO8l\ gzt4ȒDKo420ƔB4= tRUDtgᘁ]RmiNOB @p,q7Afg}? NوLlĢ7E^i%j 4vY5Ú>4UbUH|kY>nr'e~I`neFp1$7Ǚ"f;RħMcWbO-CS$N K05x~i>y6T8iSxbA<12|MX#7$ dIT4hiYXdN- l6c̴ߙuګ]s}gu3ϫeP]`gaY2Y|}0-)KNe'21-hH6"ϭPQ9ۛy֟ J'.n}AZ)#,r}>az|Jswb\# OuNtĸoo"0{ (]A_sgXʤ;`%$0-XT[K (و$ FwNz&#+̯rQ W /*fUNLqL[T67XRayC!YPfaU. WXߡzU.:)bNUӼ5:K,f~S=tI+T ?5 nnlj%PdN%GY~m=iQdޑ4eq1 ߭QNa;&2V 2$u$gxynq>d bO/#30-9:RXE` MRh?&6y5t"9ȁF̬$iJ37XQaNQ<w{uָkH+j)wMbYOY 6s67XYaT7ΝӼ,aERFRxja- . >i<S9~b:ӊ<8Ϝ '*]u:APaMXzۧBq3^V FWu֐->>Ž̭txJNARI;-ʡIhDXmSp&09F#iRfLB_nRo#TL <`0p(Hl2daf@V S#:.EQX{=#I`ݡ4[>aFMCW$ID&Gcm)}#iÙvJ3K1658cf˲8DS 9Y 3s>S! l,v1bsυ/q`S%$i K W,I &58єŴQqNZ=aQ">mQ{楡Iu|p`E"HljLoYU$04"K D&>B_PS<2 <* K F #XBaZ0IC+Xҳ\L"KnLڰ%3/Z,a^`YȌ0c$p2.EdX3yEys n/Fsq#$@%RŊ:j\nOhRn cMcߍc-c b_B4/M,K ͮ~=NYIsN/C@Nws&;ߕE(fdAv g'm$k44"gh2ZޕǬ+13dѩ|ôHMikWɕ rdK$kVʰrAҮĴ2KI7W\p c!2;#"q!%EZ5\c>%/o?yESq%0,G 땷,7 3J_D^'楽9kR!KRƷN=<5YH~K8a:((r'.DbNHҤ.M%iΛ>B^_|Hfy yM![7e)?ɹ$TiAW^{R#, Ur[<t#d$e~WgB^ y!/obfb$|!ΦL^ FWG IV7"@ :6b>~ӲfӨpD&LRYQA~^!:r[vUl6}}4eeM^^UqeYFȔrQR\&80@yYEa/t:FUU à%"(5UU|}D"A,#//+H?88$K77 ?JyV.\l%3wlܳ8qM|i~G ItvvL&AjhW_#,^=Bk[;z=<,]xioC)(yylwey9$q!~=TUEu~o~;C!(wZţ<7{^$Iv^F{D :~1ܺ45a=?AU?` l6{/sϓL=a#(ǎ`%_5 ̈́`xGL-۶s t]g 7w ?/Ξ=NJ˘>ma7^op8_@OOX<<==*sqv=p\ܹrx87ngɒż|*ˑ$p%صg?(++رkO?čF׿aeܻf 5՜:H[{SLD" 3{j n39r(E ef"v;'JěK^ϝ+V`9v}̞@Mu5#QQQNOO/>K#KƦ&B$Is;-0Mtøjϟ0Hęgꢲ:ϴ Dٻ?pxiZ<˲ؽg//*==ܵΜVp㘠%Ino<l6[,) Yqb+W?'s x?0R$_H$xl#tttr ; ~F.=5UA$H&̚Հb…WD,7ìY N>aʔZv;sfBk+e}e5K" !Nw6} 3gEilnȒŋ'j HwXNqQo.y2|۷q'*+w=?UUc+ II7b4p(D<0 t`f%/]"::;s'MU  K^^ʔ$Hcq:7(>2e na^~5>ٺcǏr2q7&EĩSSZRGq:s ff ݿC>@ԩ\x=Jy'8q!nΥN}a y9|(QǂL2g>xǨaxh 63O>Auv=swdr *D=STXy8x04ME棏7F<''/OD|uN4MСô_"yhkk֭2 pzzzp\s%Mgin>C<gZ}=]TUx;IYi)K/3++)/+?O;fLƾT-۶g~9M?b[xg|ٳh>sx쑇饪2GchxҒʫݗ)s`pys0<ѣL}Ÿz_֮YKQa1G"QA%%%HD:4ML3f* #I穁A%9Si$S)4U'XE*4͌p:% \.WeF4-7̶]7p]5,$ TX,dϾع~̌eL;Jb笣_Rnwv ( tX,nnc,#Iav3I"We0 l9h4fY@Qdώ&0Hl6YF\T UUIR'=}YXn~l2s;]e}j ?qdYp\bNꪪq_ŭiڄzI n-$ILm/5$m ˎb-]U q3ֱsIӴ܎(>صEgNZ_I&;S+پLWE쬹oE׎sP]]*^42~g6fa9TWuG(~׎<:&t2}Z5}@,@p!@ B @p!@ B @p1߲,HUQ ȣ"‘zZ'cH&D",2?UUv(h ,ݳp2v$EQ0 h,=FQ"(~/[ul6cFFH&剽_si 0uJ $WzN Jx9}sU߽:|?t:MUe%pz] W$fiia޼y<^&?3gLwn49p0۶oGUU~gߧ ?۷`|^ri"_koIs,,[wXp$ ySilݶ!oפL {Wc4[R^Oo/zZb$mmmՉ >7 b˲Laa+-`߁ܹb9~ys|R>޴‚͙ lzzzܽzo]== @ԩ3udA<LK C> Ӥ^> lٺH~m6N']ttvrRapb+H?$1A~2)Ϟ; ^ǎcs̞Ph4FWw7ݽl~IҥKX墧~{pz:Lii)\H^˲8r(ߒ K $Œ_e |~=k'Q)??K(/ŅBE^H&;pښjvYh!uuSI$?3h׭cppNjkj8p0X z՝Q[[CuUMH #0wXAII1u&.X@eEEElڲ{r:Yt8/\Hcs3wo~">zc'NSO‚Zژ?w.7mCy?FW_p:&=$S),ZȬܻf >n;Oxx=~b(B38"?}$SI}/fJwO.dʻɓ+008=ͦǷvDxy (**칳D1:HUeńY}ٳ}.JKJ|7L'255̟73Ù K,Yh܌y2}Z=xXd6lF_Q^^Fk[&#ղ, },"N]>FF>YoeL={2uQXP_sj$I"H0뿢{ nzz{ٱ{wj}$IwxرsáafLO~#ϝKsK v`84atw 2k﹇xmJ9{;w /2ko?M-Ӧv9~$dd*EII r|i7ldvC󿠾[bw߽ϸsJVX ~5$r5L2F?N,g9~7"(d__nLDez8xַ4 UU)+-etZ)**a 9tܱ`~y%Eܷf ^7LHubXΙ0?/דI rrafLNiI ap"irr~K465SSS&-]"-$ 32MdI&HH$2FsHR&w@U !a)++e-eM2;HYn'$|f`vCeX`ٰ, Y\8B۸nJKKhkoDz,b8dcپbYiZ&h}$Dd*f#:pfe>O$8Ę23yL 3sM5ٵg{cZ}=wX;φ͛q=?y|JKJسw/xy8c7l$Iy!8|({u=4yٲm;Tc#wZEuUo6[.Oii 6nbמzy9r7q￟i*{]'֙na4U؉ް;v{^lld ::hmkcYٻL&yGimm*L`Ǯ݋l-3pCGP[]MpȮKvZ ̌ή..7ӧp8&a&].TtFF2HpI4Yimo̚d 2DIq1084D(}}8 e4I$m^_r9pzywtN&NG*~?o=N'}>bAz=F33}YmaD"h\fp:urx7ww~QaU ,_BqAn6?_[f  ~?Vո&TVT njİN @ _ @ _ ۈk*~˲217Z{ tY4t+2q^Ni^NWu}B}M2,/Nkݧd*5.eegsf+3{܉uW㳔9ɕXu(JdS \u;_k[_غG{*^yuΞ?, rםwcyVvCݫWc[mgϾ}ɪ+Ys]WϜJp(C.CxWw!SkkŦOg>dYfddښ~Nw)}\<_xؽg/Gcڴi<0~gZ(,(Ʀ&4Mc`~&)}D$ez}=O?$.}###|a/\{B<ݻ{j/^Doo/|~Lu`ظy3n1ay Ufɖ;~źd54m¹[o384O_1E2M`p@fF &X>v=_DljD~eee&H$w 3g0s&̜1)Sٻo?w,X)s9^/g0t(/gܹqɃ߇, _ZR,?dΕ+|LcvC'N%KOHr:R[˼9%r߽kٸi3{g=w3û@k[;O=8mm<}|^~u>*yw9cWĜD"׿avCcGp Hcc멬Ι,l޲˗(2ejҒ >u=DGg'-gR^}{׬6l`vk5!H0<<-[y'1M 7xѢ K+Zf2dddOnG0 v_O )+-pMHAN76tɒ_ nd*&3uJ-uuu޻sgY0w%{A6ۇfCdJKJH&m6&w 9c:D?> `z}6[3Oc̙?fN'-1}q(_sr,uT3O#//}"'gϟpҒ_#G^=v34^tvuM/))fxxo< ;whʟ}{/M,ez^sߞxQδ|^~.]̱ C7&e2aׯVuX,'[rת;e93͉kX==ܽzMa@*"HpCGp5H3߼̝3RDn ܲ,6} fRUYɵصgnys  7}S躞Q۱,D(dFv}R=w˯{sf45aͬ{!l;JT޾I5k?ˋ/T*ʹi4̜/qy|^>pw?{~Ruf)+T[[ˬO)PTt:?~ RRR=wLaqw0s oxB6lLMu5M,C4~1?: / 0"NSVZOczq6nG?fxxwߣ98K,a)s7wΤi8cEa%<>rUӸլXn TsիV1\~RXP0ڒ$Xk{짪Ox䡇7wU\0x%&rC0?ymmlٶr9eŲ;qx"KLB31̏,/ I B4;:8w\1.|~&ee [7ďgI&_D*tut}Sˬ:"g?Rg'{ #tѢqd2,u ]vTUa*#0eec2DfES^^N{GiM ґ.[Ym~$á$ w-ee߰Kx'ؼu+vu-rzy}ZY⭷eJm Jl6~?鴎tvv;2M In43ŋ>mHd"C,Tqg,ep8Pd%afFbbDP(;w H&XE^^|^5ʴl U}n&\eh94yoٳH$l۱˗2K w~v;o/{r]wo/gz2c4%9r>>#OH$w-Y’E0 m;vrU+Wb&v줾n*SjkL K-.vQl6-`> 3gQ^VF0Ⱥf̙!/\&2(/gVCʥö;ijnfLVO{%#N56!N3w?==000ȳO?Ɏ]hmkǦi\`=wsR w,T}r (<$YٽwΟ0;vTc#XD2SG,[|vü9sɸ2W.[eY?qsHOGE%;+ V/"XU\DAA>,3#n7ҤJH}^k+͏p$)3n.=,[%^ۺ-75%۔Ǧ HOcێ(‚y6NGbB`VӰ|hbbc(*(TUEѐʿz|d0!H\rAJKE$::;iii%99\dYfdd:`Vq1N/E ӘUT^ghhȨBJr25uuUd41dVg]Utl tyv"G-7'޾>$ %%EQhjiLȬ"<^/-dg=Qu1c5<̵Y:Ŭ/\zI_ή.ZXdb .\d\pSjjk -+q\\+/cÑc8s<,p߸+wFq sr\/_|OX+7:bcb{v$Ib…wcHOK/^kOǞƸbcc񐞖΂@"Læ_~ /aXxm,66K[tw] 0zb~AAADAD~AAADAD~AAADAds@{ֆF%!!'D8}108ȷ.pM]}={g| =Y"WzߺIV^΁tȲQ2,'c[ l:ŋ\C_fQUׇ+ _I^od"_gúurI|}A+*(,( v\;|@$h^M.^LRb"K-thZʪj^~5N92l=6{?>G$ב%ŋ`<̣Kުɢ XpAtO[fWO7uuu-+cE%bo7/w446ͺ( P(I(G.wF#E3 B(DtEG[%r{_4Te&xo' ÄB!;|(MXF}=^c۾PooZޡ#Go)SF9;$%'QPNcxdϊeKq G?#ǎ* K/WĐks@eXIDAT9gGbS=nz(*($K];娂sY}y) پs'}}},^̌t?XV~)SC zˋ/#61?GCc#V-add?G8fkݝr `<ڰ~R7رkWdu;5]o_|+\QASO<.\a.Ǫ+ٹk7d-*+u<3{~yIini׿} F[llvMSs3@%#O(l{wx}>ΟφQQYɑc BX<^} Z>/QO>=+WL(]{200/<Ǧ@Oe^^^4$ItZ$ICG2d6'Ot{cͽi`Ν"--ԔIjȒȲNcOSfhdEQ8}]]--k h4RY]͖͛Yp{?`0sO?Mnn-\~}&Y0ޔNx?p87_K-PgEQع{YZ?Ğ?de̙3jr%۲sĖ͛Y`>[ ]'̓O`x<457Mt:֭]y_r%߷?90@Ss3G ŠBbBK/bE?/fܹ*QXP@Qa!ʵk442+WVXwU޶ǃm\JY'l"=- BWW. ##rG$)5~#ǎ &i;J" =IX>gS\T㡢'ۊl={U{= 9|8ydefNZ^$dfHrR932ԓs>s8},C.>~a0"=-R$$IƒEwO/===wv@fF  M4Z,-\GRSWG0d޼m6v܅$ngVQZn:N,KSv0&~12sooΛlE Oll rss%Djԙx}>TU%#=߇{2an@^n.Y$Ǔ@^^.mH3338{<==TTVdbƒ¶wwPV6HlEާWUu++ŗ_a~YYrU$IB$ϝK(k xXx^zgfBQAW_#(5GhZEY&d"p"O0) rs"//x3dqQE,7o'Xrss#;+P0Nc$%&UZJ Np}1Y2s!7'ˢ WV&fyFo=,7**FGj1z2cmkkcʕ\L wgehhbVXA||F:X@}ysr2 nD~h&VNE%2ypVq1)ɑs# G!3#;\z ׋^GWfN8F#ߣtljjX|yyds9{zZy|RSIl21DJKCM]=`V}+~n:N ߢ -._J(dÛ0<1,f3a]O(P$I\I$n~ w%;Бl\#ǎs9 Z]<-74_??!%;xppCsk+;?#1!aQ^yeKІ^( U{{f|w嬘t!wn~a:lɒ _G8t[>r=#Giko'/7U̾(HNv66Ni쾣K(B1*`I|~+N5EQn'a}Sn1ɒ&}_ }O@AfAa_AfAa_AfIIzgΜTVUNVf&Z!.\DKk+S \zO'55VKo_8msSq1.]V%11P(čJ.\f ra) OtƐũӧ9{a߭eNUTjj8x--$%%a2\|@||]:TUWO'NLY^Ww7/*{7>WxKWtMM\x7zgw餯W^{;i;Sgoo2sg>bC8xrڧ]Q8ʵ7?PO[GӼ<|>ooNgg焟. m@o=cO8nޮ;~ܞ9wG};ݞn6.;"KI̚EAA>?ڏA'$>>kAbcb**PQHX Wor?pYEբhl?54 9w]],\ 3ϒE dOk>s34azÔIRuAo1 /p v}l\ W]7baz=$122rgco?yrBo6FF]|+WqZ]{ry̟7&_eKю~vCA~*$._K3>=5 ` eBa#F*ü6:띲rn|޻˖QTX}q\lڸhO0wǵro9 Y8t&֮<;:x KfQS[>]h?o.es摟Knvi,]FcDZX7dpppR-mm\|yخ像>zR.\Çx2.E EnN6͛$IdgȒ%I{(|M o=,Ÿ_a*tR_@Sg v 5%Hww$3z.?Sihlh4\/1LVKzZ|F<裬~tz6\[?sN=F/]ŋ=KhhjȱcAwGRg2Rc…,\ܜ$I"==5˚`0x7O0Jh42glJOBBs ++$/\dd6xBߺ͈wt{/w/7**(`Ⅼ^QSSVey\,233dʕ23Ig…n8.tnN>C090dSGCcٙY MHGEeΜdϛӧyw{a<^/c``шt:, ^GRbߨWONv6CC!22{V zP(D&јf{)B0׮_4Fzf r>LIꙘkE J-fexxSgN݃fDywTTV]:rp8˗[ZJVV&VU^-6AF##=0̲R֬^͵|Fet:2q8z/]=)1̌tY`Yчvގh4Z{zhmk#1!޾p4SѠ8}VܜN9np8|cP>0J8^Q4NǙs爉b1q8(ydfdP]S˹IOK㑇6fܹڼ\TIOOMDfFU5ߺ-FRRdX`0PXOGG'}w5 ,gX,B!bbtvug,YV$IR:{6es`6X{ )).fNI irr8r8^%)1Ƿnz eY3z!4GHKM%66ںz [LjJ y2o\23$ʪ*ryM$'NCS>G6m">?h ΚX7@V(';{-Rώ]>s&23239Km,^QXP%撘244c9"pxŁC?wVgJJr2-FEfEQ8vä0)wC 0rO9sHLJEA3> ;~v{PUFégnmdVq@&-ի dgObB<ARSR8yLLEQ(-jܜbEoY);|>F#@WxU+V2gvg@Mm-O&ֻ;#>>k܍ L&dYRʼ4h{ގ(#I>|s-׋`@rIغS_U##2Gsׂnh8/se$):l0w3-Q1'y|/l/;QO㋶Ȳ<9d>OaիV}{`҈ W$l=ű-|>S_@qOXI*TUvc2>v!1ql _ ׁ^L9aI֚Ƕek  "  "  "  "  2i>!kׯI5р(446RY]$IFWwڵ8Nv;:@0HUuudIIdBuuTVW(*v Iw8\磾v=nk[oxTTenjj먫' cPU**+#663k*"i$In߸AGG'2oSɭz>Ϗfm}A=EQBMr==(Jxz4rߤxWoZ̛˩3gywddf5Lqa!;wБ#rYf3ţ*gΞcێ|>=F^n111]^-fstuKWKrV߳ ^O}C#ye^/Nb15i;_7t)ljnf'HMM!!>PU]h`nYNUfEU+tuus z=III\vJk73Oltl[ckB;n,̞M[{/h}zy?p_y Ɋeː$c'Nλ;&'9iz|9v͆d —_̌\zܜ;Z߽rǷPQYI[[;iiSrqI23?vθmz}|G,^dZZ[7mч'pp?Cޮ=?`hwא+j.384Cs"RS),g``B$$$BSsWDĵlmm(*ppQڰ@cтSiXx1W͂(gܹn[XbW\ V˛oocVQ`1[0:KAz=OWbR&ɲ<::;'|W]c`pFс,[‚|:.˗-oG:˖.++W/E_?v 9~@$8q:HMM' Cڻ޾>k0L_~F#a*II\/Ay kjO9*7*8t}O  C\/A\\/\&46642===p7#+Wq|HrWrkׯ;!ப*8+%9))[;d$/7vaמv (++B||/Μ%;+^V iiM&Ji2oA~>--ŗp{<$%#IҔC&qtrBA~K4651w9YY凧(Sb2imkR$IBevͻ;ߣ N7Ɨ)^b:sf"3#=Q.1 o  MlѤ11ڤ]{λ;ݺ{z&~fQ[[O__-3raX=hI >o.nj F'9tqqqhuZjywN~?CGNy "IV,xm¡0F`h4F~?omF[{;MMW)ǫwl6c0P` dd8{<6}6$)rKTbywhim7pRY]Î]~ձ}{8~${p(̎]8u |/^D$dYBbmwhhR `_}Y(IIGܘMf\?RS[Cٸa=ߏhvc6'?9p6nիyw8x/I[{ttvA_d%# ?޴O% P#99x**(5+:yqhlj&99i/VGQ(a%қ *P[[GJr2zAjjk'384Ĉۍ,k0L465 JNeUMXcb<4b1P׮3kV1XE!( IJJd2r󰎦;onj(aQiiFkj͡ #zhήqܺTWPV:S-S,|&lX-VΝ?O[[XsΦ/Q#6E  \lټ|9{7*+Y|+/mr`"2Yrz9l^vՅkxKٜ<}Sg ioeetwpetZ-O>mڳyeeрB s룛ĩSʜU\DSs ׮_h4RSS^'11;БTUWn^nDf8uz1nN:b#++O#bnY)YGLj sk/K,Yg99tw߬O>`}˂y(*,f}4_"I\!)1E PQYÍ8@[{;,-"ǸpW)JI%08N/\^ŅwvL^nv6<4ڶWpF.իVp:8~C.KfCcc&˗QTXȑǩ%#=GFzh fds%m F7p艭[3g6mm\r·$;+ԔbbTrHMMays^~\f{Χ( I\fGO򄟅az=}}'7'{{UUEQhli4ѫU$ UQh =zY7l6-S^_ϩYe !r]]={ؘT>D@d/4!|6zbFFz>6sWFG OD͆Vi0~|cۿg8:.G{cUUj鴄B! F!zn (0zAa^։So= cc2ǟ@{>1;To>faTFyB|<͔T S{ȓ5['veN^@jJJ߅ѿOSϩnIvv>WeLeY +0mƟG}ZS}'%IdV; g_NGɷ-~.wee FsX,/^ȧ c~u-?B OCGo~7.)%w@LL 11`Cѐ 7X_AfAa_AfAa_Af)gHMM0'rHh t)׏Y$R W¤ پc'յ(BɬY~gΜtw{dge"kd::ymΙM[{;my˗Ow5)ɸ=R/q{x7g\vk׮|R^֭467qe23.7**h4rz9޳^ L:<|KDKm}/^">.'m + ]̩55**f^&M줹wxgA#é3g0?װN/`p4#BaZ$͟;B~ 敕qiVXܷz5Ώ}֮Yñ'"ɐ.QVãShmm"kKDC!23#斕?)y?x'Oz\zJKٸAX{U e7AN>7? &s/`yl~PV:N]``Ų̙3-㦻iRxxMJr2( χt:ILHd6ah4x<AcH?LF롿ABB@ä{111}~;FyEK/f%\v7FOwͤXd)lټE `Zp|6m  _F 'N")!9?ys. hd>--GI %?{znTTlVXNMm-Ϟdy}j?o}ήN;A}c$㏑WDPR\(;qF,KqyΞ;q sh9O=88u/5QWWܲ2v;`)33Q2xbke;o}Ĥ/EaddGxըb룙\.qv*tPш``dčk؅-ƅK8|( $'&;fãobVQ1 h4<΁ s/;Vw0[6?Bbb"f UUq xX-H$VύF#w`xxdB9n`0bAx˴x^ 1AS?/򤓥h'V>o'[jZ-XFrE0-T@$HhleBcUUUbccʊJ$lΫ$Oљ2!o|}d"&Ί7DoD6fy~cի_V977NJr2)_ޢ&Yt:̟XRe#|.  "  "  "  "  #K>QUP((]hn(]_0vTU' ÄB; 􉁿_[\.&o| AZZ۾P|Gގ3<| tw{^~ۗhjj;EQطOٵw2n Df4Ʈn\]UknZ`z{{t\?y˖qIRRΎ(  2<uukttv284h^5<ܜl|> ~z$I≭[+RTPWw8byg0"?yCG`X"#SS[G(bͽQN*q8L&ߏbvS>ëoe㏑o^zVK}C#-qeUCAdYҕ,_e˖ۗ_pyzz{ATs|t u![}_Dӑmhfym:ϛfINJs2d- _sQ\T86]NcSf͛6͍"Ťx[ٳfQWWO[G;,EꎿTa<>y}\tSȏ<ԓ:rNO~ķb~G_?Z -d,zz{r}tvvr)gby.)^-UeҥؘZZ[>{P(짬Z|xX|9޳1hȱcl޴GGPUP:gEr Ǎ9@Zj*.DOEod">L>@ n~ϛǾļ "ƟO*sVq ƍ" ۤz9{?VN#  (J ރRFj%.Ύ,I$YBETUl2aM>,_m;vpܹh=HOg(-) ?wwGA~>tHnv$:Ad2߼WьNCEE$|@G-&cSP(\PIXYx7mBiuhFj4-f,f  N#6&+H$Ic"(Gq8NvBAX,vz=^u{xF2~@ ׿-t{ۭm#EO[l,1F' E΍ ?$j2ICa%̈MwOO$Έ{|bK^nw$I*.bq8C(իى(v^~5{Q*A#k&B5 ĩS|/0rqi{VAa6eێȲViuW._NMm_~e B!zg;hk|N:;y0 XVYwwGjJ }dfdbR[Zxl6$IBEAH!VKIq1%oh >.\-]W/tuwS:{v؁,Žt>h?O?8H@}0l|p`p\촵sQn7Fk[&ݻm*W-<2~ I_+gW"2F'neVq1d4~:J\yK}`$%&} A6; ( vή.rZ-\.kV߳B 1Lx^dp=$%%"IRSRNnN刺dp~))h5zz{I?:Y&91UU + qqc6Z򆆆jB( ߇=FrrdYCFzZ hmTTU?@zzqv;}}h2v#΁RqimkCB"++ؘd2ɏDvi{RYh!yyl6>uHOl6܌#+33Y|]E$1[l,JuM {?[%3#Lq/znLOKchhA$4LfFZV+)I 'Óg1rWoOaAtӌ_<6oD(߳zJW‘c9s,gĹQ* _(-`cۧ{f`0HNVKE%իV5UFEWH>(|}pMCׂ gol  |( 3 0/ 3 0/ 3'|g##g5_hp/t  044D0k=w 02}>ooN[{ߩ O7/y>͹q,] |(000H(bdd*`0F*^DV\MM~EWw7PUUq݌L8P4Z(t`@ E/_-U5kjp2='oEQx<ь| Avڅ㙔v˗BUUqnk``m;v]80v300@8chhh8 o^?+8ZP(P[6.kP@ p8zQtkF=h ΍IAx< ks==ƛ #˞J ϐ{<~#5kg PdY, {,,ƍ;T"2Pd|E5<̲%K&vKm}=Fx8|~MͬX,_tvvefjjXb9sJy7X`(3G7?©g8{,ixq8fgc2\::;yw{{ߣj(oN [Y|9ŋBJr2=46[tW_;/|Yʬ#XFFFf$Lv?˗.¥K4NX%n1PvV߳͛6o<ʼnSy|V]};vEQxxⱭ6YY\|N˚%))1ZvNv65TVUQYUܸQAcSiQ2"y ̟ʂy7? @`Bs4{/V֭]7qEnTVrfG9w"CC~'`|x'X|II:sHINB.^‰'ٽwon޾^]/gY,[v麟fxx޾>Ξp ׬A$廿~N:5Uf/tn N*0?Rڰw ۤ#EUCŎY:#=R$ 1搟G OvVIIuz㱘ͼܳdefۨFbB"OaA>~}23#Ył` 7{bcnw @Vf&99\ÄaEQuX,fL&3qv{!##[l,zۍ&!> `4`h0 $''F300@aAŅ8v0.3z8{MJJ ,BIq16[,m=7hrKcs3ot{$I(nH׆QYHJL ';INBƄ R1&bcb+x C RXPVl6tp4 &/7t$Ibxx( ))_&ye<^/sHINp8jEq76j B8t̛[??w\.??Gס*zĄx۽F )-Y_}߼2]ܷ$IbZZZZ@\p˗.%#=-egJfCJr2q8RS#iI(,(b6Y|9g0,23IHL$3=,23ͥ bbbʢ YEF#YdgM `vI . n4V /Jzz6 Mo?<ZNhd dgS\\[ff&v! z=?쬬md2tl.^Ĭ"rsrmÖ6NYY]%%_}^йl&3#EQhdvdfdP2kv$,|&//s?0?iFP_v|p8g={z_)cB·* #΍WїORVZ*y@FÒŋȐbIq1 ]l#87 _e_/} " ڗ>Y g%  "  "  "  "  "  "  "  "  "  "  "  "  "  "  "  "  "  "  "  "  "  "  "  "  "  "  "  "  "  "  "  "  "  "  "H4AZTLwA@U;RN穏 _GAmRbz;uATTGq(-I& Vl6c5Ok$ LB|ZLrRWHAf$ ׃Ntv)Y󥖯*~zL !!yocazzqSTP-6mu>r2GA?VEޑ`` 7V;qM`Xl2O{k߇vZk" (( FFG>$)r{cl.7D~A ԢeYFUU$I(t ]($IH4e8:;~{n ce.Ox?m0P[sw"1e_o.q?>6_Akz$I8x<'-p`0ZHfa4e_E8`6h" B!ZI l) $aMqKSvE' =cg??鉼lt^QvK$ Yz4777{cCI.\\ 44sU|~4_@$dIv8NP8}“$ EU&f=]Ceu5e9ZG8zD m6v!3vVD_Am_?]bc&-5@ JZ[ۨ'7'+WEgW7NxpFd #*>AdY&Vepp! ǀق^' с1 $+:.ձKUQQ$%Ptb40CO~Lww7M-dge2P(,(B{G'5SV:s.}.{zXb9׮[ZJBB|.GAf|o,֑5qz9s/!z=ɀ~W`0+e)m Xl6Zh )1Ʉ秶!~Z UUF%@U$)2Q!^-SOXT'#TdYB`4Xd1;v3rcn룽~z<|/pG\z؉ z ]"?? q%{|74̵r,Z5khkorQUSÓm%3#Jp4ɲʞr۲DfF՘F2r ܨ c$~T@ף쬬ё~LF8oկ( UQPTHIlL }}tvu3vcFL&'mm{*23شq$qUf^~ܞȂIFG Ĭ~A0_$ss߽022 V+-mtuw3r` ^AU'PWQD9h4HUT^O(5Hum CCCO cUم,>z222p8,]U+WFnǼsY}* CZZ[IOKf%#=ysh4M輂=~~LLLAA$ O0Ġ7D{ HHl9YMf::;g V~ܹ*. %6&&BC.R%I" HOd4+ nd-=}x^232ILH`xd^11h::-V-ֆV10@0 ?7o@9@=~#{nׯD}}lڰ zz ;3AK&!!oMRbii rrs)]A:}ZRRXHAf$ װ K5涏z`p8Nhm--CGeiⴶ@䑿3UUNqmס͝Em}9GF)$)r}>FnB NCьT!G u \(//C ݣp\U nkǗ=s&||`y|I&Пq<6?ozD.xߍ~apmq>A"ݡ#Yb|쨹u'D&T/ 5+~NGB|ؓ _ b~A{СPk nV{Gqp8Gƒ|P  p穪`fE`Ŋjexdez  y.$aXƈ/ =1bcbHo<t TU$EQBдG$dMd2 ]q)hh>t:IIL-u COo$P݆9.G0NaA?UU dGSN7DÁBbB]sq¡05:Ao)͝ƺD?$ IAAo龱?Uí_A) 1/ |#L^ [w,K* EП i,ާj "Ggk4/u^V  S޾^GF(*(UUΙއB!jLfMxAQU i<~Ihjiр,`MK]|^}>bcc'g]" XP`08!EFH#51L j qtX,3%|/ DVf&mttubzzGV˰{޾^&/f hb޸cٙS2DGg'}}dgeQ_b ɾ~HNL&?7ǍsFp:TsTU5r\U;h4XE~t:݄'lO3:?zz3vpF_Af%{U%g4"@fK|AoO:f>_Su[_Aړ$ c6?@ ,ѿ ~N' 'I8 NwuPXۇ,O_?@K5F~Ad4a42O_'bN{dYW~A֤9_W^bAAADAD~AAADAc'I,E2 *&Y#1]͉pm$(6~YHAA>6=qIKM#3#}zy! ( mmtvvabAeTUv1s,^|` '''޾^H,+_  p( ;E{G' q74㏡룽[y4 LLEK[+-}FWM60osn2|֯ ?gQ:xE!^/g@h4h  L嶁? R[W5qՄ!$I¥KgSYUnGrUs/_fphU+Vt z%$qu\.FJwO7esPDF 1<3є[,Zuk`2t 0\jjؾs'===ܳj%NĄDlvUp:b1x"ZZ[JD^gu,Z0;qM(fҥ\vj֭]KJR2M74ggni)tvu WVJk[;mmaXήnIMIaB!.^bp?mtg~GVFΜ@s-\`@UU, U\tP(HJr2.L^^@n{zt fFrsr`b2lQUDjJ 5u R\T 7*f/j#CuM-gX,fo04䢡3ΑL{{;/]"%%k }\|~WʁC 444þ(ULbBt+ ט$I?1驩WhhhbETUP~AOA^>yy\avsf7pX!1!x‚B Y{}>~?gee>8jjk$!>K( 7'8{gϟDqQOTVXεt0{֬hj:::IOOP6gnP(LnN6gd?2K#`6)'11\|EQBCNv6S2s/RQUIGG'+WLO  ­ƆӧO%%%SNS"2 MF! y1 |Ê( Ya z}tcwc:C_UU pF3 !2,xeC0ZIp{<Ȓ} $c2j4 2G.I蜇O2|gch44M߇B!|>[$dYX9kG?$##]LA>7IeYd2E*@/]^#(tZtI Nz~lqv^яfft7o~B}n. Sy|ű12$.]L_h —s]OJ~tʂ|dY&'';  |Q9t:f`tm6x \=~A xfLAN鮇  ww$E%tEXtdate:create2013-08-30T12:28:19-04:00(%tEXtdate:modify2013-08-30T12:05:05-04:00xȦtEXtSoftwaregnome-screenshot>IENDB`selinux-python-3.0/sepolicy/sepolicy/help/ports_inbound.txt000066400000000000000000000005201356774067000244320ustar00rootroot00000000000000This screen shows the network ports that processes running with the '%(APP)s' type is allowed to bind to. SELinux controls the network ports that a application is allowed to bind to based on SELinux Port types. This screen allows you to modify the port number/port type definitions, which the '%(APP)s' is currently allowed to bind. selinux-python-3.0/sepolicy/sepolicy/help/ports_outbound.png000066400000000000000000001473631356774067000246210ustar00rootroot00000000000000PNG  IHDRj8pgAMA a cHRMz&u0`:pQ<bKGDIDATxwtW "2" z-Rmm)SLW4w@ |HD<ȑ#`(q%*`&6 :Y1 C5 C@ cIO wJ_ 8]d>/|3$I~ԣ2%IQF;mch^FK׿~:C@ }S7@$R(a`p$SI"`b npӁUUH$ē <.$Mk$IAp aHfaXHn#6;a.k]+Hz( i2@%.~--,I0~gڐ+1WpOmdchı5?z?XUU0 c*ӏ}{&`&OֱcAgq\˲aH1PP87BiQ!O> c I07oϲn>^~qdIB;K_)Ӏ $_lbˮg?kMZޤ=4-S:`f}&}i4 ka|yA.vt 1 g )),9æE,st;x"ͦq9cSUl6$ IRig3o4LΝo0 BGw D"쵋 ֌n 7YuP8Kei oX=(h,FQ~a0J7|$ UU b$I|k׋iJDc1zذccTinηQnu r:)*ȣTJ#Ly M`D2,`ZinkG;2GN֡y9&b\ \s$I7qY=xtbJ .M_ &A~Ny>q05u2$$~d 41 cGs[6i$:vB Ko_ıtv(=-xP8ƒ$Li^v}}<}tpeLy)|*J,Gq8@pb&ǟ{ad&e%ᓧ8x8;A"=mt:X,جV2YROw 4]~^zx\._9=`~YQ dތiom͏?eK9e_fLz<Y܉,K\hmӤsIBei `^[ 66 ~2}.F7@$[?{BƎ`]˜dXU݆aשȲD4l*NYQX"A tadha qÌsNLnlVzhi Lv95b:m膎ys/٬,m!6Id EgRKEI 뎟~ 4MCeTUicZ9ƑST@uTU/d*(@ue99~_AgA;VC$ճ}=aIW)A_0]{ #8v6+'Lw>0 j*y lرͻtؙ5e2b`UU,CEI1&gݖl6 rs8rx?}yضNh\ߏ,I$SC-hXjXrB"NLâ93|6{\Ĥqլl#2qlusa&UQ۬L00p8x._U0MY&c/I`Z' mpki$)TULFhjEeRUMc:xmrs;}ofv["@J1MHXVK:/$c$SbAu4)MB[;~WzIj#$ΆJRKaUNF$dIBe9~)`Z[0YFqm&vuT9ibz,QBe`YGT|4Q3yi$I&Z;:yp]Y?2Q `Iߋf;$Of;iy!j0 NGeY)LL%$$N'$SI~SuZ2 }^`(J8SsuC$imoeE{#"G==PXPHQa˳T6%bb"e X; ߺ{5Kj# GYi}_MӤp$mFZ8l S $FI$x^_$ ŹswlUNOO)-$INh ݆躎n#t:X,txyUӻNt]G5zzz(.,aw\6j؍N]xwv?lKeޔ]qwLFU uy-,IRvl`(ÝQf2l_ӒF`dV[yWy @50E4l.t=@`t=qI/Iǔɓ().#IuXd %tttPZRON, )-)[gnb2C+ 9t,I==l߱Mq\̚9+6eʷeH+6i躁`Q*U9R^пR_%$'Oo-[oYTkq1"G#Jed=6rIBWW7uNeu2(džtuusyر t\/H[[ظy .>cb(:' gϱuv4MϦɤ|4̱i3T|9湭/ofb-kl96mʹƦyXaX-2KN Ip>dbAQtZYnS^Zf'[FDYawd4-?t?V+O`ϾX*N:%LrQhŧ!Ig98jYZz\OdY4 $Y% %;)`bI$ٖMzsai9v Bκ IX{,&cn@{.23I6ɺSr~f)+)+Wx顸H4ʮ{him-dێttt`¸qs]:t#ǎzޥ' $IڻUk䏙1}5O<wWOPQQ8$q]{vJ3k6':jFUUt^d09Ywv*KVYC{{slܲh4Jh`3mɹFJKYr=K4h\6^{L6Ӊ`Jx[qr}==lپh,y2yҰ(RZʦ67K"Z),(DQq `p:PT*E__(B2"gr9ج6zz{0 ߏ,1*/+j ݠyxmt]j;:褸KY)-\XJN72]lݾ`0 :e2k֮w}76M-(f'J7PNk[9qb9H$ 6;~FHDWWmmsם$IwUΊVɺSL:.~l4sQZvMnglM5sfd߁@i)&Md tuus 6lL̞5'Nuv?(̛3[qy>] n߷ ,/y_BΞs #W<;6M|:8A4>CeE|{`ʕTVVr:yÏ@A>ZG,ի1M*fΘ9P[ˡ#G(.*/6lܹF֬]GEy9嘘fQhy;[ǹ&T aǮ݌f9vvp3Nv: K2Z[e ]]]aQ18n790 \:::T==Xd ^KNNnO*"7'-qn~Ξ=nr8| ƗFuRԗ3.`QQVFMU3gLRY^N2Cx< 9}:e4=ǩzV|p8̔ɓٰisWkstKb!e!aTLYH$bxܾ+Z?~ -|-pBϝ9{d2]eƦ&ʘ9}:5UhF}i8I$Aersr,E0M6u* gҤmlDQ,f҄l6xvK4v10M|~?xʊ ~?%??ﲣTK//4ټu+hEp|dZv; eyG$hkk (OsI"(PؚT9,]|Gѣ$C>՟ ~O1C] #1iv; p|Jټumm;?X?4MCQEA$.'~F?YQUQ!Hqrnx^z~?'vhi/htL&qXV, 9ٵQ;Mi~ 9}~3_9J2DdrssyTW$IqZژ7g6Ρ ?Ʀ&\ίxɤPX6S?Ə %Ξp8̩ӧٱk7%xD7~f (((^JKK;E iimcL8כ66pue;pk{t,{͎nO,Ѝ~~rQ_iSٽ23ud, aÉI+Mk[+F4Vpnpv(',Dx|Ι@=.Z5TwiJpmJuU `^ ϔ*^ -+Œp%:L:y\$I3 ,N5E n'?2KR$QWWwiҽ]Bpv;r2k6_33.N+9 R_ gd_ڒv܃4+)~YNzŢ`&^o[Wơopuqx><|rc&e+iKCq%4+JB,c~o|e+67Mb~`ZagLƔɓ5[f:":ZZ:%evِ_n$~#2а7+%'0P"*Ǣ(C_K[˲<"JWf;@mqtWVlC\.xX/k(z3627+|jÆd2Igg x?T‚+Q/UQ$H$PbO$ :چyU񛦉fv lMGu q,/}qIƅ8фϩPaK&$e!@ \uSBA_w Ysi83\2&8}=$IMJN 7@R1@ NVI*JGdٞ5gJݓfFq,1t+ZGz5f:e1\6pbHR:HJ{Gy~o1吝#Xh46^0M,2i`UC%RԈc Rɳ,hF*ʆvC!I)MCKP%rw42* 4Q 1u{ lsם47]܇~%C2M&lwVj;ϼ4iS'r`iԖ8Y2BbdN2D5 eiҏ$AAA!$ $8t˗yQUuP_G͞c<,=~7~=&?w|Y9U_̟;ήn&M+>?Gzә=wabJKX0^Nb-awq;ӧNv2yG"o,˴ⶅ 6u gֻq#D( ZډvPU`((8byM Ȏ%I"A~?S&M$r1l6,Sw$SI;U?GQ,n~ ~λQX3O=,,Kz0Qvv;bAUDJ;ĐVBR~*]e$IR$1cؽw`كKf6mBggO?99>^Yڷ<wy;7mOͫo>sSOK/fJKJlڲ2 ]g8rHPY^βKpŧq8tttrQ‘0=}صY(-)eͺukA>ZE&ϛߺS8]IYi)u=DgW}3X,22ktfϜ[ 2c>@ r-JJfp(*TH$`̜>cO1stnNh D^^ֆi,;'{4S S7RqT=!j4sALR^`Ga牿[/5- uihZj4Yt O?8 gO?9GCB?+L0Sظy e%D~~.%'`!N֝B7t=ʑ[Sj^"ܻd gϲܻt Nvc<+/SX ~#>j#L`3Ogڔ<9HQa! qqvͤ ӦL6%L&rs HLX8>/<===A@a3~X:L B!T@p1̸䞻(+::AJ&S鑸,K ?/'{<@qt:1tT,Idmin/ao95~ BdI\#i>oX*#G1~XTjp4=}LUQd2xjq|'b]9]gwτ-Dƪ_G J0 =40MXr'Ne fXdƼ9tj~O>(hZ@/SQNnn0Uu̜>4X,Oハ?FX3eK{WԠl( epFLUTf͘A[[;MMXV-Xǟ~Jkk2y2!PSUŲKYrNX,Ƣ2e2{G;RX*Z2ElظGzzv@pviN8MnNNv_$!p:8XV:;;AwO>"A\N'~TZR:bD!ID D ˎWÖ)+7MLc g Pd 2,xDS`UL8y84 BrrrDaBI{p <`&]]]l6^/8|^o#iݍFQUuBv;PTEt:6`\Aq픖bZimkI~^n{=wvu100 ?BWw7NF`~{z{ aǮ]l߹WyIϚ໇$I}MfI4[2d0 #=Ґ$ ,3d\g@%ٽ{^ -ai8C~~>B$tQR\2l=÷1췋|T\_udF~K-_dwq֯Kg39>ߌlMxשe >" /n62|9if]|֡mi|>|Q d1AUUG-;i^l _vK]c;J] t~fd'S)JJ1} (Wu._ؙZ\\VD`Zy`ٲ,@ jb :b1|%drACWE񛦉fg``M_\ H&\.*sF,u]L) ݑeE *W}ؒ'"L,F W]+\ T]V7yq@ U=Qpf[-n U_ !\Vo<c9PR0o ,&3 ᙙN\6초%@ \.c))w\znrlZCjjvs*`T.I5Uxv E_Z$BS[+%H74!QXPx#[?,Xn2\)C F[;ttu/F@ \b/Nl\ Ӕqt躉$X銢`& /k%N4sX {abpYHưHe7 $*j?@ ׊QGaeZRO$hfê$iXLUU5KLq4x ;URnd.iieԑv*oF+2d\@ fRfi?0غ};7N9$IXd9b`(MXz V,gc22CY,lΧV{f9eelߵ_U I^Ld``H4/~+-]y99JqQyyIWW7X\v;=}>L$ x#aجVz{{imkɓl!ϩp΀ittv!Dfɺ:R$E6$=X,rsrHR$q|>p8G"|^/yyAGg'klbޜ9BYR@p1THÚ8xs!K99;9P{Mx>u*1 χ$44eƍ +/ PU>o/zu(..⾥KYtkӦNtr ^zyoڌfCuj&/7`?%γk^\.'=TH%SyZ0r_JOݚ ULn,*VU%Hdzޱh9f1q^~y͙sJYv=w_ψcڳD"'t +/=wIݩzv݇,ai*uēa:n ZhZ9gOo?.[ .slٶ-, _=A20td]Z9ppwOQR\i~]בR_2 [QI C1X,L8'Np9"{&ixD"ajz4 t/ LD-XdY% ]ׇ);#r:HiFf}0FIۮH0z]gZXUEQyu}`42% cOI$ ?Պ(ج*)-i1x|]G$RZ _ ׎Q) :Bo6d"3O?qc)-)f*>xE;?G?mmlشvaYd1]Y9aX,XV$$,JycӿNL<,N6h DUT,D#~uM[i%ܾh!H>Й=k&c*+9|mm̙5 01ʹ,łb߸A$90tCf/Bڹs9qĬB$M~nQRA#8~\$I?\c#. EQa!h.rs0^(c]Dc1 q# yq8yytс 'z}6Kz[a_?nh4fjߏ! F1 Bv;D"kܗώNB<7^'n7}8TUD"a'7':YCA Ì(@ $L.'5t ;u>̱/$aQ,x>n[tc*\VX<$Ux}o5a~:ZZQU+N92y*9y$yyy}hm[(((dn sTww[o4q2wy7Clv `ꔩ;5kWɱGY?8]]]|Ȳb;o˞짩&a|Pd2(Ȳ]wÔS|سwwQPXĦM9u$eettvnwpD"۳w!jjQR\rOdT2dL:{vrTU%$TVhkoCu ٻo7EL42zz |>#::ډF#x>rLi"`81ן=5e$I"JQVZ=,Al6;}a͋ $btwwa F,,("JPTTLWw$H&q|~/ƒ=iCnnv|ldqL?pJI&StbhjBggH|<~}ܬopQgH$pp-uuXVLdޜ:\DfNEby@crɘg6  u'nsQ;ڑ$ Caa!XNn7HCkl1.`?'Nr:˧'7C2i̝3%:c#7r!*+0fƖ-eg`ه+4ijj$trr 0fL3<82BFinnfٽ ɍD2bf#'ÎۇՑ 'o^  q{Ce~?Vn99\hõ|,Wb/VGܭ͸\.nhl?}}$I82قR)&99_ޠp\?*Kg̢d2I{{ݸ=\NHŴi kʨVP,cvH$8tL8 ?͚6p݌7si8#F$ ߏa2ivz}>?.S5s6L0^N֝`ix^ߋcX`D]wxgxؿ/~ysP5`(Hww~::iF9U_m[m</Xm۶e&N9jx9t;qV+^UU rP,l6;~JKJ9rUtp4E,[ttg*9cQHe0y~^8yahI[3d2&p!rv?X;ns瓛Ggg;1,^}A.aXFXH뺎a(A|4MCl:0uYXq4M14 I[`0i5i:͔ؑoIP0t Ţd˱kzbHcZG3ihjUQgEu]fjȲ%=?ْ-/dғaYT* _{elCike醎ed/u@(2{\NǨ=|}ӕ=_4bb56>/IRLC`>C @m1hK|˲U^$GaHr.ʨ,XV֋˗eԲKt26r:"IRZY<2gp\,SY1&ˍj;7,DܰHHG.[ !$Lڔ@ m2^GB(~@ n!,˟Y_p9]ك=:D,#/7Y4;΁`7 sM?yӅ9#k%'Q˥d&INsfs:::˻df;usMJ8v`>{rhƩz8Hk[99l6?puP k?@!ZZZzm64MD]OL~?dudqω'9pEeH _h4ʹs#ilشw?޾~-XZ$7n$??‚V^êիbT72ҕ,,Gu~C!9BGG'SLTF)IMMM{l޺8_ P{0--̘6mKhim>r|h4mٵg/XI'X<Φ-[hko؉4661}4NbyVƏ@8̯~W3 k¹F;δSؼuo m p\lݺ+9TF]RfZ?+$QUo;ֶl(C2dq\4\ܹF*˯wv׈K*~ISA̟G8w噧G&pǟ~ ==wE~^ި+yaPؚVY˴iSq_TxG)I>s ͝cڵO7OWbHf*w'Jz;q8L82ΞCQfL6UEaI,?۸ۨ`y̙5[Q\T̉'X,_ ܵɂXq#y߸]'?T=g}<ذie˪iڽ=AE ?~G &׮#޳O>|>/Edv_]{`cƈ:r Q[l!$~ ݠY7v,`Z zZ_[JeROOo/)_lHWw7x+efX,b3MN*+ʑeҒN'=W,@m-NLjh2*3Y/.: 4J.C}́~}dYӜ?{i =7HAb4'},c&`՚Yt8(%G$zzz$"?3M;'Y_A>Xfayy+ƟGKMQ29fWQQAQQ!,Op|v&NHp%9vj`&-#}NV+O<(?mtuwSQ^>j6BEQ5k&-_cێ#Zޥ,n X`Sn1[ٳ=-ůi g9@Kk+Gq3VfǮ|asfbرhF<φ{2{2͙`lu f$H`|\NLRtuwsQ8z8̙=cǏevc^/U_) n[r G"ѣ$ t]*eb1^}u6ľihniE4?QYYI__0ed q\̙=Ғv;̥udyVnζ;zCGg'M9~eebSpMd*E[{( ӧN%mNnAN @刺?-eeqPAgg'N >u*;vuv àMӲazutvveen~=Z[[yᇘ:y2Wϯ#s``{QW_n''ͫ~(??B( vuu3g,_X# #@5%L󵜿p>z~fϚ#R)|QoȖ} b66r9rrןD]ܾh߶?AgW?cTǘ)C!{E&w:q%eUuO͝=w)ߘ.6nnGzCyy_X ېiXoUnݣl4_G\{d( BZ"I~:qenۅ|+|@pň~0^VY_IY5>v8GNz%HC?GJʪn)b@ B @p !@ B @p !@ *X,ƹƬSH;hko\c#!~C9{}/@ 4Mowyl7KgGCL&yÏ?[^{"h{C;+F$e]7|0>'wV_%Ihk2ZqQ{E~f:(9qUeƴiDQ44iu_ΝFOODQJKKho`˖y49} ==cq&MHqq0ǎ'J1ud6ǎ H X`>K/j`(;O0cܹ»M|r|>0p8(.,b -2#\ Wx,N<# L%ٵg/_lD#;;ϼsYa/[=w) Xuƌ!q~ ^-rrD"N8IEE9/ZD$!O"OV* vdŬ[Á㦷N9ʜY3Yr̹d7 ?4ylپZh,nc޽,]_7̟;Jli:HH$Bh`0\58z$Y%Iã=Ĥ سw/wܶY΂y0M(//{.eݤnSw4Zm*ff^G/F3>imkX[ӧ9} wqwyuvZyzD"QOTVTOEynNf͚IsK Er iV56x'8{o>Cx=^N9CmaOf %);&iH$PEL&Fc8vmL 1P7O>y$aZ1 02f~eIuEQ4-{,bع۶+󚦑LsYL2;n[ˎΓ$ib0MMQ,l{H$PU5;iUUE!L[T%IPފړ-@p$iXٳZFG6+b!NȲL aQYM[,5㙶wh})We6[u$%IVo.ko.D(1mT**Q>utBiq5޴S(|eyw:#;GN +0~kv+)$Q]5:?0B(~@ n!B(~@ n!bUiq0$d2I8I;Av]YO*"vQu]'`ZW,SӴl@p:8Nt]H[Z,BT d& @0x8} ap߽زm}EEȲS?ΌFj{m?ߒOWe.E Xf]}=_$Iu,>[Ç1 3gR_Y9IJKދ/! LYJKq:;;L0zFYY騿 [S#BYmV+˖.:֬] #grx.)ѣ޻$ M׈b;G?>|W$3/D"Qv>lܼ˓=F2eBhl:~o,]r '?/6;:(,,K4R\\$G9 .\nSYQAOO/~b8tv((g㖭ܵUUDQLӤ|TӑHnbNz{{%?/bX730晧j0n&፷aڔ)x/:(n0B+ByY`\f߽&ee<800UYz=>z,αY8>[mcYL0~E2V+]]ݼ;PYQcy̟Faۻo?̞9z?cLcSMMܵb:::y 0e$6;o>c*+˙5sζ"o aRTTwoA$bͤ8{/i8{wv!2nX^z9TUv#Go3^V?E8fSOUsi"({tĨiزm;EBG/]ٰi/=2\&OđGi<ӧI'} ܶh!d!8ys֬ 1a8}L˼s1m:]ܽ}KR]]#G2qP(ěoKuU~Ƃo@y1m}'MƦ&zz{?))Mc̟7O\3Ū̙52vǝΜY8YW_?Ti<Ǎ# WSEe[ ]9zz{?)kΞ;Ǹcyioɓ$q-Z,'4| IJYkl~g|#ZB0ؾso/Ғt\hLn9x/Fnh`U1*ʸ۹{e^ eQO*P(Ĕɓ1mT`?j2k}ɌR"()-I4EuLȦQUYRcދ/0ax~ƛ;,˨:8jXFSd2E40tyH0ab8if˹$IXdUU' $6IqX8X,kl 'wS===wc˶8Y^{cæ͘I gttvtb$IaSt]xgS~2{+dL&<#L0SO^4aTUF=|%܍Dpcۙ?zp:YerӁ*TVT I7>B0ͷAQfϚ旿50i2~8rs9vD?S8}@UU?ZO8ъ,]y7+s\M ߷^ /P]-fLHdH4z{{4 Llj.((  ~UU/L<|``] z=X,bguqckp\DQW 3H$ix=S*nAQt]' xQUWxp\O^^.ax',]$ KnNalvY&zۦUA_?Dժ߱lbƏG{gg vǏ~F{fx9 znt}PFnn.hp@[7]]lܴq_U Ft:4'{ҒNZ,`ԩҸN\W fA\+vsssM&xߗrscPYj̘%i'#˹C2 ,]UepݸWo**qnɫ!Sp1nl n Yk>B^neӉr.;GYi)e :`Z}ѢL'ʹ"@ B/-P@ B/-P@ BM$HҴa4M#Hdi?00MsiLJ5{X"ql%kgnvEC7~~ /\(+-3 lڼx"K?ONN=jL('MT}=\E0b[ OEy~oHWw7?_rXUp8BWw7NF #!:낮twwq8@;pT*flظ1R)Ngn(Do_VUEQ"P~dITJnw I>J,%68C<ncnbO)M#;XP($˨CaV]TWWaGǮ?}kTTvPD܌F&:߈7( ƏgǮ]?x)&aZ(/޾>TEZxyAPHZݵ{DI(0t@e̙tupI룽?O(--!rjZ[[7gf`q>̖mۑee.trLsm_ CpcR{00(-.C4fϜI~^~ ӄN\S `ڵ>|4w*/ E4Cd4>?+/>Du yvӼl ]yÏ^r8q$HeK I%GG>֝_|UQxc8y)>S:;l=H8byq8YyiuɁ`|0~~=<}0"Tlp$j&NM}N\.'ӧM#{_t=|^&G Nԝ߽ƫNcSmFWwkXG+> jFzdC7-;vRX EIO=߁p LᰓJM̜Y8a/sgfTVTYrDcQTUGTd矋kJgW?_Kaa!kDF<3,Y|7V!4b~¸5>/Ϙ n DqBxQ(?xe\.N`M#҇#fϚ<ÂysYru%V ;ctJ>]??rf:Bf?OEq"^|Yv0y$qEL0?ޯF(ktb&L4yoދgÜAޏn'P\TSOJN -[}˘6e `~"}i8Ȋ+8v 40 PTgΐɺSTSXXȩwo.L&3s&-rj&f( v xH`t‚JJJ8܌ipPD"J0VWS$Iv0 xb#d ݁GT#>HnN$xz=x.nT*E$"LO>!40"kzbL;%ŜkjjRR\ގlKN $OdPmIp8X,21.G+V`Zi蠸ϊVsE;,[I'pUe̙^&M[KIq1<ⳕ~N0\ʰ`<#8盛>m$g+ٴe }7ygRV^BW _@xys0{,_0 1cZ)).> Oikog򤉘Iݩz^[44eٽKkAQag͢ݎDeZxdܹ A? r0jE$LL~FYܾh!+V~o/&cZ l۾ҒN>C84Mp8Rw_v/W|ʅfzz{y|d ܵ?;o+WD0M1,\0koɳ˟z[1,^B~^>DcǏt9s\c#=vuUy;#)S$IىgLeňu&08US2stELC@bVLbstvvQYQA^N9fXV$ODWS *yyJKɡ*+*8+>Ɗ3S__OΨlڲ]{%ŦJwfΘ~SpzY8o TR\,-P)1a8&w! ?|zg㲈sk F@ B/-P@ B/-P@ B/-Ĉ|dO?[ Xrs,I;:XqL2ܝ/\KL$cYG> O__[`{ē$I nap"nɭLj*d1w,L(IeE3Og՚9U_.E #h8{60 a&a,\/8ml߹h,a$lST‰İ6CTy6MTH;T 6rjR6̖V~7Up0r.IIwoT*UUx^m߁w-ʮݻ|:xvrƏLWWsfϦd0晧@\;Ldlڼp`0D{G(J8?Ph3}FOc50X}iŠVIQQ< |N{Gq,H`1,oo/_xA81Yܿ^ 8s/xZZ[ d=Ij3edjyᇙ6u k֭}̟GOo]<#gVQkXt)/>>h$Jk[?x?cְuvNs1.wIE`y6M+WՄx'fڵ465Qs,g̞5GzE$1{Lnjᙧz?.5fĈ_UU.^ @4ù&J1m'L_~ O՘1;[ϋ頤E[[gFhcO06mيiXu-B0D4ƏG4AUULL^/wt3 ظy+Uc(/+ŗ6`UUfϚŸ5TWWsbj UUEp~Neef#(b  cWS;fw(zY(iSa$I߸1{:0GQa!@}כ+膁iu$I"?/ӧgǮqLӤd2yy8N6mB(:]m;vfg ط?6mbl۾#+5HG+VQ<$o٨360kLriimSq}a_p}s;~|p.[uL[5_p-bтrYpMq:+ky)jyq:L8<\N'h<z>N'* &`H4<+祥O?ɤ phB$Ip`-(edZ/L(S|!;Kϻ2'0e_p㒉)_D[N79< -ظiw#F %wQ6(1stfL&:< m|$I 3,]H@ n!B(~@ n!B(~@ n!,˟Y_p9]4]vk^N2E?Ⱦh:ҒQNl޺nPή.oɺ:rKƥq֢( yyyhƱ'w~uٛdƍt:Juvzz{)).& cNvGh DQQec_,s|^GTioDcS8v0ncm6rrr0 Ǐq)gKk+7lD]>sR2G{G0֢:yyZ_0_l؈"akQwc*+I$;wFAA7L$ a,u' -pWbJc9p F9xn?Hb*1 }sKk+_w~"( s~Iv_lĶ;׿wΟY~ooĹ'pI woIGG'0m>\Seo,J?s9{@m-oʨYO=Z+e4c|vvrnؽoݶmTym78z8|)x7zgϝc{DQ>]OW"ڛn^b+z#d~j5==#Qo׮e ֻR{̽_oP{H6}cy}0H&\hiA-l۾U\}q}Z[[7/U(kL2>Bss6i<VnOiOV\rk^6n|߻yD  GMdI &PSSfcuجV}irr]R)`8~$&&:[jf{F:$xQłOGud}3k޾>|g(-)ᙧY>e^ϴ+Miؽ[QIR:nahmkI^n.?wqݓfA΁D`I((+J7x{/޳}^λ&V9PԊ3)Lș9MT&! yJLOMMO]U8p0lܰo¥K<\h4^G$<urIe> Ibwt9.\ͷf*^}m7'OfӾt)Xdrc=*`W_{UUz{h4SUㅗvC<@A~L>riu,?n^ٵ룶Vxi?~NCc&$ĺ۶nE#.ƑQvq'%]{NOO'ٝ Y&6nXO~^m=[oRX2 3x;n, ?/RSYl)ZC`YIxRnKk+Ο;kyy{>.^*g^YgΝc߁=,ZDvf9,\`Z$۝IJeKq%:gz 7o0x?SFFGFq=T88tϾq]wg~F#D""##$Ns  αc|CrXE% I>[{RHSs3us'Nbo8{<UU9w,[˾>PGǏOػ{4 ?};qp$̨ǃԔd&#]]ݱ38^F_%?M446h4\.2LVKzZ===|Gܷ};n^dM;}=~'O?0@ Ξ;gy坱{Ç $:ѷ׾vȂHINx"rsr$46r ֯p8|3ahye$:q\̟7̌ 2INvtbL&&st6r +WTlb֭Y͢ CղhVZINvYO'+3Wb"K/pnH9MIDAT)GaQUܜl hhl";3aSS -D'U;qFR,\0Ǐ+ Y8FLXXaX8]I.(RAk[/^ĕHNv6C$:Ȳ-F7DP ~H$ʥ˗A>;v0##Y$It)LrJŻ=9Txv{8NgW79EE$%%;Howt!(gϟg~YYYj[UU z=0 ߟ e+cúu\\~w4NGVV&zV._ݝDfF:_z`Zwމ륵 EQhtuws$W=H;e0FAq)V+99?qNSQUŹ)*(Ÿ́.DTUEQ4NljS٬Xf8z8AoldMzZwݱ|j̟EU4vn7TU {4X` zp:/ZD__?'NbD٬ttvYd ZIHKKy&6@Qa!sPZ\LZj*yy^V>q'{\~^27lZk>=wK' JBںz nԔ hiJWw[7΂D$*;LfF: MMڶD؟ 5̻FEV(';~^ݳ|v~w߹̌ JK)-)ᰳt"-X@aA%撔b#>sh4C<{`ZVURYd1\l6( 9(iiܹLk  (*,`^i)Iq;p8L@?ٙYPw݅#Սh4?}V)" ĂXnH,\$"'e*BYY)VֶvrsrHHH]' _|^mm"UU FBO=,kVCW#GG4i+ 11DL&dYDʼ >EQ)I@{#^~Vѣ~׫jGБ#?y?/|&|_anQu։c[8zz9p'IR`0ͯ}#STĜ8T;+FzdY4h4~kb5k>`0bOH i#2NǼ8O‡j gA(M|BUU^/&=Ƕq| |z |H֚ǶIk ,"  "" ,"  "" ,2kj@sD"74KX҇曶\JGgsZZ[d2QZZFiljl23߳}}tttPZRNb[kkIMI!īx^΍s㡾l"[ 7(457}<̳:g% q~3_[Z8q'O5Ͼ^ v:'ODa={GTTV^@ r1?%Goۿ_g(JljEQx_u.|6a8HLWE ywOrmDu>'OMl\[{;3>)-p8BGg'kV.\(tb6p:}E>ߴ޲v-֬atCw?qz,zJ.X@jj pr,Y_oa9&T9QΊn?@Jrhodj%pK/3wNHwe~Yl)۶lgDܹQU](n7˗- KUՌz-*؉~V\Az ٵu._.gUdgeQW pݬ]**+,Z@ HuM .W"˗.%^/])jhlCA~#py)-)&';Nz=p$7wn' ٵuN:6nnMiLFrsîxݤ(ϣ_wx}>R(h4.^$,_ YIKM؉׿ɧH$B~~zy#8M*s[$Dx7; 0/_BcSnN,x^v&6n$+#c1iZd^oG NNKm]=/ `|=&PTgβ?|uU3200/LCCcv)DQ|YjjkOD8tGw$RU]S{`0ĪˁP\x{>֮YCXpz`(/3L$rjsXx13<o|nUU _v*V' EQPTya߫̉uvUtDŽϦh4,H2Se08rG v;Zfs91h4mTU%NJ PUuH4vA @`0PUh4Vez9"< fY~3@<{m,Oy˷.IRK|ߘnʲͼ§GNAHtxB EiܱuLWAa9 §f&F ´\0Z 0/  0/  0L;?ߏ$Is6"ɕDBBlԴ磻@jJ EQ𓒜,VqAO)? kRYUXp޳j^|eB0fo}$:O208H [oe[9x{'75vLVs"r< |ttv1t2eF^-ohxmص{7+/?DCc {H$lyyCܱe3G%2h?9Q[W~ NF}C#WDȲDcS3W[8vbpkhb`0Ktvut:Ry98v:z*W[[1- 446rUq8h4{z顥8koĕDw MOkOikZXW`L~.^DɚUxa \/~E +>JgWfbF#.A/|bz룶ٵu252{%z))$l2Fjj Ͻ">Ğ}wMbb⤲;bY|.O?CEoo֮SR<.zzzanQѤe}aTI\232fz 7ДÝwl孽{ rD#C! -騬"~z8ɆD"$HVKP-STX|sן;WdRCFF:79p0ò%KrF좲?t:n U6 Ojj*VH4-ֲvj~J6ܲnRيf'y6vNLgΞ7 #=%St:أӮpPZR<ӻO~Fæp|;N4e2N>XV˱'); @ۍ$'F8999\Rmn@}"˱ e}}su:zz{xhuCz<+h2&2 HLwOP%t:ikoӉFgل,(J $`0! hDDNj^nH__?=X-dYFѢhi>ILtb屬}}io1S:swLwO?9٤$'s9vȃGnNm:rflĢ ٬N9Ca~>۶n-hcpWVʑG9u pF捷ަ^g;0XfZ  ˖-attv[Zp8ٷz, kVŋpj33Yn-/x74v%g~Z^;lf455s1{|zJ7| uu]Y@ܹa9vD3 `ϫm w;dOo/^d7 ^^=!J7zj4F p:Ӧpc3 </##9w/?FrR$UUx<(jEe‘h4 x<<^/O韙[TU+IvtLj_ddt"Ip׋`l2 jO8jz'iYQuߔˁǟv{eV;T=8 7еǝjjR1fgNaH4%KN%%99tSII[^ip[Nco-1zgEsۍ,)Yov;mnJJ2>XA0D>wR'@$JKw;ʢ fgh ,"  "" ,"  "" ,_UU0DPe:@ X4z'm (ʔ2A>E/#zί~[FFFx\~ca(j뇾ɿ-==@,]K;ww?¹ Po'zuغתŽW /|46NwUUW$4Xbxx{<^;fc ДypN )))!;:Dtuwx*0`THNvj BhpC!FƖm`?GDQa!ZnTU%5%ejS}};~F]'[+-={ cgro|/EiI1s 执a…dgeQU]þC.lݼ%D(`Bbs,2000@(FՑ` FCzZa٬bގN46288k`Z|BafӤ5 >vTTގ2MOxg(cPU~?. H?H`0s/Dnv6nۈ;)iRҫh49v$Wq&:D"D" `Z 괸eazpItӛeJ套wz1 lٴ Yր$MJן^e%ܱu3;^I{g'HU+W`XxQ]SW_KK˩NbۙST?pW*+IOK'ĖrzJ=RUu5K,fNQ!YYsWtb._`d4ٵ{7֬>𳣲JfDg"Ͽspv;/Aۍ/>BIH5*<^h0RZZB4H$uk)+)嗿 :̌ g;o6uD֯[G~^.OLZj*:Vˏ~=v&P@mml[֮e'fppA?i8y4VV÷u[Zx{>XΕοt&3wo6)o(ٳ\./_cْ%8t?o=w/ III p;STȓO?|GIKKnVJLdu̝K]]=mȲ?&f7UQ|wu'79s|<Ѓ?x}GsoXπVEHMIŽW@̓KNN+JMhdEmsj+Ͽͷ߆˕ake n˖.<(˖,a߁#nm#P% ,={M* p=Yb9@UU?@CciiiQ^Q9_۬1%_\7DբFD#QB0 Ugs:ȒD(B%:]<M& cK(,<\vĩSz̙3?|'OMg4% F (B^n.UՌz%V~)b._pvLMm;^LeU]AdYFOJ{B 6B׌M%HnO@!6Kp維d|P(į=Hbe%ۚRSR())vxw; *,*D`0DX'$`6cϨNCբhP%^łNEQb #e2z}QU1 ,]PQY%% Nfpہ FK93SJKWww,ÁaobZx%/7Y/#Ise _?>֭J{Gt8p8<ܷ};UUtuw5x=˗.e\(J¥K446?~ukVS]SOl/ʅK0 ׏ŇOazzzyw># y9s'oY /U.XTTV_=NWwuW"Tni,ЩrGZ斫~vmm;x׋A'3#c6#~1"I+-7b[c`gy~pVKKK ~% ˗-#riFG=~斫w?;Ngʕƻxq!&3y +-@0|ǾE/ZcEvVmwēO144-kPVVJ[G; 8T&yN 446 q$AQv;aZw[B 1L~:;dz}ݱA!  0]8rs? z`pp*YBURSq8ڊl&++ Yhko󣪱 lLF#H^$3d㡫wR;#--v߳̌ 23IE(=$: W^% l?@Vf&n-cۤa FD&1щlTfzzI.###RX,UD'oKgg'vYY$( ]]>RRRtioofa6hdKrhhl_~3~7YY룽HvVƱpcr-~NGܹ͍r22֝ay7LX,X, e$r%$:Ӷm6JK'=urZ ii7| ,Պj?kHt:XbŔp3h4R=FΙܕ]Z29qm&j'++3!!ee+)|>WUt/[Le'Fy--Ba-]OIJKq풒HJJߌ3-`ඍp8fsB\NN6,it.t1ñ At[1L+̜)] q($I 3] q15nAYD~AAEDAYD~AAEDAY}Ww7Ͻx5kj?FQP'N288p,m%p%N:x}>K;hmk򜪪>sC[{~OIeM'97fgܔ( !"儂!*뛴}8㏩'|>_ή."XR ׋tÑxFHݟ0Po~KUu PΜ;OwO(X.дa޻盒FUUFGG /|dԔ"P`<( OSU]M}CCa~o!  ?&ںޑc>.CC Ł0c>޹qj6P8̳/ȑ>̚2}Q33YjelS 4kI{{|!ssylbRSt: z=_| fƯ>xkjk ýKR ɔ`mrrΜ;GsI1L\)pukpmg/Gcǹ{eZv*-WQǾE^ WLVV&gϟGӲa-ٜMMm-UUTVUs WTDzzϝÜ"~-\ʢ P(4|)ZZc_";;vBGg'JGgVKj zx>kd|!;;^^}522h4{7}aZM7r8},W*+w s̡qY},Z9EE|XrnwN&Riim/=0g_Gٵ{wn^.].d\V,_3h|<Ѓ,Y7#nYngo{[fX/?F( 7;la"9G6ijjޢEU ƺX7ʻ*3ә7 Iֶ6L&#y9 $&&Eۍ^Ǖl/>BVf&ϽUHr%k䓙ή_'+3w2Kc0p:cW =Ӂn'zw`pEVf&99FcKK}^bd2OJ xHǞ^ŕŋ0 zl. nh  RXPBq:[&+Ō^pb1Yt rIIIAeRSR(3=mx}mɢEdgͯfq#3}}dF~Rq\$la'';s_>ֹvM{шh"ffpl(,(@b6dh4?@^n.H(DQRSؼ6z9~ϛGJֶ6(VVs/ͷS؈V%008^cy?/o:TUEӑJvD{2ѲKx⩧ywOuk$A75vq v[n^fc~Y)/‚|:HKMe2E!$-- IPUE &EQ),'/7IHrHINJ=O?CUM-9ٓC+WvTŕ={_e0Np(̦2::[Fz]]457cOHVBL{]%-Y[{288DaaR+^ry9kWqύnfke^Ϧơ#G٬YJDq^^s,mnjJ2VNǺ5kWVJVV&v[˗-l2l" q\.ylۺԔJi)/`p\fgra1b1 *x-]+Ou'%1^e2<旕a0HOK'77sZ,E^nX~l,3K[TXF#dBV._NFzZm-C^n)8NRSciI(,(b6Yr%%%,+)t /7‚22ldeQX9EB!F#YdgM(%xj)jn>Vh423ٶu 9̙S[ff&a z=wޱ쬬la>IKKdw`T<55dgb2VX. 7:7dfd( tAܹ8vn\.goX>榏oxdo GQ~q|F?[[oepN:O!0#ĹQ4tZ-0|n`(Fa%@Kx\3]O wRsP?~QsiZͧ( p^/Alٝ5Kɲf( *  0/  0/  0/  0/  0/  0/  0/  0/  0/  0/  0/  0/  0/  0/  0/  0/  0/  ILCAhJ}TT0$7z?uA>TTF=x^ED˖$ ɄdapxP(8ßVl6c g4KdƕBk6Iv'*A'I}t:JȚO|UU \. ƎFtx)*(ž`L?hUUe  (`FV!-~ykJGG'fyc hg& ¬*ܐj7}&Iyf>_A9(DOhYQUI4SPeR $ p(ʔ (I$M2kx %$T&+/.^?{\~AoO $108#%%v;F!^kDQ|~f&60 1̓B¥,x}>El2{*  p޾>;:'$PU]MZj*P+\J]}=99x^.\H{g'](:*.RɄ#aǦeÉVehh-z‘(J(ZIj:~)**?4!#=o~k ?vF}.[d9D"dYFQ;&љȼRN9ÎW^իVbXx2`ee\L?/ 4[wsr9`Sϰg~z=ѱo.`0*ѩe)u vގ;) D zhjifph&TUdppUQ@mm hzuw쟊,Kh4+-ehhSϰ] ][}}}C0" x\x^ ~ʾAnXQHg݅?f.lb6n@k[###T}AEe%h4dYweO޲DfF՘F2xA* RYA(f$CAT@ף쬬>LF8{_;_Qb*@^::1L}C#&r5defm$I܅&}}x}TUQ #1iT$Itvu[ax<\jrή.GFHMI`0؄^󡪓 FhFD j5L&<^7UGޫj|nەDum O?K@EU hDe:D^n |2֬^EzZ =5ɂYv .g"h`0Dիa'΂h4M-~ͷ'%%  |ID0$ cF$$v9YMf;:XzU\*B`2ΙSg$.OhhR%I"p%0t:%%9FKwo~̌L\.F={{B$lh::-V=Vpp(D~nޔPAy^.^LcS $%%m33饢A33=wl\.'/_ w4RQINN9ٔWT @NvV|>zW?*V9A>$Ibdtߏj]ӡP^<6Z=FtSm(eԱV,M6>7qDuM::=yS?@ ѠB th5:Dx=#pN7ޱ 墫_AyUyC<:)Mvb㏭7$M?`0%-/}?xWtE GGn5[EAGBMmAk<,by^s%:P) pӼW6 :Wb{~ b~A{ БHՆEސ~4guY'/b0DAnAboOWpmDAFSCt  ӅłƗO|׊D"5'4ewOF5':.n+|AϏitOoEwv*9}$ v|>bL{] HHSKDSK3}}dI&7'{}҅xk䟲 R'  HHHRW/ |nE"Q#(B0$ F1 TχAQc{}?zDKU099X-V0Nb:r_b|H$7Y\mk{ߏd2a4| 4 ^NO8a40LB0eph~I٦l$= 4$I_FH4BQA!CCb4BBo>KrQ }:dedJ`Ʉ磡NG8&/7v v\.jHMNVK8 z{Z~Fzz{0LS/ |M[J4D{G}dgeQ_bpƲ)*`ErR2yx}^hAtcTUedtz Yzhz :zc%)6}|8!* P&TE`4*$FD"Vj1MjJ4}麽ii-$٬q:D"aZZJtjtnpѠhe [xJ]ؘAχk$:YmRU[FFUU{"Ajj*5Fkct3J8Ab'hڂbp?0ԵLjȲ=NM{G;H_<^`tra(h4Z4:6I1vb$?~\-..Ԭt$ (tt,S B^GR@0$#=Ʉ^CUUѨVADt:tZ-&P C,n $`tO]$(*(gc$Z-D ,DQ(z>@mEO B(`zOAχ-#2&&o˜'M3MؽrUx\`ZNJ`t:ݤO3֍?z\{3~p$ K˕K,@'%%/tsc#K }Qz%> \aw-ި:ݬz/ |IF 1u7J(BB0BӉ/ |IDBB  tuP;Ӌ,\?@j_A|0M O,X,,t/ |>\4`bK,#  0/  0>IXf!U%$rl1&Ui"c@h4z}$(6qYHAA3{}>x>iMaa8Ejk+XmVrrZ,H*\/fJUU[bP1 R9^n7PP(bS2SAEa^WF>z}u+I:::iimeՊSU5X_.+v?y3y*ͷDzMjQUw Ն022BzZO?鼽wm$&:hz Ivyi+AZ 8 zcOd" bXD"aRs$G8Νlܜ23x718v~3defŽl"5%:ST+W*nOOjfQ]SKYI pxLyGhhlĩS$''sHIIfǹ wrss8y $lg/sr" |ID__{߼i?o|&/]BUu W*0哟G(bddNiI1y9ܹu+@*hT!n|6_O   l[7piv [70L$MNvYl۲g0(,g`pp8V6mx7 n] |A֯[DR͛6|R!-=[7Ԕy!6mȅK̟7;n˖qwd)Vc+II.Z[ۨbشV$DC_A\?sLF#YYh5Z^/e%ٷve& =%Ť$'/c6`tt z=NҒb23Z-(cUUk>3yL}c#}$%HIv3$rd8yDdBM 2=$:x^T֬ZE[{;/2i\ 骢"K2UUD(J7 VeEUFTErQ[WG}Cu \.Z-HHHiI1&1~?a}u:&+h5Z' |b$ 9~$MMM,_U+V`6r#z>¹X,]Lyp:\xVlg^Ystuw3 @eeoKEEw݉+1h4ʅHLttRS[D/[J(ܜl''Oj[f9EE9vZRSYj%.Mܹ\SWKuMU5մwc^i)^H$JnN6ϑ0gΞv`LA~>II.TTryEŞ`'Lt`M[{;ϝégիW} p~jqqE! ƻǻGCch4?!oXQEA K2`h4A|v7^#UU%F1 h4x=#,#2>YO(;j$ χ,IC0`ɄV:Ӏh$Iccޝ0c?a4 &>H$B pg Yb~|;&##] A>2I~y,c2⿫J(˗* :6TU)sǙl'<^G?iVl6OyNk7s=]'ZĮ߯h4X,)M$ITUpyz)*/ |>RZ͛n#;+ y*ii,.DerrAЁ_QR\ It:x H-~nA3& {ځg  `0 %tEXtdate:create2013-08-30T12:28:19-04:00(%tEXtdate:modify2013-08-30T12:05:05-04:00xȦtEXtSoftwaregnome-screenshot>IENDB`selinux-python-3.0/sepolicy/sepolicy/help/ports_outbound.txt000066400000000000000000000005321356774067000246360ustar00rootroot00000000000000This screen shows the network ports to which processes running with the '%(APP)s' type is allowed to connect. SELinux controls the network ports that a applications are allowed to connect, based on SELinux Port types. This screen allows you to modify the port number/port type definitions, which the '%(APP)s' is currently allowed to connect. selinux-python-3.0/sepolicy/sepolicy/help/start.png000066400000000000000000000334601356774067000226600ustar00rootroot00000000000000PNG  IHDR !igAMA a cHRMz&u0`:pQ<bKGD6+IDATxypowW. vf%v'q'圙ܚsofL[V;Ug9S3gN&gLıۀm6f;bhnd TQ }x~zX{mmn8d2EDD|鲇-L&sc2ڶ1f_/. ---,9sX ˺"""r=#wuӈDc/""2A.{nʭJ ~"""vo;7 E_DDd]-~۶/1=f}t1Ƙ z]l[GD>+2("˲p]A,PX$1m[$J dYbQǿF_l˂P0H,h ,"Na[2w˲H   1K+~hR4m~ oma0? ʢ ?_|c^ j9/>ϗ40cm {,x]㿤1E{ϟc۹1 RM[_|x,me3R`,Oz=n]MO_Ie2HYIr:<ז}n{`Yeq#h_*e6ZXܸtKO~*ȋEX)12 ooI4aReeEXR敍(\k;c /=wfYZs/,31[6ǚO1w2kZ=`_ [s[4>kaimvo"RQZ‘sjϞ+-ҒܼYd*ͻ{``p>ͧώ>fLٗ^vl{yJ V̘-+K0 #e"'r2PTPtwg|O  ' p쿷rCVnLc<\e\| Ϝp]:zsY8w6\>1u=,7dbTUOϞ]oo~{;{dF'3}g;\UtP2 y~'9xF>̔I~2"ʲ,ؼm'Ν͒h$ Z $|+Ha~>Ϟ 86oX@QA>ϋ GYqK;ɋ(*ĩ4=Σ{;kr8@t:yض7ٗ_{v=;;wJI*/W;xgn.hS[S{±m\2p(D~DZM77 !o]>'VH8w:1;8"J >p]}eYس6y8kC<%}{"ד+~L"͇g.0coq oe1sjx@Me9yE(<~1rۍ<ﲟ.g!P7ȍJ6W:_D&DF:ODDG.{Sm0=co!rJe9}v"yq*^zqj_2A,H&ttv@D/ĸC&7 Ec:F&LUDD4|uBDU FEǴ#""# La#W܃Bea۶%""1Mh=@A$ `|&O˂޾>;Μٳ[ct,k/>""ע m'y'pҙ4c^dh(mmعقi_9u EuvuqmMD4a[e188H:aޜ kcl~mYm[Xe[omeoLX|93s<7ٵk> rrٶMӡC<?̚o9;JݔZ/iODy ӧr2~'x?e/ydynzF#<3ud"*+*Y3fj-c f`|?:::X}MRELoFc hx7ׯm?O!8dYJKKsmA8A$` VY}* *+I$̝3L&cm[c|+_mS;iά3 ?̖m۩bhhx͹s;tutb|K6ephAls޵pNz/"[\? dܹsWM0#U]D"0[.Pr-g>uFzDė&'ch|Fx/ яb[xc7Ӹ`Y7l ˘Ijks** ƄB8`O\t̶.ZD?$ b"L,)+í%l~jVDDLW[-nCd2X}}c9)*"l`TDD .^L STL~>^U&""rI.PeY rtGg :p?&?c|MG?Iܒ<!.]wuwQ^]No_/{,dڮZqI٦Ty)N~ܸ &M"";P⌁H̭b lJp{W[k/1+V]k`oz%gjj0eeF(ri, o$2܂;w.Ns3^"aV&\~t@8;{6nBKh:;v`am\~$d.%sMX,M[}dn\7 ),LUUn<B/LWr""2/ϘdnSVkk lۆDrGG" (1|dW&[֭9z"w? L(_~, SQAf܅ [[ __ g42ߎWSC`^B|ܮ:F/"r)r(…doA۶Z@@+""W/W)-%jŋ;; _ i_D PO]]nZM`xl~Fn3>5k "u+ui2ܢ-(0 >4?ߝ6_q7LID/uOᗉy f2+V/"rY)2/""= """W/""# (""">3ea6ea< s]۶= pk11zm۾׳is]m\7oyXˌ1c^2Y5:/|x7nYFo# ><r8,N?@@?%̛3L&˶wwd1Yl)(-)c t300!ѥSVZJoo/A~~>UU>r$±'X8D"쥮3-- سoaɬ kC$lcx%OufΘ8~F#? hRk뺼 2wܴ[V̮Q^^Ƥ~㟐 8$ 1 %޻D>h1ctuwc[yM104pwqwO6ɓ;`9`o<݌~,fUl.ȴS9r(EE,]xtQQQYxgO0r< ˎ;qr*+*;gt,llu={zm_6 Lg׭[9t0uu4Λu)((O܎yE޲3e|M2޲ٳfg^ܼ]ߣD@^,]}!?'0b``ӧQUYɉ~E7@ݔZ0ư{OnvK_JD|貗G <,XbuG300g PAb$:rT|6>vX#cWF/|0yuGmZ; ;v`0r-m,دۖ5{e,kky\}{=Gc֘|J3mT*E"@q 1 F?7:cc|0_,i Xo8m-7|{|aot>amߗ \`0HQLc.>E꥟\m4(""# (""">/""# (""">/""# (""">/""# (""">/""# (""">/""# (""">/""# (""">/""# (""">/""# (""">/""# (""">/""# (""">/""# (""">/""# (""">/""# (""">/""# (""">/""# (""">/""# (""">/""# (""">/""# (""">/""# (""">/""# (""">/""# (""">/""# (""">/""# (""">/""# (""">/""# (""">/""# (""">/""# (""">/""# (""">/""# (""">/""# (""">/""# (""">/""# (""">/""# (""">/""# (""">/""# (""">/""# (""">/""# (""">/""# (""">/""# (""">/""# (""">/""# (""">/""# (""">/""# (""">/""# (""">/""# (""">/""# (""">/""# (""">/""# (""">/""# (""">/""# (""">/""# (""">/""# (""">/""# (""">/""# (""">/""# (""">/""# (""">/""# (""">/""# (""">/""# (""">/""# (""">/""# (""">/""# (""">/""# (""">/""# (""">/""# (""">/""#+5#c Ƙ~"""vDq]t?q(L+ nYDVػ(""">/""# (""">/""# (""">r'""rs].UqY۶)H "N(""" c<*4OӴf)*,|o_DD%)*+EcW$Möį\3 m_aYK /""r[[ux,_DDZg}ا?R}"""b}< p=u a2,e8cY;[Τ8A,%'ֲ,8x l˲ȱc,kh>A[{XE:M/eY4>ľ8zyL63cl6K:!Jf B0b ߇c;'kub۶O`b[-f6̠Z(+-SEDD>qXEww7'N ?uS),,zz{f`pDd2]]8u4ts)*(bIuirR)z#:ODD`8c=#1 ζpyJh6‚" D"A,ñm)).Szmmd.IN>MGgSjkJ)"""by d3Y`0m?y.6LL6繸ˉR)b;.s'@KwM~۶T3 :˲>ec pOc_V  ?"//oG"߲T\G[XPEDD.٥]CA~eG/""Q\bdc(DDD.U0$L^c \[dYܬK(%*/>va!K]]u~K )-)0rD.h&PEDD.\#.vG] >~QEDD|D_DDGlƲ,1x7amњcmYmNߟ靖\Og2;vJKKRG8ڶW1=fB uâi[eY9{618C]ӧϧꢷdl6 xLp-bouv&԰J*0h"w&EwO;wfeѯ[#7(0ƌYYmSO eeeYL6NJKKZ_#Nm̛3q2s]wEbj}=PB 1ƌN#Ŋ˨$<|7ӵ,p]˲FW ys&.q tęc8|uS}Mh=3cOf`8o.MOsyܼx<ζmJ%Yp!%żu+]]xGYYgϞvd̟FկRZZeY>sIJK۩–m`̙)~_p 5tbݔ)g/U`d"8} ˗. e[\m66}}x"zzzxgVnX :;ػ?P#R)fϚRVVƴƶ#b2"0ٳgF̝3j_D:7㿖e9yع{7Yץ$/ TkΜ=ˆ7`m~c /6~ٵ{S:>ضMOOz77mfǻ;ٶconD4_× ADD]~c /,a!<77nↅ 8w<{ƹ2H$L˹sDQf͜AMu5wqD6ZZΑLˋs7qÂTWUq-D/,,䏿UCBMa,Yp8AqQ'pꛙ9!7\n[8 IStuu i7/~qaE|r=wDz*nY}3TTSYYM+Wf;:Z7O>zmYΟw`6 ypZ[[پ]v0h>IWw@6Ν?Oww2{LNly>;0r|ȣgp]u).*dhhD,]XP3g8y7<crr@gΜo"\̟?^pᣕ%˖my79t0ȋp=_<l.onڄg +/cԩw~3s1Ǧvdη2k ҙ,i8s(,,ӼKg/TO>jjjz=lfJd?I$,Z|ݵ"ֲ8xNa̙;vǹhoog,hl=3oj#>rJ9@ @gWg͢3gAMA a cHRMz&u0`:pQ<bKGDIDATxu|gx}|5v?f]G|Xsi p (`6EQxQJlʶm۶imcǕ+ .MQp F I_?X!N8&yhF!ceIQ{ UeiiZDzw}C(**9a M|,ضm#-! P ˶DA'M7ldg#>p {>C_ Piy۶M:v3h/#y`]6Lïf^LӴ~=E+V?;(#^=r￯}zB8sg9d#u]:M!!M2 (Uͭmk.<7[*a0=OxE()+}߭7*"B{^4ei&_Տsnhjѧ r*fh-K7 e!EaZ˲]c)H!LӲ,yi4M<ie!a60Ѐ^=yiiv}IJmY^nIvBy4](h膢eAu]H?)i64MOM4]7Me*)JKJuo{ij3u߭7V M+Uagwm PXZNS0m@*\=w`]PYSkhliozӒmJR|khlizR(k2EeK+Əɷ_{y5麍qV^T O>vc}n ^0 0+m,=rP~jNMJܰmcw*}ϼtW<20>QX^q̘e5sgd:eh~[yg:}W q_}Y]c5( z19Y/aVznI={tnaTQF Fhs=dP4L!~_@մn/?|Uk^;s7eMb_2  ۾ഓ}'_{_|q,ImO0ǟK' Ycuå?kꔩ'Z)K4MD_y[qEq;!>;9%)ap>Pb HI=tM>| @ nغ!4jȠVYq `!v5wWTV1qu[/_aΒP3N9q~nUnji⇟KKJDdpx6(JӲSeh x+YZ>j@e~czk{;B!K2Uu B]7 u$TT dFcaXʫv7"d# ²$뚆MEU/;^y=,ӌ( -MQEQEmlnF˶%Q4Mpzݮ3?ïg:$q;pt/?|ߐ~?˲ Ͻ1#SuӰlDAHAv:j\=bЀn)ɶmRШ:,FJq#hnYkaېpxIr7>s AJg]֎t dB~zorj5wF{f?._̈́J0yHÉ- !@QTfzڨ!^C,Y^VY҃<;ݒ8V CQUuHҕޗ߬޴3ORʼnq?eWasO:~_m؀~04ò^^Yhj7]Tmfhdt/VT-7c^}eiOӒm}{dg  i .p~@e}eY9|!CA<|*!hTy5]m>-=Qűi M۶qj:Dz<i!KB !(IzW]N翯, a7S|@lۆ{ alA,{߫qѩ=tHCӆaHX]WvmnmDдEn>B8a"(@DӴt]w>#Bmڴx:L˂:EѶ`NoȶMA~l8!DSжmUUifqBQUe(J8k45 *!CSѨh4J4B6ϱwnض㩻oT !bIAq[ޛq!Mӄyܦi C t'c'\pDO4IH^B9$\焮/8b!L 0_+eLDe ]y[ZlBhmkSϪy>%9٨iOXpd@@@儸#Rw<>2_ ˰--ee4E76#L(x<Һy&?|# >R0L,BeY 6hoOOߞ0E @ zPϣ+Gbl1 { >pq4M7 W$q!j&)2BRf۶$6BRAg"A*[ݶ_9˃lD/ŮZK[hMA Xi[4MAHA pUIe٥˗oݶ=>>~1>4Mc.˶qB ]B;B/躎[CXz+))4M6)HureٖeQ4uG V ykM8MDQG;(A(,*uOޱ8,ѧWUSקe MD:,ـ,!!ygxiK)fEI 8a/ضmñhɒg|UW_t:p\NeY>Um۶z<(ڶt8<t;.tџMm )B{GG߿?@i(JΰLG ɒ(aE3,Kn[v.s MM !=.!S%ɢv:.t\.c)c(qϛe۶,I>G$hrp8/]Ï?ɒr: \78'EQy$\.'~ݖe4e=np8d3O ؖiX-; ;3ӳNm[{E!0tSs ˰Sr`p$r)'oٶ|; &KAꃏ?ٲmg5t?z򤉣GfwUUhwϞ%c𢩄?۶eY䳹3^]Po/P(MІ˯y3IEEe3/[jQ[n߾0#==;;s.yѣF^4?/wQl-)-*JzZZ (?tb>EQL˒eY2!g0kgQQ^Nr\ xÏjjk/<\,C/8ђ6m*1l8Bf|yg֬]wLNJ޲u[[{[fFY_ FD AVTN{ VZ* 6|Ms@w) CLuU5@ع+2M C{O>p7y/>>o^l:dPffy眵aæ] q>7?G^Uպa{EQ쑛ף{z9a2 0{r߶m $a?nq'L9nv]x޹ƌޝaV>{C4p`NNmY7n<'7yĭwL0a?ܟΫ;f᠁ ^m?MU51#6O9ˮ̺ =|SOh >;s ,]gݲueY^p Ͽ޽~Ԉݻ[e#d= DZL˒Z[ۂP85M A)@UUD|٧AITM;`k39W^[zOO@65b%ZZZؔ<|o%Q\f;ssrdIؿRሡ@H4˰4E k6mEQ6m:oe+V,iE̙7c&%&&+W][z iiW^z;vh1hxɒkԈ዗,>kEQ Z[ mN? HS 2C5%%`(W:g=$J{qm%%y=r/b]SSRN<_>e|wnVfFbB&OTS[lŊH$ګ _7L ӻw8HOONN"Ey8`BH7MQ%z/CQEUYUSSt:?l 6lLm1˖ozܜԔںzG!\v]{{GFt⒓,ꑓ !zR+Mӊ?[Zܞ^qm lۦ ⫯y)Y peY˥j8v9],B!]`(|e/$ׯ_r|17֭[Fp$t:\ޭ[Rbb m[Q|$EQD"-сOi: ⎧i: A''Nï;eYV{{{\ؼu+Cӹنi"2mmmmEq Dp"4Mf?NӴ b{B"M@ 60Vi!C[ZhƎjY6uϗ`(osMEQnD4eAu-U,Ee=792M4u8S3O7Vp$wu콇wD_EdVNV <=b,+C3BJ3;XrL 봒W%:~ Y1cm/ÇĄe˖RBfyhZ0 E,ۻW_lk݇^;F(..߽GeC9Ne[ ﴑe[G6h3N@!ٳW^^> xY$:7qbux?ؒ)2`GdYbmy-8P hb!38.`}űV&D@ Z G !4M31!BHJ.3xL{EDtPUi))h8 ;d[ydı~>%!,LjJj߾}"coueɒe"XrGyqxsV Uÿr>9G* {<|0%=@ t9BH?@ t9BH?@ t9BH?@ t9BH?@ t9B79!FxU?a-eYx}G^`lY@ &!eY ؚ׿?o# p]4ECC}!e9t^]@ A;GUUs҉'Ec+\N+i˲8InշߝYm--\x1}3 9)Q #݆7ҏ*((,}izm|,Ii.">e˲׬}W_}y[6Mym;!^(˶Em\Ee+okn۾'LMI93N$BّH8UW3G #7GtFD > O4ð$446zM'w,0SxԩoNm̨3>"U~ڛn⋲^y yשwl6Lg~rssnj ڽ{ŋ-KMNNMIa7ߪ|ċ/8æ|I(xtΝϻK]NQ@ 8E ~ҏmmu u<Ǐ1ⱇ|_i'teyo.?ԓOJKM4`>{|(';ᾇ/Y_74ѢsO{{1UUSO9[ooޗ\t?~ldui&rf.4p73YX4Ǐ`iW\vq]]ݯ/LL A@ܬ\l/=!ؿL);SSS5M7fgìo^}7x&O3`ʕ[m둓ӣG(g~ZUuuSss܌tF 4(9))3#cЀϿ^r^|5߿u^'O=Qմ.N2hP]]]vVVvv&DzMMm`M5!mm,>cN󳯾jmmM>io͞3G~oK.`֭MMn;+3t2 Cptb#x<6F =W\qErreYxavaEAx[Z85W^Eys-qqq PuO>ijכp=cUM3MgA~VfFJJr|˕#{wݫL99٦is\Vffvvְ!CdYK{ 4PѣF :dqVTD Pjjir!'ihnjj˗/߿Bee$''%# a]n#O/ nzP~,˶wY˪DB0OǍDHO'B)ji:"h ()UUũB! JQeY?ҍI 3>+!^yYÑKu9y`?;Ǎ0p`@M(BeYec/B GZ!xgY<[lGߟT3:#h#! pᐥa~FmF8R2L3vp;c6˲vᗉ|Vk_獱]xBHa:'1{ڿ,d>?11t_MY<ls>>6pȢRYr-]~?>>~Νon' ߞ]x1a|^dzjq>$IMMUU$Iܸy i<^;czꙜFkkkXac{{؟ Eqμ %"C3e vniik֮{=n([m߽q3 Ng( =nǛfO8J~ [~k|=r)zJJJءjJJʊkN=i9s/ZXTR2vwμpH%˗Aq\{GǗ|HѰGo帅DѬg^xQp\E565=ēQE <‹S?w߷Ï?U@ϱ?{=⫯>o¡}7kGP>A}7k({tmw־|VBof~1VY{.Zl̨|ɒe#Hssq'mmWz(~O;g|˯\}/Z{{i;vgx”>ӢmwzomjڐB*f0x8ko455_D?Ά24F=ae.Xh-%K::.s ƏSN} 6nZlFfJJL?s֙wdFQ 8s9ӂ`A^ޝmQ; -X ^ϢKwcnPԔC=: ,,8~))Æ?vt|qc93xEKV-9gy5W4;n**.$QUՑÇd_w= "ш(7\se_i#?fIzͱtSy~A㍛6yۿz55ޞum?Ι3>z=xy=4M3Mcؐ!99x!Py0+@  6KӴolj/e+Wj&B|\ܙzˍ7j&8ǫ_c5M ömjZ TU!#mBÑa,!dyCѨmq>S=p8sS,*9l,O?p~=-a;;o>tH8DQQѨ27dZűDYifP8d[ìF *aBIN?=ihcG~weY {̌ EU !8MNUm I@-ˊ*j?= M^OG/-50 Mԣ窱45MAQ(躎gn}LӼw>ܲm.@`۶UѨ""B B!ӲNnp8 ᑆP8BW]yɅk8!˖eQ 1tòLq{.bD Cv/?+Ξr7,_65%% uFyŮ%˖gfd;GɧKJƎUXTk4!TUmE/:Mذд'MJLLpцMu],[YU+VVUege!FQYYEQT޽ _|ʪLƌݬY~'?ᢍ6k0 ESB\hX`R((ٷvu͕W 2Gs;ht \d 4m`GniS铖OUUW4cƬ?y$˶MLMIILH{_}>o$KNJJNJ'n]UqqIIV9]rqRbbχ9w 1|G>,8MӦiIQESaibSUXa[7NXŲ  a=9~)9F0 w߽YǕ?=(ms5 p,2 ttRm'.LxUam۶, k}I-Zs@U(˶m˲6n쳠1n^4qeV( Z(Ӝ =H4Mþ,Ze&vb8x#~wOnu0M2 ?E7/Ou+a)Y5 ia O8mraXk( ay]0|NǘTؘR@Bȴ,%-VV#4:4Á^sF;~8}XN9ýb2~u?X.mSZ(J|mVU5,Kgqm#|:7Ξpx{ӱG1J}㟱2V$t勯[z0WQP4홟t8u>pr΂YhףG^=E=c#_{IeE@#8?0.炃BFfFFH$rtyÑ?ls[CM%`3^<<,h6>$p4M#! 9x(@E'gY4MEQt]ف$֘!N{Aj Lں`0 EQm q !k;6"1)#!JES( R9}Ċ6Bb4f}}] h `vB|b||>[Be^6,+ֶ`j#D c2˶/ ؾsa))1a|^/PUH4@񂎿)s<Oy,$3#!,;Bmc@QxpȒO7 !wޒ(#@aQki4'jV _BDsܿ3{?ZUjcuky| 555\fF OKKetbn=gނ 748YDQqth!9 B.yDQ$ LBmjooPamٶ|//mmxLG.,.YX8|Wд( C%<;,I<4-kջwS%I"0O97~fYX*1!+./-/fweefUhp8GiY٥]U>xwM͐AO9iG|ZTR=Xxn_s B}zEQ<2wWu @Fy< @pjܜSOBnN΋U7t'O=GN iA41<oz% /kW5'=of~bժ2O/CLI^h]S0ՉdVTeFwԾᇯ֮˲?[mmnn1|X>O?_t^w?͝bҲ1ӧL|Wnظxر|~,.-nځ3'Os,˲L<Y7tN-BcEKv]|^RYUǟ;iRQq_}K/PƆu;zO9v_}(ʖm֭0wO9yԈUUѣ|Њ◯\ظrje_뭾{Skop<4:^/ O-ƏUh֌yQXXV^Ӽy%~fF$gqq'?Ҳ[nąQoNWuH@ oBwwn3N;4-'..m$'(.NO|rw_Bמԓ`ݩy) ӫK=ӆ lZf~^^ZZZZZ*Brǻ\)Nճg^ܢ䤤Æ2,cc'*(p]ضrssrr^OQqYP)263 v{w;.ie˲Ęд!|uwqSkmsM)xiiY))YY,R01'x5_};sy=rk~,dۼUPRիYAm''%Wfvs-E!D].Wzz&ֆW M< 64)1 %9ep~M-%{g?v{.ŋRS; ߚKaFM;~0#hϲx{~Tkפ ;9O?74F%4t7z{ي8 "#7iƵM;NQVZ|̮)J*.3 '$|# 홟GpinV[{{TQJ4 Y imђeUջh@  >.7;{zxI|>oFz}zC?,AsseY׷oMm][[[̌n232DIy=p@-e;ia؄VSSS\Re]vAB,˦&[=rs6o={bB|rrRzZEQiii$de\Č que96^z99=9))3#cNO^e55Iɩ))Xqcnݶ[ZFϞoL4]iSO3jݻ3 jꌌs>+GwL7gA~jJJSss|\瞓j8 Kjj z{ޱF: @V"eU9rP(BN Gi (Q,UN8(B2L8aU) ,k&˲8$I`0wwсg4LCu Bò>aq[14mHDx%P8]b"N+*i "TEl+娢ضueY\UpnLx$Y7&BDEyalxGFmۖe(dۊHQ  N0LM\N'QA$ID62L3D$U~?8/K>X EYMu@X FQquNccSO?[|/,>>d]l<` 'vt.b_w>>6#aodBua_9Sc6 λ:%rR~Qm ai:9@,^ZsOBu`Y XbusTع i+?V瀍iYV,ӘsH^*pҥ2l4j{[JK  ]ZAX u8,6gXe&,xt:Bqo`Ccp,# l?A ߑC3``0rjQssr96Z0nM 5u+4@ < Uöm "6Yv xT Q|lb8c693NgY>0_u^4ͦXX!MQI 3##ӹFxC{;BR VεcDžΎR.8>3">?!ܙؿ?䲕+?ᐓ^vsW__Գ[ !t\>{Sx<.+ر(11k!ڵ}GaBBB[[/(<>FE1G p8;V(!>.Neñ~Ʀ愄Ӳp:(ڶy$yn?VMx$IXGDz,x2xp8"%Xv/\[oxMzeI2-pj|85,l\r!˲a8meYz~;t<]Eܼx)rr:?s]7x|>Y hz!˛_}ya 4OgHx”)Ecwx?Bu#WΌDGx;X o?F)M}:&p݆C ݫie+vZv]NNvzn C G"6o8Ukfggef<,,\a_\RRYUڧw5eM9v2MQkCs7mܿ_~}"^fm]Cð!utt8gNMm(466[(;+sẮs{O?<77gA(UUuܘ 6Ԕ~}C{[{3x~ܘћnö-[lش)x=^|~EVfƸ1*v565]&_-[1\etYhqm}aCzؾcǺ طO/UÇege߸qgaѠҲ23DQkh\aCZZaJJjjk{ 4h!!QEؿ^n\Ga˯ѱe?! i(~glm4ü[lm; ڶmV[{;0MӴZhF lܼ/[[T\V}ut#ȫoL*¢/Du;B0hVV^>m;s޽{iYw?P8`۶m? +׬y7X}0/[ZZ{7ޚ^\ReӲ/2w~\h,K!Ӵ(uCQWxsʕE%%ϾR}C=0C:C3ϿРޚֻﶷw<̳ťekj|Һ^yaZrueg_xaOf|h֊/Ȳf|(@b׮ioOw:ӦO߽o/DAB֬y$Qlmkkooǟ+v=̳mm} VZr+c"6M-˒ew,|gkkklݦ(J[["!kTUmooUY}ݵ{e_4|1΃ꆑ,646 4p3>yә=0  ]NgZj nKQ 7d{n4+(hZUխ6UU HFv\# 6dpJrr$ţ]}պ>` O{]y)h~5W߰l..)4auÇ 4p@^=>   s~U ChTuEQt]߸))!zqc.\x͢(p}{9| MF;::ij݆I$%&Z6=wFXaM)xdaO ZNe+vλ,kAXxIqI( [|yuM9gtm;v(:zHQ>MdtO/_tim]m-_QWЧWϒvttY*V^]S[ף(jwmov`Æ閖ߦ{YoNgwM~njt:f4͓XYYr55}zjimWςM3ٶ!jھcPTQF aӦ!:dނ,8EGS^V^s9giK*vJMI閖j˲; wfw۷a6~) njGB^WUմ` 0/KKˆ ojjk|qߵrѪ>tHz4EQ/]V^QޝcK4nM[߸qA<3 _~-C3'0v̮=-VۻWk~W4Mt -on80vlvVVaq%3UUkx8`M{vKM5!; G{PP4ATUUzB˲lf82 4MAhea  NxtDs?`/3 (J4UUt]Er FaxaX^q3ecœ1 +l'0<%(Ӳ,I ! ٶc: p,j<A8x_4tPFHyji085uu() <˲ls~PyCu#(ȶ^/vūqmY6Bxa< $|0÷a5,KE]EQh9v* MӒ$a2p} g^+Tj̽o6q+"-[[Z(*8؂_e)K'V} @AF)Ri#3ltD\SQ,]w@4x4 {bccOA,xζme#[OQ~;ޥP$LBS7R;җ:@899,0EQ~Ĕsߘ/%"3!kt7\s5˲1 Oa}6) vKOPWPNQ[iSVg/S{]gJfD 6B@\!2)Z2/`~GL" 0L-б!,$OI?˲HXQCA ~dvIt(t(r\ G@EԲ,A)Ngz17 u2n lamUU%<[ؐhP_;pdm[*ck¢,ۖ 4M0 Bk,CӼ Xo͗D0Pd{֍iFHx-m%'t.˲@ӴiOEI*;UUͷ ?T\AճگWsq Xb/.pbFw~ŗ$QFǏ;S X0M_asNLLܻ8-@c4=9YYy=|]Ba8_\Fh4-B}6mSmcU9.t;,cVlKGGNJU;eYOLonjy/&@M E565evVW} A{Me755a-s:p87^m3jm76)ljjzDzp8'.ah4*b$ini,fh?7iJ<Ϸ9Ȳ`(mBFV,K$aEq,[[Wq-7ݘ7)8H4jeY mE8 ES8rss3LtsKBMӄ{MIi< y?җ @{*Xcj[ac 3]-޾cƎӜ z<۶oڵׇ#6"}'ade_z=C JKK%I˫EAOB-mG+Mg|q!]xϋ0 xR5U(>i~wRSRS7ozP3O;m%%eyy}e}zzN{3&%%^tyUջᄃjZnNy h>yꉃVK{@pV˩Uu (&0 B`03Ou;cGyM>}O=hiETUs;󯾾]YYP0 ]xy7]woܸ~Ƨ{t S::Y4M  4M4LӴmK4c3B,Ǯ]Zrխ7XX\GQYYP4[Z O?X88~ܕ]:"]+v{̤;eͺu?h..)ӻW]w={PwY!`aB`YVz;LimG6n`$9ba?G099wy;9wxe|>F82eۑh4''r%Ƿ9δT0l&xchZeөnjn Wyeގ|||΢cnjF˲ .cwmu$IJL @ 7fK41wBB1&0-11vsr8MLH!$EQFƍxgW;^~/vUw~˲Rӆ 7%IDu]Y?zPH_<_7M311)1.qc\{JҸx)jm=mw5B۲C0  Yiz88c}s;??aqM͡p(3##3#{mڛջwiz(6 2斑Ç[y}Xd0rr \hA$FYQmƍ{J3aPh@--E9nPz(FCA0tÈD"e醾fݺ59s纜ֶV0ѨL0{μ={,ؿ_ss3@@$"w! kՕ+hI鑘(*(;vjjFVf(euOO/)-MNJ G"euKK(y@.$[C5]_v(#G pȲ?HKMEYP;7mRS[cF"BXRZRS[y^HJL*vljnDYx+e~ C -GnKk)-+KJJ477ջ\ 7AǎEkáaCSKKӻu[ZRUuupw^Ydÿ$r'"H,{˲ ^O(JEŪaGMpPO(,4ދc5˲LQ024m6CӚCyDqqq}Q|\x}Gi5qء>υ}rpK^ZFQ0;XVu,% RPUTM7DQEQӴNաTU%c*3h?lԚ c6 sh,~,:1*cGxRa])m;4]V^ٗ_ege{֙P8x JM0tà:4M6 ; |qQ4G.yS-]9Й#'Ss`t~H,3~9=,P$asVxQ>|Z:ХƊG,ѥ(>@Y6Rd$?%7N]geG@ZPE9ORp{#R})-4$Fk`ɮݭ4x;>^^5}mmkdbWl$yC_h i)6FTO6'6@ (pdE,Ms'|c PO C~!BkڞpYa-U~]5;)#6"CS{ll6ԭ~ô%Ȏ)>>@ bAg鏗T7?gnF?&{(Pg~K>/+t(4?#T3娍^dD^|zL ʰJz$B zmn}FKꃷ}9;1a@ \ C_qɱ^ihXpZ>kBsFg ύMvvD ?mXKvUDzfxF'I-aљ[D'ITwz-z\W^_?{nom4wR~kʪHAw^,M6wĜ4K9L3!դ("[n7rd馦C܉pK[aA\hF E:#sa-3eKEAôuvIlH1xʴnX 1CY1 *BBPfZ B BaS$ D$UvNP3 B 4ȞQ"h "Z*EA  b@7 hi4w[=; BlA,Y6 >B 8M1+Pg]rb~픃E A4~ى"8J?Tjik-t  ,K_H?^~$595)! !Dt@@Cpp`^H@@Dpqa^r?2J ]" O ]" O ]" O ]" O ]" O ]" O ]" O ]" O ]" O ]" O ]" O ]" O ]" O ]" O ]" O ]" O ]" O ]" O ]" O ]" O ]" O ]" O ]" O ]" O ]" O ]" O ]" O ]" O ]" O ]" O ]" O ]" O ]" O ]" O ]w۶@)7!ᡖ!d#P)Ċ <;ղߓ)@ $IipW Y0C!0,IMAѨi.Ģ(,;y_4t?@:TB-^VeȠA_r˲mCB޾3P4ss|\MӸ+ahO|qmmM{sΝ<_xyÇti۶a8n_};!;33SOIIN,kF4MSв,\$\xUMM>CF"aϔ<?p,˒Dq>XVFDq'0 @yl-q8wP%EQ,pbYaaDQdy0mm7 68%*(QrG4q =cqqyemmYficV)!˲~wmmEQ8úymwtYt8(EqLAH/8@( R,j(JZZ'~wԩ_xO? _~UWΚ=+.ONNz7-7@QC;999f9s>so3O=!Ǟzs޽z[X%.Bh.3~˲͍u 6^|f|Ř#_jSO>iw CgyzH;.M`(ڦ,KO=mkkL0gg|vwUVM0~{446# 잞˶zd!G iBI I[? &Mp,_W_KII5|xfkׯ3o,I)2hP}CC86 37't#;zȲ]4CO4?XI3._rؐ!~?7661kj$I˛8n\jJJ8)cYvPuM4I_|2e p,r˶yWQլ̖֖q$JEqIII^o:88nG#a_GQ0ᘷ`=Y5yҤ쬬Q#FLnx[kaC9s/IvKKKKM5 P0n:M~ʱynKLHhmkk/{܋.nmk{_6-iFP8DrGq-&',}7DJNV튪XkW%òYjmkOJJi܋/9StCuνmDZ,Kp7ietA_/_޿]x&ee$765yE%UII}zbfWeeŮ=._޿ǒ[oXs\]}E(*%9YӴEE sWTGxrWeNMMUYӼy,˦TUWo߱sMoܴ,3;ث`p…55Iaێ6nJLw\`pμUջ5MKNJ*,*Zt)a||^yM׍SN:Q7wmܼȲ}ǎWT6pMщ XzEYx ].([m۲m{QIIZZ,ImV,F?d_:΄~FK}^kmkOp$3#|Ν,˺].˲;NAZZ^1o5))x…EG"y 麾&+3#\P(p5$i6gݵ5ӏ@0y`ux~Mm]~uZv]znmع95%e֥WDʪҲҲQîahGEI;ǖinnivˑCtSSaH嚵&ٸy+|>3>q斖5ַRڴ7eYAs̤Ģ+Vl޺W~{”^`0TV^Q[_?d H,r !n;&sƍ,"=s=rss%%y9ws=w <$ȒiOf|r:kZ[ Οr a$3#8vEi)ťu'#srs@4M|]|uW]D,[n#;n?DQy=nUQ 0 #))#G ;天 \p9]r%K{3))qyҮ2bt$IMM麞ػg0mmu=rro3O;y23{_vEG޷wVUWjj͚Ҳ2PCCMyӫwU:]}eY][;|qlYyN8~JT_}ƎyiQO?}+r[m۸i3B_nݑ-˲D 33a_SSjZrRuW_u\f_fg_qϞmn;.??_,˲a?'n[6w琥!`&Ѝp8*m8|{޸uM ݺ.)++//4*J$F]~?Q+7'mhl0$.D/.YZAŗȶO=餾}z/Y B(±LOX5bmەUU|)MQcGbYvA/zB|\=mh;j$Is̛ӧ^zgdtw\eQl`08m;7;+뼳M}>c~]uW^;Az @A8#A47oi?v M0mN˶>Wyҏg|r՚>z;iҪk8b,L33#9^CyBYX=n1; { \ueq>yo9iwq3<]e ba9w޽zmݶs:_w$׃p:$Lt](R4t:RS9n޲u!ٚe)eY1/cYi'G"{΀~}zqAnE,U޽z.^iop5N{H k9%)E7zk۶,?H߾}&Mv y^QKӴ,DU`@C()ɦeIt}O0c&#H$(JJJ t6E`W_!AB N'˲,èl8QEe怵v8d_|qӖgxz7 60_qe)r:745..n0E, $I}q>8 !t?B0tCc :NA<p:{@TT''&w^PPMdY?$Q,6.!!80DQD" `>iapؼ0.I=8̈́|P!,$4*b1a`XOv{<mM-# * A-bh4׎C6~vN0 |0X t ڶmYHoN,u ܸiө'dvBB<a,@@5]}#5].sZE\`֩}Ƨ΋@׍$l-h[[EQ%Ir8`tMSp #5(EB!d*)PI,-CUM|PhJTI@rtͲmARcrs4bM V؝0!9v]s}{D"Bb6Rfg}<(fB4{Ӧ/&7@|]ueF[`޿vxHo@H7M߾i޲V]׳23ssr:;L!0Æ(?c4Aճ!#/J 4@]~(^]H7/Dx`]!˰h߯nux]msI$ߗo㤪s]RJآK4OM|g56@ЧX" `7e m l;[~}߽sS[Wgٽ^w(Y}BW,r,*ktF#cѡhl>7W H|8l1YY,(i1-B뺮ѡ<ϷLnE[yF'y{wOHq/֬{Yeܿ,0 ݼukbBaOǣÆ Xy~t(:= :0-Mh ~8+\²lg0t9 !aTUUnZW`H tB8^Ӵ~dEioT%{i o2i"yYl6.4@ xTU-:v|%˖:[oqP(0m@j @ --c>0M410"IEQ,D"C4mC ,:~|W|!3ͭ@K0N DQp\^69)tS׊Vwtl(VTV*B.>..99IQŒqG~aC7虩<"Gdd %c07x^[[{$IHWUtv;:;K\\ymmB޺}=#+ۈ 5Qs\ Xac89/%emn}ӟo=7ܰi gpÇ|srjꓒOJO9rdYyEE\斖g{Q,ť_{}Q˝;|?9yO_RS?=cF$a9NUںR̜9~8=zÇX]Sگ3L8~oܷhMO:td28#$J,[˲[$"EcAygX0 QhYuz_4))O~`08g?Y})}>Oֶ6CiiEQvxƏDxWUt)q!2"QlV̟Stv 0 aYaq$iMs $ɓ7UBcֶwW/ bu]7ϟnF~Vcs~?Ųi4)&mش}}w2 fcǎza,}rg(-7/HJHUUohmms]݂aVƦ-7/زmr*6Ks{+W:=wֻ=';d;.zes̾ẩG4,:/hW+H:eE1 \.,=y2%%^'O8d`I4zY4].hQ\Z 1fmǏ{]w555їNa$KIikk;vjH$ !77|>o8 va  BIJNN設߯MȲ$qWS[ǎ,7 2G8fp[]S B'$IJߟ^p8ECeuz<---a,q\GGg{G{B||tVB hWhKSi2 CuA,=uyܼ K pMDQ4zjg0+*+_I}IVzIhJtaD0ƚe`9NUUX$"sF_5LSUUeQef B8UUsrEIdg#Gx˲̰L$"G7"34y)Z&Kޕr1ۄ.6 UhMEUE?>4+cD v{AQђe,y9eB0- 몪vh.M^hiklG7ڷ B?\xm^Zۓ Cٳ;::PW$YQPWgh>;!$D,B0=x 4g-K˿Lj,# pW0:t";EQdYNcDkFh/,ξfnn&|Ŧҵh諺wY 1MӉ]Bhs|gD1M ]NCAz}@k4C!UNu};(=:a&W ȡxD7S5-SŔgeyGhV%vʸ'b1"t ޸7kFD[b{.Fyj[ !T[|_icMs;S|c?Bz_8$kIzQ'B?ѱ9kimxawa&),:V__'Nڥ/B9|tb+1(%.cl&A#q\s sneGJAt,˶ֹ].QB}k==oےD.3}0Lѱ"'U veYIu*/:V7|pXIɥ'KNj`EEERB"2M>U)pƺ, N,8a.jl jDQ>!6BCҺ]a;nxϽcXmljt\/@?Xmhh8#4MQ+~?<,yy9-xn(K/uj^r֭ź^f#v{A4M{M<yNSӴ, #6l\~j4tdw=fu6Z,}>頋>:;4m6ۛos$h|nv{.4] DQ$\.zET"m6xXq^8KK_nko|<3x< An$q͆V0M4hPm}M2XӴ'!l6u9= y+SRAxvžyk%&[,:^$ B}C÷|r:#_^|Yy5|0Bi=we [[[EQ|㭷m6]qEH=]k?ÇϜ>- ;:;oyZ- Ʀi1YZ͊1EDcJ WRSiȣ7o4p9Mܴe둂 cNxq^ONL}™ӧ/ػ~fNF#qyw;lҹsfoi7ҵn5k7u98˲`( wEv"jY>|=wo&&$7vM7o\3ym%kv.<4w>l5in3hKFaS&Oڴe1c22- ˱׮~CҰ Z]ONx󋗌9>K$UԼ$I UU}m>~>XyWZ/ik)F0L$9剂`!6qЖ\/\qq㦦^^60-m˶/lۖW3 %􇽦iIK_yJ1YY۾ܾq|#Æ #ֵN˥(.r}^^ynV|YYodՂ1~wmmG!%%bq.3?t/ssv30-_yE>ZnIe1cHt/5)))Vvz >0EE_Y'i\._{=s0Ii$w_XxqɊVEd㸥_84( l߁ĄI7hƐ-ekyEDHɓ_zyݲm{+W'$_6o[C)1UyYmmm㶅a9zG_^^x+橀Bnذ 5#CB4 ㌁i~߷h髯Z(wxiɉ$dybDq8(ٷrDss srÆ>l݇5}g:riC N:sƌI',D@f]3y o~ɲ򶶶'x|q~~AaCCcuMMg0<"sxBB7/40MVFUU[Zq<9Io`ڀ3g7nȐƏ;}8#'7΢ECAӾ1 o ]I:w삢`(v8O?`<?ʪaCgwϹ v{::;TM8^4MSuMXVǍ56k81OiyKk++&bGY7wnj ޞC~{ѷn+~EUVc>rϝw2z3=>pwLlJʞ{qf5*Q^QY[WkϞ1G|䤤>nX;:Nj|sƴVaPDqi'O6,˚ vvtE"2,˺ݮ1G?c n) }gѷ|>y&F8(.z<xQ#G$''a{׬)..nii7F۽xrB023h~~Aa H!DV7ͽvʔ?Ꚛ[G''Mں`M:es$;^􏟚0n\KKKgggg0 nt]u} %%M clV֓=a|f-[̞e ee%`㸪&DPvNnEE˰nڎnƣ%%#2-`gg"+]_=ímm&1o I-'On߹ܽ5v S:\PPa㦁HXQYOa.tۿat:].o+((HqU6p8B Nz70 LTWW{ĽsFo cF%&& 0,}ȑٹ^7))q톍%%#g0-_Mhmk1|#%'%M?nMG lV똬G󫫫:u_vvggp̤򊊝w߽ wMǏԴk&Mf65Se{NwB~4m _]7zÆ~v݉i[P t)'o߹Ssfo޺U$_z;<}6<С{͙5s ;e@ W_YU5(-RS '0+NymgLZ-6llmoE&LD"k֯lYꚚG;o?(IςIIͅE M'OVWW56MD!B8khhYmÆynQ6l|D}#$`Y61!)?hM]mG{Ksq 'L-`gG瘬N3%99h>cٷ̙3 2M3=j \9h޹sgVVM'X\ZlڒT{85-B$Alp8,ݢDE_=ב>nԣ*]n`f7z:F/0LE{{_o#D4M_di~˲6]G~pL̳]FS}ϩC+@>2IcZuz1/|Й>D;%d٫:12&0$$?h[A4:nqۆ=!B^qlۧۗy}W/a/CӴ8fpt(EQO+&bN=U&&欥Z$IbnXRgFSKV(\!T pE%c*یip &apcMӒ'"Pb! d/Bi{7)~>B?9ρ}~s @@>B?9ρ}~s @@>B?9ρ}~s @@>B?9ρ}~s @@>B?9ρ}~s @@>B?9ρ}~s @@>B?9ρ}~s @@>B?9ρ}~s @@>B?9ρ}z0T c|EDQuUu8ծr*~F8h>B?9ρ}~s @@> W(B%ObϑBAWcХ0 ]ܘLA0ƺW7V.~gY61!!TPO !$>.aƸjOI1M" յՈ8q6 B?tgi22.!Ɏ:HJR(ieBqiB`l%!0MB0M4/^7M 0$w@o.yK9C z#G/1_qa%rYtacL32/@o2|,ĦiBXE] _0N뮰Tl~30miA9ODz>N΂aeu]y6~E4ZB^-(*X򲒓 ,+B4`0eB0ljZKk(= B?>$͹4MJ[[[]C,b‘f@K rxAQQS 1tFi3nKKAepaֶ63C,UTB!‘pk[kcScYyF*mp6gcm8<_QUy8Hm}]vnUE'aUUYihj EǏUTV(  8Zyeٯ1^W_ ]NW0/*BY.9YZ][1>$(Na0f 0 0~5x<ť% 2Gd HIJlIdEIJLNNHh < =5cGTM9|DeUe(ye`ꀦ溆z!+J[{--&q{&'B9U?*6BDAlhC"Z$! D ]ycD/ P5-Ae6iˊ2Ƙ8>*sDz MNg X4^TUU:yyrM;z<4 RSr36!.^4iiDmۼл`14-!>!s0onb闒bFMm}UM8(-u@Iiiޡ >#y8珏K頌c,#8VS56 u@AQARBf+oh5MCy 6kKα,˲axa9t:ɇ 0ܹ3++KUՋ FՕӣ,{EQh $(i(t`(h,,˲ i `CAHEz"|董h^jq`8Ȳ(4( KyB c45]xc`玝;!zb:#r^B>n4dD͎3f2,e<jaw~6@K~$&e?~Uӽ0u=%9!(jlVu<=r tשI1~+:K1q!@w4DⳏfF]={ynA}/J1 F'ca"0M4Z]-XV0f(4kzdP8B?"WtgD+F]  ]^B?tG$)%ߥ?:js$X,ښZЋS2$=6_9B @x7]/7/99kO֑zlsюv^7䬡n,(_yI7|1+DQ4 #"fWq4ExC6d!8$)WGu:dǥR/޵{OKkMB#E8N`0HsQ+jzz7! BYyyAaQ\С(ZVYgfAZ à !,SRZl(ÆCKѱ@vZjj||iiB!&!,èij]y/Fpuaxz( ;6yDia6Fr%Y,747v, ønIUepXVA;t#Bj[gg/#}kצrLtIi֬ѣ0F b1Mpq$IQ*(#_Á1Y~I,dBs755} p:+bH6fifXvf=x{2"IV8:l(չ ezƆaч7`0(G@ǭ}Y4wՇm۱38{!UY  ~x<#GgϜ1hPD%I:xn(YʫVo+sU7ϟWS[KNJܴy ;:lf~civuׅB!bۋu)455vmUoq͛>z]wJ/+/ߵgoӮ/,jq֬Crr&Mz,(,,.)qkMO[ZZ>ߔIN':ݛM,{}|O nזm_nڲ(/^|$?󵷷  -Txq;רּ#-slӖm$x;;̻ !tBaIA_XTuj > w uDq`UU{qa/wܹ{?>8)1qVS[Ox^{:t eY}᭯,]P[{;mxo󧟾;4MEߺyƦQ#G&''};:䑇|lۦƜY3uݹym~7\`*뮻we:q8'75sƊU^z{MEQF9"4jꚚc(] εH$ Cp$G:::4UC)#Gkjk'M0(m@Ccnp@vvbBo 5Mkkk۷It]K$+ʍfer|qcDd!,˲a ]WT% wvtC!0#Hggm@j_|QVV}18מ=#2hF$"+ !pbu66/B6nڼn5c-[?O=1^7nޜ4wAKK̜>-9)i=%9릖WTiROL<8eZG;vX<}qܚuS ˫͞9CQ 65?؉nklV֊dfnXQYyk#099y{8^\?> x Va]i(j* (5MUU@EVE<DXX,ѡUUSCя ‘ueYq(O4yWeYe4MNb񜪨a9qIJiðN橧_<%9Ç{o  ]qMQ[ܱp!B$I#0pfG"NG"2`UU"m! lBpaHDFP(Dc$$M_Y+12~bB!i!5]i(=]N'X,ܼv546eqp5= ^a̜߹oѐp8-! y&ҩx[OFH.C_CgxlnaYVJAƌ5{/'4.k!˽8p8ԣ|:{/3MӢMX5Wh]b4.za.h0 y><%tEXtdate:create2013-09-27T11:07:37-04:00iM%tEXtdate:modify2013-09-27T11:07:37-04:00utEXtSoftwareShutterc IENDB`selinux-python-3.0/sepolicy/sepolicy/help/system.txt000066400000000000000000000001211356774067000230660ustar00rootroot00000000000000This screen allows you to view modify the way SELinux is running on your system. selinux-python-3.0/sepolicy/sepolicy/help/system_boot_mode.png000066400000000000000000001467021356774067000251020ustar00rootroot00000000000000PNG  IHDRah>gAMA a cHRMz&u0`:pQ<bKGDIDATxuxUGg!CRhK{nݨPwFqw$!.73?¶6y9g}߁MMMI B! ~?66mii˃>BV|iǺV BagϞk׮e14BǺV B1 8AXB(BP(a0{>BJ=Ny)] ~6Gtu7v?*h{(c/O;|(2  X%!dXk#%:v1'!%WњXucG[1 wº9;ߺeBǺڔ29bX61!Lt=k92q B0 9@B@BN A(<˲[]p1ƄX?-!Z Pt(Z`1!`o+eDۉ.a)Ų,BHUU c0{, (.׳f/^jcъϾ$IpWϜ'uB8kg 0W5a j(]MO9_rAF!˲"{~o^z}]eI #A0MSUUi[|t-ǰ `t8Bir]yAD1 4MA!2 #<jՖQ(GƘe `p@B1wFjn]}Ç{bblٖ^Ivpڣ5]V4!egs0[Z!EIKI&T֥$wtUM3 5Ly W'5u@ '#eYQ":l`̴ !e1i)jq9w_Ϟ;o.76yIMPDN]Mq^OJR"1(zn˹B6_]7b{}!(_Ƙe7>K/7^vQvFi]/Vկ0v`t]O=t>|MC7m#2hGYŢUkVo!;lEgvY^9au[-_aΒ`蒳O?u wy3g9lFw}4Ȩ_~!z2{݉cF%'inb D+W4GrX&U8.{1D445Mu>bŕ6Nӫ?0 # ( :v+O+C::V+;+/'^H07v>z&Ft9`I!PfZ!^nJKdyyUK̛HJ| B,ˆ#&iBzjJ*~jAHNL*!$'.&ցB99914 ?rm bZZ oMa& #dY> IzNO4MfKt+Xp8])5XUT%TB cM (T<篍Zs@{엙~## hرg: x<- BQ~6~%Z)ҺZ]n+=Le0C#DXSY}Ça5hfB|† ;gzDq, >5KݝPx<@U5]#V#LBh@L(]! j+D*AzXHU4!023u]GaYoh4 #33]te%j`cUI ԏB8DaLUC I6%9ڼG1NsgNYZHO5=s\8q9 nG|vS;~ iZDbrD"*/0va\ll$lm>v3Cakkg}? Z:LB,!QeYxaY4-Y"55wa3 2M( Ǚ&RBUU Dg abn_ac||\Ϟ9P*e0%I2Mnٗ_ګ v.0 0 2UES%??'jcʓNٹlqGm)ڶmGqFZZvv朹 \.g1GXf]IiY~^ѣ6o)*-+rZjˑSOr:VBhEZV?.leXaW^[]]9jP8>6٫WAUu!Fy=ҳ2zyK!E aX F$iwK+ƎyҤcFXacCc'OקwJJ2/[FdS,ݫpA=R!%eecnj|ÆVTV>t֭ O;um> By{$ˊrbuiBCQDs̈SNv5YqCϬAaշBDQ\|œ>hi^pϿHOoh5bxFzoew?444;NxW&%&`(TU:]*j~gzmA6˰ $QkxV^ٙO05b%Z[Ԝ4|o3`kn߶#7'n N/PXt߯kF8Q5c91fa"c9UUw,YvEy=s._s\5~옄of}_u[k/ 8a|JrKNݫpӖVWѿo%Kk*2pu/TgNBnA@iO" \ X[RRZꈉ,bch3gsvzZMYƦ-E[KKz^ue$'zr}+;EQ.̌m['MX[WlŊp8ҫ _L ӻw(HKKJJX 0pBvGHsk뵼bX:yх!mؘ֣ cǴ/[qSrsSR=rpui&%%3'Bz{X^7 ˨ !l@Biֶ'$Æ5bxVfں򊔤DxN2b`~ qkox<yyG ,6tí}{ged0 3h@DEQRTUHOsݘaD?5vTɕmcf_ЫNCsI~몫 q]inn}Qc[N6I%JlXmnnyv;q M$Iv= ir,P(dTMl@ `R>lքkFYޟmm;egfG'ytbl?A⫯sYcaСP8˥(J(r9]bB @Y.W aP0Ĵwb1&6Ea$L0 $IUU ˲Ne0,Gb@ (rQ8v9<ϫ nK׍p8z4MCNnYmi dgfS+ʋ|ŲAA)11&~.p:0d/0j $,BX\e#ɱ*!wB !ȄD,G,%k@ !y@^erVV 1i4//BHH$l]{?h}EEkU5P{L C]CƊ U]!ݾgCE8?0̜nV1K~~ܓBX!E, {o4~\t{-%m1nf ˖-E9A`]Wg:D޽A8cBbcc΄c}a&Oq:a G!{z9,al;WBXX+//JJ=XV=C,eAؓ [ߢ@bEQY]L bX=T5 !]`^_Pʯ,C;?;A4cbbt]C !4 #!.k?܉ ֘ptklu ȑԴ?L <pië<[Ǻ"ʱMIN۷z _4M"y80T)6f8y2)֋9 sNs̡9~/Ʊ>uP(n~ BvPP(n~ BvPP(n~ BvPP(n~ BvPP(n~ BvD17f"i&>}N;k%Pt/KBaq5UPuVu~wc?˖/X[,쟧rrRbp/R(ʟHկ"I l.zƴ6nIdmɱ,k־ʫm7 C(c!$BB&Ʋ,cL~e7_{um?dJryt:m!].W}Cog6gnjBEQ>" 8(㊃H?0,mƦo',N:|cF/+.o+/4;+ק\Λooxcza~rssn:B0ݻ.Zxٲd嚛_{I'N6lGA^N >t')à H՟k7 0jĈz?|7Ϝv5W^~'Oo?i$0`s9;9)Ϊoh;,[[nhO?Ϲ쒋xtEQN?w>/g ~0}+8ٳ  ͬv|N7wBEUOLLC ܬ\XWB@e؎ݙ1;~;ݿ_뮾1<Ϥ  \e֞99={JxYgV4HOx!'ǟ{YPK.7aA2g~ƚuOa>,4()113#cЀϿorkE[/6TEU/sqV/*PKDͭnxB~ʱaf|k!$P^Ynٓ!@BGxW^VUn z8$Ip$b  0  NiA! !<ϋ , ᰢ,:&$ #I@UUEQźoOOKGBX7dQQ!!wtDr޾9NQP8 V8n8 VЯ#!0L$!0 !!@UUY]DEQA!df&WYQ?BPd:/+?+ B(>PsQE]1X+k׼mBP(oJ8K+iP(?#G[BR8qAB&܋1Gw:t&0 sN#JA)?#ޘ/@uM 1^TcBBa,À* k@BUU~VZՎZB"D$ ,` ^ (F]]Kt=G7Qt {E c̲~DZ=TǁRBDQ4MS]}sMSbd$I4!-x9D0M*0+ {XLۈ$):c]~\I 9߲<ҫ?ēK-cp8lq\}CãOlyEEQEDQ?xkׯ$vfEѪ❒$YնVYe=pycB9Bs49W]7wg5nX#"pƍmmmimmW4q(v쨬JJLmQQQvy+Weefl6+obl]׿[ؔ/ ׾~ZٜӦA0j t:}Ja8JE}|ϸ~۶ǟRz䒒jMMIJﮪڹ}MJ\V^IJDQ]^EE6oٶcɓO"\480 m>_}^Cp$"߸KINVTrW]}CRbD{ܜ캺;N=1!Ꚛ-[Jh5746nڼE,G"ؘ=Dz=]E۶l]6qEQ ~WUK6{*LJHG"uuu@p۰=&&捷gD\$Isokk'].IX-lhl^v{Y_LOݒ$mݶ{wfYjjnv:`gY֪*vyiim~˯`b֯_zMllL~\;PZZuvEQW^siSgϙ;ѢƦcG~̛ ltz@H^xkooj7MMM¼ܜYϲ̢KH$+3oՍЇ ;~=~]3g}⫙yyII1lYl`A~~ko0Y?r͙7BЯO$ /蜻`?sܹx!ϿʦE+WD"Mͫ׮ ý{~ׄ̕B!ە][3ϝqϙ7?66GB_mVfFjjǧSWX>B]{Ɂ{/6eE'i6eP$ale9`7nz'¨&~ۭT8.=+kIFN:ߤ=)?w/XnscظK,`>+7ߌ~p0_ߡ^ټrիFܼ檜hQV ik}vN<%%ݎlCqg~J^+.{lj꧟mUuߣ[)˗lU]vx̙V4h--퇕* g /| b6[tѢXK G~q6!$1!qgo۾eYY7d/83 yycGQsނ`,Zfn㈮#4%=)q +KKwn6a(XQӓF xˆrr';` YpqM._p7]}܌;l# ̸+ $7]ݕ]*`Ԉ3r'~-ۆrpi}׈S(G‘ 2 /袤_~iۯO(n t d+c*+9]|Ayu#}ͪku3] :n萴EUɚ1C4 r(i]5"Lt{RSSu5qGK_Ӧ{.`XН=އ}ӟ&E,`j*'o5+\n5.N0DIbiii! Emظ{}Ǡiv 0 ir( DdIP t:5] B@i~BxõהWT< 6 /!Y54 eAʑpҏ1_æyWdgO9ibc ?r@09C8LKI+'L;̾1ƗX{٘G.i7_O`@e*(,|Le!Fxͷz{݆ _cٜs적|򩐖6[x̛ony ¦MWz /: 駼|E:SOޙ1z9{p?&b˕ {'_[]\+=!_ɬiB@S+VyޤDc0R@0s>hMmM7\կBCINLtg c ::;bcbTU8. '%&z6YQ2ӛ[‘ĄpOC8H0M HnaYY+!q}Cc8ꙛ0FvִiM*!mmm BqUUWKiIvh߸@K8eZý*k1`FIO7SS cZG`&_1>[VW 9VQ5.''kzo`{813) ˚F{ !D/MeD goǺO0 [; ~ӴkVDZJl t퟉V!"@V|>[ލlk30a8|D/^b>wjS+W1q8U\^ʕ8#0̠V+kt͢nq1 !d]Vn  /ft q8aVTU ͙U\]wɷC#2 ~7J?"*ϓ N0A 7݄E-S+X_eY!,]80dY4!N`=0aٌaB[ӚƊG:hj @883S4)eB믣6G4LMjP,ڸEBcX aASGiCY_#rV_f󵉢$btt]1|7_Z,EBillhlj!r:ߴKm179ᯉi]Շ 9d;{&0'i[''H՜FR+h#@TU^|U%@X**+L/I6cێ''D=:~|GA(J8*=B!&tXSƚӟ.&&1$k 2xԈᩩ),:N˹vϙ`C ynId_C[vR縺`0r9A@I lfVI!6v_fF,u]1 v5&ae..)Q\<|ЦWxeIY$ak*yQAp8&<0$Z{7BfXxBhX2Wލ1i  ˮ[ qq{R(귀7ú:-OTF1^.ZIRk/*Vг̛b*M.gVTGj>6ԓ<‹y]}a"?~KkԓO>iӂK8MOK+u]7 VUy˩܂BaR%HaYo>'O,fXsVZWUT|3;23+UMu8NK/̈r{G{~vȠ6O>YZ ,\Xӵ~淳`޽? I.:܌tESHD]ף]C`{W-1m 99/Z\l, rWW|9m=sr_xUUt PGrӍ.KEA֮XAs݊U;~l+͟LS;t_#d@ L wU*NHϙYZxޢ^=qF$UlrNm`fwmݻ~ڛojhl4Mk֢Çӧ.o]y+V.+/䤉w~LMvUU]q%(545۷n^X?I_~=S-[[ag>mԈUѣ&O:b+W555\zo^ ؛B4UIk>/ Â}hM`[[[Fz ۋ+*7ҋ.Ȱ٤s>kISYyE\\mįQoxW4xͷ !|s;5w<02 !Co@ ر I'Bv!F4@VlinL9i˲&6MӼ^ΒRSXP۴yեβU1d@ouN?(z[0!r=z̞;c\YUmFnNNA~~yEEjJjZZZVFFJr2!`u!eO0n}}z]vEw疔^y٥(*(xB >Q `a`**SSRAMӬgk"Bvy_|9 $Gjk[W\xfSO;wނ$9rz͝s\P( 555 >.6&fİyPتmD;16}Yȑ@ hf(*.)a&=Ǣ%˪kvh2? uݘ<ķy77'O^ii$ {WT&%&$'[1־h떲Җ&$p,+ ( g>mȑgg31+o(,<{鱗\w' %$\|IqqgMsgIm]mB\\A^;ؑ#S4֟iI"'N.~!?wSmPώ{/;NZ_?}9 kZH͖t-A0 33 'M. 崒rc!Ddӡ(5e,Bl(:ʊb˲ 93 8+f ~?GW ?V.0,vtvh t{<غV,D Ƃ $ `!Ba3';+ ,Kd(IYQLDtYGD16]NW$t8n2fPy G"BiӒ` 8n@6͈ 6 7ma`Ӵ;"@((Bi=̘覩*aEyƲ㰦%U5ˢ* MyQ+AByݧ(s_Wa&,IZF[f** zհ؛%?21F]<&`o+:IC{SKF1! B_|=s-111]ue\\\ש~aZ,+2~j1Ƙa#AY2b 5 &$:0MD؛`Y`bѾ9 !0,R&6MhCXY~?noG~?4qlC7s&;>p_ʄ81bq L!„`!!eY^yUWAuuhnȃH1p *.T)G*2 Vid"I'I2F`**̞=n>MFD E 5@s !=3ϐD4MCӺr3KDĀ)!!DӠ] ݻۙ;< >B!868 =ۛ&k}h}`?g6M+0Mdb`JKQcc!$6V3?Tf jSQ ֭/~b8?0 _S(-΍ZӀͦqLYfg99Ɛ!w>;B0 4(fbMB2ƀe$YqPRPm ;lY,K8B]7ɓ Lx<8.AO1VA-Y-Yu?`߅0CEqB4 I=WC8Fҏqh'-d͟-X!^u˼WpNKÉG\.!B{!!,ŗ^/~cv݆",K ))AƐ!81mQSjnͨ55!oO}0К415{Ɖ$6A&AU eYX­^uz hE\=DgDP~;$]?4< G;ﰫV^+T;UU+VQ0?s&?o?At!}HsР#件ۣ BH"c0(q$-YYJ;Rk҅F'l VچuZ&sZñ?ǁ?~̧P?fF+ό5~pܪ Dty Bc(kSNL$b&$ Li*7̭\lQd­Zŭ\y4g ! 2 qa-u+MIHN'ejKP̋{`eՏ52aXΑz2K3Y"I|E8>/B82r@VKp1ϲ--qh*ͮ6ٌ 9&Fvc(SDMᰬiPU"A2E6 3[L{;Dh/sTIh膦,Ø{#!fdgz^4a$bFL%FB BH`S@7x0LΊ @fFFtJ):, BYQ vreWd‡>wB[ܞS2< .]1]+U1E쀃DgSPO@~ogNTԼ{80!v?( r2 EUG^ZZk?#=Mm$ˊ,˖E]1B%D#D0!e#3B᪍Rb22Z4β6dB".`Țs,KB"vl,B AQYVNP8뭫{ŗXQt]ٛz0vLJrr||< $ òaӹDQ8`0 Il;p8ơp&+f cSQU0NPyQt0 bI:::qF.H$(U,˲ UpX4.i.aI6IP(," h#=)?#G& WT4,|>0TUl6)Sb,wx?NuÑ G"Gx}>% 0,{~$IIInjj<ĸ6l2h`^x(N+vUY&';+Gơ;_U_zڜW"==휳H$²[>zpλ;KJL5wŽ@0(vDv}>=?rlXQT(zn﾿~ɪ_̜i< .X0Ƙ`K/765\9{ٗ_>MMMߚQRZ Ͽ DzӂEv!0L0˲7\_jhl|wC!;0< ([3;[Zz'y|wm>WRVV+,;W\]U^dY>_d q6_n}$~r׮7ޞt8ޘ1cگ/D1 Z^IRO?WTzg|>tނ+VzyWwUUY[BÑIivoQ3m)*˲׾x'&H$rEQwUUo۾cw]݃se:F !''% ;γN?]մn w?}1.)-8r6t{x}?0 #Dd,ȊÑi,k&YqSb|BƎ]x͛%In޷wÇ{zDQUXis1[Z0C TUmÇ,:dæMC>tȼ -Y:p@K/A̧_|Q^Q)cK*wJIN:qۋwdr0{ :^%%cFB~{^EQRSR~g_~UVV>d 38]UcnjVTeWUCzʲx鲊ʌt cKJlm1߸qA ,_}-˰Ɵ0~]{X]^׮9SZzP8<~쬬⒒/6Y8`M{HI=;)G0AB!aeEQQEQ$I|,'0BffȲi(2 ԭ{ CunQ'B;~eif!UUE4M{`IǍDd]׭U[j=N4˲Ѳ -r,kuO(˲4Mͦ(`cl9F1f-qu;w(@<󝝝aXGcm 1! X,keM%!A ٹt@0ke4ak`EQxǦ a 't~r\q,54MS$M462 UUr)[YffYʠK+ Xm5KWԩ\VjƘyQdY훷چ,ˊuV X{M4eӌ'ZʲB뫦a$Aɲ0h<v=u VP埪w1HDRp86ZqZAK[raB'nRBh˩UVD,7$]?B98!8KЭ!B@t@%CƱؠ뒮F6=!Wn]Λ !D[~e} D9]ϥuP'9Y4xꠧ_Ysߣu- E{Q(c}A]ԏeWD̞I~QP(=[1.5!uCƯEs#A WI?qpHenE):yDZ-Ka BNysMP2zL% At:z@tndF{佛YU `fcSc|\BB|n]`e51>LvïP(c#;K=OA~nmR]]5-vlB0\є,hiw&$I7PdY#33Gja0&phͤ8jT٤HD>]QhBoeCC=DWaM%u3WE XbELlᴼAٽ_IH$2qgq< g Dz^BBDoִaX9YYy=-h`[o**+bcb33"UmIi&7r;+W'^[/8+#C4CVg!X0K:::VZ=IY.V4a_v̨Q11^JBBM͙=||-&>.`O4q\\\ssVXGgg(75J4qCSav}7r1M3 YKgz$$)ɰ5c(jim”Ah`;4@П06 `Y6MjoYkeEyo"xoniwZ X8u4&Yniky.mlo1F&޶}(Ǝ9,x<oapx>D+.eA)~fꫪk$QO !m#Gkޘζ1&1NU!x1Ƙ4]pOci5N^'9)1..NUT}\US0̍][U]ֻ簾lRz`s ro G.>_{{{3Uɞ;o2Ӧ:x@gP(݁?@DAh^^שּׁi! K>qB pbgIi0 YY/>TGgѣF^{Օo̘1r{bE\|SN3o쬬@0 /›voܸ~Ƨ{t)S:::Y (t0 TTh!㹵CW|Q#FTUU9 az㏅B '+/\iZ}cCUuNxZZ[׬[7p@s:a>{UUVVmGqjJ}\XXzsƻl0 cy!0M3GڶS&M?2gjkG/ gN:w8bcb0&Vfp$r|>LMIuceexer:U]-ǹnqkع}ql&r쮫 É ѷƌRTp]`(t  h]n7.縄xI !$"&Ǎϗ\ys~ͷW;8둒:dРWxf #9Jpo g叶 HHHLM=g7ɅmM.+X6m].&C`0hjpO:<L 332232xfn]UU B:rp0Y?LzNV -GBۋnܸwahg"j( 뛙چr8욮Ai`4]t=ښu֬[t:;**+gϝr:|mG"MN0~y lT)‘eMTjo1 3!!B("wzVf$Ii%%&a4{"v r,)MUM[v,#G p~jJ !dwmmaA(۶شeKm]S=jͬk%,-+;ALLH,vlni #YDWuvv^B0d e|y=s[:;;ssr---))u .sM±G1 jP04|䤤=$Q,-+rEYv](ݫWVfOI9f<-4M+x!$YZ7a+@$khVQ+WnGaLYQ5 B(|8}Ïbco XE9͙neD"eeEnMwsiϛKH lAEVTM$Ѫ$Iv9( @r\qI+ VccIq$9cJ7D3G~V^eJm iBcG).8`0}+k4 n,dkU1 &tY5[r]d9a B1~=&38pa%]Ce`^q= ;DsZC@O_r8,z: Э̶?uP(?n-T)J(Rd87? BPI?c%?AqU_vcJP(GH?M AeB>kaK1!&&&&I Lϖ-O0Lb{|p^Qf`!]`1!P(Ȥ"~r3v41Ϣ8Ϸ@0M`]6m֐lp h檲63u>9E?B)G6̋ qHE'I EZ~>0Ӣv$5ws/9gSXYSn 20i. )ƍ{H~^LYiQCc6=͎k&f=q/Ɋ-8惛G]=1ߟlfEP(_H?&Dr/+n^_޶SS;e@х iI7dqAX_hڐJ.k#lm*kjenP?MRTө8-!^Y&9FOP(Gđt pKNsz״`SGPEz$Yt ^zy}ym]=Cˆ;C_փ%3䵟KGť2^Q&YI\#@n~Ug>WBiC7g'8޸aXAi+Bz:))):+˲<;N7,*o;t$gGDqgK`ɮpagd~|j5]0:37ɡ0wK$$JNv"'~r _LlkZc2wb~볕-t 8 ͍jBNj/iؠb Dr0LKk9NC90 |d; n'kt ?A$Ƴa"ukvٸ ,óDMC4CB.," ,BaBcDPohNqI.vU! ޓ:8@B !կ YDTco"3 h hmڞ]WY` 4lBj&&&Z@՟rB>8 oe4c& ԕf܏hヮv9^ʟ 0d_#B9/VOV_+615)  "sG>oM?HO`Crpkc]7 /}ơyJP(Q*Bt;S(JJ?Bt;S(JJ?Bt;S(JJ?Bt;S(JJ?Bt;S(JJ?Bt;S(JJ?Bt;S(JJ?Bt;S(JJ?Bt;S(JJ?Bt;S(JJ?Bt;S(JJ?Bt;S(JJ?Bt;S(JJ?Bt;S(JJ?Bt;S(JJ?Bt;S(JJ?Bt;S(JJ?Bt;S(JJ?Bt;S(JJ?Bt;S(JJ?Bt;S(JJ?Bt;S(JJ?Bt;S(JJ?Bt;S(JJ?Bt;S(JJ?Bt;S(JJ?Bt;S(JJ?Bt;S(JJ?Bt;S(JJ?Bt;S(JJ?Bt;S(JJ?Bt;S(JJ?Bt;S(JJ?Bt;S(JJ?Bt;ïBBK;Ai !@!_Ax%viP B+_f0 # fK!qQe6b0(zx!$I$iH$bơBѪBccb"iT)JOy~e_|=S!]ua!!k;CUlie2 kck3 &D67ܶc \tCTMcclmu/WZgqzrRi 7!a!iV+ܜs>th8fYBi@Pz4M$mܴGHβ,0 D{ uvv]+2{_nS/'~& 2/4kq斿ruW_7m7߄32 (J~Ϟ[m;Qo?PO?xrjzCCK^ZV^>wmӻSOwT쪄Un_xoil'0{O<+*+Ǎc;)'MJJJ3[ZZns81Ǟzk{qG]0c] ~BqM-Muu(6^|>1#G YΘv ns9waA8..)Ͽgu?ܿ6mny'WZ=mT0[rr].wcc#qwmjn~}t9/SL9n+BK^Y뽏>zظ{? 5B`[O4cx^0~[SSR>OMzE?AR4M=?fa^!˲Ԇ'o3 i=|f=or/+WkILO_~y6[zZBhȠA PH׍ܜ ^#+v1,3i>8 YJ:p@'yvʕÆ BMM={?gZM˛0n\Jrr(.8n`>Tuĉv/X41˲< tܽ{λdef&3 3?m !TP_'KLL* r ot>R~BeY1o{z$6&4I'fge%%%1b{u?;RW6e3ϻK/8Ҳ))(A@{{k tvvN9iҶ;n m>7pe>\zY P0p$ BpCccnv#nN ';q_{MሜJ{GȦaUrnk'&&0 seu隮ivC-cK$mxl6嬭Я kׯxXg+"!cAATa5M4lY'Q n*㊨үBhf0$Xq|93@H$bTBEe` 0P({ppEYǁ!Bᰵq0gN ,]aaM=k7( BiU7MEG@X"GQ9t4/VsO>! G"}w]0~`fF?G?Dl5SOr駙e0;TT!], @5]kim90Dv-O {D[[xq $ <$8?n7?1GcW b)غ'c]=ni@qQEQ?+GfS(!aXY:~!i|R(GHqs\AfÊ@qTɾ)۳ ݉(ߋ#~!˲cBA=gw5GŻ0i_W ̪5{ey=uˆ䮪jǝy8KINٶ}lܴ<3#@ 0ںDA.[hkfFF x'*wU%'&mٺW^8..6fLq6nJs\@`μ5UUMJL,޹sҥ¸Xa/駟vۋwnܼm۷oܼc2o1 Ȳp6\NInݲuk_by$"'}錏H"뉉i~p(RV^}.i;KJ LMM)7ںdQ\R2oBp8ez7L8a#OxbB¢K`Vf? X`Ƹb.ջpږX1n'~t.^{iRS5M{x߰iU'}1vY !ovI%I=wnA~og%&$,-mll\b"~{ʔɯv ,kh2hv,&v;.wTW7rG0yz;UT{tMKOx'Ds/l> YW_q{z5-gcSX4BqLo>㣪s%WQtm쫮Uwummذ{/!@H3)So?ÐT?7r;e?YpIIi9'7߾w#z 11 _r$ٜH6dHI˻dܘؘx;#c!33jY3oTРFѣE[^\[oi)%,fԔֶ}pfz]Òi붴ԔكY3f\2fLz^#i .޲`]`p-BWΙc2naAYUUⲳƌyŜ t7scqqW#o[E8EQb0RS[;=_.fܺJMo{X~ѣdY-eo{%;#yn`f擏_߾\Nwl5bn8˯깏摙3¡~}}]zIiYsML.?ıBmm;w>q'¿=pNI9y[oZwãݶcGKf=֯/WuӦ>`6UU=1qC7A~jUQ <[vg2Ȳt8pX CP(\r Q4 £:#=?QW_?k?#F }GNӴrUQ,ff2x_ĘQ#}>Y}>K {t}w̙5/O=w0q]1{_`0TQQ UMkko/.) šij0 BBᤤ?>P8Ʒ%t]`j$vCG665ƄR 8yAdfy5}94MQ  㩭kok;|nGjllV5M5 &b1kuI EUDAz ub>R~?@@edZ^U5]5U 8hJMI>t},ǛVH[j@@7t !4]$㸞=zTUy\.@8V%766Z)>q;>!nFMv BM,YtM|,A>Z)2+8`BAN,;vh0p MQ˲aC.~5ݻ>KǎEqyMӉ+mVdf:EQ. ձYa4^{-YVeeuu׽fL[olkjH_~=#dB(!ǎ4-..v_,^BS Td6U7txwGo۾s`fIɱ-N'2]RSRx_zX.BhEaM\PT'$;nw\NEyW1DzxYY/lZ뮹l6;vIbNdf8.66kyq+~S9b1"@4f2(Z-I _s5?0j4YW^:NjbYt"p9"v;MSuuuO@0x USW߰eP8< M^y?w=VˉHzS&mNKP3h5 l6?ee 4afSUp8_e9faB0 ~?'k.|r &O `0'$$ྞ y&ܕp8Zpvʲ,0 8`(, Z[,f.ݛs:gO!eLBKA5<<χ0?oKq^oH'.bzr~XІ-ȅ?q"!Kr}YF0EQW(6H'.n US5GWBhd=E~!D:7}B8WA\2G?Qguo'h'x&glx'~Py':]tU8:^mQΦ6/zy|R9l0: FBq"Χ)S: 8'60 t:;މq몦4-(!5]Bv;L#xp86#x"i '/ᫌ$lieY"z3B&A()-}xДIxC(2 ȑFQPe+8稡 dXhaYyybB*4MjaUU,iMSwUUU,u &@Q?eg$0u&!r{_pXz̽r8 ˲$:qfEQva^t*Rtr݋گo߫jԔdכP^!L*(PAa  <ϗWT>{p}~>3pV% HWE<9vRS[`kǟw||Ee% qq(kbcbdY6L9{sW]E^؀Leea)'#@$g!E566Θ6ힻhkkU5qqֺN?D)&&E..Wk[$]ߴ7=r8= $]3? 4"Xz+V»HJZ~<iS۫֬ݹkw~a.˯>=99u <ңyyy%G+*bb>Ͻ?5kSSS7o7ެ9XPP^^/L@#q;"(2bQuˊcII^ _~酺_|qkܽx<'xjroД00,4uҤaC wyy:G)&1bؐ7p/nbGc,;j䈿<ǰ$ݿީ&ܽxau(^ufQhR\Uw띑1zy7x 7L4_>yzuw<_n۾rsz?4p@Ip;Rr'8~cy$'7Cqgͺd;EM0>##A$f$Ie&t.Y?8/ T+yݎ=yŒңGw}wK? Y_Q0:$嚹sZ,F u醎"mB?@ӴIIwq} 흑 CIDip p(LAq,˲M,if &$$ܿdENٗ=v-|_?隆KȲlXVC7lp8̲(]Va8E1 Ͽ_>ӟ x3a7j.%] h0 @EQeE@I4rg}~_8 dYhtM)8e!a_X '4 $y@fy9;ɅcGH7qGrM]}5!0Ȁ5Y-ͦE!k ]e9K]7R|1AXg\؂m09}ԟ?}} |[mchzM7R4/ 5$;{u[,Ͻpw>!toeYWqv쬬ܯ[αb6Ï?a֌EE ?fԨȍ>YQ kbh%g2}ά+VfY66145}TOɿiC74]|>#WY{߃VUjl۹sӖHQ>/,|E/~˼={}\1gvB\(j]}Ckk8>,:^l9nlj{_1g eHA_C>5MkyÇ-~s+{iaYyS.d3Ͻco/TY iPg;lVkSYd^şYFܭ^eC.BnlңGyg}zJUUq6EӴať`fh1}aÆxuMMMee%ͪzEe =>"bFz$!u]PHuÁԲ}zBW74HLLLLTTV!11w KfC0 SS[~CGԠ,apkj5MKpL=q"e[ڊ%&$8]N(9V][W df74HJL?{ȅsFa0jkkt(ͦz\l$I>? 뮾:)11g|PY]v\NgKK ( 0 }q!弭^RHE 4qm^(j]5M8d{9f^1gxR0(b&ҝNyEU3\t|=٬V!$Hx^7 YVX E%ރ/0"YQUUQTn04$ɸMQQeO^^\~$IMRzo=!.2;/E*8kr!/6˲ *r q*U9|p|B6xZ,EE{4 pUMSF:_1r-m-fpjcH'.(g_׀$EQК6erbBG$I gGȘ%P(˲~`ԩT/.{R㷇% @QP@0s/,ISeYdA!kpfa]{=jƴmaG_lWyU4#$72%$n ޘ ja@n͚1= \1 oGeӠ< y$r2Fc~,$wPH[ z{&/l1sQU.+| v^:iHl9=!dcm]c!Z3c|?:=zO/ 4_0p8|U >(RBkTMe4#2BuY;'.^bƟp:?]pDihh8gCl67!̢955Uss !dh}bwO4E,{nf3~:&TA\L}xMuWTE%xOD N:  >c 9 Sס8`bh\ďa x3u菤% >c-L>q9\rO? r$үD?I։~b²,Ζ+NӁ+S?NGNy}чe@0P^^RSUM1  p|,˲ uuicBeՇgf8%(Y C B(ʧu Gy ôp,gXuCpP v),:T__ñ,i2%677v</'~Q#KGv[]}s8p4w0߁VsǗPebTeu 'Y0Xkiiq:`4 @U5";t݈vi]6McccTUxv۬#Xjrk:RK%z:E1Ƨ"r:Nbq:N#R< M&Y-؋^.:t8\.%&x|,:νz]˵nƪؘ0Od-l6y!d۝Nc !d1N)p\.a/J[{fA.g, ߭Z{?>pommu=%9% iJ82 =--&rAA_2_G]}lv\v7oUueRR"q.ᦲW)zwXIocYE<74zOnRSS3Dz6Mwk8-g cAӓ^w<;뮾aX`aOލ7[np:._sg?i@0+v8h( ! 4 %UVVtرf!y cKxII `kץ5}0֬[WP0|ȐѣFJd d6\ulܘ1Ç fW̞EAҥe^5,>Y:uůFb|sN0`~]z1ixٛozH/.)>urk[ ',w-۶ӧoޯFB|5sNpv5b ]7P2p@fuM,]}(i>o0 b6|rUԔbǟf/z'vi'=Dp؏-o$&$\wUcnj^vC5RQU|9w+kj.7wFW~4{̴^piֺzS>_Uٳh~z$%͘65W6&Ӵ)G-6m>x뎝ͳfLl@ ]%"KReX2w yaC̚1connƘQ#q+Y7#@q]nyp޾2lTБQ#׬[7ltD34+jjk/7o)6 rfOp  r}%AkjxkR5uʪ7yBj 2Ï? O>y/eZ u$Y\tCG&ܒkbb<啕+WaB+{۰q݆ 9/Zf~WU51!>#=VQYq 7^/?ׯOŗ_ivi-۶JM}.Waѡϗ-͆a dbM !hkq毿.))IEá٣ǫ_ٗ_B*(*z- ЌQUʒ403sI3M |~_MmK0<6bcA(74,s9aTUu:0}ABVHqI}}CuMM06dH޽f/5Æ^=Ԕ;v&&$=JG8p7\wm~X]rUm]o ߛ֫WZj Ff!twݱe۶p8lF||ST%_m޶m&$'O29AUU靚zl 0tϗ7wb޼}lظ)Wf^=JM$I(hj\sӧL)(,jjkk@0Z-{ ޒ<./瑇࣏G~M7u{קwFzڍ_g9R'}0 *Lb}c( DWNgf!كVk^~~Cp9&e.fL&ŸcgNܳkoes;[ܷo7L&r㗸Y臐E{׾blv\i~aFf1;++ i^^QY[WuĄ_/L>ߑEQL_PoO(u]GKTU-=zi?a BxAz3f_̻v?̳0 PHqqEE|gHLLt9|]qqqKK9}XUaꆱ'goCC̃+WIOK3 BHY3=zfά|yiё#Ξ9T[[G=9=V˥>Çmii@  8hiڊKJVY3>_o[fS&α\CcciYYqIi ` 'goEEMno!܎b%%2{-@˒|P@Fs|@foKѣliooqu[mqr(((\zM+*ϤUDunw lvb78*B@( Xb](UU{.9rԬݖ;^6$mW@||^aP(t{ٻt%$/_:?d@L%.gwhmkпF r՚(_]]}q;d&$ėWTlٶ-g[n15%e]{樚6lƦw98(65{s﷘-Ǝizێ.dm1OzZBnUUG߯7W).+ӻi4ՕoٺK]>gV{owNpӧL^~mYu:7]w+Vvt]ݼmsf Kw+VE0 MonYyIdg'|Errϫw{|ĉ#7oݪ3׮XU]ٿ(Y3Gy0 le_S^Y{Ŝ&i5GJ{r9G t8JJK>3ixkM=zԨM[h6}ꔵ xwۇ~s߶cɓ_viqI!in> UUi={LINޱk]d:R\77ګ2q(VZv-F[b6b͉55 ﷟Ng¢†GJKfg D:wB 444Esf~NUk>y7 hK?XSWkoi6:hlDeˆ wL4ie$nfG C\8pe˖l5!|qiY4'%(jǮ4qp`6CDzTU(J4t]gZdqOAeeYx> )ȒD3 e[4M+b6Yx87b49]7 B08 _?@4e%I8N$(jǻu* ) @id BDz+*aXp\@UE1LaIX?W>\QUE1b8f?>(ʊBQPtBQd R{#Al0 [#pe&Qae%Y6Laʲix-BF0 ް$L&Y<oCMEyeXY7(@HQPHEEba C:y@TU]*fKKMc9X Gzb] j(oUUUxEQN#xyMq8.0?gY$} 8:<6?Q${{E]k w ygNtғ^yu '0(e9..D "t6l'ε dtO̧>S] ;{F.!#{߿oDȲ Dp3YuZmF22IO\hNYE 3@rϞEz 2.B?qA"C*;U+=Q֖#|/ApRh"%&'<Ǒ~'2={B&.(]4 TU= FC xJ\XK CA A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A AiZ PBx !M4a"ZF! B8aHADCB?ADCB?ADCB?ADCB?ADCB?ADCB?ADCB?ADCB?ADÜ @!ټp>{! KBfJp:a~ޘb(OPӴjEi7s!KQ AAkkEgRa?cG@0P][ Z?!745Oёa8B%Zjj@I ,LyB Q_HB?ADW 4 !a?_7  Iѕs^\OѕN8r1! /赉;L( GYj>ApR 6 !D48(X#x}yBxRu]UU C'Pd"D&gAQMӚu>~ .D%BcڂBf)-/+9ZsiaI* Ä¡ֶƦƲX"UAɭH,VTUϫ۳7GQꪢ#(4E545Ç**+dYMM,GJJh{Rmu@n`0_Xյ5yoᡢ@(_T ruuj[Euĉ  A]:}!DAHS4)nx<1#:ҒYI f0$ q Y--/Dz`̮C<  ?** ˲---Sm$mm˶6x1ldjr>d(qH B<Ƿڃ$K  R ]XK~UݻM0 C$YR B2l^C@7KnjSr,r}NtQXTDQq}!q1B C ]QP8|o KѵBj\l\'6g_{L&S$]kjk&+Jz䔒4MXV4%Yi:66?q{bc*jj%Y u"(è;Vl6$$%MUys9 gi M4(z_|-[EƏA\*+{GŽeYo8/,U9=5MFVUUyI04MSap! ^yA^{GQUa Pi{v.FPhܟ@A!4 C4el! b!i˲@Tf\N'nQAq,s~ !t2B2poNl0;N%Mx$˲8վbl@"!(2c$AtcCȉQZje%zHWtnH| :sQ]"Bz)*" A OMuQ:hL+EQO!EQpjPIWW !d) 2z=v2  sGB?ADb1 MM?pEO,aB]f" # I=MHRhY2L5$AtXWs=:sD麎" ~wd4/ADCB?ADsH;W 8RG槝PdXDGڝzEA/9eX,4M)*|G3 8g󆮇%8^s5 L'na0:C1 cYQESvAR޺m{Kkk= ""y;8.ྨv5>=DMWV^^PX߷/(J8EQf9ܠ:o~@QBҦf0x׷O^vo=ɱ1džL((F/Y# }wG yycǮݡPСQ#Fm6]u]78;vdbawޡCKDQx^VlV(rgZp#(9^7ð٣GFzڷ˗'i p8&A*fAY!EaZ5Mca ˲YyeB`2~'?mi=($B>|SSSǝbZed̢l6j2l,`cF2 h63 m6ly M KC]wڽ3O ,\zPVVlL̮{nW'fI4s}a;mdGK?53].;?eČ$ @byʲi_k]{\Q+޵'gk3kfMmm'&1!~u#kmhgڶs]rI0DaXnwѣeYnjjfroK$I_sk8xuפoݾgR҄UUU|&Oݿ?go].gz^%5}22.70Ͽv9f! .: 4}-~E}݆k֭g+ vxoWUE=\\އK¡ŋv˾^n /,|YQ5a~35/^ v{(za˪:qK?ֻoOc5M+++?R\±,BRPQ^\x .~5 a彿ddYFG</VڽnƏ>Yv(*.)ݸy˖m?⋄ye_عt 8 LOQP^:O@6/?=kCʲޖOUTa<;XS[;rԔFM¡={bz]M&M_Xj[[]GiZeee]zZcc$&OwOiwݮv!Ò$IuɊ>_ u#䯾|Ӗ={B}>@dzuyu=dE B`(dEŲbjnAFۼ ˾^fݻgϜ1yDe[[[mA?k&&$L:%=WqiI'&$^6j$%&VTT^zɸ'5%HIQ#Yi:wO>|&{ﱘ- |beRbbzZܺXO̔IeEYf={\ͷq8C|tͽbU+*+/76 ,_Xc}{gx[Zƌz5U߯bİa32ۗ}-] ]{|r˰[e-LYYdwɸ˾&'7n n+ .|6o׵yE$%Y 69?Y B(Ri@VUy]UaYWe)<!eEE|yܥep8LSdVO ?6U4!gAMA a cHRMz&u0`:pQ<bKGDIDATxuEǫ}|%w p\J<Y߬J l}T) όeYeee@,4v( 0L^^Y˲i"v( bq c)BP(b,#T) OOTt;s!oBƞǂ8ޟ>^1 (Swh.01p`,B]LG.ѹ+˲,OBزx[ΏքԍAi(rs;`v)fp!İ,G,B{r,+G"1 0L?!#zc9,:1m"X˲,|K!4ݴLIIj--^DO7췋B9\Ų,BHUU e߻uVg^mG ;_l<|ǭKW{%I ~y9}ʡBn<'} ˆa4MIp8y{UMCQ4!eguL0Ʋ$ckRqlzԪZPjb1}5WGw|CmC?Hg&(:83eJ!e-JKIVT׸ u;t¡pqu}C~N3MMJlliŖ#q+IIJD76ˊ±%guJJu݈WP~e 6ݹ\|>޻ 3TM8?ڕ1 #%1!3WL5beЛϓA& 0LYU (}٢ t gNK߭XU^U3y?輌U,E_%e`㧮X᭏?x. YXv͕͆uc koVyĄMw>t6Igo@(F es+04M 7tvu_vmih8ACKk|]W(s~Sm8 'J')o^NO ʑȘCsW{d9r3)EU3;n:>&ΛMML2:B6I4L` BȲ~S`U^9nPcyNGg'a,UCj6`DQ-w#W54<&MKN ݴ0Av:kY7fؐ>Ie <ܢj2DžHIcFfǐrdXDqͦ/ xݹÆʊ!.kG?3c㯿}EQ3skw徹.۟·$q.cKE!:nİ۲Ҿ[z$%0ucTEa]uo~ٺ-+<뤙 ͭ_~,!.V} fN[,{'L7㯿m2HQURA szGiEGgWFj3|{Y(@-LCʑcF|L^4z  q1i9jժ#FN=|()caAYAU, cO V㽹 cq cY꺦i<ǑhMtM4AAHc {W_)yz e=[0ϲƝncWK FNa &66outbч1xeٰ,l60LMgĘ-[PaB$Y%G"(,  `-Rabxc,+ ^[9#4 ( e,G<9@`a,20[mUiMUTx>`L06{7J! ~ނ?l!9x`aNv pln0 rɖE>XQ?O(,Ãȁ)LAo<<ȭh=,ws [c|ib Äs2SUM{,8ca01K*1,QS&ϵIb^fD%S(GPĹ|(Y CDXن/4MKQT@v)G}<|4/Eմ2  0f(5P(=!9KC~3 CRҗ?=GE}Aɣ:ײ7-ҫ`Bp3`YVQPE1HM,u@-˒$h7 ~?yPed9E{?%d"Dz, 01A`q@_Ѯ!eXEI{HjsC~_"|~?7,Mt,c?{ 9Q(GƳknfDcZ@(0`=мyX4 !DH&oQ"Is3+Op~w2e ?BuF u5hfB|¦M:;=8`NIV>ڍO=yH.fk#!Ƣ[uC1xBZq qBMӎLS5Mm1"0BoYvy8K::|ieY²r:u4wߟ{~ i80eI ,THa|¸XYm6[L`d=_.8nꤶ.?+;cDB(F"5MaSSS-uvvAi)"H.:BKF@"d6"aY]n}MMmVVѣBE_w̘>a ^݉3ߴ}KiyEccӀ8[jmmm}^^NK.>m?fO9:6&2 &'%N< 5P~YQ TU~)fj 4>5%%%5y!hǎG= mm֬_a{ɳ6n޼fvݤaÿ*HD9S[_ƿ'%3"\ 0,˲,zӦN~ikO.>55 ?K֬a Kڽ?m  6`r !"eC?rDY!Dvmu;wLo޺M斦Sgqֺ eC (?(cǂ>ڶliksJ6t4p6eݮW_|>,|qc/\eڔÆ 9픓|-++#3m䔔;"RRV5|#3 @Mt/2#=>r: c^a"3 òy-(|7be[QUU233?MTz +t H]WCA,ðA(I.UTN?&aN1h@d^m#OY\Rڿ_ߑ#IIO0nƌYYU=fȭ۷757zI6lƎ[߿Ԕ䈢D.:Q<@h(hNuq\~Uֵmˊu/dP}c,U}mEMzN{ƦqcFgʫial}WMMM} M'%&vt`(VU:M*jć'{lA[eXaB(544=k֭N7f+;Қ4zϿ;`u?߹cWnNf:xYgZC~_׌,ʱAD, bXp,jII7nZb՚o]j)'$$6ˢ;;|`SR}nVbJ0|Ūo]n~#]aSSSE5U@Ѝ@00=Sd@Yau KK11VWh3gufzZM,Be[+.DӴϾN4p@yEg_|(ʅ矗Pc{B|iW^ 4]tጴDoYd\C`5]?/GVKbX#5 NAoش9O'ttv\y 3ssSR?v p ]i&%% !z}RS 2Bm6!cFgWKcg#ƍQWPVQ 3W<(!>n0?1Q#G3?+#aaC''%*ZFza^/MTNC1fYONndf[K5VN+lmmcǍN4l$JIlXmmm{_v8Ae%IPH4E\CfS5Ͳ,H EQA\;0 xv:vڑ]lyiY&[ z慗:ԬL˲Cq.KQP8r80#  0 BđALgw' cZ&(:$Yt$ j0dYpBH! G7 a󼪪Pvt^GP8t80pv)i4McX&;3B(hH^UW6 rL11+/흏pa,QU s|eYhB˰!,+2X@ E]PFrcԇgpX&Kd@ !y@^D0HV 1i4/OBHtYa>XY^]!zL C~={L(b(&z B(z|CEtlfNV f_jc"Bd c?ׁmN.z nf?e&'\A p]C!Qq0%Ƅ}at:@ 1bX>Ȩaˠw2o~O1$Y#$q{:bn$0@F'!ApFDQVdU!:Ks!$y\šY˲PNED4͘]CB HK:}N,wbB"s>P~bm 䈜I?a4cazx |+BMؔ䔁i ouim߭ fY} :FLoy1=aT:>P/8ZG5B9v OP(* OP(* OP(* OP(* OP(I`a- ~0ƦidACrg) rXc%AB]ׂOLVND # jp] b0,p8suy B.~E;v~7 0N$+.!+~F:qd^P9f+ھϿܳ ,Ï/BANfY:M^vR(H?H_wS0֢rf C4Iȑb8[ᅧv (eYNB#LˊD"y嗻:_y;vȣ)uIV8,̨y9AE!6" Q(~aX--7t3gY[Y'2k+s^&;r.⫯+*/8;+^v7^wyݲ,lڼ%77 ON_cs ƌy?;/~SNb~tŒK.zO;ԔaCl-~Yg&'%dg565umW_o fA?8(II|ͷ>p@K/Zz쩧-l}Ͽ _/XPXP0ldksNpEUƟ^B9`!Y^zCpਟeخ.ݙ 9̯nֶ܌4pB|g J/E/u2aYUUSOag̐D jjk/z}{EQ.BͶdJ0 4`vڝR/UʱƘRUS6;~1ҏFly࣏gG"Æ%%&ffd 2Ͽp5W\g^xh~:IQ/O1lXcccvVVvv&q-]]]ζ@ i )q9?1g໅ >xos۝we_zх[Z[nwVfdYJ?– dnB9v`ʤ$44˲]I$ bT5t૯21!,Iҷ˲,BY'rX ?8WT0̾YI} .WA~^FzW B^nNNvai<5jĈxv-,>l(Ǎ=rQ#<8 .6XQ1rL jmou_gbB<5۶oD4M[n^DdYv9r$g(u>ò1^dzhǎؘZ]SSYf6oݦ(J||aﮮygw\~}²džM;;;cbbf6'$In`%I˰UUMqq,bw>?3$'xnI飼x,ﯖV ~eIUX0L[{#Ð~mظqͺbcc rBvYY;EINN^N໅/]RRV6qzE$ٖZ!ؿ?]]|YsK b`^^_|eeY|gTU[lYa~B>ȣr$Eɧu e寽Q9yzN}E[dþw?D}c_KԿ__Uӱe;|Uk֮Z6 ~6M[|aƍ}\mm3O|Ukx=>1յ?O9zObgg;wB/ę3yҲ;vjzoV7~0ƻkugWxy퍷d9fݺC0 #-[yEӴt]okogq]ClḶO>eY*Px%?;3w ë֬8~#O>q55 0yII1[m[rXxqAA_RTdov\- B0h$K-ohl^x)S~ɂ*.5r{~֢5~eu p}:oͺBJNJB?S66B~yVfFjjǦSS? P{ts/G#_~B2H,`Y㸅*.ټe}:i1c2nާϔNtu{ǭwU޽lꚚĄ۶oڲnY n;va{˶mۊ6tǍ3zȡC_p9{&&$lVy6I& h;`?eI^{FWT|`l˯)__l۶q.px`11K/v9Wjjn2yyin[\qe9ՂoƉ ws>k],F":=@a~?qv,Z8 zV17AZJr'wOp߽|| pxӼ tww^|]|5kTME1.6O +ALlL̄qc_<ϩ ,4LSQU?( ƀdWTX1a08r9]iiwQ#GȲlYVlLc=p8qǝ]3v5n?Ѓv;jkku!p9]i}mGBY%Ie˜X2#C2%s\$"s0 òP2Mìi?#]7 6ɖp_rgB!6qW_n]rхO=\B\|fFFDQtBp$gaJDȺ;m]I0uǘѣm۷ɏ X#YH1B`0MөZ( d! `0t_ y/YMDAeuM7M@!@uB9CiyeץWw޽+sg?}M֬ohHINgYY{U%%&Nσ?eeǏ+.)yŗAE=jdIi/0 1 ki_tӖ8ykj0ƌA߿_9~¸q_|~tI'}d-[UMcY1BH* ,D!x͂6uUW1?>ʜeY>taC-_n@ @%UU9b?7f:da,OjI3g߸q՚dj1#fbZ֤ gI61Ba0g~Z$,^lb~㋯sM 1laQ,[~ol޴y?8bذ+/$?7?:>c5Νo^oRbiYa$''v]}Xm-YzYIm)/9|5];%ڲ`0*q !9q;::"%33#!>WDRSS60/,㺺 r$b 4rZS[+bRb",92 p81cFq)]-dò11$'%A4,6Iu oa)IR8ynwwwdS__oZdq4B|`FDX8NeQEQkI6I"׮a6۞0 sdbUŖr~}C㎏#&My9cl[n׷746]q{{n]~CCNDcBvfh㈢j*Dzjkoop\nd%@023!,˶wt:˲--/Ɛ5>}11pXnhlLJLLJL$7'i5q +W.Ąؘr~C99l'91 C 9naS9e[793-0MX`e=9~B[뺎'S="IeY< rr疞ķ PU5?/cПK.gOK:-/>aDQƍCL.?8NXҲfO2'A2*.=rdKK _aFEe$I"a$ `gF$USkB6IJBƲ,`\SWgYn)s'ӧ7qq ƽ2 M ~W^п?9}W7]w홧f&S(~o ˲vd_1=]ntkN X[WcA~}}7^=bp4 SSSSSS0.3..r5<~z}rKJ˒Gr3ޯvNLLLnnNNN))-z<} 33v;1,v{*wW:.ain?O A 1|M]{w8ݻ-˪H6 #7'qeed$'gefq<bYSnO?xٲ}׺زQ[PЯA+,lohmka!$ײĤʪ A5 4LAMlhOMIt bAnw\\\yE8OiW^vyҲJ(Gd˕g㺺:|>N0jiix~Qe 񅅅IIwbD(!4 O42K/_uh/[q{'Y\7}M7u#99|˯yw+w6ercSSggWTO|M-Q+"GEini9|xss˯rj|$omiݸy=b)lM-׮!jWE033t‚ؘ1F-¤r$iYSDM Cť äY|eMmsKW@P׍ӏ{7rsr&I҈ÇD& C' `brNaKW,{15fqI[Ͻ4ܳϖ$sΝ,ì[~ҊaӴjkGx277'/'{5w-,EaԈ} >ͷXP(>o_˲uuun۹==-3?gE" 뚦fg٤쬬oFZC}{Nnv(J9v} >//77)!!33#Ǒ f55ui?mĄZ___ZVm֪Uݝ} E!sg&vl-ՕJMIMMI9YY.+1!!#=->>>.6f BW]~Xis{Ge]p32ғ332ƍt8WQYUPLԟ4fgGgIiqmemmm}R3w`cJjà3N;u¸qe,vݺ9;?/WӴ)&-,HINnmksUu:gzJqiY}cCB||aA~A~^qI8n\JJ2G t.1Y3wZ eY:NQ{z 20NDdL#NCQ?@Dzpu( IHp8 p808#Il6[ i}5oǪ-B9j=r-P(JHļKtR? Ovdǭ3B9l'Np/ B Mv8UY?WPӯP8ŒB\zUϥ hmm&݌Vܔ232N>=~|4Ac D+,PgQjEΩ( zЂrlrOf4?r͚>~rn盚{i@.WK<B^q{=ʪJF8ݻw,|?( $7r\l$I;XXA\݉B9(qvplܴ->>0Mr$Y%zm6&Ip8l116ል8l\\a&K$jLLnǀ(ccEAlmk{,tPUl҉3g"wx,ӏuòò<~7~=lko˲s1]6m1lh~TUpW{7dt 6 :tee55o0Ms0~X!޲uA -kG'5ᆱoh5]ĖEKfge=Z4>ܜ$-n(&nڲ;5%yЀ@p9o L0~kQQA^eYۊlڲ{=^aZZ[bc>̌I766UTnimq3'\7fn'˒ƌc 6:t~]cGڸyaCfefHܲqӦԔ1FW4464466l(ʱa!r$2t+w%f^zk}0W0$Izn+~}WlfY?,0L_g'؛M7 0;:} B,,y?W_s:FIi) }[wuu^-G"K>ֶc !pXUԊs^w8_{n}awP(p_~ew8,–Գ5_~'~|Ws?oiiy9e0@0XYtnFHDyWVYSRV3657?wC!a];P'tsssDQEήֶWx',-ɧJ~e5k|eߟK/~8O%QUw~m=gN]]}K ÓO?koOv|ŋW]ijI8>>.5W 6t1s?Dә=Cn? ԔS&AnW$ٴyKNN6 eYavttX+D:]l[ziM8r!6Y{f87r:gzi/7o{?zm˴JK˦MѣF :߾sz U tvʁu`@ׁe)`02 Iqq e YY5',Y|SY$I]JM'&5j̴i^'1rtAة|L r97&'DJ bYt |u]}{g4Ep8daq]1F1<9))ymim-+/m/_@,GP($EUNc~FHOO۴y3 ^SUմ,][Z[+++NsvO׬inn޸yKrRY-`:5S(&ʪݯꂂ|Q,[^ZV&IAVZU[_YgXjΝHdq(~[nHO+,(XbECceƬ\i@^nYk5xa]ߊ |X-_QΫj}U+/\ >nڨSS>Ԕ>߬kl2d.W}k)fUԮYC]C}>Q뷥r‰'Fn6djcc{}qc J}R,\8"Ϙ]ɧSR.9~:}U?Od57t^ ) JxY޵by$LLQo~{ߝ9nlҕ+']][֪?i;sFYE㻺.8ݵk֭ohzR^^1b0G>o:d'WTewu#F"ʲ++2|'$ۤl+ڸyA`Yۅ,N2y k֬[WWп_uɧ Ü|҉F(2qbvVVqi^|EQofyּ>))5z'4s'H2wP(r8BUUEQTEٓa5MaB!A|r"ᰦi(2 I|e _Y)}6};@Fl##Fh*߶g9y89u]QX]YyeYBSQ Ua@,Y--̎LYP՟h}$!DQ Ƣ WK]Y%gcYF~\!A '- 8vMH[%d`EQxL˜,@zoS;IjI7q Q\leA˂qqSO/7 #7L v@iiaۺU= ð>-*bPc#[^: @Bf, #=k- *ʡz;}qRR4g}47gtch }O1ˢfn͚=#eYnGf8,1:V cL|gO>NsAq6rrݞ)Bg#Pط ~1gZ`c!L]PM 99,!% *av-z5[Te^~Y&HL4 0FͨBzWB; GkߨBmXӱ , c IVRwuu72wsK2[PHc/!C̼yV(/l┩Bl BUG@AUS'o>e.VjϘ1--3`lq\{힗X1f>a1|8`Y gmmov\q@zI+)_ٹ`%$lС6@»+-i&=E{LnٚD']0a4MfXF4[tcV'0e0l,b9.p!q#y3Ake$R63Bn~3F"ڬYƨQ 'v)Iq̄ ВdeeGD%2Ma:{deAM4g$I7 rǒ]}R0 cY8mfYfRRrqGa4Ui El,GuaW4M0O!!jog7l}V=[0:Aha 80薮k<~:q5|eYVyO7.&K\!&˂HȪ8!`GOv\y%jmUWhY@BP([B@Q~0֦L1P,3%ħ;b&[Lӊkmm%ZLbǺCn߄q4M,0 >N< H,KMdXBm$LI/FAiTYYvf:;}D1<546<oxa+$p$$XXu]7MŴL9iyDr NvEQ  + ˂8 4 hPU֦O3H曝_p\`Y4 "P(=myayy2DáMwv!N>.o(1DziعKQI'|w/^x,˺ko 7nڌ-뺞}%硇#2rذԔϿf+jjj%Qz0c\fy}Νccc6U0ƚF_ u(Ab,,z=ĸ8UQBo^um-0/5FjJJjJmE^' IM<Ӈ RVVQ'5_Y'W䰜p|9ojnNE9eIÇUUF:^|1h[?g{1F033(HhѾ(ʱol E"U (PV+5Uy$I&10WT@ uuw)'7/W\>{ΜG?ЃU,Usϝy>w;kk@0o7nܼy͏=gvuu MBaEQaae*B4r c?֬KKf1ck>b˰>(әeYYYv2nw9zֶvp8*9q$91Mr9jpbBbmBk :< 6uؐ!>_BByr/"XDI232ޛ5k='}j;n>)# {a+6 ?/5M[X0~EQ2̲'O?[-*bn~ۿqٷ/ [{zfdʸe˰ijBBbBl‚~ͩ.ѷeي6-< h%i!@04MSUP8 ʜghmk wgR[W뺪jPHu0[ǎmƝw3 t]5ca9!6x͛3KDP4EQu= 403#!p5] Mӂ8 hz86MSӵ6laUYU`Bu]eMӎ:ew۷`AmmmvHW"en/_*kV>0x[ U) Gb8!A|% 7~:rͨ,/u՝>acrsH5WBr$sW*gefJdfzZZYyyRbb(6MOj*BmȠ.,OnW5m Hd]]]OMI-,Te][mohx0M!,+/oALLH,,vlmk qo6aَ_~^n{GGwwwnNNyEEbb"-5%rnڼB8q8a֮_ FTZ^֧$e}RS\.(oBMZqq`G߲0MF9_3wR?22BO C!l$Ar  80\!d$ŊGUU%I"ɟI8#i4MnG20e jPpX}wbcvu]]A1ġ|'D@?`YndYp,QabTMx޴,I19cT"$ HjA8 ~ qOt`J~1 Y ]'w^!k D` F`,LHr,QKV{teY{ eY&eY$=DH7 i$r8,3 SQY'fgewY`a !JPX4]G=UGu8 rIawhEj'q.V0E^/$ K?PU377WO\C|''-2ejYP]e()B~p3p4g~9gòLt @O{_Ţ{^/=f0cKP@U(7߬{K/p{1|8T,+!A1gY.Â8n:TUi);DksX², Hיݻ1P(e$HVBB_-^-Ys,,ԧO7GJJ232Tq{6&0MHB[u=:M2[ kq ^#{2^ c0ly9 }))(W]].CrPM Cо bZAz}:ƀabQC`=ZiYLQqAOg%'[ Ƙe#3ͼ<+) ^M3X(#uϷ5jklwB1w:@JO8C~:P(Ȥa*'B OHډ'ܬO\{-:_QnߵCih-!BHQ][룽rVj>upX eY[G0fwdׯgjj{؏1@E?Zkj飝~:`(4?BG& 4r'g}@1֔ˊ=)^a ,1Bea`Zdo!41άs$"Bᐨ)ሎb~vrn vzL(mwߍm_-c(GޗXO JI1 B3-헆b- : USݧP(+!G;>ݛwUg\N1?dC1Bx,5Y +y8p0bg!!P4C7t?7n104+mB:n7PC)ƠAM7ݻ_$BSR"|15#]!4֧N5<"Yζrre +C.ALPz+'!Y/Js>(j@]YfY 6j ;5CS%xߒb\7#/%FE~YjZN4wIC`EM]e9Q0ZigN_|770>))zv~q=Md#N0;:9!q2BPrxҏ h-w9UKv ΖfǼC/݃2ògJ{~AYSRƊdDŽ 527NӲc7yx븂91/( # ^u;_b?&KvAQakգT݄ 7re OP~CY,m<[X_{nYѷtkq}+Mh]+ +I*}+;-8$ԑ}殪YW/rLGWdKyGzCLnR5eAm~[78#/Lrt4BΠc[^}տ-|[*Kߖ'yĎgc{|ŝ Y77?tH8bR=P2첅_lL~\Z-3ٙaboMSBuüͺ%5n}gkvc5 S\~YKP(+LJJ"X9po X[qѹI.YqJ{{p ؂X[{H;o|fnC`fIdH$ ŝ+3'~ncop!ɋw,jYxJĂ555mt~  ̍bjNj ALȴ lP118ާP0L[{9ӕ2)GaZ[[/s'm"&e5݄ O21 %#x<݆B3 DQ(G|jj}i5?0D8ʱ>OIIJIOSݧP~0 kP;CV:uP$Pѧkzެ 'ΨR(JJ?B:S(JJ?B:S(JJ?B:S(JJ?B:S(JJ?B:S(JJ?B:S(JJ?B:S(JJ?B:S(JJ?B:S(JJ?B:S(JJ?B:S(JJ?B:S(JJ?B:S(JJ?B:S(JJ?B:S(JJ?B:S(JJ?B:S(JJ?B:S(JJ?B:S(JJ?B:S(JJ?B:S(JJ?B:S(JJ?B:S(JJ?B:S(JJ?B:S(JJ?B:S(JJ?B:S(JJ?B:S(JJ?B:S(JJ?B:S(JJ?B:S(JJ?B:S(JJ?B:S(JJ?B:S(JݖeaB~Cc c1!gV @ <{V4_R(Bl(B B?q$8]x1˲v 1(˲?-Ē$I6MKe0uVB#˲iT)Jҏ1y~ي}:/6K/8β,!Ah;CUnke 1cr09 |XٯصK.8 cY9x_vݧP\llA~AEeeYeaU Bq\www]CCm]}$yޱkMq\~^@It`(B9O:#DǩDRSSO9ĤDڛvY\t#?GGhv_zֶko_"))ŗ_q8zGxaEQ ؞nQ~G~rjzSSӳ/TV^QX[n~;wcwvvUջn_l _l6vŒZGjUUƏv'%%}NsΚmmm|Yˁ@ǞYhWwW~q9.BhѮ#H?Ƙ㸖Iƌҳϼs?xرzːA>?SN^xs:p8\\Z_lL?uCァol遇]v)fږr9s8FKk࣏y㭶vyE{O9ܳ,ھ/ BϾRU7}w 3b^{`(ֆ1>Uvc=z}>_x_Ou[Ԕ?pڔs|yB/>lhzZC9bLߗeY:#?g u|qqoymoӦL WY /&''=:3=}ƍ-ZdB# kjnBn8P8zǏ[QaӦ{`(!yUk֌1;  < /f N 9?fL |o]ݪN6nceMbY8A!n~eElhOgfA<$B0?B'OJLL+ ~B91;wjF_)K?!IJXx@lLiӧMJJJ7f̜7ߺs8N[{[CcS?zHeO?K/hڔɥe}RSSSRDQ~N]y;wt˭ >ߍ]s%]|I=0{vBww04 #,˝]]P(757fg;ߜdgy=\w}Xde*Q"a]rnu&&&0 s%q꩚ivP˲x8J? oP(WZ5x`M| Uv=%9WTz<ÇKMn|[ii%e5IcYvwuuꂼV:;^cCBm'Uuaپc޷ #=jwEeeA~AvV[nWzZږ۲23DQܺhQal߱ ??&[YUi~sϊX}lnqȠA<755߸]!wIIIKK++/ڿm%$ )DGivQ(G rCR,˒$ !1Æa\qgD<ԓHDEAu݈D"仢(D"aB麦i6I 2qa"fu=Z"f, 0VTUUUQEQT"EUva6UQ-6[0ljϽ2K$I|$iaχe\(c˲  0iPM4p2!͎q3PSD~B4 Ƙr| ȲL\*!D"b` 0LDUP(F0͋"!B098nAe o4vg5M!4M4EQh!RɃڣc!-*8Ρy14pS>! [3Uޟ~F?G?DL:Y'<ԓMÔ#0;UT!==,zOJ96jvaK^t [&Xq 8 tx;ihOINq:Hc8Zo(`dT{L),BA`X1Mw(c, (X GF1a$Ko]0 lCoʑq$L|)t[q]Y_hYVT)ݫ DoaK?e1! yP4&&pxe-z<f06-&&&&f**+~WvN'9clBn+yp8."˲$@ qӖ8axή8ҍ,v&yvm%˲DAd$c算_gl6۲+Xx{+<']IF` B6-3 vy0LkkHO2λeYvm+V7ӦkE;vw,\dI[[ZZ~ذ!##{tuwA32SBwx]m6O?{w?u}$ےu@>ˉ z-~W_y=_y-%9yM6tiyϽa~͂-۶E"M[dff~{4o+nI$Q|w"HM]N#x˶mngHOHnN@UEe9';>aÆ]%_/V׵/Y0x<0bc|1B÷~&9"7}{Ą+V{@xR˲[[+w]]b^;|+W4a#?r:Xx::|= )Iv]PRVܼbEEO?ę3^z@ XQY4b0h,r !w]Wύ7s-ȓO~u^K+ssnNcE%'</l[ޟlhllok=y9 DD$*?$DJ ĖWt>)7tfkima>f{*cӖ-} ~ v v{jJr >thZ7m۾} II@ /7wİ;O>ĥWU{wIinO>-:thȑ̌>xm]e嚪ڬV1t??EGA0wq٬~|ބ+fC #PXHDu] M‘H8At9uuuP(RRxIz?aD"R8h.8íMM q$¡DiZ\'98]UM B"|ںCNdƦjMuCBP!`Xl6k}~C7\{M{{a8jj03w(H_CYYaجC@0(L_kn膮$N<Nj%W?W썶G MuBiC@0)L,ѣ>@$IT5"IM%%%VtʸA\NBahCAxhEq(/^~C.=KL.4pƍBAN,;v4`MQ˲/|%ӧݻ#.;Vũ'7oLO4pƴ꫆ ~ᥗoAp @2tH1c{O'$ٻ%_45iրLa4}G[n5uҤ۶s,{lAͲ ^x_r٬BhEaM\PT'(wxn _|idgO%_}cZ*r:A4M^asw9o~o>:cĄۅlVQt:, ESv-%9k^j͞Fƹj7 #K٭R,zndcYi> o!kA}k׭gY6"I۰Wkp4 w?qA;i椄$U;[4VkvI;Mx$ (J,Dd'`@$IIaON0aIp8Kz*LypWZC%Ijo -8Ig{{ngYeYUirGQ0",t6Bŋs>+*!q3zE$;:֮((e(~,sa59kn#dS C7m6Ap7f}_ixb{@eUh?T]Yŧb).-}77/.si% tGhfg ÝZZ[DQtܧRŁ$m&+ߟ PBA՚4-2>ɜ1Up蕚t\8ƌ$!~ '7 i@ӸE&2p=,viS Xji|p'yyW^~aqq> h B-}w*fu8kłOǩ)˲9ŝ@UĄܚp||iݍH,f #HC~@4'jPrHEQ`wr)hQOIZ ֏!~-^'gwEۈ;Zw^;|KHqA dg~feGTU흖{Ï8МcFE#B_O1.Bր B'IAgӏ!E~H4סֹ8'G"z`eH$qܩGUh:UUMcI&#'mQYtDSB|B9"E3r9~fx<r>t# $K.!Ggz "AmVᄁYBn &"ą~f"+;k9 HXEC;g"!4]ӵ]# !I< G\q;;h >n"Dсi"Ǟ<활ٲnC]LwQUu>z 9ڼ} 'F؀=ljp;B:L0D8ؠ(\|vx'qahNӴ p #vo a8[tDB3Acw$IҊM@ڑO <^aC4wUF64Ͳ,;hkf i~! >|Hdʤso!|H((GqsP2,CQ4<9)hryt4MCYu)3uu6qܫOQ\芦iUeY $ˮz8Nn]]jzʱ9xZZZjjk>u-@j<_QY|RB ¦ں$EQ,ܼWϻn ݨolgrIff ~Z1Ӧ{mm$UU$$īZS[qP -8zkc/lپaYФ 333~Ѓ ȲЌ,˟~bxE? B0JtE>&N":2MYQ(H!L m6\r\$绎Q!4Ǎs7]w Øa"B\bٜaQLp^0 CQIdY--xט ~.rlAACM89}ԟ?ymK |glahzM7R4 / =4'g5alAYYϾ0=w1!t˯aYWqV̜yy_}cY1|}$¬ ѣ7Uֶ}s"\f\b%˲q>pa/S|Oi6 S7t܍/5jŪ?KMvۖ7lljc^Xݕ(NJHUUohmms9]džAMM}+.f:fpY1hWl8Ɨ>8o^]oڷ_|]TZV_r8aTTV #%â(ff˲m~Dtp\@-o׷OB|<HyE}CC$@EeE@m]]=pIB=>.aڵ7kib| <,=(ZC)î I>y"8@̜>miD[c;/Fyj$2Ѷ.ѿ@MvӃrAhyLq6;ZI=qa#I B*Z 8;BfH'.t' A AQ˲ggv4?s A|C?nB%-˔ga~ ;]~USeE֎D$daOWN:  8?u9fȥ A&2yi<#+]hZC?$癓% Gq! Il'8AWH'.$,l8ҩM>2EQ8}v&0M24; N]N;xLMNƧ]'xuB&BW 0Ih|7#±:ɲ= ǮiS~iBYQ( KbBgg pڡ(FQ0H$ʈ(\f6 Nwyi._RԌMl F"|& Bb#Nx^?d:B5b%pNybeYj#74(ʏa;3>ׇ\>}Y Ce@Wjk}8a"@OEbY6wzrbBLjǻSep@AhE$.A;3111a6a"Ȏ] q,̒,q]\Ҕ㸚fӉ܃c0>,bt >~ ?>x騫.߳ofomkk\Nei~ X))-UgA2G4MekZZZ;-480ąvKt>l:_ZQR!4L`ߴe M=Z :k[Z[kk\N'M8صaIˉ?(!eq*x;f>iZhiSʋ ?m6[rRrZ7XQQHTyEeSsuՏ8aiG1*jl iYx?\|0>>!6]a9GtCCii<_YU秞ݳş,x\v\N(<t:-_Ͳj#rya(v8\ӑtF_lu*q^/>Y,v6r\єT ØP8lX|nå^XRCPxQcfYvyw<Ϛu뫪Lӌ>ѵp8>ytF+jun(xXm^e|z ├^0!O7~j^wU Z v߸nv\۵y}.kIƇ¡w{? ^yl%B4]aee吜kB8-_8ǛRЈ F_zMzӧN1Ms՚ F :f(YMV+Ç~tف+fϢ pkcE0"NjN^ONLzΜI/ضcG=&M#0y{6oֿǑS'^~KݴeK}k'%&^3gΤ nݶcێ#G p饻s -fU*rWVy4mVkqIɷWNuW,¬^X~32W]7m#G(Z\.#e~䤤뮾jEcV^spİje55'3oikmklj=sfz4UU9۰ys]}=@`)--~)II4M=RRfLѻwyE Deڔnk-6m?hͳfLw:P( ]Qdͦrڥ$Y̽VbBaCg͘qQ=藙.<<}\@X[W6401GZf!fhK^2nl>}4lyZ]5y~/<(< TԼ !ڠYUUon>t}w?/qk)0L dޢvgB7q\+\r0¦_^;-mͺk֭۝ҫfK{MӒ332^U Y~5k?b}3ֵ큠uyp:}^oAQы//y=k׭࣏ygY/GJrE@[a[[u7646oOX,EQ.p|{x },= #G^}͢C^|yYn/OHlΠ |Q7b4zUsL[^^>Ώ7̣4ݠ!r5$.dqB"h\Grm}W -~7{^\p4; gyBmt\Ն@îseZԭ۶''%9BCy7\wY]|Em]o~ߛ޻wzZ&5r5C̽{cӖ-$0}տ7nٲw&JM6e4M׷OZI'9bǮ]`Bfj^4z5sdfkHYy[[>0i„8/& 557e{ɊبjK[k/ep8𽂞=zN5eҤÆgaGB CsΟ͝ۯ_u7N|̫\,+Mkr)E@mmm0 G"vq~~=]}*#GrMwq}dfxuS.uo\@0j*ðik"7֋0Llta3noh}rPFҤ,C\v5uq޸4Eӧo:ݹy}׭soׯ- KN/CH)*k_|yhz=̌~ffV1';;Q^QY[Wy!{䤤_< Z,UU-_P[oM(Z CK4M+=ri4P0 $I:|i9dpgsozO= 2Ma$)-+?\\\QQqzA =.~[\\gNv/|aiiڝ0(+@~~Aa2-e֌cnjǿl̏?Ȩ#ZZ[gϜ_iz׮ݍ=Rv%>GF  P8pu=>.^eW466%&$99f67n_t՚SL6 cҲP(0LUuucc@`܊ x>&B)))qيKJf [P0TdWÑHk[87 #G6l~j6mͷl6ۥWPPb޽z <_QYkwr:"a8Nù}6p:6 w W"H$$;b@Ei;-Pᛦf1ҡ;v$&&a,G"ݷ]'))q銕%%d$-q!8>;Dk[ ۛ4r+V/␜󫫫/7n]`hM[yM7m]5]>lhcSӶ;/58(65Ym^Dm&\r-[|tP]]z9⛥4.;\\;W[{o lv>}t]|歗^eҤ99I.]+(=rw++/cFްiӧNYv 7~':}(? o-۶O6m]B<[EkRBu*Ms'IjF"e!EiFQ0,+<㞂,*"|8SPdf|ķLiVUj)*!1 yoŨ:sa "ir<dq~ ʲq,VQԏuT@HSPuDp'e9WUU4< BIq\@5UX,,s,t+G*MӚZDQ$acӱu?/TU-I( FG 0Mcp$( ·F"2 4 (ʒIJ(4MMXu@} $ɲbQ<6u]UUXU(DDQ_YtMѱ-f(4(  MUՕtc;qG-վbVUU5(NJLJLLTUd;?B8烡t! S{ZERї8o߾ hɣm@3~EQxOG7^pγϘcKExN;tpNeunڝ{=?cgz|CL}%Ye}' j켎qtNWwc7ctMg66|!a*y/}#`iZb'w4auyO'Iyhu89z S}LXŧc:ї:?vvĬAI'CR-$.B?͈1MBEQmmmz: Bǝ!%'&;H  |q8tlj }^߹^0߁"J >!MH*痮oj aADCB?ADCB?ADCB?ADCB?ADCB?ADCB?ADCB?ADCB?ADCB?ADCB?ADCB?ADCB?ADCB?ADCB?ADCB?ADCB?ADCB?ADCB?ADCB?ADCB?ADCB?ADCB?ADCB?ADCB?ADCB?ADCB?ADCB?ADCB?ADCB?ADCB?ADCB?ADCB?ADCB?ADCB?ADCB?ADCB?ADCB?ADCB?ADCB?ADCB?ADCB?ADCB?ADCB?ADCB?ADCB?ADCB?ADCB?ADCB?ADCB?ADCB?ADCB?ADCB?ADCB?ADCB?ADCB?ADCB?ADCB?ADCB?ADCB?ADCB?ADCB?ADCB?ADCB?ADCB?ADCB?ADCB?ADCB?AD4U! ~B!UWu]g6QI'߆8aCOOOOOOOO0z S6/O᧞#BH'p`6&#$At!uZUӇ ASEB?ADGZb陒bO(*UV6O4Ga Mm$Atdi=23¼B:PJR(?Qe0iOM< A !iOMDH:wAt093$AtS(^C¼Kzmӡ((!y/AIMD4 uĤ( hq4^ Ovt 4 !q<и !HщYPEӴF䪟  hXaJJO4r(ϲ,q{ R ̈́#`((<fwqܡÛo_p`ǮmmtsEQap@(y) !DQ0!{Oގ]GJa55[oQT5wzZjҼ{t]XVXeEi:>>> ?*jjeE u<(Ø;TjJUPTdZ+*tM9v#Ob|U<34MӴa=@7mڔO4~ BTY]'##/e( ~ñl~a)i 7jsΗ ,i5]3M8a8F<"xߟ<([9ŽwTMch9>g'biyB45]X@(q&ү  .B, p4]ivDz<Be"!d"/YV<CYGr,Sm})ڻB(p:zOB?AD:6))EQctŶ˱w >(H+tb)O p\46 v OR AQR%In7M8?B(+ R@VGzd@$"qGB?ADq MM?pE8_tHfFƝv =[**Ld=:8{m = 3 jZ^xwϽsx,AYz{R{jq,vDeKjjjXCv-73,{>7\{}23n{ef665etn/,߯}wuwYN׍'| {\{Uwq\LQj97^]fFŻsso>$q꺇_~3xgO4q/M_(jA} @A55EE^p9}22fOn$I #p8"E")h0M}֎9"=WCcnRDڹkWbBo 5Mkkk۾cQt]HolleY'Nio :De,ˆaP4t]QP8 Ba$^_~MYYMS{8o֭gAMA a cHRMz&u0`:pQ<bKGDIDATxuxgfKӸ4/.r(RwT"M${i-d>O<+++$ٖ P(a( lkkk\\\^^T) m`!??߶m˲u( 0LnnիY۶e!u( b&q c)BP(cl%T) oOTw:Kɀn!wccF{xϧB9$tA4aƘt8B0m#.Kܕm۶m%!lD_qGKB ~k(?rs;` ؔ3;bXVce醉Юʊq4MӲx۷SB1B罎1 eY0&9@QTcm۶1&Be[(I ݭIDۉϾ7쵋B9XŲ,BH4 m׻uVgnmG l滟Ϝpi?x |7$I G{dH~kϜ3o15]g!k. a Bއ[;YW{fz!˲aeG3WT("I"ƻ^4 eit:Ͽᡛ=d@QSK?Zu5q 0mYap!@1 ô,㢻mJW2,kvZJ2rpIgnҸ@VԱÇȪ{TV1~eY B3̫kj\SSq,n j;/=4UU_ؘ_~QCsUk'uD~vo֧ORb잣[ʯB(+!²{.>qÇʲ1S eyXps=x9g2F9e9@t9'W{<9˶OP|_SƎ˒9EU Ӻs6ciSg[v:$AXqsYU!n391~؀P H7bص{5W@o>t+V\ B0aO:(2vԚM[YâPSN8v}a޲Cu|[*51!"t۰mrHiYIBrX.9 Xm+s/ى1v9g0CuچF ض1Xe9 *kvclc N٩k(z'Z)$Mm-:DVUX. bv O;1vtu:?J O?9/;! ]q˝YuϿz<|>Bix\nmI!PFZCzmӑâյ}c'))t`(.3O{/Wn4c7|3waB\O4ṷgY㎞2vԧom9xi 1?ϱ,rq3VV*OS5a۲YeUT-'I-e])'O]de1} )4cbQCBy,k'K>0 jCC  ɲ$ hnlZ.]#xS5e۶ux80t]9G^Y[7M7Q bn! Qc r8~y+. C̔<=۶-gY@t0߫%A@p c!64s7\qZ#zX1@o`gY6"C2MK1y~Æ ‡aZ-ImˊB{b $q ƘAжmUU!ceUey=Vp  d$ 'leYfc[ํJmȭ7j1IuDVfRH4!>i1{Ϊ D# ( .rI.ٶG_Q5 * Gd?=9б~ʟ8:ϲs+Z+8st 6ƀlseYӴ B}zFj뻏z~l}&fI!1mU>y|$f5 od 7S(:1>^@7̌yHz"lv9C ,VU P]ʡc :KDt]Q5ACaf0BqB~>JO?^z(CO~aHHB琨a(yVZ~XeZ`e\10-are)y;7mD@ HMIw?^W ɉ:US!닋;eP9lWwWvNv/ƴL'HO̱\[{[EUV [cPcS(C_~El)^r9].1˲+ˆA igv{G;жmIu5 :w oYn_Htk7Lضfg!!,'N0!k8P~ @< (~Izސߗύ&KS!O+FGoDٶmkgwmDSX@8wxs}BvNk?"G"ggTas0m?B5jD0L"BeY ֭쌏Kw'YPWBog/A<>Bw ]8<<40Du`56BIhc, mc0  j+[XʪjAH4 c |C}a} @fY4͌n/+mۈ!n=!-jL1  "0#$ܽCmvϙ̯O$'&vnAHuYQ.b۶w@ʥo0¸XYG{G1avwfS&wYcEQB(*"<òe1 ZxYjjJQN0ȲlUU8βl2BiZd  0`˲Nurs0ɋeӴH֒$Yt837/,SQT\.+[ My4LM%I]ae9,y۲0:Zu8P( ۲R;w֖q5kdaց~12-m8zilƼ Ñ'iҲc_l+)W^x`[Yٕ?B^/[ @.ꚪyT]׷VTVy%KWL7vS-JҲ2~3qN?n蕫֔o?nM+dEIKM E>l6NhѰ. 3fdee^p?HgW/,˚`a0Z~xԴ#SSRRR \_o2fȧu {'7cWr:u]*zII`Wc(*aXeY0~SLz{䤤5k75-HO>6tH^nn|\|jjJ~^ސ._j-ڱ;0us~:t0`nBD"gYC9e+VnV:e 7X<1G0LsKg_mni]r'ͲYo,++khkothjjnlj>aƱkmYWt:İ,{NBXh'.(~ J¶ms-7s9rÏ=:>>~μyMS'O:x79-'o٢jiyy\\~oa#6th^NN(b!,u?}w%}>{/G e(20,˜yoWx+..v@ G ~[rGU||lߟ[XXP]SFEeC$)7'+?/oZܜl02O"Xİ bE bDIxNr¸1GN:~5765{Q$x(;߈C$C˶o0~QGN=rDeUQ#6ntǮ\c~yEERSUe91\>5Z}TU#1?z#̫^3㘎Pem!cQ/]o*lY1e|{AV] ƍ1.)-9bѣ\E <(9)QU$My^a@唿4cvVQla^=`gC^|IKK30660---7v\?0 b$QH``0ȲlKKcO=uu: m۲H$"I ú{<bRm;`0HbJ?ھ^x}˶-YYfywݶmmԓNȰmr:sxTU GcYP($<PQ A` !?NA?Ʋ-2rdc`H$ipeY ! (r DQ`YXEy^Ӵp8z=aF"ߧF8v\H$zTUuy3,E{!4$.eK 9Ę%ᶶ·Mc]v5 9Q%~qqˆ,#۽t>}mۊ#BD"2~ENa& gww70PR?]q~]6eYsNbar c9۶;::BB^P<9c9Ub,KuC#i:E*+۪k82|ҟdantv) 'O b8!z B(z|CE0wlVvf5Wg fWwjc"Bd .c>m@o W#=wxsn[GS33۶,Y A xg}i! ~mmccc`¡R 0׏vn F>Haۤw2_¼|c 0 ⮾X=  =e Ag?Ga#CLVdU!dK{!$q\āY۶@NEDв0‘BMLKwtv>܉ dPBmuu M 7!$+rZjZrR&ax.˲U+.r(aSS 򷁼Yt8LSD<&7mT)6f0y2)\9zSE9B‡7Pi\ S(JJ?B:S(JJ?B:S(JJ?B:S(JJ?B:S(JJ?B:~!1mL7V[EwNȁ֞P(Asҏ1t C?s0 wP11Ƃ \P(:0 B,t:#H) rP.owߩ:=E4!daǑz$Qy_}}۶ǟ]p9 D̲LKk8]7nuR(_H?W$ikI3?/aśO<8a$#9pr꧞{zi PUնm!Bm+bX^z߼e˽=|n$AmlG"2鋯f9"7'[tdB9̡}a~ag[[[Ss]{QG,?c+1~옏>4"+\x~k23{%}WoضmFu7d_s!lcAjv`%KRR9kiiyW1s^a;} xAps{O]rх0 O a"P(?ΎƎ=wϿIwEG_^xo~}CÉ픓{g͞]?t/g~^2iyUM~~ab dC] }{,vuwM&w|;oi_r57|ӦL_tM7fgHx'ֶMx!$ǟvɡpl =ǹ;:0,jv 'ZDkjkⲓN8a?\UU/81ᢊJ4Mؿu;}V1qe4]s:T) {K?!p8~4o_EQ >t'{W^x~[ qig'8|І̬ [Z::;[[[`{GkB=n?oo5^~us7~[oKOKs6ž Ͳ,~ቍmr\r%IIIei(e;:9DI>^gAW\zIbBX366eY3=~~^4`1GjiZ 33ғ{=}>oaA?g&/9YYi)|fFFVVNǥ]د`! $'';zԈF..geY-8p,qɐ dkϋ: z<˲鐶!In8t:{^.trIc].B||p8- (AlYxĚ| ⢎.)Ic.r:\CtGuuwww\\ܖm^yؘJ x>d\)c D9Ҳ2ɲ(@7qfbbO??Ο?bЯgzÏTE}0_Ϛ%RQa?M7mp-KXbE(r7G1uŪoN]}EKƏ,Z4"GZ[ێ6W_\|M듊S][Ot >w%? mV1ӏzK7o٪_7Uӆ1Q]3Y]~͜5r}ŗii}dYyͷeYYr!Eq O?eنaG|_\rUlLÏ?a۶py@VFfWw[D._1aܸb;jj ϾKJJDٸiӢ%KN׏+MӜu]^76BDqE ]]s͛:yG~69%JJFmX|*Y[ZV^D }W ^'9) !Ǟ8.ǹw`823SSS 8<՟J?専HA @ È{⑇ ڛo=K--s/||l! Y=eY̛tMu s F>b믻BiZ>}&O0ek4͸[ngYcEKkj7nڼnFa60 1n̘Æ 6m*3N9`(Xwn0n춒 B~oŵ;wnPÇM7. o߾dʤI6ƺ$'1b҄quu&NbH$,Z\sC8ԫatcVffiY!:fԨ쬫._AADHtW\t!Ǝ=dРcL<뮋6qw{߰ȃשׂ{;;[n~2h`»o5?/W44FM ! YxAS>}׉g#rr04/0--}睻drMDQ=kTU5  &6&f1w_4M ömjZ TUc@"mÑacl{ܞii|eYm;6&w\ήGN/9t>N[okmm3 !=}vF Y%IeƘX#]2UQ-9NQdaX6ٖE|u !tHĄ/촓O m¸q8sxلtEU %99 ;gvJeՎEKeO0G'Z /2 6jҲg^xa22ӦNMH; u]pW]SsWdefbǎ]]]****)+{kj23x?v׳f}'{l\\ oب:˲ABR!!@ e!! DP:f?7z<+.d+!! p╫A2-iڈ`nNѣ::: `2lz׮]|Z n!X=q|̯A a )'(꼅 n+x׬k_x`(eYS&/]<';;!!aي/j(JOp8F/._✳ΐeyނ[>5DArar,"1 }5֥qa`8zqYgN2鹗^zqϽ/ک'8Ԕz>5{ߟhٶi) 7zs swws֙mѱ s>ɉɺmv(4㸺IJLy튢fd77'|>v+tHݦifqmp4VŤD2+hvCcS$arrG<㻺[. ĨJINJ2M\iDdu!ALӴ,KH$B)Āβlt:!5n;0(,p'˲((YDD0 Ӵ]a8TtmGDt]YWc릛~@`N |>oB|"TUu:$EI5eu!ޞx0݁iqJjP(dfd@Ymko7M39)0 e^!k|vtv#!)11)1ܜwT&&&,Ybcb1i4"砥T`4M0$-!4M$bs,n2-,X`Oe<9~Bw; Ǟ|G$ɶmFY0ƆaCm0Um۲,ݺ%,kiI+%(e{la۲UF<{-hLEe eYBdEQdi%8β,4$I쎕-p!ɻ iY 4MDz"ț@u]'v0 !80X0͞ĠSu_/\gLB*Ì_3gA!v]6a%3=1AWبR@ش,!-ZQ#4O;$EZ3=?^OcDWpwh}{vSY},0в,EQzk۶,Nilۘ+t_Q9dcԞR߭k|=g {F*1e_~X)Ö~=_o` A,h+^1tmf׀LñN+c!91`D׵Խ*w5M#F,F- G"Dy'e{ D"6P(,,'NX9-qN6d+^ H@Ԥ_ 9#?bd]׉%B07~[QԓN87bq̲,zĔ$b0JR `>Ƙ<+4UT`bbDdQCIn9|'p%RgvP(zڡCLٳjqñ,ekjk>Hb-eY$趒M~ r󧾡{ƌݡ{]ӮG?Z-\LLLSsS4H2---W1|ѣRSSXuĸu7:y!I LC~( )s\}cC(x܂ $I1v80fBh[VggGFzD Cm˶H$ A$Hᒲm%%Fhnn~WXDeI[2 k,8A$Iӵڝ;BIJB,`\smciY  =DGG#=zcO=]7x>p%#?8O8Y[ؾii]|a5My>$EJfRU2]C(̀~ /2flŊ/x{e3y>3#J5vWT\xy鲢tvu;rq3}s ~W|P(ԿO>$OKW5,/t%#3mU_n斒Ҳ&|l/ګ2xpIi)9.HjYeY7taN-Ƙp-%^P]S9ujiY' ;Wu[O?rڧ(ʦ͛׬]7gܓO8~Q55Ʉqcv+._ܼ|J^|EEg^xaMzaĵ41 }AZRRQY?wt)'5m7^Q\3~W^Su` |WA_yڝ;뮾ꔓN4Mv) ImII[J/Wn+ XsgJi^a =oaLKMMMMM{<8>!j!4-sa]}wvGTavUuuzz,4s }>ojJjZZZfzzJrrfF&s!e2W^W3-\s\ogaD_~~aA+*,(hkkoima׶Ĥʪ A5M2-A-˪oKMI Ÿ~bA^o\\ qZT˶.ӎxʷwuwq^mm$"{<>GM; [5rdYĄ$;d>" `s{٧Oe=p٘.ἅ }^^[KJ^}gqwvv ÌDnF k{;vLϽr8;.0,vuw麎 |0QoY&+abD\.1AQUIME c*e.`뺢.SV۶⺺sG.G4r?U&/%vLƊDEemAe۶N'B۶$!Pv 4v ˢ(:a,FVͿc H,_eYQl'Bm˶;$0GWpϿظiSLL_YGe7Ͼ=s=Rl &3}/g2Û7jLv;$GLj=w (M@*Ì(OC/H !=ӏg }ir$e{i JUoߨ=JD%[`<~{9L˲ogERQ(Ö^maۘaUO}_kUZ rzZP(o%û$.~/k@|iZoov2S(~2v].!ySk맩B j~/ /DW{ȾoS(En+VJr9,OLSnB @dY!-mC"NT ="\*jc !>4J!.=kwAl^]iFnF ILnJQ#WDj?k>t׎1Aydnp8ܳi(W"iJ7#jCē{/YϿXv 9^/󍍍>޴,Clt\~8ؘArpGt6..δ̇<CJ,ΝW_+)-u}>n;Ӳ\.^;˲111$5IV!H].%QdY666rٶq].(]˖HHHy;66VhI"KvhN36&vwtt~'n<'W5&&tb@(ÑcEAlim}'Y0LSӴ?ᐎ>!Cnv(vTϿqcFλ]݁s _{@@唔>HdͺÇ)*,4 q\ՎVJӧiСHdMCQ]bꜬ̌g^x1oک'4lȐm%%k֭6dA˫kj,k06+Wnhlfgemظq rꆦÇIM ݐ$ 23ƌ:;wOrrH49N?@nԔ/f~- 6ڶxsNN g%+33.6O>H8~\CCcEՎf{Դ#>%˖wcGr:u`a}c#rslݺfaC _5fȬ̵o+):xPjjjfF$ Mk׭KMM=rdܜCB98^?PV!\|ŕoxŗ:6mI`$I|Mŝ]Ͻò/Mlm vh3L4!YY]qǟ}⫯]WxywuuG"_zYVm%}UKkmwݍ1 CH$ZEe˯r_~퍝;w.Z>7-ֻ s͛ͷN˶mlO^hy}ih' N>%Q U;vn_߹/O%Q B+VzgwWVx;:[bśS=ZEDn[t:ym%=x}}͊tttn-)1y^+Wٹfm;?oԈ;zԹg! #9)iİcFήeWwt ;jj7 khhLLL9raIILfG5kz]Όc~7=.'W\vݺ[ޱm|I1~5r! @0hf0(( "뺢(K֮ߐPs /\~FI^r(*3j ,宮.QY>1!AQĄVG"2aq<6ot:^ CnA pXUӂn‘#훶nz⼦ieۆa4TVVTU˹_?uucnjr\F1|hRR07'y쾻}neOj˛֮ߐDVKA)Óq\eՎWxsEu\yE~~(.*+/$qK.;S/YyVEQǍ#I⇟~ai /oh1l(ؘ%K546/W^Q1i℮8mGu+rs}>/Bhg}K~ȠA#G _$yi%eeκ7v͚i8fʕ;wXد` ǵڶ=|M[n3jd e6l>dȨ7C:|'U/qکi_jǎ>)apd[zZ))5z'4r'D$&p8r +#t:M BFE~REa O^&X"h&1:$+#Be2i.Iҭw5i'Ne0 0 "$qtaX [FcY2<%(eY0 QCm1#" qi$vQ y绻iӣ鐃C(0 eIj,OP" N0 A໻wB \N]7dE,Y=XUUm˲1& 3^>O÷Q+~c6eI:٢( 'IfE̽eEapae# 5*WT5j^ImyQEq:7u6LQTrU ܣ ~YXV4hʋFU7 Pe 0 CLY#[>9\ ة( |YEA`5M#h:hH+HDմ=lz<6Ƥe.U Nj4SYQѐzVݡ)~Sp=#0ԝ*iϨQW C4DpO0֮rq_sE'^k/ y-=W?7ԣv]iG^^;aQ=S{]fv~3P(c Y!ʴ>Q\w,/ IY]-LP(L9DŠ]N(JσޒL. B1]n5BponY(I–f۝֧ŏ=57qL4Ͱad򶦦aA,jjnKHO0=Կ,FO~^ B_84_ZV uux󦚚̬h皨tږ 4M0 ƀh,0(Z/wHaѩ4)-ۖ'0#pMm%%%,qm`F״^+S!ɲr].jQ BSeccD_ц/V;E dٲXMAݹqHYLx'sa BPgX3NOHHؽ8-@iXr \b8mm^}kÑu뱍03.<{xPQC|7K.D>w3.}7lj866涛ntck^Wd1Jn ˲~/9)1..NS5_][0՗_V]SolTPԊSO:iyye 8_~Eȉ }VMΎλn7R5-';kΏ9~ƱÆ {V S{@ (pfϫ5 Um$I{Lca8^QYZV `ffӏ=&O0n._3j#ܿ TU=39Ͽ-YյP0 {Y^uk׮_vG1ӻY è 0 4M4LӴmK4kcV]{],]QRVwǎ]]]_" {o铚*£>GLxEΝ@Ꚛ%%G1裎lmk[f͐N=$aVر}-JRSR~~ B&DZ4 BӼX'mKӦIE߯v2'M#uucF3 H}7s͋c9.6&ƶ1cvD<O|\\GGNMI1 öLaByaN |^qxwG>..~[ 'Ų,Y_DoBC7&oQ5r͙7P8|)CnHHx<{<%QK6W^>fQ-p(#==#=|Wjw4 CP8leZ-mcFL;adg9[ZyEGAMUUeX0`(4xv = t]`(nHIJ,WYjUYU5{n,˺1e~,ׯ_AA[[[>B_8ȝ $ZmmmacrsH1a!YQn+40̌ I,ꛖV}{Rbb8,Oj*BuA(o蓚xTU]zM8.*,H %;)ȝ@[E"69$%=^DZʲXVQap>.E;; R( 63Q 7A{xR(oH? !2AŘYm"6Ɩ-6m ~&}yiaڥh?7 !` XcP(oc"Oyxc39ֲlEq~ɰ?ތӲqp^BG88cE ^1+,Ļ pȶq4>VLAn ;y%rnOP(M$UGO FI] ?S|N쒒VMʜ#k5)7)T9fHʩv4_VͫMn8 N.J_K!XdXзrۥSN՗cЋs?;G߲#BZ׏ TtsN똿Y nH O1|aV[,ڱ=#<2m֖][_?϶tY).϶dt[#ySm`0‡9>XV;ǼsKfK_Zųv) soc,LEShuEǣ_,)iY[Ѿ[W;0}pqҒܯ̩*ƹ3Bܭ.}Ο7ֱr{"=IY.۰+oo $vcuw1A~o6m ŵ݆i9 ;#["$HT) 8 yQsjQmkw6t4ġߞeE{棋o=}2wKu)4d;#T3✲_|t^\Z##ٝna-}bg uݾI ݘzʑ)lP/W B0\rIRRRtWe;:ywܖ@qrbs]N΢5m~1񩱎~渌$MMN(I\~7-V!5(yH;Vv =8yޖ[ZlO.JO|5R70ci9ON 8j`3RMS_imkz<v(aZZZ.r'R BqaAl"uɇSlYʹiqp!Xgicݰ.-V gyYc!`L D"4F4 FVrN pt+AȮn1 D k@fAe͌hH=w! tۂj- H?pcL{ÐH?h0Lt'.ϣ;@gQ(E0 =;Q!go'c>5;k:l˦j *?a'ˏ$$'bS(5S?CV:eP&Pѧnxެ 7ΨR(JJ?B:S(JJ?B:S(JJ?B:S(JJ?B:S(JJ?B:S(JJ?B:S(JJ?B:S(JJ?B:S(JJ?B:S(JJ?B:S(JJ?B:S(JJ?B:S(JJ?B:S(JJ?B:S(JJ?B:S(JJ?B:S(JJ?B:S(JJ?B:S(JJ?B:S(JJ?B:S(JJ?B:S(JJ?B:S(JJ?B:S(JJ?B:S(JJ?B:S(JJ?B:S(JJ?B:S(JJ?B:S(JJ?B:S(JJ?B:S(JJ?B:S(JJ?B:S(JJ?B:S(J=P~ ,wHB@CP`].,KbPQ,Җ mc _zB0ƒ-` @b "!ǞE,dJ9d` ;]HҮ-W] c5Ǐ7FM+g /<9CEipgD2gAe1fYp AeYV5X$Ie˲l恎BѢBccbdYta Ƙ{aׯ[@h^|1NHYvv6vv(04m0ҏ1y~%|(Ç8mB1FڻBUӺ[[bc!]i LûSlEoxWl&¹g5jpMYm,痯XW31322N9$˲n10 BB˲HHUMniIHH4p'1",oI8@ 0LO4z&;@~4ƀeas[UUvx7/7r!$I2 cLYu{ ƻ,>*EmO8\4ڶvyҥag'ljU~=?s&iѣc6f0G"u|!(~8MEIMM=c;::N1syǂЈ>3]ׯYg7^u]~II/ < èix($}λa|ΛW44yy/Νu]] o=ȣ];`@0t:-\˯88#=vUUǍ]N#%%%},ufVkk5_'565E"r0|**+{fUTXq>+?ƶ1B9簛7;{O>uuhY.L_'ԩ`YFg vvbvFcjjҁc'!4 ))]W!iꪤP~bs\P/#^|7yO??fM7kϜy͙;fs駞\ԯ 翷 2{;KίnæMu=+14͖,qz7[Z~7nmms{{8[.p8/VUxf==.6-`(ޡx~GGGd{qRSR>㩓';MM{gzw{߰CA{m S&qO=agfZkWAM<4 r!AOm`[8̱3駢Vnb`c⅄/go!&m~TIzZ4L01@@l_^?eirwAL(JOL8wUɓ?眥˗? IcGwڵ?蛖>thcSS86 3';v#?n̘ L:wDI c/]|p%?7wA9;)?/oĉ)H /qGC?[SiS:>cY˲Y9Nx-*,m7TT53#-!.a<Ɔ34111`PXP1?huy!aNfr_?೿ɸ!A xfVvxGcTUU/ļnpַ@ׁ U‹mGҏF,v~7{,kԩYIIcG~o.덷mmkohFIyyN<|{ԔQۃP 3 =i[n_7$Ƿwt\{3xڝ;3ӻ}RRʷo;MIKHRʟi /:sփ}X0 v:=]@vbvI6zZA? ڴRfqq?)1ɶmIBH$b-*+" a*BEAQT4]N'P7 ]e(p8 Èp8,UM4MEQUEQ5tTpa!/~Y y&3ik~+|123`L~')?_d]11A0,w{i'4eҤp8 vg v[0 qٍӨ.%_!Bh& 6 -^v]vfq3u9a'I.r/fz/ `m>P4+--r%y1o@!xݰ80vJ U!WHbnJL!e&7C8LKVvQ>` UU6]unmk9X7 {_%^f<^TU=T[X9auURz)Q?AhQp$#@, ;N lkoMINq]um5pNr$n gg<;(.<! DC 061e жm0|^t(*dNs W8&em|>0#&&&&t8**+|kzn791v:=jL6W!<p\^eYIq\0\nC|\0=LggW\\iX qNiv8G15)1!y!,74n' `Nv n#|(xw/>돪307nliiTU)B+::;ǐAۼ%99iЀ;u]/޼eŪաPh#Go!'n>Kz,tŲlgW'n۲bY;н|꩓'z],ˮ߸ie11?x)/Z-mms͟2iko~Uk֤ ]ݵ;!}SBu ws_|\a㱧9#~'va8$E HOG>K 35d~;o>Kye 2Xu0n.4ssrnMEYaCFF?ε,+-Ok[ۦ4')K(JΝ׮2i}=l֒ 6y='y.o_YVr8o~D>Uk$o+-5{пny!aH?1G\.P{{dENIDATI,^ 232>y lnjiܱ7g<^;ڗ,[6q}v/\w</$'%&~㭷mt8ʪ[ommo_aC7u))^uդUM8Ԕ`0=lȐ>׮۴yqc㓓`nNCvI{̂E[Z,ˮڱtN0^s9gO?rZeUDzd$#=;??繹Xe˳2x'{njn3 H$hRt'IRllUe0 0fgq/XK/햛f1O]Dj^p8[Zxu=11_˲ 9]}թ's33{_t ǎ5?rqw9g_y٥Xj{EƸy/,[ u]c.hNsg}}^/s_}itn8"_~'1$I'M7߰cݽj͚?n%=MMctG{=xm&ԿU_7ɓ?캺zUӒnqU}iNV%نnL4㘣?s:am>YoYF"L}=5ZZ1ab CږM·Nm5- ccR4ϯ(*YerGUWw7QD+';[oojn>v?|nwNvMdfuM. <;n3jd 4- BBiѸ.e]v{=)˲rǭ;&eɲDi*a*۾-1!^Qp$gAlN~g#G y4MCᰪƦ@wwyv׋mVWWoip8c $Iry7\3O;5XMA1B=rAcB˲\NW`0 a&}y0-2 SQP(1x2^|_M^.r%jhN9Ŏ2eƃ1 4M#[ Dش,UUkv<֧O]}Css֒Ҹ(ˊVYYI"Yes@Jn\s(++ * S!7֏1fY&66Að!y8᧟_ /;(w 4nq8q/ q8)8Ia q^p.`L7]4@$.֙Clc ó۝mߝ}EʲƗ^|qUk@eY5cڋ*1++_|5s'MaQ -NL8p֭й'*2kƌ?륙^_p\زB>긜N cS>i쬬k^ohl.YBhWfϜQRV m7^ϣO<$1!AZfaA{vUW\n=n7r}>񊢘s.QǞxgY3S^p`lCN#=-+~|;;&7;[;l;pE;@K1r(0f~aPgIj“u<9 m&@#GYLe0N Lg1†CG mlj{$crbJINfgLg1cM%hE3E! TU‰LgLg74LgW} u!1+t UW$&B68`8{ͥBH09֞"^? kJ;&}$[uE/cZyҕ|ngn"3BD12P?17H$H&$ Z4 `vtS*NZ%(K:x7Ķ+eIp{BL6ESEؠ,\ vے ",49eQu@,Iejb3z DX.gi㠪r B!z_ۥl8N"~ak722NB1!6Y_QqDfN6k"XؓԴDQ1j#AVVJ q$ibair$w>'P>Mh=xt]@]i 5 n}}n|H*3?/oFq!MBiicK.( G$\?w1۶o#֬kniiNW\FĬ믹Z;Չ* ΏBHm c4EQܴe ,gϜ7ܵ[Uk!;+;fԃ<;(ھ_ƈ-L02g՜B !8]7n&M7?~-S>h}Cw]v=/޺h 22~{fNF95Yӧ5J]wع+PIjjk29}cGu5Wy,[w_7lܼqA7O>?YӧmܼY%Ƹ^Q/Į(/Y(J / θy^{5̜>mACs~'WrCUu9KayOv~fL2mʔ~EE%e{;D#| 'OXq#/Sw˲*񪪾{6P蔇?['&r%%_3 ]1$Ir+ޟ#8p yۭ.]w>]x˯DF,۟te pKeal I?4~|C0%YUUE8z<,69"EQqȲ,Ij&&>?5] f͘]Z2q9~ot72ME4t:{#Ѩ {\nMy yA~?IhW_^|MReY!ƓƏ뮚;A<&Bt8.a! ^;Ȓ-KӴh4j|X}FoI'hD?e8`@k+?<<Ͽ;kׯ9nu"{^(,(YXl ˲ǰ[p3?f:o򤧟~PnnaA֢~, =7ސe甖m!҄sΉ ieZ縶_{]EMx_x'-!1!B8f7shάY //86-}?aNcƍ׮,nw@8.X oaޖm4MR阳 mmkZ,l-1^V\sqaTUW'$$xnhQ^Q Ϸ#抃O.ӲjYٻOQܜlU!N%"iY^>8PY/----PU]m崴`0XW_߿_?UUEiHJLyUv[vC x <֙ٿ?,gO݊Ahko/+ۓyBOfG0x~]}}$_Q/=-5%t!gɧ=y2q7m, @3A#0!vLJNJRU5DrUs禧eG; 55~Bl|0HNJm%h DFEE)ټp y-[`0b1N_3A#ܜ0LeYH$3#f'MpI@gefBQ|СaPPQG 767M<9 ɲLR5fka a7OЈ1FgZVP($ ⌌=KyƼy`ڔ(9C4 j{ Fq8pzP~:~B}B,O(+Cロuggbooθ658~?!:$nܘ1zD3;;8xt2P3ёA p, vFVѹ\.~B -xIJa( tZ&r|̧+0Mp;oFqND{Lܖg"!85%Ӧ#57W6lhjvEsq_߲F0\8+ :IIs+kـi!]B EV7dLg;ԔTy2T Dy84eAM߲>>*+=l9hi Bd;Cܾ} %טroa̚El6hY`QA^O(/7uN,/q ~UM5<3 *] @ 4U3:{+-OspB"8#n78-#Q@(?ч8'&_h~>wm[-!c"IoC55b w9pTp1{ &%%1ge@<[4'2M@ن$@ Mb~^zu/.:v,y Dٸ |dQTFo{QvV*xO~Qm`! "#B@׽8 @ǝK!{Q|8}qW7ŋ+V!H[MӘ4I;E"aqgK,D-3V3JfyP9&^k`  ?i[[ X;?L>`#ILSOв`[fAp`g$̯q6[$=k0`W#+YR~ل 4Z>J8'ͮO58K:oa LjG1 8ZZsw&kcA㯎~ܦ^z=QL:hƧ4qښP[X?uC?^ɉD?%< UMC*6[Jr(J́3~@ZD"zF!f6@Ľ>躆1'MA|"}J\Nle]XM=WMʁҳoMU^ 84:(뺅WC4w` BPe`03ca{CE#@X4IƦ촔DB={rrrvظBnWAhW.qr-)))<Ϸt8-lu{fBHdӖe{EA9+xMi*bm]]KK,>4Q -|}P}Dvqܮwt:mj@pˀ" ]h-9 u^LtK, 8D}@±X4.+r3҅xGiZ !0<Ϸkׯ8tƲĪ8vl6ٽU֒X;iBl^Qh2,<8YTM;)=C 98ÑVq`?rќ? VUU& UVU7>WSc8.8P1vXǷ-dfJ|ORRr;wӼ]ekAϽc8kjnrݢ tq'b%I>tOv?>vx<+a?Ez<~r #'-bܲm^zlmۋ~'-l ~It8:nŗv|>Ih.銟x^eonwYvXPMMRRa$%.3 V%1t:EQ9n;/4M$Ud|^u:^p]U`YւECfK\NqǞXXgo(|~OQljA^ﶢϽ[rաC5I; ˙KDq^Ia"8vz9<x';:~ ^/}C3p8dYnjjZٲfYVfFf82 4h4]PF  q !{}Cn|nAO4Qzm㫫>aًHIIٔzA]$bCcowv?{Eȩ;5qB`a$•V/[[}o]C B![dGv)Iv ~IYO.JX7ޔ$I+^oo]\r͚Ʀ?tMFy˕c_y5o{]eր>+-{9v1!L !hGj>Z(1-oBJ>Z$ɆavnWRRk?L!L&/ʚu^ϣ -Kyc"I}q󖔔gZY,k6mu> }lǟ\V\K0[EGkhe&.>qmmmW\~ݻyGeeE ⠥-dS[eŻna§Z$+k֭y<ľwq&sO !I7vM{@k[eY/4U7s f;uuPTU$ڈEQe ($BI7 d ϟ3s,Kӹ|CCcMmm8+,(=rmvm51Gͽ_nؘZqq{۾s뚫:d Y]}/S:ޛ= sԩ#GλoyhcsR&Я+ӧNMLH(.)mll [Z&'']zEYTMmlju-1!QyrXA~dΜ>}Q 3zCsmEwv\_̚9ò,Q*,_ x?TS زu[UUy^C&ڑRSS>lPggj]#vLpbBB[@kŁ׮8o򤺆qޤIE;v~lyVf,IUՇlݦUIJ,r7n q\nt64՗d咣%"H$$'% !0dݿY7:od[)))G UH$ܵkm|^_jjǟ-+..)߿?h΂2NÇCZ0,hGZjѣ>l(I6nRYUvo6nڲmaGljnްyqQ+JsKh1io0k֯OLH&7$$$~0;棏?>l!?}Y2;:}P8t 84MVV]y'} ;:n1b˿bii x뮾j'fge}>˲֬_oY^Uե|jW}9khjzVVΜ>}daajJҏ?%T8K/1mڸ1ck֭u47|ŪC55yCF"Q907r1(GQ˙VVW''%]rE6e/߯mll;z_QgᄂS e8p9^49f~,}PA Zc g͘>sW9㸖@1饯>t({gfdlشi֭e >th_y+^>sTE}ٲo7n̘h4Ov]VS[s׮#GQILMImii)-+mln8PyPEŁ‚ 1N Fb2HyoARSw;Z[-e{Z;f\B].WzZZ :uyGܺmۗ7͜>}TUnfO a9Pރ6{jrntw_Ӣ(FQnD" @ @)eY<ϩ&IA4Y‘-ASU!IL9unw7$. h$1M!!`,J5R~e *vE1:uMrMӴlH: JarQU@gn٢* oǹ]:n]93tݦ(hyh4M~^躮lhF'Ȳ D1DQ زlF f0Ɔa`& 8?< f4(I$/hF(i@!BHDQzbGJXQz"rKKjC7.WlAzՠq̣qSy:hFKMIMIIC5}B$Q$3S׽لX\Z?î8EĂ6%϶%PgZ !Dx.o)9սgt &v$צOUGQ{p=1'XMt:[n{y9Qq<iyƷ.-% kyt9v~@ɫݮ`i;E&BhYX^{ϻF#0^gK8vz}Ҙ3"^?!|~YZ^G$8GK @>.L?Uבf~}|uIIGz{u;ƣ!Gڌ1BHӴ{~c@V^Nlـ#ZqXE%G7>~ {a:]qF M@ wbAkՌ?d 88fYBl Ɍ !D%3(z~V497Ag< a0pt^! HKIs9]Ӝ2o!$ "33i n!}C3(z1B 8 c0,)̢a^ff0aX!s0g0>~s0g0>~s0g0>~s0g0>~s0g0>~s0g0>~s0g0>~s0g0>~s0g0>~s0g0>~s0g0>~s0g0>~s0g0>~s0g0>~s0g0>~s0g0>~s0g0>~s0g0>~s0g0>~s0g0>~s0g0>~s0g0>~s0g0>~s0g0>~s0g0>~s0g0>~s0g0>~s0g0>~s0g0>~s0g0>~s0g0>~s0g0>~s0g0>~s0g0>of(2tBx`0S!D7u4yCu&  !DE`0L `0L `0L `0L `0n`Bh@ @R0x"!$Q.FHC! !c4EA uY3 F/t BLP 8R !DI2` !`InrTL.L 4Ծ7~@O1~,J:g`0rdi4MoU{ tx\b'б~#%2g0PǎfY]3{Q]G6 ~):( ``0=A"Ѩ:JTfyBU UӨ#>ze@$EI?`B?TWD3%&$*x?U-Ӵ>I?`t"rzZ&d,] !6I?`aW=^Oi˲!L 㘜A[#`0}& 8'f:u cydݒ1!i= M;㊥a0%)㐮g'+4f$IزYnen!!>}%X IVV%&& jKK`X̌q{F,Q^bMrnmm ]A \{w}\yass?/`ذԛ~pCqi;ouʕi͚1kٶ}_~7wdݮ0ek*7'{߾۶w]{Ud`0RzyG_; 3O{mɒǟ|򺫯4pxajjkȒq\4gFp$GH$  `%Iڹkwm]ݸcd665D7oْ /9}R07n<~84sUM=cFС{5rDTUZLSӵP8 ah3ޞG=7l޲-oȐ.ϖUUWO41P\Zukц͛hm0@ `f!UUcGAx i˖~&BB_Ӵ_ .)2d֢Ӧ}ةc03:{n^EQq pr;BHDQil$Ii.Bit]$Ih( $F9l6[,t4F]NiAc -%I~bA48Caʱlak:D<=d'u*u]%0\.WmmO4֘`-;w EiP]4mيW\vb,˦i HzGQNG*BPuY4Z ]Bt*p$FUAaZMJh_UUc!*4M<pBt`&r"fۺhͺuMͅiL HO3xA!:?aޠH$K!;@:\Hz]['ZHM|`8:sw+84ayy`0R:h3 ~0jj9 >`=n!Ht7`0&gAMA a cHRMz&u0`:pQ<bKGDIDATxgEǫ:tO؜s&-9'1|z{yg8sΠbEE$Jλvٜ'wC*p(U5G|7v?C?˹# ?J?!n`ͥi,8EC|lckW8LSsw~&n4ECoN|{z'!&v‘6Xw)FQT!cmEQ *˲4E,˲lc};?!Q^G) ya4&N28%Ji;(_7u@8X0 EQxv{c:@n;oeӲlt]SV_W^E1Uz<_k*_fO^Zױ4CӴcۆi, !(2M˶YpKA dYm<#t]i9 @H7 .# qkl }{Vod]~@&|%H.W|~kfjκz@8ེaP4 S4۶!adwD˲Be!jne,vEQ)BN׳ǝ<3ϻPAN6CӪ)>_ynV4E1 8NVzp[MG}74@(9zrܚ<`csK{WWb\\FjJcK+r$&.b/=5Y4a^]m;qYm*Wޣd@8 ahmʻxEz/ ~cHWpc[VzJrnV9x! đ7?(>FHAl5_~;WIC/Lx .-8z/#~q1W7^vыowåd $p?l #gtW,{=7_y 0,,]fa˟~uq^ozJꍛ.Qyӵ>jS4mʻVlqam5}.Y|emC#24E?[nƦNڋ&i6ϒ[~U-mYN,){w23SSʊ nPQա#2W_pވEטC Ms2 X|9s,C88ah|#r,0, 璳OO{WyJ.8ǎjhi'o G",5UL˾K'6'1w[r4 y~ź[w<}^7^a[R 4ʹy 7lB K~Xf=`} wSm Ç\iճ.#{s,߻gk{'_Ϻ7$u˟2RB \`6@@x媻#]s± Bm5[Џc'OBɒ3O 0L&)j:q!2,ð4ֵw #Kl2tOTMszٖh( mM-m{h9xI,|)!aEy^y0!M ɭzsw!8tiq 9cY4 X nK0 A ()(\= WCalf8p7c`H\q5< .CӦi\Ʀ~Чw[GGTQ(7B<1 U%ZmqvZbClBEqUFqMA~lw8!DSqMh mXakw7JZ!Hy-xn9?[!5wiA~(].,[/qG_tiD?r s Pl%s7mV$m{ҽ쵋Dmeِ܌40?8,J"6qȲB(f/^2p ~;Ʉ8B`fI^nH4zqdRv4MkpY%b膡j:MS,+l`Od! ?Z ;؟Wci BymGsO82!-0W*m~BFL 'ٱ~z>~l!4M3#=~<A4cC@IH-ۂ$~w@,öwo۱Ύz}>_fF呻@4Ewtvttv$X? fK W0Eɒ,r7;c±0A%B y#(0 DQeI,˴,YCL x$kFACDQTbBbj!3mG`tIB(bYee!qN&" )1IJ#011YDZAsW᠉ `q ~HQT8IJJM^@”$iv⥨#8s Ƴe@Dzwzsv1'/Pf|^/M!*o<DZXc]_0:vE tC::c tvu2R4-,BmIɫWwu%%&;7GYYD嗃z ]9BcH4O"xá.u0M8wEQ[fhv,rv9E!M(g=fB @UU8N_8j) c2 UWu EAc4!)ҵW^,~x񆍛njgYMӱ88x!P]x!7oaǶ4`hӴgڵi{ꑒ,:mY6c!Π C1 M#r+zZQpDY|9N&BEeazdY0^=z:8 ML,9,!K@M<3@ӴMK9aOqY/\އ565uttݲ,IXPܲ 常8IUy8%enqn78i,A~ ?f脄xHAQMNN.ð@%7 ˲fhI|>$KgŪM-IIY>,K.nqݲ8ҐM ˲DQj7K.x޲lq$+s\Ȓ$},Q<Ϫ5k9yQ\.3miYxynYerv| $fdM}sEkWYټ%7+_v{1Oz![Y=䉓=2͹Dsﲋ/b𦩄Ç8z9~+/سt֭7/W]~\GvhnlKMIfYN4MKK&?Ѝ-۶IkYSi˖Ԕ6vvuL:l<"'3 1ڱzk=ǎ3ҹPik֮s=S <+G=^'Ӧٶ=wP8j͚w`23[Z\7l4lg_|me(-}w@UU;323׿}7_S'NPUm?>40i=N;)=s5v\& D?&%&ed+/RQtcFp;ัcfEʒ̱lW_QeDZ۶=ۖesqcOCv? yy۷>=/1qc~3koXa-/Ny~ܳΜ5{Ζ ,ˊ6^1pWuUa_0굩e - 86Wxyǫ/U>C̝2n}u3giimI7vLzzMTMJLLu#.7x ߿0 H!mu?S9ٗ]uMNvO?qr]](04M34s>e%FbBB=֮߰sgrss.:5kIJL+.*YVZS˰}^/MӢ(ege2  ))"LnP~uq]uUjJJGGg(D#@@׵`0do7BiK~g|sh)H .!$'%# 6d;zҚ:x/:Dq+6mR_ \'}Viqq0Da!0Ѩn ò k:^޽x q]y-YZVZ{Uo_jvE$'%oش19)iq ,F%iz^P=#hNVVjj o2|}BieOEӴ*mYiZQ՝ n 'AJNJZzMVf#::_S&䧧66645lVv9ٙ'&ħض]XP@AHrm<{<l< !T53bXfŪUÆ yU6lHOOz=qquu 0oBӳGOk r1E ӿoyIQ8CG)YH$/7ڶ DzIrðuj2 MoYiUZ׸wz\}Mkk 0!!Mӭ1|DB\ix)%(Paֶ'y?wK$eyGc;N4EQH$b&HDrtprB!#H4v3rs(G"e=ih  <UUz^*W\ʩV`9(߰av¨D7n{ҥY)PqUUqJTUFxߏOi: g i:Cb!@N1hH?m۝1)$]|˲B`1 8Ngg'EQ,FQ!MxY4:c;dIfY&6ق7 \.MӁ`0%`fGG趑!EQm8瘫MӁ@ v_M?aW @qA2"F>?:E(Q˲$A۷Բqeewdc?ѣADPw}(*MD(kbkk[fFqlƾT24vph vqĨ} NNTk[k^ng~x=CPϊ&sǡ|q䤔E  Sٙhh=s%^9\ 7~ŗ_0q>K/y>81Эmm3f:픓SS Ä{8mH 0#x^E?%E4M۰3N\.Ӳ EdV<‹/>+Y<@4qܲ !{rSe;xQS~+/qӦy4=-u.Q:ȉF<OcS/<@ ix@8!}Q~ia%r-9eI t<3N;합wtv>Ï?*5W^_Wov_n^xyM4;cZfYI5k nz k_`Ѣ4a[[[_zƦ'p%^wϻ9}ÏJJ}'~4tήF;/Ny3N+'LtW^~[xgw݆wnZj ?/\o5K/}>y޽z^q٥3frS8șt/L~e3g_nƌ3w\uycc/oLL A@¼B<_zC o麮9z7>o7|O8tҥ7n,*((**a9gVTXs|4MNJt9Hdku^w::hB14gUL  u ם}3g;4MK\.׼ mnYe}zynɝCAbJ8A,znK"O8J[@E\i_|࣏dg:Ԕܜ}>‹/ 7()=S5]+;766r,;BPGgaB)M::;Y}ܲ>茏0ė:sG|޹s미u6y޼\0 ~щp@_s5me(a],Ê(BfF׷kIIN8׿&$$0 CQz%ŕ˲T޻)'ee%y9iie%%^(';;QZٖ|QaAA~eYm7x$Ir]{Օex>--mC 2x?8wĄ< R^c9Dz# Mӭpa@BTccܟF |@ *́'E,˲llJfZ͖ pYݯ}7q~U]šM:#hI}ʃ A ߇~ahqH ȴXO2N8˲D|Vj_/cbC!Ai+W{Č[IM ;*q~,q#"^O8hp, TM(2e׏ ,˲[[NKc~?פ۝@8&9=h4O=}х <8,.QdYGquDAf9$I$Ir546|^ MȣHeY n(9ǚ{w֮ߐseYEKɒKS;kj@bb-[^yxמJ<{>x_)!DSqcY*nőlq$ʲ/JKk/}GxrnYAnYe'X*11iB H.׏7%JQq%I ?1qK8u9sn۱ձ+|75*.'p՚5Y.?A6mٲ&5%Olڼe^7^tY^n_~%˖盦_$;;VZEǃ(CUXEAzmnljz3ܲɴϳ2E}퍷E]|~}iaڵϾm;is//[CB|O>8kH۹`~n?xwFȓOZfgm_>tZIqqjj E֯_h$Ν[RRҔWn`Yg73 }z0o†F?0gqc~ɧ3gϩRQ1xa K(JKk+#he6m"IKM(':.X0{H$_dddyt?~Qc[o>ֶ|~L!CS|=s&0,Ι;oKE嚵{=F1tcz-B]׳33ǎu˜&˲^t᎝;,\TS[nkI.8B2%5bذA޵ׯ߰q@~n[7t$ :tA_|]pڕn5֋8jĈNatu't 9{&ogvj/CAXmی3/~'6z۶o>99i֬INJohnKF{Lp /njn;f}Bzڅ^EQ9 |?n`y6oaFU~}{Ʌ{١p6j-Ν||ntn8`PzKE c86xР1F[ƌ5mh47\xyt4M럷Unr 2 O_[VZU(| W]~ÇW^>rذqcz-tֻYOymjW۾=_y^=zw]%E[9x‚o!x 0 gef{:>";7-4ZZ[/+/tҥ pg7kfÇ{8u=8mٶ`H4ȯz0rl!Deq{*8NB|c=(??L|KeŰ$Iz%YM ʼۇ D(27dٶͱ*,4M3L8vl0 U5M B]))7]ݤsΉD" mԈ$.}>91)7'G4Ӳ"q qSUkB۶Uؽ4 .ףޓnzxv{}^_<ŶҒzpGMͽGisgY JESx0i`Y=s!ww8EE!Den0H$ JC8p뮽K}񥯾)KmEaaLôm @q}`8 ۷vǿyk)ϟxV/^!=--L:w -ܚ3z|GZU5j_z)Cܺ^iO24mq㒓7uaX}kjkBÇ(gϞ[>5y9ˍ>3>3N=511y׬]0MAqh) `yaHA(( RP.of{<f?+S_We@[+VB!,PQaC:;;iA9qĉ+VZt^ZnEv#GLϧ]4ES48TU`-^aŪ^y5۶} c/]ZXPdٲ^y5d\AcٺUU322$,3>>k˲@,׫rYeuv.ARSR8MhiYCs@8I3LB|i8T˲F%ib[x4`Ymۢ(FQ$I p8=- ۶$ BXS !'--McCQ@Ӵ M,( 5DѴT(k7MӲlkw}hnXVttM$Iu8' 74|ޤD<%bF]}!oQV !B%Iq^?lhhII,CQi$0GDY1LSy;:rr<B( Z h^n.a˲RSMdxggWW||\44467ΚĄEK|3kUW\i?>X ~Si˲LӢ()ʴ,˲iq,0جW lfYe!6kx_xs2MwOq۶ogzQ8k^X!d(8,jϟ2 ]ivǶm݆at%m{i [$V1KPl74ض ӌg qb#wWزm9m;EQxUU=nYΛD ^z躎mIYm۲,l.5{b%*ܽqx MiYeq)#\.;iB BeMӤieӲ/bN0ܲWc655CA$%&'&&݊m@毶m۱CS[&ZL Al߾v>M[6,->.@AiZTQk|B/5׿rkSTm;UU9y>/!$I9Db(~\vJژ;!%JP(XQYazzz^'꺎V- [C,GQ,2F\ aMo- ôwGѣF7ϬtycK|rׇ`5ikoŗqO ׋G30̊RRRR({̂=3!jjwrףkSRR!+**ꈢy˖gbs^KmlaQGV\տ_)g%e%n]jF<4a= 6qnoy+Wx>A7/OFCƌ_,ƙP(O?a8ZU]kN8jضËn<픓@ r~:gojj xgeF}<74ǂ$sں 0|萌tan76zzͺs'\(8:4645a5b':-Y,))qe---K/gYW_ݳ'EQϽ4yi0~aص4]i ;::ry\QmY~[겋/qI3af|Sm{bb_|_a`W^ճ'𕩯磌⫯oO}e٤O QM2IKMݼ2?+Fуn<஺n˼iQSOʔXUR\x܉eI{VnJMI2x2iMoFzFVVV^NNzZZ^n˱E1 s c| }1}EsV| 8(-}w(QZ&|~}#8)wly˲myt4 'y&&&Vo̰+8ĩov]DQPTdeeN;ÑV :%94-5e@8X~^?eeffѐpAϼćvCd]0?-5Nթo<˫׬uiE?`YvЀ_;n߹s1MM]]̌ Y~/EQTM50e-ZA [[ZWYAѴv.WSKeKs xͫ@R077vҒĄG"Q\[EU]cwvu)J(m;TlJtvVjwuvu=E`( 5aFaAA=DQ8`@>xAز,KZ)%,#KK߫1+*{/NS.4I]]]7oNKKchz7WlVݻwH4jή]u_',,,(*_d;JKڧւǪpqptU[o޲zG[[{vVnqQI.E4 COLL(LJLt޽zB;.0la-_s è;ztYiIzZZk[[bB%^[9󌊭U II%%E[F ٥pw:ȝ ᰢ(B-BwAQiqC!EÐ)v˚BeYf&Ⰾန,C"(˲e,\P( 23_<%;~K4C30 BDz^aq[146߸\"@ (x'p$MbѨ,؈^yUDQ,KDȲ0 C4YUuok˲r4]Wccr|0^nt]cB jTUgAy8QEqG$㨚&"EA@(ݲiZ{nEKD2-KQ#}WuȝC|kclێv.IQ8T7 t8`OU_-Tr+8zg֭_W%&&vwxᳯkA7wW̿{Gž4`77&?S=ɱ9DCJ2Z~Qơm>\`qg42 Ҁt?{X@c.`# mO4`)UoߨݣJn[`wO6m۱1*rQqm8iMO}kU[p9t@ 29wq\_*21v:~veYf B~5~\*{XB8? `kkU 2O 9 l .[.baA,KZa lmkKJL¦)`q!78],q>\x˅[xe&&&ZȓOF"QAqMm{͟ka|8[$˲mYǹɒwpeY$)>.Naݲ8˲^7>.Ne˒_NHHy.VKqC8Z$I >6 8qU%IBLG#G ‚RQgΞi#׮ i}z B{]]Ӧ)#mPRT8  V] |q4M%&'y9GhllڶcgKk0ď?lђ`p!$˼ T\Ti敫 ׯwCÆ [f͖}322rsDQhlnYzuFF546446 A!+//.,z]<˓7[%}n.' +]q`(8eٝ]]`O6Ӳ,)JQa֬[ѧ565knY~7*nn}B~ 8y[**?ֶ!Ñ00ꚾm)S_e^[xǟ~f]D̝;%Yv9S=Ҳ^<'y6 }~i{{C=2թ[eIl;? ,|9㛹H !dY6EӆaW/]ZYU557?[**‘v(O}JK<'~񒎎P0Դ-KFkRS.tIN+/dg_5qqq;v\|M7\`kwwsVJr҆ wFʭUk{lܼwqw#5k(+1"s+U9;b+exy}Ç MMI럷|ʭUJTiooZs\yW\zA;::ǎUR\t7z<q,*+)\b(...^tY{Gg0jjj޾OQ‘HVVVjJJVffsKKa~> ..yJJo/7^w9Z5nk"'+D$Bn‡e斖m1l.ϟxxYM Hvg0v4zڂ|k[VMfa( Zmf]r4M BhAz}-^~⍛76b0Q>䓵dgAIH_xIcSseU۶=wt\|5K/oh(.*E54L~~ Hti?bW^WзOnyYeqک55K/գG{G =J׮0jֶ6q:h-Æ Š4pڵ2hs_}]rM|;x`ye[pΝiii,bKNVv޽|3gZ3QZRu7B=..NӴP0'VWo8?i7''[sgͨ#4]YS3d U|h9YMuvv5bV=jVY3h@5O?Ǝ;j-гG+>3O?W_#5*?/b+.c5M7457ׯo5kf{`8>!; G[PDdY.i@B0 I,ˊD"BF~R)M"&R4-ltwNF<Aa6t]4-!!0 QމƏ=JQT4!4g9c&VV,l^_?YS mr)B8v9quAXugxh! 88.-§ᰃ4Mapn CƏPR x$4Mݥ0,*r8l8w48Ƕ x98'G mۢ(QU)I8Yel*M. O+ng~]bF媦+qzq8x^UUI֭1hUU 8qb-Ez<BT'CC% iZPEUiDCtGV'ງ( !Џݙv}`?Bw!d+7\ϲlL}mU E{mR~-w?7[C{{E9ֻOUKinK~hB=r߂@k?hp2++3nrG@ {1?E~iZ-б!l"p,qĤeh4*P$Ac<ܒ.iú,ǑkppWom[E ۝3 P }͍bA~П[f7^y۶[M'}ѝXC8J  GF+V|Ғ2nalظ&//?ֹ*,JcB˲L 24 mۆaj|([ 98[gfd48(lظqԴcYh6t*(KT˲iz߂@ #cljjգڭ Hs}.Z$>!-u#|9R19L491-`8<X󓓓lN !eXr4MϘ5;?/d6B n߱=!>!';GQڢ(kqq(qY,]{<_q%y99ap[Rbe,ˎ},[>,bx| ,i_><>>bb{\:y{J̆'>?ZkNbbbkk+b;";n pŲ,I}>SN|mG"츄-EE1۶M34D۱P86dV(P99H:"8mhl8s^n΋S^(ֶ6bm-c+q) ;4ޮifh˲$˲x#mC ~ xv.? ,%&0]1`wOWv6mޢiQ#g̚y>qtU"k~}4 zXմAgdW.k% ;j1l蟮v7m8(!!ޮBf4 q3a|ԔD])zjvi믫odg[!. 332m~g׷j[iqG~fNerS^QJJJe_T=75]/,ȟ\8鿍=+@8]{@]H^;j;v%8E(:Ξ9q hzʭUp8 >c? 3ja]}ՔS CV]rOgn{ug~^^ͮ]p(_zEӍ+VZfͪ5k{NbY4Mk0Lò,2-r[uck!cWZu/^[\uW>thMM'>ȟ AH$z˜^uwTS[ǝ<ᤶV׷sΦizkUU=Y]]iKEFz[WVVJQ+S`YD! mYY*6O?9kE+>{tm6ti?F9gܤDeeў|bbҖͣFVm@GkFSSbiGϿt-s8.8}vtv&''y^<DzII DQ( 9hѹ99}K?䧟x;oe8UR\*a6T87@{-JNNINH9{7 e- 4E۰;7ϱp8ömF9;^=N8- 4]uuiDLӴ-}ؐ!euu,2iya͛?7DD67Wl\fMϲ^(n cf(ۧwnNN{{EQ, aP(2L0h4j۶a?\ʕn߾c9smmmEt@ /\k׮Nf q5p2UݼB54rsEQm;;+:5%%ڶAQTeUU[[[>rkUVf,Ia,_RUaC~Y`Fz:BTӴM]᱇F8%aW0y!%9˲-UrsFW,+VBO3LGGgqQa{GG (,(޶-%%֖WY !5b8MV#CJKMZ]) BǓtǣi+#H=rsƇHNQE,rXmc^REŚcG]qPQYŽi|j$`404m;CӺa@yF;v$$$λ MӸhA}υmrpKgGT2idps8 !TM7LQpDQuP5? D Gp!/,qϙ sEE؏E'{ q\elCC2- `EQD M۶.t^8>k+q4M4n*- Ħibc!\.6@,r?e 7_?q&sOEe/+{r_ ^~/@ -#]@8(>@8>9DRd;gH phҏI1GPz]ᚋ rO$p(OSpڦ0@,j~E3BlY6}}ye#޽j9?~erb $ 6H!@ 88G0>[\7D5%{3f8 n~mﭻrlއt ]Tߋ@  !B"Gok*ZWmX_04 zO3ԈT+sTѹaZPy;}`\˫;T|6CȬuO*OOOjK}#JC2,gS]-?'@8(׏-9wywabgUP844oSWg85#J \Q23уi⠗fUfXvn;#AiB]*(6?tB|W_˓%Y,q7l_4snocFt@G zxf?/7ݱ}ܷ< l^acrRmۋ,4'w@~{uW]5o׬[?n,Y4⢢{ᆱO_7x8aoOZjy=nS=0{}$@  ٴ̧tIYlY(Zac^=M˄ei[gPh 7$'&=CeY͛ԎfPQE!8c5a%%>foR0z3ٸyò22;w>siBݲ > ]8"˲|>SSSX w nz΂}zx׻GU(!R4E4m[Vr=JKu]Â⢝+pGYYJr2Y&7/M/;}|g Ǝdp8ҿ_7;omii4>5{ΉcǸDW$y-ˊD!VUMUV=F BiUU- \kׯyx97'; 8,k׭KV^ 9󌜜BIPVVfRbɑ\B·*p3DyqcFS4eYV$8nW]] 3'XU=@Єc CB^?T9dØ=֘al&=wN?pP釠{i(M826g7菗[]jO(?;:;qO:p?쬩=bxZZi? 8[a]CC݄NaY4Yg۴Lq wppҏ'ylQLӌD457kW }eY,m8e„>_'yfKwtv(-Ejko,k%̚ݷϿ{|6n>t gOG 9iX|3Ǎ?M1Mӱ 9c۶9lX8:;;J7lؾcpyǏ}E7l_~/8//+٣ǭ]Q`0fgU7cUN8m;)13Ι=wS38'1!0 <$O ,MweiZ]Ͷ{ku0p8:qK-%)\$Iy'ql0T-ii>aƌ1lhvVp >ˏ q &a R=Ɲ@  $𱬄ʪUk 8TVn G"e%e祦Lzw՟uYsͯڶc=LIcFZf ŗ_߸2Cx1p46ŋcvl\RZJaP]RR#hX0M\F Gr${oa0DAmyi4M sGUUY <G @B/@Lpޚ"9@qbsvV䒈Ȃo 6 0M4-˦iJKӴX ]~m驩~(cq/^Q+a<EQ(b'$qF̌p?6G|pu=--8Zԫg>zvw?&;%~ A~8 ҏm,z@AO؎vEA@ujс8B!C;;eAlƧU(cK?AEU9UUu@~>U4MAQUr565-b2LTQn84-"P07MK4.Q1sko٥ϲ,r4ke,>̳K-8N[os^8eY,*v|7of!dr -mz4VѷO[*|^|77dYw,;+T}C>rr233t1Z?C-ۊF[+>|9gD'+/?ii|x鲌twI3f3g-_v8cҒFKQ0 ?cyys/[O_y_xO?v7yvG~bt]zy$%&vtv^~oG9[T{YϾXU`Ѣ#G3 7ؖ_r"]ޗB=nEUy1[m'< XEHW@H?B㸺ںWRT.Z̙_s)/|Ͽ}ܲ7hiiy''?߷[y7~zʋ]|o(+-E,(cۂ y?d!7yWSOxמ5邝55[VY;-GeUՒ&,ɷO|nIyn TVV:YYzmGg(7okvL20L0{}4|ﻷ{7\sͤK.[vmy^xHX?!;:{ '3c;ٹK.[dѣd鲆ƌyÏ>23 %hmk0`0ݼyq8)OMM1 0M۶!(l BhƊ TVIDAT)'LzʄJ2رi;kz(kll-!D3iZiaiȒ0ի5]=Vܶ}ijF$#mD ضbBY)@ o\o6=K0e^ u=|;o!Im>{ }q=^y  _i˖ee'S\T4bk7~'mmF(;9)B(Kr\9NB| ,+{^wkaY}~Oz?8;he9/C7W ў0غ[Tn>p8o,IhIuP3 =9p  poG`H_5q"СP/2M?#m~xob^yCC=DzuX2z47onkk. ݊p~Zl~,?o|ǧr~d,%X&Obҥ~{mawo0mmmKXAQ عscG ۶9[z83 {18ga, q@91CӁ`O?3-\.v$ \\.q8x<>yzZ~lhA.ɖ zzz}D_uavڳsQ^M~oiXn_?jhoim[jUSsӣ=v=dIgWw{{ ];{挭vle22nnPU}v믝GdK[G+>6LiSuMƅ+׬mii8a)|ٞH 4n,aW^C\3aRS[^3 ̝5k)._Q^Qq믝fݺeeW\@0[o=:#=cu׉`朙3;gǫTU&O);^,>zl̙CN}󖭕UՃz"-_ M>Ђ4\N׿=w<[S[qԱ2yX^͵-gĬ>>~˶M$I\u۳orR1yI5ud_Zn Ko]}7Yy3 O璥9K-/Z'+,>l̙9YY6}}ˢ7WtUU99&5bcnjNOK,K̟۷sGm޶XY33ڳo߮={}(;ȐSؖUqdFz,-H<80 4.'oljڸ@ ޑv{=Ԕ85yDp88>t谡XiYtoyyEN8;n_rUũSI"OG>?!>!!tN?>7' Ǝ3x𠣥e)IIy)J|,2$e :thaEG1|Q\ڨ(O\l̘ѣy~Pnnސ!^oSuM?SUFض=d𠩓'|>˲bc >ܵ[ MӎΝ=hĈl0̌rU +,6O8[[455f<% WmmI$Ɍ̌Ԕ4E4~{ﺳmEÇ5kUVUٶ=|ذC ިQF2 8/c~.MAXm{zdE=n[m;[[X⋯a~^^Cc$Ie1,{KOT0 CQTsK 2ƌYruKksV^2fԨg97f::^uˎ>Płvuu+ uEQPh[himZP ɓ3(ӹvG8$ƛmmm,++I(m#oxw%%mק$'#D0 CAή.a _y[劢CAIUU|i͛7( uwH AtuiӲ{Yt/--51ݥK7n|ڰ @ i(,C@0ZGGGB||jJrLt̜3N|y=}Fm,K,խjgww8,@0HRT{G^y+.)ÏxkƎ-SSUQkk]>Z,ٗ ~U$$$D iftYV@EAX67'eTa~~^qIIuMM8,|㍅yyCK|wƲ òlZZjMMmRbbB|mCEQltmfeeٻ/7'g֌;vjljŃrsSSSZ:eq B9Y٢C'$$$E ͥi:>.>%)ɲ,8VV6܉2dpMm2Q23222ZZ[9VXrRSccb2y8nQss54=pƍm]qqqmNNLJMI6M+;+vŋnbZA"5FDNNCu]OMI g*+Ǎ3d,8ceeyy ͱlk[[A^٢(0 3vԽ777DGG{<̌sAJ m,{}[n1)1199!_;0$s89y*4!/+2˰hj2EQe.ϰ>_?ޯ($9IiIQԏ~sΙUUepBm۶9u:aIB@iEڶiYчɶ,p@۶,Ked3Z8,9Nd[Y!PUt%eY$Qǟ$IÁ ÒDaZv4]B084MaE!!`PӴ%ϿF40Ps!ɲu]u$Q1YUMs\>5rEA$I TeYt MaQ7L3C].'Mс`p(!tb0yyBYQ džß7@1NQDziɲt:)50Mァ( sIi*(T5]z' Ly. ynEU!QҲ_{/s@в,dfz t"q~Ai75anFysE_eہ@(i$]NgTǴL4NBQi==yrG&0T,˵AÑBhfGW IH (JVKo @QrO lFL۶?/AIC!Hd(*EB5kKˎ CaQP<Ѻ7~o "- $I*LYÒ ^")kU (6o?[mCRdݷadGjUMU iՠ_/}^y/ "eK^0(a򼪪ԭ TC+9CDkOR^%`0W6&ȩCӲ,m[?#bNCVO'D$I$(\bAȕ4M!'ȽAY$d'4E䚦xѽ#~~ "`Yy=RHlo(=~Lӌx"=kQcc].˲u<O[woh5M!ömQ|^u9ި(oTTDs#h7**#Irmݱ!..N>^v.צ-[Ξ|>㐲G|>tr:ccc۶.C"9"\訨(8O>sfݧN^⋦i$*+mII_ʦi[Μ>rTQUk6r!t9QQQ pN˲8s\111ko!> hkp¶'~# AX*%9yaoޤ ZZ[kjj{z{MݽrYQ͞MUM ë׮?ZZh‚M)9rdrssTV͝=7e۶S>zt} } n\0}ꔽ/.3jɓK>qTWWWA~^SSi$"R5[p8 Ooo^|)!!;khxnԔAVYy9yCܸy _i'FfX˲_z`0~ݼm[owY3A0 u6?\4ŲK?yt~^^TGEA[7~' p8/ж,an\pwݥjkkkoy5'*NN4q]Λ3t8ysf+->ceΝx\׏fl8y?}}j61|ݫ׮mvEQ\@ <+ƛ͂ /}?Y'@m6.}?sN-yŗ^yD(zWEQ cB@`O>KvlFvV֯~cلce_~6q)SΙz_ Ҳwq;qeѢ쬎D¼ٳK4aByCv[[[?cԴԹfCrsRS_sQ|`(tNQή.qر7-Xz݆3fhVYUEeY xGƘy`fWwH7vѣnw]w <2 7̿V}ڽgڵyG*9ٱGutϛ3{q_[(:tP[[{rR{6+#s޽k֭xbbb ==I,(J0 B@$ֶؘD֛?L.w#҉͞KԤG+>.ѱBP]CÖmۢƎu#6lʂvwwfZfCC㞽{չfy/ c0_K He+N:P|Hų99?pu =zPyEŔɓ͙Oرk3gQE#DQt:[RRhookjjfM1|Ą6,5onMMnjk>۶ϛٵeƼ!CdEq\9YuucF 噦j;K/.)Y4b̙r?X|Ĵ{^3v;wZd۶ nmo~<ǯ\v \]NN6Ξzox{bb4]wk60+3BZOh斖 74}{/.)-+oȐBtPFdԟ'O>SO|{'N|zٚ;omXAi>v.Ǔꍊ*ZX2L"Q,`: I4!</~'̛32MYQx 4 xD5MCE'+2/77-\0f(]̧ n8M pǍ,t]EAQTIDIdhZ4QTM(eYMhR5et] Cy@,k&Кs$<9ηyO$I,ħ(y4UUx<_3a~(mGq=H:FE}ؼ(K<Ӌ=w_{QdJW]5]W^2$I< yRuzaxh\|╩ߤ87m|Gq1q< [U ׏!I2)1|/[e8>s/\\@Aw% ǿ$̕ť@|K\Wt0H? *a9}Fb0_ni9aEc9hҏ|lh KA\Q|΀ Hqb1 I$I.?Js$) 1 fs9Yo(/K0WBmCm,#˲)fFUUUSAȲ,p sҏ֢l#G#ޒ#?oزm ]xe#/3-_rъB>/|.D!M3=ݭ-,"GO$ISWQDeC'PS{VQaIFח7%m˲y`.MQpTUEQKArq/+nKQzDq\, @mBAi9v:i~߮+*z|WNi7~25iID~nKU/]|K~!d =u'OU ɏtЙχa۶]NiYyPu)FE A"+-3L#5%-劊 qeEl`:.3tO/'NpipGjx"-/iێk֭w:(wAe+]]tꢚK/+e-۶(S./~gwlٶM˲Udw(G:+=Ncێ׮O@TMC!;ͣ_EMyTПz`60P腗_Q8xնme7oį~]|ȅ_۶y/=~e1K è&˒iY9hO>M|{l|{{BZM>lxucԇ%j*P\okommy^մg(C7UĥI?]]]UϿvPn3Ͽr:5],KP(|P hEQ XYB5Mx޲ŇdY&O#aa4 a˶jںӦ0 }ʪ Bk440Fĝecg*Uxec40 EQaIbY8?s+g~Qm 7 A0 vHtBٶ}]]]7t㋯ԔcXzǮ] q\cSӿ?h~EQW]!4MSeW9vt>Û>Z|rʫPhgx'vsvPn=z-[,2io EU뽥phhAc֌,I$(> gkkSMf:MgL:st@w[G͜6햛n\|H,yQ᯼3gP^䰢أ111_2% `CFZ~˲hͲ,C|'??~(7'7,( AEQ"%<x'sl{Ot];{?햛y_$[\\ !C3UU~{]4M?+C i~m1ؘ+WzرtMx>t8rs|v$:7|Š'sL8IDȢIO<)4M:uO:z+ۿS&MB(ׂcq w޶Xu7cF9"{[swt/  y O=+aZo4qg 4hi(Y~k̜50İa ;oɖ}Λ={O/IRbbҲswa~MA Ie=}DyNTpӧL>[{Kϛ-,Xh3y.۶Pk[MS$R4b믻ێ(. '/.9m_}߸ EΡ( /|㭷Nܧ}2_?Xqӆ͛oG;k[ᄋ|'㩩)o3 tݑq n ö-b3 ި9f8Xb/h9 XE mڦtt;IVxtȎ lBoܴ X⫯fgO*ٶsCҤ`Fnv'hjo '̝5KQU].׶;lF4 r<(ԙ3PHu -\!$ r9IuOO+VTVU9N] Nۆ;,7x!x4- hmk=r'ߏU?Z1(ry<Ꚛ7....r H`C(BNv р)18? HMRo槞YbY==F))ɍMM+K~4pfFƿ?M׋F WdşOHp\u AC<ϣ!x47m^覢UEINLD=V(bYxD"+Iio1 nC%%hUdIUM C>+>V5+32D?59Ɔrv@m;v>斖EE;v튋5 eQ#׿k'OYӧM0?{<SeYVjjenݶkU:3Ͼ8ꚚG<}g[UTT~đci))'O$)==m˶m1yD^9MNJCP8lYVWWi$˒Li_wahAA?ѶĄxUӂ Eg$^XqS0yo߱3';ݥoٺ\,5e^|O=$_ٕ r4Cؘ3U.{q8hahA~~?!>>5%Ut 'gefr,SovsKK||?!!#-)uE|#G epnuy z&L0re~I˲<O[]]]V^ZVVrzFD6rs].(C  "m#bkӧJlЂÆ-_heKQT{Ga/\v(jkkw6ljqWVW:D?ޯO4DZ@ai\.UUUu8$x.ms YB4b) qZoy.L]OT1(2݋\4;vB"gyС߾z$^)V{H[deIو<~k. []{$دq_j0;y_6"mc}j|AeßK?""@]"L έE۟I+i9'0THhGPn*)էAP} hӚe#{PvAZ7bP4Q}T}E8wwo_Gҏ$HmEC~>SI }`{7KO_mx{?Wi}Vꑀ}Ws5G1Wm2mw0qa4M sE_-r:͍===Ĺ_xdi}B#!*|@/|}.2n74!;\Q\|Y n7Aa4Ę$ Vҏ`0, 3ҏ`0, 3ҏ`0, 3ҏ`0, 3ҏ`0, 3ҏ`0, 3ҏ`0, 3ҏ`0, 3ҏ`0, 3ҏ`0, 3ҏ`0, 3ҏ`0, 3ҏ`0, 3ҏ`0, 3ҏ`0, 3ҏ`0, 3ҏ`0, 3ҏ`0, 3ҏ`0, 3ҏ`0, 3ҏ`0, 3ҏ`0, 3ҏ`0, 3ҏ`0, 3ҏ`0, 3ҏ`0, 3M aC70 n&MӴSt괎`,K4`0~ p``0~ p``0~ p``0~ p``0} `0W(,/OB H``0)XEM !Iҏ`00MQ5ۗhmkEo a\lIX1 ?fQRl$Ipcs#X-`YV[G{Oo~ mۦa$ggyA]IDUӾ%?Bm>Q^`.m@- `ٶmߞ۶ Hl܉`0;`]fc0Ÿ@#qt/<&K$I$"+p|> 9|FmۆRE7$I kDџeogdڲ,0 ,4F D.܈$ I(4/|^?\ZBYmji>qhkkVs,GQ˰gece`eY hICqHe+eӕgWvC{u±,IA4mp,K$$I93L K?\wvҶ-k-m-S쬩doooM]mWw$'NYPۃ 0-3#-}i111U,ʲ\S_'I=3" jM]$I4Mˊ^S[WZ~Ddc y|v"2 aK˚[[.uS,Nd[G{8>yT]}ia)aYPLUU{GEQ_06aO$BQժՍMS'òT~imni jY֧/2Hҏ`03BH@$I@¶옘kƌzUmmy N˲öixa=]],Hւ"!ea ɯo$aԴΖVӥjZoe.GQIJlw ~ (}uBȱ\ dIԮ. @$h&0oٖn(pضm[v9yY陆a|j5tA,NKMt]zexF(z}^׶튓'HdY69|D|ln6-uMV|[Ӽ sq΋10G>$BrReYMM{t=+#3=5ȱi # BggEá11q M-ͪTAe )C7GZjډ'~Q[WfDz>0Kw&MQEY$uاF> @޽{ذaK0 j>'++'4 ߰ S^QZVz&Fu08ERX(2Löme$A9B9++/'8P;-E;a4 Eq,ײIDAm0Ma4Eá]wc~ :B4!?AAQE#*Ba8E(w m md͉9H LI\6 W.} =,gH^X1 ti&%&iz%]}G-S}_5йE^6cb }ޡ>iX1 ?H"{p,E_tІ[)~ $Eq\m_t"))jAHB4dO{,+,b`0mg"i`y}X1 ?B!K?\s2߉{_VsZ!ҏ`0˷7zysīy1 f`;G|)FE\xdݗH WstR놦i_p=RKo䳂8۲UPgm۾ghv?uBt]׍/Vu㻙`0H? gԔˆ'_!t&M,ˆad _!ncٚ'ccc q(#$p80 eIEVUWwtvڶͱA``@ԸX0PcۆF6In(}CY# x9{ŗ,eԩG{n˲,r8Hɣ<^hnmk+.9\4b$IFEE:InKEaXuPŒ#G~yf:vԔcvTT]?ٺmBIڶrLӤi:y^4(ri OGvuw767646&ym!:::bc.0 0 AN!=Vkkƍx^t8hFM=nppnr?A (jkk040,k~hޜpXӴ7-,=X|(:rRUU͝w=sp8\Iy^oӧegf*2ii{{|BQ_m \7ࡒ%/xݵ󚚛ccb l:z@0u(^?ڽ1yDImλcquttYGUŋm޲X[oYUS[gS&Wlhhg8rX#cFY'***s'NoU{bǍv?nې{7??Qq2*ʳuOnch^4oO=UV^XXSK3tte[ᄃSKx<+Wu;0iB%p  =,4EQ,ee-?y$$o>,cfMM*a O=cO-y., M{>ahO9U֬pwXnK?X$YYUc{}b?!aɋ/557/_j>W_kmkCT/C`0K$PU QEE?>lTQ齁޴ԑ#gge=p߽=OBڙw~#{םeʲDӴnII#;vۓOOMrr=w9|0G@jggWAސ=pjJ e7JS&5551, !{@ s޼0̜쬻kwt$&r}Gzpi͚1n=|7M4$! 3eߒyLen[|KnN} srq V6t--3O{oٲ'}ŋ5M6 ?_DaAAcSɓxxrϙt:E$Y$YeY na6qeǛnjnZ"+Ň%ǽƛeN:0Ǎcf}}}KVf{{ig2_뉊U%eY$ ,t-,ɡ`0,Ie+ {{{RSW][SSsԔ@ $"6&fϾ}yC8,KQTM%Y& dYEӹaf7n`0 yQ+WodˁΘ6a;vGÏ6oْϙ53+3d)~-[+*\.gRbb]]jbcbRTU;i;Gw#}p4nƤĬ̌#GZZ[bbgNO -OINYf3g<# {eŇ o\W_?qxE)()9te堜kƍ2 3o#Gdgímm(奧$ ,@i[-\HBh&ieY+QwEQI躎NSF8FF &Be$E$tG;}DUU@QU4M3Ő$  | i"Qꛎ,+ >kϞa~?} s5rqGyNlY#!#lCഋw%rK"e'$ŋq=_:E>h PJNp.Ķ(gk ,_`0W&."Q":0"CX60EDi$Y%`4 \i^$鮮#G`o 3 It$эB%tEXtdate:create2013-09-27T12:34:47-04:00 ј%tEXtdate:modify2013-09-27T12:34:47-04:00Vi$tEXtSoftwareShutterc IENDB`selinux-python-3.0/sepolicy/sepolicy/help/system_policy_type.txt000066400000000000000000000006321356774067000255150ustar00rootroot00000000000000If you have more then one policy type installed, the advanced screen will become visible. You can select the advanced tab and modify the policy type that SELinux is running with. Policy types are installed as sub-directories of /etc/selinux. Changing the policy type of the machine will require a system relabeled in permissive mode. The gui will insure that proper labels get assigned on the next reboot. selinux-python-3.0/sepolicy/sepolicy/help/system_relabel.png000066400000000000000000001472031356774067000245360ustar00rootroot00000000000000PNG  IHDRah>gAMA a cHRMz&u0`:pQ<bKGDIDATxux7% /8NfMw•{eN9af&c;f~(:6Ik}Ȁ5}Cǂ88џrIA4aƘ 8B0m#!9Jܕm۶m%!lD_qjB ~k(?rs;` ڔ3d8bXVce醉Юʊq4MӲxwB1B1 eY0i$PX۶mI%Jaٖ$stƶ6`w/E~! {P|,4 mۦinYzQ8.3g-\ivӂe+| I"Q_Gs￯tHkϜ=;o15]g!k. a BG[9WwVFT!˲aDdǟWT("I"ƻ^4 eit:Ͽ[5d@acs>^}뵗s 0mYap!@1 ô,boFZaݵ}oC#lp,^og=p󍽒vрh4tCQU˲ ggvt4Ʋ`kSS:ql^i5Dc@{gMW]:mrUVO3򃯾_x+;+#-Uuc,_4p+׼k/:eYeY_QsA}~75)qݖmrCz[,>Ȋ:vYU_y#Ə,AhyM]qʢk9e-7~3wAM}C{gegꌏ>O 66늋ZZ<#syݬ^nݢP~%BYQFpə>T})O3\b•gΞXs[,ː89l|||苯 zys:mO<և񲋦D8%suE{>Mw?ݼEna@TV=wߝ>Bxۼr$% ?{=a) F oJ[1c^V`Ū7A&~_y]SƎZi5~\4wNtV[bO\~iIQYSǔ߆mcCMHmRu)g0ƂWUo/;lϱ<cr:>8Mn@jj`6Bc93چm+8RkGiPT3N2MYU%Illimhjqˊ*ˊeI2MtS>/f&h#aC ?-quMOcSuӰl DxyW:WJm576iΰ qQY)ϝ8zef} ) c(._w?S/`!}l<|ڡ< w?W(\t)y9յPruyB$N7rclK! 2]NGVzW<{OF䤣Lu`r8Bሦ:Ͼ\aӠ~; D7 Ͽ>˲g>F/iY2,q+'wEUYtUS-e@ѻFQ'utf2}wv PX%1vLL]{y ,k'K>0 CC  ˲$ hn|Z.]ilB<ǩ2mۺaוCafJmp7gY`t0߫%SG0r8X1 j7]yɰZڢzX1@o`gY6*C2MK3b ô,[lۖw{ŶI!%1m۪2 CceUeym+g-  d$ ' 6Ʋ,3 -El{5U8CƤںi"}^{3i84MQ࿘5{MdB!uL$lUD2߂=9P[?OcgYbG1 71 _bI`Y4-眑@Ϗ,$ '> d^2) `8wR! #?+s@~^$۶]˲UUt.бPbhà0M3l`wd!Q!?yPsp=!Q?0$$!} sH0bBtwb1^%iGݣ M+ض}8tBʢ}ԨQa0\Ce%&$[#!>q_{>].DZ,|POKn^x }2]8<<40Du`5X!d1޶axsB]ӻc8{ר*?oي]׵fM Bi[ DqK7o?io&0dl/i+@ƻ@hA~2Bxݣ~0<ܺMD Fueٖe!a{An/QL[!]WTV +-Db@Ic^ mB6˲ iff6t~Y?lF 6tQ%mQ?f1fFV41 '9Hxxo۶a/f~}gN7t#*˂ e0aeGwLJRRW0vt]r!m{W9dY>tm`B'˲hko=w02 Ѯڙ:bĖ`0+;c( BHEEQgXֲ,A/KKK-[t9Y YMBB5M v alY\n}BB|>9HŲiZhI,r:?̞,SQT\.+[Z[7y905]$QwDX8β,mJBh᰼B]ؖK޹Ԉ&;\۶cYiniX~)a̛0r l).)=|' yM[6u# {kM2n/g~]U]¾}K|>͒MS)m;>ѧ KJu_pGzbڐ 5UT5??#꺾#vuu-Yb⸱6oݺ(#==;;<w˄Ǝ^jMIiY~^qc7n\ZV.+JzZZ0*GqI!$yɨ@@2,˰+V;jd$9ֶMu9 ˲-X ׮_5ĄԴ!}ŗn3j3/ڲt ^{'뗯\t:-lwB('+59wngԴc(*aXeY0~} N+?U5)kn;k#臟|>l萼>}R xU'hIu ]'͚=g%Kn)9#Bϲ !r:Vܶxʤ6nYqK0}TRb"0M-}13O+Wr 999,._nƒ/& ߸I׍ƦƦ;v;kNe4P@kJ nj|ign@mWm{;o}l khl:yO:Y?njnʈNyVEUKK5M}# 9|xvfְCrsÑ0eY^>ѻ_ѻs}vPy!0 2gqڣ77ފп߆M++F q[bGeBB\ӯ_AUun>!F>y}z蓛c&[CA,ðA(IrWL7iSǏfc>j`^7m"+N/*.)wRS %eeƏ=ȩG=j-[O<ؕkֶ="Է oZj,!˧Nkj$%YGo~ _u5d;=f@=c,}MXGLgy{74=*w^}ͲloA:򈩗_|qrRR[[{(D#]]!à 9$}^$fa$Juu <+ǎpђֶMͩɣF ﺺBIZjssrǐAN;Ă`0D nFeY5Đ"bfa"c9MӊKV^a>.Kf(2W<`@aVF0CJINRU-1115%Y^ƻX4P9/ Ƙe5Urr[o+,6u(Y_. Bߏaf;.gqpH(I$m(bY剧8NAmv4$tF"]=q)D"NCu۶G("1TUpmUxmٙٱfywݶmmg^x鴓O̴mr:pxTUD#cYp8,<PQ A`D#?AlX]NCll AIA4- ,v! QEPXQTzn5MDcf4}nD˅1F^GU5]I:2ٙtBKCb-]dСcxH ^[[;y< 9v/^o޼yooaT#h۽t^mۊ!EQ(vvvS Bd0L(ԵfWKӆeYVGGG\ӵqfar Arc9۶B ׿Y iZ9Y^ Ȣ=G `4"+TC#cB Xw-0fОӞmbi~7`whcfF;`VbBҒ%Dۜ 0שׂ3 "q\aeg㸸8bL8WJ_ax1n`xA1F.b‡83 cN///1kd⮱X70@F+ ~Raߣ@LVQVdT!dBHm ށĝ_eY@0H4B41Z$2|+BNJuHںz:9=-=%9O~0<\NeY*PWB9) 򷁼Yt8BcSD<&7mT)6f0y2)܄9vS69BÇ7Pi\ S(JJ?B8S(JJ?B8S(JJ?B8S(JJ?B8S(JJ?B8~!1mL7v[Ew OȁP(Asҏ1t C#?;cA\.W8uzĄ}C}aYu:h B9X(D7o߫:=츄E4!daǑzHc-9g^ozy we斖fp1G''%wsېBPbG]EmEE> lܼw:i.IIɱ,㸕V? /<_i UUmv\B !dٶ(~;;;^}-[ȣ))gvvHv4*ʥ]ߖ_u_p~vV/񸯻jU^mۆi_~CnnεW^6 4z .\$5995%c_}aS.8u6p={?o~ޥ_q@`ơ{H?w7 0vw}WO>.(O>Ͼ {O:ԔoܼNMINr|%Kyus,/8W^cGq@UՔ?ƛoпn6{iۧz/qwf2˙_o/*~S&M=oi^|A}}oLLB0ܬ\b/=աPw2lgWNMM4mqgv}ͷ 8K/x-7mʔK/ߴeK>}r%Q;++;;縦P(ޮBjj[{;qO<Qӎxf8wo ;w-^7+3v,Krxbc[27F>0^zirreYdeَ$QWZ2xЕ]$9s} qqq,"N8?.s 8#UM3MoA~VfFJJr|Ǔ'woۯL>99٦i)|VffvvNe_Է`! ;zԈF v?!<ПF 8BP~'sq\쥕ZZ( YK0$ W? s_?mڟAWیca~ȶOyP6)Bs8hgYa{Pm۶1Ԁ ӌ%$4ms|y}C~t_ePOrc,"˲ݳ)?=+ٽ{ן$M̹hݤ٣=߫SkI~^>`(*B2e׏ 0M4ͽ[[v!Ijw5лS(KBɈ/>SϾȣH8 i(AlYxĚoMc ;].S0]tvׇ۷ƛqcw%A"@7oްqۏ>H+-JH7MaP(BN٩( `Tyz<׷XQ!9)L˲cO74d[vw$%&<_]Si˖8II<ظa&QeEevˊ:$J]=<İl\vTWo޺5.p8MU;iM&$$)g_|#(7911*uuuPrY#؏ $9s:0^G$a++Yo/.V^3$%$^I6oٺsgeYx557p8 ,K ysoaZZ[_?0XlڵW E;e[mSU5%%eU'ܬg]t¸qos#aIr,ZB0Ͼ 1Oܯ ɲh>‚>!#ʊEɧ9KJ^A𣲢]<}7뇶yEU̟?bЯ?R>w(ncKW_#Xީ[hcyEKFhKKQӦK/bjj'p}瞿K~ŎUӶm/D"|1ӏzKJlݦ7GUӆ1QU=::;>wn/LO%o-+ 0(7lx-6 ?:픓j投G|ʶmUSÑy`vfVgW[F._1aܸG|j; ϾKNNBٸiӢ%KNלy_| 79vuvuy=̭kh  ;;fϛ7u>l֏1=a+WɲܼrH4Zد'|H$zRB;kky⩓?n…?ΙwG"Ͽ*+3#--0SS+BhFB|S=:d|_nnn;egAYɲY,r7{E7lzn)'=ɓozi{;kk_y}FGG7}C ߽߯wܞG44FCBEA,+j?>Gt `8i^a?看?o嚮w'kUU5  &.?v=w9M‘m[e TUC!۲0H4j&wz!3#CQU4#`IӑSEUm"sB˲dE `$00ׯ{JKM5 CӴ{UU}9|/bVA~^Nv=XYUu)JggeY"ׯ"1L4MEEQȾ;ۆae4mG{7m "?.@`۶"+YV$I#p8lZ =Ba2`8.cGjoo2x amWZڱӧ^vdj,cF1̮Ų/g~ b `N=$EQ-\m{ƻf}W^⫯ᜬl˲2y99VxpFFo1bİ^zi},,ܶ!Bˇ c9a0P蹗_^n]zZ/QG V\ZJ~\(. 7:>kIϿ=?8|K/ /7O;=c55}w~IImpw8w 0 #+ 0ɲ,( ;wEєd$k7 4-cW}imk9Nr84Uu:ax<`&;k}rs0믽_߂`0XW@0ƭvuu>71!AQTcB:NfX㈢Dzajimmmkx<`4vd'P8F23!,˶l˲MM/?듓IqGUu|\\RRe˾Nj/ )11. iӴh aE,AK?0ia"I^ BiINU5X%n$g2[`YDZ+82LE } U5B_s9կ^p{4=\~q~}@C~\p @u蓛FO;r[wbfBwYnUp8K~sW4M!)!{rb}EQU,84EuXgXc>:ݪB_84~akC!d[fbBb|\a clg!F_?&BR4!0r\{E U@^lHGj̆`(0m;!>1>>~խc˲pnbXk[s %_?[CHEEeۃ$ չu60RRRcE´~ PUը,ek|BJ5Zb7 A,noo--+|1 tƶm#X7k@I@&WYY]د!91PH׵Դw5M#N,ƦDDy'e{ D6P(,,F&NX9-qM6d+^ H@Ԥ^$9#?bd]׉%B07~[QԓO<7q̲,zڤԔd0Jr +fn>Ƙ<[id`QQѠc:$m۾Y?p,N9K661CBpdC {},]ַ v{5#y5aY5 3޶mMWng׬z}(vo^z6ðÇ 4aŽ!XgP({ Dz<ϗU}ԑ'V ˲HxEs4(aΟN23zwtwMDh p@1$V>lQii,˺nz3oÇypHD/dJB WP= !IlIFLBmhPamٶ> dND.*)^T4jĈ^yeIY$,K&aAp\!<0$iVs'BXxBp8X%wmt8-Ay9x8c 457۶m[m\||\S斖Kgfx/g~mκ:QDQ$I2㏪郞Zl90dX5u.(aΟ:eY۪[C;8mj;$=&HLHHKI5L#;+9sXFRbyݬYJK{ɧ;FqӟxG+.4MEU{]`KkqG}ʉ'|.8wz\lmMSy-"53J2]&f@GO?J_aflŊĄ+.˙_liyyiiiiicx9_߾y}rKJFriӏ֯N }%~oAAvf$&ue^_Ŏ 0MӲl B 1$iÇ 뎣8r۶+22zdgSyRӳ22RSR28C,{ĔϿ9o¼>uU;lۂ(WP;"50t`׶rA5M2-A-˪MKM Ÿ~bA^o|||Yy98We[^tiGxҲήsH(+IOuԴ#:;;N8pYQ#G%%&$'s![#BP?wiz3haaVCQ.[ %95Oo>K֯4ef4*wvuq7bذ_U1u^ii.ǟodYQUSUUG k/Y!A575]1e+eg@YAfffzP8\9o~^$%öYQdE–eE‘azZhIuA,X$ Ca0vkoӿ_tI6d@2!lF^r;.g8\x~?՘E%o Kyhزm[JJ 0+W޶lhԲ욚|#O<''{ɲ;v-Ea}:㭷.^!P~.] mJK**-ٴm{IYeKKk̼>/Q u->>.7;wzxC /wtsY(d;΁շMNLH+3#Cr8 T]Ͳ#N5 PRSjkkKJ7mXo~azzzzB1qi ea}^oܜtvvNJKMKKMu:9YY')11wzBBB|\` B]|Zn}k[E睛r932z''%efd3r/W^QY[WBԟ4fG[GqI-J[ZZzeoƔQuAtcu]ݛe+Wfdduy}ru]߹vĉ} SSR[Z=$U.)'PTRZ[_PקO;655-K0uБ;/Aò,Cn(ݽGe )LɲvTU%E\.e#( 먨* Hr h849#AG( z=+Hn$vaSu8nX6 8 *d'p$B\bѨ"N (*Ii(aUElr t]WTtʊb6\Wu娚F`(HV néi"(QEcYcAmGeٶmӉ¶$IAA(.05M݀,eQ 0MY]}A#wR+~{߱$/K^i,ۆɗ!˶Q7te`wU\-TrlUpl'qӦ@ p%w_Kx%nRm &3}/g1c5o̙ ^VHt?=t,ՊS3~{ ?_0)CbpΙq)(Ze(]LT}Nv*;|`{~1-ˊks~TVkEP[zWmcaTm? y˿Vm)!GK?kBPz8K̻$.~/k@|moov:S(~2v].!ysk맩B ~/ /DW{Ⱦo)"g!Ph$\l-˲a4$'9d@(YVHa۶AbW{"e-7Ăql8$Ps,g,N)~0޻_uߺ4XX%Mqi) 3##^{"1!@bݯ<D*}C$OUUI|D}~(Óx2c%˗׮!!'~y'kY&~)|>WTn^H4rVرu[QBBB{{O?#9F$)6~r;Q(E1>.t]77$$$EqHmۂ |ހp8|^/ L|^ npGt6>>޴G|2HMey޹Eź|>Gtr~aZ:kgY6\N'| 5w\N3KȲl\\rٶq .KήeW$&&vv'|t$%HNx>D ?@tb@AA1Ƣ WT4Ymoo7LSӴ?ᐎ>!C~V8vTϿqcFλ]sG^`PԔ>HhͺÇ)O4q;vZ&'';WCF 7 WZZgg?X[Wo$MMs/3j<ܹÏ?[P IҬg:q8 RS ;:(Ǐ۸ys~>moڼ%77g݆ `3 ܜO23&W_P^5O>|ɲ]ѣN']/XX0z䈼>}n۶faC OU5rh̨YYkׯ^T9Çkk3 r8p~(C ͽʫ~=bx;:;7mI`$I|M;:ee_z 6ٶ l6MfiZm B,,~㦏?^w\fqI Y[socF_xYQW--ws/Ƹ3 CѨjxr;w\t'}nZDfϛ7o.mضzƦV==3PoZ[[z񦦦_QRZr:M }yey :iZatP_]|yqiURVV/,;-_YUɧaY>^hy}iko#N}gK +wxn3v˯>SIU|Y$wtt|;}ɶ>pμyVxwyvTUH1Q('e9~m{#O=rRQ̎^}k֮{>~97ܧx\yunO{Ƕҩ'~=j䈡C;㭷P4P($+OQPT5 GeYuEQt]D]!)!fΉ&_pƍ$vu^PX8f(DX1 #*˝ 0 Zn}Rb(I+VFd4ykjn.-+s:/B6]7BXVH$"ˊiPHyտ#nzxM4˶ hjnp=<ϩ{?o|gjkƎvF1bdanM}⒒쫙ww"re˗766]!%9 06 )Óq\EWxsEuu^ue~~(.*)-$qK.=S/Ye6EQǍ#I⇟~a㦌 /1l([Z^>iֶs<}GU+kuu/ں!1WZg_|r:㍝u?nnipܱUUWY[ۿ_ֶvQ-ذq[Zl>ti۶52 ˊ2zu6 2dԈs_h?l1~IyE g~e.ܱ#5%WZam+ڞ{>Y֮[ʉ'+/*)?v,k>|O6.7d;&jꎪQ#JSu%;&M_TR'߰iG *˲?̞ٗ_ ;ebu\>gcimk{7# JJ.0g,ʊ-K'Dz<%(˲a(a۶c,WGE8MH(B!L홙ٽz1 c8l޲ɶ8 {r8$YVr[oAP(#lh[UNਂ/Y,vw 5;w>̳!IO9D0x5LA(xye9ݛBD`&%0w?ׇ82O60,UTV2zgrT[7lSm.koxtAHr85M+Mgg+98ON!L싯Ə/&!B&PSssf^uMO|5?`Yv|||ss3bv+?;Vu۶Lt:_|9c|eE"px˲,IR4mim,a?eJ B9ȲP8&۶01Ev:Ncs\]}=s7\̌^y!|sK I:,aYVcce[<D "1[ZZ`aZZ[UU2,c&mJ2MSp$"¡m(_?w0PTmD ||[< `^jYmUU8aw?8w|gu\zH4vzlw>0.8ヌVTuСii_}Kk$Qz1ƭmƌ^mlfM1ƺlF Ÿ6caY$'kzjj˫k^{ʹԴԍ6P8+-ⴓO:dpiiyA^ǟ}nYv~};^yUIIsvu{cƛo={ B$I&10WP(uvuɓ&;K.~eƌ1F=Ѓes/PU3Ϝ~O>k?egeUԄ¡p8|g_wU׮]~{㎙[0M4M4M۶TMy!r ck羥Wx?JJ~ѣ?K amDQx"I/^PU]#}ԑ-֬2xi0LIii~;vm^{[zuƛh0 7NB`YVzEۦO'ǜB_8ȝ $ZMMMΪvass$&&jd!YQm/40LI,Ꝟ^ZVF-ꕖ*.-miix{">9$%m/"Q-eYp,j,Y,)q >K,w^dgHP(ۤs :oxeP(o~YJ 1eC1wKDm-[66-lL¦KMϱ lnMBp ,1A)6ƴP(I?ƀE#'fnweuToA/.{nV?+HjegG BܨA悭Mw?)1kݐfc!wŊnhζhZ@:edm/-:}mmRx1S']}mk k)>ƷGU6&z6` 7s}f}y纱N͹働gS(ʯ Xǿ.ZRԼmSuw9`E&'_]R&fUsmEK\{]01wceY"3I.PC.Xթ]g8rP[Mfz[.ômmAeR} B9(1/:z@O+iΆΰ8e>MYtg=3,s[txkULC6"ZP1!53)JGŧ92S)~Y N/P;:d 0{?ݢNXݍىWY ]JP(K/MNNmʲlGgn۲V9.cTn\nS6.,QhgMv(IzQRd?YsmELуSmmٶ¤TG˫[}%r 2m<"7)9i)(3>)aD ?as<`ra"wb N-հ @,BAY|D1uv aL !hnV ex6 @8ݲ!Րxg1`H10!ʹB!B@3lDPohNa/G}!jBA@0+t@1 Ơ5"!ŀȚ;@t5AY3!{+qC$Cmݶ $ec$P`Hr'Y{ ~qmC1B{BjZWKK|\0d($'9X_yu/w٣F te۶Ig<|ϿyI'$'[pcaZED*jZWssbbi3N;eԈhe} ]BeYIZa>{ؐQ90 X@%.kwuB("8ycq˲,JIJ $+eۯM6l6dTYEI$ !yaEQ+*]N'˲,0 JA9YWWVQ|ޭ۷_͝]u\!I-TEP(#IP`?~8MEIKK;c;N< ;ǟ#t]˾5K/INNzW]. ]O2 j~>n7(IWkƇx5M3M_*-+/?o|w_Q vCa9o^yp8$GYO>~8nܽ=r:9-99os\gqokiiO;hTB=DyEEB;: 7pG]4C] '~1qM-Muu(9gyw>cr?̙'pkg8; q)} hQIW\ 1l{..)y޻ 6x+Vpqi67d{3|q_p9cO?S7ozE"g_xr[w_p$҂1mm횮;zGLq?QUu_Zj|TmԩNO?Xֲleyx m7TT5+351>a< 41)) `Я0/cm >R~ 0BeY5g޼;{ .,kԩYYIcG۷/ﶴ7tF`Y3κNTRZ+---5UŶP8 áPGGa tuuM?rmۯM m]sCum} D:::LӌrGgg8D ƌ,{5Fe%'+SԎEU,ڱ8ޑ0Y\xʉ'ꆮgu=P۶y8J?7@ޤ9;P.]tРALA+˝gjJj{{{YyESs>l$<ϯ]w^\ZV]SԿ˲;*wT铐xAdf޼u!C"h~lIOHf0 lٺuGU웟;rGyEE~^~vV^O 7eefqѣFe@_QYn?%q~px=<иzZxX]sGUUfFFWWjjzzziYYEeޅnԻWzbbϸR(?Cl;$.dʡܐ7o>''%۶-IBcFMxָFQ:<]?m$^US1I70eT{X),BA`ضm,O(c, (JtOrp~ 04M.clZ&^ [2Vݑ*2ж=CWA ݉(?~!˲c@g7k2m;7˓; ǙH,0RO2GE۲!8| ۶Y}^|paI?Bx?QdlEDP7=`cRt8UI-حŻ!0$4M]׉Sbvj{J{a…XN#W+h Mƒݦcs D[pJr2ֲ;@hbogHRƚcl]~J8N& r:7ogY q$m I8 BkmHg执茏'˲xpt:^/ p:{.ٶ- B .!I~/..n/>#>>p8,\\΀/<|^>04M̙|EHt8]1$v;۶-bHdZq$CkŁݽ2$B+\zv;aYxm{o²lW0b#L.\~}EsC%'%UUWo+* Nkוm{QyeW^ ~,K*Q]iĄUTeytGUMMMQUÜ9ǥTlݶ}ڵaoXV^P(4wں$A/Yq̌P(tÏTJIJ޴eϿq\|\@ظe۶u7$&{>`ZϿƉFiyyEeefۊoNmoTQYixy b(2{v'},W@ ?D#̌斖m۷sx,*.)^:0--ry;kRSR\.WQIɜb t]Y[=o8VTb*iڏs흞~gBPÇ(kom ?oڵVQUmGUk{m|M--))Ƕ-^,*GҪ-X_]#0D#!+iimzR7yWQ;W]7ey4mEE6mzO=|F޲4M3o~Ts?Uk$'l/.nA#,Ð ?1G\.P[[dE{J,^23y lnlnر;{<^ۖ,[6qGv/\󵵵?/$'%~wt~(6voLɫ96~ɧUTrǝnk9'&$>s9 7'!6' !Q%![BlہK/=Ro:" i}VTV~?pK[ۺ ק\wՓƏW5 t:RSB`ܜaCJ[vݦ-[Ə :~r`f˲+w(.)u9&L3i3HfFFWgW~~ss/LKQ˖ggf 4SN9Ǐߔ f\|W_~Y4]dn㏗$)..yUE4p0A=cY3ϼ ,ZteqۭIIfIvGSs3'%%-`YON\}'7650gnVfn/`ѣ?ot\]p9W]~i+V*+/766߰Q}m^+t5byo9ԓoM=]V䂼+.dUU#$N_7i˖6b;VYshoe˲ݐ81y⊌GLt֩tqWOso.of2tcʤ7\c:*??7\t: )s۲Mm:-01nD"aUQm& ƭkZ0JviyyEEi~_QEU,JŎή.2(-gnNͷtyqi#0ܜ[n4ͪjC]N;MrIDAT2x}w9f`(iZ(aUGӲ.=޲u[||\RR҉{]wBQ& WTʲbiZaDe9*>1Ȳz%eɲFi*a*)+limMJLP5b۶q܏>l<ϛz8Q5*--y--uiD"@$˙o8ӂe$z8ܭtD(b躬(--_+3PƘe00,pH^B'&Q>pܱ(~gضO: -Y!E#Ǎ=ڶw>Ah¸ 6_JӧϚuc c:#83~?iX32z{<۲Bxn˶ BxCdge}}QSsSnvGuoxN?!> wzKBB(~eY(JC;zwkfRRM àI31mv[ 0 s%W߯ߑSX-~?DZ4332Aq܀r9>?pp,wԴ#{DQ瞻K99h)';yi8N ba Xt~6o|bbYs/[>rZrR].0MHvRS`JMs{ߵrx-I0ɇ^%ʛ@׍$b -h[KEQ"oe/~@,'inf$%o 0qc Èiݨ{8wR?/&BU.@ ޵-h{)WL,E/!&1F`Jh.b5=֊1FdgWqe (F!/lű!)z2.vEMyQ hv7]'=՗{e7|fCHh*ٻwU-OowOSu] oFa|V%KOȈRߴBj$o_B7 džaȲ5d0m"pF&`lҢ]%PZ]\aZ|۰ B(B8EGM9]sit4ɇp}ϓ6/a,")!>1 w|f.k-CK|kl~Fy$I(l%cuta+ n{3J:f y|$c.   c*ZFQۃpj90 ̅a]p#0< `rvr !t};h[{/~@ B^ɷ6:ލ{Ѽ@GT8vs |ڼ4>zr#`l@~ eIv?t2MQ]Fn_.ϤKEnɲj D$4cG]NzH~&9N$Ҋ6##DEq~N_=P2:aq  bQwwFDŽXd䩿-ӦL[0X7 !HA!<^Z$IRtr$Q cuB(a$ITmv iVq<ǩ& D]jt7pkjjl6 åei}yAXɧ :q`L aa?8=8$}O\u+I(tzE_z(W\N窟ڃA3#YQQvmVkMm"#ڃAUUI!<_S[zj>(/2kh8: >l6M\.fSS4Q^A= ]`0Ԕ^WZ!藮:C_P(rrR$IeeHdϙo#G?4p@&9 ̠W$].\U]t:k{m6$Ie$%%$@644V%''jX]v݋2 /(9^ +秭mH*!!^Ӵj K\\y-BvYi> + ‰f53N@#!DVÑ9{Ya ~ǕӦwVYsɗ_gK|iΞ=5IIz%J}NbW<ړ_XGZdi]}=afMb;yA LtEffƯ~,ˊ(ʧX,3'9 @I%$Ir\Wc?_..9<8#?p=˖/_bKf}8P8!&Ɨ^tѝv#yCH Zv41 !D04kYiDE--xa.(B~~/~P(4sƕM?y~E[m9nE˯=|k֙iۇeegرEEK}!fuK;33ߓ/EApcFȲ<˲t ю>U &6 %QXnk+V!3zOy͘>o8lb4h_ hUk>_pطܹiV4m6;DcҜ/:'wޑ7j?}uRBs4rw I7[ξz݆ <Ӳb,|pL/!-Xat{~ٱs^k+*^xeҲӧ]>g_xh{{ܥz$G~&EZ hi5byt:KKII~| 0@%PYytVqe~rD`{pС6nO3֛njhh(9~>t:L,+/eOJJkk#GVkfFEQ !a4=n7/+4p@B|<XiYm]]$@YyE@uMM>}hODQ\N'!->.7>r}F <y0} ǎe9o_V$BKkka$cZl %99ozP^YzOss3D"<m褭QZXF-xڵyiBB4M0DQX~Y38ꦦ&|Y y>N'KjG҂e<ЇU4YLUUyND amx^4X$I kN5148QEBix4-g^I>[aC] E"Jz=!-2Ci,Ia)BzLf @۠:PӵB̩UC!pݞ_X7^}Cp`%I7 Mh;a4a ǾŢ 66l6c׎b9|ڼl;Bu崩I@tHRTtB‘Ht!$/ OziIMQB4`(; ѵЗDQ%(* vB4p$Z0DGiEeWNMmmc؋MsgZG h?bD.'v FC&$1n]N笫fCAz}@k4C!YNt;Ѽ̅Lc<fj;)ɧ bʳ(2dÇE 4vdӝ_?8k/3u]a-_7N5[B-w?PuqU3ڃr/!nܦcs`hG"*V0 X m ]o !o2K&ڟp|vm.)Lh 8\]]YXt:m6j\ؤ̹& =!`ư&ݵnՖnٹ>s;eg فjkiaQ7߄'ut}10 B!w09&T94-.]jƎzaL!ӁAU5 QƄ]@ 7 ( 6" {?nWDS95]STEDdn`2:p޷unN$@7<|IIqB}i?YHtЁnS8PǼg4M)|H }#"~OmkצO׮{<($ !,.[&~9 N "l"lD`6g\r>aNJ"n7Xz" dľG/E.U3E$DᔩsF~͞ x jW]_xĶ@B(l,lD,AI̾}!mDe̙Q@׈,C]0O]zB~#`%Q8u1畞CtZÜ)]7x-3 kuס{q{3k@B`k+0Eeeƍ]|~jt2iw3%^)7cHq7XG0 y>z9!lyy}ܹԩᔹݚM`0B$%s}9h>ku+.h1Xmۤރmmee >NJR~4`q'Mb?,9 i_ؘ8dniP@Ua!NO7 f ?lo66[|Uj7lp 2~\ ;XĴy#cG+B!tF~{]'B1yg#|`+݇32]t.9O|ob ce@ ۠|嬩 nwhimm .W6 clv2 <_\R*uNJ9=cAkj=LY&q(:˹4qvt.}]NˉJohת\N1|cSӖm8s:*UsR]]v$IF׵E@߅.[NBQh*8|q,I"..^8 X!w u.VZpA\\ܐCx8n''%+:N;XVV8TZVyi]Ο';qPرqƻ< -!=k@$G'Fχ9{fgGn1paՊ+*qjs` Ic`0M:-"g9Nw:X??}>^ɫN cy=%IRmmnj{.rX+^fv{Qu]yNS^GVZU6Uuӑw|Xx}W\jb=lw`^$ ct8|>wvXz684Mӹ~Ӧ8]7dI|N#lZ>!" t\чv{r ðYq>=Y,xv)9gPb^NKGVvZdz7wzmXQQ1=>ѽp:~O$Bx<^WVx<z^Zk[xA}^gzv,WGt=ݨI\~4,gȡq4ʹԴP(ahHcյUyJBkjkl6u9?VT$m:ڲܟoXkjA"Ikt|4gv-{Ae*r* 35i+7 }m!'&`'\8~B$U55 />\5L|   suՌ}?hCy (-/ߴykiYY0Q" ?]y붾))6mӖ-OrL ۃiil|%ǎ?zH4/8n`ffF/Q]} BȦ[-YjzZja,oݾcGD_z_dѢ2!.]|EW[[ !1?NNNx<%%<|~A +(\dI]}}F~30?ppOZ[vy} 1h}W[n`(qv " MMM|4æ-`vYynС,Zf1GKK_d5k%Iv8k֭ѿńƦԴ??L~A(ii7nZsCSSO5k׬_oWܹsת5k~8ر}΃RR-l-}RRlGRS]N'=b [~S,ّ_'YF}Ď  IIIu%iHXZZ h6]OMME~lY~Aa>}~ۿÏwl)BqIO\:a۲r8dZUTں3Oy׮\u1Yb-Δ#t ѣ|^l4>nh''sqq~|$ɺ r\.g||M_翲 `B0&Y~o޺q4gYQsI/|Ą}Jd9p2g55Ͼ2 ر7zȑW^ymт m{CEQ3[8=]z]O a0io ]ab19kiik:ΙF ܱ U-A#2 4͓&$'us|S4lYzfs>|yƍիܳCe% <3xg]w}0<Ϯ43 8vIy?inn>Rt4Mx|U7552,+k)3UՁ`DQ$ riYNDI!$ <7lӦɲDq8Gkk*BPeUucFڳwf[M8n_{MzZ;J8ȑxo! U55/ho~M4iqk֮52nnٶ-`fLv!MӲ:dm<4uҤ+M=x萮HOK2yqcwK"f]p}?^ϗYeٴHB>qbwZ7oVuN'jimmO?uz7awzBjj}nW^g|^ofF{1Ƹ^cYÆiWlݾ}>/9)o|[-@hQiY/;Lrff0z+o?}OdAhb3(p8xP޽^7))UJK TPU fo{<;ڎk)*j)*j).n-, |9NJ?Ÿ9N/ÇC 2dƍr՚y6udyy]zΜడYIIee[mKnMOK۱sW=a=a/jmhlݿn_zm۱ce7ogO>O ~Æ - Gfp:)MM͓.|̨{n߾}O2%If @uv;ہłnȯRy{Ü!nٲ%;;B$I**)YmI I5UE1l6[8":B󜢨$LAATU%)%i40 1 l6MU!B醴c@$ܙA( Ð$41ƘBƢ$4`/(j5::5Ur ðX,p( Ji #Bq!],KDQDAt׌;V4tMXHys96U4a煦iV%YcQB01Юp$"<jU"AUX,c]A0 AHN;р-hN/􃮣%;F@tot!c>Ix~g6^!93ս=ع%=njtIc_MQ&G0 Ñg{~]G i'N= wycctC=%Hr헿D h7 0 !4MJ{OW6b0 V =.K\r`o 8qc8=1tySzޒOuO-)G6Bʍ77dn?Bh^ыq`S՟Ү (! t]|-Nq@! I(V_,C vr ;P,I< NKW@>sT,4\oԾ}B `22+Qm0{'<'ݡR(f3a^ON܀*+B\Mt)wmʸ}!b `ڕI$.` A06 /fڰvBMcq9'ze[Zͯ9SB0ؘ94w=8.++ɏuC #O7VK{BEXZ[u:Kk[-Ǐo 4-6 |QmW\OY>iNB`$p75N(1YgΉB?PdyFkU3W!(*OhW8v28W&"Coxk(1"8jIO-V0gIݼwAȱiǙs`ll˖tƐ!FV70CcaӌN11tb 8k2 !74s>9'sL!$&Z!/Z}*JVo4z~z4 ů 0 zo)U3FB0 #!lMpc&lL&,3 t!4 RTp?q ںZz8C!q!aVV[-))3 @CJ@@B|8CkYPB?0LWcCdfuBIU5dEU<ʄ1y,3 BYX!B41Џ1&Ȓ;azr Baz-G/!_qa! 6U BB-^Y0)1Ƅ@g"&Bh;nU“´iBDQy>B ~#P qat?~aD%!DĪy/)=^|D%DAFyADQ@ EB9>eIaNBDQ1>aܘgѢ(ƞc gQl&Hh C457ɲ @@LB@/Mljw>6*@wófuDP 01NKMK5Mm ;jx<”(nkQ qC16LljDNm`ݼ 0= B]{ڛcXYU]m6U2OOM+.)ݿ0 QKcc*}ʊjEUD'2Y6--5-0?)!f.!!984nBܾO$-[dggkvƏ1 \+ddDYQ T]H/2MQ5MuI| P"[8:XEa("ȒD{z !$6\ȁ;< IISB8C@B1ƺa@s| ؾy0 Ӄ.Ä0A49z}23嗩}\.2PӴ5g!D "1v8aXQWX 455]9m*!ㅟج֫g^ oT[[z<CyӦL?(,;pa_joZ}=ٳfVUW㒓׬]7n옶@`݆6WڶsO Gw~Eи/[EV][n!ҭwMIteymS߿goc^OF~E%U33'^z xҥ-~N'kbӵcq]w{o_Pvmظfzλ8g<&$4͙G>h~$3o\56ȲҜn<lozUŋ@YA_zunV4MQ~TO(qxѢbQ!AM^xy<8gPW_xΟz%ѣϽ2!dҥ˖ص{/Һ ?^"K6n޲eO/NJL^d鎝?~ΤzDa5#Ekޘ;gyܝyG;zjmicFȸ'wok455W`wm5jwyapyM}yʫ/Oql QiX֐ԟ_j߾,vQ<bteUUU(Bѝwok[m֛o|o]7dfgϚY0|ذ䤟μ>p={Ϻ  Ü>u޲w߾&"m6(WLx7ef?zh޽[oi,3 s9gҥ#.ZTSS;u k|j#OVYUUXxXd5 #3v{$ P( Ñ@ k:c,IҁǏ?=0H8;''1!7Lcʤ+ t]ommݹkEQ^^^ѿAQ+N2Oo[[`E*b&B4 USp{  LG"`kkkZj/8~tӖ}B@߿uYC$I2M3QTM ÀP8lZvU%IjkkRaΎݼ %^vWϼjɂ 4۸7= !\ɧ׮MNJ1}ZF~E%%2䤤k8䲲&^ZZV-.hx9ݿ6oj?{~+S3ۓ[S[6ei֬1|h>},ѣnkTv w<r^ A+(س'wG ljn MMMnd \V^6n̘mmmK>B﫭ZòSSw,_JߧZ,Ç;5xK/YtٞꚚ'c9nޞkZ% ! 9Υ/;CχaՊ2 ^ .Ii @PJ[4M$IfZiO$I4GH$!dXSWkF/#aqhAKIcATU8㐮X,CyT "D3 s8sO0FN㚪׭k0dY6 ! 4>wZ=QѧE"BBHoA=4LB0B(Q = XdIWQ@# 4 0NڌP(!Tu:`Ųgo[ONJbqa QϡVB|33p|4E7C !_݆.˟硓w0nK.&s9 0UQU\o9z  a.,h#DQg 0 sn^Ԕf#` BMMM8D=%tEXtdate:create2013-09-27T12:33:07-04:00%tEXtdate:modify2013-09-27T12:33:07-04:00|tEXtSoftwareShutterc IENDB`selinux-python-3.0/sepolicy/sepolicy/help/system_relabel.txt000066400000000000000000000006171356774067000245660ustar00rootroot00000000000000SELinux is a labeling system. Sometimes the labels on disk can get messed up. One way to fix this is to trigger a full relabel on the next boot. You can toggle this behavior using this screen. Note: Sometimes a simple restorecon is all you need to fix the labels on a file or directory. If you add a new disk which does not have labels you could simply execute # restorecon -R -v PATHTODISK selinux-python-3.0/sepolicy/sepolicy/help/transition_file.png000066400000000000000000002102231356774067000247060ustar00rootroot00000000000000PNG  IHDRj8pgAMA a cHRMz&u0`:pQ<bKGDIDATxgt׹ >_Pr 9'IHeY%˒}>>7̺k~̯1k͝towslYEL 2*/̏ @0ERTo;;}_~ZQQ@ ?[,UaX0111111L B.˝OB_[dj|X2̆/{{{%ĉV\Fe ø݉3111111L&ӧOrYuv`VŲBu]u\훘|u] àcbbbbbbFLobbbbb$719A(]Gs?+}.l>tMb /gs}fbbrgQ2`n 'S躎faHҀaȸ$䲸NDAf{ N4@5AfbM,@3 $v USuޕH&x.dIB7 8(r:owswi E}&&7G,oˇϢ*]K:W^3gٯEu%||Of2 >8zp9PoA/~7W?'HFQdc,ko-h}W3o@&& Q97照L6ժNgp:|_(XVA K Oשyj .:|JEfj6HCM dt&S~w]u5#mV++EMӉ%<ģ4GikndbjT:Mm ]׉'yPW@$S3XMiC.Ozy<@*f&fY̞qilJ4]glbp4ᠶP|^%z%R S_S ONE@$TēINAt>Vt.ALL>uA`r6ȟ{vQ_S}Mn)MLnC TUr<~ AA O%U˖bB߆Gxaj$dYjkٺn5x][_ȩ3 ^a.?tyG,Wn/fic($axrQ0faښxo05t;4wE~3^ @uHorqt˗! "aGƈ'"11[1 K;woӏdղkntqg&&&7f4?~:gq ՗(l[;v$IjPBqK0Q5#܏W~`U7 6]ͥq^cnr.+&xnh῿ oXǶ k矾ѓg[ﺮ:jsyv;^&4M+?5UU,h'w@F'0hon&j>ϩ0 ˗}z˯sil&lwC4vlȆ+᫿dtbgi#Jǩr/ڛ#ry_:M|y=t&wgϳ}ڲ\eE v;oͲ6oT=x.<.[پqobYg%Lѵ< Ӂ"جV/uvE]u5S33hAPa^*r.y{.^b6&ϳ'OdpmmV|^OyLUtxr_GwC}C8pjժ+\0d2Y, [A/j1TAߪ(dsL.Kn(2,KW l>$4 lA6GQbBq"j6Qɫ*' Ng@!NU^_xv^ y3aXl>O:b K$*,jrl6K^U+z,_A,$' 95EQ 7LLaA@En\sΙ[&&7,l p,ȶ. f,aX-JD"u]j,Kج+:a(mb^i|n.A4Ozl'Di0=,R!/R\-E)O གྷ'9qUsn|s'( 4NF$Q,ٽ2 QD BYQ81؊LyT&& MSIHgUZhZx<Qv缱g1*A sQVXN}] T ۋ$J44355EC}u{JQD ̕]L\p##箞A`6dP5 uk TUGƘeʕ^`i4Uu.-ybbjkjn]Qp[؉$Imٌ, _H0bW!0 <)8;qGSc(-"b=/8N*@" ݴ(82Lyc``1 L6[ͱi:2]T EèykW Ayۿ{@qۮ4hOٳ$IN9K./s{Fw9}Y…`' mrg033˥y \i5[8FoG:BѭTCݷUaJJzy2Rܰs׼4OL;Z,H0Cٻዅ 17 W(~a<}Qq%W-d͍{2{-ɹ靻!IRGH\xMP$/Dr8IB|&IRҮ$I444t: QD.77ŹG# ۇ(  * V9z]!r{W]gyp  5vK6Ae}xt"xs9=z=hlh`Ξ6?q  Jqailh,[=ɓ8},^}ĴIp 7vjN>~CY|뺇-vD<g*A/r!<okY'{8q iE|>8xEQx)عc>TX<ζ-[Xj%?80 D,c{35=Mo۷n𑣌OLP_}۶Afgfd҅8u4<#Xyu'"$+3Ig҈n8l4T*jEet]'  `$Oĉ|>Y! G4 KmM-N,χ(d2b555W3# c;gYVZm9&'gHtlV|4ҋ/A`zz'njk%l߶P(̹n$Ic<~uw P5YV|ndY>"v6'ƱZ  ijjnzeddzDISq8Vky7crp:{ܣ(L<GdYѤ(S$^Y ./02:_S?yMӨzYf DlĶ[&˗DQdEYf mJooϓL&EJf$0Uضe ˗w18<,K,hgNV+O>!fSMn 0>-M/? ܑYi:MM|_?`w/T[6mDIm6nĶ-D#D"A 311ɥK'lvR}}t?O2";XҎv4M#vr9N9C."}sinmi&wG{k+eW]7#ׇfmB}]-Q({ɒvEm)bY cVxiii|VivÁ($SIzzioŢ:6 zܮr(8]N4MCiXHbvy'膊"$ Ncnx{Hg2A4#dYyxN*LNNc˦lv\@uVt-0 Finjbt.Yl0nioۊ z*nބa@cC^AhhB//n6nX(~LavՕܭyN2"O;NZ&·XA]m cm6}xՁHɖxI*^Z[PUѱq\&+VJSg oVt\|Ӭl6 m)֭]B_?tZBΜvЎTx8A L`n{D@4jT德br*}>BTp8߇ngՊ崶4cYYz55eŕ+Wq:0YZ+W295E}m-Z;(HD<'H`XA$Y" lD"4h] ¨D] 7td2I*"J(HqO  KC78Vtnb|4M% R_׀Zc,\ע]uqNKLn Я^n~Q]+|)[F]㹑}6+7q_>9jq/ucBɼaVZwrZ1Rq|pη `+*n8 9vSX,Si֛D4M-."nlBz&{ àjgkWfw-;;V͟{=;V=v:P]]'%E>E[qf\v5ÕoՌܩ%I^`}Μg#at-wiz3ke`BfioXQUz1(kɨZИ Nvi٧$oUlPP4tBarM=J.`Zio 4 FAfZHMl.K2Wˊr 7elpp4|z&&<y@UʪE=DJv-W.{n@%>*{]J7!LLv@ SFXhn0לR9-ʴQ7~oOg14ULn-6 [VO3w[m51,s˖ \isorCD2<57sK dYdYhjdY&&Y31111e+~0ZW.bz]ruQNCH`y_ OdHe5ƀE< 7<2111 Fb4r8xpu%~MnnRapIד{oThiw[ũ8?S}!,v://j봚Z 7?LLLL>ʂ?E2:jJfbqV+;\>Q}aGG3N2K_U]>J lcaMLLL>d(J*/H}]B4EQ,av;3?cCn\N' NH$B.'QYYpYs|"GٴqnkDX.܂y{oaMLLL>+~AHg2|x8\E2ٳXVDQ9vn7&,rA0:K/|QG(kYt@ذlȲ"IT -_0($K{݁<>AZvdY!ϑL&Z-`[%Kxϳ1:.پm+u&֯[Sm]Z˲%91ɉ3iVϹ M6Q@0LAp/!rɧ<>;A0 /EQ^UUv;*ۅ@u. ~Qx?3ʹsA?8Abt2B8nHY;0!̭~OA<@/*ꉢ"+TUVr1.x=ؾm+qidD"(Ȳ 4av?P_ٹE,<)t}=S4S򛘘r]]]UY*5d2I:s55X,v399l0롮H4@5Aን 9&gdyNz.O~;466?]:TWULLLLn sYV{ts̽?AZuDAA "⢂Dd/ D":am%{]'P0-$- 03:w>`:^ܢ|1MLLL>n^G~ȏ1{Vɧ-$jYIZry7@LLLLLn Dj#sE$I4r8NS𛘘bnي_E^/MfG$bn}9J a` }O[.\|f1o;̿"nruLobb0 ҉utS"|M)a:>ɧyDKY|>K0#תX1y暂_4$lv3 l6+T|>d@txo3gBGFlh krM?15A>pLn q:ج۝$p YWxiS2~rDȫŔW⪂_UUR u X,۝N0  ԘzL>6rTzTr7G|XFa5XT @6EQ$I2r m#@V3pra"i|D$9ջW]^r9dI6;g QoZXi.NjW i8,AUXp~$iX" uH$)Us\ƾ"s'MuEQnea'P[SC,czz]7P\ƙ*Ypg!9ºkH$eZ Cs[3wY,u+Mhu\VLE1uw=ܷ68 pjkiin& qqd, àW?8K/D B݃i NDQdzfq@BH*Ձjn7PH͊׌A>Ghݷ&~Z>Pp8B*j055M$)?95xt&ͥ, XR*&:D2@%TM_cgf`T$SB( l60.r ۶ 9O`9{Op8hor ΩLGlN$;.mt""/t8x8u4kWb8uLyݻ # @ee%U XreFEaH$T C<=׍itB/uuu]* lݼGv, >ݎFUUj\4w-cbrX,N"䙧o$NBmM ۷mSTx `H$9p,cx]/gMM =09kl|fuf~?Ghing"R9_nh4ŢvI70 vt "CC#P|Q{zDTxx<*ׯ #8`("xl6׮ GP87 IZ <9wǟ+UUiӅ'<3N?99Źsq:{7Ve,hͷ!J!2-7U |/W@ /@UL~jeiG|GSb1$|yoH&ЃtwGQd.32:tۋb=(O@ +w݃n"WW$ͯ}ƆNcEx=~?uu^~uZ[[Xf5{'ȲS?cZZZfhk^et-,Nz_—O0 N=ӧFl*qv.]SO<>ydEu?cXb Rr_hmmadt@C7p{}Bǎg|pGly.^v333[_]fg &Wƅ>DQ,L3g x쑇rZeNl1_E5_ʂx2GUUN# \>C9M8!2>>Kd2x=nҋt-[ƾD۞cB6#s!vt7Q~ZxJK#yRhwy f*u.0tu'ϱqzs#X evutu.e;xQ5X<h_*Ձ>8p8B5 M[@9_×.^w-csU]P}NjWyUCi+[EQUTZd =v! }mBۂ|^}ܷ};۷ms82[_;Aυ^$tfV\ai۶evRFF9p0_yEs{zp_'RzbN~SϳeF;Ɨ_=n7vw~QTizYE4 <,3}@^r ^IJ5j InW/Qݎff"WWzZX-Vp"KZ EkQ8ڰxnE!1zY&͒.w6EQb<+ MU3m4_+rܢEQdpx "V={ppD"A4駞䍿>ʮ>ۻr9z λ{DQ4M7P· ~0Xѵl^ʫrZnNMMJڗDsٳw^A^կ zA8~TAgCw~vt`XzK`(i&$zS(2FQP8u(ցaF^3 d,xPQ✿pD2Y% Qhnn#ج6-6g^~ʫʣb⼜^Fm:Ll^ycWڕ @6p'GIZ,5EA*㙧?GUe%=z*Xj̽e#rQHR(D IXtpaR4E)uOO _zX,q:_"2]:Yũ3g*hl7DŊְu/>+RY/T^F! XEkY'oރag˦M|}/WUqIN'O>|Ǹ]nfglݲj>o*#e"S+"p$f/+#fc8FcrQv= 555o^X<,a6"Pz@ͫ\N|vS諨w&YZ|jq*-X<~E2‘\"h]sv%ӱ4*V/i"}Lh,J\H`|bfm6 % E2"JQYY zqݤi*+Ig2d2, .`-l6‘0UĊ 5դRi;It]Q=ElW7PY˟EEh_E2y$a Bʓ¸p0[&&&p:DQ/jkjشa-x^a]n|~ha頮P>(5W%uf`4jio ӳ4L>n[`a}zQß@ESmmUgիزq#ZqEwŽ ta%J^(Ub WWwWjy[|2+i[|/-(¸V ( q{Pd m,s臜9wo}עi[fvGG:rn-+S XJyN< X܋ҮDA`"EB W+߫ͫ¼M.6.f\+b]͵X 9TŜJkQ>yzEQ|a^a6!` [kTx%/,h/[a+Fڢ^xwnwyܔ=0O:7G}b •{~UUoyjkfn o7S&L?pݷO]kحU-&T~  >_L/v8n4G X6ѽ^ŀW-kMCEzҰXI&.)y-ʂT%6P.-jY}fݚ54M^ߏK^͗m-ܨښjkܷ*m&t" XoGEEpD`]9O˕HR(r" Z>'NnM>>h^T|,贘˭E*"HY_s, ;$NQMn9%f[30 _Eڞɽj)r؎D"93Ah UU&&&&]ulrg;:144T2x2LV|լ55,mZJ&&w"eA<  #y~L Wba̺6)008Tvfiom-1gSzw0n%+x=-PܮuD"N6CeN$F\5EKgvq7C2(.8p9]J"v&2 D\&%^oVn5 VX|.btqa$q$I z-N(xsxܞOmUv߻ TM+XM?x?Ռ̫SAfiNd"nf=jh,f:Xh43kS0bt],L&bG7i$IFy9.\!O!t=ڵhkm؉>N>ZpmJ%ٻ}># }*jkj Srs=/Z .<ҷV;o16>bfs7l!!dp\. 7g284ȱcG GUkn}Eg#m}^뜟/Ξ;C<]|#SNp̩CGa]yu*K]Dcv?y6qxgffoɲ.v|UU_-XS˟ɽˢ?r1jnJ&_Y?HSc3v9{<-BEQXd)^`(H*$c۩ 033p295$S[SG&!X^y.B[e( cȒ%HDQ$ 3EQ,Αc444 Ex}}1It8#311Nmm6v };p299A P[ ISȲD.G|~,HLmM-X-`\>UYz8*Ygpx]˖cO" 0<<ŋ444]qvYn ]]gdH%KD<PG308nGeksj\K44pa084@( 0:6f PYYҎN|>?۷ƍ utx'hkmg(+*|X6&&'hhh﫜a #2>+Vsd25v+$QBtE˥1ϏFTFp8=jjjqlrʛVZb1>>~144}~5TfZvln((z$ b0j WU21YK/Ƕy[\= l޴EV4z F.]%f2126¥K,աi >&.]H4pdu.&&Y01>8\k׳\.,-DcQ</u8.TUefvt:M PÒ$SIz. r1<MPSSÅD z [6mj1U<t{<464`_76>qm456v{H$Ar\A!RLs ydYgq} hQ +ʲeˑ$hIe˺Hҳe|AN<OyfT395Qbho`jGjL$EK&adtÊ+Du!_nϼ~Q]]>j,]Ikk+(2|qxӠi^S]lpvr1}fs,ph4YM1Pq4[Zy<%Lйtd.$ 6lEL&K,#JxK:e`(\. ,Bcc#c444`Q,DV^K> r455%0(ML̔?$ښ4]#!׍w=|E4|>b-YVU]Jw;A$Z7?YVSӴ(bYȒ\~wtбHRaw #B3$rk1>Q ? 6jE ] J9{Ǐ^f7DeU۶lG+l6K^cِSd2ess˯TLAl RJ }]H&ADQS-Յhh;Y&s\ag@)8 r䢴{ vanD",岺b΁ynA(,%Q* 0G@;( ~;s^x&Yz0XYn(bW|p5<7?(bq(ܺhDQr.ގDӴb1b `ٰ-;ܒ$5ZZnnWŞ]ؖqJtE۔rE(һR _,L]ksԶ5ʫJYk?D,c07m)O2Nvt"X]/V6s2oYB0_-sܲ[MLi# ぇn aY\ގr|n=f>$Qb剷nwE2̺6"iFajҹtټ8***ni:WF20vZ(JouM6nTP8R \𑼦K,V"=lU')r\q(|e-WCz㇡*" AR H40be8d`HBٔa3 o7Û-xLBZY쵯׌r)-_)M 3];3 o7Û%|߂j,b.ƙs׸'y "MPٵ3Ûfx3 釟Q7Ow5UuQ䎦oDԩn |wj(XC41t•ܼqu`biPQhIPDvi+Z*|N5V\2jl7,eQ֎ѬIz;ntՉGC`iKf @{JG۬OQ[a4 A`2o:Í) R3X Xc5nE-Fa5FyW0 s~S]1B vWzB9NO.Z<OHBN}BgVPWӸ\llu+T$z^aJӍ99.i<) ܲ(岸|\&κf  jQUYJ&yʼngya~K\T{*0nSgR<M84d{jX8ϱ$vSlhqpx0X$e=2<VYY`'GXƪNr)z iƣpa*é]u66:&U>OKE}sb M7'T;v)$r:v%.|j LgEi[8;Xj^k|ae5vvD# J k4-IX&wQu / @81):荒` 27kGrh:4-ܿE4n `"G7 ]W:[\ x` ED7^)dNg4#1{0ƫZ/cC3ŠOxZh&]] ɢSxgFSu.rlI4Mkzg4yZVXmAT`B>*r9̃n9yaQPRE>j(|aEcWUFqbyrAGu> q4;OgX^ogIgVPQ]D[ZtT[^ܷEWӣ)")ƑP,OR9@iDVg"'0Y$ f K er d pPC .sٱ4;65ͳ'} ٰYD}\ ~M8:`2*ù4K#]71sd(I0rcbM> 8}T], *_zkLFOgp%p-F\r8,TY`g2%34[꯫PX%3ݟچZI fyt`EhJ#Towޑr:'{Q(|h~x/3DrrA0ᴊm*xⲊlpjz(edV(F{.q)R(O*34[,/.Lf h X 牧5c 5 NK#.*+ټ[U(ܿMJsٸٱ4]u6Z*DR*'/Pu%6NT %DRZ<*WX{/\UYccI,rtltT[4ݱʞcnV Όɩx&cys;1y-7%Y$P?Nt&-NTO3αFV5⤵JJ^cI+,,tOtjB[ʉg<:;~+.,ƒƌfbrWP_aB'߀nc%i4PdQ(k 45 ܷ?=0K2Q@7 4ܻpb\;0@JG*U*Wbω"Z!P9~ˌqvye}]n ÈB!-8I #QymRܚW$UxlS#):G_p- f}>V苋M.z G={:6110"R<X %Tf Q(ԂPT2yl~~ҵB a OA(߰x.AA`ϭr;(0(>,s>=7a,"v/-_=2wy9dbyf2/XF#ׯY6g~ |V1 G.pCd%,. yvPZ9O?A3ߛJ &ۻ gItNGFkFFp o7ߞ$`Snz3t%EdYhFcE((hjp4TXĂu oJHfx3=~N$!5w ;?fx3 lBe&_nG gT0gVS5Ûfx3 Ë "pg<ƒﻡ-;CW4NƵ]sCNoL3)MLLLLL!nZ'Ir9ӮB*bjjD"TYz$Gئ:9cS$놛!3]m195ekawϞ8u۝{=+p)~i7-+\EfsKnw?3_yg^3 7#/9rkWUnwh{/pv'䦸Ia200H[k ˖-^u MM,[I,㭷a``M7PsLڵkyN'ׯ>1A2dg??456΋;ˑN'R)&2ę~SZZMPHxaV]ßKiokC4 (Xntd2I<'16>A*ݗ_k_ROgD!̞W^TՁM$)~].t88}n*O[Ɔ9B:A%~klٴv'Gevy]]Ϳ~Ib,ZF,O,[Sx{֯]^@2G?0L:C&&ɚ[W#X-Tj_\NLLD?u ##LNN26>#vr:yW?OUU%c.'[>j%^֖fuvo+vL>Y.#WypX- à/>O<(BW#HpYY>a5ds9RX+W~:|1\N'J,HQ\.'ɿ7 CQfDLMOB$b8|p`(D-*+}> K(bv6}<裼w[x/Qinn&ˡ6CYy"F4;۷ϱ]7Pm[|əxvŊ崵b巻HX4}}c<0/:NO}}-֭GQd\..kRUU׾%ۻ*/*+lܰw!r,HtdbrSH/lkk( J'&8},p֖VNjEQTU%H`QIt&C&p 20 Ӊ B:r 3,L݆e; MH$EQ0 $wm~?60 G(g>96mXOXl6K8槯+yGIRجV4M+[ed2:u\>NDQ$͢ j-KdΝh\UU& q{X$<O@p+B3YaKɭG nK,:f9u0W0myx"ac^Պ.i#$z}&.j!y|b# bYB?/.Juu5n I }[>wNDQnV;XCQ\իW܄<Ȣe.2,׼(= .&&χNdڵ7 湻'bbbbbbra ~{S𛘘C&&&&&&W~Mf L8 :L}ś8JR.c0HR7wsɛxڔz]:grcRi]\!{./5aGQlW<|?#LNM1::B~s '?+ky604|vg3/s̙E߽>zJowh2 gu{cl|v'䦸Vك"vyg~?R__i~*$IbbbI|b٥ΝC46Գcދu]gbbi.x`ss֯]K.d*(_qrbß@TUv#2  j*h,F_?X ۍa 0>9b:Cp\DQzz{Ix=R4 0(Cb1, ?0 NEQdtlT*  u475-nxPQleSs`p:lHD"O_~MOZZhkk21)s0#c8y!~IzbjJk-C!_119#T*!Lw<@$ĩSA֯[GkK3?UZ[ZB|Ynx"^‘G>=4VC.<=_vS"Lr!hnn֮^M{[+133Mv򥗨`u455 q ?fbrM7c;8+O}-{A)riizfwݝ}wx1};^j9FH{{}U(o2Bib~"̬<''ɬP CWBrŸ\/%"@dd$y9RQU^g||rqqqb܅\" $$**Wl-)x=^d0oC ~}qAPT< Q+W,t>:?yJ4w{wr9GRIva4"W(p/WTD=29rl θoLJ'ɧȦ3ɩwgfmxQ@0v#7r}B!;\ L:208Oi&`AnAoa:&*7^1x?FVMA~>7lx臝sx .>'דD^n)IΉ v>!B.SOcq:]]=  aeKχ8(rdp]>Q\>4\>+.  0%Q2N  z]T?MT* = C HKM,Y3gυSj4~oL92>1ݽzJ_@iy̳=v299ɇRdŲadT*z=rlkkk9urd=SRZʑcxjnߧ<_(1}ůG/Lm}=ϧv8y jQkԴwt2tJA~>%e=~W#iniE`=q@EEEp-[Z>ga1$$${N.^%3#c+546quN'q,**d"**XD{+ }&x jbcC<9{(R\Z֯][8p0=qf*Z ܥAzzzA1Ѽҋ( VZP$zɌt!>TJ%?vrsrHJJB!319l?3zccbr:ϝo`KaJIDATxhfC&)y<GP :.HLt4Nka0Z,8].FG0ED`4fySS&#^˅(ţѨYF195$QQQDGE!"c8]N V>n!DQ$1!^exx,ƈngdtwwp~bQ(184cYz[7ofdddx{f4l6&ŝٌtE12:Y8%sLt4`Á)"eH$ tvvd|||>N夭mn\_ >.aEO_鴳2MNN"$#=}}GDܗ/KmtvE?w2_@gWp̻. ||0 _qwQ+r##s5If  Q^QBDiGGG[\L{G'CCAKK;222”+LNNb|6+$740>>>~GFB!\n7@Ap:@(bddqDQt:z37 nYt`rrj] 3 OsK+jhF854r9r?np>>~v~Mʹ208H0DY˄s^q:&SSS Ϝ{~! #SN'lv~?PqFLv3n195麟 㮳fzj56>οTTUឞ[2ה{|ᣟ_H$_e}2~ o7nަ FKS\LM] F#o(сerYf͜z}| ؉Xlyo~[oNuM-UU' 2ß/p5rXb9~|˅N7^rA ˖,=oP^QJ퟼Cz 6L&r.9J ՗^`κ%>wB d9'܅ܸuEE޵ݷ\~xK ,^ >H!T* ybv~rd2S<ɬQ(?xQgrr ,f3<:>Qp{0eU5vB7_j}() DD&&&PըjDQ|sIH$QA3::d`pŢ"7o4:ٸ~={EgW==96j::;IHHoEo_q1dge`HLL` $q ≍ˤ&O =8=V+/<7֝\RV+UDGGoAVf&T*PH7XV?oh1̔snq1kVuSvyضg%l\Njj q3hl6SRZdblllc%59DIY:fٴqfwbl޴ VUZZS\Yh(+/M1bk؄b!b-pIocj1LBjJʬC%>>nV܍~Z~\t ^Oju-3M-WY|sA@0ZBTmf2H# p8aοd2?6mZ-FSAj5( tZ-ZZBV2F#q$%&099Ft:-Ƚa{ ~W?E{ݍL&# ""L^qQd-(Jf2iu:\ӹEQIOKebrr:^(>_tZ-rNk\n c1 ~ VU/P 0ьFA3؉utRj4(JM8ܧAReUj|z|z F/f2,>gڇXt)oUU>r݁Xj%˗.pyL211VEףQQW),(デ))+t@LLL8x B\."]V8ŵh@Rt欫QQ*h5ڇzteElٴ|-y)rsz$odP?;QM7qqLNMGyHKkD[xw{NdrG`hh6 t*5u2Z-kWK0D&Kiljf˰hZ z}}\r_sm-fpL`6`5=~! IJHĩS7"+-%))p^x} rxz Brzzxɞ];iljʵdrd2غe3WБ#022J(b6N%P(rn1N|Fnnv@b8ݫBsCAHgf#!!L$wKzA:=ׯǃlF!qB}C GnNٙlDEEa0q\457ϊBO>axd&[\nD@d8u Fm}=DDDpd29ՄB|)k׬S nQQ!(p[[pdDFZ.8|((lɒևZRRBDI399n'55QDQ$66ή.ں:&&'yIOKQdeDGI=qD}D"H$u{SD"H$9H$1"5D"&r9d\r_|VO{Njj'2+/@T4%e\|BCTqYNssؼi}!@I6m؀\.󴷷/cp8]x6 ^'';ܜlrs9{PukpEr5ǚb}o?1+W,zGҜpoQ?담Zqgܱhn޾MLt4(W()-er^룽\JʦSQ3<:Bjj*c9vv^|~SSS ["cc |eK`Z岨sijjjllٴ6Ay~R0L>{R%[&=5^d" <;LFLtQQ$&sm1\f3d2-ѝoa8*UJ 7n"##^yur?aZ" ˗sq^y,^2f%tttHv\NQaBvɷx%##Z&!>D z=IIdge9}םJFF:rHKeu5f%e&23ju8 X$ JEbBv-6lRz=h4Z޻AYfҥ199B@RK󑖚²KP< 33Z-b0!#=4B!x.^Vctt#)DFFl&Izz`d`p\B.'**l晧Ν&bx<=v2Fx\+ť-.^L&G.s]ZZEgK\lQ˧'> f߳P]SKKk+%ee|>l4g?XS* PY]M۶l^N">E"""صcvҊr2IO`Պ夦$O~^y9SVQIA~-->{.S{|78|x:Ehzk饢 f W(lgOc  qr)J+[RBlL 驩;q(bcbYt )ɜpƦfR9|(=}˗qd2 eϝ3Z&=-V\^n{z{9v3֬ZŚիQ*  R][K}C#t?iX~nݾF %%s >=qήn.](݉=~?,YU+V iLHbYƦ&|>?9YYưbrbcc!=-غy3Js/RXn- l޻R.^r"#)*( )1EzzYcdǶL&&&'/~Tֆ1"K":*H,^D\l,파ڊN#$hj X\Tșs1uƒCFz2) RRa }l`0~Z++ikoG&3)n횅Gڣ/ h4v33oxnqE^IgXZy)'3#lFiޡP(_\y=6nܺŊe0 TԐ(SHYe%(r`6 7;6dTJa:8Ⱥ5YrΝ'|~?ϗYjT*ILH@Rq IHH =-W184{w}:wL JF22BlۼJE\L `A!LAOUM iDEE~HNJD~^W˗c/\o:%9 ^ephχ A axET ~ՊS{YhOIsK CRMdhZ6oܰЧD(^~7 jdgg @ 899$'%?0AGݸ iRl$'a0`0`4P*lX4 [6m$**ʪjjXH p8f${L&c۾}vׯsn1VvK;@_7{׮yHeRH$Ʉf eq\,Y HeRH${~@ `; ::ZxI~xH$ߗɼj5j;iVV+}\%ŋD"YhR7A"H$LjK$D~D"H#R/H$cDj%D"yi].CCI Qcf[r><_Վ{z].WnZt011E{hHt} I$ dNf5}\~cwiʍȧOPZV#p?"Ue .{ο|~~m:sC¥KTVUs'=\x6~(695gů~}D]=` @cc̦8q4w;dedO!-%&awi褾ܜ9,FUM-,ZDk{;W@TRVQA~^cTa4iL|2::ƭwl޸BiY96‚|RS}.LNMaZlv;=VZ'$+3; lrsr(+`dt",3}!1N9׸zn$5%V;o~ ~λ!?._>sle |zÏ?fdd909vx^ɧcjj ZZ͕k׹r:!!g`p.P؈R>brr BJBD.G@ /|N,<ʲÎ(BIi=JJDRcZhnit9ȧr|zƅ.x'A ؉귿cphN3088w<zT2 #m޴ii޹ΔIa~>$,YeKp RRRx嗈k(UJ6[Ǯ'v|u:K/H"##Yd1%eeƐAbb/YF9Orphlfrrں:~k243.P?Pˍ؉xYl霵HNNbs\b`w8_.G-^E"""NrRRcl1ӷ~BVftY#dɣbކ?sc*[HOKET(xx  MM0n!"##/P(X֭YMjJ |2Xf5?hhlo~3dIKM!3=}Q*@Uu yyZ"#1rsshmk I VؘXbE=vP(HNL" N p3eh42888CZʙHOCYT )eQ@ӱwTTUxQfprbccB!B!P(\.GEj$$ij}fvIjJs!=jg˗5[7obo~ÖMchxIX S*XV޻B!5GW^ )'^%c0 ,]:#2JEU* BιsC.ͥ D`%4r%imob1sn1u ybbbr^p[KrR2W_4,^Dm}=\k2<2BaAJ+P*UWV͊褦CNv6bEDEEQQUZBPr#S[W\!cE E^n.:nRQ"# **a dO`4ho``pKWRHK[x}>RSSdDFZ P^Y8L >By%1!OaA> zClټܜرm+I\r /K\.5 8l2 n?;(d^Ayކ߼۷ <3(~ZwBN0jQ(B!~?Njo߿ s#Fwde2>+JJo2dsew9sHJ5,)ۺ7rgχFA&fzQ{?kɣ[et_d2٬\.CVa2z(j0uJRfg`pex>X{_|+ɫg/^ڛ~eZڅ{xeg)$owҥdg"џH_#9)iE"^H"Hڷn#""Nvh4u"|oxH$ M_"H$LjK$D~D"H#R/H$cDj%D"yiN;K>119Yr*_ X|8&&z8}|Anw̛ˈn>\^ML<\Cp8kcNGΚofM- |8xn-^r(.-lr=X&WTwߛ5 ڗ|sn^^;:p_7tuw/t0A>+w~|/]6 Q]S\">n7%e׿ԙtvu-.I$Ȝ;t*rq,f3g_؉ψ$ wޡՊBn</VAhnn2ʚ#Tbj4t`」 VÄAum-6V˼wνeDQfj5SN'== F~?===p\׿BTd:ͱaZ;+ftt *p- ^ygg|QYUMEU+W`bbZ&&&QU|x %DEFb1ihl ODD'Ϝr0LU*ji^&2جcjkk1kvQ0fDD,f3#TVU3t餽</ֶvCSN::DS\ZJrR2))s% 2;z{{hC_|>Vcsp?p /F^n [Ɍ;Wrg`p .c;fdtf(~! }N"7;I}WDt:=~|2V?xBӓORR"1d; $'%rJRZTTSZVβK ::!;u7_`0ȸFYyk2 /W^Kt:HJJ;446j~{A3~>p&FJ%>MZj*wKJxgcpȟthoä$S{|%e<}!"vZڸ~&;kѱ1Fhik ?O BJL&AW@"yT̹HNv?y5,^8kV7_{+WRTP];ٶe /ٱm._lX& }P(0EőLnN%e֑Gll,ƈ?  /NbB R\ZKoŒŋEXl7$  ؼi#ߏaqQwdms.ZukVSXX[oNduWjjn)wD 9Y޵ny^t:)}xGnr0L|~v+-cռo&v."""x橽5 ;LOo/&N߼PU]^jR::|cBk[;ƨ' 4+F.^º5[?!7;QSDPՂd͛[_G64P;waq'Jm[K*5Us,]l^yE-]U2 +>%F_H;n~R@ ( 7ccDFZgtN. ^B`ttI7N \&GϼS`6ذn-ihl՗^D0RK~Rdhx̌_J"C<ќ x}> :\ngjj FԔpziu( <9cV~w:"x`xdVcrj t3(:3nq%VZERbB8#R!'w$*2!" r2<LƎHデtZPhg)"n<Qh4]>!$ttjLLLo L61L%0hԤW^Fܜ\߼Iyycc,YF;FIi5 z߸Ik[FM֓DqI c8].>=~v ܺs c0ٱm+qq=Z ^VCA^]jdv؁ȵ7P(2~{-.nq1P|hnm%?/@Z-t =X22(^zyz/>ENV.\5MzzK/Nq16̌t {ҲrVX˩kh`ll Obb"55w⩨`BAnNC}Sgp8b֭LLNPW_)I|>>;ub$?/7oRZ^ASS3yRQY 27cQQ7nnI)U5X N;wQ*=~;w( ZoOK,frjƦ&**H8|(g_vܸu(ZjjYJ$ >8t@ܱ}11@e@ N"C  b6tR()-իFGϼt:q\hu::~/5$L^t9-DDE߽.Z|Ar,rv}ǰ`h4|>P߿֯[KlL * AfʥR* ֠x( pT(tT*o'C,_;шq`!<9kXPLNN׭P(.8].tZCND"b`N}?L夭mPRh>ϻ{7EZ-驩FaZJg2ᠻmZZ?n0r;2 ٌlSxF3Uٽ\~_9^?JElL쿙Lj=o̮?^?ƈl|_9e;dMYaVI7RILL87F[Rʸ͆R$+3р8L &32 Z=raK;n}9ƋD" 󉉉NzrKtt9 #:(=wsp?LOb4<;H$GÜ~D"H$;?H$D~D"H#R/H$cDj%D"yH D"H$y)[`0nO@0Dn w&k=w rinyH$9 Kk+~:bt}phɯܸ(ۑ|{MMGTTVux<~λw=ǯ~;{? GDQБ#-)eC}v{{friHiw˭;w[]H9sqUbccx< ݸɧ'>#3#Aû1:6J|\ E8an' E1;;~&11dg)FFEOrtvuQS[GgWܺ}8 <e{k7ndQ2~RᣟRV^AZJ ZaIT*;~:!`@.384^F1nq3t}"prqdZn7=~ ~N?0AR!"8&&i(JG84՗^%!>Ԕye&n㮽)^FEVYo``կhXygq/^232z$_w9WU\NWw7/\dpx}Jjjk9I.^LMm-DDDß^CE>>tN6mX?g'zzzA3{>XEnwc݁^C.KWb9^yKW`4{2.^LGgv-6QQYŸ͆b晧rl,po^;TTUƾgg'O/sU11>~r ^zyT*BW gD`yzp| rcS3/6 ftl Z_OLH}CVukZJ2 LT*f&J$9=޾~m?###,ZHOKM׳wtvu14#dgfBdd$CCx>6_GFz:O$>.xƦ&&㤦2/!3#x'ظ ^ԲiĎZijn̊S !$M&Tj;wl'7'Ųл%=~ZZA jDQQDPT*aFy:Gd}rK駳?Q!#"b/ZNCVӷnI {WE@Vf& C=ӷ…iljb *Lzb錍ω{/rr9 W^|*pHS&)<.A,.qrFCvV&wsc,](Q C8y@0@fz:i\rD1ҕ+LLLR)F}n OMIyQ}.@AA>yi$3#\F}Q* PPOnN6Wo\gph\AgM>)CTVאCTd$ϞCEJ*BUؼa~:w˖.E&q-j,*,デDGEsϒGE+/t>ϼ(<$qLNMcbQZ, zINJB¾gINJ"%9LF_v @lL N2 $J%}Fbb?&''ERa10ta6HII`hxxq|\tx0IHp000ljb`\A||} V甓ɩIA$=-^OwO2& Koq3VOoPNLNՅ(Bzzɩ)zz{!#5%j>;uzVrデyjnrsbNG__?'Ϝaƍ_>bcbួN! {q>lSo$'&&*zN:fDhIzuv+׮q,'c҂͛NzZn={8!uoF]ZZCD2|1"CCL9ڏIyukZ([%D",㗺D"}TTVݍIr2ojj =6QIϔibb;vj\}>nP((\.NL \n7>_81OCccc_/^akjm9I}qLLƦ2H暘w/.I$ȜN K.!P~r>׮al7 ݽFqI)* Z3O=Źlٴ3oM}c#rF#^HFؾu+w휵_(r5߸k:{^nBCsq[j W(hmk|Jū/4'e2@UM L͛9w"6 =ǡ#GƠW_vs .^U+ٺy32oܼsv"/?0g BY'o{'G,];sjyq8&8z*Zk? 㚾}qs=-`3`Ïx !v=Rz!/ Mͬ\P(KWhlj&=-2:쌇%%\q^}%6mXPR*AjQDRɃKJK7^'&&~l6 C8.r."V.^1ݎbլ[_x?0@H155(S)*[.Y̶-[}މL&cdgoukimyq>4j5(?ߒg=xc\jR===ttvzJWeddWGK~|XN, 6}C2yf :*H27~F#j(4jBC11f /j I 7 P*??~SN'IIM&T*.n!B"""X-8u V0\h4LTU`6QkOk|c^}EPX,f6_ZZjR+W,p-Z(,(?"7'`(b&-5._RdDEFb4PԼqu' |d2]dCDDBDi-]ȧǨ&5%ĄxΞJPp]]Zd2-w:=0)!!wpV,[F(jf#/h2dLNNryjLFbB.]ZK6WN|@ WGQI|o^L&ï!a '97_>AQ4Ek7n (nn޺MKk7oݢKn>czz{ %7+8/7g׳¥K'yw/;nCů؄k=6 .z[0܅ `08g >drj;1??>rΝ%';>8˗-a֭\~JV+/<,6/Z,{Ydr?;0PDD޸J٧"2*c'>cl|FÆuP*_]qcO08~f(RQU±SL&ѱ1-Y¶-gXê+ؼq͜pAuܸ}N3wpE4j5,.* y'p:]|t 1/mfe28w Yf5Noݼuk̊qQ9{? UrP~%Jnq8O푦O>+V~ZZhmk%/7,bQռ9j5NnVZILH@y{ KaAXp/Ka~>Vz{d";+ȅ388gE$$#W(@1"`;-WWV+}}d2B==,^\IJK(,(d|q!7\.G!#Wyb6r9y,aw8hni!*2 F\.'3#ŋVy}3Ooo/6NP(JrٲyQQQTUWvYlit:RRyq>ky6~رEEz]_4RHJLd(rk׬fӃZ 02:6gq""͛< ?}-~OXf44gfcbr/&%)LHOK!K˸}KP(|* >2r:Y'OAaA>X@PPZ^jAEtrsrqJrr7 ٧ئ=F|I'Obll χ 3- zPTX@z~rNkj(+ 332Blۼ[w~(//CB|<ؾؘ?WL&CRj劅[QAo`|Feu5rn7>pN˅g"'+P( ٽ@;ǣ\.vO/4QQT01rR(('&&AZj#Hf p8FL&c۾Yv+׮s Z rt:7_{%ͻ~059<-HdPذn۷n@IYw _嗿 ؅.D"|FYDG8q6+/#K^$&&i]zHY11YNq gZtԏ/$Q?  fzbx^`LBX:HI~B1+^JVEQ$ T*2b^ၷR>Z"LJOD"yHsK$D~D"H#R/H$cDj%D"yH D"H$m306>˵34Q\ZFa$ڏq<`ttDY\::;Yr%ʜV'OZ dWWZ-ܾ{/r5kj)ϣ&~@|W]'j͛467!ɘ#"\իV(d223ȱcwtYl6a4N ?0CIKM%77\(Mf֬ZEGg''Ϝ3\YkWVNݍD&Ot:q6\ƭLNMj9z8iiiRYUB 9) LG099U'ƭۄB!*K\.N&:&SgR[WOum%eeDGϙDE̩+W`~!4j5V+^d"htp8N>MLL>$ E SD2`0lnܾM]CG>= ⃏>fq%:v;W_'33NJIFz:#|sF V9#V~L&3,Q0'zr˥I{饭ŔӉ($'޽ڱJ**Xb96l 59JŦ 7zgAQa*D8֯[˖MhhlsUlڰaع=cnlD~^.2D6_G^Nc540<%e$'%BA~hk{;ii""""1$SY]Mrr##dQر6N'@N]ʩb.nyAX,fT*r$+#Z[j99ttva2EEqii=EtuwS^QR"66LNa~>. ¦GVV&TL~?L9$'&JSK ddL,1  S]S`^CV;Xt .*v;j!-5&.\_X@@u=ֱyFbc)-+ .^µ7`5l\hn޺Meu5vO11fcbb%%wvOT*)c-dfdP[WG]}QtzL&232Xt)M45RHOKe$?/FCVV&|f3yy줽( v` F_1﷭d26v`06ޫopL&# /xYb~J5,(v@^n.OC0B%A f B.XDQ$:v>7 ŗ^2/giWW' Y Bd/|nm~Q ^[6Ϥ|B9_T*՜l`n~λODGG(\EQ$ }e^#H%o[e/P (Jtz:v&H9u,c$&& &tXftZ]x{_qQx?O&͛\!Bjg9u_Ѡig};ŔWT☘dǶ3#(~R`0`Z&d!\2J$bXf~(`:ݗncrrJ+H$snGΊIl6:_{0djj $HK$?ߪUt:ݜ[Va2$G d5cKTb>_wHW\D"1߼EKk+zaϑOq)tZ qqq8].n޾M_?1**q+PDDohnfM饼IkhM0$&:Ktt4~fP  qw$"HlL){gKKll yf4s٨05]]""RCuM-5uLM9iln8Ng!K~_w9 iY9OtTr^oyLNiY9* {~Ah49{<Sga4v "innOP*x())6o̹$$A~^.CF .1kn޺EJFz:1_V1~?hx2ө&?7;}~f]lut`4`1wۨU*9{ 7nG004$Ϝ%11/Hk[==ry}=, [\LWW7ii$&$!lv;Zf3_IlL \ahxA~&E׿I]C#K,3n[{;>rrn^޾>RRp2 Qkx 6mf;$ hi.B$#=ٹ /Wj  ȩ?䙳DZ-defZolP(dftt:^Nrr2ƭz9BtTAn}U*R9n?12*ŊfjASs 6q RSRx'o'v:n`5ҋdge"IMI t).fӦ 'h<Bqz^zyssJkyc4;YXX@FF:>E },Lsk?y5lބZFEyٽs'ťY)YNpMW_ar232x},]^2268==l64j57n`ΝDGGSO @ HwO#L}>q vI 3),Q"Elrػ:w}}qýPuu{ڻ-{-^-'ٴmɢ("g0&w(JS ~i~Yl߾oTD D"a&e|+ϱ;g$I4Ƴ<='_4}J/~?D2=ןg=}75=Me룫˶__>,eǶ(<|d͝l~} 6oVۚYKcC=;grFFG bl| Yٷw79JKJxqiԉ|p :S ­Z3eoyi)K/ K|t9ҙ4Ձiض5}rXZquxH$u11=3~d2 !Iz9|u+*ʦ G"oG%dY&SW[ǎ'Xӎ$c$aZ&^9al(YΗ"EQXZ12:"+!vlIY>[&<6XE2bzfYіs8.`^GF8BQ‘33MLPS]M,ǥieH,,,rux^/"319Ed~M$~UWUmh2c<d;;:`ʲL(3338q**(.>D z<FOd/egN =QeeLLLr TUU22:ʞݻxwǏ sڈD"}Q?}L&׿U2 ]\t s_:KJӖ-=Q?#[65QqTEEe^|ηٯ~Zvl߰^#ׯǞ>K yw]ȕN(+-3ȲC195ťWGhnjbi)㦱Wٿw/KK(㷧NW"r,զ5rm~?,cv͟OP rmHSD /<ɃvS4+ٵgzx<0Mrmet:d2$S)4Mp`Ya|>dY&JwTe4MUU'R.˶bȊt"2JqiaFAsÙW]&!Hv{p8T,BU(N"i4 4eI0LbFEdEiwe.vahIH$AU ֙ee2aH$_c~l&Jl*iXM:Ʊ|n3e_'C+PUlfii Yx<ȲL:ΦeҙMk#7N䁃rEqRT˕?ƹPe zn;;(5(*j۠iNp, ̅ønmmtRR\b].M"_(J7zݺN_,/kW; }Qsֻ8r*e`Ozsߕ{f{'leu]nA5LkBP>$I]˒ʕ+wũ^ $Q}\/fY=n]:ca=jvX+~?M͔WzeEO?y.SS]MC}5 n8_EO ݶagk+X;QwjnAsMk  GDA p_A#" }d2y-"N0u:fmH$V5MԳԝeYÇt]'Lnn}f$i}  jY?痹tm}>_3'g`jk+K$X]u(Қ$14Ґ%Ɔ9u x5 zҙ T ߿z*+*׹ۗP]UE!J!IN"MMB3<:BIq t8- e˥((,+|k"e/ VX۶)S+nE ۶S[UCee% g{`[B J 'L0<2LG("F1͵sKΧ*,(/+c|b` b.fqq&v0)(-)A+Xƶ,EEeNHC vKK˦HA>)˲nM$kݶmN'?8@:ۍmRT>i0 R4(J>沽fV ½g ϪLW9DAz$ T'{Yd2ȒM1۶H38A$I~‘yэ.eYdyn T|E" ˍKsmQjx /,Lψ/ V' f)GA#" }D~AA/ v$ YfmdYNde۟[vu0MH,pZHAA<0 TUVQ[SbaȎa4,bdtI|E>44zd۶^e6CWqi Tffg(++dd2x>6IGOA>poYկ8D xk8ݭV& dxt#y?vv~d_|_7TWLОz-9Z[(..Ʋ^XXP-Skɰɯ.eYAyY` Ov˺K/w.FFi >PA&&F1 m,..z9o/ R p~)h%UUm?!|EBANTWUO~JMM5c(*3<2[(/+g%T1 ?$t9x`?a6^._h0t* #pʊrlقљbjz mx<ilhNE0ŗ_ض㦲>Qoۚo.;:rY??TUU,E"{zJFy)^/_aaa!># TTS+bvn m iko7~Μ="ƛNiIFWA$IݸWS'Nw{TWV^b``CW:piN4Ѵe L%;[[g!J\8L$2iQZR“O<477qHSi We؟} e˶_|FG'Op1J7 rݦ~]9֎墾UQo/~>qMsr߫qaiihN'P-ye۶c&|9gAfg(--X $ QywXس{7ȒL&aUmmFeg(6|^bt`ksS9ݶldIFQTl0t,+-e[mYG}*,dgk n+Bmm-#\f݄BA/^dxtRavE8v+/gjz=vr7ߤ s_:IIq1i~cCBF)).ЃdAcC=`3g226fmtRUYGKuǎ|륻n'"H{NaPO8ݏj ;lҳ_$xhnj+okòla*/*qhٱΞ ~'1  ӧO---v,t:o"5[ 7w(RI4M, ˲PTYIӘt{ֻm躎a4 EQ4 YeD",8 m& IDYgtL:FUյ# ݑKHr뺎(({0 Rڪ} Y" 饗 55բs p$IeYvm6L:tÁiY8*Gњmk&) q:8 ׊x|wӹ< ze.LaS}߫/bEY_a9$I m΅֜m-A_An+-S'sfٶMUU%}ȲLCC}~  |Z8;Z[ZD0C!@L# Yu/g+7  i/1c pS#]AA>cH7j%tEXtdate:create2013-08-30T12:28:19-04:00(%tEXtdate:modify2013-08-30T12:05:05-04:00xȦtEXtSoftwaregnome-screenshot>IENDB`selinux-python-3.0/sepolicy/sepolicy/help/transition_file.txt000066400000000000000000000020321356774067000247360ustar00rootroot00000000000000This screen shows the 'file types' of the specified 'class' that will be created by processes running with '%(APP)s' type in the '%(APP)s' directory. SELinux allows policy writers to define file transition rules. These rules define the label of a newly create file system object. By default an newly created file system object will get the label of the directory the object is being created in. Creating an file in a directory with the file type of etc_t will get the label etc_t. In certain situations SELinux aware applications can override this behavior, for example the passwd command creates /etc/shadow with a type of shadow_t. A third option is for policy writers to write a transition rule. For example a process labeled NetworkManager creating content in a directory labeled etc_t will create it with the label net_conf_t. File Transition Rules can be written to create all objects of a particular class, or specific to a particular file name. You need to build a policy module if you want to add additional File Transition Rules. selinux-python-3.0/sepolicy/sepolicy/help/transition_from.png000066400000000000000000001733771356774067000247540ustar00rootroot00000000000000PNG  IHDRj8pgAMA a cHRMz&u0`:pQ<bKGDIDATxw\G Lh5YS]={{vvflw93ٝݞ]U,*E HZFdx@&A`23Ÿ?w?^}Ui~~ZkMӴ"[$ID"299a+?6m'bb׎EvZ5k֫i]8@ Ib4555@@0M͆jmP ð!f@ |1 âIG J_ o9i]_ rH;-,$IwgK} ʱ,KK?}-@ xH* L@$$p0m8H01MXTN'PӁb OK\Ȓė}%I0 f! CG$6}Bt$t 0p9_^px"IǍ(Ip.,K]~,c,INːqWszM-hF݊Zg?rs {X-*a?˿%?{eׯ4M[8s*E굕2qY1 I`[0[3 obQUJ ϲ*# 0Mfg˳Oaxl?!K,,uYx/IĹ?8RYVƟG8TIMcұк`f>&ui`0n ^ sfG>J z"Sx/,˴vvsU~sTDZ,D1\NG?f`ِ$ٹd2 |m\iBiH&)bQ`8L4ܻ!vȲ̅B|g,->KTW1:>I$(?0$IVVUR\aF'ZTtàI%ۛEvV)Fs9VTUpyG)E7 Gr:)*cjO2O$f4% 8DYf24:2p6t /'U+Pe@#IcS|1lHp>‚{t4 aCa^.7[1 Mk$$`NAVd֮^Ij} woEc:;|'fzPljٵeg._=MAn|~<ܤg`X9$祣aXśo^/ibu+ E"' ~5$:]op`8{v * s% yq^^a1cbzܾRxc ,+K$74iXY~/?Wԟɬ G7M*Jilmj ^ƟOHN`ZI+fiޤph'q퇟01=0MmX><{k;_0I"}ҢB7okFvn׸t9cz7 0hapdQTG2~7Zq:x=+u=`屺~!/ۋ,K iRSQARiJck;i~5n⿾#V4nq4]g-l^y-FǸrb"(g._ /,;T ͗E x cŌ_ ȒD0=#1 a&.bXmFjohՊ,KD1ȼVÁ,˨J4{`?iO6sA}s em3 aY'Hv95ɩb|膎/۶'٬ؽՒI ]7RKEI : ?| 4 YXTv;6Qک./'/']ױX,g瘜&L*U7ム*)ˁ> 9qY][́; G\ن&fuMl㧰Z9nd0C^N4sYSROvN.\o$tqmd{2V!+Py羼lݐΞ=k]=I"$cZqSN|IM#S} i~ :vYIjg VKjfǁTWzܜl]TT̶DcVx2I4j*Ȓ$UAu"4 x18:ƛO~ +k ' -bITc$IB$%v7nS@eՊjnPeվk4۬Kc&6%d GezK᧱۬wib7Ҧi̽$I ^d&N@@a},(X,iX249~:nbkWs޺rbj\&<B7>]AFzgv;왟K'Iv= e%~~y{6P]Qb0b>!0M"*KT, ǝ<&@#xBt l)"V@  >}@ 23~QB B]| )6NLձd.`y _F8Dd\N.XSUU/Y4M9>\V+,/xirK#29}ߪD Czj|b4+X6$I"026ª(,($sML3<:LaA!EE$IFFG().b<F'RLL$n^jL+9=gxBV ѨV́a Z K2kxKc^XxUEBJXVnROzʼ<az|6jQ剻t9q3<>!‘`tJ#u,+Y]C(~#7E/u934FXE!IRaEVb_?G_CsDcTVLS'3;:|%IJChMN'GX +5IP*^􇠔e)eʖ0LɔZЗyyBjY$=O2HR&^jv p#,gYԏ"+hH 21o%Ru_u2m $v#v> ]׈DB(ic84`2p-=KqW/Is .^bMC=%%$IEV(--a||Ғu|JdY&0;K0X־}]ȅgIhb bݚ5\p)&-]Sg΢k&zLGG(**en+׮ ٹ} ֭2M43•kɡ{ D$d%4LBs/k$K2NX,8L$}zJ7Z!n07âk Y% tC\WI(I7[[w<}\iV _v0M-$E>iQ>r7[QU)3NZ *--x4b`phgCCLOOl6HGFF9z.a~λD;ҳtri4MϤIKiڭ]x| ytßf }}trIzSיfƂog6 6Lg?s YiSZI& ¼jEu6M8E[{G\XޅÁfCQ‘0蚎Eߏ?GyԏLQPeEQ(--r!rG¼>/$Kh6?2F<ȲiHd2Ǧ0H-?N5M'>AOossΧGPTg'ry8<ۜ`G/]Rgǎ3:6FYI 5ռdyE$cmi_@rfC?YN u]ҕ+4658v$-7).*BVd}}v̌7o( /]ɽ{q&33hZώ*W]}y1M\cc\~]yl\cl|`(LQQ!۷neH$3,OYYׯMV0,Cey(anZvnN}}=}}ŠWfaXy܅D7l0M|_9ï_N~~=-2uݠ? 'D"ھ۷#+2W]acVvnF`6@ @$~?c  D"::;J8annɊZV֠9<7nL"|u\UY??? sa  3㟡Hܱb<(/عoi]eY|*0:6$`EeՊZhw]uu[6z*z{PTի[ Yij墶ζ!/iȬxE&LbTVVR\TYuӁDd‘0Q[Sj0 ;izq{ܙgcQ-Bu,sZ(f#77G8 ՆǝE005Vh,6'wdIh,&~W'^gfBwvryJxLMMr&W7IgW##AeEttv?f4M\.--:,zJ]gGr& uu 4 "(N-70X{$0 #of djf/sb8k׬!᳣dIb׎q>;zώʊ v2<2JSs ufe:ڼ Rj\ܱ"o6;v=@OCrQ_ukyg(/+% EQt?v4]G4rsrx~[nF)*,+Ẃ[UQI&9wI4A$gzS#P]UImM 8r7nRjaiZ ^xY"9J2ļM˒bêZPk貒WdբfannMӐ$i>OJɊv=X-)? EV‚B;jkDc1N'/>AqQ%SlZ,(j/  BXV$(B<gzzN   ,Ək$K"I3 `?!`a"s",V =EQ,jJ膁jawr S`yH]LOMSR\^Ҧ~70nJNv"(ʢb_:_9Hӧr ݾhKSa:@-OۯKu}h]=]4nvЅ{ӟ=̶ZR~|i}gCE]i>tDAjj("h n*};Un g z_WU$c=10 /ev;1]کn^$|k eMӱ*N3sa8NtM'fσ DłnCKjI4f  É p8up8|^CrX,{.ahZH?v4n$Ifbrvl}k 1q$Iݫ(d|n'k~_Khѥgu{Z74wvoIJI2e"}6%obfCw"qLD"qϴwue<.$Ȅ5Mզb2=''`![.kqLS|'R=¡YY~V!5YFt]O"o@z!{MӤ?$%g~a:44|#NS|3Ho{Y8~qnmLDbj21.>bmvy6Z`91 j׮3>1IQaՕ+PXG&|!m-\t7!N?ao%.'iq$T`E!HۉDcX #`YD8eMFXX "HDVV ԭ[)N|cQU5Byfzo4[ @Vd_Tgit]jίᔧ&# + )=/ ``nK . UQ߈~)V_,$5u=^),2B4ߐx 6ҒRn%I"ۗ fƵeB8p$XUbؼ2H& U&2Z2:Gcey;%)GCH[Y_/v)o9قohI|rt|Iljw:ݹtomt/_Ao:ja~!Vzh/xQ):ʜno3mf;xS ?E Ρkp͎7˛q& ٯߴW 6Ц D 1Xd2IaQ//CQ$<`UuA݈㌎.'C񛦉fk|v 0|Cn _t@ CHbQE_Ij NƈuN|X |<$I, Cw ^Jq8(&'ɓr)q|餏%M$L3ElOZtJIe㥛:K<ȯ?ds-ڋgAmF>E*.~̐$I_NRUVZچ5LMO17fɽ Y_/K2d,2&4H>?v֭fou\+qr`kX0MSk@l+iD"~SR\bevnʌߏ`bb_W{I6nXbjj`(D~~>.@ @"dnnњiů]$C!?S-kxlZ/sB~<x!f@KD4|>Ghnif!2mvtH&p8x<>TUv|߼&~??@R,Kz0Xv$ TU:D4L= ($)$ /_$Ifp8PU dp8fdZ~_VsڹMرu+6ĶNUUa͊\q9ʺ5pu^$KHP)`s_Á}OQQV LLN$aHf,7M4Mp_.yytb,I!L@"I%50dYƢZҕ+wvPYQ}Dk[;v@u BȒ*HRi@ `7z獣D;lk7^[((~#={֬#iLMMFc8),,j211Ann.YccLMOfQ\TD`vӉnHDiI3wIM'0(+oWߘ_0 @D$IR`; /ܾPH,I I"?M:d/& IΟ?GVV;v# à|!Vm*}5if ux4 ^//Ғ ݈5~@ zx/Vs_ WM2NzH$vPimv (<$ \.P@yh3~Yz. >݁(C[P@5е@ <:|[;@ ̂,I2NG vF9٫3%qӂ"fUB,i GRWGQl6$1c @Vwmp\'ˮbVUi% uT`0jH&$ IPUDBP~^$,/:Jح2qMdIB;$IȲa̟H/—y$q.i_K!K|[yHt[}]thn a095fe:,H}^e0$XjE_iE$9J0d0M‚mC4::().5MoRSUžNL,D-e&ICTߟi ٬Dc1|^> C >ׇ%Ibvvm RdXQ[8L׽DE]2I8qP;w`&yyO?R `‚\.גT{)/+c׎3JD$ hIII >ߏ-Y>Idl|"#K0/|$s >ߢ*$(`*W"+z6nzx*˖+g xwo޽Y0xŌ>Xԯ&)KM1tz02:Q**e3%Y$7o$--45dF>C25546/W:y.++WCk[;mfOyNs#O$8},9i#Yilj¥KǟJkA-|2Dc1^-_&iTU%fBx@ 4MΜ;m@zo-P/TrntJJ/v!'8rSȲ̍Vn! rDz0.C8gޠ5K(祄d>kKKt* C군=gg P duh?hx,΅8y̢[ˍ\v=#ydph8L٦$H$B<\FQdO  ks.q7Чttu7w||N;|zz[T۟q%Վ?糣Ljb13mptL͛ɹ GRJ~i{-i1 P8L2\F$s1ė0%Y, 2==MuU%MTWsnB0+jkشa\etlH$M.3ٹ9N:4;wtp)t`m[ehx,v;pD"[x8q4Hd2QVZi4ױ~)?LG(+-ejjѱq*+*عc;gϟgnv`ݻvj .\LGGeeelݲlf^{MK/r9$P(̹񳶡ښj<|bn Fu~m6N> }V^':Ņ  Q]]{`w|yr>r )))a˦8N~k4^BQ:RϷ-78v# #*2W]WIҋ/|ݾXYN S:gR8իhqk099Ͷ6"999l޸G"TVz*L3%, sa^s. [ Mxhkog';A76eTseBPM60g?1׮7r~cgΝ'❟e zٱ}]LMM3;7_޾>nvٶe nѱ1ˁ}O$HpQJKKhtض :0Lb8N LkMoSOR]UIsˍ̽64dn əsilj&SXPz> sss~e/SQ[Ϯ5 !_cIhji'xl6ۖM$%Q,u^|9'6t#e6 D"Acs }}TVazy͖͛ؼi#L&OL&)//`P(+kD4Mgxz:\QKiq Ns.p FFGy=\., \kl"Lnn7._k+jkX0H̆x~$Y؉DQ|^/Օ4߸( R}jqgW,3ۼ Μ;OWwV //wlO=btl> b1먮btl011iܱ|9>< cݳ >o֢t$0KuDnIu,s"޿kM .]…l{\G0 ~oHolTWgLyy$I^{-LtRXXj¥Kutk319IR_J[GcYv;>AGg'|r3::X,|ǴqIb8&OH$f;fNfq;4vzS3gΞ O184ۿH4a'Lp1q{x=rIV`Y1ų}0m ?/۽(4oH A|7~EOo]ttv:|v.#ǎ$ 8~ K2~q v;q7s{`6WPdFNv6r}I${{LOO{358'Oʢ\.'} P(yyd墸OF(an7N5U/EQ8u,h=`TUV wXyNg}v;Ņl\t =nܩ%H:V,3d2ɹikttt׋$ԭ^͏4܌,lٴݴwt q, }TWU!!1:6SSPR\ā}(*,De'&|hFOo{r/7mdvv7&ԭ^E4`9&&&xٽ'v&MJ=vS]U,˄!;xg^7xυ[nD^n.;wuxgnͮ;ذn%%ݳI(ZYMb<bZ۷j 22M2w59{{v$/7cԶpɤ"ص꥝L]@[`oljfphSg022B[{;{r/v,Bx*VTޞ hMh`޹&fg vǦ (++yqOo/{v٧M{g'NMֳix|10R[YS_i  DQٶeKArڵLLN266Q6yyR_U@5ֶ֭m[Ͷ6dEky~>/`NG^xʚ\Fvnguތ3BssIq1iڢe ]7(..{`|7L]}D"Qw EUq8ܾ[vv67mR6_iEyk"ԭZɦZm6[MTUT,Ihtrex=4p Tٺl|[% --Ò3xBܱJeG?fU#YL?]]C!JKJ%FYmdeeqe#Gl۲UUQffgg1tl8"STX@S鿻zR#͛6a f{vbúuwK͛LNMfv;\r+׮119IeEż`\:>ɩ0L\N'%aX0t0m/af'=Kx}V_ LM6+##tvugx^@ rE->/\ٹY äfi$Ԑ󙘜\z-Tp,HfJ񛦁裏}}V[ZD#//Ycphѱq Sy'=lZgrjfYÎ9/;D5, >-7hjnazz‚t cDC[J`zz#OP^^FIqq*/RdښmW0SEQgphM@(,,QRTi2==>6O_X墳?tvuKIq{eB%XTqzz5 2lssg7FyY)n  u;hkD?(KEٵc>%2eI&ޞ:n &75i99hv< /l2=TaF/6O|_JknvC ᔿH)ߒ,UU wp8̖M).*"PW@Oo/ELey+jki`|r;wPZ\B8f<7oHeEy@lRYQNvvvʒD55ՄCa>rr BTcXOAA>>,UӃ,TUVL&SVB;;f|b l޴&&&ɡgE__H$㽟j"n<b]n!IR!ٳf]]h #I~C7? v]͛yjl6D7RK?ex<,ǡG™BԅB6$5 %=Oe_|w~T n%I◯.~麦GgT\vL.ŒlKFeKWO~C\N'Gc=  ijaR.bk{ARӰޖ^q#⥞>Eu|(Wh˶nRllH0'-e籰ZvbfW|wk/>/G2bAUEeRw_#-ss% ݪ 4M^zߐ~c@QROaQ=;|{{Yj%I2={m+W|Ѿ۷#h <&p񰟝YN?xY=h$$;@5 d2(MMż"f҉u9E1MH$ܾkz53=%5K!X.YaՊ.@Vq:kF__drQKP88*ЩK'7X.3 ^UeV.zq@ |$XREo4Z7#- ,x ahɗ񧢞%Sڑ2|I ,'B gYx EbQ>=B0RZZʎ;q=ukׯDēf/@ XNC𨲤7hk֬tq Xfd`(,dyeX,F8jvCL3n]י0t\.j!a)eqQC~%;'1</ILLN`XxN32:IC9s4sȲ-@"3 8{ #lVvJs1b>U+Wslv;H5lݲ+G/@ XVnضb_RB F!ݧR_@~^>H$=r0$/f:-O!uZEy%etvvpf UUuEQdez1 7N ,'b_rS3gNaYz}ؾbF8y87lgOsӃ(m;S&‚B** `X(..eua&jXZYX!p)ş>#(_΃,:|wC7t䭭,R& 6 .u dYwgDұDvdw| QUd2hWa[,i(bhZIpLd2BVKV v{ e;# c4M͆,+~ b%770R[m[ۍ+h勴hB Ӡnu=Oy5' SZRz F8z3֯@eE=';;vwuq Cq9]vioobGr:Yv=u ^80vp}O`m$<.,5H$\v64]Sw0Mxj~;PVV@Oo7mμK vٱc`0M0;7]nBDۍ՚:6 H$g*t9 ͡(*- }O$H&L$355ǝAӓL܃n'k5`{ڏX-VBnL옐edzA2]wͥ(*,BQR E<cTWn:B 333LOOap"@p,%xM6먪J4]mv 5H$Y^*+$ٹY].7,x',RJ-oi4Mq:;),(D5B0i IOQUC$& p8fߒvj! e0>1Αٺy+UrR¡`dr‘TĆuʵ8֭]jzS3oUtӸUEQFD"Nh~VEվID# !2Zq7p[6opi8ٽ~^ @AA!a"2{v?>~Μ; |6mڌa46]f ʩBRʹ+.c+غe{f692:,+ӝ\^BGg;$aF,{4c||Y,BW^!|3DQb(,3<2ǟ|"85K,;)E3=3MvvU~Q,xeJKɚW` b9iqJJʨ¥tvu0>>FII)]_o7maL~Da֯pH8CcH$45p:p={ETUCTWފb%LP_@m Ξ=,O{>E/ljomޥD"?X˧QTXLUe5MBA hhF*+wm;5 %xXbES*[lcgdxYF#\o,deyilN0\TrMט0&H$Ԉ^d[=(Lc5䢺ǢQ&&+'GEE~n_'bRZR Ͻ ,#1,X\\w^.9\oC1;7$hF`^6E5 $ L %_χe5ԺUuxN4M޾‘0.ɩIFF3]}n`ff³M&';}k5Mctlo,WD<-`Mn`0(8N `F/;8H$R·lj4 I4%cZX>@v*P02D" @<'deLkpEUYmBAyDEg+aLE]w\X,*N YS6EV01q9]aEw'q{͖$px={.R%=fq4Yv=%%w4MN:jścSikk%hmNMJ OԒ:[R.ndyg^fj) ']x Ŀ@ ,;vEe=%د⒌ҿ[]+]$Ilܰb+NgjxMu k׬cjrMHj)oI$jkVmv{]2$ TU%H0>10k׮fm@@Ƞ`,,Ȳ {kt`jzjJX6 3R#i =ݔvVAd9$VS]Tj_bQUn7>"꜏~`[N ,'B 4q8219iRK+~UUYb%P dI *JKKq:LMMrRa&?[leUȲ$Vrrq:ڹ&uE\헻PBQ*(*,-d|_0>MPd塙eZ`0H!4!''G_ۛ K%I"};(}`QT)F`yyP˖nz[_(~@$xTv*~aYˌPGo:qZ4FL#|NEJ/=@ <61t*N@ Mv};@ ,P@ =L8^jL&iqP(twS x1ohc-_/࣏1 i;Nb^񛦉_5M'O˱'(H4JgW7IM4MD&!@_?Ϝfk+._!f:q*}rQz0O3 u`!=~7[ G"a| a06>/~+۳$9vH$LȠ¼iRi4M#L.JL&")fz-v<|kmm(}Ot}( 6l]Պ< ol؉$IvΎm۾p8߇E 0K?košxjTW3 ̉S3g?Mͬ^jÏ?SZZO~^g$".?9D"O!Km_ DuUr7@ I|t.^Lmm kq{gjz> ~~B[{;DQl̾'rώcvv,ubb>?7mr1:6 -7nͮ;ٴq=> ٴq=OωSp>^x>%G<`dd߽.DIK/qi#~ƪ+ݧw, K(ʣ7,ݺrxaPS]sdϮ]? Yr}W}Vj…OLpEsA%˻0z8|(/<,/N԰iF;VvNnN}]VRUYw_~Ғ;S^V޵;#"/+ ֬㩽O1Oc&O>yyG? }Vo݊babrrzcWr*lXӄUAd d"IOojJ 磢*zƩ3g#޿ռGut`&9TSR\L,BȔRY^bfQR\LaAyyynjkjpSr];wKˍ$I֯]CqQVel޸g>ǹpe%qqFFGٺy36l%}seq9lXl6.kꩬbQA75 =F9p.P\\墷q[7oA7Z-<HHHdggs (,,4 ><1ڇl% x;/395oyoVsp+W0‚|^/>"76|۶]ߟIs<+W&mf.wKEE9!bM f~.\DwO5:~|g>(}}HEmrۡ ? =2KVӅ$IbXzPR\ʊr멫[M0Ģ .wh蠷^xłj#H`&2exRV+9>^Ξݻ).NU`Ƕ)s~a#cdggu&V+ϑCnn.eX6J)(_&_36ʊ }\Nj&O~~>P2^ V}5 TWU166(/p$B"pʢK/@qQnSsQS],7nbXxɦH$z|gU?8H2p88N>Ν /RPO^npr#0 rVZ59 ,$)Id oao2 D"Q ui22:J^n6 ]+_0ʞݻ_9N~~h/xhFoo]fi$I"݅%xx!D$QZRIqq1nd?05 UX6JKPh%P@MBQֺډ>|q_VZ¿B(GD}z)o$IX!\'@ x_ @ x_ Lj;,'E0 ::ډCC:ss\~}1*cc465sufgo;Aӗ>:sz#-7nݳ(R48sXlF D0@(ɩ)>c>>r7@ xȼ\ojZ4 #ܸ }S[jqNka;>wlԴ$W^A$vڃf_"+Ts1eI$ь5`׎\ BtuwΜaOᠻkD"v;}%rsrhq3uP͑LjDZg짩s/`xq:=~`{`&7[/7].w( >]])S b‘Fcs3k(/7Avv6/<S{# Dغy3׭G161A @Z"O0؉a:Ns< zc󦍜pijj^ƹsQ>n#TTS__$I|v(d\]@Oo/Fomr뵊;C{RYQNyy_w(~IZ;Ǔuϣi> I?/"|eL```p뗡.\`.0MJKضu +jk7MLN5uW{n@QT5 lݲӉ頤5 Zښjٽs'yy(†Gs C2s9{zb膁nى p~.^LAA>9q_ /qe\l`#=B~ (?ɏ}uu5. I(**PhEmM5999><vlgfx穭y$Fo45w_b233#cc TWW%TUUvXbh͵پm+DQfem-/>ֶv0MW&i9w=Kχ,ԭ^E4%77BgW7>qdՏD[ eeΦ[ҲR{zlԭ^tRQQF:::={صs\vi*++؉tuu?0@2ĢZ8qHg짶š>٧nj1"8@aa>LWw]ٲiN.119EUe%izJN'p|N>iWKEy9HKUUJG\tAFƨl6;B~I ,r M#Id oa.Ccrri)=W4ֶv*i"Mi, @u?l߶}{./#)y_w/)*,\2)'IҒP/׌iiID(8/??鐪n;>]~փ2JK@ =̕׈b[d27czzP8@J$  \"Pr`&sssK>H.{xdog_w9w}  oɧ~n&_=sr7@ ywz._EP'Osfrr_Z$I>~ X,sg$ 6bQ-]"ߧuI כI$_G' p,];wGOik`mmv Y\.wtN^^n.Kk[+WO#ICC p5tCgMr1V\AC_?<{w聆WP <~N9 d~^|9y'2;;$h5 295 T8x: #cclڸEQ?rD0 0 # 3-c $R"+  15=$q{z B@8e|bH$BYi)a|oU@z^F%鞝Yv;;3-/PHފH Pf? TQC ʌ̈*/Mdaik6?Hy  *+(@nNexMW畳FslFFG G"7E V vb`24::*:& {Wb4nB||4Eaܿ};]]$p1dY枭[˝ށ㥴HOa6_ϜBHO 3Ӈ$HIIFByhZm̎_"O$ŋPZR¾|*EtrE +/fFn)X  3##FCNNfիV9w^͢ x~V+HK̯dtZ>d?zԔ ;{ۍ(' 9zŋwذn-&z>޷P( CxܞYvwtڎ7IKM垭[`0Vd2? ^X`>?@5xJAoGfUp-6>6vCYn=I_l ,(zr#Ñ( Z m줳˖!IPE8QIPZ,AN9Kee W/"=8NK)ID#jėR&2k~P,j+6ZBRFQTHD8F$4#$ż V\j_~? PT+* J5?9ȲXB(EG4~󟑖h:x{SբR&D"Z[[+!I//$M \Yege5Zh4޲i4YIk4,7/?7~}[mW'7$T*t:]@Xokucl>RRȘ|r$Il6߲~w1o dnEiA;J'vWQTX@I~~#VLW$ ,#IY_qy~Fm _xnBA " D~AA/ wA2)+-Clni#ĬQ](v'Mp( pue%S?  g 2ק{uIDAT&DQnߦ?Շ ˤ/2N'g_rֶ6Wt]CG-m iW m=vO 0˼{\ZsK+CC@ %;FΙ1888/RAn_9CH@QQNoH$s @(H$JNv-gx pW[ZBS1N=訓9Zp{8+ť̯5>qG?L, *D{{5S_?/(*, 0ârƦ& {?ᅬN\1r3Αvjg`GWoPOaA>:OO_?h^۱|HKKR֍aK/DHMIfwQOݵk(®? /7!V\sl^YYS0CNvٔ} E cLvQQ&?0|ZMOo/՗/3O?9]74t&\'%9x, =p~vKjfҒ9EE=~Q'*Wk@Ӣ( $&&"+ K/?!IIttA-6lH$B|\ܳu+7nd)*?|<W/};pƦ&~yGsL{KVV!I*, yyTrV@Mm CN,SX?m54r?3yIt<Ѓܻm+, 1L<<:}Ғb??~ET_o S2 ߼Z8׭@[^eܜ6mXχ{xhHĘ˅w=;LFT_JeE9z},F`ll,)ORP5hjt:$Q[[j%33JMRR"* n'?qr"JB"b _Tj4 9n7~ZE$alTG,J,N4*366'"GnǏN'xF#sKykNs˝r+!'6OT* z=\#YH:m^10~b;.k<[g xt_qb00[HĚU|>XnvJbE){zt.=!WVRTP@+ lT& FåjŠ׳izzg'N!-5|=J{g'd^[Ŋ^G%Il6:U{X,V\AvV&O=8H?͙HKIa˦(dBVxx7&*,, 7'gxDӱtbvzy 9t,<^//ngr23(ի~CVV&6aMdlZ?p()#+3Wz+Wk8"* >‚ؽcf3۶lF%.VҎv(׭')1 DXvEQp:ǐ8c jkhloGR1rP$T*^NK4b8t˗NfݎfddBRb"`yvAΚ+ ̜V`2A^jzX,lRRS1 D"'nfFGG2( ( )) GFoُLIhZr h=<zv~?>$PIGAj"WN$<^MM_>;``8$Itݧ(*,p*n2fe3LL&}Iv;֍#>:ߘ+rS.kA\77MLLzFQI4 iG'''Oٖ9;{55$&&n4ȹi/P^'+3swV;NChZ s8 @MCk#~b 6J[III۶N ԷCrR"< N %$`oʊoem6w-]lK  ADA; p_A " dRW*2)#(#E!_:ot4,˄[A(Xps?,_Ƥ/+2NJgg-W8)~Oӧyh###;p 0z#?ywܴx3Uaٽg/WLzmph'_azz{P@w/9  AGFEuc;ߤ/!tK;A~?-mCCN8(gϝGJ]}=]a$$`0] L|QZjjXt)III(sln>Hk[;px-,q+55465166W^cR7446z 008H(K"]\opxj?(ʤ~;>].Ăk|^eiweB== chxQ$)ώdtԉ(446M&)~ L#!͉ǹgvlS+JĊpq 2QU(8{ P\TC܏N7; ?0۶q >ʩg(-)aTU]&ޏIKKehh>*˩7]_O_?Ep= e^e%C|Gx^^o 0 DQDA~y'Uy8xM-Uj9t>p??yy_DCcLoBCcv$, <ϸTUMSs31'>8~󟑓E]5<ܵt)K/by<ЃB!ani)屙~urh4:UaШ5lٸ?O`yܷٺ5VQR<3<2 Fk[<#..nڳ㑑щ~Ғb:hmkRu5\.Fc}WEӚXNeE 4?9?z>@ =۶}V\nP8O>Mx~*+*(-)~ lgNQUaSF+bŷdEō xqD"aEnaYQU賀,TUWSQ^>1Zd2(2Ph/a2X,XVEZ}:\:::Ѩ5zWVvG|NhH+.[ $Lff^$IhZj5A$jT*T*vԔTF#α1d9d$#I%LW$*++x^fCWKryxb4xgbh4[SwK,A$,f3&clZ- X扼&zxB0pZJ5^/I-ې$FFwC;ߤV$e2_BU*mp9HO_}NKnNΔK:3ehh>w;O{^"ryT* JB!vKCQ._x4 *Ir*؄,˨$ IPT(( ŖAPTHάc}\9ddyX,f^|U{!0jM-6frع=<KzZWkk'(i4.Y?߃ᠪ2.]Be$ؘo;}9QIx'>_ͲKQkԱ,67%Kd2+ģPH+$zNA~>`4aZ6vCYn=II_hQ ii 1rK8h4JNvDƙVS[˩3gyVhk`5,b6HOKcph@ OaZ p8h0֊(bX###}2#=keɌj$E NzZ 7ű`Q[1<2BrRZn7ضu 9YYϙNarepx(vVFj"$ CSsӗEHY@@ ~ ·!_gՊ]kwǿ=حoJSs }8_|GP: L wIXxiHypWAnjrtZLWtG~AJŖ-]7OJLA#rIAA/ wA"  A2ͮ  ߼I_e_8-WT]?7;0]Z?wߥwu͹Ӯryg.~c'Nܲ1OMRUulW/wyk>P(&x<vz)umps/rEuc;ߔ39+tvuwDQ1Μ;G8C( Odhx.فgN8< Fq|\)БW^W^t-)juGDN>=}p8LWw edY7DGwo/Μ6=0/E"8(Dϖr[csGa}A(Phb~3^$79~hlڸ2mJŋoh*VkQIŋ>zH4’EXfy~txdnzq_[X|%%q%>^'3OG˔Rp\3ZǎzY0oee^!pϖ-^rbZ-]]rגb`Aa~.>,3### aFNy ._@ ylݼgr1>cccHL;pb0::n5qj} j6m˲LVf&޳>M__*av>K/-[}t&4Kdc6xGxG8p0MM34 9Do8Ҷ٬l\ QN|z}gV~Sio65PweKPR\LVf՗˙spmuO,SZR tV$xINJ"@QAu:X(sqZZXv-&$oh@FMlRssq=t-RT$%&dB`6p`wa4HOMh4hȠ457D2ɢ |9vV~ԓN܆|Z,=މe~4崶` ?Fh4GJJJl$Z,p88sZHZZ괹OLF#fxS9 /";;sLw?p?.]FNVxшfcNaL kի c'8z8VlΞ??Q뗩+W(`0eVZI+ N$!*(HDWw7~>,6dgIA)%$̱'s$x]lۼH$¹ aZN':v ۃBBzz 6j5w-^_kILH`0@|\%Hagthhl-6hHGbXmBaA99٤$'cHJL W %9L~^.˖.Eb1ubYپm+iib!3#$$IENV(wa'''ARb"9IO ';,T*\TE8"1!m[6SOQQ!~]K@\c֭$&&b19} ۶n&';@0Hww6{s8e9lJ~^.yh&3#,IXΞ;O||<l޸x232QTdef  F&#YAד@rRɲv$I!FFGvCYn=II3ϷGE_26ڂ |KdY?cՊ]kWS[˛__an~7߿oWo+:$zhjn3L&L&WXS"!!aw_;#p!vPʟ/]VxǾV._ZsqzZ?ťYN~AY 2-b  ADA; p_A SI )|u##N?05Y ߴI_ejjz]8 razߙ<:}'O2<22粒-S~89m[ƅb)|QٵOo&~^~u7ȱc"U ܡO;Sn`N1vOWr_Ss'U#ZMGg'onwK{gTeM>¥˗^:&n &`ϧ}]{G;|QX楪jjj8t(AcSS-//@ t:)wS8M' ohwwMggo쳮Oq[W=3<<Y\.Z[x{or00tP]ٳBaZ >))\rRU]? 1!P(ч`0wq\`<($M$#9)$W^ KWW7߻lΜ;ŋY|=?xI%2EQZSñ'Ѩլ_+WY`>99dyyD;Fիy9sCC1< .ccO:$I-3FaA>YZH4k;pٹ=N'/tqh>c\npݷ\v\z~`J^n,]F0M JwbLRFZz,Tf&^vzz{faZyɓ|'՗STjAӒˉFѨ$̫ ;;O[{;`b$ ';sIINܜl|>_~u5 Mx^eKHhZ ׮ Ny0ZF${HJJ'[V˽ARI8tͲKhji$'%=۶M,zHOO'11y|~ikkvc2PsP>,232)).A%I'j˫T~Z8w".ӉJPIL{o4IKM!#=9EEhioʥR ?7(DtXV P$/\dEh4rגxm;:HI^~*^+WrJEZj*HEF*㗸\!+3FTQ< :ؼq#Mrh4NF33imk!*+*p:9w˗3444WBVdRSt3n |3B0,lRvzWxs'_ щe._ʜ"9rs!??|$)g)xEQb}S$ŋ8cXf&+訓O~~^V p`0DgWA@ɜ9l6._܅ ̯'*G{o0HDJJ*sWRFCQQܜlzz{imml6Ūj[[Yp!Z~X}Co=hZBN'.l5yyy$Ǒ,Gl\t"3#h$JJJ2ijILH(-.fni qqqT166^c'N'';IRR+W^‚1 |(Wkjr*lX͊妡yVի5ˬ_tdEa9FܹLOo/Ih)*,$RINJBVSOUe& j`*rL&M$%%1Ԕ s8ĠSw##Dܹ=h|oɲ) IC xk~zPeVQ\n79_jh4Jk[9~Uh^||6[;齫55nn3A7 zsN ě~s/|uHoHۛo|y∋j P<<}V}AO iIgߜ H-KLLuÁcyۣjygQg#  Ш$D@n'GA " D~AA/ wA2)˲LKk3P+ P}DzK}Cô6##465QЀx=344|tp|[p:hjne^jY |zz{q}#e'R4Y&_Mg .ܹB9w8)ᥗ|3]?>^|5::;'^?/AZ}=_P(KJgWL7 3`TU='O {>CCʫ\3]- vrGFEuc;MKBAΞ;Kh$1*>ڻ9EHRA$9}P 9hljbwԼw .zJlV+ qtwwSwۍdbul6j뮑Nww7Gv&y?) š .ewQQV6"·vs)/KJr /: ܳu tuwu&3< tt:esY{z([`xBzzzꤼsCYi ,r/™s0 Z+55x<L ÇqzV._Ρ#GymǛtuwm)q^}oʊ&d(|i]`0HWw3\EQ_YI2yw@IktuuxŗM"PTKzN^Op#!>g3Ȳ̕*+*| ZT*54pT*n7zfFGGyŗPը$)OQ`г㭷 _b |'((&RSywq\  6 шN#@ѰOV/LCcH8B~^^,4xw݅j%zn?NccUUռs|HOF_GՒ@8ߧ$Ǐ[;% R} o.Z^O1mQNAj`Zgc#L deev:l6EAp}urQ$I~}!z1B0-3] \%/7͎h`<Ѓx}>:;Pk IeF)btt\.eb6dZsFRoh܅ ܳu EET܌&+/cʕD"L7 Fâ X{ =/Zļ 斖IKMERd"{iV Gc9˲KX,(l'';]# QR<Fsinn殥Klp$ew-EQ8Aww799xX&pqq{<]&IpoP֯[ORb7Gk*'+( ZB!.UUSR<E77HH4`&aϔǯ:Y`kVԇD"@L,#I&@_?'#=EQ,EʁX(IҴ}gSK  RSRh>?.2*+7lGY;k">^/Io>;lH?#/t:Z+V AQ`48wMwO@ 1N餥NleH9^TIz|T;H+0˨T*Lf7R^EyUs~MΟDAe$I"^ ^ AA/ wA"  ADA;Ȥ( }Kx뛘! 184tv ü{7S"o\.&Ĥ)>446r!. Y,s.3Y4Um0wS>w.5ux<\.6 Fl6ĵzHLH@pFFFXt 5u446b4PT=k $v/yYm{zc9mn Af'p_wt`۸V_^|VK\\֎`l2166ƙst^ 4i;Hk\1<2BÁ餳B}CWkjQ){c9ח bYini3THHֶ6spY^x%Z-SMv; b?e ŕ+dgLIأ( w-Y^?bs:y 8~$?f Nu疲{^X҈lڰGrؽw/+-kVe*9r8'>=EEyV F^/ͷߡEzZ:pAGGT]ͿWRL+w`̑cxGuC  s'`āCɏghB&@^7dJ Б>v*x7_YNMsc9p8xŗͤoRXXPw2rWEy zE$))#m6epBbb"Z:TQ =09w*543Og?)CC446t&ՑF#̶-ُD-mmԺBA^?x)斖0CCÔϝaGV!IIX-2h4r2b6s=x{q\|]A{-^>$I8vJKٴa=k׬%)'$7'h4+_}s?xݎnv\bl6 HIM`0Z]E mMeRӦIKKP(c}!L&#=p?[6mBTDQlvO=>.]‚y rl'?/%p~$6D~^B4%==[.F#jnQVL]RSCey9:p8ؘn"Xͱ'()dd2ԓ |~ v: kZDAZbxJbph1 JE(ob`$ #tF" 300@NT3Ȳ_zNGEYoH|Rx2/ah+(㡯;1PVgדAE G":z z=P޾~. VTv k3R$X|I`XIHIb]KZ[KWw7iܳu+`tcni)v'b2 f9*.UUSYQZ xp8ܒR>w 񌍍qYn7%8vZQYA#%&&`QT$'c4Xd M|\kVx[H$̹sqzj5oрbq(BQaVZZظ~*  @0@Vv;Ve^O(&pq,^LJr2@1Z JŨI4l6hxpx9qqT*<^,'t:QجV‘:ICttuz92'2áǩ%Id2V'D"Z[[D"Sޓ$ CSsӗΧh&h&]ylG~~FaJkMyuZ-:{e z I4:/B 7RjZZe8)7d鋍 pL*wI~| IIصZeH9jG%hԤN1SeR H+0˨T*~A㿑yI'iCjj >$ ,#I%s|cse}LyYٷ-#A"  ADA; p_A ('lH$B ]ewbh4J0$ N^(V+1Κ|ق ̬H$嫏IYʲ=u֖[poiimoz}3]?귿}>1~ tV::;tAv}!U՗'v}}omm#~3- ޏ?UAn_bhxήN$I"''wJKKk;~F0YD"FIMI4SLD"\t<7Pu2Pl5f nAOVVƦf^/s>,9YHDWW7P,j5==( dK[G)Ǒ)2O ۍ$Iddc˯7vxNpK$!99H06;:(2ZFex<96FbB¤-g|GWwjt\c.BrTd2"2Z-)oUk`ph|sbWkj`Պ:sχή.}i/\HUu5E444RS[Ǟ?\!!>-6rEIIIfMT*]C_/͝aDQ.\D__P7SSWGGW'v!h^f30<446Rzںk()`¥*c'NKy7IJLxN!l:)S5y&%9F\;PռnRu:ټa#]]446{^l6+ECMm-]8vٺZi駂bln9fԴ`xG8)]CV˩gyg~H'1!“=??~?Pt~QTXHSS3cc.{zkV\ ?!p%~?#7'ۍZddEa%şqǗM FaM'?ǂyvoʚU+)3'xX|y7=@0@ '++%ephƦf\Jܹa̝rRH_?G=Kt=p?m`(?@3OȃrQ().~i3)*d޼J߾m[6V۔Zܽf-啷Yej C|K域 dYe*+1 ȲBTEoɆ]d4=*FD"(JBCrrvzS Ih#wNjAFM8&jQH86PR0 X,4Z phT﷢("~?~`0DiI ?zy;xװX,)*b{v{(-)=k|-^DQ%Z,i4Lf3fEQhԀB8FQBv@lp8 ~>ߔ{˗$1!5DMs!2Yt xZtg``yUvD8fNQ!\tFNKjAT]MiI1j 0x%|1 /ɚURSCoo/ɄHA:}^GPZ\̾0,[+X!;+ (?~)/+vA!'+ @Ww-jxFՒahfxx_x$;+k#%9͘˅TjRSh4Aj"$Iw7‘zܶ/_gՊ]k:r/>mo_xoMFV}G*:m_-p3IXf5HyZ6Gغi#Y40=AfJŪ+/\\cúu};#FP |ω[DA; p_A " dRWP3O  &,sizo™sOo^y7u_[W^kuɱ'?u:˯LkOimkcǟL>S;vmkccc\'Hᑑ/4_/:c.LW P(ı'u:Euc;M%:;;9xӮ000y]D"nWjj&f |x{MdY3gB\adY&*|~0>a\.DZZ[ijnFQ/o(" 966e$?OOȬkA.]l!^&Gί~; ÄB!>ngQQ;|P08#ABP,s+7/#2NNxY^/K$&x&y[z,xS;ߴttsnކjJ%3$%%M̌w?y9*3m[62߷mhx^6_ϧO:rE 0o^% h>޷ݎ9TU_yew-e~e/*w-]0'N~J `MX| :uk֠VhljW^OQQV6!·,p!\!>>㜿p0'O" ̓Or9 ”q N:E(w?M2ֶv|mdEa~e&f~ܳ=w&V._ヒ,T})XNey97nwS[[GBB<۷m7Dddtaw :`0˥KUz)3gv9z/\}~V?m} :tt;ʲBjj*?{>N*|w/֯457t&465c1HMMjO455ؘ N#|xK,&#=OONRSS)-)f $s._fՊ + yş,g)AvlV**gn˙STď\)--#*(3=SSTP@x;l޴QoqN%wqe)eo&2 ZC>O4*IÎFt屪jd4!$&#))ɀ닥$l6 !2 Mj X,={K|\;~A"(p-6dB21v;PkGIa1* =fɄlFbjj(,(fK4%%9@ ZEΟO4*s1L>1CCC̫b6DƗƟgt[S@y\Z-))t:\.z4b[eHOGqq5ZݎNzx;ߎ)%dg2FpEHOgNQ/df~Y@^nΟ[I!vS} E_tw ? QY 0~*qU1X*ʌt8g kEA%ѣX-JJ鴼^"NH4 p{<lx<\n7{>هEQ ;+$:0VYd17nD|\Wkk-ts'|Ӗ322JQa!㷿lWV" }$IއaJj5~~[ZCT:6o@Vff3W <&3$K-< *˨,/'++%62ٴa=6K(֭EՐE\ԔTmDJJ 9PXX@b|II$NaAv4.\A ?m7Aɜ9:YbiD2q$%&2qE %%m[6p80Lp[#5eB疓NIq1v, LO`0d¥KQY^5qcL@0 $'%Dfz:%s搔Djj qq"W$2Ns'($I"12:uIJL}m h+]FrݘL&j5,O# <Ѓ3]-Aƪ+Xz.2}!_5fwSK oqf Nlf~eyKqMQp8VAèj8 $IBn |);X[?AA/ wA"  Ah4UA;`ReK9oBm5^}cnA~sS; M8t``u՚ډԕ7z䚾ħ2t8Z}='N~J()zrR^ DQ 6m0ۏwC #\Lyvn)g 9vkl /=Ȋ0 L4b6P#ǎG>Ʀ&‘ &} 9vF( 1#G:| K<@Б#eYy9,^zIӯa9x-/OwtD"Iω7 ؄oOeLW79~EvZ0&VY0o/UQ> NZF$j8t(pw%gMs{a._o/kV&?/+W8vdl ~q23|‚.UUsEFFG),(`˦|##,?zz{ܻmK/^*FFGWQ!;H(⣽sy );>J__?C|xǸV_OGg'~E vj.UWsacc8Ɛ_y݌p|f3}}<\b `^%6lX΂yذn-G̹s8vٺ%v7 1!`(DOo/[P($o6??|9ESw]j{'yPmnѺjsȲL~^6l`{1<2Jbdt7z|-]ޟrYk&Vh0r{ؼq#졩k208K(B!WYE ټi#l[Z8wK/&?7Z/g]K:2328w<"×'yUrsY:rȃR}2Zn"o,\9Eed%vyGX,dfd1M"·LD}{ 8N9CJJ2)({Yn(5u<{C.lvn˅(Brr2 xtG|K-V,'99vM7pETUU;vEvVR#=wV HKM%{l\>ZQIZŋ?I̫'E<&3$k4RIOOjKvVevPk{6RSRf~74=[jCAdYfQOZj*ƃKUZTZWlV+ Mh4oJfFzM0 $%&sl|1_ t:-9a6%?/0x=dedrZ [6ol\rCϫ$;+&^/Pfa_JKKbpInL~^N5hݶx߲{nx23io C||yFL&#SϠRHMIam$''!;+!zBDQ(3 ;㟾Yq:$P8ȝv􁈢(^U |9QY+v͚]^}c#۶--?Em܎0=Vד$}A42qMho}NGfz:h%+# wZgu\ w?2PP]ħ#0 }s4>`OIAA/ wA"  A٘YOAoƤ/2 .'?%8vlť*LO맦+Ȳ̕'^줱k(2xCٟsgAZF|TUWO>Ӣ(==goU%N>9%u?r{zxͷ/ZDy\>Lm]=ql޸J|v@"I`b$;;kP\rdef;c Νtuu}KWgFEy-<|~1i&q>z^UV`2sf*imkc;q^*Y|SYQjM->lbڵ=NjjEr8u Nuk9xo]]] qK7E8R9},[7o$3#ȅq: lٴqR3}9oh|4j5nD.GB|<6p$DFzΝTVCiE-I9䓘?|+W$LH]( }JjZěrT)6Wtר5De$*QYF%gFH jv|ÑA֠jD*$I3JA5D9*j"=ԪXFQI*dEF%PTD$IBB*IfH%nL|P4 =7Y'^Sh4:1Uzq_QIX2X!jQ@BQd4ʹeAf"oTLāH$ZT|UHQ(pfAwhp8ǜfM'$IldQA#/ec&A' O-2E`?q;6}V>FNJc6fl_(ã#tbS̖/lAHM-3ȲL($=5ud4  (?割o[8| l-@/IbO(b^AbϨݥYqa/ 4YC\A ןDGݦ{FHZ=߿e.DDщQjy$$AinLݽ=(Bno|t:Hfzv}r>YQֹ͓I4ex$I184G%nO:PeǺ,4q l)s}-AH$:)\$Ae `H4`#2χAVd^/Vhp8LnNp8Eb6ܗvNH$BrbYttuۃf0 >ZED|FLF#`P8,Gu:&?/:ʆ$ }6ee0 D q:` &yINLv F @(&+#Ą/|  xF>-hZ0ytuwcILHh4a `pxق?008hŨ~A{|ٸ;[R`A(/ll6 `22:Z! 2<22.L7@Q\n7M-MCA22Vkp{P!>.Ą7,2jx DskKv4 $}JIIɬHA,Y#'kjj_y]Qt:f FtZ-FcItZH@0VEѠV'^'AotO]$(*(g0$hep8N#QzTX·h4NX7l)ۯ? e^?)Mٳ>AVT*|q3t{gY nwVZ,E~Z^VEgMڞz2t-s[5 L٫s+Bbb"TSͯ+җEbA Ύ;@o>}[! 'Ij` K使rC*I5^E& jEA$If1<2ʨ9ӻ,+lv$`jNc 4X-VAAo5O8OlRT / |?ܜ4g61ϖ D~AA/ wA$IB%2 ) T*Ul2&dEFEƶ@h4z6ReKۍB ·s磥KZj # gY줧B^NIBQdn3JQZcP0R9dxxHBB!f d peew{hjnчDMݪ$==wvl)_+Jl~d7Uv}6Qg(+-!>>Y'm{llWk钉@_)Pcy_P߼o,ҫDHNJpdg|_x0 \ĉ6^$IH@t|76͛hx}n<*WAa: p&ݽ5VF$s.KAm]F+WP(˾9"1'+-# r%t:.I2. Als)bW Z0L<);X`ݍh¥KȲ̼ yg.Yb9###$&$bwةcNQ##]lbтwʔ͝:M6p<@" q ^/heKpkذn)IɴB\2#SY^FGga1>FNRSRX`>H/r0,W R UM,KdE9~$ͭX-Vd.4^}M22d{jAWw$'%tvwO /DVF'ObddNOOp|z=`6D"aR $G8.\dܜ23p^F^} |Ed2B}C#N's 'ÇRSի bË/BCc#X-V7PVZJ(={0M\r1-:sd8{))X-Vpa.^Dzj*"77g܌j}))CbBLWA0IQ6lsSS/ʒE Vϕ5: # rq8--!/7{l!R[[0##tvv$&$qz )(gݚ5 =}wvGA~Y_{7EEM&"~~r`ͤMT <^OaA>#4 ׯcۖ@oгvjx֬ZDbb6l`ECZz*k^Co_))=}V,YIJK1L P} <ZGqEf3+/#33N۩(/'.*;;٬$%&24h4ʥj㈏IB|Te6VQ5lַl0B!g+++V8$ 0L%|B(h}I IC3v"cؖf;owR QA168s 9[!a3w080 G1'ḒAvEB@v)%6{8goiZx9<^H!c sq}:^sLq4 f_Ϲ:*zj8`߱, VauݞL=n[_.4x4gv^wB c ucG !3(":a܊osJV9B!ԁ4MLj@ ,=Bי)],!rϨfB yeB!}{3D%tEXtdate:create2013-08-30T12:28:19-04:00(%tEXtdate:modify2013-08-30T12:05:05-04:00xȦtEXtSoftwaregnome-screenshot>IENDB`selinux-python-3.0/sepolicy/sepolicy/help/transition_from.txt000066400000000000000000000011531356774067000247650ustar00rootroot00000000000000This screen shows when a process running with the '%(APP)s' type executes 'Commands File Paths' that they will transition to the specified types. Under SELinux, when a process running with a 'type' attempts to execute an executable, one of three things can happen. 1. The process can be prevented from running the executable. 2. The executable executes with the same label as parent. 3. The executable 'transitions' to a new 'type' based on policy. This screen shows the executables that transition to another domain when '%(APP)s' executes them, and the 'SELinux Application Type' of the newly created process. selinux-python-3.0/sepolicy/sepolicy/help/transition_from_boolean.png000066400000000000000000002034011356774067000264310ustar00rootroot00000000000000PNG  IHDRj8pgAMA a cHRMz&u0`:pQ<bKGDIDATxgי ?wU` ;-hDODu{4i=3;3DLNjٖ(%zo@P(6#ィ*T ̓<9y@zv]._O0 0w,,,,,,,෰( B_OU@@ ]H1麎  (wU"QDz}Qǔ_׶-,,0෰ e>{=ܱj9?hAx;i$ͱ~JD-pAغ{,c4^4stӦyZPy 30țmbY0ع gTWx2-*dp:HD.'r:|'T_AHg2 3H,N6'˱y^6S(ri4wZ!( -a$ME A0S9ƒ-dYE,@^UEAh=sH,iS ]t$pO0DDH4ƇqT+@ݛ2||!TU@c$kZpOM)Y$:D Q iV,,nA Oқ0gtk[%<e&\[Q5X`Ϻ˨qDcȒ̬S9u ,S^A(*0p$J&aӎ]=yUUzܷn-[veJ}xX8g6gE 70܋0 *B^ݒS%طm}^} $""\HUS9ũ382²XhT:c6Ux.DQdӎ]hN߇ omO:Ktm~(oܵt&:Ke|}'m:$V/]G[w?8Ģ,_8Ws|^.4O,n= ɴF6rܿvYTK_}هjkkl6K[X\!a2Sb]h;C Φ;9qGq|-3sL;yUeقy$S)ٴZ8+k!DQLG'^Py}KϫvvqךUW's0ZP5#A˝kVS(UUqfM;>0˨ sd+3N>d400<́'شm'C_!jvasiXgƘXO^U$Ri=;0D$cۨdLmlxk2*!ָeq b$./㳣8x ZfqmK7a[X|I4MnSx;WӝyDo? g <.W;QU Qu~7U K#H$SUM3$3g4cj*+R_WƢ9g¦m6^~~&NɎ=t]/E2,#8.b9g/a٘5mʅ1i>L&fcjCDU5ةVl\.Oe9?8چn'G<p|}C*|ƺ"ĜSQ5,nY nن_eK&h,,'24AJKt4U>d}Q9p~̚> {蚦*c)T}~Ξ'K$̙E$O6}wT{#"n0grT+Y]`vv;aY|c7[ۨ amLc<~?#YW]GDqzAyF@ HzJ4 Hyٱ?KtS[UI&>ݹ0{膎騚Z򠰰$Ri_93ug j$}-[}k  A^U9s~ `J]-MyC'NJM6A`fQ:{JYe(H^ULLm\.GkYdI"78Ԇ:R4̙1 ͆ >wMi8=!2d:ͩ3p:yfNmBQN9K$"T:~ _SJ+X3TMC2nh}4I1 0 `~Z|QP `zP(c4 JFa,BBnf[ i7=vJxjc"Z(Z& yh/`;vt}~Ya#ܽv5-uӋWoaq-Fϫ41L][6Ik " NuԽ$LUb)cƇl2 ,,^P&f ~ / nqdyT\{]~}scaqQ2<2=e^l뎢(8NM( . MHS״΂ t8l3ir ͊B$ҙ4|zWK( NXܺ*ښz:ݝTWUp8ezs3i0f]:13>vz7N$AS5zzƢ7v8PyzW qO7p\͏n ( 7DTu>H8uaNb8 YnTA)2L\N&fSJ>b#`;sL|F6n, Z~%Ѓ0t fP P JslFɫyQpFČ' .=,IH,I*D3 B@EM,|MI3x=+ daqrP-nI+)C9E.uEp-,pʨPc]o_B6Eekoq1 t&M:4fPqk-oqb`bҚT7GbC`oFADEK[\W &!KB|>^?W,KAnb[]u\~:: tI~}i3) [,%0: ,S5MC෸$ jYq8]>Txs|S`s=eMv{<(|Q_]] fdx=^D3k(A:p8JbNO:(^Ж|B/Q׋T: RAV\ (%UH8^WU_$RAwO/ٽg/Ml10̞9T:~Ī+pCB>pJQ~ 19j?3i|>|P0XH:v`/O$=J}]Eһ3]* ( 0Ƹx}Q~(p(kr (P9&TS\ @ٳygkb1~OPJ39ڊ磪r$b(0}2?ԼO`˶|3m ~(VnI8L&Sگ0&pQul>($ veee yvi)ƗYtDxK[\GѩŮ88 Ů /Ye(d82tuu1}4:9y;A20 M$S)0 rndmdsYg Ns9v;ӧNeٷ'}SmbqΝ?,Lij$C<p2kf3apd*ESCPA7wޱ: gg5ɪ}\4t]gýO sAB05Uh$5(B2DU5TUL{;##456Rùs4ϘN2bphH4F8d)RiΜm7)Sz=c[^폩h0  I&SR) qiYaiv{z顬FQ5Ǩ |>{~)S$ITU%p\6nj/Q]U]0Mm~δ% b::PdFGUUzzH*Ο1S(ys Fۙ6TU ^?Qő%ݎ"+dsY$$vH$ !ISLAQbtuvap8TU%Ja.[fs̜ Zrap8'bio"dNUͅ4k#8Iea>zE  SL^'p~?( C!R4UU,_\U;wfytuu108Hee5UttuznEVB nvsn4C,YNٹ{73OG%B!+ƍ@qwgpx/;eҗS71B0 2 }!>?" ?066m Vفlt3`;w9N3gPOC}TADI$:ظvs;o gf{Dj=M__? uȒȩV2,s?0BS5UUK*G ~o:,3˖4aZZcgQ*d NUըACuSڅ{酿 y:,l@2mTfl&J~, b:lUUM՜a@R)ClrYA04A4dW_h,FCC}H"0<< Wb``EVPlJara?'}7ӭTٟ|5+W;znr?ja^22R4D|v$NQ*xY ,^w(+ oũ0L:a=kVsu|e+v(m~x$1}T͟OcCy~aŞLf\Np=ܖ"2|h,JG92 ˄񾤪h,|R{JٳdC?@}}=-g;_nl̜'n惍t:iv {TTTp9DQ",Nw/egw(wfA I{СyNi>] Bş+ ]ƻv‡?fp]$/Ld%ISUYɎ]8z5Wq1ϝcܹHć?&I؀chF)aAeߏkLmjbyV<wޱO6oaxd)L:y--l ngάD1̚E"$2ü^}MQ)U:e w|'O1g6?ƝO@ J"Si4M0  ˆH24W(y5U5ȲL:&LzI^"rNIDcQr t~*++Tm2$dNrF|^/`yY\FG:u gӉDSåגd|~8-[\fE E1OƌiXt di-sӧM,P( t]cFQtMa*ow>v;8N<6 Ad2(I].V4rDQE![.7)a~)`շn/myr,vQN Nf|ry$vӉiDQv;a,I 5O$p\x1$:]RY0Ӽ2DYQp:^^63 <~̖ dsY::;:ef]QUu\>oϋ"TL6,Х3$Qn-E)mc2 ON'i6t˙p uhc٘>}U~[ A m2{VJQ3ϕ t:EQ4s?v [0h)6B" Dq]hF8Ivӕʲވ +{.2;g1Z|mu㧎ěctBh[kZ$IjeJ!{EC3l1G߾13vʯwZX|!J+~A4]juuu C$SɛbtxQUӍZ&I2 =YWDǃ,q]+Wy>vz_YYX\mJrXX sչq$7a*p8pԫ7:Ž}F8^⾹W)76 cFI-r e)lW]Ml:2ƸZ%1r<10 |>1WkLk#~3dhtp~ZX@*Bo.W"Q0^3sϫ:y@lTaq!Mgaaaq 13Ue+m,'[j[A, kȄ@.X⊂PJsVca^T'.aE .K߂XƟ׎(?plZ+/#`w9wE (J)l( g(ɛuu(k74k|yl$Yj[D E_v .DVd4MȱcC!6~9gAR4w(A0(+%ID ])yrFD4Uc;ufU[a;caaaaqP/Iuu,?YqUj``|HapCp= u4McL6T(I4M.j+QdQ[Pr~[:X2tʊ 6{qzhll,ŋweʕ8t[ 8q~!ur7-OpJ|>OGWDVev,Apa-,,,-ׯ7lA  \.0.3غm;C9(l6jYhÃki~,_c8bמ~j|b|v%ŵI`q#razɄ_ ņAu<(2hGr:9|({# QSUESWSC[{;bs_.>86 !'Ѳ'Hn;ŵ g}z(hJUU%P$pfhA ɰ|R2,1epmD"xH˃=,_D]ZVihvεı#,Xz+-(q3SU$_,^Nm*xl4cOwAPU~O> @qN` 000/_9'.KCEugiz,,,,2+:6ZO`;Eeƨ=]P(_k&hg|G W5G0Wrg@oMzג,VaH_PXXXXX\}Eӽo`pgYl[L@6%x} kW$SIw{-nd SxQzkW|^"t]V׈Ƹ,?| +筅- ~3Ҟ3 keUlirO#3cPka˰ZqY/\g *|xkwc`yHq)}@$A@4h@+feWuIi>bcْؽqKekq\AN:Źm-,VA_X2?)CC RS[S÷{@0IY}w(؀TW={ƴrpzŁPdYyp8cf *i񹍌{So~xfY@4&|MFyGƼ+ 088ipy>ظKc '&" ٜ, k82{޿tD >rֶ66say'bChFe80b帜Β.'&ΟghxG NT;{<==̝3D2EMuL;w5QLVcao2eK}Ry5<2GBY p=^t ?@Mu$18ɞ(l߹x<Ά{*֭;tVΙ]Ic&?_?0$ qڵ=wIWW?9z匿߿dx"A<ȴiSyp}IIU@tvEmm-NAY @stuwb2dYpe|EQܹs/yXt kW3ΚN^迁:w۷t:i?{ﻷ41j0t/Ȇq[(λ԰t& =rY4eY؄9qs˯ss??@ elEQ Ffn¡##6$r8H4Joo/npb8rhlh{Fe{iF ~H *+)+ `.|[=+{T+ftvwcv!l6Z xx ba;D7ki>AET\.H00'yT NeeCdsYB("K<#at&$,/'_`y9¤Tu I$}>|>d2# *Cå{Wy֬FD=FcC=:N9oͣxZ>h#YfY @<(=`y9(iEh՞Ku{ TTYb9(^dȗKxUUc]-sJfL&Bu }}ȒDE8l :ryI=Ʈ={Op8ilG4r3`O*bphb#,fJx5k HuFFb ^/^h4:ib# ڜLP'{ Ӂ Iɫ*`L&3H4J2"b8*+^*YbdGЀ㡶{Ax</55ܶf5ND"I.rͱlhy/JڕH&Q[(y4z7tCG5˥o.ΗW9o)p)3lݾ>3"&q}y񥗨$J3DDDI"sjy㭷QUFs=o##$IVX9w<@C) [o/[o122fGD_9A"3' 5o14<̌isiYjd{QUY'Ž]8~$pӧɓ  Yd ;졾}l6C6 hmkc=➻bfs"$S)lFYY 'L¯_˖ra޳`0HOO/ӦNG|;ݎ딗qwnB4eŲe$SIN:q! \O{yt~_`ik;â ΢(2!F"#3E*o%6LNŭGY6δt3Ͽ%6t:Y7g/e n_TxlR^V"X^]`מtuwDYxN'7w.O7o%ˑXwm;CDQ種0 ?6餼0FN>M"zo ;:4 jŊRy0e.0Lbۙ>m\G"{ם|v XfCEԓ{'PStvvq=8u MIs=ѦO&-ׯ' }aHdm;vt8Xx2{f3B{ᣏ7HTWU?0O<)MAUe%5?pnwޱcǏs?38JgWϻO0$N0 ~}^]],^`nN:EWW.uk^`(ɶRL KN r1~mk[gϒfc}{G~6Oyy9cт|Fys_t$;vt/xG)++cʕ̞Mpzp`F45gƍr9n_?dhhHdT/QPy֮^ŷ{Ktb~?{#O2?ttvŐdRUiNf~+/g|gPd2ɶ;0 իyF(sUU^`L,p穨/3<A״ʟ7~yDQч 9vĘgX\TTT<Ͻw6/]Ƭ3!kVde]o? (!{} ˿?c {TUVrrDŽeIi?08ȉU4#͒㶵<أ9z󝝈7|;X;hF*iyxi=YF_?e…*.Si%;rL:g~ Y,? s̽v=isrYc+Wry浴0'}碊yۺc.{˖)ee,;TNQ<<]בD\.7ɫ*dʜ\ܵǍܽ|^sMuMJ-w[]wcyl6'G'ϱdbxF"b.̚$0'۸}Z4M%uvjkjxgغceʜ Ix(8+N*.Cʒ\Ȍ c%T~2$w) y}456Ӎ,Y|ݎrbL^,6K ImvN'">$AQl饈hgܪSv;M) BdQĩdSyt]At[J>Hdr #I"U|T\>o d̉I,?$ a&4&6,y~ap2 Am9wUUf[2vMUYx>۶K]m ` K^_qrQX %GliJ k>Tm̽(ܿ4 #IMQ t/~ ra b;1C+($](G*ɏF>3LIPi"+,ZzA\>O:AtQS]0t4ªR׍By3EE:{v9K߂fæ(H"<8t(/?0%"yUEմQudeM#,綵kp9qp(hBQ}V2eEf#"–KgL f+wy)x 2ȩEBEF39~DQn[cB?=0[vv+-ۿc̚9l6[5p:lnÍvl].Zcֻ!V.fG(XGl x"ddU8lv|MnIq:(ٱk7UΟfgλ\7meJ8.+m@dl\/fC31+n4% EQQ^^_zg`=vͣ]9sO~--|vndx=w<}Y+cNh-n`jV֭]kגH$ů_L{;D>AHUe%}}ƛ$I͟OEEmc=HĔFՋ UIg2Z>~Ds dYfܹl޺_[rkV|ggI/ă/ƍ / 'Av[Z5):x0mhnz"(es[ܶf5,3D"K/i,YI_%=a (&ŽZ8{~+s@ Pnʼn,Y%0Yo ׍ nM˯ ~aOcٱ{w(L`](w\0( e/NXeI6̡d*"] qt |^AŠ(L,ɓ$IEAplgמ=8vŜXM_*w߹۶_L[a,h]|'/]‡o3,K%.Iq'D0Bds9^{M^]h,Ink㷿anj Czzzdƌlپ'NmwޱvكMQX|E¿~XA|&49~x; 3AA荤X:{ 8 UU(l檠~ӟߠSu6~={ajkk%p9'DQ[SCwO^yYNqr:IӄADQVV . 1Fd|TBHT8߉!py.7~}>p:bQz 4דH$Ac oQh4F(2q{ۇ( OPO}}=R0B4ǵ!L."XSj:FUUGY~bhp8D&%J DD"TWUaAd$c؀,  gia?0`bTx^{zEꪪ g 5sԖ91 .Wq$!Kgт4QW[K /w~;UTWc]=@^r<}(LuUxA0`xdZQ^Vk*~QU`i?xd$eo!xr# }cd2iH$EQ2+M H$fhxX>Ȯ={9r(?lhg~^W=\.Libe~@SUTRgP^V=w݉c/딦1 QDA ڋ+aAh=&*0&_Kre^GrkLMԧF3X~- \y;y'x$lbϳw(R /7su^u*+@j=VԂ1%2v3duǭF';fqsU1hg7)EbӈY|iڧk5y2 X"F/QƘi<4*t+|2ec7'_ų$M4Cv^2lD,r(% [USqNK4r9wB4|Fg! gۑ+U@2|#lY|5]]cnoDq J?IWjeF92@V䒏WISC#`К[\5b+-p>b!8Un'fx$ 7'$w5,,4dq=Ȥ3ySU*fѝpfb}t7'_e;ŵfgV<\.O(XNmMX,'=DӖv_^O~\/Vr+,,$t`d/-Ai̘>iSv{覱X3gژ1}]&֤bTt˝xG14<;پc_=.c?T*9y_/P E1r(W/Gs'D20"HP̙񣨪Y(6}$2r̞BMu C˜Ξm'ddc|c C7W?84Ȟ}"x h{wfag{fٲn9s\.2}F}RӧOeTUVq~*+*orv2~XōeUaPWW=†{ M4ai,^˙3d2ZfpRJRAd  W$C,C%8(P[[q\%—R[XX\o,ͣōuuuGf 222cG$IbJN<ή;eEC}mgNv?@,r tmv C](o1 i\,}pe,;cdYNleay1 Ì6:YY㯽)S wcպD7Q?Y\%a̘6Ӊ x>,_3I&̟Z**+9s MUi2?ZTMOz}TVTjb`̟p⪧X,#PUZ$O"r:1}&nqA?oCCC<3gf9~uuCMy9L0ኯc9ʹvt:EnE̮Kzz9zxu+S1u1 p0eޘc~E 96gNKߡ Z>klf1{K)&<kNvt]4:>6 Fd&.^N]]E=N4yFs)Ǩa{9ݍ""xs[XXøxlݶnee c)cqt[+l3KcF$"\1}A[?*l6e.zo8j(\.D%VXE6%kGDFFƢ S[SCˎӟg\qY(\_KOO7^&9\TUeێ8NiW2 .MS  fm8NT5 "~q\bҡǏI>0o/ٳfvh,J8" qqt]'SS]([]=v9xh)͜-444b M45Nc|/{?-[7Ĵ gq$Q"meΜ sdEfB[BC2 F@  "uuܹndYM5eVu***8y ٿsawf8, /`xxnOo.M *+Hg2x<^Ο?K,t:ĉcrB̀I{=9clٺEVWTP[]̚9gu:ɓ'`OTWUiᅪffՁ墵t@L6Kcc97 eD"KeEvH,, a`;u>|w{ʊJ/Z+ ~袽lUU9,UUU Y-9rAWW',8{S!IƷKW $ ϶3o|Μitvv:u ?lTUVqپs-s"}VWwyUE@(vYq9S)-cql˶͔xض}+--s9v9[H$ۿʪ*vǨ(,Ρفkf['~F&a-<n~ TV /E.FQΟ?W*(JTTTt4jv ,L&pݔYh X>DQ0 er9c4#ndY칳TMe`G4OwwT QPU*$3g1<AY|ՅoQxC,Z "639x@a|2F}9ٻotD"y $-]FWw'C(̴iөܹĢRL#  5N EQ*I"e2A`Y=zQI$d2n~h$`qu4$1{6}CG" DwwUU,[.Ξm')6dY&^K~2 {fp8X|%t&áill#e2*+*q8=w6~餶Aٺu3dÉMQܽstvoI,àHwO7ΧVt:eP(LYy¾^ `δeEAN:CQl6Ux1m( R0GF"tvuW`uC$2Ǜ>"T0 daqYS@*⃏> N#+2j>Oe s!ϵ# fZDAv^}e* Ś!XuMGutC/O8@?lL6Ck1۲El6CSlsHl߾i;sx?6Y3}\.륺YKmw:c9N3Ahllvc+(/RYex=ʋ<,,,"\Q/^$IBD_0GMM-PχM108(TW0o|¡ N:離 Q]]tPYYEUUuɻ8NN2ׇ R_WOC}#v Ie`yZjkjK(//pRuGD/U~4Ӭ^KkR[cʔT+P5 W +s޻D"A:f``l6[Z@JGx?9k/]>F}6=$J̙ucn2QS8y{P ޻o7dn[7&>]WN_x<\Y~-A{=Re\?] [,'|E}qg|]F!ۯSYYUk+7^eŊU4h_tu&:eA~1ml|:`:044cljb656^^=\zd2i a}^@y}dsYv{H%S,8cxi$RgSscD-,,.$V_ډ Ak)b=1}ѱ^w}NfYl64M-㯻ƶb /_ISttv "ӦNl;wlrdXz-$w,u~1t2(d2JOO6UVt&8dU j`mG[XX\/MW$-Z2f%p8Xr :}= VKf1.!fMc2IbLؽ> K@k@ASG]{l6|\> 7f UU'01]kI Ο?Q)'Ïf͂ˠ"|kK>'JM(Ǩj^8}!N8rnxQ!9Qw`"6'FJ5_g.gKRo~?^k nذ; HaؽaNx=\lYD)bK8|9,_<[ <1}y/IJ&;c|zK8Lvݕӊ$haqksS[hoX\LIœ9_+CRU+0ދ.TUΎNB 0(n7,]t"!_?Ɵ)̚ԩW\i J",8L( 6Eڡa}z6/o?ӏb7fs?~%'Ni{AwtN:߽2;wpL'/QΥ߽wo5=ŵaA.ljG o?4x=8xm;vrۚ0 NS  Ig={n_@uU%oy-s =λcn"(+W,\dr= *L6"oe\w{DQ@v)SOyYlX!'H | _s1&Wra,\:xGضc'gÍ<}:l#GWsqÏ?fycAFc~DEETUV# eW?p:R.k̖rHR|y 'O2}4Re\A4|>mcýJJ$ccmd8LvO(%Ydӧ͘,Yd1sw/B:!Wپs'˗-yE mNt]afX^@__?CCơ̙̂O<μ9޻ܿ>~"(dCG2gM!x8zL@|.Oo_/tH{7,:0 N>¼sD,\f|1._w;W0 ͽwŧ7u֮^œ?̙3bh'( U̙={9p uTWWQ_WG4fp8/Ya'ف<|'3{6 hBA ׬^ş~_" "D3g~]Qlv/ZHs ~q%~+YlŤRMEzH!tttrn*B#0̔}%Fb#V,H9I>G${z ae9Lj\W_ԩVD01J7ęl2 ~Qv dꢳ.($'J`qmPo:SLyF3L8e:E,' Lxy`}Wy׿& {ǪlqغՌ jWǟ8p C>rzyjkȒD}]'NvS[WK4%/x}:|vS]UE"7 hB˨p`۩E$kFkaqqF4ӦQoo=ǚU+y㭷ٽgvǎp|'_?!Jt݇(8\?H@?ӧOp2zz3kx}AOFmm >}MXδiSi1koGK? ;saܹhoͮ={:_%S˪\eKPYa=[Xcզ _--6!L"Ȳ\z}oIPU\.fCB?Co  1^{ Bk.,n fyr,. F>/Y]4Mch%u|>O6E$\.D]p\H:"e|>_*s|YXX躎($I"hnG2,$u>ݲw)/++eY vMAU YHx=ßdz|]K^N.d9R)n0Ii_ann[ߏ$IN6CEDQ$͖Ees +3ͲAh o0$)+2]L¯`Vg۹QpMM%$]$Yf% l[z^.Gegaqk"gYF1J60Q cDc,˸5CÜy0q5+)0 N6 룼! KMWQFqfYgo r>zw"*'KIeaaE1 P_G kcP_? <Eo>$ew#r!; `H[?1UpuVEr|{Z1-,,,&!X^Nj|>,Ztͅ LjGIg~gl?_%}!s|(gpB[|)LGd } pW%-RiQ᭷^{ ~'LwJSPz2u m46b[XXXXXX\_S׮翃'ߘ`LfVt$d26ٳ / gdf[׷:1tR̽'X mCC8|>^y71-Y]ݻ1sN,#_%-Euab À ^SM^D 6jk=f6 IvC nv1eY(-,,,,"& Ǒd ӅQ[ +Vwva;G"p gnlD.+Cq8{S A*6b̋ fsh YEsM6%Hb`P.;׻,,,7QY d2$Iabh,ce-J#{BښZN:ɓ'5)D Bd;X6z}=_!יBB|!g?3=w--h}n܈a ~8z()Zt:/,?ÔiWزm###4Ϙ1&A8v|ys[$ ADtvu,7C߶=i]rڏ. /H"dJSR\zAصg]!2@ L*ؾc+QYY"+c x덷hkmeڔ&*a#jijl v]AUlutu{h=}$=|~=?߁px㭷i3wq{s|~TUTk+;:Khk;C6aw_AebN˅cҥlys) w7YXX\A3l ^X,壍oPS]ig?p8(G.wpqI]m 3O~hӧb~w…G9gqYE!NOlˉ ~vTяvBfdQBI4#^} y}H ~Rr9:HEE%sfaTVV2{L^~ujkjK(8o2D"3O?Ŭ3o?xy--$I:::ٽg/o~Yvf>cB Tʊ ?SN:MQ>m*H#ǎc..ϲ%Kp$IO<()++L68t([o_şSS] @Ww7nQZXX|=n}gy իVrЮ*kFiGsݼJN !7nLA][?s,';u% ڛoif>aάYş+MGoB/\OA`hx^`eM֭d<6yo>$]i9Js vUUUŷ{;vtbjkj8{]]ha( SO<Ƴ|޾>$Z[+Y٨,,A?cϛGo_kVdV,g޼<{ݨJeE'g|&/]ʟ~_`҈Uհ)6fϚISSMڳ#ǎSV  WUl9g.YN[yog}/\i̟RH$ ˒fmjDFd2,\0xIlN֮^ys]b&,3o|~GAt1F9vQ$l.G6#3荲_s <uuc쥳1aƚl6DIb$̙v̛X؟rR)}>`0np8B@?(V?by,? YXX\C Y$͆a;ө`&IRr9L(fcXtl.K>bfq,cf ~_r)V\ɑGٸiK/s9q$K 8q` 2S``; D L.YQPA̭hf+dffӜXxPoMML6ô`%"nA?_zD$yRf뉪?xٳ$ S[46.$!ӧېdƆz8|WD1v¡[39ڊ餷wǩq8n$QBEdϾ}oD"~n:dYs1F }xo]JJ6NRi),˟ET!S =zs[k\ylny* '9"?-Z|W|g(YlNw+ ]|`ӆs(n[/Ԝ|V}ŨKU|y=VI YOss1Y}Tf defn|EARxIJH\/G%LjJ ))_8 *BTd$lyY%I]:x]B~@ X|\]%6@@~@ "D.B/[)\ @;v5\׳/f?Ͻܲ,c0u ῝ r_'{r5_ sJDSS#$'Z.IV>,dYoRi)>$a;JgWyH,˜;EQѾO 3#Ioh#2o'Oaxd\4ͼ<&>>nI֕@ r$VN9KnNvp_V`Xe^wrrY**fx<76ަ VFGGp8] r\Pkimq+57nсn8 3)KW` 5z饱f23{ /?==X`ᯪ ۃ/^~?/_WvGjzZm011V+mܸךs<^/V EQPݎ{_4ccct:q\[X,=d?X|\OeE};/I _8d"?`fE!%9O'՗{t:1 |gINNZ7z ?u ǃFo@Cc#>3j6IDATNIq1ηiim ==-(12:)44 Vsbbb魷F$^ 8ubbye'Oq/L%QO T4{3>n'3\rN2_@Uu5( Iڽ)x?6*I>Ytn7zmzzzMǼ· ?SO>SADO͇C˗`0ϥ+W󑗗GA~>.%IUu5.Z2Oyf˗9r=ٰn-}\zbccشaaa&Tj[zG284#0_dgeƦ (+)G׭nc[pLj@Fz:o,/+CQf%IvLll ֭'#=pS._E1Biljyj5{6/YQ^n'%9~:ܨ񰼬nc#>h0y~d7$C>LLt̜IE!<<~3g;"# ""ñ$n$I446jD4Z FPvd€tfd5 V+ ,/+t֨  CEaǶdepF^'?W_{j5a&S@0$dW*GHH&S(aȲB!ZhDף@d2@Jr2cXV1 A;YO|L&~}NwOׯ'Nؘ~~ia;o܄$22Ʉ^G$"##B"IV"5%шFIף(J:~EZh5L1PJr iDFD%@ L.{6V͛ٵg== S;QT~?UU$QS[˯V·8tHpBT~U*|>@Q8p0t:M*%uNQR$V .x||>T .Gb:o>!>3IFz:N khh?Iss oy⃽?Ocs3ˊ 9z8U5T*֮^E}ccx^ p\tvuѱ1_4-OPU]=׋`dr~=***YrM$$I74T3bL+4> (2INJ|(#++!4 KGg')))\.ZHNJ"l䤤.g^{|<>a'9)t j( 8=4C455鈊"3#pJ"%9O}C## QDGG184Idgׇ)Dxx]$%&`0j2b%=-adE&>>6'y|^ZZ{HK BjjnfhxDZJ*cc !IQkHKKAQʫn7K<u |:磾Fnnd%ЀLXkNyi aiji!*20}BBB<))wtLCμ s+Yy׵ϵQIHH*jV,E=:aGйVZ|'8[4jZo+o+ob4S~?M7p=|>ۊ[/w;ZK If+{:"|>KDRb"%|115ꙕInNμv>˦A [^VFB|}Qۂ/!+KEQ(ϧ ? DEQCVRuK ` eNJ t%@ _ @ _ yWi[4.e撹2|2~]B |uC>Xj~g)ʜ_$;ihg~s"e457/'I6=~ġ#G9{3kj gΝիlXm6?X!:$Igp8\.^E؉ި[~F$ZZ[iimus= V+'OaeN܅˗续ݚj;|*-\jG7zzZȲtx<9vTv#2V80vbY ,9|8cc8N$I7|ۍvse(Ȳ<ßN7>>Υ+WhzGqI4hhLO3u}#2^/5HP{46P.[,̻_$,N<>fŌ(f2kݗШըTjG;$n(TTUQZ}%!>w>Ɉe'vZٸ~=۷mC~n.jxf IڽƊ2GdYaGظ~@Hu߂;x?WS^Zǟd 2:JfF:FQL&>,ҲY|?xDGs;qw>!$w[Z"#ySDEFO16>Ξ?r0:6 $ޮtj x'L GҼ$1pz:V~ yXpr@ԓO2W}26>SO QT|g/|/QOo_8N{{hhj">.<̑'p]ʵi ]EQ0ry}j'K&n|Ә7+BBB"[z9ȲB\\,O>8@wO,O^n.y9dgg߿$n$I)aY '11z{hCiRlձѱ16;]]]ĐL&))DN~%** ItvuCVV LA'E|ݻ[ׯsYJIJL/NȂvvCgWQ INJlGRBvV&F$hHOKeՊDFF`3KLt ֒$RVط˼Cqq<#$'˩ͷAѲjJ;f >J_QkHh4"2 #WTc9sl}Ի+EQcbANV&^Tbb!+3jq174~Zd"+Ȋ"@ I9k"##磏y;;8r8/_fUT*N:\.]Bss JN !228p0CCCk^[Zx' :0C9tMNv6vfʕL8YV'x]bllIaA=}rDșs'}lA^p3#Ol6/z&;bbbV%'%( VZ"**tBBB #=< 0t:ٰ~+}$I8N;MHHH`ʄXr%0232HMM!=- S8zz{lڰ0F mHLtiiFHLLXzN#!!dBFR&22It233rqp%ܻy3Y!NKp0>>JBѐ͛6P aȲLWw7d2+VellIMI!:* @rR7꘰Onb#IrR$)4@o_ ($ Ds"IvYǧ>/lͪ5šO?zKY Q$I>fm@pw3\;q /oj3${?+N†wYogBieMs~ng~>$I2g!u S$/ =_###g,[u!\~B$""̤V$q FEڸ IKM>#-rdy?C%F@U( 奥̘ymDG|xG}Z5KΥ]ė%FAjm@p!@ w" @p!@ w57O:WoʰՅF  K,f3g$.R缁.NQXP@zZ,s5HLHXr-墲NGHHE(‚OoZhze%+V,'l 9|ƾ@02ba`p:OMUM RSSh ;g~*ٜHp;?4|>??&۴~? ` I--!.+_6>9pY^#GQsvY8v-dgODcSӜk;˼C-z9z=eX@rr2N}癧vRT.'NEFz:޳CHb5HuM Y F9f#';->Zv;bZgF֭YCOo/vK)+-!<,IRq%\FGr׮WPϣ۶ (ܨ_F~WXXVXヌl܅ 8NbdYf߁tvvQS{eE#\|ׯukr:? :CGnj;:rzwmFdL9v"fv<(2:6ƽ7toh 2";NwOWc4x6o xHdמ\raٹhrrtޒȳO=ŵ *k7ѣTTTR\Tĥ˗9vb3e5j3x̹TVU &-%~磶112zz{hhl`0h! 9|XpT@ ( a0>FF|*$&ijԔ HwvwsUrkh9t(]l{RR96Jĸ[KFׯtxiKZNN6ݻxܻy3 74BQA]76r&&&HMIj(WNyV:4Y|9A;ļ_Q"""x̚3,df`GF446r 6oHYY)K;q\2 P?cxd 2dEfSSSKYi) DFDKtTaaa.U+Wj4.2o7#x+4g3QTԠjʵk<}j.nuM-)ɘf~?]\rrQYȲ<]aph(y~dُ_q8DGGa:***ikkGLoG'hdd™s瘘 44ʪ*Q uu\~|rsp^YVhljĩӜ<}s/K+*iimcttuqyV\&:SNSv]```8=FUu A |tjHOh4RYUEcS##>sSpiZZ[1B`X[E=aS;wĬJNJFQf311s$I,d2^2.7mms_!IN}kIMMbYikogYa!w/~!$$JňłC/99joheelXYIMI!&&&u IzrsryDGGQ\Taxx%hDVdN>j#1!۶ ׏etwPY]# 1ܨo26_GLSS3~w>܅457rnA;lHNN6mm457CLll )ɁDt-ax{)+-!&:^F#!z='O~ %|^`X:sþNHnt=ror~A֬Zs۽K7Y^VRS0ڻ i}\|~?͚fg'OrEo2l{܎)dY!3e?n^T*mU/>,˜u iC/śj(,oϗԛJV?@ ;oY$z=pZts})$I JKg?tݝ `пn[_y*0 EQX|9Ũ5/p@lLij%tZK.  N^RhHHWL.dA"Dz`eЯ*t_ @ _ \Χu`>EϪRuu3_@pweɥwZ~3K C@KuMmpEQhkogtlltK6i蠷oƱ1NAsK+^wt[s ďD '1vE.V͆fvwy{==;~ed^fxwv#2o55HDwO:~  Se8IK[ۜee}CGʫ26669}}|w/_ݴwt,z_>$Q#o/I=8u: _l{ry5: Yk+VQ1s>-\׸wK--GTtL4-8y->"+J:HOK l>VN~뉏#lŋ5jsX|9QQhjN:8VukV0CCl_Ʀ&:&S(Z*L&6mXjӴQXXȚU+[[e?ϜKlD |Ex^yͷ0ٴqdefڟLll ;FZj*u l6bcYr%"sEZZۨ#?/wk557SQUExX8%hniehj^N~^###+ϩ)2e'Ʀ 8wì\匿ϋ!$*tR^V HF\۷meͪU3uc.\bl_dw"2|q?NKk*UvY~1>v܅KN`$>.}•kW9w"no,ިl6#=~+xPPPU;04<ETTi)$'%xZW$ի=wVZBӡVQUh5Z: M8]N>d?OӜ8y$Bzn^2/IV244x<=FMm-=W^Ì47 ̴rGTVUJRq%:秲ʪj> ++WjF~x:*IBLփvČo"~EQ0BYn#9y)-)fʕkv^+׮n})VX+Weyˊ$I2>>βBY!//mg-q.^†yd23O C 2nEyi ._kdeeDdTQώnppFxG>BnN6*RxlёQ0Yf5? cYb5ZJ55Ncٲ"23پmA7 lܰ+f L#In}J?Ąʤ%zQGlL 1~FF,ttvJ^n.V--3+# }FrRqqQXϙsA?Zl MHfrQZRȈPKK页‚"#vzZFx'ˣ׮(P^VJCC# Z0sEjjk~iFbc>a?O>v*ƍ\|m'-4]J"h4jbpp)ή.*iooglܰ(FZvQ]SCbzhmk#??o $ ݎ{"ԇxY涇k'O͊PTȲG)ݸ=._ʲB""@k=YЀ(e'evc0h4A;Se1[U .;yȲle$qΜ;_'f~ǃV ?Ϫj|> yߓ;DQ^4>v 0IgE`yyn4#ei2]R%|׃X=\n3_hyp>^c ((( CYj 2\΢eNRVfe^vüL\agLvw*Uwxx8iҼ*i#sJvDe/yx45M,ߧh4:!1}${y!K"El4jC ! $QRx/`ҼK.  sx8/%L& x0$$@t"" _U "^: @p!@ w" @pq_Qݪ_7/u:.UC@p!|79@a6Mg||< bp,vyn YXFzn7 lyz8{z{yo3vV$ { l˥Whnm-v Eb1fA6 ݾ'llٓL8&f%+׮_Fo__~MWw-5I׿-o~/7Y9xMs[Qz]Μ;S6WVBOo'Nfj4&Μ=˜8u+?yrO | wܜSYUf|6$IG8t1pp2"X̹W?@oo.vN $Iq1\r~WT=6MUM5~Ȉ\n77himC:W$I\r!fj`r ep3CCuԌhd ett}vjGhljfphqjjo jlj`jh4reh4߽Gzˉ!$$FB !L<|5WQl6l`ttֶ6֬^J->PPp8a63>>No_`$_xHDIY:"1B`0,vUߵjy@? [!66nƉz^hZ~^gIKMK|~$IBӒ"2{?ef q)y=FGGiim q^J+j5.r .^DGg'N@r545Zѱ1.]m[^QCrqVC)+)!66uu:z->@ڤ@ !I**xAPdq~1kV@B 2N'OVIOK=~n¥KDCc#==?x^CGHNN"1!aF>dY/ƦYSSRp8\rjn@RI\v^^;_ȥ+W0dff}r?P(h:JK̞xfFy\sx8W]GgW-PIEA$ \}{s>~ُh;x'pP]SKa~>:h^x9 (٧v2::"//K}C#>EV* ӉZ#[BR_gF!$DvÏظa=kVb_sBBBt$)p8F]+c4gY^VJnN=4e%%9wK]]=Ch߱y$zzzٯ4j;HLH %9!fglO$֬^MNv6};dfd_7kZV._ $ VTtDGGQVZ~#JJ(--瞣v}0Cn1QW9ccㄆQT8&&\.>ׇ!Ā(,+Zƺ5ȏ@5GQSw|"ylRSi^}un7022$DBbBv I~nzիVyg 4yO`0x9~Idg!$VGTT*)ʪDf IG<xSzL)HuM-7ꉋd2AfF{>Sj 9l߶l~=^|rD_/ٚUksӜN'jN$bllN9<׋bA ,ܢ8].<ĺkHJLvt8p\1|>z=XW]]M|nndta4p8b2 Ae4-nALt4ZݎJ7/ ٹFQHU  1zo?$/7=+en`0뙘ja0 vF U*n7ۍZF#S.?4Ԉ(WT  Qk0ѨȲFbj4gVKXXI |HD__en7/zQ]ZS ӳ'IO-˻37}- gsq0y؉]ؘ_DI8v$._o_jf~~4p3_ mm9{ٵgyG8Vs. [Z1ՑCB|ɭU t:q\$%a4TUW100nCӡ#1)ZMWw7. N'aaAzz&1!Ń.%X,\F~^fs8)ɜ9ws/}0^{Ϥ0bq݄AA'2"bu$`bb!t:LLL$IX,z}  ꈋEsV3huǡVf$I8>"t7DFz:[x~OeΜ=ǹ KRR:vo7y$I\.._LDD$E3( IId/JJ}7 -FEQ^YIɲe\.O7'.ηb񓄆 '+457Q1?RSR%..OdT$Ej5#9~t7뉉aGPT֢( CCC_%Q?"TwtpaxǸz:UCJJ)hy11.^ (̛KDk[6ucűy۵&WygccԓO7MS;f͛imoˤRI3  2*iimh0mAKWPYU{ҷ_ ܧ(j23HJL}->HHHY<|T~ !>,7:6FwO 7K8q46˅gEUM-9z ~ ;+LLLt:kc`xdF!+ kV◿ h\j__gͦ(+-'?ׯǷogv1?)%|'<|e+'chxsx8V 3#8.]B "fi֬Z9<|A;kVFRsQm}WɊq0 cƺk_nx|voۊZh4rƍY%7i%B!"Fj乧76 $~?ZVN]2O$ICHAiJJjjѨ2TV`0JHH!!!h4jdEFV8>y5VMJ Aa0̚#t:tz=FEQtANBVѨ'bHHfٌ='MS|\.\.WPm?> Ɔ먪,/'**{4FSsv^{|^ZNFI"dd2EBCD!~M0˲f[pgw?-5lluI2ydC+:~y}::;q\|g>~* h45joWkދ/ɁjZ-d9uZmm@zzh&`}HHL&۾/{c22<n؉232x@LQXr%99فzxusWVR>Abccix<d ehpѱ1^r%o|^ehx q$384DHH QQ(XFG>1;x!>.ѱ14 F#CC2<#59ԴT$Bhh(qqvFGG$ ZM|\###XFGI'%%J+_gx^;: INNb``ѱȲL{G6`$2:緿=qZL"#"p:tfh4 J@=**8>7߮O-}jn!MDQ^og>="IҌ(77ө,؉xiCg%и?_ԓS^Vϛ?u߳izd[/έ坩 dM$iƲ[]O~4oS=w-zw~s}$9gS3JKΞڝ/7_OZjꌿݎm<_( Ρ( YYdge}ဨ( 1cW_ѣp3Q$UTp%]7"I<|`:Ն鼥=EQط׫o$yus= '&&8}$7j . /k@uM-C@`K_ÁoýThkk޾~*kj`Zq]x<&&& rs9Tbfrv >Ԋ011}bYoի 211U ޾~N9Cc(Jl6n7o.Ϟ 2Atj3A**+Z,cq8,8]ws)1^/>ۍj1rq8]S?-{LՃf[2nD]/IVgNBNvBZj QQQn~v3::JTT$OI\lXש( UU'Ofn瞥F{>@XmV֬Z3O ')!W^##dԓO}74zYzz9w"F#O>8*ąKA$~$D |uHDCc{=nz >W|qqBCCpLʇCբCez]N'7YbŬx<^>ػbcw=?t{oŎGK465ųO?5WO<0{>,044W0 #1!tq)-)!#==X.;v}bz:n"qqGܧT:v0::'@p߁|x?xh<#I*֭Y//Pd'Oׇeta^vlƅKpTԒze%Y N+yqݜ8uWhD#+ %g?vҼU!EQHOO?1 74~Zx/fJuC.84j VzJHOG>m.8|(UU~~?$';wf"1x<Ů@HBMDEE,˄db <<0$I"2LfFyy 284DbB+9<x}>x-Yv **9y 奥$|ǟ|޾魷hikjFtTH8 $Pk4$$SXP@xx8C\SnA$) i'6&f>cޚMHL"))ظdYxYW⏯Fau|h;з,TVWEHں:[TTV3Oq P&˦(;:0S]8mq{<@X,+Jж@ KQ%A?/6&Q~=v)8].Jrrtz6U+~ZbbHO'**5ZWh$#=8"##IOK%##dL$$l&..΍zRSXj%֬!=-h|>?+W,(0N%a&""d>weE ;: 3[͊ q: )).&/7р'9)421DFDJum-*I"%9mdiEK45,vtuw3[zZ8v(mIw7-Q T[GRkID{G'NMM #IRPCz*^}͟~ήM c$ѱ1vˈe۳C |uHD[{;nK]}o>~YQ\~}ySOg4֬6ULy7ꢳkh2GnF]ç s̻_$9v([|YF|PըT*v;ܷVQ^ZCfEy9W_ERѭ\\ll!܅(:7N;G\r1Jٵ{aa ɱ'xl6vZ4 |bw75Waf Gm JNu&w+׮aXx爋~p},Փ!yIr*I:L{{;s :zt}ECc#%PgkhZrsY^Vz !>5V̽7ÇX,<S[W Ybi)((CCٶ8rm o BLt |YQ^Y"2y#3#U+Wry9}457izx'?x ?OnN,<=ޏ>":*eDFFǵwtԄcdt Y xw ?dfdށbaƍX,QQQNg|>&Z</U)*, #=->@xXwy2p>2L#2Ilt+{>A~?eEEw,(Immx^ehr΢#8j4K^n.$a٨qR'';H::()^F~^II,//͛8v$U}~LdgeCY]DGGEjr2^X"#)#..RSILLD$Yj֯6 $2""h{ksx8= <|˚իzgϝd2xX:z~Yj%99DGRʢxaPTF%/7ǭDEEJrR*jƫ ZM||\};C=LfFּA[(̆u먮e=hJKJ8w~Jݼ J_QkjHOM#dB˴q WVredY/˓[V1B8~$C8uVG|\,*$ƭ6.^LIq1~e w/Jτ1lБlXW(p_Hyi)*3gϡj"?/:::T: @]Ê|>ÁLٳ, ٳqRSRh'_ԀedY؄f 7'ή.._BrR"q\^((BfFPS6_dZ$iΧvY(󤩖^#;;{R_:(QZ\Va`p+WnZT2@$N'dӆ $'%&(2ZM֣jIOK#.&L P(}lFLjBB|x=NH*$ ))BBBAzZ'eHDDHOG5-C2 '+4ƭ6z}pY$';CgW7i04ZҬZE[{vV~Zss8bccILH !>I~@ 86a jjlvXVTH^τcLHnt=sor~A֬Zs=磧8BBBfUBzAey_*u"Z}8v$.\?^5VLv_+xgYȗ}4~ux{,׭ M~>$I2g!ub`h4d:hQ8y˻E |u7,IPbbcf.,d*ZFGeE^s!FQbcc 5y\]'y*0 EQXQ^NYI s׊OCwԧj⋨j; w]jZ :n;KK!#w._ @ _ /45_53p2|2~G l?Rˏ`6s%Iy7\x;/I6į_-Yywܨ!Ԃ$ItvurQ;(=9yw.i_ߜnz=o-o{?@B$x]xޠhCߏ8I}C㼾eʖ,|~UTν5-Οo|nW]SKUMם^qs= s?ի%..),x$ILL8|* ;*\N9GffI9wg`YILH֡~Q$I$sgΟq8II b2rU._ʙsЇIgΐ0)tvuQU]``9s9p6 Nk[))8N?gqy'~xx]]\|+׮_^~t:-i3?ɾq:b0V fro9ot-jQ0L.RN>Kt M--8|EQ wQw(h>ǭ:}Nj5DGEή]9w7z0BCCQ^JJ2111{7.{C ,bZZ[9"фBd0∏Ga6sy9'fՊDEF^$ǭ7|DGFRt U5tupiV|O4QQ_?l': ˮ={룰0WVreiljGFkp3qqqM1AVIxX))hužMXܧ( &Sl쬜9ȲLA~.v}}Ž磪kVxE_dYF2jzE%N^G}c#]](juudd D:vkTU0<2BA~{/Μ5WgXr~\^N9KCc]] 9CWW7=ֶ6FGG'}f`@jNNǹ^YJ]Nӹط˜En&>>aI>q8E$'qY^^Ɗl<,I.?5Wf gHOg떇pV#?/VfapPՄ!<Ez::#99D.\Dww7֬q\ !!8NՊ,nA$N'PTXnNiq1Q{(#..;G?0@XXO>y9wPY]`VN=Gkk+]DEEquj(c DGEq>cܨ0?szg泓hdefPU]Mu "#1 DFFθuL{{7gu^ 9rZ>d?M--47j(-)al|rs1 }˾/?[jmLR; uڊ( 4]/$%&PVl(6BuS?ys_&)8;Reχ^ t|>~WHOۃ#nN37ߏFUbʕwft:m8$ׇb3 |>R@ղb`hfO^ YYϒ$QS{ԔiV.L>]r֋@ jOh  *jF[IT*F[GFw̙f>4W@4=D` U7;]'yRV\d.obr (L{%)1XJ_zA%],kC-$F#FkF#woIDtt4 |RDωxWk*%|E @p!@ w" @p`ՌԞ̧YE}]J |y|~rݥl $aX~۱l@`"GZKOo_8611ebbbcSr}~#"N'#ˌo(084j]b(svoU.hjDZZ[| χ,˼kTTVͫ$>^~wn>d0,sQ,(;\|eA=jww}9ЃCC8t_ӳI |HD]}~m~9tSry˔-Iv}K^}sKWr9M/\׸w) j|/pò"c2^Yɹشq^/(֮Z͑cr:'44eX,=Ass)^V|.7 EbW@ Jpܨg޽DFFr 8ȹ Zm$DBB<۷>Bbb"mDGGE23VWw771BɡB*u d1nrP#+1̱?@T+*xY`w`Nj$I.dYAbb>PM OvLž]H,hkk%';gVW(֭Y'J%!$.^̾؉լ(/gxdχwOp 9|y99nkj?HJJdr+hko'%9?111&p8Qd݆n^Xaaa_$ ݎ#8N&N&, QLLL0>>}buZ#w}pT_bHKK!>.E$x]|o;mtd&$ Eihll6OFz 2))($ ,ѨmtuwJQ@21`phj5]  aPѱ1 $)W~1t_e_~Í:wi|W~^.y1 JbB QiɊ,.T*b a( PvILHw9#(defuFCjJ2ZȈ&&xt#n^ӛư-KbPQYEiII`/(kjo0a6^CVB]CFRRS9VF=CdL|\jt?xeHG$BB 0rdg|ֱ}\|^O:׿F Izm~O80͜._ʲ"JKx/]&+37y70*+[իVo09z |M_5҆ZS=V׋fRxts.nN|y9q|></nPVw,OMm->+Wzܯtf2MQTzzA^@pw2cj(F I]n45gΝ':**8vr:hu:>^ N dY~*p^x9dY1nw=| OR:n7H*)rߏ/+bӆ DͨjdYVPTn@Ѡfԃ |HD__e:wVZY0QL>K!C[ IVc01BS}YP^V+xkZLN=2UOiDRW9M#ZvO 4:MtN7h4~bF47۝ˎ( 9WLI‰3$DLk4gs=|:g헥 Ej1ӃVO:,VT<3DF_\/K(x0$,@t"" _U t@p_ @ B_Ŝ_$v\.]Q6[p0{}_(Y[5h|> iYq8_r] |=O2vp\xKGKy}%x񷵵rY\.׬PlHEEm;/$188?_k '?yw!~cl|3VuIO%V\Ư~.]bYjIolwc4wt0<22ߘ{sy5:v}/I\+s^1n}sw9T*֭]OH|~? bYa!%˰X,8] (Q,v9gԄ#,<.,b0x^V+=48;:PdefV^QEyY).Zp`q݄RHpp:1L t9 #)1J{GbttlH(oUU47KujQQYEvVf3Y?ys^$**W_{ٲ3#K`ܰ0QPꢻFX@\,$$8FIJLtrMH9wN JqRSA͆E%nxINNk#["9)iFqI]^|,Bz_>~Ix>P&&|g)_JeWVRVZBSS~DX I6Zp)sx8o.vqp8PTX;V餯W^$%%TUWf*;d1b?J%qqƈ%''jfSWQ4@j4[ (.$khkogm444g(^INJ"dw {Pxw$&$7gzbo{|~? _7y_p3|ٽC> qq(qq3|t; q<};58u6[G]C/]&?/K\\cll Zlfu4284DbB|z^nʉS$7? x73%RGjJTV͛ {>ϋȱcc;x]9vܜ%1?<2B_?lCZl}x ֬al|y 1 h4\Fll,7/˯Kw_vںIA".6'=vCGCYq1uu HYf3zYgF㿔EAAersr[G_֭t^Dp8u !4 +W,q݁dMO3fgɲWT-g\$Isi'J3)5左iz[S"n;_6Ctvu9<|Q"Dz@c4^C,~N#D_NWO7?p8v$AWO'>6~HzbcpXFG ?8JHINb ^Ì4Zֶ6$I jFlLl/Ǹu|rZ bLBBBHO ,,{wFy&pۭVԭ[cllx%`RlRlUjR[֒Ť@Cqc.;᲍ h.3͡ctA3B3<*GoJG8C eѓL~ޞ *Y`"3cpc4&՝ {{2#&,T*D&"ٛQT*3 ѐB$qO B!(Վ}lU7T_.Ca qlM04M@d8}4|5 p') E8l6tC .B\.c8m.dP+pL$ 1<cOOHBq97z^B=>>yd_p(5( ?0@("O06>NѱQ*JM8hx<(E_?rh$k Ghb8p5r,c~{;}}TTp(eYD#Qb(xSO  CBZh$GS)^/N1>>>㎵;wnssbB! gʛq<M3 Ghnn-9} c;L|>c;cq(R]iljF"8=Dq2BӴpl{FkBT:MSccm%6U۶ax,hR ߇a~&o)e`6nŭ&B\q]AsӼ}+cтXut 3&)X`ױXX,Vm-=PXEV~z vUJa- l2M  GB+gQj憸q>\^ imHBqE>9lf%yӮ/~!WjUB٦U yy~!W NŤT\l6Gc"Aztb7? B!(>]fSn1Mɩ~!WibYeY׷gK_!"Mڿ7}B!׈~!kDB5"_!_MP!P,/jb_X|~\.GRfFPJ.rr\}F~AV!wVi={H2[Yܹh>LG{;cc YlW/[Fת,YwWOc|lV;uk9tr?ӏed}BwA2;;YzÓ_6E'&Xl)mqv؎1L C.G,[L k@ @q~lۦRԞm8br}ry|>]ҽ6@Ӫ#k:]]桇wqW]u/B!jQ5kShdd޾~"5ڊ!=:ʿyvWfhx~1(\8(4ϛG4!١D#Q`hx`00CC|>b(J)& z{{IG ,\0q($x<mL&IDL=I"0M8qT*E$!S*I&Y>,YG`x~QQe|mE g`pyMM R"0$p]x<N9KkK3^Tj'ObY&.$52B(d|b l֖fN9 Fyܱ]f !d5MV{J]yx 7\R-uzw[_Ocu]5w..kzazt]s___~-~{n}9Կuɣ ]r8CX^`MJ!삆>6Y(qzSK>\ p_Oeuw~?:돝_ʮKO2ɩӧٴq#kVKB\J)֭_[1B!.%~/!=KB!Lﺮ>::J~*B!%tEXtdate:modify2013-09-04T16:55:40-04:00O˸ttEXtSoftwareShutterc IENDB`selinux-python-3.0/sepolicy/sepolicy/help/transition_from_boolean.txt000066400000000000000000000007171356774067000264710ustar00rootroot00000000000000Transitions can be controlled by SELinux Booleans. SELinux Booleans are If-then-else rules in policy, that allow the administrator to modify the access control on a process type. Transition rules are either always allowed or can be turned on and off based on the boolean settings. If the 'Boolean Enabled' column has an arrow on it, this indicates the transition is controlled by a boolean. Go to the next screen to see the effect of clicking on the arrow. selinux-python-3.0/sepolicy/sepolicy/help/transition_from_boolean_1.png000066400000000000000000002140451356774067000266570ustar00rootroot00000000000000PNG  IHDRpַgAMA a cHRMz&u0`:pQ<bKGDIDATxw|mw{]Kr݀+`@ BHB*$T7l{E,ɖd~μt>tۘsۙyggutt466*1&Źv=++ ۷OŒ.׈i4M7M_~0t,,,,,F8߿;x&MӴ~ s0Ay,,,,,a!ݢߒCˏh,,&Xd-ON(|<.Ź S1G1B$ `#0x> a a) ‰J1!9,:4SBHDt`MvALQ'JY'wAinbIlpR5P""zF)?lj^?YX|^Xyc*H6{ͭM=Xe0^oޒU:ߣ Kv=,)1xjyKW󷿐$9N4DQ40FT4$Ju]0V4'sB<F9=v^SU Ii:ߟG?1dPSK}~ q1MMA@0 ]7LSO F5 4MI(r'I"JUMccц@(4|ر@דFl-2X|8dys.~h"$i#]ӣb&iZk/aFSkPUܬLJiM]}nVf?jadgJ@G߻gĠ_=X[x)JTQƎVC eUx#fe"k\N]{2hu} PCss[GgϗB Gc)^+9ɛkh*>vDO^nk{ރn$-CXX|&!<5>ƜvBW|窚ig8ad,\򂱣' <CWy?:x!Ja:\=Գ6I ;c׮8\3yط>\nz7,U6Q\q`(|Sn;q[xx~U5G' Tyo!|f}eu?{)'#5MJ UE*Ssu]{ 3[,_d!͘_+RP$jIvIR5JO ?)v{ov_C(*qM%QAuMDA`D!~kILB4Mw6MәB(`(#,?.O+ 17S{B, 4w<#(ڵ8}rvBH4c QJ08&RaDQ8fDRUc(=r.!4 EFc]h4HlǾUEE'8#RVl00B)^ͨF̟:1 &/^e^ИC NY8iG&}_EU0p$N0FA)dIsYW4/@ .˾pia|}Avi='Bv,+dIc2c6{IAnN_c[8wZo9 DAqALBE+jqkaGմr ;a!]fq9c|,,a_m뱰8#9c[ZsAsBnkD(Zs[EIINa]S3(P}_Cwb 8#G),tJ]ԴÕ#~oD‘H$q{N t87`ޝ D)$fRpNB)B(P0άq$&0=[!(3bצ0t\SYTP  RX f'|u?A3}j(f_B %\g1Nv޳zۍ@!;N Hx>D{':E1y!bk|IC({O}׉'>1"(9I1(N8\J!$j<هxԗ,y;*X|19=##nQl,"X7n qODiر35%D{E?BFSRJv;;ST$vn']ɲ9sg)z _ 9f8v0j'J(&>DQdgr'{UUY0Om'Ӿ7,c $ /hĴKae4UUy`pinć1x\k$lltmİa/b#=㯕#[r{rfŘp骪2$--457fev2='$|3nݶ]Ӵ ǙY]S>jM%IbX6 {Z81k̄R"ےrsUM_4}>_ZjSA]]]>d'#k< %n"ũLJəgkJK6LU'e%mK~Rzς !(|?]fl|I>BHyכNYZ~&4ody.!z^x< >Z\QY\WWcNNGrR餔:NqI^{D8lalή.ҁG4A{=nw'?49^y0AzS80G)˗$N^ɴ~]o*-- Hy[nilo_nHKM;lIccVYhUWٷj5bĠ^y[n!?/ra/Z\VV6xР+.t… --ƍtvZtpݵn 88C~sy>=|oBpĻg EӦL }RI.^SK.x{_r(wz,˲lyjނ,_?k|644+.7@KkW\6be+Vn۱ ?UWvkC(_߾ϚEq:6l! qx%;v5r%/nmkxٲƦ^8rpEQ ጹu=0~s/vC߼eUrsoٍ3_|P̫jox~Ѣf]͚9oѢҲK-\th]rr ii_zƘlQ%tvv\H4"rqa1B(mvdƢ-!IZ[@Zzt9$$y=ަ&ߏI Q~gggQa'%Fe(+Bߒ_o޲u[5=a)0y+8᧿uCn۱c,mߟ7oI羳g߾ ߸/v8d]I%nxaF@0p%3rs{YBuu}222rsr]m۶%''|>+yfgZ| j 0ݳjա^ h%铤qb|gWWo߱㸼ܜfL<|kȠS'O۶lnllԔm;v=©SǎaԼJf5rdAAn{W^v٤ .~х7o|Ǝ2q륄ٱkwyI0k~n:Y&LUU߯{4^&y-7| g{effpݵwq{sKK}}ikkkjjoh BCS}<ՙ9~ϛ@MKKwnشjawgkRU<{-)0v:$]>tBQҲ2 g^u-^)Mex f {{֭ߐ B0r|_4-77wyY#7x㒥/:eæMW\zɔɓ_t[ϔIFi.̼dX,=8=3w8q暆I*1.el3l޲_~}K"ifuCwN4MbdF,'&߯II pyYVs E3 qw}{(.LPf14mGЃ?z7C}yݜ了#}4tIv]]Sv,-;{M2Yp$"իkjj ãG\dMWZ}~D"p8n̫`}6Kl{?òlSz\Pz`&GXI\ ko͞3wn n5 +V{쬬ܜf^sõ'^S@  h{GGa~⫯USfI\楔jDᘢB6mnѣ%MM]2#(o̞#In !ł?+//q[n:EQCί69taC%%%544ȌIt0l6SxCΤ$Sq'eFۯd6ln;ZWֶW465eedr.k})ə_8M+W+:Llٶ0?#G ?PZfr1B\ueLQ6oz _zI{GgqQh,ַd՚5[mh)'$>Riz/?qX-;+'%m퍍M]W^~Ê73##99)9)|kIOK-nIIqcRRKtضcDŽq_4 5%?hIkbAX@l6a @0 e[[[EQD"͙mH8 P$i rYY/]]]`0B*mmWTV.WTDQ z6f?Ǡp:8?:hhnhCfPrrJ)q---荷8}ɺp ^JJʁ?lcі?yep8t80Mb1 Hca(a%Pviibv0D"a:Yl `阑c|dӑƢh,&@E"EUvlSJrf 躮(1^bѨ(h!$r,e&D"$cM9<@Xv{(b:dv{8lR=OKKa$mimIINu%--|---JLIIMrsKsrRr>GEǛ%%XYaȑ#U>[r㞻h[[_q}.l((2Eq޽=|(]]Hilf ؋4-F08wt h4 Э , G]wvvrS&i +iX! & 0rs0l]su$zmJ!P|XK_=҅9DžU3lM bsWitn @@>%&aǮ9Yr"z9 !fZjuk1”A8кzCƂ 8Q~B?YHu7&ğpv<.vhM9<)ϒeUV$!4`}?CbB4>=ЭR|2ngPvX|q(qaA5!djȋ ,J{<0mÂ$ ه3R^P,ta`qazptORŔX,;S;dPB%TԧR !))Ҷ3RJrhGgyǎ>%Zb퍗r]}]CS× ΒnqR0ƱX,'''+#+ 39WElMӵټ@9̉Nyלy^Dӥl iq|Vf֐!CO x?;'!k&s<%1 c,$(gJj]3BGaMZ[I,B)^3{3ki݇~EgPŻYxe8)_vY !zm]mel!եjfFٳDu?/gK0cܷ.`3 H8e8+p!!Iqjv<]8 *, A)empbaaqVAnS'b@ IieS$. I%O;#U=dfr#H8%=2wusGa-/E<[l>inj1aE>K[XX$ҽiMMMOS87:C<+?yM7 2Xh4ܒ+D vm0)W֤;,hlyvThhc5!SLCn+1U% -Ǫp D0@uP8657N4p>]#f}HM('^aN@R{-`וWQ',N+`mbaa۴|sOfF|`f7MC%ͦCAd8߻/9) !fۻOB! &17VҾ(߷#lK׌chQ ?P50H4n߹s@wˢXWW%DH$( Eݫi'{kMrWֿt&('FKyDQ=/Y>,~ FsrrDA@up8=-m֭}KJ[[z2##}ؐ! >0~3!TxM75#dukVgZAӴ3eldbDz6L4ΎfrPU0 áv]D0(&s @ē]NM}Q2|P5!dtYE46x+f&˘Ԡ纹뜇E3LIIͲ0 sEEɾdBM1tG돦|]1Fadh!"n3%IPJ%Ir:aEUL<%(Hy/)1 Č d gKg/llCR~>o>_ P_|{- QQ8'm>'YiY;&&l?OTzr I1p' (0r ď3X BPAwxrּXˋSpSIHe9JM̶YSEMN]TJ(&!,Sձ3*8fPJ1LTUsU#M ; xq0CB)Pߠ(acfJEGl;Zu xgM)$@Acv璞!Bi\2">o ~^RʪxxU>u ?T,koQ4Ms:_s9Nc`; *-`0+&lS0&(ohHMIa_Jd&qLX$EQ9b1yg*yK1<^SSp8BH$#==3#aalb椅1EQQl6i@4 i819˜ODžBu^4q&!^uCVQ(_( xu`rx$I4KN)e74$|61=!D$UUEQ|ŗ.:E4b@m4)vBccSjjJbi88!ˢ(^|hBH\cQY wϟ1{Eh4r9"4BD+q!ө6]"L7ΦԔ8~^ԅ eY^p/ NH( b1cO$&V--GEX,& +Q7eH4y> 3Ɏ1uaULHMMy vC ` ݎڎajYXǿxDUUm6nD"cUx;u'g0nimmmk#&A$){R\$^/,,5bjv{f3 C4l6[$MT>z;@MSS|6-By]XR\*cUU=%= |K$agxI$Il<$&Ii?>oܴrA$&I$0F }Ҳ<ϋ(Ik.R!;/?{em$DQl(]~  +V^=ן49˙ê5k?zyfMm-(Ja%Bkjk[?ZE8QUٷfi;wƛyˆ^6wˣO76n%zLp8."zG[[|5ke]>*?T!C.4$}o|lђ%_p8,˄ӑrȲnl!B*ݿ/#=cl۶ܜik 8alMz5M{B0$훦rq\Y`(fϸjNs=l1R4hGlh~23>Xn{ܞ%%G?p`$_z`=iNcɲeS&MrVV5kW^yuxW~㦿?(';$##X`^ndӖ;wڷaAS62/UU232v޵wX,v+Irsrl۾w߾dgx<ʪ# }rU?rsEQt嬬-۶mݶ=ɗ7oٺwQ #<_ZVxΘ~qNv(.*ڶc[{ٲm{y!4.cŴc/-ۺm{ggg jͺֶև@ vٳc.VϦi.]b굥e/6M@?Ccǔ\Np Ŵ`W4L @ !_ I1ɘQ#[ڽ' =zl]ƙk֯/,OKIt`מ=/[\M[zή.F̭wl۾r\m;v`mINC4,_q%^zh665-Y-?/o(BzZZKk뒥˪kj232tMt_t:.ҧ`y(̌;P;ymMfF0]/8o=mڼ%++ӝ]8--4MM_yeUϟ0Hd=Khy붍7vnoݾm=̔$i}Wz0UT몦%'%$;5(;n;NH招l9oGƎxa=J[22׮pe۶546utv,]v{n4Mؿ߆MkUT|^yU׵$oaq]Y|^_wnq\KKqMuxJMQBv,.*z{[r%|^~7ZxIe>GvM]a=.`g8!4Ѣ#G3k֭?X~{}C#y4^W_۔4L4Ȳ.穧w*}'[ZZ~_"~(s{Ql@R~]{,Xoiko#8t|rpW?~$+Vٯ~_2 [syG׍Wx綷w7Oe_A IJJٳw$I~EQ9/}znjn3%/KKMQU\jQP(fd1s)&1 ^GjjTMO~H4ZYU /_zeݛlλ~Çy0WYux-;vzsA8DPR3D1&ٶcҲ|?t]]zȑg_x{4cјibϾmCpcSힿu7[hͺu=̳cE:|d;vzW3/p ׮[|6EQC0QIT54$+D,0CpOaAJrޣTVV/~YQY@;xy7r99BBih0uEUM,+;ojnioÄ¡ʊ>|$ٸyK3mή}Dx좄X7ܼm[O?\cSS{&&&6V41p~ UU{[Gb^|yUUO?\cc>Gy>^<S~YM@dУFϽqSuvv"@syw՚uՏ=T(zWv:jgo4ILQxcI kxg3sI9<@8, ׮ݹk(b$;{; -Xqf\|ѯ~S˵zӅ0r:hLYn~}.4!wSGѣ*~ n>|oeUW5467>!zEE?z'G"ЏTW|yGWn1 ?ncǍӧ[ncV=޼ܼEյ5yyRiR׍aC?߽.eI|UW\nÆw_<>}nƋ/0?֛nz<-aL7ӧPӵ ƍ;ǎJXywNkoڳG?xh5WZf%1G~Æ 4%i(i.]U|ҚC>xne+W1W?#\%IB8IW^se=pwǏr:4M,,(Fha;oW?YNV֪kssr. GQ&%Rbfw7^6czaA(ZC vaZ7x%ӧ54ddddee657P $3:;;ܕiIU?#߯_+y~ni4 !&1nju-7_:bJPQU˟$޷_ߒ[oaE M4f?ywz w]:Cd{99Y)&>y=o~?p3.aavQY}WNvv JL&97;~JT=! \]S{̙NtrSbP]SёZ["(qv}튢O}Og>q$Q5PeU:UFzziYYyy,EQB'tO?{%Q4 $j&!JL B`Pj4=PZޑyPNv6 lX׍p$4MuMjUTV*EKZZ[Bhh]}nN$;ohꢔ566566FcX,VZv{EGU7])P]y/)ӷ!;bJvF `qI(t TH$jƒetQl.h4k=w# C)@`P8)Á1޹{Ϯ{% P{q@(T5%)i@yyREQ O0Ub@B)TӴP8L4]UՊʚڣ}! FkSĔ]{645a4UU A7tr{xau(?T1|Y\ v''V^z[9{U?o„q֬]K/[rťퟏ߰n:iқs,[O~nI߳z999yW^rm ՚5x23!9996 ?;hytdfddge$E--ϾLIIz=䘄\?kֿ|w?2i]qfnS5.!9\sՕ)lzIv=Kcgw>7nl^owrs6; HINxrsx~х֬}̺暷yv9f{{^q{J=of͚;^ɂspم%{]5n뺙W\Ԕ?Tg>kvhG6L¼٭nkn~=w3W_{0gd!U՘"p $QdqFn].2]a1FnHja1؆a { p t\P`#Ѩ?)6!R^TU$ICh꜕W ٳaeŀ)gaeutYe=W*"ؔ}! q4$_Qb5ƣLTU^P(Ċ`̺Ldemz\.MY尕*VO&A48nw<\#^]0LaBx3aau/Fbkn{ɡ_p"I(ͦ:fANP:۲ϙ8jw~tCw%8>^.10 ธ @K<D8јbs!!yp8'#nM_ {I|=|8s\eoeO1 0kz$&Oce +)2c&%$Ybbv{bSbH4c'U*bFQò9cIroSQ_ M2,N4ͯ21†a3fBHnnY%(:̓PQUC)g-q9ppb=|@yLUN7 A[|IdZ:֧(x74cфS:خ<cjCQ&hN]q|g<7U_$7#-E'pQ":=4B)@:x 4[#E:;P84dRJrJ^(?'>t.7oD{s Cu:>~s/sombZ9L3S!u: c|Xkb0$>9'4!lS,G|-,,.vNb9#hSK _Qyhw%spY(6&B$&F8' 퉇fGo-,,.-$fbe;lٺy}S)^lIuM,3۶z}\r '&eKA'N4hfiaubo!'5榦FsƦƭ6_v#\jukjtͩ),2MSŶuo[|:xhjj];C m?ܷy-,n.-G1'OrUXu* zGgz}HLB!(}K9xl.[e]v9==#''}A9|y\WIzFSU.|k8oq3qv/dse+O']y˖_^6BMӜ[$ pᴋKJٻW_4mÇ_y!\z媢|8ԔܜQ)VE1L#h(/`.г惎?';u{`aqz8Qj'~%g> t6kyo4㸤d \}mSs(p4d03|#Gv.Çp:}ORR2 9J]2']vڳ cE ʜ⯍R k¾E5Mx_꺾F ]]]k׭켁&^f%PU%7'OԴv\qU(;W%~]P}r$fw LjXE?krnݺYӵ‹/QS[jJPU53#g}gS23r]_{cLNz]׮[}Ua'8O(ʰ/+gzfuBw\ ,^(==c'uAL|G NP 6IT'^,D),蓗t8<&)v\XP6s=( ?p‚>}Keeeݞ,s,gfd~UzUUΛp1)uk}=h?vLà@ !F%h Vٲuvu64=v%%222SS~ѣ%C/|,4q  " CgmmM͍`a-N Pڅ:d|--cG7f\L<|*>v@.;,x]wٳÈZmm v\XGָm p9o;c zչ  t]1|dZZ$^|bI<|z=RgJIώpݻáxgDS rqڱs{yy̙׽=qc'-~Ǐܴbp8ܷ/2 }K;`yYWW˯4uʴҲ8d5֮[=fBQ^hmk]bkMo+q,ngdd߸clQC[lEqiYY=rRS6(]{_UՒ޶uVɲ+q8\짷A);.qa6!WC`]]!45rĨ>}~;ٹ{GKssffe3v;G;lpPwvvtuuM4Сcnj\ppxK` 1ku&*GF p_y7CÆhhDB/2xi.[qMm._}Ce(W_5tQJjmks9Ɵ_YU ~Ͽ=wWFM_˖/˟2e g~nNb2oI>K-/cJ;Yx[7\aCG\vi&'%Ϻ@ PZzL7s.TW_\x</Y{ut,mimAw4iʮ=;;5UF#/<9,aي %>lDCcCcSq?qV,moo*+.*+;{ńa][Z[%lԴnuȐa)C eyÆ}^.8RSseWx-))/(QJ`(XZV]lPXG#GU%?qƎz֖,8`m[ alZ537>f^˼8x:;;g'N`(q!tH$ҿ_/=E&0IIIMM7m(**zazP(0V55Dmnw90G;|JBLƢa躞?5WUAͼ:{;w,..a9dPpIIii&a#!"0μk2f8PZj{5u40 $QAR|>f7t$&!#m:yY(wỆ?${ܞ[6j))9ٹ nP #ff,KOK|nvInyANfg656y>ח/6{cǎ{NYv 2n /X{{ 175$s_jzF1wo Ə;Om[okV&%'3~EBZZ1֬]k⅋5@ iZvV^|>}ch(Fa躶jkVfdf1z]6-**9tneLvT7SUUUSSRR[\\jFFFqLtM( c(\H)X|kIqk)C Hhmi?(JvvM7bwEQ~}A Ţ SS<﫯dfjJjUUn5V}#U}oZjڞW^QܧCFmظ~7fL0拂(n7v5+wޕC].W4쩩sߙ3jh4#M,-=/䊚h4h0| S`avlmkdƥkC ?@{GGaAp݉oE?%/Dng^3k5]]N3 s׽UUmM'MEh(R媫fbx^;ђEnk|;7o٘ȉҴ{ *!2t܅9 '&4)lOgOrL𩯷9q#؇^椟e1j))))W1ˉK,' ^)Sԧ}N,1Eftϓe11jР(a vmwP__KP2|؈;nK]vegnXUUS.ے1q؊mz8")v2 $<#3Rxin;#=pwtyi^0t4ۚ~jJj,mni8$ ?)=#&IGkgU89z:~ 8/F3 Be955U5JHNvq'&ںm˶[5MֻRRRen'#=cAMa/ !T{f%=zl(<4e4MIQ#GϘqٲe[}>gS8sdefr;Ns@coϐ5 r TUe1J_ܺkyXZKB*++١[,N0 ‘pG&#$7c$Iټ_/nsy >'cǾ8EF'+S\AQguj_@'D_ϢYX˚z.rw ] S]bG-.(2Mr# RX|eОBu&/oq·#LHEZXX|` RX|u $EN*y67*ͳSRzaa b'|%B2 37AoA vs;L>ՖuƟl_Oc.o Si&wG4c&ޤQ^@7iD#8SF4ՈSgA[M[ Puj4]0:f §DBD=}fJnO)Lj[G4'N 5)lxLU#O[AhK+s< GyI"FzNCr6BÈ}x s%X[S ST@0@1Ib:aX'by"@d .t!#&|q?H<>g}k 1x܅܄BgD@̠AR.(vNj ]Q RČ2K a!9fБyd._}JJ:dS'u{dnEYP'8.vXqm|H:cgHj\S鳋Iea9NmZ3jsr?פװ\GYrbKP<ՠ鶟L-#GoT-"4]khL)RM!\_]G,r{bkt|.L5tqz̙ CF0UEE&rSޔ,x~ E߽HxD<+QQGA}yYҡK]QsO4kat ˃iyªM䌃(L7 4C ɞջ~5_nj1tI}(-ll >!YQ_Ԛz[TԜ1ȓZCs{'bƦa̎/A&E';o:0s\8FɷOH^ )fT;j"]#79]-oV(KxlnīZBFT;S:ΈYժDT75hwj~#d10Pf^s(X[]l6WQLB]6<{k,Y|a ErJZ0l9}f1&%AwF_׆Jҥ@D-ʒ}Q R$Y{ W\u0xA36Gi.aPmv~K7muypѨYd QB>˻Gbbr EH.wj'Óڜ;?<ܖ!'bw >O:챤iPYYq0!Ŭ6m U! 6?U5G)}pH1J&PSTq;j"L ˃b+CJcjR_Iah4^Z߶`0Qӵ*Rz|YsI57vv54BiD%Q&=ڡ5+B~^)8VģR=y$Kڶޚ:5J#}ma.r-$|uJ̲ϴ%vuj#d#YNvH\{+7!"N׵, RJbaBގ\zۄ% ;m,ZOSyDyL)&eBĘ2q)0d@Α6J S2m<_~{ݾ?-y[; W#qӴ-)qN \Ů +s!^qR_WQ;K91c4!p#̘Ns?05m}eh/JQevl@ RM~hZߗ44V|=l#!MG!j;1Q3_:ij:\aư>jzACm}IzQ$*J.Ppڸ-ou#|Eig״6%|aSY+$ m]ze6*^_̙#rϻ\)߽`Réw1lҫ&RsYik>f:ow]秌w,_?ȹhT32 wD¬QFE1"EjV*Zb&}yCG"ߙZfaxHK5gkge2w{UýbaX fR#֐`"ؠ,>J0F-Aw24[^ZQR}@}saǠ&%"Ѽl$T0 i et*\n,蓹҆B0bI$r(CIjbNuj&12 8$ou""272ՠ +:6[`BTіT\ݒp&;kNΑȴapBaRqZgcv[MbV.WᜁG_D`BI.+ɛ:K( ɞ;͟˱-p}; ncL̈UVt\)JX'(ո B f9$r( QH<(B}ꜵe6 #0"jmsÈ@(P$93MB aqTpD%ǁ$"YaE'6s:#,a~C0fsYxD3' S|K5SL;\j ",bI#t떒FV lzw0"uN%l9xHnJ-!E}ߕ~M褲[jAf}eVyB)1(s H9PI@6$mgJi c1jMmK]ɥ}xtT04LMNoF 18A$f)C+ص( L赫_jaR(Mֻ|<.;]WӓG@A.P ]~T.qfy5+3$[@L]vDopy#[2 Btٙ<~l狞f]$7 Y ǯ'3Sfab;"L%P=Ҝ6ZծFˆyހƦ^ۀ1 RKj޺ wlC۸c~=I><6ۃiƷoIZr %"׈!qBy8^}g?}n-,9B*+MTvjGZXBh^f@#f>}1r:mm0莝0`lx3pL$ִA<@v>e?y(OM؇/Y^89 ӣmFM3H{ eewL&=f6=mB%o%Ə( ·zXfb |2XXNm]&y/ 0s3<şJIl%|aW2vh}GߠO4{ or0,T7B8x TVv?hq~gL uYFE"ѴԴT4Kƅl`b !I>BX,S$WBIp8"v4M4EQg[ Ɣ}@cܫ`b1h.<8M8c 7M$>) yť?_ߒp8n斖Y,Zh]}UUwٻgᄇEEE/YlێII]~cX[[{qQQumѣuӦL)ʢK *k3MС%%&!A~^[7my.B׿#Grs0KKm۷lxdc={;X^^X|iYيU%ɖ3LfrrLdy< 6WTVd+<^W߿nƶ6pȻݵ{Orr,W^7JNJ0޴eˡL{=S_^pƲΣGcI(,:RxRIRRR(PP4 K%3e 7ºu.h,_{7ЧlntvB~gK))˗ҥ IIp퐙 0w.y3<2a@n.$'Ò%w/6Ms' 罔C]l owM7,,>(l(={/\D}C-[z{n8omG_} !>ttv.I+^{Mng*[[쮊bј;ZWq\(6 c F]}+g}煗_ձ$p@ U -H/>;{Ï`::;gϝс=j 9/|d;׿565귿kmk[xK=BBhmOYgK>^/WWw6!IDATomkc`0DL#]d鎝;?=rѣn-+Mڶ #GZ;; V> MMp=p <> mAg'[z5|;` cd TW~PZ v;K Jl;<( P[ ?"PS644@WP `[p <0&ZuupPWo > i] !׿7ahXnAַt|D?teæMa?_rM-۶iѱ}NJHII]w~ݬl%$]~mmmaAM_j歍MM߲uiw0d}qƍ+tȸo5 x[Rll!y9C njѣ|{?/?/oh4pwqݬklF_ [o^x}Hja04##`!xp8ξ?xXLQ4]vȫ֬yc)S& O(DKDQt8-mPշf#i465DL RJ# ~u?o`ih-X[sL$X L`ψIU]~}Cb1565)Ymt/d۶};tdqԜ˪R n7*+/ojnVT%#=]`FSSA)S50 _mm;$'>kE $[0aBk@$(8PT=~|3(`i@i, +WCn.\p%{p啀l i1‘# IIc@4 99 @ ycP8fOYX|3lqBյ50z49sU{rsrLӔev}lyn;;+kҋ/ '^pm;q3;6n| ćCBv=c?6O:QxM#0i omjd`4%џF @f|>bX6Q$ ~SWk4B@"i%fFwt:a==Y߈D^~i ^zs16gt㞯o lnVK"2܏dj&(`0X0 A|0C( DG7 $ǛGfR_=p6 ϐzqw34MQ&vZP ǡWaBP(08푳F  h <=*M5nl'n<==hf=T"{h߷$i5oF|} , ffhػW6v,%Ao^8~T*Jqtf`5Y:|>d;_O4d >(9m?Z8y<==;_ܪYq;9>6~{`-Jl8:"M&=+&yLvak+•+ a# Z8@ C??P2eh| ۝'9[`.<w\ 9+JG1=Ñ#jL&Qz>}@(l7&&|w r9| ee͂;y9n  spN@~x(*k(Ҩmhp˴ Ap O?yqxf%GÛoBYx{F(N+׏ݎU|rڭD94W/[x03׊a$q ؼ:/LWcvCH)ZjOgWiZͼ]ܐKiM іmoJףiY|w;(Pv`1[Ӱ2ha=oLS%ޗQCo nvRm}װͮسK{*#EE=yfT@AA|vA?rrɲtGmI]j_-qlqnybPa -=c?ZxWx ⋐ #G¯A4OGA} ga+ix92 Za㵘Xd@EeF0FEEDq{ۧiGB >X뵙rt{쳱ۦ:] 쪢RiLgu!u{ﮬhsH,~Z:Ӯ&:Х+Wkjksr@ x[,ԴR@SP(RS32ijJHL +*SS@'&&%X,~G~^׮[bGش }}tY\*<ڵ0u*L AAp*3 h=I))):,_uNŒ)ifh4VVU#!EϿSYUܰÆĤdI555F74JNnllvK%'746IYY96 iVTTxT*edzMM=`m߹ҕ :Ze7fcbcBCg͸ av! O=;b0՚s豼oW|}ʩ'ˤ{l6Caqӧc|핡AA<O֠<0>$<8O? y3^d6u$?3p oMȑל_rZEeޠ }}|k+*6no \]>]цMRR&hDH$5= 'N^lÇ ͙xP_sKU+V}WU]}@Яo¢"X/r7K/L$C/˯uvr{Nhe$E EG!o'&C ;oٷ?-=C,8|>Xd6mڡ$wwT_|VHJNIIMij|III⒒4MMƌMS'O3jKMMaljjx7|صw_JZs< i׀rRDESccΝ<#f6acBL_~ з/,[}}#F4wvgysXz7WÇ?#ӧN4q|ȯ˫qڔ)?|a]IK>_믩J=a1[jMDx#FY[[[WW2v(ɤi҄N4Z*UU⽷RT 0osO?h,VH(t;zTϨ>_Q[=h>:m̺3\?Ǜ>Ȉmu>3̎*Ճ.]B"_ mul΋/$I Hd@C|P(32B.76͆OKO 4 ̜ŧ5?H$lDB!p},[X$z ͤ.Ͱd TUy'?!Y E V `d8ƍvDx V޻ lZ@Ӵ`)D  l6I4MS$IbdqwɩoP <ZQ=zI))}X-RI)hiku #>8a@,8.$)HtOd6[wrN4ŵ]7p>u ==};l_ {6xyڵ׫S\)za?ϟqt//ϷxĖm_({!zzxX-VfbӻWhH,f+L4qּ_{%Ht…s.Y,OIf6ەX2yA}CCB~p>7. - K,_QT\<{w{>=3grIR׮[cqz^d#I\6M99:@MmfKFSRS\gF74LӴ^ A0 4M9gx{&MWl RjZ EXHj5MJ`@MMMVepw;u+j`n ,Nw9ۏ ֭P\ 0l|-@Hj@$5\**+EBd _so/Q#G Ba (ruuIe(4S**rGH_x7##Fc^~D0RAH[^^AzN&x8Ό]FȀLHLs -JJ%<w*\O7mt _r'ysYeRmwrrzh̘N#ip<> 7m!P[b4_aX8C}{x`sL&HOaNhllN[OiPP(}>^^{'|iOCQK,/]vm_n67/ǽD0p ~}U7`n(-m zgVyQؿڻDsKbܫp@_}P;0Rxpl4'98]?7Ŵ AN/`wںv"Sc/id+{!@T7h*+aM3HfG9: 떳" w؛['F ;oVfkj?a'.H͵Wilr f _< 7G?[ LЮ߬߿VzΜhhhطh4@yEw?A[Ժ;Ka &.~?[Ii)Zh>L0Lsf?74ۺ}G\|^yw>=6y$:[Y֎֤{@G3'd2>zMgFz&S']/uDO7&\Vk4`gKlzzf솭;v45icͦ($Ii8~$EQI)%%v2 CpVkmiMIMuvr"I`0$$%WTL:e߄a#zNhj`4=VWWjan .gde&: el69 -KyEEL\f3.it9hiNG7̀VCF`0F&ohʾ'N>wYɮոH$۽w׼EbHzDzszEb \k^Ə}nzCIIK/<[ܺ}ɓ RTRM5u^pP3gǍcZc@1ixTLQQqA99k~ѣF9rfLVW}Cm]<2aXn蟣 %_S8}ʵVի|т?uLVN^o2x?zpf#|>r7l4M# E)SSU߯Zm{E=<T|TlsۅK<<_zoWaV߷d hhh8q>^kF!/xzfӧƪ5GzGrg4<_P 2ͦP(^{ujϿlx~NOMKeNN ۯ/8YZVVk|bɗ{{p223G x`~F >lX"5~^x>z-&!1i֌Ld2}:gG7M٬fXjU\B}f͜8~|/>Y5_,> 8[o~GR64`src5s̨Q}NJNZ\/=)'BK,}Y7kY.^Xd{otP?'{4=#CTԼګMkL#2Oڧ2hУ?CrYZm6ۈ#Gf#g4##‡ U~0 H$b!$8{8OT|BV;(T*-,*|__⒒GX,p >e \tʵk$I5*$8^H%RH(?-P89;;1 |FPX$P(>>ii|>G$ Q/V<~77Mo9sG#򗍛 T(+-ݴe-]*{DF:(JaHT(>RT&D!ՊB.g@,aG+?z䘀@`0h6[,ͳO?u^QQ%=ݢsP2ْ_Pa߁%*DZ'QNhjU^ӦLi&Ml\|^ 7/:~gf Fnʵk Ny4M4 Øfэ& j5Mӡ!n߮R D/.1 +) n>svvpwsN0Lccc۔fYL֊;ҭiXЋ*ǿwxw6uܘ1meԟݰoa5X/,ǵAp} y1 h:2/c>Mӌݨ"zQ%o{fcVw9ଥÆhرCOrpmޜjCYݧW/R-3%qvY!m쒲ѣF0X@{ShhLLJn M:D\rh[;AV2aP-vo F-^Bg_-JXU]Rl0T}k?wZԴ#ǁܼ7yw}PU]mMxj5ۃRrl`r\!!K.\1lH$ZӺ Ǎ3:-=F7^wT9ZW_R*|5@0rtsD"Ѯ{O9=x7RhھsWYyۯ٨n2i#Rܶ]3 #hׯڕ3q8H\V^yiI)͛? ҕeeYYoQ} O3j;sr&N|7u~`0al _ᇩ irt{6A~D}=j |xMvG7zxԴPg'~im߷t*޾>>>?$8Qn 0 !NN ,4wϞ8,4۫ob &ӣ?ԻWϔt8rKWh4FH$tvv>z8EQggg/OΞ930 4EJkڔzg|}}"B ExXX$D'Oj~ D]XTԻW¢lܤՆEXQY)Lӿbij2L=M垞7ǿL~ÏMA\  ͰWgKy|z|>_t^wB Z,-Kz v%n @p;89wel} TUh{vp~nG+]qo5gXrpp W3 in`Fkܷ[U ) ,hCSܷl4vMf5݇Vz9mQZSSLVeQijQfԢ=+ލ*aX =_P\gd$ɢOqpg@VPQYըVCf}ꬡ"n4223R_-QvՍ_0 I65k5xId5EW_㻈V-ŋ/^:oi;u+׮@QQerGxy2;v޵wߚ֕W\Vڻ)tW}[RZz a KM$u-3cN>t:{PYA8n0\e0h ^E`WXUDٲ{FoI!ap;yLVv;5| -#-%5}}C%E 陙Ǐ7ͱq 3n4v):a ryq 陙ٹ9>>RD N=>+;'"< 'O‚¢>{y=aמ}pssk1s w-ϜJO|Lww~X4\tNN*U]}?>{Vi1}zKfrܹ]{ E†ܼR(oӪ1|vM^>lѣ4_.YZUU> }ԘQ:oN*e+VUT8x8#3k-=ȗҕ+C;;;8;$yN~u~}Aӌjӻ`i/}(AпիFJR*U*OOw[̔H$}X|ͷ<o$E2͓$po[ݿ_?@`6Z+?x( &6nŷ ߏOyubX7,YK U5Jrݹ?^!ů]C$@"8;9:9:vսho1{{}`X,o+x<^SSӣ?TPcWWלښ_y%):!):WzDFbA<|ɔ~FG8@ՙL&iؐ!ӧNɤ1|؅KD"EQnnnƍ8vhn0=~J%JDGG{zzκ~D"FģomI^xCU*nH~#x2EwP(bJJKMܣG#_$5PmS܅J2&.5J*x=4Ô gϜ=<<|}}gw 84M;99 գAw{`\˭6`7_{uמE~~?|X\|b vh)у@]]}Iii\|bohڬj:_KHޠM&SZM>)j(6((`D=!N0))ZN(Ս1q@QTCccCccqIQzgkjkiMLMO/.)l>\ L4qїAoxG~9MљYi[9fP6c)z^^^^"Vxv=|Pz^ЖE'½ rp'y-Z#{"IDa] '$Ic'O8:: -n){TV Zv0h;Yt[G4MGwQD("6a_biC.w\]HNbsxe#A8;9uŸW#ǝø6ܿ[{q7Xno9888fUdk#_O|j!Z[دދp7.dj9InȍzAwTY 9aikjfYVr)fkj6iQʈ~Nj F#P]hB۟Eq1BbZb٩0vX;~͆X}y:f[n?k׬uK~WgW.U'&{$칑'@~A|#N+s[nˋ֯')GY6a# ðϾ\lXJocOMKZ]}88: d?Wq0,-= q^Y~hǛڏ~ӷG[ڿnL$[i/uƌa`Xaسb=OLJHJNtvvvqqEQYXTPRR2uFO0L|bbaQ;ђCAwq[ƏР|1ZJe^~ABRR}Ca/]6>jfؐ+W=w^* ?I¢"?__ c֬[Gw $:zA*>ZPTR ZsttDVŋW]+(,o@v^_(H C}CJt.y/^뒑l|Qӝ9wݽ$NPVUWgfe7xzxpe\]](FVOKJJĽa2_8&Վ^ytulM8u;w9s_-鄶= CkLf󵘸e+V644;p(.>ׯs8oش q `ZQ}6trtRT"st70 +//KKKfsyyEaQQmmfMIKy˖3-tZL&lf7Dz}銊ss~?pѴ>T7ddCKD})^_,YP\Zj0?vڳ7+;'$|}55i-KZzVa%u`0WVvսhoZ ϐJ[0h4-{A!wqr.,*JHNa*L/]=/6P}b|X$3kVhHࠠ>O>hCCCQq1T ?ȱ[n=xͷr 2hs\xiCRF5R*VVU?mqݎO6ySϽr8Td]KR"M2q,\˯+-uY99(7/;R*m6[dd-m0f>4xzL>-om2fux> Uu`,{mήcoǽ2BZL*Jl T\ ڈ9;99IA9v\&!8Dn)?tp(!A5j9 hv|)3tlWfuOf3wqkD/> oIY㪯>AOe 7wzYo^z瀃lGdQZS˾[o]}IUE;oKz6^spp Xpqz݊_K/]]k7z>e-ЅG0 ݑ3,qi t`N4kS6Ql\k1`9+7/ĩhICccEE%E qGaXڬ0 Z_[-"5oIMZ;~e0 Ϟ?aW.f]m_>qk.]a$i_1,Xبf[ euu=ⷫ@_6nlZH$w Vş}eC a?۱Ze4+,m̭ ncFvݗxʪ*h^h9ih4{ yӧ߰~>u a4MWtt]Q.\U^QZRZ |>fiڜz.z^ᅬĪ89 fL=huz]>}ri1}zdDIxg&;Hܰi3 >[qDXXHp_edFvh(R(ddfs3]h4P6$)R9i&]}mFLHD!gdfI%RGbJmPddfiJd4MM bfCҤV 3q~7/>zlڔ&?Կ?|{ϛ/Μ;/F#XVI$'ګ& KRHT&1T6&W˖WԸ1 0#Ia?l6 wGu0̤SخGcbsf,,*JKP5MMMV.,*KQx]Q..)dP``tW^[lZ1 ^^]}88}+ |}+n"nU}CZ NT*\]5 dRim]KQq1P,󽽼tz MMm)-=l2dRPYUV]SC<==U |}jZ:^enV 1&L( gzCsp=GÅ 0`֌deš*s7sZBwN>}p~4ah r7NbI @SЖ( 0}zӻpFrpssYp')*4$da䳖a`O3 9v~[lco-ӆ Ss8&w&BATAẢͲ)b'cs@I`홛'`o㏱憆c'T){mZ={{pc=mݐ-qspprpppt;8hc͊BtHS o6fUYpݙ6Ͽ%]tghoiպwh5֏Bwo 0 xl\}xon@F$oV[-}膴ym/-3=C&SNֽC+3gO5jxԴ',s UU?u 셝;Vm뎝RV^75i88؊Y,766/D۸wh/jPN=OfJ$0 c6.քh~Wds:{D.vk8ijY_= V-gQqѾ{Fu~6l;. N9~\_++/GK( &mrƨT*@ځl@uM+W.bA{PyEbz dAΜʢ( k֞>{*.I4G2 qjjk.\Y,?X,7jR cVInG7vKU԰5lsR߯Y{y\ |"Q^~ޞ<0_$1 ESO|?OO<̹vH%X,|'ٹ%˞y1y>^2cBRԨ#aN[!Kv{I&:r܅ z MGw̬lN;r;}{H5CMj#"QZf曯r򕤔}5kZ]}7^C hy;v9}欻/fݺ&MSHHSV^h>~=Aվګaah1prm]ݣ=ȍ"Z95Ԁ{xx^ ʋ/z@ijZӺ9fkl),*ja;5=]" ƫ|wgfe444$/U3g@ZFƐE?4!1_ۧTJeNNE_̟;ƌ9\;󝆃nj?}w+t媓a73ƍRR"-\xWص_Zb(i4_x9sFգGLL,IR/^  >9L7 R}yyOӅoA_0s<4?!)_3j7߯ nnA;yzzX".)-1LJ(wL+\p7LZ5kqʕ,H$ B.)V+&R|3B.H$q cH>>>.~~q 4$QТ<nkFFjzht/>ߺc7PO ڲu[ȈGG+jTJ\.0sNH>A89:< QbǓdI>28(Ul6{̹)AAaa_.YP( f/3{:rl瞽*2G䱓'VQ MRyjLdD8t:E 4MɬBCC>ZWWؽh4jZj՚n886ZhFܿo_``7~5WTTVVU[-_so*ټevbB=KJK=`)Ͼ>_\ZfX~IVR\}غoV>\Ԅ2)56q/-+{k1 !)r7^})q R{4$8h뎝JÈaøܼ ø8fS..<o!}z

k WPJ=??_X7:K/<(HB<+,$D.xS&99:yyy|jpwT*UAFQ&7uG}}\.Wn>yrJϞ3{70y 55 BnWJPܳC׉??@tpp񒓳c޽>0 >z`a!!F('GG$R+t=[3~t~iXhDsA*ppp%(w߻oԱG>*v,˥Kׯ]Cg7/o&hEx< 7v\vh~T=htO&6c'l8E8aF4`9#߁(#r9/! ;bM aCGamu&mJUqN+HzDD$N%cM4͠ 8]]ppB;[ֹb5qsppɸw w8888vq7#LnT6N!tgfk700wWl rp `?/:3[v&-u7Z'"Q~EE? vً.Z>q+t:PIiK]PW_L T^E?yI v 3$ ptOgWT#6Fv ^?y4Vݒ gfNѐEQ$EgdFv ;_Fd]}"ZIOo9)_~eCPQYMMCs:޷?&.~Ǯ=55h`g'ZȊKJ6l$ nqumpG?i!G7זےRRð-۶'8$IQQ&,̭%"[cn*Nѐ1,6>`0]Uj!,)`陙!00ӆx~A!陙 "6.~}UVU3;9:t^?sSO]r9&.jLciY93g/]ҫgX,wࠧN2l减3aǟ%}{`ZzƉSD"Q7#L+11/_6MBpїR E\|†68tcb;'75kO>m2f?+ُadھsןw8^U]}̙Ȉ?n۶sl Ge2BCcW]mc'OˤRRoSg^ru`vܸ"$jdiJj '"ûiZçU{0 c4[&U77F1"[QQC {i>އc0~?TXTÏ zG ts06oY3CUJ{M]ǖf mV fQ3g􌊪OvߴiB^ <|XiYّG|ہΘ> i->ᡡC i̦fAj9XK6c tZIR ]\M&sƌ% %cr~}H$>t(0PTTy="#<={dhj?wΰC6Gm}=Ibbrivws[чΜH҈>{rsK>9Aaa!n|>9$8XTzx;(0L*w!!#Ĵ)`c( ð#G$gKWŎ3fT#Gl{}CNX,VUVsnV0\&;uLQqB.鴻Z4M&&'ϟ3)6.f<}ȱO(.) 0mڔK99:Euf;qtRA߯WT¢MFjjk33lVwۧ32X̬aC:sAl={DJb>#2 c rqq:"7atiVOoG+pphc } j%bVzm^ YYhd~DV[XT\XXP$FVCo2بaM{k<G̸^ 'IYCEd2hAhK=բ׏VXUT]6؈6@e[+,Ejϝ?s%{BwkNKH¢ϾXn 9ݹv}?)+/G=?@SMEEeJO>x -j<|$19S"t*7eޜrrs |}bhD/^:b~AaXH;y,cn Fnݱի>0;wۧw .UTTֆvM>s.;7'3+K |dee{zz'&}F)ϯ굘k11 ZٺcsgLF+{Dj˫:!)0j@.^Ao/-۶ee_O(+/wqqqvtJJI_PoW`6r9dcXeUǟ,Q>>g8$̬ vM^3r䰡C^J(RaW˖O}a2;&t={鴺`{HMOi/!A:z\|)z T*ɤR)ǗXYSSEOX{b޽6n=5- S6GWA4/ZjVuRd2P(D \*H ~X ?\r^@|7ᡡ M75ii=p0-==6>aɊa;˖ ehd2}dP pvrhjs|;srW}ԙ7ltRdRT*EahPrٿ5A+o=<<0O"ڷ<I}+*ꚛWV^o35>>:+W##qÇ {'z}fV;zAԍjب9rxXXXP`WTVUWW֛ӧNqrr:yb-T*e@Ç4rt_x8>jNuP(d2YxX#zDDм2L ;g]al~Ǝ>C:={F /!1I$E$HRRKM2~\ax~k1>>Νiq]]]Fѿo6ݙVkGfFxWܾgΞKMÓ.v=h446VVUgwwZmٚ@o ظxw*.)Qf MMMZGDBT`0p}dDFh4|ߨnLiy'iulXt^xrEEE]]=MEyy<wtT0iE_~%I|U>^HtAaQ^~})'G7{ۻ$'7QlZj2Zaޠ._R)U4Z[[__0Zoci(h$H6B;#ttK>;'S//,ʺxʓ=V^YLRO:=z W11Ǐٺ}G\BBXh3gvyF$*.)  >,x?$8ȱ4Cl=qb /^JHJ3z\\ؑ_ݷOk{5V#~E>0kfXh6̞9#"<,954isgYۘWtӧc {Y]Sp:z$552ǎ4 [mOKψգǡGq r~ֿž䪡㖖WVjPuŁiڜIQ8u>\ѣ'{;b(Hw?O8;3-+Ɩbs]a0 +.)YbʥKRiqϝ)w{HZJjD_}%,ap;f4\4 bHv^!n k#3gf hk vMډfGprrtqvFE84KYgl6-ͼYt[ѳu;sNJRtXxV_֡Y]Szps88:WW;-,pqG;oK:2^spp >>ˍm^?G۬mrpt8s-6%vyU98iH͍}Zvj Re0euEFhfﲿ")6fمطjmSaHfZlqe?I4 7zdbͥ춷_uc5Wcoi,EJrt{3gGXXTo!Z pwٿ_,YVXTfխ]3IO4|} -Y"cgyپSRW~=M讠k~ի@0 ɭqb$%XgHOz=Aݫ:]uceڬb5QjekY԰m6Cs1 c0Պ􌸄i' 0@ן:s¥$IEPΐ{dtS Z1WTh4CG^z$I 32iQ\j׎*MQuuu~u);v펍W9.YՆ!ܪN  %&98(?\]\jڳW,7՗\q,,4LRb&94$ovCo!*fd򩓧I2y˝JJ~ _=hFGa B@$=<^hH &J)ۧ >G^^Q1|PPxĉ޽zE&PV^Jn---zpOZZe2ajjj bQ:8tNu\:$:[h4L&DlZifse$gG'D2p@պb*TEWƍϏ8b1MAСuLF`Ii `2M&s]}b1f3b|ںF_b0aa>>߭bjS7jbٜZ$Iin1& řL&ٌ>FuW_ڻ~aN" r>tI3{?v}V򊊊AذiZͿ?q*oYm-ruqJ$F/үoȈG1 34z0L?5?k|8{aC& ?%IܪTQko=J32T,~'{ǻGdǟ.ZŢ3?uJ!${̸ooDsfϺu*;WFliZ*tt-PRfVVjZ`&a'GGT%$$dIϭӧLquu/=~|WxbYyB࠰ZUB I($f370 D4t:bgzDFN?NTQFCRJ0L0 H,a*ʫN`@Iu 0(3VY) svrbGl0 +.)j^CP0zA*X,ła8#J `Ϣ/pqʝ7ktYlH;ȈȈ@?ym\F(RW`fNCppt<Et719)h&cv*'%>=:a^n.ߠN k~y-4GY ho&8^7pǟhT/Do :s׮yGq˶mH O>BG>]Ѭ^+@Eן8ut:[Qspt!Ⱦlf@Cc^GcjjjmZWKQ'f_egϡ-۶74؛6EQ5Q7p9{ZP5?TPTD34hچFt睝323kjjU*L&SqI @ddd ҲF^Ļ l$iZ/__\RGs]n]N;5.WJjZjzzIide+ٻ$Iju 㵵陙ym2aa7b Cbئ&7(l455G#$I544t: _հf$EuZ?h %%Ż|ǤRM4CgXxѺO =~cxюV5򊊷_艓N8r!C&N$֮[WPٳcFOH<}lbRrQ?W;::FEFN0Aiڲm{YyfΞ1(x<Ѩh:80 D'NNMOJ$Ν+JkkksX{;p0jDګw:sD"ZM</'7wJqw/?陙<8يa!!ΛpѪ5?3Otj3QvtTmJ,++|ͪ^~9"<(32r1Gzi- ejAVD":d8gY,|;~8Au7Ͳ^szo>:TcsvtR.IDAT*Ho< O?dW#+;ysU~kWκF^QU&-#ǎ>vl<~vʤIx'/Fc4M~`Y^8p'/Yc[ݪ5M53?GB.ǟuuW]>uF=sfDxhgԌЯoRrJbR҆?È'{h7֮...?,dW,[*Hy4MG߷3￯c065& 0lzZB刄" ä2y Lbr"QE( E|//FMÈťEMMO=jX]CF8aLiY ;d5IL4oYEIF 45IҶzgd KW. OiLM& 2);d4G ݧwTrj2IT*vquyLjzjWDNXXhA`I)Ǎ 0xP̬ Xܫg$3fȐe:npʤGz%抏')=7h}ѷ֥[m&><:-# I6A]l4Ѥ>lpRr"͎?6@ g2R-Qw huZa0h%]c#mA`/^ 3[͊ f;$`hF(OerbE"^X6ՊXN `F"4c2rdlr$m<IDr5H$bހD03 IXIJ%:Oh +'6эTbVU&FPDRl!B" fR)"IQRo08.Hc`-NX,rf|DSDlV=Za|>7p  RhiZ&YV70d2dDcO$- jҍ8 LҥK}mtnNfhax83p q 00 1AsMaGg x<1 P!['( ?qFZԴL']9St;FLY 6⍽%>۳ ͓=Xtv}w$Fڴ:f>AaV<ǹ~{Zt(Xَ>"!xa籹88889` 0 9awo@n Odyej G@UM5MaGd nqG`VY])}h@4J/,\]2yZF͹~4Mlp,f<=**/Oق0 CM陜h aE4CctG~`tqpppGǽt1sppp/6 ^7bn# (ow\ &i9888Vi-}j_]SrEl64CK`wڜǑ͍h[2 # **32 ADAqa~aP x|>_ $hZ@\6AA׉"w 9y^IH4iPs"XAȡ8 #q B5B ƹ~24\"!բhj,V+G/*.2L8k4arrs321 dIiZKuH"njW/FcQI`q\Ѡ׈&$IٌVa4um]mQqqJzZuM5EQp]Zcc8 ҔꪸxZZ^m4V+5uz>+'b :2uz]n~~m]ǻ7 5J^T8 ѐi2 ++0 KIOmhl2 i֨pwuJзDe\=00BId0fsCcH$ p `(jR4ex}\\6a4MR4eZ&Sw >l ln.I1 qbˋʊ.[֠@_$$|D,7[<Uץ9;9UTV-fï;e2fIR?_L7TZ\RR]SClBQbqrttwuJZV$x<*%&_AII0.^ػwͭqQZ^QH@ 33-6KP@H(B7Vj [b1X$x\?GaXR#nfֳjۑjme37-{ݢsmA.EQ*Zfc]9tR89888n0L&\œ k af l!+۞&@~vpvr#gWGA HR*99aD"wHRC0X,\?G;4tJԻ#2 CQ0)ѵkvpqvع)Z} 2?+޴nQMqrS/x>4-J@ڒ @ `-O_>W恕 EY..aaBP"fv8KR^r`(߀=8c8 :zN6A`b{ x{3AabYwNNNMMM@( ߭Ykr6od4}fÞ}N>+V~j# tӦLǟyv=&^`4W}FR(@cl 6WVUb I,** CfZKJF~c'O99:~:~}N 3;'h2}l۶g%$|ÚtJEQ䖭?a2 _tʵc'NX,[LIMf/O_۔./w?m]?cfy?n@~$%5m91qN}пbh4~  z'MZzFV[XRZF3t`@#=ؿo^={<#E 6U߼ .^ZÇzGzr1 Q~{9_H$|JţG <أ/>1<. ܻW3ΙLںFJ3OTN{{{z-XH7",kQnl- 8(6nqQ{ڶsd:$h44OQNXCsۦ_6R)isP("QP` PRSCCƍ}ܹ ES8'ÇQ_PU*CT.ѴW"MfAP?p0%=}>AFD8IB(& )ڬ|>eX,(jPHPabH$E!=|>d2p\,V P0L $INA(HiTJ >i@@Q[mTOٌd6-'HӴlFyPdb8. 7q7 ?pHj,ˉӧ9cF"$I0h4"i2Px; t18YVdB!h^Ge%M 08}{vvPE,6]]Af#i?PsfOa'FY,X,hOlw3f 7}$48h4)YWˎn?*].i %lS}γvNOAknp3קvu98888)ܐE]Q0߄:+ GW>8N444$&&r)G7"%tEXtdate:create2013-09-04T17:04:16-04:00V%o%tEXtdate:modify2013-09-04T17:02:16-04:00*tEXtSoftwareShutterc IENDB`selinux-python-3.0/sepolicy/sepolicy/help/transition_from_boolean_1.txt000066400000000000000000000003531356774067000267050ustar00rootroot00000000000000After selecting the arrow under Boolean Enabled column, the line will expand to show a link which you can click. This will take you to the booleans page and allow you to enable the boolean which will enable or disable the transition. selinux-python-3.0/sepolicy/sepolicy/help/transition_from_boolean_2.png000066400000000000000000000767331356774067000266720ustar00rootroot00000000000000PNG  IHDRpַgAMA a cHRMz&u0`:pQ<bKGD|IDATxuEu׬ p98S8 wltwݍGv&9$F=R3_x%cܯaB?rC !t{m?`BC?4\eBZ#D2 a'96]aF00 1 p%ecЂpЃ?Z™o8g2Zg`0d" p؁eUޝ75,-/Xn㓯iZw?yE[/^}EaYEQB Ȋ²,`0!DV(2(P;:#5cq`)W] V !^e(˲ly,zϿ1dPSK=xAN X5t]QU1F j:B3!h(YYE!^^ 8>!T4HIV5-<|f[qܯ651@mBDGy^|_0 V5(IcEHY5!BDOKNEuSSW0 oÝ4/<ї {jzˆ$)(IcG LK5 !r˰1WUt8<.'BHUno޷G eUuy mQQ) -0PBljhjn슉$'$054%(rٻO{UU>r0 e_y;ocœ4YQͺZ.<8隖ǎ:n4B8?衃`LteيU_.Y>8??ϿbŮ!yN~^}EV6a_|u ׼0;:#%YV X_tΌ|9/n/o8oٺvaO(;9!xW*ijhB(&WhgM:0-kjVm,oye_-]Qk I͋kj44T0s7JKMML(޺w1BG /B?b`d ɀd93-[aʍ/^s,ByAY#1.06:_Zv otØ5}J}s~? ϙ:~(+*1Y,닷?#4a䈠$1fДS]xp&#`;?Yp'_X,W]7 / 9Wny_`ج'Mp9VcDb&3-eϼ1ae.ZvoUͳWLML8oEQ!v˒$vW6 f54|te|LEϚ6幷8 ϛ1q' w>TeZ~Q4]G6D9eyw92UՄd)+*M$c X6:ʓ&$9鳦O~a%])ɗ:{᪵]ݣ *βXDA4?iq1wtC1G{<{0szڵGVU2| EXa *!`N Ͳ?P] a%YX0 EUEAx^VUEQ?MvEQTn1F1K0" vl?x}4͔=#0p+D8fcYpGNO˪jYk?QC(cY N>BDA8. "l6銢H ۶m ph1vڬaC!kaqo'BX!I˲Y\BHP8VΆu CI`̱L0tAH0wD^xWc?Ya cD-i ƱN72 1iQś:`@ulnC5 >cIL$A| m!w2xEo1󯺮/AoD{ !-:!Ht0̔$YQEG; BnB4$IO.`Xs3UMC1?2?PBG!|@)9$?30 6rPn$# NC2|6/&YQB̲q<)4M*YN7p w8XgYI?BxCaY7g: #; !_h?auM'pw aq׉: MQVAtCgy;wlcUSSRB#0A'J71sͭ́`|B-m-CԞE(~ I޷G-"a: S3 :'8cBxokoۻ/˰4("ttt$'Ʀ F?UUBiiK ~a:41m7#&˲.. 2=Fy4'sal6~a,{GEjWQP(E KSW 9fn"u!a04B3te0f0ё#~:o:xHlliEG74hVln2**+332EǛidOf:X/A4!( {.۸֏!Dtt]ojiTei*t:-\^e#2oc_(,Æ 557%'F}haD|!Q\EQ ^U]>jEQqE+b(;}=up:2aA!E11ii ujWTnܼta|>¡CkF?]aYo9DÔbJLx&k }La0,C=4*|m]o-޽y_|YyrlV+mt:n[zG>V5b,Z{S^t:lyK]dEv]j8bNr:NQ5rt5)|>]RZVyXDQuQn}eg()iNUo+,-Lv8]?ReVY{ה@_0 WY{-7m6E -tŊUk p5F4wލe;Na\ݻtu}}CsK˄qf:w+Vv8? `n}k/0`wy{ˍ7x5>eYl`" =nm劏g;:*:&:RW_G b"tڢjfv&P9#-c, bk{kOOO|BPTlґN34wp8֬[gv,,vamF8sZ-Y|Yg1\$֦a6퉚0~o\6n|8s***/,֟WUWov_l^0_/y>>>nWInZl`A~qy{ᄏW^ Ml~";iAssKUMwۧ(g_XX;/Y|q>bb1ZrUQ/js0.,?Y^p:?? /oؐ!{m**f+W5sKXisQ0:Æǟ~:66fرpOPH SSXyo~2{ֹçB!IJ,r_'q{,VnȬ.--MMIKJL*))=8`"fgeۿ'/7!gϞ-[\.WtTڷw_4ݞ^eY(00tC7 Ctc++/-UZVT\0 s|6iS?Ɏ]z;ݦA®a syR_}m͊0ǏSmO <8!>~ԈJJKK^x%˖xV\|i-YtMZZ[ʲlQ7SXϲ1 P($@  tMknmoRdg:o-ڸi+ ry꧞}nİayy,kÞ2|655Ə{k;w\|ERbB*JTQӺc\S^1h4w+*^fN{s} G~0VkIYYE^~eUՖ,˦?޽wvv 4pƴi7xæ-٬V[T\tvٶ=e+Vu=59UdI B#TM5 CE]9CDp,hX223R@RH,6M7@ qƂ\9Lu"J^Neaa***%I*۽v|.x`AoBaf:=Hzs 6 o}k֮x**z}ʽ{YeX&#=-&:ꜳgM8qu.^Rx֌6lpyӧM=6lqO:jH ;P(D>mnWC!defެR::Ə3i qo0=+#3>uJrrb1 c믹z9l\>nC޾apXIӇ3ƚ$ gu-eyWqNVw|-/0(_}-7\{^*-OSSRbbbTU}CX}{UuuwwAW[z͚ʽe|Ow}{nwm}m0zx9))x{"ntttsn+]& ae Ð9>6lWUeټ00B`(1!!//gSіsΚZ|yKKk^NNm]D+v[_Ӎ<4cRSRڬVaMC~l6={~ngXF׍P(dZB<A0nW(4]t:yS\NEQEu:P :-l󎫢(!ecccVmm'ċ(ֶVAhVCCnQQQQ`0(QQQnҢiZTT'Ct]=]!ySFVX,B 4]eYOjPfZ$KEݮMr\n`"R($9"z>EQ<@ *ʣ(J0;E|.KQI\.,4.(-QTfZY .òP( .?pķӯV4]KNJVUB#k׭9r$ٽm7ݔ=-[6󂘛+IyX s>ή.ahrOOAEQ@  9SUL|f jmmQI$e^/S x韺iszp%z{fgV5??!D;!Bff&BHUUrМ\ڐ1!E0 ,vwwӣ>E10MeUU줟udY6$I463 C,eiaa;:㎎uv0TL ( tMY,Pþ}mUd=ttbi)ʑE! bjr4 &;vhEQh_ ogǴܜI.OO~[ 7 'z Wt`B}zȟ>ӄC7Xm>C}l1XO80 ΁1yH~+ Ρ )q0;e\O-4Çb1zo6˚Aʄ6("J3P8mi:QtBmSX0j;.+4op 'y`fpD\deOwTZN#46g>0#B89 'vpD?A((k+z9{}xw~N$RcY0B<^+44yC#Lx'=V{68䘳0lVs&):\;M?VLuN?4NQv}7\T폎NO0tͰL[[끪yhW :Pe59MY,P(tK8xɲLIam!BP鐙a1) (jqKGaGfSdY ⱷzkrrr0,\7߶[-ewW7|ЦQ9ue A f A}`C3Bf>^R~eEQ vZZVlaz6wzƌ1m|NapwwBjӞfvs6w4Z%Q\n}m}]Nvi.*-@' ahθYia,dk0etvu6c9"R_^n,ˢ(657k_-f㦢丸8:c4^̌h D:^?FQojj֟?p}^t!n744JO*)4MIaYVz^kw1sf3&;lϝS[XqA06limkZ7n|ɧ~a^|ŋ9F< iZmm]iYYGG't,ˊ0jlmk# $eX[Z;V$IYDVrA@8VyPm]?`O 뚮R?IU]̙ ðloNJrxܳ϶l-6UԴwtq90XeeBIDǒtrkoiXyMbY,"XƊʽ`Yv\f֭W\vIJR,uuaЩ%UU=PU]gOgg'x}0::ohnia&_Y7$IfAuDaݾcf>l-۽GEͶv]%/y_햛iE !|/n{[ {MC+"a90tحVKH9@@ ٬Tƛ5W^瞟6e-[vŲlvV拯c{=9u!+ Mvힻ\f͆,m &Mm6ܼe 1Ϯa=O=/\w?g^g+Icj')K`UtMu{[=^UUͱ0Ɔ߰qӖm6jߜNMM~g{! yܮkً?_Ss?xpn\fݺgMY6t!dE򕫾+ȘQnRuuuw75%sm>_lcǾ9 `Zy]]O?鬨{֌[-e+VZ{C!./_v]k{}0qqVUGx39kyiSM( BRf:όS_{qwOϨ#>Ɂ6ew%+2Úubnp'K[w(-<וW2!C F)2 ;?8tm;v^}F zcF믾6|Aǟ|A}cF I iڦE7p}\lE.g@vccSgW0qmm~aaA>2O?lA~Yn,\w^}iS&/]|æ_~ /7矽‹9~Jq0"hf0~ຫv{}#23xmݺm_DG=(\&5%y݆ {;JJ6o2h!B1Bw6>f4w޼[oo?nz===>oÆ[^+w5i„l\EyyO>C!a0¸'.6V ϧijrrRsi<@yEE[[j jЎ[cn\}~{CmxvwoZ;b;٬!sAA}NBbwtvu%%&"x7-Vjns1O>Y3f<7ov,х- -B׍Q#Fr u N&:xdnC;zMi꺮i;E=W_|jzn""raNIIf9.))siKW񧟶O?. i_{ͥ_4|0YdIF&'[t:y,+Bc=^beXҒ8fi6dҲꚄ斕֌9eY|ǭis6yrgg;0t8h/Ç`iz (,ͷRXPؓO7?hnWWMdt@# zBx%;vo/?r!֛~ǝ!]BH%Mro2<.k~+.e~ֶ-[Ǐp+W:vag:x6eE4$I?(2BhɲeK-w:avӦLJMMinnyg^}xk@v%]mǎA%^sUVXX8{ֹ?0AhrOo* {0WeU`2 BH{,5%5 ެƦ`(0B_y٥?Lmm]uM/] ?6>6.}צN#!H$7sTUYzRG#l_q?xogV4)$i I&&(Ϛ+عBziS&O0sUE!ЋAg{_LOK;w|=D vÇT1]~?!>~y;vHOOK+S^wobb°!CMA@qdE՘ysk 1׬Zb:Mqۭ99 aۿ} lٺ53#c}o\2 ;kAʪC zİay%{+FYW_s|AyaC;u7x}ÆZڐ*ϯohغ}1lܻ ?//77|֚BǢ+FGo޲1jO Ǝ^oii_u@׍ S[Z[;dg555醑Y][{:/7'1!AUWUUt:iꎦ뵵i4eٚژ۽DUC]unKMNm~px}ؘƼƦ;v\ΡGGE)KKM{X,khHLH4vUUYMMTs̵ֿWVQSpӲk6LQJ tJh.˲i]eYV( A0KR5|1qaG~|O4j: 0 ,XpUW][QUU׷Qڹ >S핣cM߳nPNs` ~! bhJ I$FHeQ-1/!QtPUbg`EQ4gWGH[vL  p,ki>=迪$+ ifZyAu]eMq7kXQP X,bȲq} puvuwVjpB``0Hmfzi8B 0,1f˰>tUn8VAI tv'M$HK3z/D{soMQ5b@*0 n،G؜̆~A aƌo6+C7$Y !YV$IF}azWaZM4t$>B;bZT($tA QTU40PBd}E-f%rƏD?? B:f|С1|B(ce Bw~;ff1{#b9N7 X?*cHTunh=j!֭HRlcbw>xǡ1xj[t0sˆ28`4݀@4Ӭ iKӉjP ™ўcYbYumsrfTѡY舘7ŖSk"Ouk6l\'b =j.0!e~{nt5^ .64ҧ6677_z߱Xhwf:p{3mڌ9{gmhyYYmmmϟw׹]O8֣teW">I&C鷒~8N~'-5+Ţ($I,rUU !Z,V)2*Kvf;BJ%+w/V]%IʫEA\rٗ_q?gY[׵i]] Fy,rwwwut#$'?16&UUaZnr+.J&YD BPtT4˲>!J' Fygpj֓ثeKG  8-DǨ*˒< N(uvvqhC ]]7mGiۯccZ[/*ѪU+UUKŗ HՋ.jiiXs΋d@  33{GxOMIX,W^ys/ذiFӁ>}f}C](fႡn۱5;+f%記f鼏}陗^|٩8A>\mIS7nZO֩]br.[q{HLH,]3IIIvwM@0P5X-7pKAA]xwwuvzM\r*$/7oݲkEGҋwtx} /IҺk{rJʚ5==蘉'ssa0:;;>?/!>!!!Qu]Ni3Y8~RJJo*/cX zKAoJ+ "q0 Y B&!yi+88 >0BHtٳ:;;h 靁!dEQl6q,'IC 8'^;cǶyM<5;3ۼ2lll\m]Msss,**zŗO?5d谆zec&X__7gΛظ^, z|ɇ,˦͘~ Oܰq]Uh5+@|\|fFfllE eYeYr oyeٳ.4hӻ9b( 5ŋH=j2a!f?u?>6܉bYclDļ !#0g bB#c/ ux1vo?FoK9{طxxX>&&~#Hp0OyTx\'9USUUe&%IJl(xAD#P(i0nzID "i`@Q*l6EUU9$"&'M4ZZGCb+OuXfz$>>.ձt}&{sYt|~ $kBk1Mxiolw,Io?vtӶd7p4A'+7t' K}c,iF?!o$S7 ^@D;p?oFKKKLL vtv&&$6fN/0n cs:f!c|ժIu6$'%qp8eY OZQO[[뉉 qօB!A2,a:I)˲2[uw2 c^9̟A+sW1fgefޞ~!}L ], }Eu q, I=ޞ8B˲]c;*4Za„}dI8+?{!1Vt8~+7teY|00Q77cA~4v=tWBei1 K_90Xx< ttt쯪r:Y;Z@wqGrr2:]􌭪>{×\xj̤Q f1~'2BϽfݽE_{`[_zP(twu' dEۺ6mYBi%kKVUU͠6ĬV31}?~tgIIyEeSsQ#Y7֬/'+fA%Yv͵m\[o͞5~7ޞSQQ9j~3!d1~MJL ]r޺䤖ēmm+Ve9))͂1nlli,_1j."aAs<Ni֭#߸yN F nX61"!j#puMn{{sPa!B#~v?_su\}ɼ;om`ac#<ӯ0?LVf^3lȐƢ⌴# Kʺ^>lhSSsWwwrRҲƦ(9gEF|\K7~*=^( 6m)u7Ξ1#%%\ɾnݰis~^.BraC PZ\ObbiS[Z[-_`y1199u +3z.Z;y҄ܜu6fgfN8~5a۰3;<wZjjMm](,_v]MmYnݶ7:؅x}rlZ_߀1h# DUUW;?TZj*}W^{iαlCc(i2Fp#JǕ?tuV awvu[ /fVxݻ[o[~+_ǿuƍ6Uu!fo.\nc4M#!K;;BPBPSS3-oi={OEE~?BoXvv_IY:tEU>t=E[}ŷygU=m[nO}CCH BS>!a$Iuu]w?`ͺuI=s?l݆[9Ʀ&⫯w?3e{c7*JOYߏ<"i쉧#VTV}z^x`0jj]}S>WZVlŊKk K-w:d^rܷoum͟=.^746nٺ5 ݷoVϮr]NADQmG0`M_3 %9v>xР.8n]BEQN}{~_Kk;rss f,x?z^-X-1G3穚xu^~%]Wjmk۷o?+zС55YID[ne\tW$'%]q٥ ^~ܻfcGKNl_~u%z}yFG[}23a `p<֌W_ueVf*rGg,ˣGʤmq!mvכzY uu>gfff8w@vc33N۽t Y;:Jv|fffd\wn~.܌yaY0tTxŗ[ZDQ;xXzNQ332/ҤDܻ`0:s--P9 BJ_%a$\F;+$I)9}zbBBm]˲!I2㉏`y}򉼜ʽDQl;wD8s[ Yikkooof&:zw5}TM!m;v1 (9l+xaP_ $ICAMT]3U" èohuF0uCUT]ף=QgIO>(ca~_1}YH$I!eY&oo<ԓit&'%)@577뺑s.BHyEEvVV0 _(6ߠ;AtUh& !TU0 3>;f;ͯGXXp?c箿Ąܜ??۾cypttv&x<#S50 MBZdAS'MCϿrCcciYYUuys /B݆1d rL7n)v?wb8|xznt覢A{VTV2?tCdYw8κ~Eݷ?6&fs[;v401!!TRZEٱsר#B,.3mQ++<‚|ڐ*Ie˶n۱z͚_nzca\zE D{p }LqkjjΛZ:yĽ{ήg_xqEC;w?pђ%ugwOOeӦ!rrnݰiS{GǰCߜ3ҋ/6y~x]Lx{~{'zkku %7߾]0{vvVf}7}?瞛6ǎ5bKn۱CU!o߹s=݁@`ܘ1[o=rdttO7v%Koܴ94pѣ\ 6l|e痕>u*q8;W/(ނ_wxF)U!0B 3|(916ӷh1-ZE[l1woXK!d>0f!UUm,+}Xc7zw}4#m@U fC,tZW%I6B!AW&@0 r'e륏u]zF8S|cN8P(/;jo̲)@Dl}]T꽄>Ζ !D ny%NTmnn^~] /}L~G?uB7 }pYw{0 p;d˖-?6GUUU CC,0TU^k A}فfZ#;945/9c?=u:$s:,h(9y\a<aΞA(wY~ tf̩6B64|GWj9'IAwo[E3h'N߽ៅNF_4~л;qg_ B4Audb{~㒋.ϖ,[{{g~~Ӎ)miiÇEoVrN+W9s:Ke+V.8?-5U5ԗDB .lw^}Cc}}qc+*+*nشiܘ B;KJm1lȐ#tFyUUu:AN37t]7t~ 7zhßc w4ϐ~9| y姇qbf==|oo舳f_PcD+1sec;E/=+.G;|>rPn9^%q,(ܸ}=pՔ쀤>(>{ExCy_+zxvU3ߎ~,uuw;>f" hko B;KJȣm<䖭ۊ_x(\v76AYȣk֯G 6Y O=־e붷q]g+rcS3=t8y۶?K.#OQr>i*Ϩ#bOu)_rɸ=u]OŇ>aڷe!E˧l(RXPpENb /8afb ?vX>|ذP(q "ZD=7M;:6/M,pe+Vxg5sƦ-[֭ߐO7nޜ{YтbcbVǽ{O˯^xŪUƎ7ߔD3 ߼3[oomkۿj͚ڂcF/\xW_AV_I-[F><}˾}{l+45>q?.Լ#[#cF:UL:b;) 9tzN+VZtyZ5$HlZС9].zCvBٯcL۟Vk-q B!!itZ9 99 ,Ft:q i [RUuGdY D cdտսD)!aAԛ8Dz/azw-˼($V5;n,qʟ;J0x7ڐIF}#N&|,cT9g颍M+W̼S32ҷnnZ s `X&593x = /pݱ݃*)-YRrO?agef"hDyIc.[f#~t5yҘI`t-or:B_sn!dOS'|L0~܄P8Y(l !k3*C>|gT]@"~8 @"~8 @"~8 @"~8 @"~8 @"~8 @"~8 @"~8 @"~8 @"~8 @"~8 @"~8 @"~8 @"~8 @"~8 @"~8 @"~8 @"~8 @"~8 @"~8 @"~8 @"~8 @"~8 @"~8 @"~8 @"~8 @"~8 @"~8 @"~8 @"~8 @"~8 @"~8 @"~8 @"~8 @"~8 @"~8 @"~8 @"~8 @"~8 @"~8 @"~8 @"~8 @"~8 @"~8 @"~8 @"~8 @"~8 @"~8 @"~8 @"~8 @"~8 @"No'8P1ƧHN,3s"`@ `YɲE?! Ȳ0TN,9USFQTETc92,~GA''#I"!D81˰ @F 1fYmTuЉ"!yD3|Nu ~h4^VdZ?dY.1!!l:a[$ĈK`; ~z0ƍ͍65-%0 b7# "FX֮.Пa䜄m$'&546!DR%I B83 t7~8 8 !膁1Ba'*AAo#9y/'sB? Lr߾ֶ6:~61=./]JI}76`w(+Jvɲ\PuƦnEQu]?x!#!qB7 0 C7bcc'w斖! 2p躞l H4tȰήΎ@SKӡ6oC%UT86 <Օr8%Yy1fgFyF)B5C(<BDAI::;, ˆ BD41F`PQUݺc;˲0 C$IR cs2hЀ!O ##=}ʄI"w{yyv12**:**0{$0 #5|DB\ctCW9 #y1XU6obRSRt]ohlXi(33߿mvMY,,v'546J``PawBq*nH(۳;)!nW4h* BtTA$&::1>nq,˲ў(aq0ɇaB׮];l0 `>Y,KwUy@VEEQUr1beYeXUS cBQwz !(*-E }%]M/p TUW[/f$\90v90Au:-aB2okk ̌-Cdj1ޤ[$q,++(6 sN[oMLL /Xŗ_}}cQQ0]^>n˥뺮vFrmZ9kni)*:rpIx<Qait!6m˶mϿ2lIKMonaja._1l(a p:qq-,vMEY1FV/;Y0??66bN:nl8nZYu8,<|ں![-N rv(;v\a)Eupv鰮8ͱ,?s/|5~ǎի.)R((X>eі⤤?tyg)O**+ssrBbkVִk>d8-5pZaeoǿlǽ|媥+Vp[o˲Գ*-ADg_|IUʽ{P0/tJԳ+q`ynŧ}[,`0sϫnt]>۳ ;665Q5MܻOyB cEQ~:^6eo.Z,&:g󾘿h2Q`(c']e;KJl /,)u탏>˯BRh׮[aӢ%KdY~w*ykλ)oyjg,I^ώ9ٹ+UZhKlLFJwwwFzs 曻KJzΚ:YY_{ͨ#t  8ST55%g;W] 64UW_1]0r%KZ;:;hyNw Ñ3|>ظÆ~gMMg͜'dY6d|?BCohس"Zl}_35u{ ƏKJLppm,K.8aù\q٥o5g9Bo^GG猩ӆ 񧟆BA023u]| 7[srdgefDEy p\Ve@v6A(=-rbW_U{+VZjh\8{6 NZVVfZZʾ~ィkvUTTԏN#kYİ,@r};KK?fcF4Qu]WUUE]UyB)2W.( MEc,˲fe< XZՊе![BPtjƲ,] M*8Ny n nS$ }@0$I"YA{ahp: ܹ >~a]S%A%˗_qaBiE48 ҈ hz;Mt $Bm +~?},˴[@ d3<*VH+K[[UUt@o`=0^~dYFL/Q,<&fّCoF31 f5[Ot;+t+fS4|γ#lH+ f/6tиa>V~OuX:l#2[uNu@fh*6/0\GGǶm 5"0 /%,7%tEXtdate:create2013-09-04T17:02:50-04:00!n%tEXtdate:modify2013-09-04T17:01:29-04:00!tEXtSoftwareShutterc IENDB`selinux-python-3.0/sepolicy/sepolicy/help/transition_from_boolean_2.txt000066400000000000000000000002041356774067000267010ustar00rootroot00000000000000This screen shows you the boolean page with the boolean selected. Enable or disable the boolean to turn on or off the transition. selinux-python-3.0/sepolicy/sepolicy/help/transition_to.png000066400000000000000000001630351356774067000244210ustar00rootroot00000000000000PNG  IHDRj8pgAMA a cHRMz&u0`:pQ<bKGDIDATxWtI`nsZ *Pkd2ZWeVWUW鞮wfu?W}w%3RTɤ֚ AE p>BA*i 1;vLp+//v}eYv$D"|'Bd2鑑bZyy͛t8wZ>D"H$.T*}U;vDkk2MӰ,N 'H$[FA*ɓ'4`iyH$Dr , Án_i3MS%D"cM,ŸD"H$6 D"H$q ^+|_"z! hq!Ulc߆Se-]N~u71DrwQ ]@A6%O`&NE&!H6&vlR4>En B`&i pr:5,`XxÉn蘦J׊3Y>/bZ("zᓧug?|çNn0Mys_|e`Y'εQ!WmE!( i"@@W0Mϙ?iVUOyNQA`YLLL O< }C"/(TP S%|w?k[~Ac]{r$,̼cw*&w/!X6X һ ?4Ldbs8{" 5i`Ǟ\4"21ѱ٬N:!SVbpd| ?8D:AQKKp L46 ä$TN mGh5+xǨM,K~`&%%Tr9,dLFclݵEUX- b}cUW?_ UUHVU~R|;?S\a| Wd᣼TyY.]!NS_Sͮ!4Utc#esm#4?fh$$Bgfx<@˲0M%'tt`;h<nvG4MUd,3=L:aރF# Üj#0?-40C$ɽeY,n(~lbɂubqc1,ƺ'Ν3=r?krnkۅ8v Y]nϏ? >| 1TTӲX|)ŻYѺ+y{/x0xxjV-m&=}j${<5,b ς/| !¥Nj*+7m1aY5˖`p:fnݎnvPMHt\at,e3Add*Yd1i0p G" dzh11'0ixhjs;؀n$ qU+,/_r|B!t]GQl6 Ӊnr'T_OYI0lD&& f4 XOI0PAԜH$jGx~&vUˋr d\ų='_|I>g&6?x"m|^^/ q >%v-odQK3 Op^sqaZ>tY`>ir9{=^+*,JKB(+ ]I%XѺϿKGeF"To$S).'.P_:H%_1R^zj }eeM w^kɒ%WH$Ǵ,2,Tݎۙ :Owl3|K<ծ*iaid:"ȝoi`YYTE/8vR pZE:fs|C@7 v;ut(6\:N Eel4qدNoYۼWpOM%ay: ױi*b$*f+6,b;s4YƺZwqc~C&X0>0n\AL"_Xn*lMسnF<~tBN/=ƺfnukL9gYr9M umvj*בH$_ID"eYWWX{ѿU>oq1$oM"Lf]3ݖ H$>r|_"H$b_"ߥݔ|ca.\0eg.`%TU%Liq"_x,L@TUV:dYn'L208@d#?ĥ.&&'1 ϶m'Jj[6?F2dϾdiB[ߌ:cL/ɰ!ε|;v208H]M MMG}>Fa'~jky`ܳ!&QG8~'O&wB8ǟ|_f8y^'|44FJB;f^ s\NfdQ\yۇfcRZZGCTWW$ &Q6[%޳ή.jkټiB8i((Ӷ,[M0䩉\! Jsח\ꢱ}px/vI"bڵ.^4mp_fih@(!Б#8y*W?Ď/vG384>@we({eps! ٽo#8].Rܳ8q$xq8Ӟ(h6힙I2DQLtS_Wa$ a&0eXDcQ(Pf#00 UUx\FFGH]nBJyf2D#F~>)ni6'lHJKR$YJʗΘ8NT3hW_{jjjp\ŃBٹKyIN>KuUqz"9{UU9x< gΞ%<6nhP(g[iGgc# `Y&e%%% x`:zz8q$cq:ذ~&s9~?KZ[47፷ߡE RZZ[DrGBPRR¹6nA:WoIMu5/Ǚ/~:55LNNr/[a/q88t%ػ?U۬Z:B%iq+Y=K$*?|+;2_ #LRWWv|ؽw/`SOC7 |򝘜 ]B?s;_t1P^QΛoÒVεO$h'L,sl6V\IGg'\tkVSQQS Øf+5Mtxp:$T bD"FãT p"Փf)+-q\NMsawphz\.@QzzzAQut8EoBcxx~ɧ  rq b2lCCDcq*Yf ֯RgL8( ]ձb267:.s98PZRBc} iYtuut6[ǢE Յ̢̛q8mv{iw ]6UrsXEEy9o~JcC=_P_R^^~]Lwa4c`YܵD"ukٰnp1\N'׮aúO3>>H$ /_&tH$\hos &''̛;Iii ?Sgp)2UƩgP*<sQFEYQ^^E 9t(x {{Yh!]ݴ.ZիY`>PUE p|Epi<󚛱fqOsOfq:.Uvx"΅ 1y.6 2qI Ma&0iiۯY"|^?X ұ58#aMwz2B@2|?CKƈboogϾTWyٳ:۶ E6_G*flݱ ***#Ɔ6=0m@_'Of~ @7 C\h4JYY) Б#Dǯ2N3f7t8q:y{n<r3^ -]SOlh,ƒŋQUC\e ])--a8y dʊJ*Y0'6ofVTM%ٽo?###,Y.H$xj?@Ӝ9̝'ٺ}gΜc`Y躎n x'I&|mlh \Skh6h}>躎"%+6EUy}x^y}m8 UQʊJ|^.GI$"vG. **hX,n'Q5t*M8t2>>N2d|b 0E 0``` wi20-8Tɉ\^6?4By.-rqKWPm7Os\ C' SS]zx\7^֬YCIdRVUuZfqSJKKBkn=ƿ6iӢ@MN i Ø5};?Zr)(.x~+L۞:Wp0 LW.ЯO!mݙ:PU)n!Xn\L4_%(S19Se@20<@ueTuZ. \hMS1y)4N=( ;Q3^Mvcd8~Fd2l6NzV/vN$h4a]n\nx˅aqnwX,x<l6xyNBΤ@Cv#;.~Fa::b)/ĺzBڮ?s]QUP08:NsfV~lی7#Wygֽjzv,1|\7,֕|3uBayQ˲KJJyd,ozܞkX r  7̳G!'%w\g!Hg0>1a|'7deYTW8b+ҥ.^|%{(Lۙj|oSwׯ՟0^GK4iblTTTqqGqZ>ftW֊̷ hWɷͽN?\Vv^k_UP5FDn%OBYh1 ,6)wܳh[B_Baw-zԱ(F躞Ąrw{#x/%} nYv ÐPHP0 Ϗ$5LNNLZ!ro_w]ۅ(TWΤ|ofziυ}5hxDf$ozVҲY=F +][\:uvý` A}^˛w{C 3!${߲J)+fto̅tk󼙲H$:?J2Ѝ{'8N@1P^TS{kJ$enY!0<<,{b<5N6H$W~!tMӦm!\t:$Dszep8> {dUJ$q"hRg$E"mpkԕpPB I$mϦL!"IS^楤#KK*q}Hu MJ$R4ef1ܞ᪪'MߥKB +u vѓ\i/h%x9<|!3?$6P4h7ߢSc,ne4"LaNsZ|q~A^u,]Sg/[(O,Xk}eY/H$ rH$^6H/?cӣb2Dc1݌f4fCdc1mc%|V.Sw"\FpK$BL8|(`E :}Á(_܅ d\.'> z+/ PYQk{EQC"04ia;q:b\$:-($d~^E"H !p8\.4F&!pXl{/ $[Zسw7Gu֯Yˊk[z:S9v*jK8sN‰P’~BX2O"Hnӂ>7=JC]0<2 B`Yz"ʥuEyY/eev1MïS,^Μ 1Kp9plAw!]Dr{("@f>POQlR9 464s<70 .PGbJt?PS?lz5ən,eCvN뿚((?i%#k-\3::JiIIq_<'Lr| v;Ôb4&S]U4BP[S{U]A2apdT:ع~v@&昦K(+I$-@A[[_SM]|g|*i4Q!@QY ’X>~?o+GŎK/H$֥6gLjy9e7Zuj{2M_NNɓK$m[e%D"{q]#[Ŕ}dV p$7H9.BO H$WQ֒[Zs"AXV'fXfФoC7u aqSE aͭ8mTҒoL2mp3̒ 5)yv^W.}\ fqr4-!k\dum_-vɷan!1.cZ&0Tʊ;-]5 $ jkwZNwQJ}|Te<ҋtr}~!L͆r-C e^gI 2T*iHGwMӰ, 0׼;LMdpw EQhPw* y{RWP,[luN^_Mfd\Sf2X8 4Ml6M_̲,t]ͼ8_g>]Ig2mll7/#@Q,*}Uf0 2Lqcxll.J9r-RQ^>:L< wUVV6DUUq8ӌZO߲xNsg ! oޢK] QYQ~yS P:ǃeYٷ4 +1ӼSy㭷ؾc';g`Z& Ӕ첋 AKŗzE"4 Ɖ|Zo&Ÿ(8xٳ>zOeEE坚X knItvu3[8,\ W|:Uc&;؅eA*0 <;:8q$ q3y(/?r78i-<϶mҥK);:?omtthߏay枽J"~sJJJ(-)vlN'7~ B7,.Stvup)9 D"ٽg/:m|o?xӧM\I^*pP 1<2ZZ?7o˩3g8u 55tk:1eqRT膁$Nu:XtYGFGywijll!H[oQWSKyyY1M*^+B}8vMզb"O>a`p:jFE"E"Xfc|b8ۦ/wp @( `aQ0#<6no6%%n"|>.&&'l(##"\΢,?h_} d2" bvppxb~|b~,6h0xwPU`O,GQJBbJ^1_/L&3\=F*?˖.$LF8"a,>L,kSEy9=}}\rdl|'<}*'&ů_GUUL:tvusPZR2}u>?*X, ]a~MUfG\x` ŋI& ܌X,F84MnM1PS]őclj'E:p2:y)- qSBNi.q'OaՊ8i y㭷) q{p:v2 a\M=?e&#ȹ/( ]xnyNzMp~ƛTUU8p >E\pI~?NKZYh!}!x1o\_h4M>?]QX,ζ;l\.^~y~D9 '!p8pr^ZIE啗^`Dqݯ?ů|X,Jyy?4Oawp9/ |?CΟg|^BpB{Q6Ã7SzB`vd:+?ga1{^\.'kVRgЃCC(Eovqs= 8}Lmm ,bGDMxy Q__}L0MM>zͥίf4g>P>ɅB ge?3::;LAJyÏY^g\ncc3O=Ş}؅^zyr7:;QB"=q9:.u<3={^n!:I%Kÿ͏QQ^72۶&_u55|m;j ~Q֩jBb:.]uq+,'?Wmi3Amm [(W5kS>?L?=z`# /X,Ƽygڽ}鿢awSWai2dtV4b\jx^/LHS^S|PݜgiF> 0JJBˬX˖X_Or]K/]"H&fnss{J|R4~e]wuM8m\.k?iK/ĩS<=n7/*= t:|8NtC/6.M2,X*O⷟|(*?@.B} sۅN: MU|m"~_qvp'O?/(JNn-έB7ئue^ \7ϟsY{CʥRZz%VZv-7a`&fCS8W]&VIߩT*(Bɿ׺ .B&b ~yAJK^&p8šU0ە߱*EQ\6V1f0.{MSqJݡߕ` nU M$$IRTf3uI" Sq_ Ȥ3WK]~ګ8vʍݜik#111s<ǿ]ws9N q9>߶C罹Ϸo,_4Ec*vχ?-ie6>'Bcc#M p!gpEnNLwOAʥiZmNgTдPk``#ǎLp:sZ`zin8r8veKZv'JSUQ0 45WI֬f(4y{W7MUj8v~9>0uWUb1'&xʹJJJ0 >S@@0`GslێiY,^<,+`7O\yN$I_UU>z?Rε_3޻I"~g[O?eV7ާr˗-pH$fzinjwGQTlF(bIb}p:oێqyM׿t]Gݵt8q nwR(ar[ヌ( {grʳ;v>r"q,o==!(+-_df~}իV^܄x6'sE˩ZPP4~?v摇"Յ+éS ata$ITUͽKSR.0d2?4*4ϋZnjn+?T5.PN/IIIŋf2$,ff4F(Q!ibrC9p%M+W6bN6_O&wvfF'ղnj~?<$u6> ɵ{.\8-pf`hdw xL6K( JOٳo?cc֯[CUE~/)+)aѢTUz b~l6[~xD2AeE޾~TU H$LFcLp:l6FaL,F{ONF ҙ4@`BbI Ͻ\084D,xHg2}>,"v"PQQc|bGV \-nR9״ 2>~<'Y~qn||Ӂ4kfd}>"x^3V_bX/_# #AYi)t`dt4uk$B7.P(H$2^fӨ(/v+Ѷi7bUk eAߴJJ< 댆Ü>sϷm畗^Z~_108o2'E[ 1:_L6K04gG(+-).&LRYQ^ X䂲ʦC'IehBzC~~?avq:}  1>>NEyUUD"\n7100rL&)--e,a||PP(u󬮮*ʛdD D"UQ^N<`xx~?ᱱiךD.=$rt:DQH,/+>NOo/T CyY9##$) [!04E(B90njd xP0Xh8=fdd*2,#8v*zeYLLNb9/D:o à]xodpE]ǿLTU-=4A$**N B`nAdbݎd| r9 LFb1 歫B:.&#E夬t:l;89Aee%@h֩3Bf7]fYOsLE>FQ^x;F/KXz5FX+*yB+lV A_% 93ϖ~~>2=eYWU]L#~p, u%3Ky3kvW?+'|mM8l/1[o3Mˋ y O-wpwr6{|fqk5*ۍ7Cמ{=[pr]KEM_Kyֳ̳)laaҭ^XHx3źQ؅B*.Qu|pMg4[&W~\K!ҙ KozxB$ٙ.jVۅL6ϛzWֆfƢŇdH$شJkrDrK9_ ]滩gI/޻ܪg( Ȕvw d/t>"7-\vUVVM$`Kna=ѿO(24Mǯ9ܔf,ˢҲx D"z,^N!r à3 hp:KH&02:E4&&I$= p<`͆aU2M,B"&&q9]TW0$<:ii3O?cٷR</$SIJzsM$|>8R]]C4:(6*j$IFF,+7ۢۃDurPW߀]]i!V_l6۴: 㔖bYccc>s\Yq9]>{A!xYJp:̟AL,O>QZZbq>Ғb9E! Xp&pb;Οaw`Z&kVeht&7$=TK:`Μ&L$LvQRRB4a>Ii.z\cβ,N5~t N*G188X/.f)N'5յ\h?σ0 Ǽ-RIG)F TUUH9vxF,vsO,;bLvqf#*r *FQp;Z(BbJyQbmmgĺQTzy9̃'al,̡F<)^x%8].lƥK1-?@ M~4Tҙ4/к{bG;r*֬ZMx'ׇGQUzz.f:ZxGXb##äR6oټvkQW[Geenk3:2¥Kl\TSK[^bn<, -YC>L $p#QZRʳO?%hk;K:2#G6N-u I!7DLL{D#=z 558Nv…;ᑜ0M32226Fp%n"׈ 0 cΘa`Z&[Xv, ]EAiic1zE@Ueյ|>lFCC##C?mC?,XʊJplT,,Z,/7#h+K6M$TdΜ&R_@s\Qlv; ^ukc)/+/d28yK a\pKC}LsOI&TVTRQQ9h4u|4ܴn# IcYCaAaa \.P!D1 g|bE(b1}|. b,7U>]ױiWܰiS)t=3?0 YM,Ζ(`Y% FUiyf\Et:j_"JC"@T+h,,W(USQB6)SK!ضPTME yg U!NUUB{6#0td*e:Z`ȝg躞lLp ]"ٳNngŲd.v\ǟf8|P1L 0zkYWT &ԩt&3B\e5> tN%jS)(x<{r+fk̖nlkShF.f75B~5 ]kDr+=M?~]bZ圹˨zUzmJz *UH%٧3 RW[V;xXT*EEyK-S xX58uu{4LLs &&ƙDL糬۶Q).mm-, z$lc{ϗl@7?A/iQ]U͉S'tq{H6Q^^G)Xɓ'p<n3gOJ%U=Υ>EGމ!|w_";&=GD}]`;BPS[et_btt0xUӈbEPS]˪:FFYt]EGXdsqR>\"|^;Dr}f5`&'ORgB֮^e ŢRZZ`2+D2%K9ztl6v;nʊJjk8}CCDY{H$8 K$w ~ΆuH$@th]Ǎ`SUU5ō-(eu)58"c444{<^mҥR$˨Ji%{ ;Dr0\%%%ϋPQ^׽Hc_zAFV_ម%%{MɕH${K${xH[s7#Pr%ɵ%-Dr+Y[Y1"WA 3vҧ3il8P ydz^jl_nG鿋aS+fZ8tT4"J Ofq6, .Tm&IḨydz^jN8m]"L/L ܚɿ]k#~_[ hmWHU&BL j6~GZيi;*SeQX&hī!eS˦zq"pNǮPIWH+Bn37Ц53\Cf31Cۭ%~s,eS0*Q{\A;- `Y~wz^չLMri$}[ٱ, x~yMp?ɉ ]TM;a]RJ]ȎeryY^毷yaʚ w%XV碵ƅ>aAM^YL(< \&1̵`iU nJ<*=5|E$;iASW>93blMոyO*kbZB^ZDJ'{W]G-scaKT '{"ߩuˮB^ϜO|#U zyia4vUF08%Ͳ3"DBô,wĈ RΰatPWpLqxdh=ދ1ֹht1fA5.'~p,[شD3U:Ȳԫy, 3n R9gEJGQ,uм+zf_Gh!W yp!`ZPըwpob 2Yd*7u*|#x /.y!TIDPBu H`$MEVԻQ@Mt"6qhMt&S:Y² 2LRY ""ע*.G%d$6LnӹJ2z$3&K NddÌ x:W g Nޡ 욠<ˑ8Y=WK x;C Nf xk He 2D?єyS5Da={TEM83r.rfʼn)tiLډ]|%T1K奕!>9=$- щ <"$&~Ḭ`4s*ζI'p])4Gy M<$@d`w{јKL݆;%LU7\];s3g)Ꜧ2/,2[)j)s>y^Z*dtbO+L& &UxyPV69۟d248ѓ`+zf$i?W<~@lc0oS_yտ U7-d̢0434#,#QӲP'{+Dnop" Nw8p!`,n08e83!{2' FY&m) $Hqv E"m3,F3sy,CXD CiRI2}\7%6db!LFuFbY't.$ &ņDr?" 6gO%rsp"KO$WOYz2 's Ҝ+S Nds:uڇd Dd437\=ϐ̚D2N鈞 Ǯ萡'u )3 EFr:[ Y%w˂rFs b)*UXd,r߱b& ;v%@ϴDVR Sp|ݭ܂B0Mk KJ/hZW#S>dC->V6d+xZbuZpk6U2̢$;BNu"}+&Qݘ Ԩt(i]1yV8X% }7pL eR,%Υ+s 0uтR̒uEBથoe=}s>y!2~)B`b1NJoFza:/b,Ϸmc3i9KǥK%ysfe2t]fd2;]le``}bFaek_)Dr/0 !p8?0ǟ|Boon42vn|#M,t:i\C5ecl6i[G ˲d2eaYaLˣێ/v'NSZ|>dp>{_L0f3iDQ8k^/uU~Oͣp|(K׬SedAy`=_O<|hKGz 2϶n0 ~?\#w s˖]u 8t0;w}<3`Νҋ|g/@ @]Tw!V._SO>^Y-HqQ;}g%rfchxG~*~ɧh>o;1-|@ p,O?t:G^5_u]yx.;YhK,i淴 >zlR8c O ]$bIbV,[SOln %eQ]UO~#.''Ob̛Nj=%̛C<3<2Jo?O=D>})iG,Z˺z/[oSS]{b&ӧOdI+ѣ|m[QϬY U.N+/e<^zM1kp磮j,ˢ`I.0k~;OOOm0 zX`> _)(!hl燯ƩS󭨊B狀2Ft\꤮ϋ" ,߂v}N($DmMM!Hn CR]U}4͙CII )TAEy9Kvj:C˼yf$p~,Ӥź5k8s,s````p\L3!( %>`mHn mabZ&BJY`>. IgW7shoȥNV,_UPUŋ}I}]-NKm;M]xa4]_&SZbTT3e'Oy<5;qBo's!X|e>rv/|E,bolzJKJػ?XEoova]EQnLӠ[8z8(B`h][(+-i*+ ֭ 9wgβpNFGzPbY&-s2?#H&W_{=ŃB^sviGUUp\14B~D"H#H$>B~D"H#~˲8z8]$ 8@4r~e:>3g/~d=vh,vfY?˭9%ŋ-q |cYgϝVo'K5 /LLLuǎ޲d)~ 'N*Vd2oyћ7Hֻwot};]|䮦"o};.]⃏>.9} uO>Sn{9f, L/6q9!By}Xjk׬/EQx|3uMD"f%oix1/S=}8taxd2lzarJKJX`>UwJ$w7nx!>B]m-e.^DUU%ee4͙CӜF/_f}4sI>3>ߺl(UUqb׿p066[K(vmFEE9O?O?Ɖر󋢞o4jk(//cŷm22kp_ue%Ms B{;son!m0 εvj֯]˼sp9syM<#\hH2իVhBε(&ܸ;:BuηO)J6avjZ[34<£?/Uת+OS"G*VZfR TUU~Z46R]UE܌Z<͛6qIN9˚UXbUU\3:."I(gcܹ_`hhsm㴝?_3-]5is4RUUņpwJ$7ŬKȶ0-!s0M-=ͦQZRB*͛#475UURQ^F(bnS3S̝یttvq N9Cs]ihh>zl~ [BP_W0'NnnjgΞ{!tt\bAK [L*"< IRljb2fܜ/k=qTtI+G̹s219󩨨*˩W"+dhƂ-SiB K[[' 1~ tuur_|X$ByY/<,[184ęBX=>r~Y‚9u ݗ)-)AQ&Q~" IvjYN199IsS.`ph'Op8q8l۱zz{q:,[T2--pJwb&$IGFUU4!^ukc)/+Ls麎vƞ)Ϭi, eβinos%ɭg]Uꛭ7n47g$]"ٳX4ΊeKd3\I?<ϬS(Oi%ۏnbۯfͤ-4r[^Dr׳zJDwi%]pi1$҇%H$}4D"GH/H$}4D"GH/H$}4oYݗr{w\$Ji9U rODNrW#jb^e100.DrOpU?3T}_wR)_~FgW7Ku%P:X; ޴<_%^70 x`={<|w÷3eHBԖ-[o/WF4+cYRg'ژ2ok p!v;7'qrkVE d񢅜>sinnbҥY3eŲeVK3|o c|oDzDf{o IIITF嫻̼7ΞGٳ3uiSS(P"e(Q {o3қ#A@URC {7nwu6[ҍ>-O'}5Ws1N:MqqyeG?⍷"f^wYg8v5(B{G:U7\bxx)6mkҥD/$`(KF.sؼio_g]w1==NCQĕ#02:JSK kWg6ew1::(REf_[Tn D(–3g)ꇢSb(H7d;8q4333 I?y#k4KWZ,L06>};wwtœ?Fk[A͊jI#GQ[[g]XĒJJ(.*fHD]}c 32:祪P(˞<(غe3O>֮ҕFrr7B]`UL?|>]dffSOjEswgff r u}bD"|>=͖DSsK<#OݻCFF:|xY֮Y00*P(N,,b6'zQ`J^b{z|3f_+huZg&/7VCJ03a``t4NjxPTIY$:))ԮB(q8232vםܻcyy &рNgllPQU'j52-DHn6g}o-7GWVVpȠf8yϓdeHMM]KDFF-eIDAT4r9EMٳvh4$_$IkR^$I Y+2 Nᦷv%Eh5/J"Anz$S p_An#" mD~AA/ E3=H;? еVjTUeffHGADQ@b/ nn ‚*}!/XƦ&ggzF+ _E|>ߍ. RZZx̲75塵=񺳫ϵo{9]_fA:X0W$I8GʑcǸcF*+顣 ހb(IV&PU~[ZaBCz~?]m6&&&泥P(n'F.ձnN[?˿Fq8$Y7%^9^o=5fミw>҈bWfpxFKC!mJgW7/_QZRh[^Ʀ&&']z`f184DsK+b$l F|p{#-55S y_4ONv6?wE}%?pw_184DA~>V /λ k*_j=5?0źzJi뿦 uudfd03;## pB23oRn9$16>AgWm>%+띥a^{}eeSOw> pKH$=o`U+WRlnΝwI4/Ljj >>^y y FehpK $=’3Yܜ\ܼVSpOMt:hljfl|шdee< ,Slڸ')('?}!֤$~bUܳ{;;9"O?%ssk\jee|gXQ]}DpQURwx=LLLpƍx}>o>+ع};G ;+?ɏ9|(:VeM<Ѓx% sY*pG~w?ufٷ޾>D;iyFwA /yf7UeLF#ڹn+NGFZkWf搞FqQ{|p(>lh4Ly<*Z^b3=33hBeZ NreQUY71Q#kPxF{ ­AUe)+ij!<v;Yfff IHį s<^/PU @(B"ޫ(1fl޴d EQb13;;K(Fp8fEEt&YA>**`4j4A<#Gnf ϋF"\HMuؓiljfhxp$BA^Jc#1%^˲Lr#ǎqH$`~ZiĩSOLcuTs*G4׭Ï>Ï>wtPY^N S8S^}[$lܸ>4-jWR흝TUT G;i`hd2;F}CcԮ7ht2\nldbrݎ*=~|tvwFXv-]2;를\3_7>{gF(ҕ+wvRQV,v٭ؾOd2&fff%ےd\LO`'c0F"f۳^FV@ Ļ|>?V& a6Z,zD‘jpb1ffg-L_ HP(b?L:N$LOcX'AFz:^/& J(d4 .p$@IJJ( Vߏ{j N@.lg OpRl6aZ|2+~FFrܜY]p$LgWgtKII l6l6[nn߰>[ᚧ Â6vjJʂu:ki4E tx5Юr&#fҒvj^zzlNg6^j׭g2 NFWYQXEA/M/+3Sw3>>r2A)ttv;~FFG?oQU7~..~\_fA:X,KYU˿q rssp:nf^0LD"&']Jjj kf[.q[ZZskLyeelv''55<tvu޽H?LJq*)N'e+t[{;y@Gg6U?G@PR\g;--}{`bbd{2h5{ș瘝RVZ˯(tqzCΞ@r)rsr㹧B%6O]}Nǿ˿ ;+kA{z{XWOk{;:G~H-V$Y}g5=ƹoZimoàדo os@'[شh;innEQbln23xenzq;FuUW+Dh|;=HĪ5zTqY?u5kVSO?0m ܍b!rO,⧄a‘tOqI~ # p8Bt:w_ԙdef`;=ܹe =K\%!&']ͿwYY _O),(;l]0?gfv{z(,(kIOKdvFo~Gqq>zqfff_%<8u3gϳ uIq:t 9Y|;ߦuTӡ* `=9Y 7η~N#َbEUUBdO?YY<Ӭ]xsxoMUU }<Þ$+|8v䗿-]hZv;6[wn̥+W8u 6s;y>^}>?Zm<ȧۈ'X,XF#VUU$IX-, fX,F,#2w! 2:Im`c4Z̨G\m^IjJ ~@ `s Q^OmM o.w2>рN# 0<0 F z=.Xw,`0 !-( >s&Iwmʻ)N'Hg2114r r-^袺 ,#2Ix8z^Y$FZR\A' RQ^Nk[;^ MֳCCTWU"dY#Ksیo[edINCIa/]Fe ?%%>v p["27/7}:bXeV~_308#>$KymbeM r ~6nXFG9zϞeú4^vĝ7筷fE599}w_)Ueڵ&3t:{nu~zo*1<2BjJ & EQdl|A^^. p)-.^}ߏjIh2HKKE#tuwrOA~^XVlIA@c(1L|>mhZdp\ c6HKMC##ddFmk$Y&dxd͆r]jfK"+3S\- YYnTU%%%!bQHNч"?/B@Vf&3FM("?7ȴgt33cppDQQ!FƖDo_ **i)dee24< gf! !( .&n~_A4M$BJ4evvp8hݪr~+|>EAAu s &&'z;?poɩ3g v(PhB8̤EK }~?`OI>Q( H$ VE]w2˟9.oYx8{<Ϝd6-o~#B! ybdtCG>ÔźzIܳ.N=f'dddpǦ {$YB׳q:jt䐗o}946Qpښ\҈-9$LVraV3>EEEX̖ěF&=-|F#y$''333a'''ߏblݲ2桶ْ(ϧ|l6瓛Mqa!eu:2ͥ ?N~^v{2dKbzzلl&-=R0nIn)&\233lQ\XHVF&\0Milj"##ukְu.{{2@իjYh4J$b6cZ).,dUBa(99F232wvTV=˥T׊(x<5 Ĕ)7=w*ps:r8gΝ?@| -(ۋjs3D׳v%HήN1 7DC&ŸNFW5+$FE _ " —C~AA/ A6"  FDAȂ*'OY:gzFsFFGF~3,{:aA&&'ظƧ4|?DUU.ۻq}` w/ʤGrsP.U oĄݽ *|H$ʥW{=O>ǟZ =I:@k[;ovb}Wຂ G3Rm ퟖY.L#IV?3p$[8kVf۝[ini؉hZz`Vw14< UbΜͽ{SO<Φ x<϶gI}IF[mC[[3<qOM7z-~b&]ttvt80̤lKҕ+BA~{7`~ygyVJKZ-iDe js3%,Wt232(ǞlGeJKK0T~._i3=͔CFz+(BqQe*IV+EE@zZUUH4%%rZb1N>M(Ғb~?==fgv%ccwvxzRnFFGIKMCբ>X4ƚի (,,Ok{;IV+&uLMypZ-Ԭ@#kppSC `|b"F!3#=FڽgcR荨*g;z8gΞ?' |h4Joo/.͉Yz=kWb/r08N3'__ WkݚլZYV+,AD-ᦧjE/_An#" mD~AA/ A6 Jk[["}0j>Fsldt3?2EQZ7p쬗/%2qLe |EW-׿qIٷG}#;q\g~g_TW^el||e/_i 7P M{$$~Awtu)¾ާa2 c%I⾝;hjn7//<?9(kVb ryu'ZpIt8"7ƫ4P]UŕW%JΜ;OA^ att `.f^JJXf5^c'N2rv%'N܅L\lc5q_frrv`ߘ ܄b(ͭ-7%f㞻8{%%%#IPW@]%b¡#Gc*x4<ɥ+WPWgtym.w~{z(,bl"-5N&ZXVRRȲX'K2e4r9m6fX-f3vNgW|xAc8x0ŋf]KJ ygo~h4rĻզf<ũg)'j]2-oR p3YZGIQ5+Vx1z=^07ltvu-kJ^$s.?㞻x-UUE{Y®CђFᑇw>lVbJ]86zHOo/]LLN~+ 1EAQT*Q3=CT9w"d =nW  ӋAov'ʗmήn DrAbxz)WRZZ^Uʬ0塑e.7^IJKIk42f̌ jWPRTjpմwtw=۶a0exxW(*,j`4^Kx Ag}o-7Eabrrdg70W sΞ?OZJ ;߃XBOMM;s֬^q9"(U^YfIJJbUJ~^6[~Ly.TT=J{Gm8TUV,eh" UU9v$ΜHJJJqUUFhZ$IJVz8߻0ϿD"ȲhTU%je3/p3Frܜx\V׳v%Hή?.;^K,M׭j{Z-znAПOu'\DYU^4ǹĻ5Kvm$iɺh>]߆̏ C\:P<]A>ի(G{. יs[AiY,,_ b~AA/ A6"  FDAȂ*czDc1FFG 7 LOO'' 1==`r|7zka'H$B}CL,?9{z{ikoR)6^~uEI719IåˉL{79{ܲesKDfFrݱb65Ԅ^f15塮~uK$+VF&qt:zz{px1;;Kgg}l6hjn!!kd~8{<ɶd\Jc#PH4ʿ'9FjJ ]7Hq:5;;˯YgzZM3 zaccv>-H$/~zVn>)N'xSW_OqQ1%%x8w##LCjj*L8EZUUZZ[kD$]TÑϻjhOAXNwEw]l޴gq8}?yk;(+-%'+{r$Ix?9bffV{C{G'MaANo}eD"LMMxU# ILO]`♞3=0fgFÔg k{z*{zy8TWYjP8˯FQ>ClcrJ#?W^I~۸x)-)bPz* n;^!V\ b!k`əVTUQXP e1jՅ{jLu!>O~[{;>W{j.ܜoͷ$֮Y ?fڵ##ށJ,# vOah v| ~$%UddM"084Dzzcx^,f iz]G_?CCLOO'Ny<]h4|x%т{(mTWU$5%V:s1.աsf232>c'NP^ZJZZG`Ŗ;6SBnN)N'&r23ilʹ X<#8v_ttv2<2B,vJr9q̦ %|I ]n.s{r2EEEx{D:PAn7׮ehx^U4AUU%FNdzlj#zz'grb33ZYKSs {b]=W^T.388nGQU.aB7pVnasYΞ?O4C7{.rEaEuwtPYQ잂>=~i;HKMK,*pNR B>F&`0ĬwɄj]ִX z ,˘a|^{xOSnF"BF1 *& G je@ F`0DEaXFCDN^Kh4pX,F,CFAUta(& ̹=~|ERSR0@~ F#h$B8EIl2!2^/H57%겢(|0aXT@a4?-(z*ۋjss^guJ‘0]KwK`X`x{f Ɯj4Geȱn&&'{utEy*j`.mt:Ng^_r4itFxEwMoApM] ,o23FFOmFq[Re-l0(,(fm" լ&;; / jWb%JMI!5%FCn YAn#" mD~AA/ A6(('nt9#~Hz1w(H#E!|i M# +7DQ3nt9䤋%f{]>zI_?կi|\b$fօ:dddO*(t.~Aٵo-8:508Ԕsoorܹeߏ,_ $$w{Cve # 0 AzqݘMeONrwt1rau!{!))h,(LLLFatlA$I" wp:b% |q]Ko_?h.u\P0^l6XGq =\.g Ųh~Fp9…v^cyg>r) o##-&gbbh$bAUUGFhkkdefRVZh[׷>ۍOzXL\`sll^Ej,z;ɡüog>\8v@_ Ƴk+8r㤦kۗ^3Α[{\ilr>gϝeb(z399ɱ'Fb _26>N("#=}O8܅ L_ӧAOGg'mb1L 0:6 _) tvuJKk=:Lf3_}ʑcitIEE?222ɹ14A (G0L4\+FpA'INNf3Ϳ qI2227/墵U+)-Ycogϟe(z_b2hZo 084̯_zEh\Pxg>o_rpߦ IOK`s1<$l70<nÇ9vX,Ʊ' $Y玲`0H(&'+J2/{ 2׮eeM ?y]YO~%g) @p$Bnn6S^VFgWP6r-suz ;8OLSw\k|-/ӟ55 r-ԮGĪ+yu߽D"aRSS˟7烏>ì[fժr捎q s?#&nŋtt:rc#N`ͪZ+۹#[`^wRrgp3Z_J`Z>MN$'(*,lxQ6}>ze+$IsTTEA KٌV%jIIIÁ$huZ xAUQ(.r6h4t$PU e YjzbpN 2jb^Oa2˨*$jD"DQԹdVY#{#%ѵ dY$p(L,YNVh4)Zb(płF! 0L xbD"z ?I".l쎹jN)j!+3{ʊr::;D#cPs@^/p _ yCh4"$y\mj&=-`0ı'AՒdMch4w'{|A})^ym7!/cٸ{)1:::pݬp3yI\cN33;DaKh1h: FCK47/ijO?Ň}LiilX؇L:^h*J9so}k`2Qʊ N'L~~SSSx'(/ͽ I׭_$Ach5DON,u/w^xU|t,s鱯65O?W)~q$IݻkVOX߀,KFxQܺeA;Ϲ qÜ<}MLի8VTUmnzY|**6n"Qo R'7#i;HKMK( .͆AGUU&&&q]l6p݌OLlZ<fff'۱Z-__aúuaZ HOb&$  t *Fp:a`|0c(`  t:QUIP(DzZA t0 ;3ȒDGRb0>>$K8ϝ0:,&]u:=YD"&].vBf|8Nf^TU%fcbrP(DfF06>l&>#})`l|gŌ13; HȲLfF:k^'-5)UQp:x<F1 defvlftl,QIq:@fF'Ph^\.7Wz=kW\:Dc1/ܹe3lv#—ȱ9w7^ q7$㞻ξE+PR\e& vk~Yfwb#?/FCn b(  FDA[$}jQqGMEA[hp =[  $&+**$#=YZ EA[^,zQW ,5  77UU |t 288寘tnt/EQ8s#WRCGp?(.Wb>qAUtM_ |kǃRUwG]}òe_$JKJ8AZyF|>&']D"fYPyC$3==C$A$B0H@ ׋1>>, ellP(D,tvu'TU5g6:7L4ML 244xrpOM1==*ݽq[8Μ`IX,źz~vn;#I3 W261䶮kH@ n;>-wP(`m t|Ϸdo腹2eoO+شa;EE|⍷ '؉\XG-Gze+LJq4ә =KgW믣JD"Dx9q4ccĔiioxw~Z-Օ<ʫOi|(_b4 C ++?\ԝ/I[DEy?w).*Zc,_%UU).*/'͛YYS^wlʕ5<.߹Y/?x;deeG_fU-߿!EMp*++h:Lff&w߳ LFn}OzX9~@ZJ*v==3*Ĕ;wl'=-o>%.7^YBK ;+ <$ z=YYt:--ȲD8Fhp:8Fc"Ww-{r2:aCȲp8ߊ27X&YYG"񮾹e% PUb9ghh_{QBPܜln ,܎l=NJY[lfaO(*f N-) ш`d4a2$$),(v355EӉjE,et:t`XAU wnBnN6)RR$''cZY2xm6> OE* (o\TU,>~P8(%Hp}ebb\dL4cIpPY^8{kWGW^Jc#wnقn'٬xg0̒Z~?N#w;QU|֯]`W_'s }sU%==i^~m7O>(9v - UUdoƎ{Fe>tttR]YcilnF$ ukVJ50r}{ps.fj46Ipl\}edffN.TV׮$=2?أ8}HZ2-o4,V+XGFHKM޾~IqPɴl˯-)+)޾> irrrtvuۇn'##p8a'jܜF G[{I'YY2=3H&c{(ˣv%:&Iq:h2rJ#i|PTX,M-B!JKIMMʕFB0;(gdt1*HNNARxUU#ZHMI{wR_@uu$+EkTWV 2Wk KK 炙BuUfֶ6GF)*,pښxD*';|TWVb4onch/l;:7_%4 /~7d]/??`,_#ǎqyȢK]yqIq M˝de⾻ ,̌ j ABk۝[o3ygoaFUe%U7pKA6"  FDAۈ p_An#" mdAWU'ZS}w7{D"a2W#=w~A*X,F(JKNDr=UU9qm˾חY~I0~ FFFy1L(B8^˱XsU̯(D"ךD,;BGUU9z8 rq ~L"p657 .%⨪J,0;;˙E"su6EmA(/sA,gM4_0L~¬wY;wp2OB.kN>#‘۷$&{;A0̹sؓyHKK]Q^ym7,>C{G']ݔއ"2o<(I8o.SSSx0\݂I4?WdYGe{pEffgYr%>V B>X O>(^&&'iimc%tE?VѣP(kVb-Hxg~.x7Ѣ{:G~1N23@WOAQںeٓǜ9{amJVV68u Ly<|r0?G~dۢu~:cF imk#2ᚤI O1Ͼ( ?w@UEqOMͷDUUڻEիT:Ξ@mm gϝ  `hͥh`um̏?Ȓ ܌dw_˞l#7'lFFFx^tp8#++h4FJJ $ HMI!ٖLFz:iȲDjj*+kjXn-}} RVZBNN6II%133ä h\&֯‚22efv.0L  QQ^_&=}Q;)2$%%QXXd;#ItĿkrkUU3YLFY\n99hwJL!y~]ݷˍW^S 6% QPϚյ|&5 Μ!++$  h,dv QQhmkY#tLLN D"APzZ:I_>`(g59wo\EQAΞ?GaA>&nZ (Jn46RZR,K4\Lff>H4BK[+ӀF#cX)cŊ*JKN=wmvR;ildfs, zQ@EU'.XP8s(*,`0C{ۻ6 ԹRQh,]rLD0P32 C$ UQDh6$I($I=\3GUU 1E!AeYdi> IŔ>E"Q4 %k=?!4t |X/@%,uZQz%(14 h43&!-wmFηQ,DiuD-$D%$Th4Q dIebmEB"0" Z-d;iϲ _z$O>?d[2yĈT )qv% ^&pْؓos0ϔǃBey%r3w/Hב 'EQBdgf&zn4$ )Nq"-9  | $Ii.d?hw%I,*An7z"7H~AAH4DW pKX*?5nh4FYt_~mTGĵSk4/u\ﻭ !/ "z042,X6$Fi 7;g̴~EUZ, ~u,(Ңa$$FY),( ٖDCUA|E %zB0`Ͷ<% pˊFcD"k^GQP8D8&a41 (yQTχ?@c6'PXPb%tX,#-Q(i?80ɶdɄhc4h4>:=hߏdl2  G"(J)EqQ1= ­lnvIa5`$RVR3F!V $~Gzj!&].tZݽHRSR?m`(ȬK(d2BD(*,dphd[2))wv$ZH$BIq L&Zf}^'1L/ Ү^+d;ՕU& ?/R,x݁bAUT)))S\X=F pKa23;Kgw'p\\n^Fˬ׋#vriueffAUE%98픕.=/ * :@0?'0pM`.' DQbAUT F"K2Xh4J|Z^LA~>K\K됝EUE%$ NORb8}8SjuO;hh4Ȳen EecDAn XUUq:$YhhFCZj26>Fs[ Hܬ2333A0%jIN#bawrxq>V,$ےIOKchx{Ȥ 8RSR0\(h4Z4sc H]=K jeeM3ӑ  Eat|EI㔹wUUhZ:Bd`2tJ0L$pDQxVVFIT@,Z$IttuPVR F"$IBբ( H\`0Fh0 2XX,HD>]f>y#pEQ0 Np1OA5|49,c2U=9yr&i#tz>~\4̵5 IV*?|:nAש'lO3׍.s g$A[W ̪J<|{G~.Gv?>\ZL# J>d;ЯLUA=IB?"W*7#KrSUP(N_A$ ͆=ŔslH|. $YDAn & xȉU5>\k?xM p}q9VTUt:QetM7$:Sdį/(嗉Fab6gW0lݲ1_$IH@ln::C%8_kOAAXgp$B{G'ƶ;$"I(*,a҂nGrU+!.;B7Yv H._affрbetljJxAOo/f.W^5kعnL&u (ª+ikͽ{c͸nRSRI'ByY.V,3֬XLfEu"z۹Wpc'Nbܱa /HKήn;+W`phQ"5+`" NnGFx`ݚDQ.7033baͪZ % *ÿg)ZHբ 'N$k>x棃084 )F_?CÔo% 104{2oԙ3SzN>51 buD2qܜ#3#""##SW߀l‚rsLFW7DUUfw0P^VW 9Ư~[2h`|b$km"X46^ezzΜ;Gzz:###$k_b墾L:Laag_ [R>>HeE9))7" |IΝşL~ÆukiimjFbb'S]UIQaE(I {Ab1ԔݱҒRJJپmPP(Ļ wSvs7ϞͽPR\D^N;2,f3hyAxҒbSSD"QZ-΃OthmwOέHHpΝlX) 䞻12:JfF? ;oe +kjxh qz֮Y ˶Ejj 4p߽;ٹR —3#0h|O}ܿs'J2[M&rss^ᠺ\V ܽlUUFL$)d1$?@zz:feeM ##ȒL8dYfllÁCUaw084oEVf&))N"(%ʼntUQ%FD%/*b B{G]]ttuV6[]TWUb2{淫0\mjB ?AKdW$I9gaÆuܱq#fq._i[x^ϑcǩbu?0@o_+kjp84\D6[iL\ԬXKOgtl+V`4hnnᣃijjbthtӁᠭCɆ465QXb6(/+S;6qJ#ccTUT$p[G;m244Lvv~j|~?h‚|\~dg㙞:P  c6)).&55M\GQTmDQN$ ʊrΝHSK3CCl|Ā  \o_:}ZYY1EQB..?~hD C"߰((FAdX ^>z*Hh,`@$FeYȲuG1Z $%)y8! a2j4 >\1>0{?G"4 &h`0} Yb~=Cw/l1OAIDkk_eL&S⵪aZZشazi| UUu3\ly~^j?-l^{:ݧ[ܠ/({2_jqvϿ$F`XrHDKku LL(+/ |A~^0߭NUU2Y[,'rA/:J"d &A\D_A˖xfLAnyZMkk.  _1.So%tEXtdate:create2013-08-30T12:28:19-04:00(%tEXtdate:modify2013-08-30T12:05:05-04:00xȦtEXtSoftwaregnome-screenshot>IENDB`selinux-python-3.0/sepolicy/sepolicy/help/transition_to.txt000066400000000000000000000011351356774067000244440ustar00rootroot00000000000000This screen shows the SELinux process 'types' which will transition to the '%(APP)s' type when executing the 'Commands File Paths'. Under SELinux, when a process running with a 'type' attempts to execute an executable, one of three things can happen. 1. The process can be prevented from running the executable. 2. The executable executes with the same label as parent. 3. The executable 'transitions' to a new 'type' based on policy. This screen shows the executables that transition to another domain when '%(APP)s' executes them, and the 'SELinux Application Type' of the newly created process. selinux-python-3.0/sepolicy/sepolicy/help/users.png000066400000000000000000001604261356774067000226670ustar00rootroot00000000000000PNG  IHDRah>gAMA a cHRMz&u0`:pQ<bKGDIDATxuxW[]PZPF[־zRJC!@m3;qɲ$Jܹs̕sρB!@BBBBBh2  $%$$$ndA(**2L&NĿQQQ'O$A?"am]E`dA,ˢMfIAEY-B^!cgQQ +-pyC[+a0L&q֎NHNe㖭߼Qa|SN|wBaX">y㥧x' >o}!B 85[O=p_nQIie/0%+͹/$QSi9EFI㎜H_v#IZ&$Uz񟥕nZ܏^}Aw>+jo_/-0r8m޳Q׮;H#I^}a뾃UumfMo{y44ܺ#igN‚}}"W$$.fڿj]|5{1hjL%aBC'8y_{$pE"EA{ ̾}ۧ?'.M(RT0e>7|l& h{}˔[&{֨823مe߿V!|὏Ogj*?IIB,9"y Og刢8|Ѐ҃i'2BF t3vAIٸCK?1<ۦVOIҶvۮןOx[ViX!"aJy \a v)EQ&J**KO kDQTn1vPUWR*q hQDA1) ĉvUQ&Jh 6{Q +7o#IE9,α bbh5ʚO /WE6542v;N$IZC1v;v;ò %(*3.[Ƚw._ !6.k4|ZO'^FFE`[~]KnesGtDxeMh;5.2պ,]BT'ֈ!0 >h7-QaAA+b>SǍY jh234miR}wn̳}c>iCޞrJ2fKVqߌY}Wsk~}hA(}) p$I:"4anA4C.!U6 2fKVC2qcmI ar (R7p19CR$|]ǎ4h˲Ŀ(MVB&Sd. - 9saQ0"Iaβ2HaYN$zMFnU)v;ԍ @2j"1V*Gys FR3EB 79;Ƅ&D-#AP+by^iHv%z 4|m^ nǮb8IJò$z>҂3<Ս qdPvOQ!De'`ԅE^mmk=}V:>~c!d9`0@ASTך-fЫ?PELK$%z]]IHdKkKiyiߤ>>>lmOH?:PPl2z:Qs8Yب؞N 0 SjIXF mi)t"DA. \\&7<ϫ*5-A$a6[\]zAV,q`0d2JAu 8. %]WЀb+:K\Q1 ޸'Ra(ze F  P=a<=5:EaZ @Ӵt=I$]BB9rb tj=Hd2\f4{r9Af2Smf48!($FT.i^5j cBv;I4C@ 8q5!$I`\]S /Q" Q4Qδ5161a Nq"^#QTyee^߿Oa^~(16ʹ}B1 s@BN\KDQ$I`Q-]xH%ֶA8 Yy]]=7QE; r[8CBpJ(tyj| $HBPD_ZVպ들֨N缼BCc0 2 vpch4EBm*"F E1$8!B4A6H5"D!q0H^(8.#eL81'JlH ^|rARAxe D$I MhZRbQ*Lm6pifI_3po VUT\ڮH T(kj~_tAdP(D Z,VeU*$: !fvjRb?|A ^ \.okӭkMcSI}S37sƌCG,7qܸU55S'Mп#Ik *r_{V]bc |?s|ٳL&s|$ѱRõ..oE@!Ϝ1o}r|𡮮ZQ7n\ZV<|萉DZ,T[vA!43~옰Џ>_0LJB-_?z"MP|Ƀ~pN\lL%2VBhHp_tsP,t InnnEnnut훷m4p`򠁉 EJBQ'9llF5l6ۃ/,*5bDpP0-)-++/0L7L0٧*-+tqƍ{`tLVP#7[,{|}wLV ruB 8hO?؂^^&?֔ɓ]&i4FT*Z$"""#m4-4.J&m31v{uMwN8 Uuu =c}Y{UM-ڋKKZW e2Y> I qw~[dDi!HBCuDiT$qUiLJ9̔ },쩧OG2d"pbz ؅@bVZqԴ 3Oie˓T*!;7)!`0v]{-Ӧhzي Br8ẁ4T?oS*nqPQ^:|;T*`X~ßVxxO2iRRKJ &jLvl6 |>0QR-'t:Q>yԸ1i]ߞ׺5uv쓔H3bA1- {ƙF\!яc8**~Zt6+a/O/tNg;ZXXVWWwtƉzfYV7p,g2ySTE%yyerbێju %Z%+d\&OE;vZqj MJAZZ[JJ"#ƍu<5$'6:$ɴS5~~ZW[P`MӱQE 6Z(AnjҚWP'11$$ȱFsnnnPcS}we4|QVoRR~}N6ǍEnx1 6٤T(-fF ʚȈ"bmӵ76L&s588%4$e2i⠁JJ"#Hy+<,0q96m䨨H ROt!Ap (-+?|䘛m3+ N$b;o(AVWUFDrrߖ'pv2tٲGmjjzxx:8\>b7crR24mZU*%vf_(bQՎ0o]kfk[k^A^deAFVEàlAV h6^^o^`@S?֦Q]\\f3r f3RD+H6MPQT*Y99 ߗ<;o3vdR*H;es1L,9l?Z`g9D$}m}/q8T(J%Fbn[6WYOc(cI2jZa4 EfBl(h4=((˔JfQS' Bm4͸!d(|>; |[DXIJ+W  X@/#ѹbK}z(|SN,*2q6 f !ѴjEa0tBaFpqG':~!ᤳ<˲HdVE ,]^2iAl6RokkC!V=0 C4ah{lraQ1yЦT0@ x^xx^Ļa@I"엸*XP_[WALR&1ns, 1$Ʉ$___ǥF70hQrB.S*4M/ Ec  tm^$FNAg\hf{0w;R~ҡ:㸪*3)va|.S:ȂDrE-_-z â# pB=2TYUi.zAP)U23CA! cECiCT*sݮHU#!qSqf5Xs&A8/%  #hxR $b9:bD z ~/]@[>v 9!Q!#jZ-k55<j]3\kͽ GAqWSSM3sLO\h^2j&?H t!]GDxgږz$΢_R!mPq^v$IQ_ ˈ[MW+ i}2e>~-xk@2wwÚ[+ʢbs*Z8$?%@V\L{v7q A aJ)"A(2LNd2esvKЅR`-!q%Ycw^a,0`䦦f Dp3kj\]A,K2cAa5(|zdޣCF~hʕBNUMI1Ӭs1jrlMŨ)VE/"EUU/Yj2]]]_~ƦS?0a8F4]8g>eʭӧW]]W_sa+qBQ..gϞ8>fԨ⒒)&pQeUuLtԜYA)8ΡjАqcFf\^аb_m:FsDDZ,巋f}:0tHH\k0n745{~nԪfa>dEtMm-2Eqkoe`Ya 02{7?K%ee?811!#3sM?|\.;th`@`Jꉢ}>;7S 2 l'{<_|ܹja͆ >+V.+?8àh0ǎ'GMeeg6'Nص;6&O?пFc F/OOL&DZ~~`4N;/,*nii*>GSR$$n07Wy㿯 wҮa'/RevJ%ɀ(j]\ ?'|u:cI9y> 4`(Z7W-qȨQ#u:ݒ+$&z{{Ik>7!>h2[ FBP([ؘE7)).6/~goekۑ*jm6Kth<[w}xo3!an-%Ey?~yO1 #ͯ1@ I1kQp+(a/9yAVm) 6 @hx?ꚪO>S]]u3eј# LF"id238;c7AA|g*'ol"pxFsgѢ(#G455S)QӧNq/--g 6-!>;Bnj5|Ukְv(?z56,7M<_]]4ppj99v;')Q& J"0 @TZZe2=<꣣"dei4> nnEEU^AZ\./+/8Uh++BB'4ʿ,;5#!qpǎ۷nWݎ848U*RC ( 8jR!ljnp,48eY@B F ի2BY@W|~AhD! h4.q$AN"IJFAJ IA42 #2'_FQ ,+˝5g-ԴP2 2JayEGZrol4MRfqP((yaϣ) r\FQvEGrrb9 c?I$-qA"h.TogvaH}0]8kh]l6ǏQM ai`XPTB #hEjqevn0a$i\V+anAj] l߹8oNeg/v;%.d8}EQZ-]t"OǏ8bU_n҅u}bd;G0ly<;JHl\c8s̺`YtAi !DsIKܴ\yFZYUIQt&:Bh6]\\qNu$%nraG!l<C]@뢥( 擐iqH{B\8T(%" "/Hr_Bf)p䖽Q׮q\jx%K@,!q1848?@ZA-m-Ujww%!!!!kABMf27=0k r"}%QсNȿ:Xө 8j:Dc;a]bx:)qmևkSuco6t}c4y1sE W͚#Sw]#ηm7vkv?;nO]J\K]/Jrypsh t8ܩ-uv]!v^s A;Lwߝv\u~}]]S*U! iDt6;k _պ]8 a]]-!v=%I\EQTvbjА0JJy>e..Z/O/f+)-Q2\TE|9N9z]ee`DAՆ8<i*,,$I/g(qh!"br!QƆ& J*8(X&.|ID')UUJQeQ1HU -g/$MˑKQf0+*"4 l1uM2 ruuu<^U]%A!!8}D;M9~\\\ȑlt:]Z[!7?t@GY=u:#÷_~~``\k`&!B~h)Ncaa(Uq[}2=;Y3 k֮J=r2S' EOlܼ;s(ss{~w`ON߰q]#}-S̝ĵb, 9jZ8Y>Ngڸi];wm_bޠGwo]'RjkvR|u1D{n5 C;ވ䏳rjZQ4ܴ4tcoGX,敫ع ~* R}v݆3NڳTVTYٰijAy:bU:sf%\ܭfQ(g2M8 ۻ700mw8T( jU Vխ_g2}O 2Lk+)-3z,8er!z2L&VUWj4.ÇX,d2!L&X0~*o"Ɯ왷ѯo;kH nnn}\&rd!LAQT^^l2!aa'$x˧jq9ٴ͖. \0U ~ⱧjjXb4X= |iY ˲8H.WdemnndAaC`Zӵ fj?_f@ON?#TN+rݬy͸嶆Ɔ!TqȖU> xC9M9~]NM;aKjkkXMI=FD{n{BAp@oimk]q^g9e[7677ص P\R!AZ3M7wf< 4w9]sh49vaܬwVW_y`Oi]KKKn|,娋Vx\&?xhUQQ>zX Bly-75[6yYu61uue׬ NSpQz3@\اa }4HZ 8ngAf?ptzss#al0$;8D>:{u:{ 83܃sF$p ;f|hhxKKRd8kjn~kaQIQ#G::eYA<=<ǎh e]}]ssRҺڬV\] 4߿Ztޚ0y7nŽrrd$9|y' j@1Nպj4.APLPO<5XGɃ%ޮ0~`Y\RY*B²M!R_ ܇mӵ2֮! :f5~5U&QRi]ACvyW+ZQ*Uƅ HD â"U*a#UL&Gͩ$IZj2xXmm͉G A3t}}Cl6 k%=77~rss=䌨ӊe?jhbもBrQDx'o\ :N<1e4`Y8j3v__c7oMZ-U Bqyd2uJ9<}:} 3ߚ,ˮ߸(WW7Q] ufyI:|jv;rv;ҕR:s6j AR Z-g2m[68VQY~=t6j35kbsw3L4ֻtښ6oL&Ө5<ϙlDQ7v( Fz2 jil6r RӎerY,JJK"CBBѢbVTÆ(,,Xa]wqII9T*1 |3zEj-VB :V1Ĩhd~Y9l6cONHbIIfs|\ByEySSC``f~1qÆ߼u@ʪ ;k7[;$$4#ZNjnjj NLHR*'PfFG\lQ; -Nf2 48y Cl6d2"""IifhVl6WbB qihl4quuUxX*zyzy4 ?jԘȈ(naĈQQ1>>-חaH//^l6EQ_(eӼΪ8qO )}IMCK:y5~44Og}g}jp2y~ #Χ=%tjtt\,RN mq׹9rVD'v5G \DCSK`|~ ¡CEFDVsۃc#nchr_םD%tJb1wW:>"umw}0趺;EeO9PuR~) tݶNKۀv{AJn5|E'?".,E#qÃ]BnԳX~aZnjt[b8Q(p~EW/ ^8FHðvO0,m{zC#!q3, `RB¬{]y֐òs#'/o-s|@R;*I9z>P B I3 ^H Ycu q=;\d@|~ :aؙW~ۭ+eΖ`ΏjHٷɲƍwO,].0 bߢO>b |aO'%K JJƻnO?Oo'lݾCo ,mp}ŗ}ã}*oHPWVUn}kk>GS;~ r_Džw"OXHșؘ!$'[ںcM.\\4>>>!>>Qj*44$}y)McSSiYa43eO!I֍ -G  }JeTddsKKBBg]]]'Ojյ\tpPPDxxdxV zG!7{?i„fzs0<5QnVR9ؘ=HU ػє[6=$$$ :S%5Yt8M0dSwRePH#ٹFpI8iwxz/%Zss1D7smvr!qs0F"O ׺uaaEɍ(*%5uUz^.\J򩌌O=T*{݌XjpٹqcF?C!.]6ct zcc@iohXj#Gev$_{Æ.Aܮ9D òs,_1cʓfgO;ؼm{cc/kooOhyw.ھ}H "4TZ^snOy nڲh8z,#%eu6W>>m:?/lljzѨ"#CC"䑣I@2oiAĄx@LTMǟ743nIJxyz{Ճ =6$yPߤAe2\uXmv$Iǟ{f~YYYvNVٯo4psuUTu;~Ι!h4* _[W_YU]SW9ylcǏzxx?*2 9j_.5rܘHUO湺BkF 5jO>JRRWTAln= veO LXVQ*RҚmFHP\.y A 3{g_4`۱ _|A8 TT%%--9y}AǗS V6:2z1 d=YRRq̙J] &TO8B.'Dv_/I\9B4Y}a@~3O[ju˖ _VRk^Bx쑹/睷|&x"=UsVι`?4$k;=̐aC9"5--%aQQQ׬M9:iItmqqK((,+(4 S&MliiݽwAAA@@5PS[{$%rAǎٵ{OUMMTDcb۟y欗?,-+I :yJj]\:+'GTzxxDK7 h ׬M9~b҄ǎ9n-1O>)`}׮w$&&9sφ͛I|gJ%[A}МHS+q-plO{?ϝ;8yP/IHHtK!fyo֒$yiwDC?y:`7Y jjk\%<,lH%վCyaÑ~c#UMH'ZjH=5@;딘ϋ~QU*1́pVrui/]/ &qly> 5aB%n7t%UoGzm^:ۻ>bW~,%$$Ά$k<73RKH$tRj_B&.TIHHHHc${@"4Q;mƛV^~.zeE4AnДDDtߩhX_$?E ~%Jr€ [uEgx:y瑹mQUbCSηH|uP+t\;~g=k2kjsrV. YI:r:3 NYUX9K?aaQqaQVW)0(ֶtC̴X,AccSF$-kn^~VN˲y lٌ;N\蚧*7*-V-Ç!~---߾g323쟧9K\E$9g帾asSYiO> m;8Y0;c ϣ0d0i6oiI'!g~Je2>hRxonnyFg߾#RDQxל_wކtF4a***?]U]ko/+pǻh4;~x WWWKqI(򪬪/,d_NnPRtwwKEǎL/(nhlܼu[uMMTdğ˖~6oy ‚¢¢Ґ۽%1Lt;vBC~uBlo$Z/]iz߁g6oVS[헟IJǟƏsH-7MI ,-+_i?2m ohww]{(,[ME!!!{^Q|}"#MkkQ#/xyʔԴ'2sSzؿ֭8nr^?lVǟa[ラu6+'DžZZ[>k[:T\RӢE֭?z[~c %Jlniw|WW_O3 prlϜ= ˯ڀdٱA,]&l6aCc#ruuEMIYb Bktl%eV7rҚ9m,_lmmƌ9n765t2!h}9vPPV^>fH@tTOZ~銕/Y*ɛ cL&KLL(*.P]}]n^w?q`/(߯/2,)117/aXj~ZqN IR!s<@:C&N_S[h4'GP([=A9^ 1 8߬{7z̃/-+aXQqIIi*j)Q(f91!MDL0GA6.\\4 &  b:dpDx3O>M>1!!6&޻>mʈa{0 j{}߽4@$Ɂ465x{{zz,Ad0?JQ(6 1>^P-(ǑF k/4zW?8'}dp $uv\n>{ֽ}x1Hp;2`g/N&whH=lȐ/>(/yqgX<ƏO1  8d4bc?x3~if_}u:[ZM-MMafsKKz0Qәg>SZVUSx,;?βbX, l*\Y{OgH'aYv߽o^~AaCnzV;yKY~ڔɻ vbhf sfDG};gμƍ/,*/,7zt~Ad<#"˲Æ /pSPXh6226tblܼ /2d>3fP:|P;kw|ZeojniG ylH7f?|3].'O޳^:dpYy?$IrĉǍ---;|4_MMMIMJ:v<;u:c޽1W%p| =]7/huW8>eҤؘ-[ 8'StaAAz~!!+w?{s%1f7?p:#3*2bqCrr~_Tė~umCǟ}/bbϿo-VFFr9 H"c5-l6H\?8QTv!ߵr{:=q&YXeF&t( Ju4v$ɮ-`dY0v#6ŪT*PAmCK M(r< 0"-B]] 0 \^58cn8#.# تEqDE }i`xJ6 ]+WS \]:~=+Bڑ5${ S؊ DV?/'L'7.EQ/YiXPyAu͘ P,;\?yaD_A:StnJH+?D%bK.'Eqqz/ߨab/'ڗ[}agvDQ:EmkHC#h4<c f30];a6jcYًXa:etbqeqbLWtXLKPKkIwn06X u(v싯;O^B|乩-@sLtԔIG]SvKKK=װөgoGb"⣬۷_TŃ#m6o>z8E{4*2RԻsR![557?c烮You*f}ͷ%ej|p?q0y*2r뎝۶y~s|\8זfkni).)5[,, L"%sss ٺQ@-tF&˲9yyv3 Ɠ [o/,s#R]]3uv㸬Ҳ2aϙmmmev稸O:A32,q\Ii陳Y%̙e~6;ҥ3C0̩:Ohni8sF:QAN,7hP0`9ylF/)-W㲲s -Yq'&w{ Eg{H?/?ϹW}gٜMcVԜyrŪ {Z|eYyN ȱAZzz^_^Qq>̊%e+!Ե: 'O?aoۧ?~js|_:ſw߼[nGܑ ̷o755i4?.?}Ǯ@A`AiYٞ}YQQ$7h`u?/7M$>zM߯̔6[,eee啕 cEcWs-[ % ~~._߾2z7w"K'N=peYB{l3S&MZ| ֬[oږ\շOw7¦fw7TTV߿o߯C导 {[[  Px Rxں_AQ~sIVvA~+VپsWeU]n6m6l)((K2x^|hJJeUJںcJܱkORbǟQRZr,5x}u]]݁C*իoҚ:8y(/ݖϿќPGEDn۾c|m8zHJ(?#--A<(!>."[w9cp߁C^^h4i'?CL0MJ lGD/xݥW`,Yu!ξo?x[WUUrFfŚRQkTwg93} cnj="(gڔ9[2>S&M I=zXTTok[[g(Q#Fh4]{8Wpԩ}l6 fϺ/(0>K/Y99Qb+y##"Ǝӷϟ7SG<6ᴓ[3zdtt}'>m(?1 BUTdħ >DTqG}q4&IB @pםO0?z2jZQ?;$9ݸySO<?'~nh4UOΣio<{6xs>q2}a~~oW77q87*po/[oN34s![ VβǏ X\GHhmm=Q[W7g,LfPTR8[,ނO|̙sQ9ʿL4񎙷9ڕn0瞂@bfE?52'/nYpxΒ$AZ,KQa6+vzojwݹwVP(&X_}WPxue{E87gCEw~{کS7n?f >28?/_P…yyaaA ,B0!r[ϾreUN`Jxsh4$P*poDDGY?qÁtWP6?xÆ  7/_k:y_z/H4|{֬Gqj5AC@}fe; 00s2ECԱT"#[oߺ}g}(A8.1!?O?LaQs<ݲxO7b>7iWW~qܻf}c[~\3O=!q@]q E%%$Ezj!!Euu@T*Q1I#ǎkV5MO=\.G bavϿ㸟/I!!/?Eqh4r(dsGWVW2mcGԱT*s'ww+|/IC޼uO,z'._yO{7fe|̙'w ^mFGÆ[^l6[﾿w3=0 ~ >. O}FmZy{0vF `9QLlV///d̽M8ۻkDa45MdD86os\] vը&"ILf4Z[y _y%y@A 665EBh|yoh@8/(puupW*z}ccV0 Ep3[,Z, BUy;pjǕW8Mh4) fSTuuHNTj4Mkگ^޾w+kjL&sZi( F0jd2`4|} 0ZEM&ZmZ)FRQ4-Z J( ! jUUWiZOnoii!px/OO$m" `: _;Wiim P^QpZ0 ׵e2R7k<=<.'LCc#AY{`@aF)4$HfZFjwSss~A!aC;< {ݻjqMʓZ򊊄N1>+x7^}%&:iN?ji_XT~91tFQ|wsA%:vͲ\ sh%Yt_UK &^Gz̻NJ21!ӱǵh6uJTd$pRj] Bc%B1Zow n:]wnFؘ]S.N6]#U;ZIt0ԪN%s9a:5mkt]U(щKTqm'a<=<ޮ oXs_{_fWf]m.ۊ0^%|K3z$tQBB7藐鸔Ƌ8N;8t}52^$YH:雨o.^.V)#F^uݩ;^vR[ĵok\+5 U^=;^}i|%KGȮ\oBҦ{5q`s-,G-C#˝d6 Iٺc?E{M[퓤R*o7!5(l(r?l޺ r!/Y#+WeXY ?{;Mv;Kd'5uh%G{iǯroZz 9~"-"Kɘ?/cb_33&%*G~OvTa(dN !y]En(F]0fɲ?!;7y\] I4uuoNEl6CK9p?va^̮uh4:,Rsl6 Vx7LYY r]{;06vd~ 'z=2 MF[2fzͺiioN&w!X,Bx*#e˟THpл,NBz=a--m3fL:像?iniq{Ԯ a>vd-QL&sbڡ#G׬[Q nnO{s6yv~!=j뗮Xd02 _DSSm6ZŤdYbeVvN>}pR q*tFOժi[m߷i-YwFoXQ8H>2x0A!oi>b2wMLHظyˆM[Ned g?.۵g˛os"䙬Ӧm޶}59rDZڦ-'rX~߸9'/<{eİaVڲm{jelں5`$IDE95S~єT?_"ѹ;^k7l\jrrFy࡯!5--:*`4~쭬ؿ zx E t6l$2}~wݰilקϟ˖oݾɓqJO>ݽw3 qqɃ`W>Ws홙gz9K뛔5ǍU*qҼme+WHw`Ą 8p˶>APddfˢT7Wײ a>@TdDVv6+VEthHțWc. buu=Ȉ\͖!lmm[;wlI ,5575Ro0ݰ՗^ ۸y˭L 𨨬2 cF1 ko6yEG%329sܘcGꓔ+/aA&ž'N=j%1`6&#MBAӧkj~AL4)1! 6tȓ=s MJ|swu< Fk" {>4gvxXJt_}.y^~imÇ yZmCS^oxtC#GKKo4~⒒7M9f\>F :Σ |Ge2U*L.09%Tâ|v VK>ӗ_{#5윪ꚇ3hZko'Ǎ_BC~ӧzTJJ&+V-3nAȲ,YZ, b~JL;ey?bihhV͹/Xǟ0nWqYDQ rpkA $ "IwέLׅĥq 0y<7?qZsR߸iϾ* II >t}\aqR EQ/ZP(oִ-۶3B?)7~aUT&X!@TZRD===Wvoko(vMGd^?yIhOTh4J;@RHd|w\.>>M͢BCId2EGE|}\ZVH$U*%Uh]\\Hl׷O8qĉH\7FJkoe4N: ˧(Em1>ɉ9q2:~_~~A}O7o铔t6;ER^^P(j#Ce1Q躱)<, P(З$I%Y6y欏7ay,wAǍ?'O9g缆a'OW^d2aZy7L iuM d:yR\l_k]4gy[Oח߃;v6 Jnw"?{Ϗ95[6 ptƎݻ5jb}}4Øf@Qq 06&DߴIRM_rr_yafZn0 ===9ǟtm3Fn4hy`0 KXU{%oרz5>.væk֯ePNZW`4zngE Z,A;t޿__ l <רuc2Ѐ)*""4$7JJLy;f "#ZumO=K ɹ[ZZ}7z)'/o= ǭ۰( c7ʂ¢;oҫ;|Wӧ=p>,&:z¸;q5c#LylLcnظu6Z}E9[Z}feeϹϋ~%mA%&; <=\.п{Q#yWwqGHHpߤ>^~qqȷ(~~}|EA;cb26{ %p|EEQkuGLtTP`ZNJLN ׷O`@ZI GI%I24$wAFicF"p$@??T>"ÔJ!Q$IqZCcp Лa(74L:e5㹱cFϘ6Yћ̺Q#岸9##(00**2>.lDyyy~awa戈p/OO;v(OϠȈ8 s| 8(FCVBCC A<~hwo_B⟁Z`<|-ӦDGK?8'yK U|?C"#u{W efbf;)wo" ]l3zwl՞ סJc9:G@ʯ tDt}q/} [wj]fzR8'1t(5wu4$3z#j`W)gdsӡ( ;C)\/]ڑ磛đNsmz98 WsY*Ky^3]߆qT.mhuŐjCWQ _i/qAMʿz<2Ny/5PO]zz8Kr_Gj=@/٭$%$$$n:$/!!!qA\yx ̥wV%nr%KR1w>;)\Iϟ!yա##hT92uQ=ƫWWgt!"!vy-r:߆Agx%ʽ~g.Sd2ڻ7,4OW]:C=Y(~;p\;*8UhGcꚚԴQHRqOgZ_ GIMKcv]\llO'J0xŒ|ǒiiaajy>&8rSU]zwΝ]aXhpjݺm-[kjjccq[))^^׏(Y/q tLI=X,u6V~u]ܐc^s;i΍_S[y6[}$o`Bxᅿ6h-vBOgyXV^ǟDFD#$g0 X,or|ߴ416wD5 t,y8t?ٷ@|Ñc)I铔~?ZZBB"# ,LkN8^.WTUW?83YYϥJ+F zm~W a=3?'/oUqݏ?4Md`٬iS:}1k־Ngf=ЃלӍں5757ϾR cܽB8t޻/l6zgllj .)-crATJeAa<2?ðܼ[=wٷO4@zჇʗ_x~; QQ~YTNC^JsvNΖ;l6?wCs3M}g bcbЖ'MMM?0Mj]zq/|u'dFtgzJMt ?vX,ӧu 9{@׺gyȈpM[w _n}٬>({떩Soxѵ7<ԓwy;՗_:z"*2b hljϟu=!A@Z@‘f/.4$dֽ0j|0 Gv{#HHpMӏ>Znjn ( O3g?^ztF2Μ}CCCkjP$~ ZfmKK˛:dpr]C#OkK+Bj͚7_}uȠd$'Y;q$ /O@`` my'f톍͙bسwϿ.Vh=ʑ DI>v,2"<,$dmMƎ1lyfNsr<5ib1}}}4 !A~!ёZnF =]fO= {VvwޣT*$%>p&- źw3Aa~Eal-j{:W4d_}iCC+ITF Bw7N?yk᯿ _<bmovȈG~x /.)) Fr9rSS&O pj:446뜼'EQ2 m٪kUUqg_<ܤnݿs{MmmJjjZE%nZ q˴Ͼ37?=<,l֭;>l(mU*w?t豚ZA[Zd2<ߦӡ֮[~{ryKK=ڮtJznF :!ܳoY# kmm׷Om]݆MS"-9hcf 6ݰq՚33m6 #Mn<Ǐs4%h=wݰqm_|ͤd2Y/ !8xU{;dekjsrIXfͨ#8|M3S&Mǟs&O?97zHI/GaС3;wQ\˦ۖZ5{{u>rð۶9v#V9;h =ߺ}ǝߎ|AqcƪS3>l1crrsi=rd\lGtT\&  VTqMM6n'zDxxÃ5AzlMmxJsg?RSSࠠ>k2KJKG9jĈLwqq=jTxhOxXBvh<8a2&![Rx@EN-bLM%.ԫ].K!%@zipqMշalE!$l=jf6Lo{NKNvԩi5Ԕ2(0pqSqqi)c<) H9},3e IF$3 _XxwMKXnpbbmmZN400=piY#=D~&_?}]QY9>|\~sc8w7_{ƒ_TA7Yn_(_D㎟2d\. mTمLp׿W[}M!zvrL?~lh;3'4xWzZ?"˲!7w q甗קgmӺ2.r̮ޢ(k@qtg$1LpcH=}}Enwmiz;pڅ9WFk\Ơ~л~4~:ef8ڲA߁DM~Vܴ0_t/I+n^`S]ppI/չ! Mjr٬g'iPV@ . ?5zz&Ysϋ7hRGuvt52=O]KUn RpDR1 #J֭Qo6Ӝߖ(v%|wqv1I#I9eWNe:h|t:AϤkUv(߿ͯ.#ص[+j!DC_a`l6Y[ܵ!0 /{/--dKnYEM>$Ib?qrIa\PX!Vc]<&77Q1oh8^XTV( PӺLo9.GnO㶻Xo\.Yfmݶ 481qyM[m>mL&Cu|j޽k֮W(-E%1523v޽fzBYWWkjCCB6n޲iV^w=8ttnܼܹrm{{17o  YDfmش;s,VKpP3g*BCW]mаC }jPFFLtVݸyNdX+Wq:qq¢(n۱cU5 F{ ,9[_XP(6l޲Q۱k5߻\5k566%xL{n4DG>mabHho7ܳgǮ]--oW:i^b&i7]LeU]3;/ Y*-+[rU^A#~㣑KY틿{,Uk?1"9y-ϸϿ*-5`0гi{TDdIi#sf\:(((imUk(c3?߻Ιj_ؘhz_ء'O(I;ק[]oM8AăΙ?eD^~3h^Fڽw߇ ?Qyrƭ[+*efqii 70 *2"*"bӖJ6썷޶;lmo7{Ǎݺ}ǡ!A5 Bh㖭%gB+V48^iK~رc¸q q7"^X⛭vL0A"R```lt߂E465Wߜ'˃X1eO>}BYlYkk[hH0wBy;w﩮fժ c0=##M[F۾:z'?e_/;W^ظgc{2i*/]VШ_7!ƋKϳ˿]T*t148:>R1bxBh/A7ެLMcjjjF ԀVN5LM3}:1Fc'fafNAAH =sߑcl6[d 6uɓbRR NlimE! drcc>v,t:'iʤI@ed!Co{\.>uh2UVUIhۣ""̜165u@BッF% [SnjUTUU!(888::zA*k9R55t&BHN޺}=s >>>]Әfs4{ӦNL+*˲"fLn4 _yc^3O?lX_T\}#BB^xUе~75ZMddl;BC_~ GE1.&`|/>|ppPssnEwX,ANf=}yDPn^^ٹsUvn>GZZZwС#F 0FO}@֖~$Ia{\r\.bAutt`>u:'Lnb5L!$"}Vj4uuf6PGEM[M#G<]vjk7"DVfX6VvQV=x}_bN׎]546WPp:''&IK1C y{?399̙wΕ/$NG|O?}]-soڻϾJTN0~ʤ̽):* !c{g3*vÎU̞mǎڡClشy҄ 5i̞cں::M}CCCc#ƸliN28qɲe/[>g,cObIe>} bw8|^?1oq//Z𰰥+햛 PPXՒ˽wg뮙SPTg߾v1eց zdJKIiljL4iɲ˳OMKٺm[ٹ X zq+}t'88XU|o~C+V0e:4"ye>|(!dС cF̳ i~vo{ ~^ 1ӳ!LgžitiMmmEe%s&=h;Fc-Ou椫ĮmNڳ\DϏՃ.ZQoOU'ͥeeN!ԭz*]4ЏSK.#Z(3h4l縫{@Y0**+*zFQiHqcSԙv+(p8teZ [ZmTvm><ߗ$ 3mwݫVgL6s4|l\w<41QUγvv`z]iw8N>:f $]\Il;h>TίB5Œ x{=sw[UĶ^~u7|||<ϒәA˅MMo &_}WU/45o &;{ (G;a<_-/_KkkUuu@@ a ?.bpP83+ZVL \[rlG1/fb⠱11EG|}}N]jj"#辷wǎ9f16z_߂"eU]C\2 ^7457 O8z<3,44Dojjr"ryn~gΕ3 ޹g\.,5I JΖ657kn55774r2.'/?+dssstTƸxB[Z2u:AAA5E%G#|9fFGE! k`X^y퍒g% mw|;kok?p"GHp87Cp̙ҩ3g&.>t457457͚1!4}TtW;{kמںҲS t<33ȑ7544~rg_~r F!5MRRRaq?+(.)MMG t&'!0̉`Ak[[m]=BHRZAB HƍE]{͜ `@eNKIAiڭ۷GSǤy9L&"|t:J ~Sgrrr?bcB70]RSO5Ckcb\}G|*+;;D [Z[f2_~*+;5k|!RIz J򉍍9v0 K^W_o4Ϟ5DIBf;wyS*?laRƌyW;/˯8P!WHN~W9M[{[m}=!DF}\ڬ y!μi\fN;{d2YSs mvC$ÉDcwUАPqII`@BN) !p:bu]NBHE\h"ooΕ[,!aM&_˅*R qۭzEi))k7lBZ&<4thr7_{c/iSsr+ΖN89n0 B$MM/qsviN'F!d6V7m!ݚGࣅ2:BHsKK``xojjܜ Cݿ1-5N129x扑SSSzz믽PzƆM}|tyY QGL:hDKEV\訨7p]``;KJrq㚚^\ttTxX /zѭ۶B&n̬,3߸i36u!Ckkoܔ:fa;w+(p\Ç ;9uֶ64nl#G'OsE}~} HH=j^_cV$IOqIɚj㣣jjkLTPTjn5oٶp2Ҳ߭nkoWT8n3F&'L&Zg4 2#7-5uΝ6}\ZBb񒼂R96-ٽgC[&އ NDFD̜>uljjfV˖:/ڽogƴi#G$~Wgx `fʤIIZ/J?|;3zRrnnƏj?i^k-۶ 0t.ڳ@[{۩ӧ lڲeАcR,xm8h{yl6Z6.Z>>:zų;NLJuX,rLPH͸˲,q6t!Mӝw[I! DztX,>:~!/(]q!a O>QUFrmz_^#Idj֟e|ďnj%h4jZB pws:F]VUR݆=n (JZumv\&8`=d1BHPtkYv Ah$phjyzkH& PYU1^Kȣ/ï{}?Qя>62w~&YV<[6rzv悛>qR#Vg[P-ޟ%6EvZBj)?ixHKMV 4+M,~~t߭TϱOhܿ4\̉.0;m`& ^B?xȝ_lJ/=w+$"]u 7@8~ӗ³3 p:EQP.}.P7R!G?]P].ׇ-/,?BC1_ЭXq'9"my}N'ͱgXV+Ƹ>fa;::;:0Vw3̴/r{{{qabZVdr\s%gҾM9yy4YGGGssKuui!d67474\MW(EeBK.3^U0F+ 0{8G2p:0do;d3g,ں:նOX  ~wkkk?eҤU5C iDh^{]P<׿MMq篸қ .^.^LNNʘ Aoܲ:"bF$IzVTVLV]7eDF]ϿZs}<.vʕs\\̺ kjkY֛g8sB0FϏ>$IWs!ARq~~~4{0Ba`,޶ !:믋X,O[ ˎl6BHbvΜW_|a~񥌓i5Z?{~\Zjj!|*.r'k}(v!$J_|vQ*>:]Tdo&FA"81EX]Ó߫ۏJ84 y{y8APqY#q@w*yy N3?+ܼ{̬ BP\3{ǎʉIDo>O=cӖXq2;}cF߇ p\9fomlj*[oygiӧNE]߭>rFA< Nj{/^" QC??輫)pJ4gCOo˽wI+cf UUՑz__UPX(9[V$$8NI||tFcCC#DZ(}}sX d*Gkvٹs&9"<\~,*2":* !R^Qc2 Joh0L,""N/A)/4h In--WU___V^ѹ_XT\g0\/2'6WWnmSE4gQQǚ5r7GȽtP˔\n.qC{\\U7 !$`KW#ctE-+@Oٳ&Zݾ~\.PyM0 ^B?xu ׹,M7ݸs罞Fbڦ]߷~ۂV}wziO_lrvzrGG֦p,+ɮց_ .ˡ#7vfݺ 0T*6F_LO_aAǂ%y,w-ԕbZQtt vpwl >\Dž<ׂ t~=&&c*+V!$Kq 6R!Fq488ٷ>&tӧ?r|k>uc~;)S~/CV\ DEF>MI9u˯N?|$,,`p۶UWWdE~v&7WIG |껜I^mZ}>39 Ʀ5#ǎZ6i.8h2͛W^fYÓu;[{guMer ~q1|?ZNIKM8_j+׬]"Q#W^}wH4|ŪU3OST}:ܽgɲ22 kޡC_3{u7Ą_1|fV)s_lL̘ѣ>Аw|׷fX!MMMM~U,~Ѣ۶O4i7 Orwݢ(SHzo7B N+޻/(x쩧?Zx׼˼eZpZf%%߮&;om &N>l3ShKf3Ǣ>u~.s\6mzGd2nA*a@_DanNyBC =TTڬ+_$0III'OJKMA c9 c&f9.6 X99BXJչ.!!T* zsRX\2ix"8 Aa8iM 465M::gWT1r~Eo>a^}fgeg#Kd23_D6͔ѣ_z퍂¢ 3BM&)&:sr,{:'g͟,Ev>0ͧsr̞uEq11F$AFEFVULO;t:$$|+QTezi@ӧo+׽~?W,Yi1aܸqi1ri?_"0 oVjjiyiw7cY>E1 C 0 xf0m֕)hK5kyQxS*,bեų&Џ<ߧgD*ACJگE!IJ,$!x;J>BtuyvWhD?]L臈 ЏAd~:@~:@~:@~:@~:@~:@~:@~:@~:@~:@~:@~:@~:@~:@~:@~:@~:@~:@~:@~:@~:@~:@~:@~:pWz \1ږյ;, ~1BJEC=] XQYQ\R0Ƃ(&I05NS)UVj^iuJbXmVzKWb !$)8(8484`}lp`EQlji  #ؼuۡ OO>q߭q洩Əu8"~8#!$"I$(,f9h }pY^Ӽ+Æ ڬKf|Zڋ >;~#B$L6hӹ91 n4W'L -.=[^UiZSǤDLf(AA~IC zj~|?ٴuI._a۳ :"9N4li)!DDn$ ICavhik:ut􆈰Ih> A :WQ6yD^ݷ_yW.:'瑇 jZmh6nDGcbcJ%!d<RkBCC29˲(z ey䑐ھJ* 8UJ c^G t:bcMZʘ80ehvǴɓcccX NBXiufcZ:]._ب(JkX襀Nj>:L&S L|l 42 t:lPer^s$iu11gKY %N8 0 2z媮  vc$I. B?OsZ~? !Je͆18NTvX,ZF&KhyaFEF,r*Ƥ]M'1,҆q4d2ڜ˲ A0ƈ\A`Y6dVTDdXh(wsg2r&KmIu:-moٜN'BHRU*I:,NgDItk2RR;::Aq,tl6-0(> 7|EkWN cL0p8X5LtJ}_~ gMC3mB# Xϯܙs<镇jXpWЦa0BM͸k6[B1e Я`DhkwxjCu66^uȺGH$˓;# jxt(s$D]O{~>Eo,ޜY1 #vUD#JIXi9'XY?EQ֖֘KaH,DtK"DIZm1FҲL_vT*z~a0B_5ܕZV(6_Џ* Jmw/B?_g_CAy^Tj4˽tY &|D$.FCYml~|!%wXgYs[n-?^y8S)U,BO]6H/W90,2 @~@!DC)w/˻]d2GǵW7)rؼ˲!!^]9B`at1kST$]ζaRSW  iuiaQڍиz$IaY0]hm]=B$<45LXq$@ޜi!1B]Y.ӂ$I" 4@o~&UG(v_lϏEڤg0LgKmr1̝ td.6¡c+Oyoy6q6:E"+8w#=Sa2=FppGKB\&/,X㸲se eYL2L.9c6r\.8c9aP*4L{[܏\^|$ؑ'MFz8Q4'q4 e:q 6Bc @EEߓ$t9Fc}c墣b5Wv0F R|8c BeuUg3 3m򴀀erfWUZmVaڍFza2A;啕V8nlojn*,ٕȁv륭w\v1"Ed4˲NgGϏܭ1JB"euC^uc/-A G9..]wE˞W<~B?Gq;"OgpEѠףjY?޴A}/F1 F'cavN$4ʸ_E BcӉ r8!o`f M͗{AtD QEe%qcQ4B?tGQ*aO~wRZsYHQTuuMe~V.""!B?.zׁ^'os]sqw9swG.7Пdj,˸\i$P((kqV_:sR)81n)!ǩJr4e|~O~:p#m"#%BܙyrBۢ=nB!WT 4HPjA90b10AE:{Y0 eJʚ[Z$IRCkk2e yz,ILD0.yZ>ȣ{oay䑐 ŧyxf+(*JKIEQEFC#WRqؘura^T(.0>:Zdr\GZ'r q[m$I׫Jڽw_$B #IN8Rt:ZP8NJϋ/:}nDRR*%B!ohɜNJԨ5yJj4S:|d4Rh8M}}|BsK~e{ EQꚚ.0 0,4d)cFhcmtI",>t}K.{?{ؽwX|o<$r9  >wg.vf_Ǿ>6n޽wR|B/pgkB=ׯG! %]kh!/jZE\fBe^yE. P^^QrT.B0].>XO.Gdw&'gʕ~~S*%%~Ӧ-?l?웕 bVcliفC量|~}hHǟQ[Wn㦣ǎ _,^H3^B_{gp8ny 5yoɽse9"y̨QNh2FGE9"!>j7sMֶʪjHqs#' }Q٬ǹx>"<|?eGǏF$'!uؐQQO=XTdRhr`ЫUS&rBCc4L>'}/<]€mjnN6,,,+(H4?>ݻ fLN:u-<'O0XQe)'} q%%gNSO} zo~Ӧ׬[W_0ck|h=wt' :^D% VS[[XXT(㯟3GvfZmvf7ͼGIP(եnljDng8x2AOWPh3+u|W8t{qm>, C/h z}'mFAo\$IN?bٮ%PQ{徫sW y} ~ @0r^Rc^alFހaQZ %tEXtdate:create2013-09-27T11:09:27-04:00ֲY`%tEXtdate:modify2013-09-27T11:09:27-04:00tEXtSoftwareShutterc IENDB`selinux-python-3.0/sepolicy/sepolicy/help/users.txt000066400000000000000000000014561356774067000227170ustar00rootroot00000000000000By Default on a SELinux Targeted Policy system, all users login using the unconfined_t user. SELinux has a very powerful concept called confined users. You can setup individual users on your system to login with different SELinux user types. This SELinux User Screen allows you to create/modify SELinux Users and map them to SELinux Roles and MLS/MCS Ranges Default SELinux Users: * Terminal user/ssh - guest_u - No Network, No setuid, no exec in homedir * Browser user/kiosk - xguest_u - Web access ports only. No setuid, no exec in homedir * Full Desktop user - User_u - Full Network, No SETUID. * Confined Admin/Desktop User - Staff_u - Full Network, sudo to admin only, no root password. Usually a confined admin * Unconfined user - unconfined_u (Default) - SELinux does not block access. selinux-python-3.0/sepolicy/sepolicy/interface.py000066400000000000000000000177741356774067000224110ustar00rootroot00000000000000# Copyright (C) 2012 Red Hat # see file 'COPYING' for use and warranty information # # policygentool is a tool for the initial generation of SELinux policy # # This program is free software; you can redistribute it and/or # modify it under the terms of the GNU General Public License as # published by the Free Software Foundation; either version 2 of # the License, or (at your option) any later version. # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program; if not, write to the Free Software # Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA # 02111-1307 USA # # import re import sys import sepolicy ADMIN_TRANSITION_INTERFACE = "_admin$" USER_TRANSITION_INTERFACE = "_role$" __all__ = ['get_all_interfaces', 'get_interfaces_from_xml', 'get_admin', 'get_user', 'get_interface_dict', 'get_interface_format_text', 'get_interface_compile_format_text', 'get_xml_file', 'interface_compile_test'] ## ## I18N ## PROGNAME = "policycoreutils" try: import gettext kwargs = {} if sys.version_info < (3,): kwargs['unicode'] = True gettext.install(PROGNAME, localedir="/usr/share/locale", codeset='utf-8', **kwargs) except: try: import builtins builtins.__dict__['_'] = str except ImportError: import __builtin__ __builtin__.__dict__['_'] = unicode def get_interfaces_from_xml(path): """ Get all interfaces from given xml file""" interfaces_list = [] idict = get_interface_dict(path) for k in idict.keys(): interfaces_list.append(k) return interfaces_list def get_all_interfaces(path=""): from sepolicy import get_methods all_interfaces = [] if not path: all_interfaces = get_methods() else: xml_path = get_xml_file(path) all_interfaces = get_interfaces_from_xml(xml_path) return all_interfaces def get_admin(path=""): """ Get all domains with an admin interface from installed policy.""" """ If xml_path is specified, func returns an admin interface from specified xml file""" admin_list = [] if path: try: xml_path = get_xml_file(path) idict = get_interface_dict(xml_path) for k in idict.keys(): if k.endswith("_admin"): admin_list.append(k) except IOError as e: sys.stderr.write("%s: %s\n" % (e.__class__.__name__, str(e))) sys.exit(1) else: for i in sepolicy.get_methods(): if i.endswith("_admin"): admin_list.append(i.split("_admin")[0]) return admin_list def get_user(path=""): """ Get all domains with SELinux user role interface""" """ If xml_path is specified, func returns an user role interface from specified xml file""" trans_list = [] if path: try: xml_path = get_xml_file(path) idict = get_interface_dict(xml_path) for k in idict.keys(): if k.endswith("_role"): if (("%s_exec_t" % k[:-5]) in sepolicy.get_all_types()): trans_list.append(k) except IOError as e: sys.stderr.write("%s: %s\n" % (e.__class__.__name__, str(e))) sys.exit(1) else: for i in sepolicy.get_methods(): m = re.findall("(.*)%s" % USER_TRANSITION_INTERFACE, i) if len(m) > 0: if "%s_exec_t" % m[0] in sepolicy.get_all_types(): trans_list.append(m[0]) return trans_list interface_dict = None def get_interface_dict(path="/usr/share/selinux/devel/policy.xml"): global interface_dict import os import xml.etree.ElementTree if interface_dict: return interface_dict interface_dict = {} param_list = [] xml_path = """ """ xml_path += path xml_path += """ """ try: if os.path.isfile(path): tree = xml.etree.ElementTree.parse(path) else: tree = xml.etree.ElementTree.fromstring(xml_path) for l in tree.findall("layer"): for m in l.findall("module"): for i in m.getiterator('interface'): for e in i.findall("param"): param_list.append(e.get('name')) interface_dict[(i.get("name"))] = [param_list, (i.find('summary').text), "interface"] param_list = [] for i in m.getiterator('template'): for e in i.findall("param"): param_list.append(e.get('name')) interface_dict[(i.get("name"))] = [param_list, (i.find('summary').text), "template"] param_list = [] except IOError: pass return interface_dict def get_interface_format_text(interface, path="/usr/share/selinux/devel/policy.xml"): idict = get_interface_dict(path) interface_text = "%s(%s) %s" % (interface, ", ".join(idict[interface][0]), " ".join(idict[interface][1].split("\n"))) return interface_text def get_interface_compile_format_text(interfaces_dict, interface): from .templates import test_module param_tmp = [] for i in interfaces_dict[interface][0]: param_tmp.append(test_module.dict_values[i]) interface_text = "%s(%s)\n" % (interface, ", ".join(param_tmp)) return interface_text def generate_compile_te(interface, idict, name="compiletest"): from .templates import test_module te = "" te += re.sub("TEMPLATETYPE", name, test_module.te_test_module) te += get_interface_compile_format_text(idict, interface) return te def get_xml_file(if_file): """ Returns xml format of interfaces for given .if policy file""" import os try: from commands import getstatusoutput except ImportError: from subprocess import getstatusoutput basedir = os.path.dirname(if_file) + "/" filename = os.path.basename(if_file).split(".")[0] rc, output = getstatusoutput("/usr/bin/python3 /usr/share/selinux/devel/include/support/segenxml.py -w -m %s" % (basedir + filename)) if rc != 0: sys.stderr.write("\n Could not proceed selected interface file.\n") sys.stderr.write("\n%s" % output) sys.exit(1) else: return output def interface_compile_test(interface, path="/usr/share/selinux/devel/policy.xml"): exclude_interfaces = ["userdom", "kernel", "corenet", "files", "dev"] exclude_interface_type = ["template"] try: from commands import getstatusoutput except ImportError: from subprocess import getstatusoutput import os policy_files = {'pp': "compiletest.pp", 'te': "compiletest.te", 'fc': "compiletest.fc", 'if': "compiletest.if"} idict = get_interface_dict(path) if not (interface.split("_")[0] in exclude_interfaces or idict[interface][2] in exclude_interface_type): print(_("Compiling %s interface") % interface) try: fd = open(policy_files['te'], "w") fd.write(generate_compile_te(interface, idict)) fd.close() rc, output = getstatusoutput("make -f /usr/share/selinux/devel/Makefile %s" % policy_files['pp']) if rc != 0: sys.stderr.write(output) sys.stderr.write(_("\nCompile test for %s failed.\n") % interface) except EnvironmentError as e: sys.stderr.write(_("\nCompile test for %s has not run. %s\n") % (interface, e)) for v in policy_files.values(): if os.path.exists(v): os.remove(v) else: sys.stderr.write(_("\nCompiling of %s interface is not supported.") % interface) selinux-python-3.0/sepolicy/sepolicy/manpage.py000077500000000000000000001210361356774067000220470ustar00rootroot00000000000000# Copyright (C) 2012-2013 Red Hat # AUTHOR: Dan Walsh # AUTHOR: Miroslav Grepl # see file 'COPYING' for use and warranty information # # semanage is a tool for managing SELinux configuration files # # This program is free software; you can redistribute it and/or # modify it under the terms of the GNU General Public License as # published by the Free Software Foundation; either version 2 of # the License, or (at your option) any later version. # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program; if not, write to the Free Software # Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA # 02111-1307 USA # # __all__ = ['ManPage', 'HTMLManPages', 'manpage_domains', 'manpage_roles', 'gen_domains'] import string import selinux import sepolicy import os import time typealias_types = { "antivirus_t":("amavis_t", "clamd_t", "clamscan_t", "freshclam_t"), "cluster_t":("rgmanager_t", "corosync_t", "aisexec_t", "pacemaker_t"), "svirt_t":("qemu_t"), "httpd_t":("phpfpm_t"), } equiv_dict = {"smbd": ["samba"], "httpd": ["apache"], "virtd": ["virt", "libvirt"], "named": ["bind"], "fsdaemon": ["smartmon"], "mdadm": ["raid"]} equiv_dirs = ["/var"] modules_dict = None def gen_modules_dict(path="/usr/share/selinux/devel/policy.xml"): global modules_dict if modules_dict: return modules_dict import xml.etree.ElementTree modules_dict = {} try: tree = xml.etree.ElementTree.fromstring(sepolicy.policy_xml(path)) for l in tree.findall("layer"): for m in l.findall("module"): name = m.get("name") if name == "user" or name == "unconfined": continue if name == "unprivuser": name = "user" if name == "unconfineduser": name = "unconfined" for b in m.findall("summary"): modules_dict[name] = b.text except IOError: pass return modules_dict users = None users_range = None def get_all_users_info(): global users global users_range if users and users_range: return users, users_range users = [] users_range = {} allusers = [] allusers_info = sepolicy.info(sepolicy.USER) for d in allusers_info: allusers.append(d['name']) if 'range' in d: users_range[d['name'].split("_")[0]] = d['range'] for u in allusers: if u not in ["system_u", "root", "unconfined_u"]: users.append(u.replace("_u", "")) users.sort() return users, users_range all_entrypoints = None def get_entrypoints(): global all_entrypoints if not all_entrypoints: all_entrypoints = next(sepolicy.info(sepolicy.ATTRIBUTE, "entry_type"))["types"] return all_entrypoints domains = None def gen_domains(): global domains if domains: return domains domains = [] for d in sepolicy.get_all_domains(): found = False domain = d[:-2] # if domain + "_exec_t" not in get_entrypoints(): # continue if domain in domains: continue domains.append(domain) for role in sepolicy.get_all_roles(): if role[:-2] in domains or role == "system_r": continue domains.append(role[:-2]) domains.sort() return domains types = None def _gen_types(): global types if types: return types all_types = sepolicy.info(sepolicy.TYPE) types = {} for rec in all_types: try: types[rec["name"]] = rec["attributes"] except: types[rec["name"]] = [] return types def prettyprint(f, trim): return " ".join(f[:-len(trim)].split("_")) # for HTML man pages manpage_domains = [] manpage_roles = [] fedora_releases = ["Fedora17", "Fedora18"] rhel_releases = ["RHEL6", "RHEL7"] def get_alphabet_manpages(manpage_list): alphabet_manpages = dict.fromkeys(string.ascii_letters, []) for i in string.ascii_letters: temp = [] for j in manpage_list: if j.split("/")[-1][0] == i: temp.append(j.split("/")[-1]) alphabet_manpages[i] = temp return alphabet_manpages def convert_manpage_to_html(html_manpage, manpage): try: from commands import getstatusoutput except ImportError: from subprocess import getstatusoutput rc, output = getstatusoutput("/usr/bin/groff -man -Thtml %s 2>/dev/null" % manpage) if rc == 0: print(html_manpage, "has been created") fd = open(html_manpage, 'w') fd.write(output) fd.close() class HTMLManPages: """ Generate a HHTML Manpages on an given SELinux domains """ def __init__(self, manpage_roles, manpage_domains, path, os_version): self.manpage_roles = get_alphabet_manpages(manpage_roles) self.manpage_domains = get_alphabet_manpages(manpage_domains) self.os_version = os_version self.old_path = path + "/" self.new_path = self.old_path + self.os_version + "/" if self.os_version in fedora_releases or self.os_version in rhel_releases: self.__gen_html_manpages() else: print("SELinux HTML man pages can not be generated for this %s" % os_version) exit(1) def __gen_html_manpages(self): self._write_html_manpage() self._gen_index() self._gen_body() self._gen_css() def _write_html_manpage(self): if not os.path.isdir(self.new_path): os.mkdir(self.new_path) for domain in self.manpage_domains.values(): if len(domain): for d in domain: convert_manpage_to_html((self.new_path + d.rsplit("_selinux", 1)[0] + ".html"), self.old_path + d) for role in self.manpage_roles.values(): if len(role): for r in role: convert_manpage_to_html((self.new_path + r.rsplit("_selinux", 1)[0] + ".html"), self.old_path + r) def _gen_index(self): index = self.old_path + "index.html" fd = open(index, 'w') fd.write(""" SELinux man pages online

SELinux man pages



Fedora or Red Hat Enterprise Linux Man Pages.


Fedora

""")
        for f in fedora_releases:
            fd.write("""
%s - SELinux man pages for %s """ % (f, f, f, f))

        fd.write("""

RHEL

""")
        for r in rhel_releases:
            fd.write("""
%s - SELinux man pages for %s """ % (r, r, r, r))

        fd.write("""
""") fd.close() print("%s has been created" % index) def _gen_body(self): html = self.new_path + self.os_version + ".html" fd = open(html, 'w') fd.write(""" Linux man-pages online for Fedora18

SELinux man pages for Fedora18


SELinux roles

""") for letter in self.manpage_roles: if len(self.manpage_roles[letter]): fd.write(""" %s""" % (letter, letter)) fd.write("""
""")
        rolename_body = ""
        for letter in self.manpage_roles:
            if len(self.manpage_roles[letter]):
                rolename_body += "

" for r in self.manpage_roles[letter]: rolename = r.rsplit("_selinux", 1)[0] rolename_body += "%s_selinux(8) - Security Enhanced Linux Policy for the %s SELinux user\n" % (letter, rolename, rolename, rolename) fd.write("""%s


SELinux domains

""" % rolename_body) for letter in self.manpage_domains: if len(self.manpage_domains[letter]): fd.write(""" %s """ % (letter, letter)) fd.write("""
""")
        domainname_body = ""
        for letter in self.manpage_domains:
            if len(self.manpage_domains[letter]):
                domainname_body += "

" for r in self.manpage_domains[letter]: domainname = r.rsplit("_selinux", 1)[0] domainname_body += "%s_selinux(8) - Security Enhanced Linux Policy for the %s SELinux processes\n" % (letter, domainname, domainname, domainname) fd.write("""%s

""" % domainname_body) fd.close() print("%s has been created" % html) def _gen_css(self): style_css = self.old_path + "style.css" fd = open(style_css, 'w') fd.write(""" html, body { background-color: #fcfcfc; font-family: arial, sans-serif; font-size: 110%; color: #333; } h1, h2, h3, h4, h5, h5 { color: #2d7c0b; font-family: arial, sans-serif; margin-top: 25px; } a { color: #336699; text-decoration: none; } a:visited { color: #4488bb; } a:hover, a:focus, a:active { color: #07488A; text-decoration: none; } a.func { color: red; text-decoration: none; } a.file { color: red; text-decoration: none; } pre.code { background-color: #f4f0f4; // font-family: monospace, courier; font-size: 110%; margin-left: 0px; margin-right: 60px; padding-top: 5px; padding-bottom: 5px; padding-left: 8px; padding-right: 8px; border: 1px solid #AADDAA; } .url { font-family: serif; font-style: italic; color: #440064; } """) fd.close() print("%s has been created" % style_css) class ManPage: """ Generate a Manpage on an SELinux domain in the specified path """ modules_dict = None enabled_str = ["Disabled", "Enabled"] def __init__(self, domainname, path="/tmp", root="/", source_files=False, html=False): self.html = html self.source_files = source_files self.root = root self.portrecs = sepolicy.gen_port_dict()[0] self.domains = gen_domains() self.all_domains = sepolicy.get_all_domains() self.all_attributes = sepolicy.get_all_attributes() self.all_bools = sepolicy.get_all_bools() self.all_port_types = sepolicy.get_all_port_types() self.all_roles = sepolicy.get_all_roles() self.all_users = get_all_users_info()[0] self.all_users_range = get_all_users_info()[1] self.all_file_types = sepolicy.get_all_file_types() self.role_allows = sepolicy.get_all_role_allows() self.types = _gen_types() if self.source_files: self.fcpath = self.root + "file_contexts" else: self.fcpath = self.root + selinux.selinux_file_context_path() self.fcdict = sepolicy.get_fcdict(self.fcpath) if not os.path.exists(path): os.makedirs(path) self.path = path if self.source_files: self.xmlpath = self.root + "policy.xml" else: self.xmlpath = self.root + "/usr/share/selinux/devel/policy.xml" self.booleans_dict = sepolicy.gen_bool_dict(self.xmlpath) self.domainname, self.short_name = sepolicy.gen_short_name(domainname) self.type = self.domainname + "_t" self._gen_bools() self.man_page_path = "%s/%s_selinux.8" % (path, self.domainname) self.fd = open(self.man_page_path, 'w') if self.domainname + "_r" in self.all_roles: self.__gen_user_man_page() if self.html: manpage_roles.append(self.man_page_path) else: if self.html: manpage_domains.append(self.man_page_path) self.__gen_man_page() self.fd.close() for k in equiv_dict.keys(): if k == self.domainname: for alias in equiv_dict[k]: self.__gen_man_page_link(alias) def _gen_bools(self): self.bools = [] self.domainbools = [] types = [self.type] if self.domainname in equiv_dict: for t in equiv_dict[self.domainname]: if t + "_t" in self.all_domains: types.append(t + "_t") for t in types: domainbools, bools = sepolicy.get_bools(t) self.bools += bools self.domainbools += domainbools self.bools.sort() self.domainbools.sort() def get_man_page_path(self): return self.man_page_path def __gen_user_man_page(self): self.role = self.domainname + "_r" if not self.modules_dict: self.modules_dict = gen_modules_dict(self.xmlpath) try: self.desc = self.modules_dict[self.domainname] except: self.desc = "%s user role" % self.domainname if self.domainname in self.all_users: self.attributes = next(sepolicy.info(sepolicy.TYPE, (self.type)))["attributes"] self._user_header() self._user_attribute() self._can_sudo() self._xwindows_login() # until a new policy build with login_userdomain attribute #self.terminal_login() self._network() self._booleans() self._home_exec() self._transitions() else: self._role_header() self._booleans() self._port_types() self._mcs_types() self._writes() self._footer() def __gen_man_page_link(self, alias): path = "%s/%s_selinux.8" % (self.path, alias) self.fd = open("%s/%s_selinux.8" % (self.path, alias), 'w') self.fd.write(".so man8/%s_selinux.8" % self.domainname) self.fd.close() print(path) def __gen_man_page(self): self.anon_list = [] self.attributes = {} self.ptypes = [] self._get_ptypes() for domain_type in self.ptypes: try: if typealias_types[domain_type]: fd = self.fd man_page_path = self.man_page_path for t in typealias_types[domain_type]: self._typealias_gen_man(t) self.fd = fd self.man_page_path = man_page_path except KeyError: continue self.attributes[domain_type] = next(sepolicy.info(sepolicy.TYPE, ("%s") % domain_type))["attributes"] self._header() self._entrypoints() self._process_types() self._mcs_types() self._booleans() self._nsswitch_domain() self._port_types() self._writes() self._file_context() self._public_content() self._footer() def _get_ptypes(self): for f in self.all_domains: if f.startswith(self.short_name) or f.startswith(self.domainname): self.ptypes.append(f) def _typealias_gen_man(self, t): self.man_page_path = "%s/%s_selinux.8" % (self.path, t[:-2]) self.ports = [] self.booltext = "" self.fd = open(self.man_page_path, 'w') self._typealias(t[:-2]) self._footer() self.fd.close() def _typealias(self,typealias): self.fd.write('.TH "%(typealias)s_selinux" "8" "%(date)s" "%(typealias)s" "SELinux Policy %(typealias)s"' % {'typealias':typealias, 'date': time.strftime("%y-%m-%d")}) self.fd.write(r""" .SH "NAME" %(typealias)s_selinux \- Security Enhanced Linux Policy for the %(typealias)s processes .SH "DESCRIPTION" %(typealias)s_t SELinux domain type is now associated with %(domainname)s domain type (%(domainname)s_t). """ % {'typealias':typealias, 'domainname':self.domainname}) self.fd.write(r""" Please see .B %(domainname)s_selinux man page for more details. """ % {'domainname':self.domainname}) def _header(self): self.fd.write('.TH "%(domainname)s_selinux" "8" "%(date)s" "%(domainname)s" "SELinux Policy %(domainname)s"' % {'domainname': self.domainname, 'date': time.strftime("%y-%m-%d")}) self.fd.write(r""" .SH "NAME" %(domainname)s_selinux \- Security Enhanced Linux Policy for the %(domainname)s processes .SH "DESCRIPTION" Security-Enhanced Linux secures the %(domainname)s processes via flexible mandatory access control. The %(domainname)s processes execute with the %(domainname)s_t SELinux type. You can check if you have these processes running by executing the \fBps\fP command with the \fB\-Z\fP qualifier. For example: .B ps -eZ | grep %(domainname)s_t """ % {'domainname': self.domainname}) def _format_boolean_desc(self, b): desc = self.booleans_dict[b][2][0].lower() + self.booleans_dict[b][2][1:] if desc[-1] == ".": desc = desc[:-1] return desc def _gen_bool_text(self): booltext = "" for b, enabled in self.domainbools + self.bools: if b.endswith("anon_write") and b not in self.anon_list: self.anon_list.append(b) else: if b not in self.booleans_dict: continue booltext += """ .PP If you want to %s, you must turn on the %s boolean. %s by default. .EX .B setsebool -P %s 1 .EE """ % (self._format_boolean_desc(b), b, self.enabled_str[enabled], b) return booltext def _booleans(self): self.booltext = self._gen_bool_text() if self.booltext != "": self.fd.write(""" .SH BOOLEANS SELinux policy is customizable based on least access required. %s policy is extremely flexible and has several booleans that allow you to manipulate the policy and run %s with the tightest access possible. """ % (self.domainname, self.domainname)) self.fd.write(self.booltext) def _nsswitch_domain(self): nsswitch_types = [] nsswitch_booleans = ['authlogin_nsswitch_use_ldap', 'kerberos_enabled'] nsswitchbooltext = "" for k in self.attributes.keys(): if "nsswitch_domain" in self.attributes[k]: nsswitch_types.append(k) if len(nsswitch_types): self.fd.write(""" .SH NSSWITCH DOMAIN """) for b in nsswitch_booleans: nsswitchbooltext += """ .PP If you want to %s for the %s, you must turn on the %s boolean. .EX .B setsebool -P %s 1 .EE """ % (self._format_boolean_desc(b), (", ".join(nsswitch_types)), b, b) self.fd.write(nsswitchbooltext) def _process_types(self): if len(self.ptypes) == 0: return self.fd.write(r""" .SH PROCESS TYPES SELinux defines process types (domains) for each process running on the system .PP You can see the context of a process using the \fB\-Z\fP option to \fBps\bP .PP Policy governs the access confined processes have to files. SELinux %(domainname)s policy is very flexible allowing users to setup their %(domainname)s processes in as secure a method as possible. .PP The following process types are defined for %(domainname)s: """ % {'domainname': self.domainname}) self.fd.write(""" .EX .B %s .EE""" % ", ".join(self.ptypes)) self.fd.write(""" .PP Note: .B semanage permissive -a %(domainname)s_t can be used to make the process type %(domainname)s_t permissive. SELinux does not deny access to permissive process types, but the AVC (SELinux denials) messages are still generated. """ % {'domainname': self.domainname}) def _port_types(self): self.ports = [] for f in self.all_port_types: if f.startswith(self.short_name) or f.startswith(self.domainname): self.ports.append(f) if len(self.ports) == 0: return self.fd.write(""" .SH PORT TYPES SELinux defines port types to represent TCP and UDP ports. .PP You can see the types associated with a port by using the following command: .B semanage port -l .PP Policy governs the access confined processes have to these ports. SELinux %(domainname)s policy is very flexible allowing users to setup their %(domainname)s processes in as secure a method as possible. .PP The following port types are defined for %(domainname)s:""" % {'domainname': self.domainname}) for p in self.ports: self.fd.write(""" .EX .TP 5 .B %s .TP 10 .EE """ % p) once = True for prot in ("tcp", "udp"): if (p, prot) in self.portrecs: if once: self.fd.write(""" Default Defined Ports:""") once = False self.fd.write(r""" %s %s .EE""" % (prot, ",".join(self.portrecs[(p, prot)]))) def _file_context(self): flist = [] mpaths = [] for f in self.all_file_types: if f.startswith(self.domainname): flist.append(f) if f in self.fcdict: mpaths = mpaths + self.fcdict[f]["regex"] if len(mpaths) == 0: return mpaths.sort() mdirs = {} for mp in mpaths: found = False for md in mdirs: if mp.startswith(md): mdirs[md].append(mp) found = True break if not found: for e in equiv_dirs: if mp.startswith(e) and mp.endswith('(/.*)?'): mdirs[mp[:-6]] = [] break equiv = [] for m in mdirs: if len(mdirs[m]) > 0: equiv.append(m) self.fd.write(r""" .SH FILE CONTEXTS SELinux requires files to have an extended attribute to define the file type. .PP You can see the context of a file using the \fB\-Z\fP option to \fBls\bP .PP Policy governs the access confined processes have to these files. SELinux %(domainname)s policy is very flexible allowing users to setup their %(domainname)s processes in as secure a method as possible. .PP """ % {'domainname': self.domainname}) if len(equiv) > 0: self.fd.write(r""" .PP .B EQUIVALENCE DIRECTORIES """) for e in equiv: self.fd.write(r""" .PP %(domainname)s policy stores data with multiple different file context types under the %(equiv)s directory. If you would like to store the data in a different directory you can use the semanage command to create an equivalence mapping. If you wanted to store this data under the /srv directory you would execute the following command: .PP .B semanage fcontext -a -e %(equiv)s /srv/%(alt)s .br .B restorecon -R -v /srv/%(alt)s .PP """ % {'domainname': self.domainname, 'equiv': e, 'alt': e.split('/')[-1]}) self.fd.write(r""" .PP .B STANDARD FILE CONTEXT SELinux defines the file context types for the %(domainname)s, if you wanted to store files with these types in a diffent paths, you need to execute the semanage command to sepecify alternate labeling and then use restorecon to put the labels on disk. .B semanage fcontext -a -t %(type)s '/srv/%(domainname)s/content(/.*)?' .br .B restorecon -R -v /srv/my%(domainname)s_content Note: SELinux often uses regular expressions to specify labels that match multiple files. """ % {'domainname': self.domainname, "type": flist[0]}) self.fd.write(r""" .I The following file types are defined for %(domainname)s: """ % {'domainname': self.domainname}) flist.sort() for f in flist: self.fd.write(""" .EX .PP .B %s .EE - %s """ % (f, sepolicy.get_description(f))) if f in self.fcdict: plural = "" if len(self.fcdict[f]["regex"]) > 1: plural = "s" self.fd.write(""" .br .TP 5 Path%s: %s""" % (plural, self.fcdict[f]["regex"][0])) for x in self.fcdict[f]["regex"][1:]: self.fd.write(", %s" % x) self.fd.write(""" .PP Note: File context can be temporarily modified with the chcon command. If you want to permanently change the file context you need to use the .B semanage fcontext command. This will modify the SELinux labeling database. You will need to use .B restorecon to apply the labels. """) def _see_also(self): ret = "" for d in self.domains: if d == self.domainname: continue if d.startswith(self.short_name): ret += ", %s_selinux(8)" % d if d.startswith(self.domainname + "_"): ret += ", %s_selinux(8)" % d self.fd.write(ret) def _public_content(self): if len(self.anon_list) > 0: self.fd.write(""" .SH SHARING FILES If you want to share files with multiple domains (Apache, FTP, rsync, Samba), you can set a file context of public_content_t and public_content_rw_t. These context allow any of the above domains to read the content. If you want a particular domain to write to the public_content_rw_t domain, you must set the appropriate boolean. .TP Allow %(domainname)s servers to read the /var/%(domainname)s directory by adding the public_content_t file type to the directory and by restoring the file type. .PP .B semanage fcontext -a -t public_content_t "/var/%(domainname)s(/.*)?" .br .B restorecon -F -R -v /var/%(domainname)s .pp .TP Allow %(domainname)s servers to read and write /var/%(domainname)s/incoming by adding the public_content_rw_t type to the directory and by restoring the file type. You also need to turn on the %(domainname)s_anon_write boolean. .PP .B semanage fcontext -a -t public_content_rw_t "/var/%(domainname)s/incoming(/.*)?" .br .B restorecon -F -R -v /var/%(domainname)s/incoming .br .B setsebool -P %(domainname)s_anon_write 1 """ % {'domainname': self.domainname}) for b in self.anon_list: desc = self.booleans_dict[b][2][0].lower() + self.booleans_dict[b][2][1:] self.fd.write(""" .PP If you want to %s, you must turn on the %s boolean. .EX .B setsebool -P %s 1 .EE """ % (desc, b, b)) def _footer(self): self.fd.write(""" .SH "COMMANDS" .B semanage fcontext can also be used to manipulate default file context mappings. .PP .B semanage permissive can also be used to manipulate whether or not a process type is permissive. .PP .B semanage module can also be used to enable/disable/install/remove policy modules. """) if len(self.ports) > 0: self.fd.write(""" .B semanage port can also be used to manipulate the port definitions """) if self.booltext != "": self.fd.write(""" .B semanage boolean can also be used to manipulate the booleans """) self.fd.write(""" .PP .B system-config-selinux is a GUI tool available to customize SELinux policy settings. .SH AUTHOR This manual page was auto-generated using .B "sepolicy manpage". .SH "SEE ALSO" selinux(8), %s(8), semanage(8), restorecon(8), chcon(1), sepolicy(8)""" % (self.domainname)) if self.booltext != "": self.fd.write(", setsebool(8)") self._see_also() def _valid_write(self, check, attributes): if check in [self.type, "domain"]: return False if check.endswith("_t"): for a in attributes: if a in self.types[check]: return False return True def _entrypoints(self): entrypoints = [x['target'] for x in filter(lambda y: y['source'] == self.type and y['class'] == 'file' and 'entrypoint' in y['permlist'], sepolicy.get_all_allow_rules() )] if len(entrypoints) == 0: return self.fd.write(""" .SH "ENTRYPOINTS" """) if len(entrypoints) > 1: entrypoints_str = "\\fB%s\\fP file types" % ", ".join(entrypoints) else: entrypoints_str = "\\fB%s\\fP file type" % entrypoints[0] self.fd.write(""" The %s_t SELinux type can be entered via the %s. The default entrypoint paths for the %s_t domain are the following: """ % (self.domainname, entrypoints_str, self.domainname)) if "bin_t" in entrypoints: entrypoints.remove("bin_t") self.fd.write(""" All executables with the default executable label, usually stored in /usr/bin and /usr/sbin.""") paths = [] for entrypoint in entrypoints: if entrypoint in self.fcdict: paths += self.fcdict[entrypoint]["regex"] self.fd.write(""" %s""" % ", ".join(paths)) def _mcs_types(self): try: mcs_constrained_type = next(sepolicy.info(sepolicy.ATTRIBUTE, "mcs_constrained_type")) except StopIteration: return if self.type not in mcs_constrained_type['types']: return self.fd.write (""" .SH "MCS Constrained" The SELinux process type %(type)s_t is an MCS (Multi Category Security) constrained type. Sometimes this separation is referred to as sVirt. These types are usually used for securing multi-tenant environments, such as virtualization, containers or separation of users. The tools used to launch MCS types, pick out a different MCS label for each process group. For example one process might be launched with %(type)s_t:s0:c1,c2, and another process launched with %(type)s_t:s0:c3,c4. The SELinux kernel only allows these processes can only write to content with a matching MCS label, or a MCS Label of s0. A process running with the MCS level of s0:c1,c2 is not allowed to write to content with the MCS label of s0:c3,c4 """ % {'type': self.domainname}) def _writes(self): # add assigned attributes src_list = [self.type] try: src_list += list(filter(lambda x: x['name'] == self.type, sepolicy.get_all_types_info()))[0]['attributes'] except: pass permlist = list(filter(lambda x: x['source'] in src_list and set(['open', 'write']).issubset(x['permlist']) and x['class'] == 'file', sepolicy.get_all_allow_rules())) if permlist is None or len(permlist) == 0: return all_writes = [] attributes = ["proc_type", "sysctl_type"] for i in permlist: if self._valid_write(i['target'], attributes): if i['target'] not in all_writes: all_writes.append(i['target']) if len(all_writes) == 0: return self.fd.write(""" .SH "MANAGED FILES" """) self.fd.write(""" The SELinux process type %s_t can manage files labeled with the following file types. The paths listed are the default paths for these file types. Note the processes UID still need to have DAC permissions. """ % self.domainname) all_writes.sort() if "file_type" in all_writes: all_writes = ["file_type"] for f in all_writes: self.fd.write(""" .br .B %s """ % f) if f in self.fcdict: for path in self.fcdict[f]["regex"]: self.fd.write("""\t%s .br """ % path) def _get_users_range(self): if self.domainname in self.all_users_range: return self.all_users_range[self.domainname] return "s0" def _user_header(self): self.fd.write('.TH "%(type)s_selinux" "8" "%(type)s" "mgrepl@redhat.com" "%(type)s SELinux Policy documentation"' % {'type': self.domainname}) self.fd.write(r""" .SH "NAME" %(user)s_u \- \fB%(desc)s\fP - Security Enhanced Linux Policy .SH DESCRIPTION \fB%(user)s_u\fP is an SELinux User defined in the SELinux policy. SELinux users have default roles, \fB%(user)s_r\fP. The default role has a default type, \fB%(user)s_t\fP, associated with it. The SELinux user will usually login to a system with a context that looks like: .B %(user)s_u:%(user)s_r:%(user)s_t:%(range)s Linux users are automatically assigned an SELinux users at login. Login programs use the SELinux User to assign initial context to the user's shell. SELinux policy uses the context to control the user's access. By default all users are assigned to the SELinux user via the \fB__default__\fP flag On Targeted policy systems the \fB__default__\fP user is assigned to the \fBunconfined_u\fP SELinux user. You can list all Linux User to SELinux user mapping using: .B semanage login -l If you wanted to change the default user mapping to use the %(user)s_u user, you would execute: .B semanage login -m -s %(user)s_u __default__ """ % {'desc': self.desc, 'type': self.type, 'user': self.domainname, 'range': self._get_users_range()}) if "login_userdomain" in self.attributes and "login_userdomain" in self.all_attributes: self.fd.write(""" If you want to map the one Linux user (joe) to the SELinux user %(user)s, you would execute: .B $ semanage login -a -s %(user)s_u joe """ % {'user': self.domainname}) def _can_sudo(self): sudotype = "%s_sudo_t" % self.domainname self.fd.write(""" .SH SUDO """) if sudotype in self.types: role = self.domainname + "_r" self.fd.write(""" The SELinux user %(user)s can execute sudo. You can set up sudo to allow %(user)s to transition to an administrative domain: Add one or more of the following record to sudoers using visudo. """ % {'user': self.domainname}) for adminrole in self.role_allows[role]: self.fd.write(""" USERNAME ALL=(ALL) ROLE=%(admin)s_r TYPE=%(admin)s_t COMMAND .br sudo will run COMMAND as %(user)s_u:%(admin)s_r:%(admin)s_t:LEVEL """ % {'admin': adminrole[:-2], 'user': self.domainname}) self.fd.write(""" You might also need to add one or more of these new roles to your SELinux user record. List the SELinux roles your SELinux user can reach by executing: .B $ semanage user -l |grep selinux_name Modify the roles list and add %(user)s_r to this list. .B $ semanage user -m -R '%(roles)s' %(user)s_u For more details you can see semanage man page. """ % {'user': self.domainname, "roles": " ".join([role] + self.role_allows[role])}) else: self.fd.write(""" The SELinux type %s_t is not allowed to execute sudo. """ % self.domainname) def _user_attribute(self): self.fd.write(""" .SH USER DESCRIPTION """) if "unconfined_usertype" in self.attributes: self.fd.write(""" The SELinux user %s_u is an unconfined user. It means that a mapped Linux user to this SELinux user is supposed to be allow all actions. """ % self.domainname) if "unpriv_userdomain" in self.attributes: self.fd.write(""" The SELinux user %s_u is defined in policy as a unprivileged user. SELinux prevents unprivileged users from doing administration tasks without transitioning to a different role. """ % self.domainname) if "admindomain" in self.attributes: self.fd.write(""" The SELinux user %s_u is an admin user. It means that a mapped Linux user to this SELinux user is intended for administrative actions. Usually this is assigned to a root Linux user. """ % self.domainname) def _xwindows_login(self): if "x_domain" in self.all_attributes: self.fd.write(""" .SH X WINDOWS LOGIN """) if "x_domain" in self.attributes: self.fd.write(""" The SELinux user %s_u is able to X Windows login. """ % self.domainname) else: self.fd.write(""" The SELinux user %s_u is not able to X Windows login. """ % self.domainname) def _terminal_login(self): if "login_userdomain" in self.all_attributes: self.fd.write(""" .SH TERMINAL LOGIN """) if "login_userdomain" in self.attributes: self.fd.write(""" The SELinux user %s_u is able to terminal login. """ % self.domainname) else: self.fd.write(""" The SELinux user %s_u is not able to terminal login. """ % self.domainname) def _network(self): from sepolicy import network self.fd.write(""" .SH NETWORK """) for net in ("tcp", "udp"): portdict = network.get_network_connect(self.type, net, "name_bind") if len(portdict) > 0: self.fd.write(""" .TP The SELinux user %s_u is able to listen on the following %s ports. """ % (self.domainname, net)) for p in portdict: for t, ports in portdict[p]: self.fd.write(""" .B %s """ % ",".join(ports)) portdict = network.get_network_connect(self.type, "tcp", "name_connect") if len(portdict) > 0: self.fd.write(""" .TP The SELinux user %s_u is able to connect to the following tcp ports. """ % (self.domainname)) for p in portdict: for t, ports in portdict[p]: self.fd.write(""" .B %s """ % ",".join(ports)) def _home_exec(self): permlist = list(filter(lambda x: x['source'] == self.type and x['target'] == 'user_home_type' and x['class'] == 'file' and set(['ioctl', 'read', 'getattr', 'execute', 'execute_no_trans', 'open']).issubset(set(x['permlist'])), sepolicy.get_all_allow_rules())) self.fd.write(""" .SH HOME_EXEC """) if permlist is not None: self.fd.write(""" The SELinux user %s_u is able execute home content files. """ % self.domainname) else: self.fd.write(""" The SELinux user %s_u is not able execute home content files. """ % self.domainname) def _transitions(self): self.fd.write(r""" .SH TRANSITIONS Three things can happen when %(type)s attempts to execute a program. \fB1.\fP SELinux Policy can deny %(type)s from executing the program. .TP \fB2.\fP SELinux Policy can allow %(type)s to execute the program in the current user type. Execute the following to see the types that the SELinux user %(type)s can execute without transitioning: .B sesearch -A -s %(type)s -c file -p execute_no_trans .TP \fB3.\fP SELinux can allow %(type)s to execute the program and transition to a new type. Execute the following to see the types that the SELinux user %(type)s can execute and transition: .B $ sesearch -A -s %(type)s -c process -p transition """ % {'user': self.domainname, 'type': self.type}) def _role_header(self): self.fd.write('.TH "%(user)s_selinux" "8" "%(user)s" "mgrepl@redhat.com" "%(user)s SELinux Policy documentation"' % {'user': self.domainname}) self.fd.write(r""" .SH "NAME" %(user)s_r \- \fB%(desc)s\fP - Security Enhanced Linux Policy .SH DESCRIPTION SELinux supports Roles Based Access Control (RBAC), some Linux roles are login roles, while other roles need to be transition into. .I Note: Examples in this man page will use the .B staff_u SELinux user. Non login roles are usually used for administrative tasks. For example, tasks that require root privileges. Roles control which types a user can run processes with. Roles often have default types assigned to them. The default type for the %(user)s_r role is %(user)s_t. The .B newrole program to transition directly to this role. .B newrole -r %(user)s_r -t %(user)s_t .B sudo is the preferred method to do transition from one role to another. You setup sudo to transition to %(user)s_r by adding a similar line to the /etc/sudoers file. USERNAME ALL=(ALL) ROLE=%(user)s_r TYPE=%(user)s_t COMMAND .br sudo will run COMMAND as staff_u:%(user)s_r:%(user)s_t:LEVEL When using a non login role, you need to setup SELinux so that your SELinux user can reach %(user)s_r role. Execute the following to see all of the assigned SELinux roles: .B semanage user -l You need to add %(user)s_r to the staff_u user. You could setup the staff_u user to be able to use the %(user)s_r role with a command like: .B $ semanage user -m -R 'staff_r system_r %(user)s_r' staff_u """ % {'desc': self.desc, 'user': self.domainname}) troles = [] for i in self.role_allows: if self.domainname + "_r" in self.role_allows[i]: troles.append(i) if len(troles) > 0: plural = "" if len(troles) > 1: plural = "s" self.fd.write(""" SELinux policy also controls which roles can transition to a different role. You can list these rules using the following command. .B search --role_allow SELinux policy allows the %s role%s can transition to the %s_r role. """ % (", ".join(troles), plural, self.domainname)) selinux-python-3.0/sepolicy/sepolicy/network.py000077500000000000000000000053721356774067000221340ustar00rootroot00000000000000# Copyright (C) 2012 Red Hat # see file 'COPYING' for use and warranty information # # setrans is a tool for analyzing process transitions in SELinux policy # # This program is free software; you can redistribute it and/or # modify it under the terms of the GNU General Public License as # published by the Free Software Foundation; either version 2 of # the License, or (at your option) any later version. # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program; if not, write to the Free Software # Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA # 02111-1307 USA # # import sepolicy def get_types(src, tclass, perm, check_bools=False): allows = sepolicy.search([sepolicy.ALLOW], {sepolicy.SOURCE: src, sepolicy.CLASS: tclass, sepolicy.PERMS: perm}) nlist = [] if allows: for i in map(lambda y: y[sepolicy.TARGET], filter(lambda x: set(perm).issubset(x[sepolicy.PERMS]) and (not check_bools or x["enabled"]), allows)): if i not in nlist: nlist.append(i) return nlist def get_network_connect(src, protocol, perm, check_bools=False): portrecs, portrecsbynum = sepolicy.gen_port_dict() d = {} tlist = get_types(src, "%s_socket" % protocol, [perm], check_bools) if len(tlist) > 0: d[(src, protocol, perm)] = [] for i in tlist: if i == "ephemeral_port_type": if "unreserved_port_type" in tlist: continue i = "ephemeral_port_t" if i == "unreserved_port_t": if "unreserved_port_type" in tlist: continue if "port_t" in tlist: continue if i == "port_t": d[(src, protocol, perm)].append((i, ["all ports with out defined types"])) if i == "port_type": d[(src, protocol, perm)].append((i, ["all ports"])) elif i == "unreserved_port_type": d[(src, protocol, perm)].append((i, ["all ports > 1024"])) elif i == "reserved_port_type": d[(src, protocol, perm)].append((i, ["all ports < 1024"])) elif i == "rpc_port_type": d[(src, protocol, perm)].append((i, ["all ports > 500 and < 1024"])) else: try: d[(src, protocol, perm)].append((i, portrecs[(i, protocol)])) except KeyError: pass return d selinux-python-3.0/sepolicy/sepolicy/sedbus.py000066400000000000000000000033241356774067000217200ustar00rootroot00000000000000import sys import dbus import dbus.service import dbus.mainloop.glib from slip.dbus import polkit class SELinuxDBus (object): def __init__(self): self.bus = dbus.SystemBus() self.dbus_object = self.bus.get_object("org.selinux", "/org/selinux/object") @polkit.enable_proxy def semanage(self, buf): ret = self.dbus_object.semanage(buf, dbus_interface="org.selinux") return ret @polkit.enable_proxy def restorecon(self, path): ret = self.dbus_object.restorecon(path, dbus_interface="org.selinux") return ret @polkit.enable_proxy def setenforce(self, value): ret = self.dbus_object.setenforce(value, dbus_interface="org.selinux") return ret @polkit.enable_proxy def customized(self): ret = self.dbus_object.customized(dbus_interface="org.selinux") return ret @polkit.enable_proxy def semodule_list(self): ret = self.dbus_object.semodule_list(dbus_interface="org.selinux") return ret @polkit.enable_proxy def relabel_on_boot(self, value): ret = self.dbus_object.relabel_on_boot(value, dbus_interface="org.selinux") return ret @polkit.enable_proxy def change_default_mode(self, value): ret = self.dbus_object.change_default_mode(value, dbus_interface="org.selinux") return ret @polkit.enable_proxy def change_default_policy(self, value): ret = self.dbus_object.change_default_policy(value, dbus_interface="org.selinux") return ret if __name__ == "__main__": try: dbus_proxy = SELinuxDBus() resp = dbus_proxy.setenforce(int(sys.argv[1])) print(resp) except dbus.DBusException as e: print(e) selinux-python-3.0/sepolicy/sepolicy/sepolicy.glade000066400000000000000000011513311356774067000227110ustar00rootroot00000000000000 False 265 100 False True False vertical Applications True False False False none False 0 False False 0 True False 10 210 True True Select domain gtk-find False False False True 10 0 True True 1 True False 10 0 10 Advanced Search >> True True True 2 File Equivalence True True True none False 0 True True 3 Users True True True none False 0 True True 4 System True True True none False 0 True True 5 False 5 GtkFileChooserDialog True normal save False vertical False False True end 0 True False Select True True True False True end 0 Cancel True True True False True end 1 False True 2 application_liststore advanced_filter application_files_treestore application_files_filter boolean_liststore boolean_filter False popup False True center-on-parent 440 250 SELinux_window True False vertical True False The entry that was entered is incorrect. Please try again in the ex:/.../... format. True True True 0 True False True False True True 0 Retry True True True False False 1 True False True True 2 False False 1 executable_files_treestore executable_files_filter file_equiv_liststore False Network Port Definitions False True center-on-parent SELinux_window True False vertical True False 0 10 Add file Equivalence Mapping. Mapping will be created when Update is applied. fill True True True 0 True False 3 2 True False 0 10 Path True True Specify a new SELinux user name. By convention SELinux User names usually end in an _u. False False Enter the path to which you want to setup an equivalence label. 1 2 True False 0 10 Equivalence Path 1 2 True False Save to update True True True False True end 0 Cancel True True True False True end 1 1 2 2 3 True True Specify the mapping between the new path and the equivalence path. Everything under this new path will be labeled as if they were under the equivalence path. False False 1 2 1 2 True True 1 file_equiv_filter file_transitions_liststore file_transitions_filter False Add a file False True center-on-parent SELinux_window True False vertical True False 0 10 <operation> File Labeling for <selected domain>. File labels will be created when update is applied. fill True True True 0 True False 7 2 True False Save to update True True True False True end 0 Cancel True True True False True end 1 1 2 6 7 40 False 0 10 MLS 5 6 GTK_FILL True False 0 10 Advanced >> True 4 5 GTK_FILL 40 True False 0 10 Class 3 4 GTK_FILL 40 True False 0 10 Type 2 3 GTK_FILL 360 True False Select the file class to which this label will be applied. Defaults to all classes. files_class_combo_store 0 1 2 3 4 True False vertical True False Make Path Recursive True True False Select Make Path Recursive if you want to apply this label to all children of the specified directory path. objects under the directory to have this label. 0.5 True True True 0 Browse True True True Browse to select the file/directory for labeling. True True 1 True True 0 True False True True 1 1 2 1 2 True False 0 10 Path GTK_FILL True True Specify the path using regular expressions that you would like to modify the labeling. False False 1 2 True False vertical 360 True False Select the SELinux file type to assign to this path. files_type_combo_store 0 True True 0 1 2 2 3 True Enter the MLS Label to assign to this file path. False False SELinux MLS Label you wish to assign to this path. 1 2 5 6 True True 1 False False 200 500 normal False vertical 2 False end True True True True False left False True 0 True True True True False False True 1 False True end 0 True False vertical 250 True True in True True False word False False True 0 True False help/booleans.png False True 1 False True 1 300 25 True False Analyzing Policy... False mouse True False 0.050000000223517416 True login_liststore False Network Port Definitions False True center-on-parent SELinux_window True False vertical True False 0 10 Add Login Mapping. Login Mapping will be created when update is applied. fill True True True 0 True False 4 2 True False 0 10 Login Name True True Enter the login user name of the user to which you wish to add SELinux User confinement. False False 1 2 True False 0 10 SELinux User 1 2 360 True False Select the SELinux User to assign to this login user. Login users by default get assigned by the __default__ user. login_seuser_liststore 0 1 2 1 2 True False Save to update True True True False True end 0 Cancel True True True False True end 1 1 2 3 4 True False Enter MLS/MCS Range for this login User. Defaults to the range for the Selected SELinux User. 0 10 MLS Range 2 3 True True Specify the MLS Range for this user to login in with. Defaults to the selected SELinux Users MLS Range. False False 1 2 2 3 True True 1 login_filter network_in_liststore network_in_filter network_out_liststore network_out_filter False Network Port Definitions False True center-on-parent SELinux_window True False vertical True False 0 10 <operation> Network Port for <selected domain>. Ports will be created when update is applied. fill True True True 0 True False 6 2 True False 0 10 Port Number True True Enter the port number or range to which you want to add a port type. False False 1 2 True False 0 10 Protocol 1 2 True False 0 10 Port Type 2 3 True False 0 10 Advanced >> True 3 4 False 0 10 MLS 4 5 360 True False Select the port type you want to assign to the specified port number. network_type_combo_store 0 1 2 2 3 True False Save to update True True True False True end 0 Cancel True True True False True end 1 1 2 5 6 True False tcp True True False Select <b>tcp</b> if the port type should be assigned to tcp port numbers. 0.5 True True True True 0 udp True True False Select <b>udp</b> if the port type should be assigned to udp port numbers. 0.5 True tcp_button True True 1 1 2 1 2 True Enter the MLS Label to assign to this port. False False 1 2 4 5 True True 1 transitions_from_treestore transitions_from_filter transitions_into_liststore transitions_into_filter False SELinux Configuration center-always 650 420 True False vertical True False True False vertical True False True False 0 True False Select... 240 True False True none False 0 bottom True True 0 True False True none True False down True True 1 False True 0 Booleans True True False Display boolean information that can be used to modify the policy for the 'selected domain'. 0.5 True False False True 1 Files True True False Display file type information that can be used by the 'selected domain'. 0.5 False Booleans_button False True 2 Network True True False Display network ports to which the 'selected domain' can connect or listen to. 0.5 False Booleans_button False True 3 Transitions True True False Display applications that can transition into or out of the 'selected domain'. 0.5 False Booleans_button False True 4 Login Mapping True False Manage the SELinux configuration 0 False Booleans_button False True 5 SELinux Users True False Manage the SELinux configuration 0 False Booleans_button False True 6 System True False Manage the SELinux configuration 0.5 False Booleans_button False True 7 Lockdown True False Lockdown the SELinux System. This screen can be used to turn up the SELinux Protections. 0 False Booleans_button False True 8 radiobutton False False 0 False Booleans_button False True 9 True False True False 10 gtk-help False False end 11 False False 0 True False vertical True False 3 vertical True False True False Filter False True 0 170 True True 25 none gtk-find False False True 1 Show Modified Only True True False 0 True True True 2 False True 0 True False False gtk-dialog-warning False True 0 False Mislabeled files exist False True 1 False True 1 Show mislabeled files only True False 0 True False False 2 False False 0 465 True True False True False vertical True True True True True If-Then-Else rules written in policy that can allow alternative access control. boolean_sort False True Enabled True 0 0 True fixed 240 Description True True 1 word 360 1 fixed 40 True 3 Italic 8 #00004e4e9999 3 fixed Name True True True True 2 2 True True 2 True False Booleans False True False vertical True True True True True True True executable_files_sort False 0 True True fixed 355 File Path True True True 0 0 0 70 70 #00004e4e9999 Fix Label single 3 0 True fixed 175 SELinux File Type True True 1 1 1 True fixed 75 Class True True 2 2 2 True False True False File path used to enter the 'selected domain'. Executable Files False True True True True True writable_files_sort False True True fixed 377 File Path True True True 0 0 0 70 70 #00004e4e9999 Fix Label single 3 True fixed 163 SELinux File Type True True True 1 1 1 True fixed 92 Class True True True 2 2 2 1 True False True False Files to which the 'selected domain' can write. Writable files 1 False True True True True True application_files_sort False 0 True True fixed 215 File Path True True True 0 0 0 70 70 #00004e4e9999 Fix Label single 3 True fixed 315 Description True True True 1 word-char 305 1 1 True fixed 75 Class True True True 2 0 2 2 True False True False File Types defined for the 'selected domain'. Application File Types 2 False True True 2 1 True False Files 1 False True False vertical True True True True True True True network_out_sort False 0 True 0 True True fixed Port True True True True 0 0 0 True fixed Protocol True True True 1 1 1 True fixed SELinux Port Type True True True True 2 2 2 True False True False Network Ports to which the 'selected domain' is allowed to connect. Outbound False True True True True True network_in_sort False 0 True 0 True True fixed Port True True True 0 0 0 True fixed Protocol True True True 1 1 1 True fixed SELinux Port Type True True True 2 2 2 1 True False True False Network Ports to which the 'selected domain' is allowed to listen. Inbound 1 False True True 2 2 True False Network 2 False True False vertical True True True True True True transitions_from_sort True False True True Boolean Enabled True True 0 0 1 True Boolean name True True True 1 2 2 True SELinux Application Type True True True 2 3 True False Executables which will transition to a different domain, when the 'selected domain' executes them. 1 1 Application Transitions From 'select domain' 1 False True True True True transitions_into_sort False True Boolean Enabled True True 0 0 True Calling Process Domain True True True 1 1 True Executable File True True True 2 2 1 True False Executables which will transition to the 'selected domain', when executing a selected domains entrypoint. Application Transitions Into 'select domain' 1 False True True True True File Transitions define what happens when the current domain creates the content of a particular class in a directory of the destination type. Optionally a file name could be specified for the transition. file_transitions_sort False SELinux Directory Type True 0 0 Destination Class True descending 1 1 SELinux Destination Type True 2 2 File Name True 3 3 2 True False File Transitions From 'select domain' 2 False True True 1 3 True False Transitions 3 False True False vertical True True in True True True login_sort False 0 True True fixed Login Name True True True 0 0 0 True fixed SELinux User True True True True 1 1 1 True MLS Range True 2 2 2 True True 1 4 True False Login Mapping 4 False True False vertical True True in True True True If-Then-Else rules written in policy that can allow alternative access control. user_sort True False 0 True True 240 SELinux User True True True 0 word 360 0 0 True SELinux Roles True True True True 1 1 1 Default Level True True 2 2 2 True MLS Range True True 3 3 3 True True 1 5 True False SELinux Users 5 False True False start False False vertical True False center 10 0 out True False start True False center center True False 0.05000000074505806 Select the system mode when the system first boots up 15 True False Enforcing True True False 50 0 True True False False 0 Permissive True True False 0 True Enforcing_button_default False False 1 Disabled True True False 0 True Enforcing_button_default False False 2 1 True False 0.0099999997764825821 Select the system mode for the current session 2 15 True False Enforcing True True False 50 0 True True False True 0 Permissive True True False 0 True Enforcing_button False True 1 3 True False 0 Advanced >> True end 4 15 True False vertical False 0 System Policy Type: 15 False False 0 200 False 10 system_policy_type_liststore 0 False True 1 5 15 False True 0 True False True True False True 1 True False <b>System Mode</b> True False False 10 0 True False center 10 0 out True False start True False center center 4 2 True False 0 Import system settings from another machine 15 Import 65 True True True 1 10 True False 0 Export system settings to a file middle 1 15 Export 65 True True True 1 1 10 True False Relabel all files back to system defaults on reboot 3 15 True False 2 3 5 True False 1 2 2 3 5 True False Yes True True False 0 True True False True 0 No True True False 0 True Relabel_button False True 1 1 2 3 4 10 False True 0 True False <b>System Configuration</b> True False False 1 6 True False System 6 False True False True False 0 none True False Yes True True False An unconfined domain is a process label that allows the process to do what it wants, without SELinux interfering. Applications started at boot by the init system that SELinux do not have defined SELinux policy will run as unconfined if this module is enabled. Disabling it means all daemons will now be confined. To disable the unconfined_t user you must first remove unconfined_t from the users/login screens. 0 True True enable_unconfined False True 0 No True True False An unconfined domain is a process label that allows the process to do what it wants, without SELinux interfering. Applications started at boot by the init system that SELinux do not have defined SELinux policy will run as unconfined if this module is enabled. Disabling it means all daemons will now be confined. To disable the unconfined_t user you must first remove unconfined_t from the users/login screens. 0 True True False True 1 True False <b>Disable ability to run unconfined system processes?</b> True 0 0 1 1 True False 0 none True False Yes True True False A permissive domain is a process label that allows the process to do what it wants, with SELinux only logging the denials, but not enforcing them. Usually permissive domains indicate experimental policy, disabling the module could cause SELinux to deny access to a domain, that should be allowed. 0 True enable_permissive False True 0 No True True False A permissive domain is a process label that allows the process to do what it wants, with SELinux only logging the denials, but not enforcing them. Usually permissive domains indicate experimental policy, disabling the module could cause SELinux to deny access to a domain, that should be allowed. 0 True True False True 1 True False <b>Disable all permissive processes?</b> True 0 1 1 1 True False 0 none True False Yes True True False A permissive domain is a process label that allows the process to do what it wants, with SELinux only logging the denials, but not enforcing them. Usually permissive domains indicate experimental policy, disabling the module could cause SELinux to deny access to a domain, that should be allowed. 0 True False True 0 No True True False A permissive domain is a process label that allows the process to do what it wants, with SELinux only logging the denials, but not enforcing them. Usually permissive domains indicate experimental policy, disabling the module could cause SELinux to deny access to a domain, that should be allowed. 0 True True disable_ptrace False True 1 True False <b>Deny all processes from ptracing or debugging other processes?</b> True 0 2 1 1 6 True False Lockdown 7 False True True in True True File equivalence cause the system to label content under the new path as if it were under the equivalence path. file_equiv_sort True False 0 True True Path True True True 0 0 0 True Equivalence Path True True True 1 1 1 8 True False Files Equivalence 8 False True False 0.20999999344348907 0.11999999731779099 <b>...SELECT TO VIEW DATA...</b> True 9 True False 0 9 False True True 1 True False Delete True False True True False True end 0 Modify True True True False True end 1 Add True False True True False True end 2 False False 2 True True 1 True False True True 4 2 True False Revert True False True True Revert button will launch a dialog window which allows you to revert changes within the current transaction. False True end 0 Update True False True True Commit all changes in your current transaction to the server. False True end 1 False False 3 True True 0 True True 0 True False 2 False False 1 False Applications - Advanced Search center-on-parent 600 620 SELinux_window True False vertical True False 0 vertical 210 True True gtk-find False False True 10 0 True True True True False Applications True True 0 0 Process Types True True 1 1 True True 1 Select True True True False False end 2 False More Details center-on-parent 650 420 SELinux_window True True in True True booleans_more_detail_liststore 0 False Delete Modified File Labeling True center-on-parent 450 320 SELinux_window True False vertical True False 0 10 Select file labeling to delete. File labeling will be deleted when update is applied. fill True False False 0 True True files_delete_liststore 20 Select True 0 275 File Path True 1 75 SELinux File Label True True 2 25 Class True True 3 True True 1 True False vertical Save to Update True True True False False end 0 Cancel True True True False False end 1 False True 2 False Delete Modified Ports True center-on-parent 450 320 SELinux_window True False vertical True False 0 10 Select ports to delete. Ports will be deleted when update is applied. fill True False False 0 True True network_delete_liststore False 0 20 Select True 0 275 Port True 1 1 75 Protocol True True 2 2 25 SELinux Port Type True True True 3 3 3 True True 1 True False Save to Update True True True False False end 0 Cancel True True True False False end 1 False True 2 False Delete Modified File Labeling True center-on-parent 450 320 SELinux_window True False vertical True False 0 10 Select file equivalence labeling to delete. File equivalence labeling will be deleted when update is applied. fill True False False 0 True True file_equiv_delete_liststore 0 20 Select True 0 275 File Path True 1 75 Equivalence Path True True 2 True True 1 True False vertical Save to Update True True True False False end 0 Cancel True True True False False end 1 False True 2 False Delete Modified Users Mapping. True center-on-parent 450 320 SELinux_window True False vertical True False 0 10 Select login user mapping to delete. Login user mapping will be deleted when update is applied. fill True False False 0 True True login_delete_liststore 0 20 Select True 0 275 Login name True 2 75 SELinux User True True 1 True True 1 True False vertical Save to Update True True True False False end 0 Cancel True True True False False end 1 False True 2 False More Types True center-on-parent 440 250 SELinux_window True False vertical True True True True more_types_file_liststore Types 0 True True 0 Select True True True False False 1 False True center-on-parent 650 450 SELinux_window True False vertical True False vertical True False 0 10 Review the updates you have made before committing them to the system. To reset an item, uncheck the checkbox. All items checked will be updated in the system when you select update. fill True False True 0 False True 0 True True 380 True True Update_treestore 0 20 Select True 3 0 275 Description True word 1 25 Action True True 2 True True 1 True False Apply True True True False False end 0 Cancel True True True False False end 1 False True 2 False Delete Modified Users Mapping. True center-on-parent 450 320 SELinux_window True False vertical True False 0 10 Select users mapping to delete.Users mapping will be deleted when update is applied. fill True False False 0 True True user_delete_liststore 0 20 Select True 0 275 SELinux Roles True 2 75 SELinux Username True True 1 True True 1 True False vertical Save to Update True True True False False end 0 Cancel True True True False False end 1 False True 2 False Network Port Definitions False True center-on-parent SELinux_window True False vertical True False 0 10 Add User Roles. SELinux User Roles will be created when Update is applied. fill True True True 0 True False 5 2 True False 0 10 SELinux User Name True True Specify a new SELinux user name. By convention SELinux User names usually end in an _u. False False 1 2 True False 0 10 SELinux Roles 1 2 True False 0 10 MLS Range 3 4 360 True False user_roles_liststore 0 1 2 1 2 True False Save to update True True True False True end 0 Cancel True True True False True end 1 1 2 4 5 True True Enter MLS/MCS Range for this SELinux User. s0-s0:c1023 False False 1 2 3 4 True False 0 10 Default Level 2 3 True True Specify the default level that you would like this SELinux user to login with. Defaults to s0. False False Enter Default Level for SELinux User to login with. Default s0 1 2 2 3 True True 1 user_liststore user_filter writable_files_treestore writable_files_filter selinux-python-3.0/sepolicy/sepolicy/templates/000077500000000000000000000000001356774067000220555ustar00rootroot00000000000000selinux-python-3.0/sepolicy/sepolicy/templates/__init__.py000066400000000000000000000013241356774067000241660ustar00rootroot00000000000000# # Copyright (C) 2007-2012 Red Hat # # This program is free software; you can redistribute it and/or modify # it under the terms of the GNU General Public License as published by # the Free Software Foundation; either version 2 of the License, or # (at your option) any later version. # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program; if not, write to the Free Software # Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. # selinux-python-3.0/sepolicy/sepolicy/templates/boolean.py000066400000000000000000000022361356774067000240510ustar00rootroot00000000000000# Copyright (C) 2007-2012 Red Hat # see file 'COPYING' for use and warranty information # # policygentool is a tool for the initial generation of SELinux policy # # This program is free software; you can redistribute it and/or # modify it under the terms of the GNU General Public License as # published by the Free Software Foundation; either version 2 of # the License, or (at your option) any later version. # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program; if not, write to the Free Software # Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA # 02111-1307 USA # # ########################### boolean Template File ########################### te_boolean=""" ## ##

## DESCRIPTION ##

##
gen_tunable(BOOLEAN, false) """ te_rules=""" tunable_policy(`BOOLEAN',` #TRUE ',` #FALSE ') """ selinux-python-3.0/sepolicy/sepolicy/templates/etc_rw.py000066400000000000000000000074141356774067000237200ustar00rootroot00000000000000# Copyright (C) 2007-2012 Red Hat # see file 'COPYING' for use and warranty information # # policygentool is a tool for the initial generation of SELinux policy # # This program is free software; you can redistribute it and/or # modify it under the terms of the GNU General Public License as # published by the Free Software Foundation; either version 2 of # the License, or (at your option) any later version. # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program; if not, write to the Free Software # Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA # 02111-1307 USA # # ########################### etc_rw Template File ############################# ########################### Type Enforcement File ############################# te_types=""" type TEMPLATETYPE_etc_rw_t; files_type(TEMPLATETYPE_etc_rw_t) """ te_rules=""" manage_dirs_pattern(TEMPLATETYPE_t, TEMPLATETYPE_etc_rw_t, TEMPLATETYPE_etc_rw_t) manage_files_pattern(TEMPLATETYPE_t, TEMPLATETYPE_etc_rw_t, TEMPLATETYPE_etc_rw_t) manage_lnk_files_pattern(TEMPLATETYPE_t, TEMPLATETYPE_etc_rw_t, TEMPLATETYPE_etc_rw_t) files_etc_filetrans(TEMPLATETYPE_t, TEMPLATETYPE_etc_rw_t, { dir file lnk_file }) """ te_stream_rules=""" manage_sock_files_pattern(TEMPLATETYPE_t, TEMPLATETYPE_etc_rw_t, TEMPLATETYPE_etc_rw_t) files_etc_filetrans(TEMPLATETYPE_t, TEMPLATETYPE_etc_rw_t, sock_file) """ ########################### Interface File ############################# if_rules=""" ######################################## ## ## Search TEMPLATETYPE conf directories. ## ## ## ## Domain allowed access. ## ## # interface(`TEMPLATETYPE_search_conf',` gen_require(` type TEMPLATETYPE_etc_rw_t; ') allow $1 TEMPLATETYPE_etc_rw_t:dir search_dir_perms; files_search_etc($1) ') ######################################## ## ## Read TEMPLATETYPE conf files. ## ## ## ## Domain allowed access. ## ## # interface(`TEMPLATETYPE_read_conf_files',` gen_require(` type TEMPLATETYPE_etc_rw_t; ') allow $1 TEMPLATETYPE_etc_rw_t:dir list_dir_perms; read_files_pattern($1, TEMPLATETYPE_etc_rw_t, TEMPLATETYPE_etc_rw_t) files_search_etc($1) ') ######################################## ## ## Manage TEMPLATETYPE conf files. ## ## ## ## Domain allowed access. ## ## # interface(`TEMPLATETYPE_manage_conf_files',` gen_require(` type TEMPLATETYPE_etc_rw_t; ') manage_files_pattern($1, TEMPLATETYPE_etc_rw_t, TEMPLATETYPE_etc_rw_t) files_search_etc($1) ') """ if_stream_rules="""\ ######################################## ## ## Connect to TEMPLATETYPE over a unix stream socket. ## ## ## ## Domain allowed access. ## ## # interface(`TEMPLATETYPE_stream_connect',` gen_require(` type TEMPLATETYPE_t, TEMPLATETYPE_etc_rw_t; ') files_search_etc($1) stream_connect_pattern($1, TEMPLATETYPE_etc_rw_t, TEMPLATETYPE_etc_rw_t, TEMPLATETYPE_t) ') """ if_admin_types=""" type TEMPLATETYPE_etc_rw_t;""" if_admin_rules=""" files_search_etc($1) admin_pattern($1, TEMPLATETYPE_etc_rw_t) """ ########################### File Context ################################## fc_file="""\ FILENAME -- gen_context(system_u:object_r:TEMPLATETYPE_etc_rw_t,s0) """ fc_dir="""\ FILENAME(/.*)? gen_context(system_u:object_r:TEMPLATETYPE_etc_rw_t,s0) """ selinux-python-3.0/sepolicy/sepolicy/templates/executable.py000066400000000000000000000232431356774067000245540ustar00rootroot00000000000000# Copyright (C) 2007-2012 Red Hat # see file 'COPYING' for use and warranty information # # policygentool is a tool for the initial generation of SELinux policy # # This program is free software; you can redistribute it and/or # modify it under the terms of the GNU General Public License as # published by the Free Software Foundation; either version 2 of # the License, or (at your option) any later version. # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program; if not, write to the Free Software # Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA # 02111-1307 USA # # ########################### Type Enforcement File ############################# te_daemon_types="""\ policy_module(TEMPLATETYPE, 1.0.0) ######################################## # # Declarations # type TEMPLATETYPE_t; type TEMPLATETYPE_exec_t; init_daemon_domain(TEMPLATETYPE_t, TEMPLATETYPE_exec_t) permissive TEMPLATETYPE_t; """ te_initscript_types=""" type TEMPLATETYPE_initrc_exec_t; init_script_file(TEMPLATETYPE_initrc_exec_t) """ te_dbusd_types="""\ policy_module(TEMPLATETYPE, 1.0.0) ######################################## # # Declarations # type TEMPLATETYPE_t; type TEMPLATETYPE_exec_t; domain_type(TEMPLATETYPE_t) domain_entry_file(TEMPLATETYPE_t, TEMPLATETYPE_exec_t) role system_r types TEMPLATETYPE_t; permissive TEMPLATETYPE_t; """ te_inetd_types="""\ policy_module(TEMPLATETYPE, 1.0.0) ######################################## # # Declarations # type TEMPLATETYPE_t; type TEMPLATETYPE_exec_t; inetd_service_domain(TEMPLATETYPE_t, TEMPLATETYPE_exec_t) permissive TEMPLATETYPE_t; """ te_userapp_types="""\ policy_module(TEMPLATETYPE, 1.0.0) ######################################## # # Declarations # attribute_role TEMPLATETYPE_roles; roleattribute system_r TEMPLATETYPE_roles; type TEMPLATETYPE_t; type TEMPLATETYPE_exec_t; application_domain(TEMPLATETYPE_t, TEMPLATETYPE_exec_t) role TEMPLATETYPE_roles types TEMPLATETYPE_t; permissive TEMPLATETYPE_t; """ te_sandbox_types="""\ policy_module(TEMPLATETYPE, 1.0.0) ######################################## # # Declarations # sandbox_x_domain_template(TEMPLATETYPE) permissive TEMPLATETYPE_t; permissive TEMPLATETYPE_client_t; """ te_cgi_types="""\ policy_module(TEMPLATETYPE, 1.0.0) ######################################## # # Declarations # apache_content_template(TEMPLATETYPE) permissive httpd_TEMPLATETYPE_script_t; """ te_daemon_rules="""\ allow TEMPLATETYPE_t self:fifo_file rw_fifo_file_perms; allow TEMPLATETYPE_t self:unix_stream_socket create_stream_socket_perms; """ te_inetd_rules=""" """ te_dbusd_rules=""" optional_policy(` dbus_system_domain(TEMPLATETYPE_t, TEMPLATETYPE_exec_t) ') """ te_userapp_rules=""" allow TEMPLATETYPE_t self:fifo_file manage_fifo_file_perms; allow TEMPLATETYPE_t self:unix_stream_socket create_stream_socket_perms; """ te_cgi_rules=""" """ te_sandbox_rules=""" """ te_uid_rules=""" auth_use_nsswitch(TEMPLATETYPE_t) """ te_syslog_rules=""" logging_send_syslog_msg(TEMPLATETYPE_t) """ te_resolve_rules=""" sysnet_dns_name_resolve(TEMPLATETYPE_t) """ te_pam_rules=""" auth_domtrans_chk_passwd(TEMPLATETYPE_t) """ te_mail_rules=""" mta_send_mail(TEMPLATETYPE_t) """ te_dbus_rules=""" optional_policy(` dbus_system_bus_client(TEMPLATETYPE_t) dbus_connect_system_bus(TEMPLATETYPE_t) ') """ te_kerberos_rules=""" optional_policy(` kerberos_use(TEMPLATETYPE_t) ') """ te_manage_krb5_rcache_rules=""" optional_policy(` kerberos_keytab_template(TEMPLATETYPE, TEMPLATETYPE_t) kerberos_manage_host_rcache(TEMPLATETYPE_t) ') """ te_audit_rules=""" logging_send_audit_msgs(TEMPLATETYPE_t) """ te_run_rules=""" optional_policy(` gen_require(` type USER_t; role USER_r; ') TEMPLATETYPE_run(USER_t, USER_r) ') """ te_fd_rules=""" domain_use_interactive_fds(TEMPLATETYPE_t) """ te_etc_rules=""" files_read_etc_files(TEMPLATETYPE_t) """ te_localization_rules=""" miscfiles_read_localization(TEMPLATETYPE_t) """ ########################### Interface File ############################# if_heading_rules=""" ## policy for TEMPLATETYPE""" if_program_rules=""" ######################################## ## ## Execute TEMPLATETYPE_exec_t in the TEMPLATETYPE domain. ## ## ## ## Domain allowed to transition. ## ## # interface(`TEMPLATETYPE_domtrans',` gen_require(` type TEMPLATETYPE_t, TEMPLATETYPE_exec_t; ') corecmd_search_bin($1) domtrans_pattern($1, TEMPLATETYPE_exec_t, TEMPLATETYPE_t) ') ###################################### ## ## Execute TEMPLATETYPE in the caller domain. ## ## ## ## Domain allowed access. ## ## # interface(`TEMPLATETYPE_exec',` gen_require(` type TEMPLATETYPE_exec_t; ') corecmd_search_bin($1) can_exec($1, TEMPLATETYPE_exec_t) ') """ if_user_program_rules=""" ######################################## ## ## Execute TEMPLATETYPE in the TEMPLATETYPE domain, and ## allow the specified role the TEMPLATETYPE domain. ## ## ## ## Domain allowed to transition ## ## ## ## ## The role to be allowed the TEMPLATETYPE domain. ## ## # interface(`TEMPLATETYPE_run',` gen_require(` type TEMPLATETYPE_t; attribute_role TEMPLATETYPE_roles; ') TEMPLATETYPE_domtrans($1) roleattribute $2 TEMPLATETYPE_roles; ') ######################################## ## ## Role access for TEMPLATETYPE ## ## ## ## Role allowed access ## ## ## ## ## User domain for the role ## ## # interface(`TEMPLATETYPE_role',` gen_require(` type TEMPLATETYPE_t; attribute_role TEMPLATETYPE_roles; ') roleattribute $1 TEMPLATETYPE_roles; TEMPLATETYPE_domtrans($2) ps_process_pattern($2, TEMPLATETYPE_t) allow $2 TEMPLATETYPE_t:process { signull signal sigkill }; ') """ if_sandbox_rules=""" ######################################## ## ## Execute sandbox in the TEMPLATETYPE_t domain, and ## allow the specified role the TEMPLATETYPE_t domain. ## ## ## ## Domain allowed to transition. ## ## ## ## ## The role to be allowed the TEMPLATETYPE_t domain. ## ## # interface(`TEMPLATETYPE_transition',` gen_require(` type TEMPLATETYPE_t; type TEMPLATETYPE_client_t; ') allow $1 TEMPLATETYPE_t:process { signal_perms transition }; dontaudit $1 TEMPLATETYPE_t:process { noatsecure siginh rlimitinh }; role $2 types TEMPLATETYPE_t; role $2 types TEMPLATETYPE_client_t; allow TEMPLATETYPE_t $1:process { sigchld signull }; allow TEMPLATETYPE_t $1:fifo_file rw_inherited_fifo_file_perms; allow TEMPLATETYPE_client_t $1:process { sigchld signull }; allow TEMPLATETYPE_client_t $1:fifo_file rw_inherited_fifo_file_perms; ') """ if_role_change_rules=""" ######################################## ## ## Change to the TEMPLATETYPE role. ## ## ## ## Role allowed access. ## ## ## # interface(`TEMPLATETYPE_role_change',` gen_require(` role TEMPLATETYPE_r; ') allow $1 TEMPLATETYPE_r; ') """ if_initscript_rules=""" ######################################## ## ## Execute TEMPLATETYPE server in the TEMPLATETYPE domain. ## ## ## ## Domain allowed access. ## ## # interface(`TEMPLATETYPE_initrc_domtrans',` gen_require(` type TEMPLATETYPE_initrc_exec_t; ') init_labeled_script_domtrans($1, TEMPLATETYPE_initrc_exec_t) ') """ if_dbus_rules=""" ######################################## ## ## Send and receive messages from ## TEMPLATETYPE over dbus. ## ## ## ## Domain allowed access. ## ## # interface(`TEMPLATETYPE_dbus_chat',` gen_require(` type TEMPLATETYPE_t; class dbus send_msg; ') allow $1 TEMPLATETYPE_t:dbus send_msg; allow TEMPLATETYPE_t $1:dbus send_msg; ') """ if_begin_admin=""" ######################################## ## ## All of the rules required to administrate ## an TEMPLATETYPE environment ## ## ## ## Domain allowed access. ## ## ## ## ## Role allowed access. ## ## ## # interface(`TEMPLATETYPE_admin',` gen_require(` type TEMPLATETYPE_t;""" if_middle_admin=""" ') allow $1 TEMPLATETYPE_t:process { signal_perms }; ps_process_pattern($1, TEMPLATETYPE_t) tunable_policy(`deny_ptrace',`',` allow $1 TEMPLATETYPE_t:process ptrace; ') """ if_initscript_admin_types=""" type TEMPLATETYPE_initrc_exec_t;""" if_initscript_admin=""" TEMPLATETYPE_initrc_domtrans($1) domain_system_change_exemption($1) role_transition $2 TEMPLATETYPE_initrc_exec_t system_r; allow $2 system_r; """ if_end_admin="""\ optional_policy(` systemd_passwd_agent_exec($1) systemd_read_fifo_file_passwd_run($1) ') ') """ ########################### File Context ################################## fc_program="""\ EXECUTABLE -- gen_context(system_u:object_r:TEMPLATETYPE_exec_t,s0) """ fc_user="""\ # No file context, leave blank """ fc_initscript="""\ EXECUTABLE -- gen_context(system_u:object_r:TEMPLATETYPE_initrc_exec_t,s0) """ selinux-python-3.0/sepolicy/sepolicy/templates/network.py000066400000000000000000000324431356774067000241260ustar00rootroot00000000000000# Copyright (C) 2007-2012 Red Hat # see file 'COPYING' for use and warranty information # # policygentool is a tool for the initial generation of SELinux policy # # This program is free software; you can redistribute it and/or # modify it under the terms of the GNU General Public License as # published by the Free Software Foundation; either version 2 of # the License, or (at your option) any later version. # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program; if not, write to the Free Software # Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA # 02111-1307 USA # # ########################### Type Enforcement File ############################# te_types=""" type TEMPLATETYPE_port_t; corenet_port(TEMPLATETYPE_port_t) """ te_network="""\ sysnet_dns_name_resolve(TEMPLATETYPE_t) corenet_all_recvfrom_unlabeled(TEMPLATETYPE_t) """ te_tcp="""\ allow TEMPLATETYPE_t self:tcp_socket create_stream_socket_perms; corenet_tcp_sendrecv_generic_if(TEMPLATETYPE_t) corenet_tcp_sendrecv_generic_node(TEMPLATETYPE_t) corenet_tcp_sendrecv_all_ports(TEMPLATETYPE_t) """ te_in_tcp="""\ corenet_tcp_bind_generic_node(TEMPLATETYPE_t) """ te_in_need_port_tcp="""\ allow TEMPLATETYPE_t TEMPLATETYPE_port_t:tcp_socket name_bind; """ te_out_need_port_tcp="""\ allow TEMPLATETYPE_t TEMPLATETYPE_port_t:tcp_socket name_connect; """ te_udp="""\ allow TEMPLATETYPE_t self:udp_socket { create_socket_perms listen }; corenet_udp_sendrecv_generic_if(TEMPLATETYPE_t) corenet_udp_sendrecv_generic_node(TEMPLATETYPE_t) corenet_udp_sendrecv_all_ports(TEMPLATETYPE_t) """ te_in_udp="""\ corenet_udp_bind_generic_node(TEMPLATETYPE_t) """ te_in_need_port_udp="""\ allow TEMPLATETYPE_t TEMPLATETYPE_port_t:udp_socket name_bind; """ te_out_all_ports_tcp="""\ corenet_tcp_connect_all_ports(TEMPLATETYPE_t) """ te_out_reserved_ports_tcp="""\ corenet_tcp_connect_all_rpc_ports(TEMPLATETYPE_t) """ te_out_unreserved_ports_tcp="""\ corenet_tcp_connect_all_unreserved_ports(TEMPLATETYPE_t) """ te_in_all_ports_tcp="""\ corenet_tcp_bind_all_ports(TEMPLATETYPE_t) """ te_in_reserved_ports_tcp="""\ corenet_tcp_bind_all_rpc_ports(TEMPLATETYPE_t) """ te_in_unreserved_ports_tcp="""\ corenet_tcp_bind_all_unreserved_ports(TEMPLATETYPE_t) """ te_in_all_ports_udp="""\ corenet_udp_bind_all_ports(TEMPLATETYPE_t) """ te_in_reserved_ports_udp="""\ corenet_udp_bind_all_rpc_ports(TEMPLATETYPE_t) """ te_in_unreserved_ports_udp="""\ corenet_udp_bind_all_unreserved_ports(TEMPLATETYPE_t) """ if_rules="""\ ######################################## ## ## Send and receive TCP traffic on the TEMPLATETYPE port. ## ## ## ## Domain allowed access. ## ## ## # interface(`corenet_tcp_sendrecv_TEMPLATETYPE_port',` gen_require(` type TEMPLATETYPE_port_t; ') allow $1 TEMPLATETYPE_port_t:tcp_socket { send_msg recv_msg }; ') ######################################## ## ## Send UDP traffic on the TEMPLATETYPE port. ## ## ## ## Domain allowed access. ## ## ## # interface(`corenet_udp_send_TEMPLATETYPE_port',` gen_require(` type TEMPLATETYPE_port_t; ') allow $1 TEMPLATETYPE_port_t:udp_socket send_msg; ') ######################################## ## ## Do not audit attempts to send UDP traffic on the TEMPLATETYPE port. ## ## ## ## Domain to not audit. ## ## ## # interface(`corenet_dontaudit_udp_send_TEMPLATETYPE_port',` gen_require(` type TEMPLATETYPE_port_t; ') dontaudit $1 TEMPLATETYPE_port_t:udp_socket send_msg; ') ######################################## ## ## Receive UDP traffic on the TEMPLATETYPE port. ## ## ## ## Domain allowed access. ## ## ## # interface(`corenet_udp_receive_TEMPLATETYPE_port',` gen_require(` type TEMPLATETYPE_port_t; ') allow $1 TEMPLATETYPE_port_t:udp_socket recv_msg; ') ######################################## ## ## Do not audit attempts to receive UDP traffic on the TEMPLATETYPE port. ## ## ## ## Domain to not audit. ## ## ## # interface(`corenet_dontaudit_udp_receive_TEMPLATETYPE_port',` gen_require(` type TEMPLATETYPE_port_t; ') dontaudit $1 TEMPLATETYPE_port_t:udp_socket recv_msg; ') ######################################## ## ## Send and receive UDP traffic on the TEMPLATETYPE port. ## ## ## ## Domain allowed access. ## ## ## # interface(`corenet_udp_sendrecv_TEMPLATETYPE_port',` corenet_udp_send_TEMPLATETYPE_port($1) corenet_udp_receive_TEMPLATETYPE_port($1) ') ######################################## ## ## Do not audit attempts to send and receive ## UDP traffic on the TEMPLATETYPE port. ## ## ## ## Domain to not audit. ## ## ## # interface(`corenet_dontaudit_udp_sendrecv_TEMPLATETYPE_port',` corenet_dontaudit_udp_send_TEMPLATETYPE_port($1) corenet_dontaudit_udp_receive_TEMPLATETYPE_port($1) ') ######################################## ## ## Bind TCP sockets to the TEMPLATETYPE port. ## ## ## ## Domain allowed access. ## ## ## # interface(`corenet_tcp_bind_TEMPLATETYPE_port',` gen_require(` type TEMPLATETYPE_port_t; ') allow $1 TEMPLATETYPE_port_t:tcp_socket name_bind; ') ######################################## ## ## Bind UDP sockets to the TEMPLATETYPE port. ## ## ## ## Domain allowed access. ## ## ## # interface(`corenet_udp_bind_TEMPLATETYPE_port',` gen_require(` type TEMPLATETYPE_port_t; ') allow $1 TEMPLATETYPE_port_t:udp_socket name_bind; ') ######################################## ## ## Do not audit attempts to sbind to TEMPLATETYPE port. ## ## ## ## Domain to not audit. ## ## ## # interface(`corenet_dontaudit_udp_bind_TEMPLATETYPE_port',` gen_require(` type TEMPLATETYPE_port_t; ') dontaudit $1 TEMPLATETYPE_port_t:udp_socket name_bind; ') ######################################## ## ## Make a TCP connection to the TEMPLATETYPE port. ## ## ## ## Domain allowed access. ## ## # interface(`corenet_tcp_connect_TEMPLATETYPE_port',` gen_require(` type TEMPLATETYPE_port_t; ') allow $1 TEMPLATETYPE_port_t:tcp_socket name_connect; ') ######################################## ## ## Do not audit attempts to make a TCP connection to TEMPLATETYPE port. ## ## ## ## Domain allowed access. ## ## # interface(`corenet_dontaudit_tcp_connect_TEMPLATETYPE_port',` gen_require(` type TEMPLATETYPE_port_t; ') dontaudit $1 TEMPLATETYPE_port_t:tcp_socket name_connect; ') ######################################## ## ## Send TEMPLATETYPE_client packets. ## ## ## ## Domain allowed access. ## ## ## # interface(`corenet_send_TEMPLATETYPE_client_packets',` gen_require(` type TEMPLATETYPE_client_packet_t; ') allow $1 TEMPLATETYPE_client_packet_t:packet send; ') ######################################## ## ## Do not audit attempts to send TEMPLATETYPE_client packets. ## ## ## ## Domain to not audit. ## ## ## # interface(`corenet_dontaudit_send_TEMPLATETYPE_client_packets',` gen_require(` type TEMPLATETYPE_client_packet_t; ') dontaudit $1 TEMPLATETYPE_client_packet_t:packet send; ') ######################################## ## ## Receive TEMPLATETYPE_client packets. ## ## ## ## Domain allowed access. ## ## ## # interface(`corenet_receive_TEMPLATETYPE_client_packets',` gen_require(` type TEMPLATETYPE_client_packet_t; ') allow $1 TEMPLATETYPE_client_packet_t:packet recv; ') ######################################## ## ## Do not audit attempts to receive TEMPLATETYPE_client packets. ## ## ## ## Domain allowed access. ## ## ## # interface(`corenet_dontaudit_receive_TEMPLATETYPE_client_packets',` gen_require(` type TEMPLATETYPE_client_packet_t; ') dontaudit $1 TEMPLATETYPE_client_packet_t:packet recv; ') ######################################## ## ## Send and receive TEMPLATETYPE_client packets. ## ## ## ## Domain allowed access. ## ## ## # interface(`corenet_sendrecv_TEMPLATETYPE_client_packets',` corenet_send_TEMPLATETYPE_client_packets($1) corenet_receive_TEMPLATETYPE_client_packets($1) ') ######################################## ## ## Do not audit attempts to send and receive TEMPLATETYPE_client packets. ## ## ## ## Domain to not audit. ## ## ## # interface(`corenet_dontaudit_sendrecv_TEMPLATETYPE_client_packets',` corenet_dontaudit_send_TEMPLATETYPE_client_packets($1) corenet_dontaudit_receive_TEMPLATETYPE_client_packets($1) ') ######################################## ## ## Relabel packets to TEMPLATETYPE_client the packet type. ## ## ## ## Domain allowed access. ## ## # interface(`corenet_relabelto_TEMPLATETYPE_client_packets',` gen_require(` type TEMPLATETYPE_client_packet_t; ') allow $1 TEMPLATETYPE_client_packet_t:packet relabelto; ') ######################################## ## ## Send TEMPLATETYPE_server packets. ## ## ## ## Domain allowed access. ## ## ## # interface(`corenet_send_TEMPLATETYPE_server_packets',` gen_require(` type TEMPLATETYPE_server_packet_t; ') allow $1 TEMPLATETYPE_server_packet_t:packet send; ') ######################################## ## ## Do not audit attempts to send TEMPLATETYPE_server packets. ## ## ## ## Domain to not audit. ## ## ## # interface(`corenet_dontaudit_send_TEMPLATETYPE_server_packets',` gen_require(` type TEMPLATETYPE_server_packet_t; ') dontaudit $1 TEMPLATETYPE_server_packet_t:packet send; ') ######################################## ## ## Receive TEMPLATETYPE_server packets. ## ## ## ## Domain allowed access. ## ## ## # interface(`corenet_receive_TEMPLATETYPE_server_packets',` gen_require(` type TEMPLATETYPE_server_packet_t; ') allow $1 TEMPLATETYPE_server_packet_t:packet recv; ') ######################################## ## ## Do not audit attempts to receive TEMPLATETYPE_server packets. ## ## ## ## Domain allowed access. ## ## ## # interface(`corenet_dontaudit_receive_TEMPLATETYPE_server_packets',` gen_require(` type TEMPLATETYPE_server_packet_t; ') dontaudit $1 TEMPLATETYPE_server_packet_t:packet recv; ') ######################################## ## ## Send and receive TEMPLATETYPE_server packets. ## ## ## ## Domain allowed access. ## ## ## # interface(`corenet_sendrecv_TEMPLATETYPE_server_packets',` corenet_send_TEMPLATETYPE_server_packets($1) corenet_receive_TEMPLATETYPE_server_packets($1) ') ######################################## ## ## Do not audit attempts to send and receive TEMPLATETYPE_server packets. ## ## ## ## Domain to not audit. ## ## ## # interface(`corenet_dontaudit_sendrecv_TEMPLATETYPE_server_packets',` corenet_dontaudit_send_TEMPLATETYPE_server_packets($1) corenet_dontaudit_receive_TEMPLATETYPE_server_packets($1) ') ######################################## ## ## Relabel packets to TEMPLATETYPE_server the packet type. ## ## ## ## Domain allowed access. ## ## # interface(`corenet_relabelto_TEMPLATETYPE_server_packets',` gen_require(` type TEMPLATETYPE_server_packet_t; ') allow $1 TEMPLATETYPE_server_packet_t:packet relabelto; ') """ te_rules=""" """ selinux-python-3.0/sepolicy/sepolicy/templates/rw.py000066400000000000000000000075341356774067000230700ustar00rootroot00000000000000# Copyright (C) 2007-2012 Red Hat # see file 'COPYING' for use and warranty information # # policygentool is a tool for the initial generation of SELinux policy # # This program is free software; you can redistribute it and/or # modify it under the terms of the GNU General Public License as # published by the Free Software Foundation; either version 2 of # the License, or (at your option) any later version. # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program; if not, write to the Free Software # Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA # 02111-1307 USA # # ########################### tmp Template File ############################# te_types=""" type TEMPLATETYPE_rw_t; files_type(TEMPLATETYPE_rw_t) """ te_rules=""" manage_dirs_pattern(TEMPLATETYPE_t, TEMPLATETYPE_rw_t, TEMPLATETYPE_rw_t) manage_files_pattern(TEMPLATETYPE_t, TEMPLATETYPE_rw_t, TEMPLATETYPE_rw_t) manage_lnk_files_pattern(TEMPLATETYPE_t, TEMPLATETYPE_rw_t, TEMPLATETYPE_rw_t) """ ########################### Interface File ############################# if_rules=""" ######################################## ## ## Search TEMPLATETYPE rw directories. ## ## ## ## Domain allowed access. ## ## # interface(`TEMPLATETYPE_search_rw_dir',` gen_require(` type TEMPLATETYPE_rw_t; ') allow $1 TEMPLATETYPE_rw_t:dir search_dir_perms; files_search_rw($1) ') ######################################## ## ## Read TEMPLATETYPE rw files. ## ## ## ## Domain allowed access. ## ## # interface(`TEMPLATETYPE_read_rw_files',` gen_require(` type TEMPLATETYPE_rw_t; ') read_files_pattern($1, TEMPLATETYPE_rw_t, TEMPLATETYPE_rw_t) allow $1 TEMPLATETYPE_rw_t:dir list_dir_perms; files_search_rw($1) ') ######################################## ## ## Manage TEMPLATETYPE rw files. ## ## ## ## Domain allowed access. ## ## # interface(`TEMPLATETYPE_manage_rw_files',` gen_require(` type TEMPLATETYPE_rw_t; ') manage_files_pattern($1, TEMPLATETYPE_rw_t, TEMPLATETYPE_rw_t) ') ######################################## ## ## Create, read, write, and delete ## TEMPLATETYPE rw dirs. ## ## ## ## Domain allowed access. ## ## # interface(`TEMPLATETYPE_manage_rw_dirs',` gen_require(` type TEMPLATETYPE_rw_t; ') manage_dirs_pattern($1, TEMPLATETYPE_rw_t, TEMPLATETYPE_rw_t) ') """ te_stream_rules=""" manage_sock_files_pattern(TEMPLATETYPE_t, TEMPLATETYPE_rw_t, TEMPLATETYPE_rw_t) """ if_stream_rules="""\ ######################################## ## ## Connect to TEMPLATETYPE over a unix stream socket. ## ## ## ## Domain allowed access. ## ## # interface(`TEMPLATETYPE_stream_connect',` gen_require(` type TEMPLATETYPE_t, TEMPLATETYPE_rw_t; ') stream_connect_pattern($1, TEMPLATETYPE_rw_t, TEMPLATETYPE_rw_t, TEMPLATETYPE_t) ') """ if_admin_types=""" type TEMPLATETYPE_rw_t;""" if_admin_rules=""" files_search_etc($1) admin_pattern($1, TEMPLATETYPE_rw_t) """ ########################### File Context ################################## fc_file=""" FILENAME -- gen_context(system_u:object_r:TEMPLATETYPE_rw_t,s0) """ fc_sock_file="""\ FILENAME -s gen_context(system_u:object_r:TEMPLATETYPE_etc_rw_t,s0) """ fc_dir=""" FILENAME(/.*)? gen_context(system_u:object_r:TEMPLATETYPE_rw_t,s0) """ selinux-python-3.0/sepolicy/sepolicy/templates/script.py000066400000000000000000000102451356774067000237350ustar00rootroot00000000000000# Copyright (C) 2007-2012 Red Hat # see file 'COPYING' for use and warranty information # # policygentool is a tool for the initial generation of SELinux policy # # This program is free software; you can redistribute it and/or # modify it under the terms of the GNU General Public License as # published by the Free Software Foundation; either version 2 of # the License, or (at your option) any later version. # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program; if not, write to the Free Software # Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA # 02111-1307 USA # # ########################### tmp Template File ############################# compile="""\ #!/bin/sh -e DIRNAME=`dirname $0` cd $DIRNAME USAGE="$0 [ --update ]" if [ `id -u` != 0 ]; then echo 'You must be root to run this script' exit 1 fi if [ $# -eq 1 ]; then if [ "$1" = "--update" ] ; then time=`ls -l --time-style="+%x %X" TEMPLATEFILE.te | awk '{ printf "%s %s", $6, $7 }'` rules=`ausearch --start $time -m avc --raw -se TEMPLATETYPE` if [ x"$rules" != "x" ] ; then echo "Found avc's to update policy with" echo -e "$rules" | audit2allow -R echo "Do you want these changes added to policy [y/n]?" read ANS if [ "$ANS" = "y" -o "$ANS" = "Y" ] ; then echo "Updating policy" echo -e "$rules" | audit2allow -R >> TEMPLATEFILE.te # Fall though and rebuild policy else exit 0 fi else echo "No new avcs found" exit 0 fi else echo -e $USAGE exit 1 fi elif [ $# -ge 2 ] ; then echo -e $USAGE exit 1 fi echo "Building and Loading Policy" set -x make -f /usr/share/selinux/devel/Makefile TEMPLATEFILE.pp || exit /usr/sbin/semodule -i TEMPLATEFILE.pp """ rpm="""\ # Generate a rpm package for the newly generated policy pwd=$(pwd) rpmbuild --define "_sourcedir ${pwd}" --define "_specdir ${pwd}" --define "_builddir ${pwd}" --define "_srcrpmdir ${pwd}" --define "_rpmdir ${pwd}" --define "_buildrootdir ${pwd}/.build" -ba TEMPLATEFILE_selinux.spec """ manpage="""\ # Generate a man page off the installed module sepolicy manpage -p . -d DOMAINTYPE_t """ restorecon="""\ # Fixing the file context on FILENAME /sbin/restorecon -F -R -v FILENAME """ tcp_ports="""\ # Adding SELinux tcp port to port PORTNUM /usr/sbin/semanage port -a -t TEMPLATETYPE_port_t -p tcp PORTNUM """ udp_ports="""\ # Adding SELinux udp port to port PORTNUM /usr/sbin/semanage port -a -t TEMPLATETYPE_port_t -p udp PORTNUM """ users="""\ # Adding SELinux user TEMPLATETYPE_u /usr/sbin/semanage user -a -R "TEMPLATETYPE_rROLES" TEMPLATETYPE_u """ eusers="""\ # Adding roles to SELinux user TEMPLATETYPE_u /usr/sbin/semanage user -m -R "TEMPLATETYPE_rROLES" TEMPLATETYPE_u """ admin_trans="""\ # Adding roles to SELinux user USER /usr/sbin/semanage user -m -R +TEMPLATETYPE_r USER """ min_login_user_default_context="""\ cat > TEMPLATETYPE_u << _EOF TEMPLATETYPE_r:TEMPLATETYPE_t:s0 TEMPLATETYPE_r:TEMPLATETYPE_t system_r:crond_t TEMPLATETYPE_r:TEMPLATETYPE_t system_r:initrc_su_t TEMPLATETYPE_r:TEMPLATETYPE_t system_r:local_login_t TEMPLATETYPE_r:TEMPLATETYPE_t system_r:remote_login_t TEMPLATETYPE_r:TEMPLATETYPE_t system_r:sshd_t TEMPLATETYPE_r:TEMPLATETYPE_t _EOF if [ ! -f /etc/selinux/targeted/contexts/users/TEMPLATETYPE_u ]; then cp TEMPLATETYPE_u /etc/selinux/targeted/contexts/users/ fi """ x_login_user_default_context="""\ cat > TEMPLATETYPE_u << _EOF TEMPLATETYPE_r:TEMPLATETYPE_t TEMPLATETYPE_r:TEMPLATETYPE_t system_r:crond_t TEMPLATETYPE_r:TEMPLATETYPE_t system_r:initrc_su_t TEMPLATETYPE_r:TEMPLATETYPE_t system_r:local_login_t TEMPLATETYPE_r:TEMPLATETYPE_t system_r:remote_login_t TEMPLATETYPE_r:TEMPLATETYPE_t system_r:sshd_t TEMPLATETYPE_r:TEMPLATETYPE_t system_r:xdm_t TEMPLATETYPE_r:TEMPLATETYPE_t _EOF if [ ! -f /etc/selinux/targeted/contexts/users/TEMPLATETYPE_u ]; then cp TEMPLATETYPE_u /etc/selinux/targeted/contexts/users/ fi """ selinux-python-3.0/sepolicy/sepolicy/templates/semodule.py000066400000000000000000000024351356774067000242500ustar00rootroot00000000000000# Copyright (C) 2007-2012 Red Hat # see file 'COPYING' for use and warranty information # # policygentool is a tool for the initial generation of SELinux policy # # This program is free software; you can redistribute it and/or # modify it under the terms of the GNU General Public License as # published by the Free Software Foundation; either version 2 of # the License, or (at your option) any later version. # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program; if not, write to the Free Software # Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA # 02111-1307 USA # # ########################### tmp Template File ############################# compile=""" #!/bin/sh make -f /usr/share/selinux/devel/Makefile semodule -i TEMPLATETYPE.pp """ restorecon=""" restorecon -R -v FILENAME """ tcp_ports=""" semanage ports -a -t TEMPLATETYPE_port_t -p tcp PORTNUM """ udp_ports=""" semanage ports -a -t TEMPLATETYPE_port_t -p udp PORTNUM """ selinux-python-3.0/sepolicy/sepolicy/templates/spec.py000066400000000000000000000041261356774067000233640ustar00rootroot00000000000000header_comment_section="""\ # vim: sw=4:ts=4:et """ base_section="""\ %define selinux_policyver VERSION Name: MODULENAME_selinux Version: 1.0 Release: 1%{?dist} Summary: SELinux policy module for MODULENAME Group: System Environment/Base License: GPLv2+ # This is an example. You will need to change it. URL: http://HOSTNAME Source0: MODULENAME.pp Source1: MODULENAME.if Source2: DOMAINNAME_selinux.8 Source3: DOMAINNAME_u Requires: policycoreutils, libselinux-utils Requires(post): selinux-policy-base >= %{selinux_policyver}, policycoreutils Requires(postun): policycoreutils """ mid_section="""\ BuildArch: noarch %description This package installs and sets up the SELinux policy security module for MODULENAME. %install install -d %{buildroot}%{_datadir}/selinux/packages install -m 644 %{SOURCE0} %{buildroot}%{_datadir}/selinux/packages install -d %{buildroot}%{_datadir}/selinux/devel/include/contrib install -m 644 %{SOURCE1} %{buildroot}%{_datadir}/selinux/devel/include/contrib/ install -d %{buildroot}%{_mandir}/man8/ install -m 644 %{SOURCE2} %{buildroot}%{_mandir}/man8/DOMAINNAME_selinux.8 install -d %{buildroot}/etc/selinux/targeted/contexts/users/ install -m 644 %{SOURCE3} %{buildroot}/etc/selinux/targeted/contexts/users/DOMAINNAME_u %post semodule -n -i %{_datadir}/selinux/packages/MODULENAME.pp if /usr/sbin/selinuxenabled ; then /usr/sbin/load_policy %relabel_files /usr/sbin/semanage user -a -R DOMAINNAME_r DOMAINNAME_u fi; exit 0 %postun if [ $1 -eq 0 ]; then semodule -n -r MODULENAME if /usr/sbin/selinuxenabled ; then /usr/sbin/load_policy %relabel_files /usr/sbin/semanage user -d DOMAINNAME_u fi; fi; exit 0 %files %attr(0600,root,root) %{_datadir}/selinux/packages/MODULENAME.pp %{_datadir}/selinux/devel/include/contrib/MODULENAME.if %{_mandir}/man8/DOMAINNAME_selinux.8.* /etc/selinux/targeted/contexts/users/DOMAINNAME_u %changelog * TODAYSDATE YOUR NAME 1.0-1 - Initial version """ define_relabel_files_begin ="""\ \n %define relabel_files() \\ """ define_relabel_files_end ="""\ restorecon -R FILENAME; \\ """ selinux-python-3.0/sepolicy/sepolicy/templates/test_module.py000066400000000000000000000105411356774067000247540ustar00rootroot00000000000000# Copyright (C) 2007-2012 Red Hat # see file 'COPYING' for use and warranty information # # policygentool is a tool for the initial generation of SELinux policy # # This program is free software; you can redistribute it and/or # modify it under the terms of the GNU General Public License as # published by the Free Software Foundation; either version 2 of # the License, or (at your option) any later version. # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program; if not, write to the Free Software # Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA # 02111-1307 USA # # #['domain', 'role', 'role_prefix', 'object_class', 'name', 'private_type', 'prefix', 'entrypoint', 'target_domain', 'terminal', 'range', 'domains', 'entry_point', 'entry_file', 'domain_prefix', 'private type', 'user_prefix', 'user_role', 'user_domain', 'object', 'type', 'source_domain', 'file_type', 'file', 'class', 'peer_domain', 'objectclass(es)', 'exception_types', 'home_type', 'object_type', 'directory_type', 'boolean', 'pty_type', 'userdomain', 'tty_type', 'tmpfs_type', 'script_file', 'filetype', 'filename', 'init_script_file', 'source_role', 'userdomain_prefix'] dict_values={} dict_values['domain'] = 'sepolicy_domain_t' dict_values['domains'] = 'sepolicy_domain_t' dict_values['target_domain'] = 'sepolicy_target_t' dict_values['source_domain'] = 'sepolicy_source_t' dict_values['peer_domain'] = 'sepolicy_peer_t' dict_values['exception_types'] = 'sepolicy_exception_types_t' dict_values['user_domain'] = 'sepolicy_userdomain_t' dict_values['userdomain'] = 'sepolicy_userdomain_t' dict_values['bool_domain'] = 'sepolicy_bool_domain_t' dict_values['type'] = 'sepolicy_file_t' dict_values['file_type'] = 'sepolicy_file_t' dict_values['private type'] = 'sepolicy_private_file_t' dict_values['private_type'] = 'sepolicy_private_file_t' dict_values['pty_type'] = 'sepolicy_devpts_t' dict_values['tmpfs_type'] = 'sepolicy_tmpfs_t' dict_values['home_type'] = 'sepolicy_home_file_t' dict_values['tty_type'] = 'sepolicy_t' dict_values['directory_type'] = 'sepolicy_file_t' dict_values['object_type'] = 'sepolicy_object_t' dict_values['script_file'] = 'sepolicy_exec_t' dict_values['entry_point'] = 'sepolicy_exec_t' dict_values['file'] = 'sepolicy_file_t' dict_values['entry_file'] = 'sepolicy_exec_t' dict_values['init_script_file'] = 'sepolicy_exec_t' dict_values['entrypoint'] = 'sepolicy_exec_t' dict_values['role'] = 'sepolicy_r' dict_values['role_prefix'] = 'sepolicy' dict_values['user_role'] = 'sepolicy_r' dict_values['source_role'] = 'sepolicy_source_r' dict_values['prefix'] = 'sepolicy_domain' dict_values['domain_prefix'] = 'sepolicy_domain' dict_values['userdomain_prefix'] = 'sepolicy_userdomain' dict_values['user_prefix'] = 'sepolicy_userdomain' dict_values['object_class'] = 'file' dict_values['object'] = 'file' dict_values['class'] = 'file' dict_values['objectclass(es)'] = 'file' dict_values['object_name'] = 'sepolicy_object' dict_values['name'] = '"sepolicy_name"' dict_values['terminal'] = 'sepolicy_tty_t' dict_values['boolean'] = 'sepolicy_bool_t' dict_values['range'] = 's0 - mcs_systemhigh' te_test_module="""\ policy_module(TEMPLATETYPE, 1.0.0) type sepolicy_t; domain_type(sepolicy_t) type sepolicy_domain_t; domain_type(sepolicy_domain_t) type sepolicy_target_t; domain_type(sepolicy_target_t) type sepolicy_source_t; domain_type(sepolicy_source_t) type sepolicy_peer_t; domain_type(sepolicy_peer_t) type sepolicy_exception_types_t; domain_type(sepolicy_exception_types_t) type sepolicy_userdomain_t; domain_type(sepolicy_userdomain_t) type sepolicy_file_t; files_type(sepolicy_file_t) type sepolicy_private_file_t; files_type(sepolicy_private_file_t) type sepolicy_home_file_t; files_type(sepolicy_home_file_t) type sepolicy_tty_t; term_tty(sepolicy_tty_t) type sepolicy_object_t; type sepolicy_devpts_t; term_pty(sepolicy_devpts_t) type sepolicy_tmpfs_t; files_type(sepolicy_tmpfs_t) type sepolicy_exec_t; files_type(sepolicy_exec_t) role sepolicy_r; role sepolicy_source_r; role sepolicy_target_r; ################################# # # Local policy # """ selinux-python-3.0/sepolicy/sepolicy/templates/tmp.py000066400000000000000000000066011356774067000232320ustar00rootroot00000000000000# Copyright (C) 2007-2012 Red Hat # see file 'COPYING' for use and warranty information # # policygentool is a tool for the initial generation of SELinux policy # # This program is free software; you can redistribute it and/or # modify it under the terms of the GNU General Public License as # published by the Free Software Foundation; either version 2 of # the License, or (at your option) any later version. # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program; if not, write to the Free Software # Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA # 02111-1307 USA # # ########################### tmp Template File ############################# te_types=""" type TEMPLATETYPE_tmp_t; files_tmp_file(TEMPLATETYPE_tmp_t) """ te_rules=""" manage_dirs_pattern(TEMPLATETYPE_t, TEMPLATETYPE_tmp_t, TEMPLATETYPE_tmp_t) manage_files_pattern(TEMPLATETYPE_t, TEMPLATETYPE_tmp_t, TEMPLATETYPE_tmp_t) manage_lnk_files_pattern(TEMPLATETYPE_t, TEMPLATETYPE_tmp_t, TEMPLATETYPE_tmp_t) files_tmp_filetrans(TEMPLATETYPE_t, TEMPLATETYPE_tmp_t, { dir file lnk_file }) """ te_stream_rules=""" manage_sock_files_pattern(TEMPLATETYPE_t, TEMPLATETYPE_tmp_t, TEMPLATETYPE_tmp_t) files_tmp_filetrans(TEMPLATETYPE_t, TEMPLATETYPE_tmp_t, sock_file) """ if_rules=""" ######################################## ## ## Do not audit attempts to read, ## TEMPLATETYPE tmp files ## ## ## ## Domain to not audit. ## ## # interface(`TEMPLATETYPE_dontaudit_read_tmp_files',` gen_require(` type TEMPLATETYPE_tmp_t; ') dontaudit $1 TEMPLATETYPE_tmp_t:file read_file_perms; ') ######################################## ## ## Read TEMPLATETYPE tmp files ## ## ## ## Domain allowed access. ## ## # interface(`TEMPLATETYPE_read_tmp_files',` gen_require(` type TEMPLATETYPE_tmp_t; ') files_search_tmp($1) read_files_pattern($1, TEMPLATETYPE_tmp_t, TEMPLATETYPE_tmp_t) ') ######################################## ## ## Manage TEMPLATETYPE tmp files ## ## ## ## Domain allowed access. ## ## # interface(`TEMPLATETYPE_manage_tmp',` gen_require(` type TEMPLATETYPE_tmp_t; ') files_search_tmp($1) manage_dirs_pattern($1, TEMPLATETYPE_tmp_t, TEMPLATETYPE_tmp_t) manage_files_pattern($1, TEMPLATETYPE_tmp_t, TEMPLATETYPE_tmp_t) manage_lnk_files_pattern($1, TEMPLATETYPE_tmp_t, TEMPLATETYPE_tmp_t) ') """ if_stream_rules="""\ ######################################## ## ## Connect to TEMPLATETYPE over a unix stream socket. ## ## ## ## Domain allowed access. ## ## # interface(`TEMPLATETYPE_stream_connect',` gen_require(` type TEMPLATETYPE_t, TEMPLATETYPE_tmp_t; ') files_search_pids($1) stream_connect_pattern($1, TEMPLATETYPE_tmp_t, TEMPLATETYPE_tmp_t, TEMPLATETYPE_t) ') """ if_admin_types=""" type TEMPLATETYPE_tmp_t;""" if_admin_rules=""" files_search_tmp($1) admin_pattern($1, TEMPLATETYPE_tmp_t) """ selinux-python-3.0/sepolicy/sepolicy/templates/unit_file.py000066400000000000000000000043251356774067000244110ustar00rootroot00000000000000# Copyright (C) 2012 Red Hat # see file 'COPYING' for use and warranty information # # policygentool is a tool for the initial generation of SELinux policy # # This program is free software; you can redistribute it and/or # modify it under the terms of the GNU General Public License as # published by the Free Software Foundation; either version 2 of # the License, or (at your option) any later version. # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program; if not, write to the Free Software # Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA # 02111-1307 USA # # ########################### unit Template File ############################# ########################### Type Enforcement File ############################# te_types=""" type TEMPLATETYPE_unit_file_t; systemd_unit_file(TEMPLATETYPE_unit_file_t) """ te_rules="" ########################### Interface File ############################# if_rules="""\ ######################################## ## ## Execute TEMPLATETYPE server in the TEMPLATETYPE domain. ## ## ## ## Domain allowed to transition. ## ## # interface(`TEMPLATETYPE_systemctl',` gen_require(` type TEMPLATETYPE_t; type TEMPLATETYPE_unit_file_t; ') systemd_exec_systemctl($1) systemd_read_fifo_file_passwd_run($1) allow $1 TEMPLATETYPE_unit_file_t:file read_file_perms; allow $1 TEMPLATETYPE_unit_file_t:service manage_service_perms; ps_process_pattern($1, TEMPLATETYPE_t) ') """ if_admin_types=""" type TEMPLATETYPE_unit_file_t;""" if_admin_rules=""" TEMPLATETYPE_systemctl($1) admin_pattern($1, TEMPLATETYPE_unit_file_t) allow $1 TEMPLATETYPE_unit_file_t:service all_service_perms; """ ########################### File Context ################################## fc_file="""\ FILENAME -- gen_context(system_u:object_r:TEMPLATETYPE_unit_file_t,s0) """ fc_dir="" selinux-python-3.0/sepolicy/sepolicy/templates/user.py000066400000000000000000000103311356774067000234030ustar00rootroot00000000000000# Copyright (C) 2007-2012 Red Hat # see file 'COPYING' for use and warranty information # # policygentool is a tool for the initial generation of SELinux policy # # This program is free software; you can redistribute it and/or # modify it under the terms of the GNU General Public License as # published by the Free Software Foundation; either version 2 of # the License, or (at your option) any later version. # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program; if not, write to the Free Software # Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA # 02111-1307 USA # # ########################### Type Enforcement File ############################# te_login_user_types="""\ policy_module(TEMPLATETYPE, 1.0.0) ######################################## # # Declarations # userdom_unpriv_user_template(TEMPLATETYPE) """ te_admin_user_types="""\ policy_module(TEMPLATETYPE, 1.0.0) ######################################## # # Declarations # userdom_admin_user_template(TEMPLATETYPE) """ te_min_login_user_types="""\ policy_module(TEMPLATETYPE, 1.0.0) ######################################## # # Declarations # userdom_restricted_user_template(TEMPLATETYPE) """ te_x_login_user_types="""\ policy_module(TEMPLATETYPE, 1.0.0) ######################################## # # Declarations # userdom_restricted_xwindows_user_template(TEMPLATETYPE) """ te_existing_user_types="""\ policy_module(TEMPLATETYPE, 1.0.0) """ te_root_user_types="""\ policy_module(TEMPLATETYPE, 1.0.0) ## ##

## Allow TEMPLATETYPE to read files in the user home directory ##

##
gen_tunable(TEMPLATETYPE_read_user_files, false) ## ##

## Allow TEMPLATETYPE to manage files in the user home directory ##

##
gen_tunable(TEMPLATETYPE_manage_user_files, false) ######################################## # # Declarations # userdom_base_user_template(TEMPLATETYPE) """ te_login_user_rules="""\ """ te_existing_user_rules="""\ ######################################## # # TEMPLATETYPE customized policy # """ te_x_login_user_rules="""\ """ te_root_user_rules="""\ """ te_transition_rules=""" optional_policy(` APPLICATION_role(TEMPLATETYPE_r, TEMPLATETYPE_t) ') """ te_user_trans_rules=""" optional_policy(` gen_require(` role USER_r; ') TEMPLATETYPE_role_change(USER_r) ') """ te_admin_rules=""" allow TEMPLATETYPE_t self:capability { dac_override dac_read_search kill sys_ptrace sys_nice }; files_dontaudit_search_all_dirs(TEMPLATETYPE_t) selinux_get_enforce_mode(TEMPLATETYPE_t) seutil_domtrans_setfiles(TEMPLATETYPE_t) seutil_search_default_contexts(TEMPLATETYPE_t) logging_send_syslog_msg(TEMPLATETYPE_t) kernel_read_system_state(TEMPLATETYPE_t) domain_dontaudit_search_all_domains_state(TEMPLATETYPE_t) domain_dontaudit_ptrace_all_domains(TEMPLATETYPE_t) userdom_dontaudit_search_admin_dir(TEMPLATETYPE_t) userdom_dontaudit_search_user_home_dirs(TEMPLATETYPE_t) tunable_policy(`TEMPLATETYPE_read_user_files',` userdom_read_user_home_content_files(TEMPLATETYPE_t) userdom_read_user_tmp_files(TEMPLATETYPE_t) ') tunable_policy(`TEMPLATETYPE_manage_user_files',` userdom_manage_user_home_content_dirs(TEMPLATETYPE_t) userdom_manage_user_home_content_files(TEMPLATETYPE_t) userdom_manage_user_home_content_symlinks(TEMPLATETYPE_t) userdom_manage_user_tmp_files(TEMPLATETYPE_t) ') """ te_admin_trans_rules=""" gen_require(` role USER_r; ') allow USER_r TEMPLATETYPE_r; """ te_admin_domain_rules=""" optional_policy(` APPLICATION_admin(TEMPLATETYPE_t, TEMPLATETYPE_r) ') """ te_roles_rules=""" optional_policy(` gen_require(` role ROLE_r; ') allow TEMPLATETYPE_r ROLE_r; ') """ te_sudo_rules=""" optional_policy(` sudo_role_template(TEMPLATETYPE, TEMPLATETYPE_r, TEMPLATETYPE_t) ') """ te_newrole_rules=""" seutil_run_newrole(TEMPLATETYPE_t, TEMPLATETYPE_r) """ selinux-python-3.0/sepolicy/sepolicy/templates/var_cache.py000066400000000000000000000100701356774067000243400ustar00rootroot00000000000000# Copyright (C) 2007-2012 Red Hat # see file 'COPYING' for use and warranty information # # policygentool is a tool for the initial generation of SELinux policy # # This program is free software; you can redistribute it and/or # modify it under the terms of the GNU General Public License as # published by the Free Software Foundation; either version 2 of # the License, or (at your option) any later version. # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program; if not, write to the Free Software # Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA # 02111-1307 USA # # ########################### cache Template File ############################# ########################### Type Enforcement File ############################# te_types=""" type TEMPLATETYPE_cache_t; files_type(TEMPLATETYPE_cache_t) """ te_rules=""" manage_dirs_pattern(TEMPLATETYPE_t, TEMPLATETYPE_cache_t, TEMPLATETYPE_cache_t) manage_files_pattern(TEMPLATETYPE_t, TEMPLATETYPE_cache_t, TEMPLATETYPE_cache_t) manage_lnk_files_pattern(TEMPLATETYPE_t, TEMPLATETYPE_cache_t, TEMPLATETYPE_cache_t) files_var_filetrans(TEMPLATETYPE_t, TEMPLATETYPE_cache_t, { dir file lnk_file }) """ te_stream_rules="""\ manage_sock_files_pattern(TEMPLATETYPE_t, TEMPLATETYPE_cache_t, TEMPLATETYPE_cache_t) files_var_filetrans(TEMPLATETYPE_t, TEMPLATETYPE_cache_t, sock_file) """ ########################### Interface File ############################# if_rules=""" ######################################## ## ## Search TEMPLATETYPE cache directories. ## ## ## ## Domain allowed access. ## ## # interface(`TEMPLATETYPE_search_cache',` gen_require(` type TEMPLATETYPE_cache_t; ') allow $1 TEMPLATETYPE_cache_t:dir search_dir_perms; files_search_var($1) ') ######################################## ## ## Read TEMPLATETYPE cache files. ## ## ## ## Domain allowed access. ## ## # interface(`TEMPLATETYPE_read_cache_files',` gen_require(` type TEMPLATETYPE_cache_t; ') files_search_var($1) read_files_pattern($1, TEMPLATETYPE_cache_t, TEMPLATETYPE_cache_t) ') ######################################## ## ## Create, read, write, and delete ## TEMPLATETYPE cache files. ## ## ## ## Domain allowed access. ## ## # interface(`TEMPLATETYPE_manage_cache_files',` gen_require(` type TEMPLATETYPE_cache_t; ') files_search_var($1) manage_files_pattern($1, TEMPLATETYPE_cache_t, TEMPLATETYPE_cache_t) ') ######################################## ## ## Manage TEMPLATETYPE cache dirs. ## ## ## ## Domain allowed access. ## ## # interface(`TEMPLATETYPE_manage_cache_dirs',` gen_require(` type TEMPLATETYPE_cache_t; ') files_search_var($1) manage_dirs_pattern($1, TEMPLATETYPE_cache_t, TEMPLATETYPE_cache_t) ') """ if_stream_rules=""" ######################################## ## ## Connect to TEMPLATETYPE over a unix stream socket. ## ## ## ## Domain allowed access. ## ## # interface(`TEMPLATETYPE_stream_connect',` gen_require(` type TEMPLATETYPE_t, TEMPLATETYPE_cache_t; ') stream_connect_pattern($1, TEMPLATETYPE_cache_t, TEMPLATETYPE_cache_t) ') """ if_admin_types=""" type TEMPLATETYPE_cache_t;""" if_admin_rules=""" files_search_var($1) admin_pattern($1, TEMPLATETYPE_cache_t) """ ########################### File Context ################################## fc_file="""\ FILENAME -- gen_context(system_u:object_r:TEMPLATETYPE_cache_t,s0) """ fc_dir="""\ FILENAME(/.*)? gen_context(system_u:object_r:TEMPLATETYPE_cache_t,s0) """ selinux-python-3.0/sepolicy/sepolicy/templates/var_lib.py000066400000000000000000000103131356774067000240430ustar00rootroot00000000000000# Copyright (C) 2007-2012 Red Hat # see file 'COPYING' for use and warranty information # # policygentool is a tool for the initial generation of SELinux policy # # This program is free software; you can redistribute it and/or # modify it under the terms of the GNU General Public License as # published by the Free Software Foundation; either version 2 of # the License, or (at your option) any later version. # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program; if not, write to the Free Software # Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA # 02111-1307 USA # # ########################### var_lib Template File ############################# ########################### Type Enforcement File ############################# te_types=""" type TEMPLATETYPE_var_lib_t; files_type(TEMPLATETYPE_var_lib_t) """ te_rules=""" manage_dirs_pattern(TEMPLATETYPE_t, TEMPLATETYPE_var_lib_t, TEMPLATETYPE_var_lib_t) manage_files_pattern(TEMPLATETYPE_t, TEMPLATETYPE_var_lib_t, TEMPLATETYPE_var_lib_t) manage_lnk_files_pattern(TEMPLATETYPE_t, TEMPLATETYPE_var_lib_t, TEMPLATETYPE_var_lib_t) files_var_lib_filetrans(TEMPLATETYPE_t, TEMPLATETYPE_var_lib_t, { dir file lnk_file }) """ te_stream_rules="""\ manage_sock_files_pattern(TEMPLATETYPE_t, TEMPLATETYPE_var_lib_t, TEMPLATETYPE_var_lib_t) files_var_lib_filetrans(TEMPLATETYPE_t, TEMPLATETYPE_var_lib_t, sock_file) """ ########################### Interface File ############################# if_rules=""" ######################################## ## ## Search TEMPLATETYPE lib directories. ## ## ## ## Domain allowed access. ## ## # interface(`TEMPLATETYPE_search_lib',` gen_require(` type TEMPLATETYPE_var_lib_t; ') allow $1 TEMPLATETYPE_var_lib_t:dir search_dir_perms; files_search_var_lib($1) ') ######################################## ## ## Read TEMPLATETYPE lib files. ## ## ## ## Domain allowed access. ## ## # interface(`TEMPLATETYPE_read_lib_files',` gen_require(` type TEMPLATETYPE_var_lib_t; ') files_search_var_lib($1) read_files_pattern($1, TEMPLATETYPE_var_lib_t, TEMPLATETYPE_var_lib_t) ') ######################################## ## ## Manage TEMPLATETYPE lib files. ## ## ## ## Domain allowed access. ## ## # interface(`TEMPLATETYPE_manage_lib_files',` gen_require(` type TEMPLATETYPE_var_lib_t; ') files_search_var_lib($1) manage_files_pattern($1, TEMPLATETYPE_var_lib_t, TEMPLATETYPE_var_lib_t) ') ######################################## ## ## Manage TEMPLATETYPE lib directories. ## ## ## ## Domain allowed access. ## ## # interface(`TEMPLATETYPE_manage_lib_dirs',` gen_require(` type TEMPLATETYPE_var_lib_t; ') files_search_var_lib($1) manage_dirs_pattern($1, TEMPLATETYPE_var_lib_t, TEMPLATETYPE_var_lib_t) ') """ if_stream_rules=""" ######################################## ## ## Connect to TEMPLATETYPE over a unix stream socket. ## ## ## ## Domain allowed access. ## ## # interface(`TEMPLATETYPE_stream_connect',` gen_require(` type TEMPLATETYPE_t, TEMPLATETYPE_var_lib_t; ') stream_connect_pattern($1, TEMPLATETYPE_var_lib_t, TEMPLATETYPE_var_lib_t) ') """ if_admin_types=""" type TEMPLATETYPE_var_lib_t;""" if_admin_rules=""" files_search_var_lib($1) admin_pattern($1, TEMPLATETYPE_var_lib_t) """ ########################### File Context ################################## fc_file="""\ FILENAME -- gen_context(system_u:object_r:TEMPLATETYPE_var_lib_t,s0) """ fc_sock_file="""\ FILENAME -s gen_context(system_u:object_r:TEMPLATETYPE_var_lib_t,s0) """ fc_dir="""\ FILENAME(/.*)? gen_context(system_u:object_r:TEMPLATETYPE_var_lib_t,s0) """ selinux-python-3.0/sepolicy/sepolicy/templates/var_log.py000066400000000000000000000062711356774067000240660ustar00rootroot00000000000000# Copyright (C) 2007-2012 Red Hat # see file 'COPYING' for use and warranty information # # policygentool is a tool for the initial generation of SELinux policy # # This program is free software; you can redistribute it and/or # modify it under the terms of the GNU General Public License as # published by the Free Software Foundation; either version 2 of # the License, or (at your option) any later version. # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program; if not, write to the Free Software # Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA # 02111-1307 USA # # ########################### var_log Template File ############################# ########################### Type Enforcement File ############################# te_types=""" type TEMPLATETYPE_log_t; logging_log_file(TEMPLATETYPE_log_t) """ te_rules=""" manage_dirs_pattern(TEMPLATETYPE_t, TEMPLATETYPE_log_t, TEMPLATETYPE_log_t) manage_files_pattern(TEMPLATETYPE_t, TEMPLATETYPE_log_t, TEMPLATETYPE_log_t) manage_lnk_files_pattern(TEMPLATETYPE_t, TEMPLATETYPE_log_t, TEMPLATETYPE_log_t) logging_log_filetrans(TEMPLATETYPE_t, TEMPLATETYPE_log_t, { dir file lnk_file }) """ ########################### Interface File ############################# if_rules="""\ ######################################## ## ## Read TEMPLATETYPE's log files. ## ## ## ## Domain allowed access. ## ## ## # interface(`TEMPLATETYPE_read_log',` gen_require(` type TEMPLATETYPE_log_t; ') logging_search_logs($1) read_files_pattern($1, TEMPLATETYPE_log_t, TEMPLATETYPE_log_t) ') ######################################## ## ## Append to TEMPLATETYPE log files. ## ## ## ## Domain allowed access. ## ## # interface(`TEMPLATETYPE_append_log',` gen_require(` type TEMPLATETYPE_log_t; ') logging_search_logs($1) append_files_pattern($1, TEMPLATETYPE_log_t, TEMPLATETYPE_log_t) ') ######################################## ## ## Manage TEMPLATETYPE log files ## ## ## ## Domain allowed access. ## ## # interface(`TEMPLATETYPE_manage_log',` gen_require(` type TEMPLATETYPE_log_t; ') logging_search_logs($1) manage_dirs_pattern($1, TEMPLATETYPE_log_t, TEMPLATETYPE_log_t) manage_files_pattern($1, TEMPLATETYPE_log_t, TEMPLATETYPE_log_t) manage_lnk_files_pattern($1, TEMPLATETYPE_log_t, TEMPLATETYPE_log_t) ') """ if_admin_types=""" type TEMPLATETYPE_log_t;""" if_admin_rules=""" logging_search_logs($1) admin_pattern($1, TEMPLATETYPE_log_t) """ ########################### File Context ################################## fc_file="""\ FILENAME -- gen_context(system_u:object_r:TEMPLATETYPE_log_t,s0) """ fc_dir="""\ FILENAME(/.*)? gen_context(system_u:object_r:TEMPLATETYPE_log_t,s0) """ selinux-python-3.0/sepolicy/sepolicy/templates/var_run.py000066400000000000000000000055631356774067000241140ustar00rootroot00000000000000# Copyright (C) 2007-2012 Red Hat # see file 'COPYING' for use and warranty information # # policygentool is a tool for the initial generation of SELinux policy # # This program is free software; you can redistribute it and/or # modify it under the terms of the GNU General Public License as # published by the Free Software Foundation; either version 2 of # the License, or (at your option) any later version. # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program; if not, write to the Free Software # Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA # 02111-1307 USA # # ########################### var_run Template File ############################# te_types=""" type TEMPLATETYPE_var_run_t; files_pid_file(TEMPLATETYPE_var_run_t) """ te_rules=""" manage_dirs_pattern(TEMPLATETYPE_t, TEMPLATETYPE_var_run_t, TEMPLATETYPE_var_run_t) manage_files_pattern(TEMPLATETYPE_t, TEMPLATETYPE_var_run_t, TEMPLATETYPE_var_run_t) manage_lnk_files_pattern(TEMPLATETYPE_t, TEMPLATETYPE_var_run_t, TEMPLATETYPE_var_run_t) files_pid_filetrans(TEMPLATETYPE_t, TEMPLATETYPE_var_run_t, { dir file lnk_file }) """ te_stream_rules=""" manage_files_pattern(TEMPLATETYPE_t, TEMPLATETYPE_var_run_t, TEMPLATETYPE_var_run_t) files_pid_filetrans(TEMPLATETYPE_t, TEMPLATETYPE_var_run_t, sock_file) """ if_rules="""\ ######################################## ## ## Read TEMPLATETYPE PID files. ## ## ## ## Domain allowed access. ## ## # interface(`TEMPLATETYPE_read_pid_files',` gen_require(` type TEMPLATETYPE_var_run_t; ') files_search_pids($1) read_files_pattern($1, TEMPLATETYPE_var_run_t, TEMPLATETYPE_var_run_t) ') """ if_stream_rules="""\ ######################################## ## ## Connect to TEMPLATETYPE over a unix stream socket. ## ## ## ## Domain allowed access. ## ## # interface(`TEMPLATETYPE_stream_connect',` gen_require(` type TEMPLATETYPE_t, TEMPLATETYPE_var_run_t; ') files_search_pids($1) stream_connect_pattern($1, TEMPLATETYPE_var_run_t, TEMPLATETYPE_var_run_t, TEMPLATETYPE_t) ') """ if_admin_types=""" type TEMPLATETYPE_var_run_t;""" if_admin_rules=""" files_search_pids($1) admin_pattern($1, TEMPLATETYPE_var_run_t) """ fc_file="""\ FILENAME -- gen_context(system_u:object_r:TEMPLATETYPE_var_run_t,s0) """ fc_sock_file="""\ FILENAME -s gen_context(system_u:object_r:TEMPLATETYPE_var_run_t,s0) """ fc_dir="""\ FILENAME(/.*)? gen_context(system_u:object_r:TEMPLATETYPE_var_run_t,s0) """ selinux-python-3.0/sepolicy/sepolicy/templates/var_spool.py000066400000000000000000000100561356774067000244350ustar00rootroot00000000000000# Copyright (C) 2007-2012 Red Hat # see file 'COPYING' for use and warranty information # # policygentool is a tool for the initial generation of SELinux policy # # This program is free software; you can redistribute it and/or # modify it under the terms of the GNU General Public License as # published by the Free Software Foundation; either version 2 of # the License, or (at your option) any later version. # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program; if not, write to the Free Software # Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA # 02111-1307 USA # # ########################### var_spool Template File ############################# ########################### Type Enforcement File ############################# te_types=""" type TEMPLATETYPE_spool_t; files_type(TEMPLATETYPE_spool_t) """ te_rules=""" manage_dirs_pattern(TEMPLATETYPE_t, TEMPLATETYPE_spool_t, TEMPLATETYPE_spool_t) manage_files_pattern(TEMPLATETYPE_t, TEMPLATETYPE_spool_t, TEMPLATETYPE_spool_t) manage_lnk_files_pattern(TEMPLATETYPE_t, TEMPLATETYPE_spool_t, TEMPLATETYPE_spool_t) files_spool_filetrans(TEMPLATETYPE_t, TEMPLATETYPE_spool_t, { dir file lnk_file }) """ te_stream_rules="""\ manage_sock_files_pattern(TEMPLATETYPE_t, TEMPLATETYPE_spool_t, TEMPLATETYPE_spool_t) files_spool_filetrans(TEMPLATETYPE_t, TEMPLATETYPE_spool_t, sock_file) """ ########################### Interface File ############################# if_rules=""" ######################################## ## ## Search TEMPLATETYPE spool directories. ## ## ## ## Domain allowed access. ## ## # interface(`TEMPLATETYPE_search_spool',` gen_require(` type TEMPLATETYPE_spool_t; ') allow $1 TEMPLATETYPE_spool_t:dir search_dir_perms; files_search_spool($1) ') ######################################## ## ## Read TEMPLATETYPE spool files. ## ## ## ## Domain allowed access. ## ## # interface(`TEMPLATETYPE_read_spool_files',` gen_require(` type TEMPLATETYPE_spool_t; ') files_search_spool($1) read_files_pattern($1, TEMPLATETYPE_spool_t, TEMPLATETYPE_spool_t) ') ######################################## ## ## Manage TEMPLATETYPE spool files. ## ## ## ## Domain allowed access. ## ## # interface(`TEMPLATETYPE_manage_spool_files',` gen_require(` type TEMPLATETYPE_spool_t; ') files_search_spool($1) manage_files_pattern($1, TEMPLATETYPE_spool_t, TEMPLATETYPE_spool_t) ') ######################################## ## ## Manage TEMPLATETYPE spool dirs. ## ## ## ## Domain allowed access. ## ## # interface(`TEMPLATETYPE_manage_spool_dirs',` gen_require(` type TEMPLATETYPE_spool_t; ') files_search_spool($1) manage_dirs_pattern($1, TEMPLATETYPE_spool_t, TEMPLATETYPE_spool_t) ') """ if_stream_rules=""" ######################################## ## ## Connect to TEMPLATETYPE over a unix stream socket. ## ## ## ## Domain allowed access. ## ## # interface(`TEMPLATETYPE_stream_connect',` gen_require(` type TEMPLATETYPE_t, TEMPLATETYPE_spool_t; ') stream_connect_pattern($1, TEMPLATETYPE_spool_t, TEMPLATETYPE_spool_t) ') """ if_admin_types=""" type TEMPLATETYPE_spool_t;""" if_admin_rules=""" files_search_spool($1) admin_pattern($1, TEMPLATETYPE_spool_t) """ ########################### File Context ################################## fc_file="""\ FILENAME -- gen_context(system_u:object_r:TEMPLATETYPE_spool_t,s0) """ fc_dir="""\ FILENAME(/.*)? gen_context(system_u:object_r:TEMPLATETYPE_spool_t,s0) """ selinux-python-3.0/sepolicy/sepolicy/transition.py000077500000000000000000000062251356774067000226330ustar00rootroot00000000000000# Copyright (C) 2011 Red Hat # see file 'COPYING' for use and warranty information # # setrans is a tool for analyzing process transitions in SELinux policy # # This program is free software; you can redistribute it and/or # modify it under the terms of the GNU General Public License as # published by the Free Software Foundation; either version 2 of # the License, or (at your option) any later version. # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program; if not, write to the Free Software # Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA # 02111-1307 USA # # import sepolicy __all__ = ['setrans'] def _entrypoint(src): trans = sepolicy.search([sepolicy.ALLOW], {sepolicy.SOURCE: src}) return map(lambda y: y[sepolicy.TARGET], filter(lambda x: "entrypoint" in x[sepolicy.PERMS], trans)) def _get_trans(src): src_list = [src] + list(filter(lambda x: x['name'] == src, sepolicy.get_all_types_info()))[0]['attributes'] trans_list = list(filter(lambda x: x['source'] in src_list and x['class'] == 'process', sepolicy.get_all_transitions())) return trans_list class setrans: def __init__(self, source, dest=None): self.seen = [] self.sdict = {} self.source = source self.dest = dest self._process(self.source) def _process(self, source): if source in self.sdict: return self.sdict[source] self.sdict[source] = {} trans = _get_trans(source) if not trans: return self.sdict[source]["name"] = source if not self.dest: self.sdict[source]["map"] = trans else: self.sdict[source]["map"] = list(map(lambda y: y, filter(lambda x: x["transtype"] == self.dest, trans))) self.sdict[source]["child"] = list(map(lambda y: y["transtype"], filter(lambda x: x["transtype"] not in [self.dest, source], trans))) for s in self.sdict[source]["child"]: self._process(s) def out(self, name, header=""): buf = "" if name in self.seen: return buf self.seen.append(name) if "map" in self.sdict[name]: for t in self.sdict[name]["map"]: cond = sepolicy.get_conditionals(t["source"], t["transtype"], "process", ["transition"]) if cond: buf += "%s%s @ %s --> %s %s\n" % (header, t["source"], t["target"], t["transtype"], sepolicy.get_conditionals_format_text(cond)) else: buf += "%s%s @ %s --> %s\n" % (header, t["source"], t["target"], t["transtype"]) if "child" in self.sdict[name]: for x in self.sdict[name]["child"]: buf += self.out(x, "%s%s ... " % (header, name)) return buf def output(self): self.seen = [] print(self.out(self.source)) selinux-python-3.0/sepolicy/setup.py000066400000000000000000000007701356774067000177460ustar00rootroot00000000000000#!/usr/bin/python3 # Author: Thomas Liu # Author: Dan Walsh from distutils.core import setup setup( name="sepolicy", version="3.0", description="Python SELinux Policy Analyses bindings", author="Daniel Walsh", author_email="dwalsh@redhat.com", packages=[ "sepolicy", "sepolicy.templates", "sepolicy.help" ], package_data={ 'sepolicy': ['*.glade'], 'sepolicy.help': ['*.txt', '*.png'] } ) selinux-python-3.0/sepolicy/test_sepolicy.py000066400000000000000000000104601356774067000214710ustar00rootroot00000000000000import unittest import os import shutil from tempfile import mkdtemp from subprocess import Popen, PIPE class SepolicyTests(unittest.TestCase): def assertDenied(self, err): self.assert_('Permission denied' in err, '"Permission denied" not found in %r' % err) def assertNotFound(self, err): self.assert_('not found' in err, '"not found" not found in %r' % err) def assertFailure(self, status): self.assertNotEqual(status, 0, 'Succeeded when it should have failed') def assertSuccess(self, status, err): self.assertEqual(status, 0, 'sepolicy should have succeeded for this test %r' % err) def test_man_domain(self): "Verify sepolicy manpage -d works" p = Popen(['sepolicy', 'manpage', '-d', 'httpd_t'], stdout=PIPE) out, err = p.communicate() self.assertSuccess(p.returncode, err) def test_man_all(self): "Verify sepolicy manpage -a works" p = Popen(['sepolicy', 'manpage', '-a'], stdout=PIPE) out, err = p.communicate() self.assertSuccess(p.returncode, err) def test_network_l(self): "Verify sepolicy network -l works" p = Popen(['sepolicy', 'network', '-l'], stdout=PIPE) out, err = p.communicate() self.assertSuccess(p.returncode, err) def test_network_t(self): "Verify sepolicy network -t works" p = Popen(['sepolicy', 'network', '-t', 'http_port_t'], stdout=PIPE) out, err = p.communicate() self.assertSuccess(p.returncode, err) def test_network_p(self): "Verify sepolicy network -p works" p = Popen(['sepolicy', 'network', '-p', '80'], stdout=PIPE) out, err = p.communicate() self.assertSuccess(p.returncode, err) def test_network_d(self): "Verify sepolicy network -d works" p = Popen(['sepolicy', 'network', '-d', 'httpd_t'], stdout=PIPE) out, err = p.communicate() self.assertSuccess(p.returncode, err) def test_transition_s(self): "Verify sepolicy transition -s works" p = Popen(['sepolicy', 'transition', '-s', 'httpd_t'], stdout=PIPE) out, err = p.communicate() self.assertSuccess(p.returncode, err) def test_transition_t(self): "Verify sepolicy transition -t works" p = Popen(['sepolicy', 'transition', '-s', 'httpd_t', '-t', 'sendmail_t'], stdout=PIPE) out, err = p.communicate() self.assertSuccess(p.returncode, err) def test_booleans_a(self): "Verify sepolicy booleans -a works" p = Popen(['sepolicy', 'booleans', '-a'], stdout=PIPE) out, err = p.communicate() self.assertSuccess(p.returncode, err) def test_booleans_b_alias(self): "Verify sepolicy booleans -b works" p = Popen(['sepolicy', 'booleans', '-b', 'allow_ypbind'], stdout=PIPE) out, err = p.communicate() self.assertSuccess(p.returncode, err) def test_booleans_b(self): "Verify sepolicy booleans -b works" p = Popen(['sepolicy', 'booleans', '-b', 'nis_enabled'], stdout=PIPE) out, err = p.communicate() self.assertSuccess(p.returncode, err) def test_interface_l(self): "Verify sepolicy interface -l works" p = Popen(['sepolicy', 'interface', '-l'], stdout=PIPE) out, err = p.communicate() self.assertSuccess(p.returncode, err) def test_interface_a(self): "Verify sepolicy interface -a works" p = Popen(['sepolicy', 'interface', '-a'], stdout=PIPE) out, err = p.communicate() self.assertSuccess(p.returncode, err) def test_interface_p(self): "Verify sepolicy interface -u works" p = Popen(['sepolicy', 'interface', '-u'], stdout=PIPE) out, err = p.communicate() self.assertSuccess(p.returncode, err) def test_interface_ci(self): "Verify sepolicy interface -c -i works" p = Popen(['sepolicy', 'interface', '-c', '-i', 'apache_admin'], stdout=PIPE) out, err = p.communicate() self.assertSuccess(p.returncode, err) if __name__ == "__main__": import selinux if selinux.is_selinux_enabled() and selinux.security_getenforce() == 1: unittest.main() else: print("SELinux must be in enforcing mode for this test")