| ay 09 08:52:42 localhost.localdomain audit[15512]: AVC avc: denied { read } for pid=15512 comm="abrt-action-gen" name="tizonia" dev="loop1" ino=2 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15512]: AVC avc: denied { read } for pid=15512 comm="abrt-action-gen" name="libboost_program_options.so.1.58.0" dev="loop1" ino=19914 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15512]: AVC avc: denied { read } for pid=15512 comm="abrt-action-gen" name="libboost_system.so.1.58.0" dev="loop1" ino=19937 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15512]: AVC avc: denied { read } for pid=15512 comm="abrt-action-gen" name="libboost_filesystem.so.1.58.0" dev="loop1" ino=19861 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15512]: AVC avc: denied { read } for pid=15512 comm="abrt-action-gen" name="libtizplatform.so.0" dev="loop1" ino=51 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15512]: AVC avc: denied { read } for pid=15512 comm="abrt-action-gen" name="libtizcore.so.0" dev="loop1" ino=47 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15512]: AVC avc: denied { read } for pid=15512 comm="abrt-action-gen" name="libgcc_s.so.1" dev="loop1" ino=3148 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15512]: AVC avc: denied { read } for pid=15512 comm="abrt-action-gen" name="libtizrmproxy.so.0" dev="loop1" ino=52 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15512]: AVC avc: denied { read } for pid=15512 comm="abrt-action-gen" name="librtmp.so.1" dev="loop1" ino=20159 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15512]: AVC avc: denied { read } for pid=15512 comm="abrt-action-gen" name="libssl.so.1.0.0" dev="loop1" ino=3155 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15512]: AVC avc: denied { read } for pid=15512 comm="abrt-action-gen" name="libcrypto.so.1.0.0" dev="loop1" ino=3143 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15512]: AVC avc: denied { read } for pid=15512 comm="abrt-action-gen" name="libtizgmusic.so.0" dev="loop1" ino=49 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15512]: AVC avc: denied { read } for pid=15512 comm="abrt-action-gen" name="libpython2.7.so.1.0" dev="loop1" ino=20149 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15512]: AVC avc: denied { read } for pid=15512 comm="abrt-action-gen" name="libboost_python-py27.so.1.58.0" dev="loop1" ino=19917 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15512]: AVC avc: denied { read } for pid=15512 comm="abrt-action-gen" name="libpulsecommon-8.0.so" dev="loop1" ino=20229 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15512]: AVC avc: denied { read } for pid=15512 comm="abrt-action-gen" name="libtizspotify.so.0.0.7" dev="loop1" ino=3125 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15512]: AVC avc: denied { read } for pid=15512 comm="abrt-action-gen" name="libtizonia.so.0" dev="loop1" ino=50 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15512]: AVC avc: denied { read } for pid=15512 comm="abrt-action-gen" name="libtizpulsear.so.0.0.7" dev="loop1" ino=3113 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15512]: AVC avc: denied { read } for pid=15512 comm="abrt-action-gen" name="tizonia" dev="loop1" ino=2 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15512]: AVC avc: denied { read } for pid=15512 comm="abrt-action-gen" name="libtizpulsear.so.0.0.7" dev="loop1" ino=3113 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15512]: AVC avc: denied { read } for pid=15512 comm="abrt-action-gen" name="libspotify.so.12.1.51" dev="loop1" ino=18148 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15512]: AVC avc: denied { read } for pid=15512 comm="abrt-action-gen" name="libpulse-simple.so.0.1.0" dev="loop1" ino=20143 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15512]: AVC avc: denied { read } for pid=15512 comm="abrt-action-gen" name="libvorbis.so.0.4.8" dev="loop1" ino=20182 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15512]: AVC avc: denied { read } for pid=15512 comm="abrt-action-gen" name="libogg.so.0.8.2" dev="loop1" ino=20132 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15512]: AVC avc: denied { read } for pid=15512 comm="abrt-action-gen" name="libvorbisenc.so.2.0.11" dev="loop1" ino=20184 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15512]: AVC avc: denied { read } for pid=15512 comm="abrt-action-gen" name="libFLAC.so.8.3.0" dev="loop1" ino=19813 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15512]: AVC avc: denied { read } for pid=15512 comm="abrt-action-gen" name="libXdmcp.so.6.0.0" dev="loop1" ino=19824 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15512]: AVC avc: denied { read } for pid=15512 comm="abrt-action-gen" name="libXau.so.6.0.0" dev="loop1" ino=19821 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15512]: AVC avc: denied { read } for pid=15512 comm="abrt-action-gen" name="libasyncns.so.0.3.1" dev="loop1" ino=19840 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15512]: AVC avc: denied { read } for pid=15512 comm="abrt-action-gen" name="libsndfile.so.1.0.25" dev="loop1" ino=20163 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15512]: AVC avc: denied { read } for pid=15512 comm="abrt-action-gen" name="libwrap.so.0.7.6" dev="loop1" ino=3157 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15512]: AVC avc: denied { read } for pid=15512 comm="abrt-action-gen" name="libxcb.so.1.1.0" dev="loop1" ino=20196 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15512]: AVC avc: denied { read } for pid=15512 comm="abrt-action-gen" name="libpulsecommon-8.0.so" dev="loop1" ino=20229 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15512]: AVC avc: denied { read } for pid=15512 comm="abrt-action-gen" name="libboost_python-py27.so.1.58.0" dev="loop1" ino=19917 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15512]: AVC avc: denied { read } for pid=15512 comm="abrt-action-gen" name="libpython2.7.so.1.0" dev="loop1" ino=20149 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15512]: AVC avc: denied { read } for pid=15512 comm="abrt-action-gen" name="libjson-c.so.2.0.0" dev="loop1" ino=3152 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15512]: AVC avc: denied { read } for pid=15512 comm="abrt-action-gen" name="libpulse.so.0.19.0" dev="loop1" ino=20145 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15512]: AVC avc: denied { read } for pid=15512 comm="abrt-action-gen" name="libtizgmusic.so.0" dev="loop1" ino=49 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15512]: AVC avc: denied { read } for pid=15512 comm="abrt-action-gen" name="libtizonia.so.0" dev="loop1" ino=50 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15512]: AVC avc: denied { read } for pid=15512 comm="abrt-action-gen" name="libtizspotify.so.0.0.7" dev="loop1" ino=3125 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15512]: AVC avc: denied { read } for pid=15512 comm="abrt-action-gen" name="libsqlite3.so.0.8.6" dev="loop1" ino=20167 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15512]: AVC avc: denied { read } for pid=15512 comm="abrt-action-gen" name="libhx509.so.5.0.0" dev="loop1" ino=20039 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15512]: AVC avc: denied { read } for pid=15512 comm="abrt-action-gen" name="libheimbase.so.1.0.0" dev="loop1" ino=20024 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15512]: AVC avc: denied { read } for pid=15512 comm="abrt-action-gen" name="libwind.so.0.0.0" dev="loop1" ino=20189 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15512]: AVC avc: denied { read } for pid=15512 comm="abrt-action-gen" name="libroken.so.18.1.0" dev="loop1" ino=20155 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15512]: AVC avc: denied { read } for pid=15512 comm="abrt-action-gen" name="libhcrypto.so.4.1.0" dev="loop1" ino=20022 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15512]: AVC avc: denied { read } for pid=15512 comm="abrt-action-gen" name="libasn1.so.8.0.0" dev="loop1" ino=19836 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15512]: AVC avc: denied { read } for pid=15512 comm="abrt-action-gen" name="libkrb5.so.26.0.0" dev="loop1" ino=20080 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15512]: AVC avc: denied { read } for pid=15512 comm="abrt-action-gen" name="libheimntlm.so.0.1.0" dev="loop1" ino=20026 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15512]: AVC avc: denied { read } for pid=15512 comm="abrt-action-gen" name="libkeyutils.so.1.5" dev="loop1" ino=3154 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15512]: AVC avc: denied { read } for pid=15512 comm="abrt-action-gen" name="libffi.so.6.0.4" dev="loop1" ino=20000 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15512]: AVC avc: denied { read } for pid=15512 comm="abrt-action-gen" name="libgssapi.so.3.0.0" dev="loop1" ino=20016 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15512]: AVC avc: denied { read } for pid=15512 comm="abrt-action-gen" name="libsasl2.so.2.0.25" dev="loop1" ino=20161 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15512]: AVC avc: denied { read } for pid=15512 comm="abrt-action-gen" name="libkrb5support.so.0.1" dev="loop1" ino=20084 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15512]: AVC avc: denied { read } for pid=15512 comm="abrt-action-gen" name="libk5crypto.so.3.1" dev="loop1" ino=20078 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15512]: AVC avc: denied { read } for pid=15512 comm="abrt-action-gen" name="libkrb5.so.3.3" dev="loop1" ino=20082 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15512]: AVC avc: denied { read } for pid=15512 comm="abrt-action-gen" name="libtasn1.so.6.5.1" dev="loop1" ino=20171 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15512]: AVC avc: denied { read } for pid=15512 comm="abrt-action-gen" name="libp11-kit.so.0.1.0" dev="loop1" ino=20138 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15512]: AVC avc: denied { read } for pid=15512 comm="abrt-action-gen" name="libgmp.so.10.3.0" dev="loop1" ino=20008 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15512]: AVC avc: denied { read } for pid=15512 comm="abrt-action-gen" name="libhogweed.so.4.2" dev="loop1" ino=20028 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15512]: AVC avc: denied { read } for pid=15512 comm="abrt-action-gen" name="libcrypto.so.1.0.0" dev="loop1" ino=3143 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15512]: AVC avc: denied { read } for pid=15512 comm="abrt-action-gen" name="libssl.so.1.0.0" dev="loop1" ino=3155 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15512]: AVC avc: denied { read } for pid=15512 comm="abrt-action-gen" name="libexpat.so.1.6.0" dev="loop1" ino=3147 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15512]: AVC avc: denied { read } for pid=15512 comm="abrt-action-gen" name="libldap_r-2.4.so.2.10.5" dev="loop1" ino=20089 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15512]: AVC avc: denied { read } for pid=15512 comm="abrt-action-gen" name="liblber-2.4.so.2.10.5" dev="loop1" ino=20086 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15512]: AVC avc: denied { read } for pid=15512 comm="abrt-action-gen" name="libgssapi_krb5.so.2.2" dev="loop1" ino=20018 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15512]: AVC avc: denied { read } for pid=15512 comm="abrt-action-gen" name="libgnutls.so.30.6.2" dev="loop1" ino=20010 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15512]: AVC avc: denied { read } for pid=15512 comm="abrt-action-gen" name="libnettle.so.6.2" dev="loop1" ino=20118 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15512]: AVC avc: denied { read } for pid=15512 comm="abrt-action-gen" name="librtmp.so.1" dev="loop1" ino=20159 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15512]: AVC avc: denied { read } for pid=15512 comm="abrt-action-gen" name="libidn.so.11.6.15" dev="loop1" ino=20073 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15512]: AVC avc: denied { read } for pid=15512 comm="abrt-action-gen" name="libtizrmproxy.so.0" dev="loop1" ino=52 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15512]: AVC avc: denied { read } for pid=15512 comm="abrt-action-gen" name="libcurl.so.4.4.0" dev="loop1" ino=19976 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15512]: AVC avc: denied { read } for pid=15512 comm="abrt-action-gen" name="liblog4c.so.3.1.0" dev="loop1" ino=18110 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15512]: AVC avc: denied { read } for pid=15512 comm="abrt-action-gen" name="libdbus-1.so.3.14.6" dev="loop1" ino=3145 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15512]: AVC avc: denied { read } for pid=15512 comm="abrt-action-gen" name="libtinyxml2.so.2.2.0" dev="loop1" ino=20174 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15512]: AVC avc: denied { read } for pid=15512 comm="abrt-action-gen" name="libmms.so.0.0.2" dev="loop1" ino=20105 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15512]: AVC avc: denied { read } for pid=15512 comm="abrt-action-gen" name="libcurl-gnutls.so.4.4.0" dev="loop1" ino=19970 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15512]: AVC avc: denied { read } for pid=15512 comm="abrt-action-gen" name="libgcc_s.so.1" dev="loop1" ino=3148 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15512]: AVC avc: denied { read } for pid=15512 comm="abrt-action-gen" name="libtizcore.so.0" dev="loop1" ino=47 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15512]: AVC avc: denied { read } for pid=15512 comm="abrt-action-gen" name="libtizplatform.so.0" dev="loop1" ino=51 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15512]: AVC avc: denied { read } for pid=15512 comm="abrt-action-gen" name="libdbus-c++-1.so.0.0.0" dev="loop1" ino=19979 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15512]: AVC avc: denied { read } for pid=15512 comm="abrt-action-gen" name="libzen.so.0.4.32" dev="loop1" ino=20199 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15512]: AVC avc: denied { read } for pid=15512 comm="abrt-action-gen" name="libmediainfo.so.0.0.0" dev="loop1" ino=20103 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15512]: AVC avc: denied { read } for pid=15512 comm="abrt-action-gen" name="libtag.so.1.14.0" dev="loop1" ino=20169 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15512]: AVC avc: denied { read } for pid=15512 comm="abrt-action-gen" name="libboost_filesystem.so.1.58.0" dev="loop1" ino=19861 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15512]: AVC avc: denied { read } for pid=15512 comm="abrt-action-gen" name="libboost_system.so.1.58.0" dev="loop1" ino=19937 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15512]: AVC avc: denied { read } for pid=15512 comm="abrt-action-gen" name="libboost_program_options.so.1.58.0" dev="loop1" ino=19914 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15512]: AVC avc: denied { read } for pid=15512 comm="abrt-action-gen" name="tizonia" dev="loop1" ino=2 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain abrt-server[15490]: Error: No segments found in coredump './coredump' | |
| May 09 08:52:42 localhost.localdomain audit[15522]: AVC avc: denied { read } for pid=15522 comm="eu-unstrip" name="libboost_program_options.so.1.58.0" dev="loop1" ino=19914 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15522]: AVC avc: denied { read } for pid=15522 comm="eu-unstrip" name="libboost_system.so.1.58.0" dev="loop1" ino=19937 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15522]: AVC avc: denied { read } for pid=15522 comm="eu-unstrip" name="libboost_filesystem.so.1.58.0" dev="loop1" ino=19861 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15522]: AVC avc: denied { read } for pid=15522 comm="eu-unstrip" name="libtizplatform.so.0" dev="loop1" ino=51 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15522]: AVC avc: denied { read } for pid=15522 comm="eu-unstrip" name="libtizcore.so.0" dev="loop1" ino=47 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15522]: AVC avc: denied { read } for pid=15522 comm="eu-unstrip" name="libgcc_s.so.1" dev="loop1" ino=3148 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15522]: AVC avc: denied { read } for pid=15522 comm="eu-unstrip" name="libtizrmproxy.so.0" dev="loop1" ino=52 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15522]: AVC avc: denied { read } for pid=15522 comm="eu-unstrip" name="librtmp.so.1" dev="loop1" ino=20159 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15522]: AVC avc: denied { read } for pid=15522 comm="eu-unstrip" name="libssl.so.1.0.0" dev="loop1" ino=3155 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15522]: AVC avc: denied { read } for pid=15522 comm="eu-unstrip" name="libcrypto.so.1.0.0" dev="loop1" ino=3143 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15522]: AVC avc: denied { read } for pid=15522 comm="eu-unstrip" name="libtizgmusic.so.0" dev="loop1" ino=49 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15522]: AVC avc: denied { read } for pid=15522 comm="eu-unstrip" name="libpython2.7.so.1.0" dev="loop1" ino=20149 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15522]: AVC avc: denied { read } for pid=15522 comm="eu-unstrip" name="libboost_python-py27.so.1.58.0" dev="loop1" ino=19917 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15522]: AVC avc: denied { read } for pid=15522 comm="eu-unstrip" name="libpulsecommon-8.0.so" dev="loop1" ino=20229 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15522]: AVC avc: denied { read } for pid=15522 comm="eu-unstrip" name="libtizspotify.so.0.0.7" dev="loop1" ino=3125 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15522]: AVC avc: denied { read } for pid=15522 comm="eu-unstrip" name="libtizonia.so.0" dev="loop1" ino=50 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15522]: AVC avc: denied { read } for pid=15522 comm="eu-unstrip" name="libtizpulsear.so.0.0.7" dev="loop1" ino=3113 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15522]: AVC avc: denied { read } for pid=15522 comm="eu-unstrip" name="tizonia" dev="loop1" ino=2 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15522]: AVC avc: denied { read } for pid=15522 comm="eu-unstrip" name="libtizpulsear.so.0.0.7" dev="loop1" ino=3113 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15522]: AVC avc: denied { read } for pid=15522 comm="eu-unstrip" name="libspotify.so.12.1.51" dev="loop1" ino=18148 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15522]: AVC avc: denied { read } for pid=15522 comm="eu-unstrip" name="libpulse-simple.so.0.1.0" dev="loop1" ino=20143 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15522]: AVC avc: denied { read } for pid=15522 comm="eu-unstrip" name="libvorbis.so.0.4.8" dev="loop1" ino=20182 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15522]: AVC avc: denied { read } for pid=15522 comm="eu-unstrip" name="libogg.so.0.8.2" dev="loop1" ino=20132 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15522]: AVC avc: denied { read } for pid=15522 comm="eu-unstrip" name="libvorbisenc.so.2.0.11" dev="loop1" ino=20184 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15522]: AVC avc: denied { read } for pid=15522 comm="eu-unstrip" name="libFLAC.so.8.3.0" dev="loop1" ino=19813 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15522]: AVC avc: denied { read } for pid=15522 comm="eu-unstrip" name="libXdmcp.so.6.0.0" dev="loop1" ino=19824 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15522]: AVC avc: denied { read } for pid=15522 comm="eu-unstrip" name="libXau.so.6.0.0" dev="loop1" ino=19821 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15522]: AVC avc: denied { read } for pid=15522 comm="eu-unstrip" name="libasyncns.so.0.3.1" dev="loop1" ino=19840 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15522]: AVC avc: denied { read } for pid=15522 comm="eu-unstrip" name="libsndfile.so.1.0.25" dev="loop1" ino=20163 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15522]: AVC avc: denied { read } for pid=15522 comm="eu-unstrip" name="libwrap.so.0.7.6" dev="loop1" ino=3157 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15522]: AVC avc: denied { read } for pid=15522 comm="eu-unstrip" name="libxcb.so.1.1.0" dev="loop1" ino=20196 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15522]: AVC avc: denied { read } for pid=15522 comm="eu-unstrip" name="libpulsecommon-8.0.so" dev="loop1" ino=20229 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15522]: AVC avc: denied { read } for pid=15522 comm="eu-unstrip" name="libboost_python-py27.so.1.58.0" dev="loop1" ino=19917 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15522]: AVC avc: denied { read } for pid=15522 comm="eu-unstrip" name="libpython2.7.so.1.0" dev="loop1" ino=20149 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15522]: AVC avc: denied { read } for pid=15522 comm="eu-unstrip" name="libjson-c.so.2.0.0" dev="loop1" ino=3152 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15522]: AVC avc: denied { read } for pid=15522 comm="eu-unstrip" name="libpulse.so.0.19.0" dev="loop1" ino=20145 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15522]: AVC avc: denied { read } for pid=15522 comm="eu-unstrip" name="libtizgmusic.so.0" dev="loop1" ino=49 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15522]: AVC avc: denied { read } for pid=15522 comm="eu-unstrip" name="libtizonia.so.0" dev="loop1" ino=50 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15522]: AVC avc: denied { read } for pid=15522 comm="eu-unstrip" name="libtizspotify.so.0.0.7" dev="loop1" ino=3125 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15522]: AVC avc: denied { read } for pid=15522 comm="eu-unstrip" name="libsqlite3.so.0.8.6" dev="loop1" ino=20167 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15522]: AVC avc: denied { read } for pid=15522 comm="eu-unstrip" name="libhx509.so.5.0.0" dev="loop1" ino=20039 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15522]: AVC avc: denied { read } for pid=15522 comm="eu-unstrip" name="libheimbase.so.1.0.0" dev="loop1" ino=20024 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15522]: AVC avc: denied { read } for pid=15522 comm="eu-unstrip" name="libwind.so.0.0.0" dev="loop1" ino=20189 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15522]: AVC avc: denied { read } for pid=15522 comm="eu-unstrip" name="libroken.so.18.1.0" dev="loop1" ino=20155 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15522]: AVC avc: denied { read } for pid=15522 comm="eu-unstrip" name="libhcrypto.so.4.1.0" dev="loop1" ino=20022 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15522]: AVC avc: denied { read } for pid=15522 comm="eu-unstrip" name="libasn1.so.8.0.0" dev="loop1" ino=19836 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15522]: AVC avc: denied { read } for pid=15522 comm="eu-unstrip" name="libkrb5.so.26.0.0" dev="loop1" ino=20080 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15522]: AVC avc: denied { read } for pid=15522 comm="eu-unstrip" name="libheimntlm.so.0.1.0" dev="loop1" ino=20026 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15522]: AVC avc: denied { read } for pid=15522 comm="eu-unstrip" name="libkeyutils.so.1.5" dev="loop1" ino=3154 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15522]: AVC avc: denied { read } for pid=15522 comm="eu-unstrip" name="libffi.so.6.0.4" dev="loop1" ino=20000 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15522]: AVC avc: denied { read } for pid=15522 comm="eu-unstrip" name="libgssapi.so.3.0.0" dev="loop1" ino=20016 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15522]: AVC avc: denied { read } for pid=15522 comm="eu-unstrip" name="libsasl2.so.2.0.25" dev="loop1" ino=20161 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15522]: AVC avc: denied { read } for pid=15522 comm="eu-unstrip" name="libkrb5support.so.0.1" dev="loop1" ino=20084 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15522]: AVC avc: denied { read } for pid=15522 comm="eu-unstrip" name="libk5crypto.so.3.1" dev="loop1" ino=20078 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15522]: AVC avc: denied { read } for pid=15522 comm="eu-unstrip" name="libkrb5.so.3.3" dev="loop1" ino=20082 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15522]: AVC avc: denied { read } for pid=15522 comm="eu-unstrip" name="libtasn1.so.6.5.1" dev="loop1" ino=20171 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15522]: AVC avc: denied { read } for pid=15522 comm="eu-unstrip" name="libp11-kit.so.0.1.0" dev="loop1" ino=20138 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15522]: AVC avc: denied { read } for pid=15522 comm="eu-unstrip" name="libgmp.so.10.3.0" dev="loop1" ino=20008 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15522]: AVC avc: denied { read } for pid=15522 comm="eu-unstrip" name="libhogweed.so.4.2" dev="loop1" ino=20028 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15522]: AVC avc: denied { read } for pid=15522 comm="eu-unstrip" name="libcrypto.so.1.0.0" dev="loop1" ino=3143 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15522]: AVC avc: denied { read } for pid=15522 comm="eu-unstrip" name="libssl.so.1.0.0" dev="loop1" ino=3155 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15522]: AVC avc: denied { read } for pid=15522 comm="eu-unstrip" name="libexpat.so.1.6.0" dev="loop1" ino=3147 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15522]: AVC avc: denied { read } for pid=15522 comm="eu-unstrip" name="libldap_r-2.4.so.2.10.5" dev="loop1" ino=20089 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15522]: AVC avc: denied { read } for pid=15522 comm="eu-unstrip" name="liblber-2.4.so.2.10.5" dev="loop1" ino=20086 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain audit[15522]: AVC avc: denied { read } for pid=15522 comm="eu-unstrip" name="libgssapi_krb5.so.2.2" dev="loop1" ino=20018 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=0 | |
| May 09 08:52:42 localhost.localdomain kernel: audit_log_start: 107 callbacks suppressed | |
| May 09 08:52:42 localhost.localdomain kernel: audit: audit_backlog=65 > audit_backlog_limit=64 | |
| May 09 08:52:42 localhost.localdomain kernel: audit: audit_lost=40 audit_rate_limit=0 audit_backlog_limit=64 | |
| May 09 08:52:42 localhost.localdomain kernel: audit: backlog limit exceeded | |
| May 09 08:52:42 localhost.localdomain kernel: audit: audit_backlog=65 > audit_backlog_limit=64 | |
| May 09 08:52:42 localhost.localdomain kernel: audit: audit_lost=41 audit_rate_limit=0 audit_backlog_limit=64 | |
| May 09 08:52:42 localhost.localdomain kernel: audit: backlog limit exceeded | |
| May 09 08:52:42 localhost.localdomain kernel: audit: audit_backlog=65 > audit_backlog_limit=64 | |
| May 09 08:52:42 localhost.localdomain kernel: audit: audit_lost=42 audit_rate_limit=0 audit_backlog_limit=64 | |
| May 09 08:52:42 localhost.localdomain kernel: audit: backlog limit exceeded | |
| May 09 08:52:42 localhost.localdomain kernel: audit: audit_backlog=65 > audit_backlog_limit=64 | |
| May 09 08:52:45 localhost.localdomain dbus-daemon[734]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.56' (uid=0 pid=711 comm="/usr/sbin/sedispatch " label="system_u:system_r:audisp_t:s0") (using servicehelper) | |
| May 09 08:52:46 localhost.localdomain dbus-daemon[734]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' | |
| May 09 08:52:46 localhost.localdomain setroubleshoot[15534]: failed to retrieve rpm info for /var/lib/snapd/snap/tizonia/x1/bin/tizonia | |
| May 09 08:52:46 localhost.localdomain setroubleshoot[15534]: SELinux is preventing abrt-action-gen from read access on the file /var/lib/snapd/snap/tizonia/x1/bin/tizonia. For complete SELinux messages. run sealert -l 202baa0c-62f5-483f-ab90-ef18436057d8 | |
| May 09 08:52:46 localhost.localdomain python3[15534]: SELinux is preventing abrt-action-gen from read access on the file /var/lib/snapd/snap/tizonia/x1/bin/tizonia. | |
| ***** Plugin catchall_labels (83.8 confidence) suggests ******************* | |
| If you want to allow abrt-action-gen to have read access on the tizonia file | |
| Then you need to change the label on /var/lib/snapd/snap/tizonia/x1/bin/tizonia | |
| Do | |
| # semanage fcontext -a -t FILE_TYPE '/var/lib/snapd/snap/tizonia/x1/bin/tizonia' | |
| where FILE_TYPE is one of the following: NetworkManager_etc_rw_t, NetworkManager_etc_t, NetworkManager_exec_t, NetworkManager_initrc_exec_t, NetworkManager_tmp_t, abrt_dump_oops_exec_t, abrt_etc_t, abrt_exec_t, abrt_handle_event_exec_t, abrt_helper_exec_t, abrt_initrc_exec_t, abrt_retrace_coredump_exec_t, abrt_retrace_work | |
| Then execute: | |
| restorecon -v '/var/lib/snapd/snap/tizonia/x1/bin/tizonia' | |
| ***** Plugin catchall (17.1 confidence) suggests ************************** | |
| If you believe that abrt-action-gen should be allowed read access on the tizonia file by default. | |
| Then you should report this as a bug. | |
| You can generate a local policy module to allow this access. | |
| Do | |
| allow this access for now by executing: | |
| # ausearch -c 'abrt-action-gen' --raw | audit2allow -M my-abrtactiongen | |
| # semodule -X 300 -i my-abrtactiongen.pp | |
| May 09 08:52:46 localhost.localdomain setroubleshoot[15534]: failed to retrieve rpm info for /var/lib/snapd/snap/tizonia/x1/usr/lib/x86_64-linux-gnu/libboost_program_options.so.1.58.0 | |
| May 09 08:52:47 localhost.localdomain setroubleshoot[15534]: SELinux is preventing abrt-action-gen from read access on the file /var/lib/snapd/snap/tizonia/x1/usr/lib/x86_64-linux-gnu/libboost_program_options.so.1.58.0. For complete SELinux messages. run sealert -l 202baa0c-62f5-483f-ab90-ef18436057d8 | |
| May 09 08:52:47 localhost.localdomain python3[15534]: SELinux is preventing abrt-action-gen from read access on the file /var/lib/snapd/snap/tizonia/x1/usr/lib/x86_64-linux-gnu/libboost_program_options.so.1.58.0. | |
| ***** Plugin catchall_labels (83.8 confidence) suggests ******************* | |
| If you want to allow abrt-action-gen to have read access on the libboost_program_options.so.1.58.0 file | |
| Then you need to change the label on /var/lib/snapd/snap/tizonia/x1/usr/lib/x86_64-linux-gnu/libboost_program_options.so.1.58.0 | |
| Do | |
| # semanage fcontext -a -t FILE_TYPE '/var/lib/snapd/snap/tizonia/x1/usr/lib/x86_64-linux-gnu/libboost_program_options.so.1.58.0' | |
| where FILE_TYPE is one of the following: NetworkManager_etc_rw_t, NetworkManager_etc_t, NetworkManager_exec_t, NetworkManager_initrc_exec_t, NetworkManager_tmp_t, abrt_dump_oops_exec_t, abrt_etc_t, abrt_exec_t, abrt_handle_event_exec_t, abrt_helper_exec_t, abrt_initrc_exec_t, abrt_retrace_coredump_exec_t, abrt_retrace_work | |
| Then execute: | |
| restorecon -v '/var/lib/snapd/snap/tizonia/x1/usr/lib/x86_64-linux-gnu/libboost_program_options.so.1.58.0' | |
| ***** Plugin catchall (17.1 confidence) suggests ************************** | |
| If you believe that abrt-action-gen should be allowed read access on the libboost_program_options.so.1.58.0 file by default. | |
| Then you should report this as a bug. | |
| You can generate a local policy module to allow this access. | |
| Do | |
| allow this access for now by executing: | |
| # ausearch -c 'abrt-action-gen' --raw | audit2allow -M my-abrtactiongen | |
| # semodule -X 300 -i my-abrtactiongen.pp | |
| May 09 08:52:47 localhost.localdomain setroubleshoot[15534]: failed to retrieve rpm info for /var/lib/snapd/snap/tizonia/x1/usr/lib/x86_64-linux-gnu/libboost_system.so.1.58.0 | |
| May 09 08:52:47 localhost.localdomain setroubleshoot[15534]: SELinux is preventing abrt-action-gen from read access on the file /var/lib/snapd/snap/tizonia/x1/usr/lib/x86_64-linux-gnu/libboost_system.so.1.58.0. For complete SELinux messages. run sealert -l 202baa0c-62f5-483f-ab90-ef18436057d8 | |
| May 09 08:52:47 localhost.localdomain python3[15534]: SELinux is preventing abrt-action-gen from read access on the file /var/lib/snapd/snap/tizonia/x1/usr/lib/x86_64-linux-gnu/libboost_system.so.1.58.0. | |
| ***** Plugin catchall_labels (83.8 confidence) suggests ******************* | |
| If you want to allow abrt-action-gen to have read access on the libboost_system.so.1.58.0 file | |
| Then you need to change the label on /var/lib/snapd/snap/tizonia/x1/usr/lib/x86_64-linux-gnu/libboost_system.so.1.58.0 | |
| Do | |
| # semanage fcontext -a -t FILE_TYPE '/var/lib/snapd/snap/tizonia/x1/usr/lib/x86_64-linux-gnu/libboost_system.so.1.58.0' | |
| where FILE_TYPE is one of the following: NetworkManager_etc_rw_t, NetworkManager_etc_t, NetworkManager_exec_t, NetworkManager_initrc_exec_t, NetworkManager_tmp_t, abrt_dump_oops_exec_t, abrt_etc_t, abrt_exec_t, abrt_handle_event_exec_t, abrt_helper_exec_t, abrt_initrc_exec_t, abrt_retrace_coredump_exec_t, abrt_retrace_work | |
| Then execute: | |
| restorecon -v '/var/lib/snapd/snap/tizonia/x1/usr/lib/x86_64-linux-gnu/libboost_system.so.1.58.0' | |
| ***** Plugin catchall (17.1 confidence) suggests ************************** | |
| If you believe that abrt-action-gen should be allowed read access on the libboost_system.so.1.58.0 file by default. | |
| Then you should report this as a bug. | |
| You can generate a local policy module to allow this access. | |
| Do | |
| allow this access for now by executing: | |
| # ausearch -c 'abrt-action-gen' --raw | audit2allow -M my-abrtactiongen | |
| # semodule -X 300 -i my-abrtactiongen.pp | |
| May 09 08:52:47 localhost.localdomain setroubleshoot[15534]: failed to retrieve rpm info for /var/lib/snapd/snap/tizonia/x1/usr/lib/x86_64-linux-gnu/libboost_filesystem.so.1.58.0 | |
| May 09 08:52:47 localhost.localdomain setroubleshoot[15534]: SELinux is preventing abrt-action-gen from read access on the file /var/lib/snapd/snap/tizonia/x1/usr/lib/x86_64-linux-gnu/libboost_filesystem.so.1.58.0. For complete SELinux messages. run sealert -l 202baa0c-62f5-483f-ab90-ef18436057d8 | |
| May 09 08:52:47 localhost.localdomain python3[15534]: SELinux is preventing abrt-action-gen from read access on the file /var/lib/snapd/snap/tizonia/x1/usr/lib/x86_64-linux-gnu/libboost_filesystem.so.1.58.0. | |
| ***** Plugin catchall_labels (83.8 confidence) suggests ******************* | |
| If you want to allow abrt-action-gen to have read access on the libboost_filesystem.so.1.58.0 file | |
| Then you need to change the label on /var/lib/snapd/snap/tizonia/x1/usr/lib/x86_64-linux-gnu/libboost_filesystem.so.1.58.0 | |
| Do | |
| # semanage fcontext -a -t FILE_TYPE '/var/lib/snapd/snap/tizonia/x1/usr/lib/x86_64-linux-gnu/libboost_filesystem.so.1.58.0' | |
| where FILE_TYPE is one of the following: NetworkManager_etc_rw_t, NetworkManager_etc_t, NetworkManager_exec_t, NetworkManager_initrc_exec_t, NetworkManager_tmp_t, abrt_dump_oops_exec_t, abrt_etc_t, abrt_exec_t, abrt_handle_event_exec_t, abrt_helper_exec_t, abrt_initrc_exec_t, abrt_retrace_coredump_exec_t, abrt_retrace_work | |
| Then execute: | |
| restorecon -v '/var/lib/snapd/snap/tizonia/x1/usr/lib/x86_64-linux-gnu/libboost_filesystem.so.1.58.0' | |
| ***** Plugin catchall (17.1 confidence) suggests ************************** | |
| If you believe that abrt-action-gen should be allowed read access on the libboost_filesystem.so.1.58.0 file by default. | |
| Then you should report this as a bug. | |
| You can generate a local policy module to allow this access. | |
| Do | |
| allow this access for now by executing: | |
| # ausearch -c 'abrt-action-gen' --raw | audit2allow -M my-abrtactiongen | |
| # semodule -X 300 -i my-abrtactiongen.pp | |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment