Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 592499 Details for
Bug 832860
/usr/bin/kdm is mislabeld as bin_t
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
avc denials
avc_denials (text/plain), 219.26 KB, created by
bodhi.zazen
on 2012-06-18 03:32:42 UTC
(
hide
)
Description:
avc denials
Filename:
MIME Type:
Creator:
bodhi.zazen
Created:
2012-06-18 03:32:42 UTC
Size:
219.26 KB
patch
obsolete
>---- >time->Sun Jun 17 15:23:52 2012 >type=SYSCALL msg=audit(1339968232.469:151): arch=c000003e syscall=1 success=yes exit=1 a0=3 a1=7fff37a24a80 a2=1 a3=3caac16c31 items=0 ppid=1693 pid=1737 auid=1000 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts0 ses=9 comm="setenforce" exe="/usr/sbin/setenforce" subj=staff_u:unconfined_r:unconfined_t:s0 key=(null) >type=MAC_STATUS msg=audit(1339968232.469:151): enforcing=0 old_enforcing=1 auid=1000 ses=9 >---- >time->Sun Jun 17 15:26:05 2012 >type=USER_AUTH msg=audit(1339968365.070:152): pid=0 uid=0 auid=1000 ses=9 subj=staff_u:unconfined_r:unconfined_t:s0 msg='op=PAM:authentication acct="bodhi" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/2 res=success' >---- >time->Sun Jun 17 15:26:05 2012 >type=USER_ACCT msg=audit(1339968365.077:153): pid=0 uid=0 auid=1000 ses=9 subj=staff_u:unconfined_r:unconfined_t:s0 msg='op=PAM:accounting acct="bodhi" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/2 res=success' >---- >time->Sun Jun 17 15:26:05 2012 >type=USER_CMD msg=audit(1339968365.078:154): pid=0 uid=0 auid=1000 ses=9 subj=staff_u:unconfined_r:unconfined_t:s0 msg='cwd="/home/bodhi" cmd="-zsh" terminal=pts/2 res=success' >---- >time->Sun Jun 17 15:26:05 2012 >type=CRED_ACQ msg=audit(1339968365.080:155): pid=0 uid=0 auid=1000 ses=9 subj=staff_u:unconfined_r:unconfined_t:s0 msg='op=PAM:setcred acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/2 res=success' >---- >time->Sun Jun 17 15:26:05 2012 >type=USER_START msg=audit(1339968365.090:156): pid=0 uid=0 auid=1000 ses=9 subj=staff_u:unconfined_r:unconfined_t:s0 msg='op=PAM:session_open acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/2 res=success' >---- >time->Sun Jun 17 15:26:05 2012 >type=USER_ROLE_CHANGE msg=audit(1339968365.091:157): pid=0 uid=0 auid=1000 ses=9 subj=staff_u:unconfined_r:unconfined_t:s0 msg='newrole: old-context=staff_u:unconfined_r:unconfined_t:s0 new-context=staff_u:unconfined_r:unconfined_t:s0 exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/2 res=success' >---- >time->Sun Jun 17 15:27:12 2012 >type=SYSCALL msg=audit(1339968432.445:158): arch=c000003e syscall=1 success=yes exit=2 a0=4 a1=7fff3a194a80 a2=2 a3=7f8b62032b23 items=0 ppid=1693 pid=1743 auid=1000 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts0 ses=9 comm="setsebool" exe="/usr/sbin/setsebool" subj=staff_u:unconfined_r:setsebool_t:s0 key=(null) >type=MAC_CONFIG_CHANGE msg=audit(1339968432.445:158): bool=user_setrlimit val=0 old_val=1 auid=1000 ses=9 >---- >time->Sun Jun 17 15:28:12 2012 >type=USER_AVC msg=audit(1339968492.614:159): pid=0 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 msg='avc: denied { send_msg } for msgtype=error error_name=net.reactivated.Fprint.Error.NoSuchDevice dest=:1.85 spid=1857 tpid=1845 scontext=system_u:system_r:fprintd_t:s0-s0:c0.c1023 tcontext=system_u:system_r:initrc_t:s0 tclass=dbus exe="/usr/bin/dbus-daemon" sauid=81 hostname=? addr=? terminal=?' >---- >time->Sun Jun 17 15:28:12 2012 >type=USER_AUTH msg=audit(1339968492.664:160): pid=0 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:initrc_t:s0 msg='op=PAM:authentication acct="christine" exe="/usr/bin/kdm" hostname=? addr=? terminal=:1 res=success' >---- >time->Sun Jun 17 15:28:12 2012 >type=USER_ACCT msg=audit(1339968492.668:161): pid=0 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:initrc_t:s0 msg='op=PAM:accounting acct="christine" exe="/usr/bin/kdm" hostname=? addr=? terminal=:1 res=success' >---- >time->Sun Jun 17 15:28:12 2012 >type=CRED_ACQ msg=audit(1339968492.672:162): pid=0 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:initrc_t:s0 msg='op=PAM:setcred acct="christine" exe="/usr/bin/kdm" hostname=? addr=? terminal=:1 res=success' >---- >time->Sun Jun 17 15:28:12 2012 >type=LOGIN msg=audit(1339968492.672:163): login pid=1845 uid=0 old auid=4294967295 new auid=1001 old ses=4294967295 new ses=10 >---- >time->Sun Jun 17 15:28:12 2012 >type=USER_ROLE_CHANGE msg=audit(1339968492.698:164): pid=0 uid=0 auid=1001 ses=10 subj=system_u:system_r:initrc_t:s0 msg='pam: default-context=user_u:user_r:policykit_grant_t:s0 selected-context=user_u:user_r:policykit_grant_t:s0 exe="/usr/bin/kdm" hostname=? addr=? terminal=? res=success' >---- >time->Sun Jun 17 15:28:12 2012 >type=USER_START msg=audit(1339968492.767:171): pid=0 uid=0 auid=1001 ses=10 subj=system_u:system_r:initrc_t:s0 msg='op=PAM:session_open acct="christine" exe="/usr/bin/kdm" hostname=? addr=? terminal=:1 res=success' >---- >time->Sun Jun 17 15:28:12 2012 >type=SYSCALL msg=audit(1339968492.702:165): arch=c000003e syscall=59 success=yes exit=0 a0=7fe98b3945c0 a1=7ffffcde3da0 a2=24efc90 a3=15 items=0 ppid=1845 pid=1861 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="gnome-keyring-d" exe="/usr/bin/gnome-keyring-daemon" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968492.702:165): avc: denied { entrypoint } for pid=1861 comm="kdm" path="/usr/bin/gnome-keyring-daemon" dev="sdb5" ino=58988 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:gkeyringd_exec_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:12 2012 >type=SYSCALL msg=audit(1339968492.705:166): arch=c000003e syscall=10 success=yes exit=0 a0=6d9000 a1=9000 a2=1 a3=7fff4abd8730 items=0 ppid=1845 pid=1861 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="gnome-keyring-d" exe="/usr/bin/gnome-keyring-daemon" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968492.705:166): avc: denied { read } for pid=1861 comm="gnome-keyring-d" path="/usr/bin/gnome-keyring-daemon" dev="sdb5" ino=58988 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:gkeyringd_exec_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:12 2012 >type=SYSCALL msg=audit(1339968492.706:167): arch=c000003e syscall=126 success=yes exit=0 a0=7f0daa2d87d4 a1=7f0daa2d87dc a2=1 a3=0 items=0 ppid=1845 pid=1861 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="gnome-keyring-d" exe="/usr/bin/gnome-keyring-daemon" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968492.706:167): avc: denied { setcap } for pid=1861 comm="gnome-keyring-d" scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:user_r:policykit_grant_t:s0 tclass=process >---- >time->Sun Jun 17 15:28:12 2012 >type=SYSCALL msg=audit(1339968492.708:168): arch=c000003e syscall=83 success=yes exit=0 a0=140ce00 a1=1c0 a2=0 a3=0 items=0 ppid=1845 pid=1861 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="gnome-keyring-d" exe="/usr/bin/gnome-keyring-daemon" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968492.708:168): avc: denied { create } for pid=1861 comm="gnome-keyring-d" name="keyring-Rh76TX" scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:cache_home_t:s0 tclass=dir >type=AVC msg=audit(1339968492.708:168): avc: denied { add_name } for pid=1861 comm="gnome-keyring-d" name="keyring-Rh76TX" scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:cache_home_t:s0 tclass=dir >type=AVC msg=audit(1339968492.708:168): avc: denied { write } for pid=1861 comm="gnome-keyring-d" name=".cache" dev="sdb2" ino=8007 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:cache_home_t:s0 tclass=dir >---- >time->Sun Jun 17 15:28:12 2012 >type=SYSCALL msg=audit(1339968492.727:169): arch=c000003e syscall=49 success=yes exit=0 a0=5 a1=7fff4abd8a40 a2=6e a3=10 items=0 ppid=1845 pid=1861 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="gnome-keyring-d" exe="/usr/bin/gnome-keyring-daemon" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968492.727:169): avc: denied { create } for pid=1861 comm="gnome-keyring-d" name="control" scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:cache_home_t:s0 tclass=sock_file >---- >time->Sun Jun 17 15:28:12 2012 >type=SYSCALL msg=audit(1339968492.728:170): arch=c000003e syscall=149 success=yes exit=0 a0=7f0daa2f4000 a1=4000 a2=3 a3=22 items=0 ppid=1845 pid=1861 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="gnome-keyring-d" exe="/usr/bin/gnome-keyring-daemon" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968492.728:170): avc: denied { ipc_lock } for pid=1861 comm="gnome-keyring-d" capability=14 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:user_r:policykit_grant_t:s0 tclass=capability >---- >time->Sun Jun 17 15:28:12 2012 >type=SYSCALL msg=audit(1339968492.806:172): arch=c000003e syscall=59 success=yes exit=0 a0=24f5610 a1=24f55f0 a2=24f8500 a3=8 items=0 ppid=1845 pid=1867 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="Xsession" exe="/usr/bin/bash" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968492.806:172): avc: denied { entrypoint } for pid=1867 comm="kdm" path="/etc/kde/kdm/Xsession" dev="sdb5" ino=45053 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:xsession_exec_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:12 2012 >type=SYSCALL msg=audit(1339968492.808:173): arch=c000003e syscall=10 success=yes exit=0 a0=6d9000 a1=1000 a2=1 a3=7fffc4e6c120 items=0 ppid=1845 pid=1867 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="Xsession" exe="/usr/bin/bash" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968492.808:173): avc: denied { read } for pid=1867 comm="Xsession" path="/usr/bin/bash" dev="sdb5" ino=8880 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:shell_exec_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:12 2012 >type=SYSCALL msg=audit(1339968492.808:174): arch=c000003e syscall=2 success=yes exit=3 a0=3ca957729c a1=80000 a2=1b6 a3=238 items=0 ppid=1845 pid=1867 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="Xsession" exe="/usr/bin/bash" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968492.808:174): avc: denied { open } for pid=1867 comm="Xsession" name="meminfo" dev="proc" ino=4026532026 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:proc_t:s0 tclass=file >type=AVC msg=audit(1339968492.808:174): avc: denied { read } for pid=1867 comm="Xsession" name="meminfo" dev="proc" ino=4026532026 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:proc_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:12 2012 >type=SYSCALL msg=audit(1339968492.809:175): arch=c000003e syscall=5 success=yes exit=0 a0=3 a1=7fffc4e6a010 a2=7fffc4e6a010 a3=0 items=0 ppid=1845 pid=1867 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="Xsession" exe="/usr/bin/bash" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968492.809:175): avc: denied { getattr } for pid=1867 comm="Xsession" path="/proc/meminfo" dev="proc" ino=4026532026 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:proc_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:12 2012 >type=SYSCALL msg=audit(1339968492.809:176): arch=c000003e syscall=2 success=yes exit=3 a0=113c6c0 a1=0 a2=113c6d5 a3=16 items=0 ppid=1845 pid=1867 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="Xsession" exe="/usr/bin/bash" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968492.809:176): avc: denied { open } for pid=1867 comm="Xsession" name="Xsession" dev="sdb5" ino=45053 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:xsession_exec_t:s0 tclass=file >type=AVC msg=audit(1339968492.809:176): avc: denied { read } for pid=1867 comm="Xsession" name="Xsession" dev="sdb5" ino=45053 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:xsession_exec_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:12 2012 >type=SYSCALL msg=audit(1339968492.810:177): arch=c000003e syscall=16 success=no exit=-25 a0=3 a1=5401 a2=7fffc4e6c340 a3=5 items=0 ppid=1845 pid=1867 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="Xsession" exe="/usr/bin/bash" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968492.810:177): avc: denied { ioctl } for pid=1867 comm="Xsession" path="/etc/kde/kdm/Xsession" dev="sdb5" ino=45053 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:xsession_exec_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:12 2012 >type=SYSCALL msg=audit(1339968492.810:178): arch=c000003e syscall=5 success=yes exit=0 a0=ff a1=7fffc4e6c2f0 a2=7fffc4e6c2f0 a3=5 items=0 ppid=1845 pid=1867 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="Xsession" exe="/usr/bin/bash" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968492.810:178): avc: denied { getattr } for pid=1867 comm="Xsession" path="/etc/kde/kdm/Xsession" dev="sdb5" ino=45053 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:xsession_exec_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:12 2012 >type=SYSCALL msg=audit(1339968492.810:179): arch=c000003e syscall=269 success=yes exit=0 a0=ffffffffffffff9c a1=113e340 a2=1 a3=8 items=0 ppid=1845 pid=1867 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="Xsession" exe="/usr/bin/bash" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968492.810:179): avc: denied { execute } for pid=1867 comm="Xsession" name="Xsession" dev="sdb5" ino=27350 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:12 2012 >type=SYSCALL msg=audit(1339968492.810:180): arch=c000003e syscall=59 success=yes exit=0 a0=1139ed0 a1=113e280 a2=113e830 a3=8 items=0 ppid=1845 pid=1867 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="Xsession" exe="/usr/bin/bash" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968492.810:180): avc: denied { open } for pid=1867 comm="Xsession" name="bash" dev="sdb5" ino=8880 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:shell_exec_t:s0 tclass=file >type=AVC msg=audit(1339968492.810:180): avc: denied { execute } for pid=1867 comm="Xsession" name="bash" dev="sdb5" ino=8880 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:shell_exec_t:s0 tclass=file >type=AVC msg=audit(1339968492.810:180): avc: denied { execute_no_trans } for pid=1867 comm="Xsession" path="/etc/X11/xinit/Xsession" dev="sdb5" ino=27350 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=file >type=AVC msg=audit(1339968492.810:180): avc: denied { read open } for pid=1867 comm="Xsession" name="Xsession" dev="sdb5" ino=27350 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:12 2012 >type=SYSCALL msg=audit(1339968492.813:181): arch=c000003e syscall=16 success=no exit=-25 a0=3 a1=5401 a2=7fffb17a3d10 a3=5 items=0 ppid=1845 pid=1867 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="Xsession" exe="/usr/bin/bash" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968492.813:181): avc: denied { ioctl } for pid=1867 comm="Xsession" path="/etc/X11/xinit/Xsession" dev="sdb5" ino=27350 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:12 2012 >type=SYSCALL msg=audit(1339968492.813:182): arch=c000003e syscall=5 success=yes exit=0 a0=ff a1=7fffb17a3cc0 a2=7fffb17a3cc0 a3=5 items=0 ppid=1845 pid=1867 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="Xsession" exe="/usr/bin/bash" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968492.813:182): avc: denied { getattr } for pid=1867 comm="Xsession" path="/etc/X11/xinit/Xsession" dev="sdb5" ino=27350 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:12 2012 >type=SYSCALL msg=audit(1339968492.958:183): arch=c000003e syscall=2 success=yes exit=4 a0=7fff814f8e08 a1=201 a2=0 a3=0 items=0 ppid=1872 pid=1873 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="cp" exe="/usr/bin/cp" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968492.958:183): avc: denied { open } for pid=1873 comm="cp" name=".xsession-errors" dev="sdb2" ino=7987 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:xdm_home_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:12 2012 >type=SYSCALL msg=audit(1339968492.960:184): arch=c000003e syscall=268 success=yes exit=0 a0=ffffffffffffff9c a1=2547120 a2=180 a3=8000 items=0 ppid=1867 pid=1879 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="chmod" exe="/usr/bin/chmod" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968492.960:184): avc: denied { setattr } for pid=1879 comm="chmod" name=".xsession-errors" dev="sdb2" ino=7987 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:xdm_home_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:12 2012 >type=SYSCALL msg=audit(1339968492.960:185): arch=c000003e syscall=269 success=yes exit=0 a0=ffffffffffffff9c a1=c72710 a2=1 a3=8 items=0 ppid=1845 pid=1867 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="Xsession" exe="/usr/bin/bash" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968492.960:185): avc: denied { execute } for pid=1867 comm="Xsession" name="setfiles" dev="sdb5" ino=22112 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:setfiles_exec_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:12 2012 >type=SYSCALL msg=audit(1339968492.961:186): arch=c000003e syscall=59 success=yes exit=0 a0=c72710 a1=c72670 a2=c6e380 a3=18 items=0 ppid=1867 pid=1880 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="restorecon" exe="/usr/sbin/setfiles" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968492.961:186): avc: denied { execute_no_trans } for pid=1880 comm="Xsession" path="/usr/sbin/setfiles" dev="sdb5" ino=22112 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:setfiles_exec_t:s0 tclass=file >type=AVC msg=audit(1339968492.961:186): avc: denied { read open } for pid=1880 comm="Xsession" name="setfiles" dev="sdb5" ino=22112 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:setfiles_exec_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:12 2012 >type=SYSCALL msg=audit(1339968492.992:187): arch=c000003e syscall=2 success=yes exit=3 a0=7ff5a695e102 a1=0 a2=0 a3=117 items=0 ppid=1867 pid=1880 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="restorecon" exe="/usr/sbin/setfiles" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968492.992:187): avc: denied { read } for pid=1880 comm="restorecon" name="christine" dev="sdb2" ino=6423 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:user_home_dir_t:s0 tclass=dir >---- >time->Sun Jun 17 15:28:12 2012 >type=SYSCALL msg=audit(1339968492.992:188): arch=c000003e syscall=137 success=yes exit=0 a0=7ff5a9399d30 a1=7fff1ac03470 a2=0 a3=7fff1ac03330 items=0 ppid=1867 pid=1880 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="restorecon" exe="/usr/sbin/setfiles" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968492.992:188): avc: denied { getattr } for pid=1880 comm="restorecon" name="/" dev="sdb2" ino=256 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:fs_t:s0 tclass=filesystem >---- >time->Sun Jun 17 15:28:15 2012 >type=USER_AVC msg=audit(1339968495.484:255): pid=0 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 msg='avc: denied { send_msg } for msgtype=method_call interface=org.bluez.Manager member=DefaultAdapter dest=org.bluez spid=2011 tpid=688 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:system_r:bluetooth_t:s0 tclass=dbus exe="/usr/bin/dbus-daemon" sauid=81 hostname=? addr=? terminal=?' >---- >time->Sun Jun 17 15:28:15 2012 >type=USER_AVC msg=audit(1339968495.485:256): pid=0 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 msg='avc: denied { send_msg } for msgtype=error error_name=org.bluez.Error.NoSuchAdapter dest=:1.88 spid=688 tpid=2011 scontext=system_u:system_r:bluetooth_t:s0 tcontext=user_u:user_r:policykit_grant_t:s0 tclass=dbus exe="/usr/bin/dbus-daemon" sauid=81 hostname=? addr=? terminal=?' >---- >time->Sun Jun 17 15:28:16 2012 >type=USER_AVC msg=audit(1339968496.225:257): pid=0 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.DBus.Properties member=Get dest=org.freedesktop.UPower spid=2011 tpid=1276 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:system_r:devicekit_power_t:s0 tclass=dbus exe="/usr/bin/dbus-daemon" sauid=81 hostname=? addr=? terminal=?' >---- >time->Sun Jun 17 15:28:13 2012 >type=SYSCALL msg=audit(1339968493.004:189): arch=c000003e syscall=2 success=yes exit=4 a0=7ff5a9205140 a1=0 a2=1b6 a3=238 items=0 ppid=1867 pid=1880 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="restorecon" exe="/usr/sbin/setfiles" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968493.004:189): avc: denied { open } for pid=1880 comm="restorecon" name="customizable_types" dev="sdb5" ino=9057 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:default_context_t:s0 tclass=file >type=AVC msg=audit(1339968493.004:189): avc: denied { read } for pid=1880 comm="restorecon" name="customizable_types" dev="sdb5" ino=9057 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:default_context_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:13 2012 >type=SYSCALL msg=audit(1339968493.005:190): arch=c000003e syscall=5 success=yes exit=0 a0=4 a1=7fff1ac032a0 a2=7fff1ac032a0 a3=0 items=0 ppid=1867 pid=1880 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="restorecon" exe="/usr/sbin/setfiles" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968493.005:190): avc: denied { getattr } for pid=1880 comm="restorecon" path="/etc/selinux/targeted/contexts/customizable_types" dev="sdb5" ino=9057 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:default_context_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:13 2012 >type=SYSCALL msg=audit(1339968493.010:191): arch=c000003e syscall=2 success=yes exit=3 a0=c71200 a1=0 a2=435a50 a3=0 items=0 ppid=1845 pid=1867 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="Xsession" exe="/usr/bin/bash" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968493.010:191): avc: denied { open } for pid=1867 comm="Xsession" name="xinitrc-common" dev="sdb5" ino=27352 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=file >type=AVC msg=audit(1339968493.010:191): avc: denied { read } for pid=1867 comm="Xsession" name="xinitrc-common" dev="sdb5" ino=27352 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:13 2012 >type=SYSCALL msg=audit(1339968493.010:192): arch=c000003e syscall=5 success=yes exit=0 a0=3 a1=7fffb17a3980 a2=7fffb17a3980 a3=0 items=0 ppid=1845 pid=1867 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="Xsession" exe="/usr/bin/bash" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968493.010:192): avc: denied { getattr } for pid=1867 comm="Xsession" path="/etc/X11/xinit/xinitrc-common" dev="sdb5" ino=27352 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:13 2012 >type=SYSCALL msg=audit(1339968493.020:193): arch=c000003e syscall=59 success=yes exit=0 a0=c7f0c0 a1=c7ea80 a2=c7f210 a3=18 items=0 ppid=1883 pid=1884 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="consoletype" exe="/usr/sbin/consoletype" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968493.020:193): avc: denied { execute_no_trans } for pid=1884 comm="Xsession" path="/usr/sbin/consoletype" dev="sdb5" ino=5135 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:consoletype_exec_t:s0 tclass=file >type=AVC msg=audit(1339968493.020:193): avc: denied { read open } for pid=1884 comm="Xsession" name="consoletype" dev="sdb5" ino=5135 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:consoletype_exec_t:s0 tclass=file >type=AVC msg=audit(1339968493.020:193): avc: denied { execute } for pid=1884 comm="Xsession" name="consoletype" dev="sdb5" ino=5135 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:consoletype_exec_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:13 2012 >type=SYSCALL msg=audit(1339968493.024:194): arch=c000003e syscall=21 success=yes exit=0 a0=c7dc30 a1=1 a2=7fffb17a3360 a3=e items=0 ppid=1845 pid=1867 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="Xsession" exe="/usr/bin/bash" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968493.024:194): avc: denied { execute } for pid=1867 comm="Xsession" name="xrdb" dev="sdb5" ino=26183 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:13 2012 >type=SYSCALL msg=audit(1339968493.024:195): arch=c000003e syscall=59 success=yes exit=0 a0=c7dc30 a1=c71f30 a2=c7f210 a3=28 items=0 ppid=1867 pid=1886 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="xrdb" exe="/usr/bin/xrdb" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968493.024:195): avc: denied { execute_no_trans } for pid=1886 comm="Xsession" path="/usr/bin/xrdb" dev="sdb5" ino=26183 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:13 2012 >type=SYSCALL msg=audit(1339968493.026:196): arch=c000003e syscall=42 success=yes exit=0 a0=3 a1=7fffaad53310 a2=14 a3=7fffaad53313 items=0 ppid=1867 pid=1886 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="xrdb" exe="/usr/bin/xrdb" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968493.026:196): avc: denied { connectto } for pid=1886 comm="xrdb" path=002F746D702F2E5831312D756E69782F5831 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:system_r:xserver_t:s0 tclass=unix_stream_socket >---- >time->Sun Jun 17 15:28:13 2012 >type=SYSCALL msg=audit(1339968493.027:197): arch=c000003e syscall=21 success=yes exit=0 a0=7fffaad54fc8 a1=4 a2=7 a3=fffffffffffffbcc items=0 ppid=1867 pid=1886 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="xrdb" exe="/usr/bin/xrdb" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968493.027:197): avc: denied { read } for pid=1886 comm="xrdb" name=".XauthnoPOMa" dev="sdb5" ino=60793 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:initrc_tmp_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:13 2012 >type=SYSCALL msg=audit(1339968493.028:198): arch=c000003e syscall=2 success=yes exit=4 a0=7fffaad54fc8 a1=0 a2=1b6 a3=238 items=0 ppid=1867 pid=1886 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="xrdb" exe="/usr/bin/xrdb" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968493.028:198): avc: denied { open } for pid=1886 comm="xrdb" name=".XauthnoPOMa" dev="sdb5" ino=60793 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:initrc_tmp_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:13 2012 >type=SYSCALL msg=audit(1339968493.028:199): arch=c000003e syscall=5 success=yes exit=0 a0=4 a1=7fffaad52eb0 a2=7fffaad52eb0 a3=238 items=0 ppid=1867 pid=1886 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="xrdb" exe="/usr/bin/xrdb" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968493.028:199): avc: denied { getattr } for pid=1886 comm="xrdb" path="/tmp/.XauthnoPOMa" dev="sdb5" ino=60793 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:initrc_tmp_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:13 2012 >type=SYSCALL msg=audit(1339968493.035:200): arch=c000003e syscall=257 success=yes exit=3 a0=ffffffffffffff9c a1=c72000 a2=90800 a3=0 items=0 ppid=1845 pid=1867 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="Xsession" exe="/usr/bin/bash" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968493.035:200): avc: denied { read } for pid=1867 comm="Xsession" name="xinitrc.d" dev="sdb5" ino=26847 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=dir >---- >time->Sun Jun 17 15:28:13 2012 >type=SYSCALL msg=audit(1339968493.041:201): arch=c000003e syscall=59 success=yes exit=0 a0=40516c a1=7fff3792f390 a2=7fff37931af8 a3=405137 items=0 ppid=1891 pid=1892 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968493.041:201): avc: denied { execute_no_trans } for pid=1892 comm="dbus-launch" path="/usr/bin/dbus-daemon" dev="sdb5" ino=21512 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:dbusd_exec_t:s0 tclass=file >type=AVC msg=audit(1339968493.041:201): avc: denied { read open } for pid=1892 comm="dbus-launch" name="dbus-daemon" dev="sdb5" ino=21512 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:dbusd_exec_t:s0 tclass=file >type=AVC msg=audit(1339968493.041:201): avc: denied { execute } for pid=1892 comm="dbus-launch" name="dbus-daemon" dev="sdb5" ino=21512 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:dbusd_exec_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:13 2012 >type=SYSCALL msg=audit(1339968493.076:202): arch=c000003e syscall=41 success=yes exit=5 a0=10 a1=3 a2=7 a3=0 items=0 ppid=1 pid=1895 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968493.076:202): avc: denied { create } for pid=1895 comm="dbus-daemon" scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:user_r:policykit_grant_t:s0 tclass=netlink_selinux_socket >---- >time->Sun Jun 17 15:28:13 2012 >type=SYSCALL msg=audit(1339968493.077:203): arch=c000003e syscall=49 success=yes exit=0 a0=5 a1=7fff740fa530 a2=c a3=0 items=0 ppid=1 pid=1895 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968493.077:203): avc: denied { bind } for pid=1895 comm="dbus-daemon" scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:user_r:policykit_grant_t:s0 tclass=netlink_selinux_socket >---- >time->Sun Jun 17 15:28:13 2012 >type=SYSCALL msg=audit(1339968493.095:204): arch=c000003e syscall=2 success=yes exit=4 a0=182b0e0 a1=241 a2=1b6 a3=238 items=0 ppid=1889 pid=1890 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="dbus-launch" exe="/usr/bin/dbus-launch" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968493.095:204): avc: denied { open } for pid=1890 comm="dbus-launch" name="ce6be20d359c6b6435e92c550000000c-1" dev="sdb2" ino=1880232 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:user_home_t:s0 tclass=file >type=AVC msg=audit(1339968493.095:204): avc: denied { write } for pid=1890 comm="dbus-launch" name="ce6be20d359c6b6435e92c550000000c-1" dev="sdb2" ino=1880232 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:user_home_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:13 2012 >type=SYSCALL msg=audit(1339968493.180:205): arch=c000003e syscall=2 success=yes exit=3 a0=19da020 a1=0 a2=1b6 a3=238 items=0 ppid=1867 pid=1903 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="xdg-user-dirs-u" exe="/usr/bin/xdg-user-dirs-update" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968493.180:205): avc: denied { open } for pid=1903 comm="xdg-user-dirs-u" name="user-dirs.dirs" dev="sdb2" ino=7999 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:config_home_t:s0 tclass=file >type=AVC msg=audit(1339968493.180:205): avc: denied { read } for pid=1903 comm="xdg-user-dirs-u" name="user-dirs.dirs" dev="sdb2" ino=7999 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:config_home_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:13 2012 >type=SYSCALL msg=audit(1339968493.180:206): arch=c000003e syscall=5 success=yes exit=0 a0=3 a1=7fffc0e64a60 a2=7fffc0e64a60 a3=0 items=0 ppid=1867 pid=1903 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="xdg-user-dirs-u" exe="/usr/bin/xdg-user-dirs-update" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968493.180:206): avc: denied { getattr } for pid=1903 comm="xdg-user-dirs-u" path="/home/christine/.config/user-dirs.dirs" dev="sdb2" ino=7999 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:config_home_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:13 2012 >type=SYSCALL msg=audit(1339968493.244:207): arch=c000003e syscall=16 success=no exit=-25 a0=3 a1=5401 a2=7fff6ea49720 a3=0 items=0 ppid=1908 pid=1909 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="grep" exe="/usr/bin/grep" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968493.244:207): avc: denied { ioctl } for pid=1909 comm="grep" path="/proc/cpuinfo" dev="proc" ino=4026532022 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:proc_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:13 2012 >type=SYSCALL msg=audit(1339968493.246:208): arch=c000003e syscall=269 success=yes exit=0 a0=ffffffffffffff9c a1=c7d7e0 a2=1 a3=8 items=0 ppid=1845 pid=1867 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="Xsession" exe="/usr/bin/bash" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968493.246:208): avc: denied { execute } for pid=1867 comm="Xsession" name="ssh-agent" dev="sdb5" ino=22676 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:ssh_agent_exec_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:13 2012 >type=SYSCALL msg=audit(1339968493.248:209): arch=c000003e syscall=59 success=yes exit=0 a0=c74640 a1=c70900 a2=c7f210 a3=8 items=0 ppid=1845 pid=1867 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="bash" exe="/usr/bin/bash" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968493.248:209): avc: denied { execute_no_trans } for pid=1867 comm="Xsession" path="/usr/bin/bash" dev="sdb5" ino=8880 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:shell_exec_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:13 2012 >type=SYSCALL msg=audit(1339968493.257:210): arch=c000003e syscall=59 success=yes exit=0 a0=ef2060 a1=ef2d40 a2=ef3a60 a3=10 items=0 ppid=1912 pid=1913 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="hostname" exe="/usr/bin/hostname" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968493.257:210): avc: denied { execute_no_trans } for pid=1913 comm="bash" path="/usr/bin/hostname" dev="sdb5" ino=34882 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:hostname_exec_t:s0 tclass=file >type=AVC msg=audit(1339968493.257:210): avc: denied { read open } for pid=1913 comm="bash" name="hostname" dev="sdb5" ino=34882 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:hostname_exec_t:s0 tclass=file >type=AVC msg=audit(1339968493.257:210): avc: denied { execute } for pid=1913 comm="bash" name="hostname" dev="sdb5" ino=34882 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:hostname_exec_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:13 2012 >type=SYSCALL msg=audit(1339968493.289:211): arch=c000003e syscall=2 success=yes exit=4 a0=3ca9008911 a1=0 a2=1b6 a3=238 items=0 ppid=1919 pid=1920 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="lspci" exe="/usr/sbin/lspci" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968493.289:211): avc: denied { open } for pid=1920 comm="lspci" name="pci.ids" dev="sdb5" ino=5832 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:hwdata_t:s0 tclass=file >type=AVC msg=audit(1339968493.289:211): avc: denied { read } for pid=1920 comm="lspci" name="pci.ids" dev="sdb5" ino=5832 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:hwdata_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:13 2012 >type=SYSCALL msg=audit(1339968493.289:212): arch=c000003e syscall=5 success=yes exit=0 a0=4 a1=7fff21635620 a2=7fff21635620 a3=0 items=0 ppid=1919 pid=1920 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="lspci" exe="/usr/sbin/lspci" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968493.289:212): avc: denied { getattr } for pid=1920 comm="lspci" path="/usr/share/hwdata/pci.ids" dev="sdb5" ino=5832 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:hwdata_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:13 2012 >type=SYSCALL msg=audit(1339968493.313:213): arch=c000003e syscall=2 success=yes exit=3 a0=eefe90 a1=0 a2=435a50 a3=0 items=0 ppid=1845 pid=1867 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="bash" exe="/usr/bin/bash" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968493.313:213): avc: denied { read } for pid=1867 comm="bash" name=".bash_profile" dev="sdb2" ino=6429 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:user_home_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:13 2012 >type=SYSCALL msg=audit(1339968493.330:214): arch=c000003e syscall=59 success=yes exit=0 a0=ef3960 a1=efe7a0 a2=efcd60 a3=18 items=0 ppid=1845 pid=1867 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=99 sgid=99 fsgid=99 tty=(none) ses=10 comm="ssh-agent" exe="/usr/bin/ssh-agent" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968493.330:214): avc: denied { execute_no_trans } for pid=1867 comm="bash" path="/usr/bin/ssh-agent" dev="sdb5" ino=22676 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:ssh_agent_exec_t:s0 tclass=file >type=AVC msg=audit(1339968493.330:214): avc: denied { read open } for pid=1867 comm="bash" name="ssh-agent" dev="sdb5" ino=22676 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:ssh_agent_exec_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:13 2012 >type=SYSCALL msg=audit(1339968493.340:215): arch=c000003e syscall=83 success=yes exit=0 a0=7f4ab70d3300 a1=1c0 a2=7fff62161830 a3=1 items=0 ppid=1845 pid=1867 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=99 fsgid=1001 tty=(none) ses=10 comm="ssh-agent" exe="/usr/bin/ssh-agent" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968493.340:215): avc: denied { create } for pid=1867 comm="ssh-agent" name="ssh-HiwDkcRR1867" scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:tmp_t:s0 tclass=dir >type=AVC msg=audit(1339968493.340:215): avc: denied { add_name } for pid=1867 comm="ssh-agent" name="ssh-HiwDkcRR1867" scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:tmp_t:s0 tclass=dir >type=AVC msg=audit(1339968493.340:215): avc: denied { write } for pid=1867 comm="ssh-agent" name="tmp" dev="sdb5" ino=150 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:tmp_t:s0 tclass=dir >---- >time->Sun Jun 17 15:28:13 2012 >type=SYSCALL msg=audit(1339968493.341:216): arch=c000003e syscall=49 success=yes exit=0 a0=3 a1=7fff62161a50 a2=6e a3=7f4ab6eca44d items=0 ppid=1845 pid=1867 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=99 fsgid=1001 tty=(none) ses=10 comm="ssh-agent" exe="/usr/bin/ssh-agent" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968493.341:216): avc: denied { create } for pid=1867 comm="ssh-agent" name="agent.1867" scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:tmp_t:s0 tclass=sock_file >type=AVC msg=audit(1339968493.341:216): avc: denied { add_name } for pid=1867 comm="ssh-agent" name="agent.1867" scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:tmp_t:s0 tclass=dir >type=AVC msg=audit(1339968493.341:216): avc: denied { write } for pid=1867 comm="ssh-agent" name="ssh-HiwDkcRR1867" dev="sdb5" ino=65601 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:tmp_t:s0 tclass=dir >---- >time->Sun Jun 17 15:28:13 2012 >type=SYSCALL msg=audit(1339968493.342:217): arch=c000003e syscall=160 success=yes exit=0 a0=4 a1=7fff621619c0 a2=0 a3=1 items=0 ppid=1867 pid=1928 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=99 fsgid=1001 tty=(none) ses=10 comm="ssh-agent" exe="/usr/bin/ssh-agent" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968493.342:217): avc: denied { setrlimit } for pid=1928 comm="ssh-agent" scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:user_r:policykit_grant_t:s0 tclass=process >---- >time->Sun Jun 17 15:28:13 2012 >type=SYSCALL msg=audit(1339968493.345:218): arch=c000003e syscall=16 success=no exit=-25 a0=3 a1=5401 a2=7fff45ad74d0 a3=5 items=0 ppid=1845 pid=1867 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="Xclients" exe="/usr/bin/bash" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968493.345:218): avc: denied { ioctl } for pid=1867 comm="Xclients" path="/etc/X11/xinit/Xclients" dev="sdb5" ino=27348 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:13 2012 >type=SYSCALL msg=audit(1339968493.442:219): arch=c000003e syscall=16 success=no exit=-25 a0=3 a1=5401 a2=7fffd94131e0 a3=0 items=0 ppid=1867 pid=1938 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="grep" exe="/usr/bin/grep" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968493.442:219): avc: denied { ioctl } for pid=1938 comm="grep" path="/home/christine/.kde/share/config/kdeglobals" dev="sdb2" ino=1812174 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:config_home_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:13 2012 >type=SYSCALL msg=audit(1339968493.448:220): arch=c000003e syscall=2 success=yes exit=3 a0=1de3810 a1=241 a2=1b6 a3=0 items=0 ppid=1867 pid=1942 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="startkde" exe="/usr/bin/bash" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968493.448:220): avc: denied { write } for pid=1942 comm="startkde" name="startupconfigkeys" dev="sdb2" ino=1880233 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:config_home_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:13 2012 >type=SYSCALL msg=audit(1339968493.449:221): arch=c000003e syscall=2 success=yes exit=3 a0=1de4000 a1=2c1 a2=180 a3=4bf6e6 items=0 ppid=1867 pid=1942 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="startkde" exe="/usr/bin/bash" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968493.449:221): avc: denied { write open } for pid=1942 comm="startkde" name="sh-thd-1339968196" dev="sdb5" ino=60794 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:tmp_t:s0 tclass=file >type=AVC msg=audit(1339968493.449:221): avc: denied { create } for pid=1942 comm="startkde" name="sh-thd-1339968196" scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:tmp_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:13 2012 >type=SYSCALL msg=audit(1339968493.450:222): arch=c000003e syscall=5 success=yes exit=0 a0=4 a1=7fff2043cd10 a2=7fff2043cd10 a3=238 items=0 ppid=1867 pid=1942 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="startkde" exe="/usr/bin/bash" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968493.450:222): avc: denied { getattr } for pid=1942 comm="startkde" path="/tmp/sh-thd-1339968196" dev="sdb5" ino=60794 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:tmp_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:13 2012 >type=SYSCALL msg=audit(1339968493.450:223): arch=c000003e syscall=2 success=yes exit=4 a0=1de4000 a1=0 a2=180 a3=4320656c61636f4c items=0 ppid=1867 pid=1942 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="startkde" exe="/usr/bin/bash" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968493.450:223): avc: denied { read } for pid=1942 comm="startkde" name="sh-thd-1339968196" dev="sdb5" ino=60794 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:tmp_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:13 2012 >type=SYSCALL msg=audit(1339968493.450:224): arch=c000003e syscall=87 success=yes exit=0 a0=1de4000 a1=0 a2=180 a3=4320656c61636f4c items=0 ppid=1867 pid=1942 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="startkde" exe="/usr/bin/bash" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968493.450:224): avc: denied { unlink } for pid=1942 comm="startkde" name="sh-thd-1339968196" dev="sdb5" ino=60794 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:tmp_t:s0 tclass=file >type=AVC msg=audit(1339968493.450:224): avc: denied { remove_name } for pid=1942 comm="startkde" name="sh-thd-1339968196" dev="sdb5" ino=60794 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:tmp_t:s0 tclass=dir >---- >time->Sun Jun 17 15:28:13 2012 >type=SYSCALL msg=audit(1339968493.456:225): arch=c000003e syscall=2 success=yes exit=4 a0=1b844d0 a1=c2 a2=180 a3=f719974447 items=0 ppid=1867 pid=1944 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="sed" exe="/usr/bin/sed" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968493.456:225): avc: denied { create } for pid=1944 comm="sed" name="sedZlabxB" scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:config_home_t:s0 tclass=file >type=AVC msg=audit(1339968493.456:225): avc: denied { add_name } for pid=1944 comm="sed" name="sedZlabxB" scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:config_home_t:s0 tclass=dir >type=AVC msg=audit(1339968493.456:225): avc: denied { write } for pid=1944 comm="sed" name="config" dev="sdb2" ino=147604 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:config_home_t:s0 tclass=dir >---- >time->Sun Jun 17 15:28:13 2012 >type=SYSCALL msg=audit(1339968493.480:226): arch=c000003e syscall=91 success=yes exit=0 a0=4 a1=81b4 a2=81b4 a3=ffffffff items=0 ppid=1867 pid=1944 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="sed" exe="/usr/bin/sed" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968493.480:226): avc: denied { setattr } for pid=1944 comm="sed" name="sedZlabxB" dev="sdb2" ino=1893290 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:config_home_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:13 2012 >type=SYSCALL msg=audit(1339968493.480:227): arch=c000003e syscall=82 success=yes exit=0 a0=1b844d0 a1=7fffe39aebd5 a2=1b844d0 a3=ffffffff items=0 ppid=1867 pid=1944 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="sed" exe="/usr/bin/sed" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968493.480:227): avc: denied { unlink } for pid=1944 comm="sed" name="startupconfigkeys" dev="sdb2" ino=1880233 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:config_home_t:s0 tclass=file >type=AVC msg=audit(1339968493.480:227): avc: denied { rename } for pid=1944 comm="sed" name="sedZlabxB" dev="sdb2" ino=1893290 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:config_home_t:s0 tclass=file >type=AVC msg=audit(1339968493.480:227): avc: denied { remove_name } for pid=1944 comm="sed" name="sedZlabxB" dev="sdb2" ino=1893290 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:config_home_t:s0 tclass=dir >---- >time->Sun Jun 17 15:28:13 2012 >type=SYSCALL msg=audit(1339968493.580:228): arch=c000003e syscall=4 success=no exit=-2 a0=61e640 a1=7fffebcf6db0 a2=7fffebcf6db0 a3=419b11 items=0 ppid=1949 pid=1950 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="ksplashx" exe="/usr/bin/ksplashx" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968493.580:228): avc: denied { read } for pid=1950 comm="ksplashx" name="cache-children-of-fedora" dev="sdb2" ino=1789944 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:config_home_t:s0 tclass=lnk_file >---- >time->Sun Jun 17 15:28:13 2012 >type=SYSCALL msg=audit(1339968493.581:229): arch=c000003e syscall=2 success=yes exit=2 a0=61e640 a1=0 a2=1b6 a3=238 items=0 ppid=1949 pid=1950 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="ksplashx" exe="/usr/bin/ksplashx" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968493.581:229): avc: denied { open } for pid=1950 comm="ksplashx" name="BeefyMiracle-1920x1080-beefy-miracle.png" dev="sdb5" ino=395569 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:user_tmp_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:13 2012 >type=SYSCALL msg=audit(1339968493.899:230): arch=c000003e syscall=29 success=yes exit=3604556 a0=0 a1=7e9000 a2=380 a3=88 items=0 ppid=1949 pid=1950 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="ksplashx" exe="/usr/bin/ksplashx" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968493.899:230): avc: denied { create } for pid=1950 comm="ksplashx" key=0 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:user_r:policykit_grant_t:s0 tclass=shm >---- >time->Sun Jun 17 15:28:13 2012 >type=SYSCALL msg=audit(1339968493.899:231): arch=c000003e syscall=30 success=yes exit=140493442318336 a0=37004c a1=0 a2=0 a3=88 items=0 ppid=1949 pid=1950 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="ksplashx" exe="/usr/bin/ksplashx" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968493.899:231): avc: denied { read write } for pid=1950 comm="ksplashx" path=2F535953563030303030303030202864656C6574656429 dev="tmpfs" ino=3604556 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:tmpfs_t:s0 tclass=file >type=AVC msg=audit(1339968493.899:231): avc: denied { read write } for pid=1950 comm="ksplashx" key=0 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:user_r:policykit_grant_t:s0 tclass=shm >type=AVC msg=audit(1339968493.899:231): avc: denied { unix_read unix_write } for pid=1950 comm="ksplashx" key=0 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:user_r:policykit_grant_t:s0 tclass=shm >---- >time->Sun Jun 17 15:28:13 2012 >type=SYSCALL msg=audit(1339968493.899:232): arch=c000003e syscall=31 success=yes exit=0 a0=37004c a1=0 a2=0 a3=88 items=0 ppid=1949 pid=1950 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="ksplashx" exe="/usr/bin/ksplashx" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968493.899:232): avc: denied { destroy } for pid=1950 comm="ksplashx" key=0 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:user_r:policykit_grant_t:s0 tclass=shm >---- >time->Sun Jun 17 15:28:16 2012 >type=USER_AVC msg=audit(1339968496.253:258): pid=0 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.DBus.Properties member=GetAll dest=:1.5 spid=2011 tpid=681 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:system_r:policykit_t:s0-s0:c0.c1023 tclass=dbus exe="/usr/bin/dbus-daemon" sauid=81 hostname=? addr=? terminal=?' >---- >time->Sun Jun 17 15:28:16 2012 >type=USER_AVC msg=audit(1339968496.258:259): pid=0 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.89 spid=681 tpid=2011 scontext=system_u:system_r:policykit_t:s0-s0:c0.c1023 tcontext=user_u:user_r:policykit_grant_t:s0 tclass=dbus exe="/usr/bin/dbus-daemon" sauid=81 hostname=? addr=? terminal=?' >---- >time->Sun Jun 17 15:28:16 2012 >type=USER_AVC msg=audit(1339968496.290:264): pid=0 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.DBus.Introspectable member=Introspect dest=org.freedesktop.UDisks spid=2011 tpid=1384 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:system_r:devicekit_disk_t:s0-s0:c0.c1023 tclass=dbus exe="/usr/bin/dbus-daemon" sauid=81 hostname=? addr=? terminal=?' >---- >time->Sun Jun 17 15:28:16 2012 >type=USER_AVC msg=audit(1339968496.769:275): pid=0 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 msg='avc: denied { send_msg } for msgtype=method_call interface=org.kde.auth member=performAction dest=org.kde.powerdevil.backlighthelper spid=2011 tpid=2120 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:system_r:initrc_t:s0-s0:c0.c1023 tclass=dbus exe="/usr/bin/dbus-daemon" sauid=81 hostname=? addr=? terminal=?' >---- >time->Sun Jun 17 15:28:16 2012 >type=USER_AVC msg=audit(1339968496.856:276): pid=0 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 msg='avc: denied { acquire_svc } for service=org.freedesktop.Policy.Power spid=2011 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tclass=dbus exe="/usr/bin/dbus-daemon" sauid=81 hostname=? addr=? terminal=?' >---- >time->Sun Jun 17 15:28:14 2012 >type=SYSCALL msg=audit(1339968494.220:233): arch=c000003e syscall=21 success=yes exit=0 a0=22cea28 a1=4 a2=22cea01 a3=2 items=0 ppid=1975 pid=1976 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="kde4-config" exe="/usr/bin/kde4-config" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968494.220:233): avc: denied { read } for pid=1976 comm="kde4-config" name=".kde" dev="sdb2" ino=147593 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:config_home_t:s0 tclass=dir >---- >time->Sun Jun 17 15:28:14 2012 >type=SYSCALL msg=audit(1339968494.283:234): arch=c000003e syscall=6 success=yes exit=0 a0=7fffc1e039e0 a1=7fffc1e03950 a2=7fffc1e03950 a3=fe8 items=0 ppid=1867 pid=1989 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="lnusertemp" exe="/usr/libexec/kde4/lnusertemp" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968494.283:234): avc: denied { getattr } for pid=1989 comm="lnusertemp" path="/home/christine/.kde/tmp-children-of-fedora" dev="sdb2" ino=1789943 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:config_home_t:s0 tclass=lnk_file >---- >time->Sun Jun 17 15:28:14 2012 >type=SYSCALL msg=audit(1339968494.295:235): arch=c000003e syscall=42 success=yes exit=0 a0=6 a1=7fff952e7a90 a2=17 a3=0 items=0 ppid=1867 pid=1993 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="qdbus" exe="/usr/bin/qdbus" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968494.295:235): avc: denied { connectto } for pid=1993 comm="qdbus" path=002F746D702F646275732D504A67433746416B5357 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:user_r:policykit_grant_t:s0 tclass=unix_stream_socket >---- >time->Sun Jun 17 15:28:14 2012 >type=SYSCALL msg=audit(1339968494.296:236): arch=c000003e syscall=1 success=yes exit=74 a0=a a1=11cff30 a2=4a a3=3caac19af2 items=0 ppid=1 pid=1895 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968494.296:236): avc: denied { compute_av } for pid=1895 comm="dbus-daemon" scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:security_t:s0 tclass=security >---- >time->Sun Jun 17 15:28:14 2012 >type=SYSCALL msg=audit(1339968494.344:237): arch=c000003e syscall=2 success=yes exit=8 a0=27c2928 a1=800c2 a2=180 a3=2 items=0 ppid=1997 pid=2000 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="kdeinit4" exe="/usr/bin/kdeinit4" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968494.344:237): avc: denied { create } for pid=2000 comm="kdeinit4" name="xauth-1001-_1MT2000.new" scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:user_tmp_t:s0 tclass=file >type=AVC msg=audit(1339968494.344:237): avc: denied { add_name } for pid=2000 comm="kdeinit4" name="xauth-1001-_1MT2000.new" scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:user_tmp_t:s0 tclass=dir >type=AVC msg=audit(1339968494.344:237): avc: denied { write } for pid=2000 comm="kdeinit4" name="kde-christine" dev="sdb5" ino=395538 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:user_tmp_t:s0 tclass=dir >---- >time->Sun Jun 17 15:28:14 2012 >type=SYSCALL msg=audit(1339968494.344:238): arch=c000003e syscall=93 success=yes exit=0 a0=8 a1=3e9 a2=3e9 a3=2 items=0 ppid=1997 pid=2000 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="kdeinit4" exe="/usr/bin/kdeinit4" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968494.344:238): avc: denied { setattr } for pid=2000 comm="kdeinit4" name="xauth-1001-_1MT2000.new" dev="sdb5" ino=396255 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:user_tmp_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:14 2012 >type=SYSCALL msg=audit(1339968494.345:239): arch=c000003e syscall=82 success=yes exit=0 a0=27c3b68 a1=27c2838 a2=27c3b01 a3=2 items=0 ppid=1997 pid=2000 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="kdeinit4" exe="/usr/bin/kdeinit4" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968494.345:239): avc: denied { unlink } for pid=2000 comm="kdeinit4" name="xauth-1001-_1" dev="sdb5" ino=396259 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:user_tmp_t:s0 tclass=file >type=AVC msg=audit(1339968494.345:239): avc: denied { rename } for pid=2000 comm="kdeinit4" name="xauth-1001-_1MT2000.new" dev="sdb5" ino=396255 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:user_tmp_t:s0 tclass=file >type=AVC msg=audit(1339968494.345:239): avc: denied { remove_name } for pid=2000 comm="kdeinit4" name="xauth-1001-_1MT2000.new" dev="sdb5" ino=396255 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:user_tmp_t:s0 tclass=dir >---- >time->Sun Jun 17 15:28:14 2012 >type=SYSCALL msg=audit(1339968494.345:240): arch=c000003e syscall=21 success=yes exit=0 a0=27c2838 a1=6 a2=1 a3=2f items=0 ppid=1997 pid=2000 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="kdeinit4" exe="/usr/bin/kdeinit4" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968494.345:240): avc: denied { write } for pid=2000 comm="kdeinit4" name="christine" dev="sdb2" ino=6423 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:user_home_dir_t:s0 tclass=dir >---- >time->Sun Jun 17 15:28:14 2012 >type=SYSCALL msg=audit(1339968494.345:241): arch=c000003e syscall=21 success=yes exit=0 a0=60c960 a1=2 a2=3ca97b0740 a3=2f items=0 ppid=1997 pid=2000 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="kdeinit4" exe="/usr/bin/kdeinit4" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968494.345:241): avc: denied { write } for pid=2000 comm="kdeinit4" name="kdeinit4__1" dev="sdb5" ino=396260 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:user_tmp_t:s0 tclass=sock_file >---- >time->Sun Jun 17 15:28:14 2012 >type=SYSCALL msg=audit(1339968494.345:242): arch=c000003e syscall=87 success=yes exit=0 a0=60c960 a1=7fffca0bc0b0 a2=6f a3=7fffca0bc0b2 items=0 ppid=1997 pid=2000 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="kdeinit4" exe="/usr/bin/kdeinit4" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968494.345:242): avc: denied { unlink } for pid=2000 comm="kdeinit4" name="kdeinit4__1" dev="sdb5" ino=396260 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:user_tmp_t:s0 tclass=sock_file >---- >time->Sun Jun 17 15:28:14 2012 >type=SYSCALL msg=audit(1339968494.345:243): arch=c000003e syscall=49 success=yes exit=0 a0=7 a1=7fffca0bc0b0 a2=6e a3=7fffca0bc0b2 items=0 ppid=1997 pid=2000 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="kdeinit4" exe="/usr/bin/kdeinit4" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968494.345:243): avc: denied { create } for pid=2000 comm="kdeinit4" name="kdeinit4__1" scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:user_tmp_t:s0 tclass=sock_file >---- >time->Sun Jun 17 15:28:14 2012 >type=SYSCALL msg=audit(1339968494.346:244): arch=c000003e syscall=90 success=yes exit=0 a0=60c960 a1=180 a2=6e a3=7fffca0bc0b2 items=0 ppid=1997 pid=2000 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="kdeinit4" exe="/usr/bin/kdeinit4" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968494.346:244): avc: denied { setattr } for pid=2000 comm="kdeinit4" name="kdeinit4__1" dev="sdb5" ino=396259 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:user_tmp_t:s0 tclass=sock_file >---- >time->Sun Jun 17 15:28:14 2012 >type=SYSCALL msg=audit(1339968494.348:245): arch=c000003e syscall=62 success=yes exit=0 a0=7d3 a1=a a2=0 a3=4013f7 items=0 ppid=1997 pid=1999 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="start_kdeinit" exe="/usr/libexec/kde4/start_kdeinit" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968494.348:245): avc: denied { signal } for pid=1999 comm="start_kdeinit" scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:user_r:policykit_grant_t:s0 tclass=process >---- >time->Sun Jun 17 15:28:14 2012 >type=SYSCALL msg=audit(1339968494.407:246): arch=c000003e syscall=21 success=yes exit=0 a0=22a9888 a1=4 a2=22a9888 a3=7a items=0 ppid=2000 pid=2003 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="klauncher" exe="/usr/libexec/kde4/klauncher" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968494.407:246): avc: denied { read } for pid=2003 comm="klauncher" name="kdebug.areas" dev="sdb5" ino=9271 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:config_usr_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:14 2012 >type=SYSCALL msg=audit(1339968494.407:247): arch=c000003e syscall=4 success=yes exit=0 a0=22a9888 a1=7fff7a61a9e0 a2=7fff7a61a9e0 a3=7a items=0 ppid=2000 pid=2003 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="klauncher" exe="/usr/libexec/kde4/klauncher" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968494.407:247): avc: denied { getattr } for pid=2003 comm="klauncher" path="/usr/share/config/kdebug.areas" dev="sdb5" ino=9271 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:config_usr_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:14 2012 >type=SYSCALL msg=audit(1339968494.407:248): arch=c000003e syscall=2 success=yes exit=8 a0=22a99d8 a1=80000 a2=1b6 a3=7a items=0 ppid=2000 pid=2003 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="klauncher" exe="/usr/libexec/kde4/klauncher" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968494.407:248): avc: denied { open } for pid=2003 comm="klauncher" name="kdebug.areas" dev="sdb5" ino=9271 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:config_usr_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:14 2012 >type=SYSCALL msg=audit(1339968494.545:249): arch=c000003e syscall=2 success=yes exit=7 a0=1a946a0 a1=0 a2=1a946e3 a3=44 items=0 ppid=2010 pid=2011 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="kded4" exe="/usr/bin/kded4" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968494.545:249): avc: denied { open } for pid=2011 comm="kded4" name="3830d5c3ddfd5cd38a049b759396e72e-le64.cache-3" dev="sdb5" ino=4971 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:fonts_cache_t:s0 tclass=file >type=AVC msg=audit(1339968494.545:249): avc: denied { read } for pid=2011 comm="kded4" name="3830d5c3ddfd5cd38a049b759396e72e-le64.cache-3" dev="sdb5" ino=4971 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:fonts_cache_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:14 2012 >type=SYSCALL msg=audit(1339968494.546:250): arch=c000003e syscall=5 success=yes exit=0 a0=7 a1=7fff9ab14510 a2=7fff9ab14510 a3=44 items=0 ppid=2010 pid=2011 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="kded4" exe="/usr/bin/kded4" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968494.546:250): avc: denied { getattr } for pid=2011 comm="kded4" path="/var/cache/fontconfig/3830d5c3ddfd5cd38a049b759396e72e-le64.cache-3" dev="sdb5" ino=4971 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:fonts_cache_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:14 2012 >type=SYSCALL msg=audit(1339968494.548:251): arch=c000003e syscall=2 success=yes exit=7 a0=1a946a0 a1=0 a2=1a946e3 a3=44 items=0 ppid=2010 pid=2011 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="kded4" exe="/usr/bin/kded4" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968494.548:251): avc: denied { open } for pid=2011 comm="kded4" name="3640555adad8a8f6978400293cfce7ab-le64.cache-3" dev="sdb5" ino=54843 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=unconfined_u:object_r:fonts_cache_t:s0 tclass=file >type=AVC msg=audit(1339968494.548:251): avc: denied { read } for pid=2011 comm="kded4" name="3640555adad8a8f6978400293cfce7ab-le64.cache-3" dev="sdb5" ino=54843 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=unconfined_u:object_r:fonts_cache_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:14 2012 >type=SYSCALL msg=audit(1339968494.548:252): arch=c000003e syscall=5 success=yes exit=0 a0=7 a1=7fff9ab14510 a2=7fff9ab14510 a3=44 items=0 ppid=2010 pid=2011 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="kded4" exe="/usr/bin/kded4" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968494.548:252): avc: denied { getattr } for pid=2011 comm="kded4" path="/var/cache/fontconfig/3640555adad8a8f6978400293cfce7ab-le64.cache-3" dev="sdb5" ino=54843 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=unconfined_u:object_r:fonts_cache_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:14 2012 >type=SYSCALL msg=audit(1339968494.557:253): arch=c000003e syscall=72 success=yes exit=0 a0=8 a1=7 a2=7fff9ab13570 a3=3c items=0 ppid=2010 pid=2011 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="kded4" exe="/usr/bin/kded4" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968494.557:253): avc: denied { lock } for pid=2011 comm="kded4" path="/home/christine/.config/Trolltech.conf" dev="sdb2" ino=147592 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:config_home_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:14 2012 >type=SYSCALL msg=audit(1339968494.714:254): arch=c000003e syscall=21 success=yes exit=0 a0=1b48e48 a1=4 a2=1b48e01 a3=2 items=0 ppid=2010 pid=2011 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="kded4" exe="/usr/bin/kded4" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968494.714:254): avc: denied { read } for pid=2011 comm="kded4" name="share" dev="sdb2" ino=8022 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:data_home_t:s0 tclass=dir >---- >time->Sun Jun 17 15:28:16 2012 >type=SYSCALL msg=audit(1339968496.265:260): arch=c000003e syscall=41 success=yes exit=15 a0=10 a1=80803 a2=f a3=1cd25f0 items=0 ppid=1 pid=2011 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="kded4" exe="/usr/bin/kded4" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968496.265:260): avc: denied { create } for pid=2011 comm="kded4" scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:user_r:policykit_grant_t:s0 tclass=netlink_kobject_uevent_socket >---- >time->Sun Jun 17 15:28:16 2012 >type=SYSCALL msg=audit(1339968496.266:261): arch=c000003e syscall=54 success=yes exit=0 a0=f a1=1 a2=1a a3=7fff9ab124c0 items=0 ppid=1 pid=2011 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="kded4" exe="/usr/bin/kded4" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968496.266:261): avc: denied { setopt } for pid=2011 comm="kded4" scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:user_r:policykit_grant_t:s0 tclass=netlink_kobject_uevent_socket >---- >time->Sun Jun 17 15:28:16 2012 >type=SYSCALL msg=audit(1339968496.266:262): arch=c000003e syscall=49 success=yes exit=0 a0=f a1=1cd26c0 a2=c a3=7fff9ab124c0 items=0 ppid=1 pid=2011 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="kded4" exe="/usr/bin/kded4" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968496.266:262): avc: denied { bind } for pid=2011 comm="kded4" scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:user_r:policykit_grant_t:s0 tclass=netlink_kobject_uevent_socket >---- >time->Sun Jun 17 15:28:16 2012 >type=SYSCALL msg=audit(1339968496.266:263): arch=c000003e syscall=51 success=yes exit=0 a0=f a1=7fff9ab13520 a2=7fff9ab1351c a3=7fff9ab124c0 items=0 ppid=1 pid=2011 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="kded4" exe="/usr/bin/kded4" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968496.266:263): avc: denied { getattr } for pid=2011 comm="kded4" scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:user_r:policykit_grant_t:s0 tclass=netlink_kobject_uevent_socket >---- >time->Sun Jun 17 15:28:16 2012 >type=SYSCALL msg=audit(1339968496.602:265): arch=c000003e syscall=2 success=yes exit=14 a0=27c275b a1=0 a2=1b6 a3=238 items=0 ppid=1 pid=2000 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="kdeinit4" exe="/usr/bin/kdeinit4" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968496.602:265): avc: denied { open } for pid=2000 comm="kdeinit4" name="xauth-1001-_1" dev="sdb5" ino=396255 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:user_tmp_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:16 2012 >type=SYSCALL msg=audit(1339968496.647:266): arch=c000003e syscall=2 success=yes exit=3 a0=1471ae8 a1=c2 a2=180 a3=f72faa678c items=0 ppid=2000 pid=2117 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="ksmserver" exe="/usr/bin/ksmserver" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968496.647:266): avc: denied { read write open } for pid=2117 comm="ksmserver" name="DgT8A0" dev="sdb2" ino=1893291 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:user_home_dir_t:s0 tclass=file >type=AVC msg=audit(1339968496.647:266): avc: denied { create } for pid=2117 comm="ksmserver" name="DgT8A0" scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:user_home_dir_t:s0 tclass=file >type=AVC msg=audit(1339968496.647:266): avc: denied { add_name } for pid=2117 comm="ksmserver" name="DgT8A0" scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:user_home_dir_t:s0 tclass=dir >---- >time->Sun Jun 17 15:28:16 2012 >type=SYSCALL msg=audit(1339968496.647:267): arch=c000003e syscall=87 success=yes exit=0 a0=1471ae8 a1=316b22b598 a2=1471ae8 a3=f72faa678c items=0 ppid=2000 pid=2117 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="ksmserver" exe="/usr/bin/ksmserver" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968496.647:267): avc: denied { unlink } for pid=2117 comm="ksmserver" name="DgT8A0" dev="sdb2" ino=1893291 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:user_home_dir_t:s0 tclass=file >type=AVC msg=audit(1339968496.647:267): avc: denied { remove_name } for pid=2117 comm="ksmserver" name="DgT8A0" dev="sdb2" ino=1893291 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:user_home_dir_t:s0 tclass=dir >---- >time->Sun Jun 17 15:28:16 2012 >type=SYSCALL msg=audit(1339968496.648:268): arch=c000003e syscall=21 success=yes exit=0 a0=146e178 a1=2 a2=146e178 a3=41 items=0 ppid=2000 pid=2117 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="ksmserver" exe="/usr/bin/ksmserver" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968496.648:268): avc: denied { write } for pid=2117 comm="ksmserver" name=".ICEauthority" dev="sdb2" ino=8002 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:iceauth_home_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:16 2012 >type=SYSCALL msg=audit(1339968496.648:269): arch=c000003e syscall=21 success=yes exit=0 a0=146e178 a1=4 a2=146e178 a3=41 items=0 ppid=2000 pid=2117 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="ksmserver" exe="/usr/bin/ksmserver" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968496.648:269): avc: denied { read } for pid=2117 comm="ksmserver" name=".ICEauthority" dev="sdb2" ino=8002 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:iceauth_home_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:16 2012 >type=SYSCALL msg=audit(1339968496.648:270): arch=c000003e syscall=21 success=yes exit=0 a0=1471898 a1=2 a2=1471898 a3=31 items=0 ppid=2000 pid=2117 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="ksmserver" exe="/usr/bin/ksmserver" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968496.648:270): avc: denied { write } for pid=2117 comm="ksmserver" name=".ICE-unix" dev="sdb5" ino=262443 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=dir >---- >time->Sun Jun 17 15:28:16 2012 >type=SYSCALL msg=audit(1339968496.648:271): arch=c000003e syscall=21 success=yes exit=0 a0=1471898 a1=4 a2=1471898 a3=31 items=0 ppid=2000 pid=2117 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="ksmserver" exe="/usr/bin/ksmserver" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968496.648:271): avc: denied { read } for pid=2117 comm="ksmserver" name=".ICE-unix" dev="sdb5" ino=262443 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=dir >---- >time->Sun Jun 17 15:28:16 2012 >type=SYSCALL msg=audit(1339968496.653:272): arch=c000003e syscall=42 success=yes exit=0 a0=3 a1=7fff7433d580 a2=14 a3=7fff7433d583 items=0 ppid=2000 pid=2117 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="ksmserver" exe="/usr/bin/ksmserver" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968496.653:272): avc: denied { connectto } for pid=2117 comm="ksmserver" path=002F746D702F2E5831312D756E69782F5831 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:system_r:xserver_t:s0 tclass=unix_stream_socket >---- >time->Sun Jun 17 15:28:16 2012 >type=SYSCALL msg=audit(1339968496.688:273): arch=c000003e syscall=2 success=yes exit=7 a0=14a9290 a1=0 a2=14a92d3 a3=44 items=0 ppid=2000 pid=2117 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="ksmserver" exe="/usr/bin/ksmserver" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968496.688:273): avc: denied { open } for pid=2117 comm="ksmserver" name="3640555adad8a8f6978400293cfce7ab-le64.cache-3" dev="sdb5" ino=54843 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=unconfined_u:object_r:fonts_cache_t:s0 tclass=file >type=AVC msg=audit(1339968496.688:273): avc: denied { read } for pid=2117 comm="ksmserver" name="3640555adad8a8f6978400293cfce7ab-le64.cache-3" dev="sdb5" ino=54843 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=unconfined_u:object_r:fonts_cache_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:16 2012 >type=SYSCALL msg=audit(1339968496.689:274): arch=c000003e syscall=5 success=yes exit=0 a0=7 a1=7fff7433cc60 a2=7fff7433cc60 a3=44 items=0 ppid=2000 pid=2117 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="ksmserver" exe="/usr/bin/ksmserver" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968496.689:274): avc: denied { getattr } for pid=2117 comm="ksmserver" path="/var/cache/fontconfig/3640555adad8a8f6978400293cfce7ab-le64.cache-3" dev="sdb5" ino=54843 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=unconfined_u:object_r:fonts_cache_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:16 2012 >type=SYSCALL msg=audit(1339968496.885:277): arch=c000003e syscall=49 success=yes exit=0 a0=9 a1=7fff7433d250 a2=15 a3=3cb2c133a8 items=0 ppid=2000 pid=2117 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="ksmserver" exe="/usr/bin/ksmserver" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968496.885:277): avc: denied { create } for pid=2117 comm="ksmserver" name="2117" scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:xdm_tmp_t:s0 tclass=sock_file >type=AVC msg=audit(1339968496.885:277): avc: denied { add_name } for pid=2117 comm="ksmserver" name="2117" scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=dir >---- >time->Sun Jun 17 15:28:16 2012 >type=SYSCALL msg=audit(1339968496.948:278): arch=c000003e syscall=2 success=yes exit=9 a0=10b7990 a1=0 a2=10b79d3 a3=44 items=0 ppid=2117 pid=2133 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="kwin" exe="/usr/bin/kwin" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968496.948:278): avc: denied { open } for pid=2133 comm="kwin" name="3830d5c3ddfd5cd38a049b759396e72e-le64.cache-3" dev="sdb5" ino=4971 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:fonts_cache_t:s0 tclass=file >type=AVC msg=audit(1339968496.948:278): avc: denied { read } for pid=2133 comm="kwin" name="3830d5c3ddfd5cd38a049b759396e72e-le64.cache-3" dev="sdb5" ino=4971 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:fonts_cache_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:16 2012 >type=SYSCALL msg=audit(1339968496.949:279): arch=c000003e syscall=5 success=yes exit=0 a0=9 a1=7fff0d6dcfa0 a2=7fff0d6dcfa0 a3=44 items=0 ppid=2117 pid=2133 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="kwin" exe="/usr/bin/kwin" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968496.949:279): avc: denied { getattr } for pid=2133 comm="kwin" path="/var/cache/fontconfig/3830d5c3ddfd5cd38a049b759396e72e-le64.cache-3" dev="sdb5" ino=4971 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:fonts_cache_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:16 2012 >type=SYSCALL msg=audit(1339968496.996:280): arch=c000003e syscall=2 success=yes exit=11 a0=113d710 a1=0 a2=1b6 a3=238 items=0 ppid=2117 pid=2133 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="kwin" exe="/usr/bin/kwin" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968496.996:280): avc: denied { open } for pid=2133 comm="kwin" name=".ICEauthority" dev="sdb2" ino=8002 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:iceauth_home_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:16 2012 >type=SYSCALL msg=audit(1339968496.996:281): arch=c000003e syscall=5 success=yes exit=0 a0=b a1=7fff0d6dd1d0 a2=7fff0d6dd1d0 a3=238 items=0 ppid=2117 pid=2133 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="kwin" exe="/usr/bin/kwin" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968496.996:281): avc: denied { getattr } for pid=2133 comm="kwin" path="/home/christine/.ICEauthority" dev="sdb2" ino=8002 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:iceauth_home_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:19 2012 >type=USER_AVC msg=audit(1339968499.289:292): pid=0 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.Avahi.Server member=ServiceBrowserNew dest=org.freedesktop.Avahi spid=2228 tpid=578 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:system_r:avahi_t:s0 tclass=dbus exe="/usr/bin/dbus-daemon" sauid=81 hostname=? addr=? terminal=?' >---- >time->Sun Jun 17 15:28:19 2012 >type=USER_AVC msg=audit(1339968499.290:293): pid=0 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.93 spid=578 tpid=2228 scontext=system_u:system_r:avahi_t:s0 tcontext=user_u:user_r:policykit_grant_t:s0 tclass=dbus exe="/usr/bin/dbus-daemon" sauid=81 hostname=? addr=? terminal=?' >---- >time->Sun Jun 17 15:28:17 2012 >type=SYSCALL msg=audit(1339968497.255:282): arch=c000003e syscall=2 success=yes exit=4 a0=23b12e0 a1=2 a2=7f4a5c3d2b18 a3=37ee0647a8 items=0 ppid=2133 pid=2147 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="kwin_opengl_tes" exe="/usr/libexec/kde4/kwin_opengl_test" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968497.255:282): avc: denied { open } for pid=2147 comm="kwin_opengl_tes" name="card0" dev="devtmpfs" ino=8281 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:dri_device_t:s0 tclass=chr_file >type=AVC msg=audit(1339968497.255:282): avc: denied { read write } for pid=2147 comm="kwin_opengl_tes" name="card0" dev="devtmpfs" ino=8281 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:dri_device_t:s0 tclass=chr_file >---- >time->Sun Jun 17 15:28:17 2012 >type=SYSCALL msg=audit(1339968497.256:283): arch=c000003e syscall=16 success=yes exit=0 a0=4 a1=80046402 a2=7fff30ae17d0 a3=37ee0647a8 items=0 ppid=2133 pid=2147 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="kwin_opengl_tes" exe="/usr/libexec/kde4/kwin_opengl_test" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968497.256:283): avc: denied { ioctl } for pid=2147 comm="kwin_opengl_tes" path="/dev/dri/card0" dev="devtmpfs" ino=8281 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:dri_device_t:s0 tclass=chr_file >---- >time->Sun Jun 17 15:28:17 2012 >type=SYSCALL msg=audit(1339968497.266:284): arch=c000003e syscall=9 success=yes exit=139957315760128 a0=0 a1=80000 a2=7 a3=22 items=0 ppid=2133 pid=2147 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="kwin_opengl_tes" exe="/usr/libexec/kde4/kwin_opengl_test" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968497.266:284): avc: denied { execmem } for pid=2147 comm="kwin_opengl_tes" scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:user_r:policykit_grant_t:s0 tclass=process >---- >time->Sun Jun 17 15:28:17 2012 >type=SYSCALL msg=audit(1339968497.953:285): arch=c000003e syscall=16 success=yes exit=0 a0=b a1=c010640b a2=7fff0d6dd330 a3=0 items=0 ppid=2117 pid=2133 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="kwin" exe="/usr/bin/kwin" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968497.953:285): avc: denied { ioctl } for pid=2133 comm="kwin" path="/dev/dri/card0" dev="devtmpfs" ino=8281 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:dri_device_t:s0 tclass=chr_file >---- >time->Sun Jun 17 15:28:19 2012 >type=SYSCALL msg=audit(1339968499.279:291): arch=c000003e syscall=5 success=yes exit=0 a0=9 a1=7ffffc193be0 a2=7ffffc193be0 a3=0 items=0 ppid=2226 pid=2228 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="plasma-desktop" exe="/usr/bin/plasma-desktop" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968499.279:291): avc: denied { getattr } for pid=2228 comm="plasma-desktop" path="/proc/meminfo" dev="proc" ino=4026532026 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:proc_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:19 2012 >type=SYSCALL msg=audit(1339968499.603:294): arch=c000003e syscall=6 success=yes exit=0 a0=1887578 a1=7ffffc194260 a2=7ffffc194260 a3=92 items=0 ppid=2226 pid=2228 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="plasma-desktop" exe="/usr/bin/plasma-desktop" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968499.603:294): avc: denied { getattr } for pid=2228 comm="plasma-desktop" path="/usr/share/fonts/dejavu/DejaVuSans.ttf" dev="sdb5" ino=38495 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:fonts_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:19 2012 >type=SYSCALL msg=audit(1339968499.603:295): arch=c000003e syscall=2 success=yes exit=13 a0=1891fc8 a1=0 a2=0 a3=50 items=0 ppid=2226 pid=2228 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="plasma-desktop" exe="/usr/bin/plasma-desktop" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968499.603:295): avc: denied { open } for pid=2228 comm="plasma-desktop" name="DejaVuSans.ttf" dev="sdb5" ino=38495 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:fonts_t:s0 tclass=file >type=AVC msg=audit(1339968499.603:295): avc: denied { read } for pid=2228 comm="plasma-desktop" name="DejaVuSans.ttf" dev="sdb5" ino=38495 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:fonts_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:22 2012 >type=USER_AVC msg=audit(1339968502.223:299): pid=0 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.DBus.Properties member=Get dest=org.freedesktop.NetworkManager spid=2228 tpid=586 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:system_r:NetworkManager_t:s0 tclass=dbus exe="/usr/bin/dbus-daemon" sauid=81 hostname=? addr=? terminal=?' >---- >time->Sun Jun 17 15:28:18 2012 >type=SYSCALL msg=audit(1339968498.118:286): arch=c000003e syscall=9 success=yes exit=140126868623360 a0=0 a1=1000 a2=3 a3=1 items=0 ppid=2117 pid=2133 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="kwin" exe="/usr/bin/kwin" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968498.118:286): avc: denied { read write } for pid=2133 comm="kwin" path="/dev/dri/card0" dev="devtmpfs" ino=8281 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:dri_device_t:s0 tclass=chr_file >---- >time->Sun Jun 17 15:28:18 2012 >type=SYSCALL msg=audit(1339968498.203:287): arch=c000003e syscall=137 success=yes exit=0 a0=15d3448 a1=7fff0d6dcd30 a2=15d3448 a3=9e items=0 ppid=2117 pid=2133 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="kwin" exe="/usr/bin/kwin" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968498.203:287): avc: denied { getattr } for pid=2133 comm="kwin" name="/" dev="sdb2" ino=256 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:fs_t:s0 tclass=filesystem >---- >time->Sun Jun 17 15:28:18 2012 >type=SYSCALL msg=audit(1339968498.788:288): arch=c000003e syscall=62 success=yes exit=0 a0=8aa a1=a a2=0 a3=4013f7 items=0 ppid=1 pid=1999 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="start_kdeinit" exe="/usr/libexec/kde4/start_kdeinit" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968498.788:288): avc: denied { signal } for pid=1999 comm="start_kdeinit" scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:user_r:policykit_grant_t:s0 tclass=process >---- >time->Sun Jun 17 15:28:18 2012 >type=SYSCALL msg=audit(1339968498.822:289): arch=c000003e syscall=21 success=yes exit=0 a0=16a7ec8 a1=2 a2=16a7ec8 a3=71 items=0 ppid=2117 pid=2133 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="kwin" exe="/usr/bin/kwin" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968498.822:289): avc: denied { write } for pid=2133 comm="kwin" name="kdecache-christine" dev="sdb5" ino=395539 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:user_tmp_t:s0 tclass=dir >---- >time->Sun Jun 17 15:28:19 2012 >type=SYSCALL msg=audit(1339968499.279:290): arch=c000003e syscall=2 success=yes exit=9 a0=3ca957729c a1=80000 a2=1b6 a3=238 items=0 ppid=2226 pid=2228 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="plasma-desktop" exe="/usr/bin/plasma-desktop" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968499.279:290): avc: denied { open } for pid=2228 comm="plasma-desktop" name="meminfo" dev="proc" ino=4026532026 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:proc_t:s0 tclass=file >type=AVC msg=audit(1339968499.279:290): avc: denied { read } for pid=2228 comm="plasma-desktop" name="meminfo" dev="proc" ino=4026532026 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:proc_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:22 2012 >type=USER_AVC msg=audit(1339968502.224:300): pid=0 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.93 spid=586 tpid=2228 scontext=system_u:system_r:NetworkManager_t:s0 tcontext=user_u:user_r:policykit_grant_t:s0 tclass=dbus exe="/usr/bin/dbus-daemon" sauid=81 hostname=? addr=? terminal=?' >---- >time->Sun Jun 17 15:28:20 2012 >type=SYSCALL msg=audit(1339968500.952:296): arch=c000003e syscall=42 success=yes exit=0 a0=e a1=7fff7433c9a0 a2=6e a3=316c4228e3 items=0 ppid=2000 pid=2117 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="ksmserver" exe="/usr/bin/ksmserver" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968500.952:296): avc: denied { connectto } for pid=2117 comm="ksmserver" path="/run/xdmctl/dmctl-:1/socket" scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:system_r:initrc_t:s0 tclass=unix_stream_socket >type=AVC msg=audit(1339968500.952:296): avc: denied { write } for pid=2117 comm="ksmserver" name="socket" dev="tmpfs" ino=52495 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:var_run_t:s0 tclass=sock_file >---- >time->Sun Jun 17 15:28:20 2012 >type=SYSCALL msg=audit(1339968500.993:297): arch=c000003e syscall=2 success=yes exit=17 a0=7ffffc18fab0 a1=80000 a2=1b6 a3=238 items=0 ppid=2226 pid=2228 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="plasma-desktop" exe="/usr/bin/plasma-desktop" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968500.993:297): avc: denied { open } for pid=2228 comm="plasma-desktop" name="+input:input1" dev="tmpfs" ino=8002 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:udev_var_run_t:s0 tclass=file >type=AVC msg=audit(1339968500.993:297): avc: denied { read } for pid=2228 comm="plasma-desktop" name="+input:input1" dev="tmpfs" ino=8002 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:udev_var_run_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:20 2012 >type=SYSCALL msg=audit(1339968500.993:298): arch=c000003e syscall=5 success=yes exit=0 a0=11 a1=7ffffc18f930 a2=7ffffc18f930 a3=0 items=0 ppid=2226 pid=2228 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="plasma-desktop" exe="/usr/bin/plasma-desktop" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968500.993:298): avc: denied { getattr } for pid=2228 comm="plasma-desktop" path="/run/udev/data/+input:input1" dev="tmpfs" ino=8002 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:udev_var_run_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:24 2012 >type=USER_AVC msg=audit(1339968504.051:312): pid=0 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.ModemManager member=EnumerateDevices dest=org.freedesktop.ModemManager spid=2011 tpid=687 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:system_r:modemmanager_t:s0-s0:c0.c1023 tclass=dbus exe="/usr/bin/dbus-daemon" sauid=81 hostname=? addr=? terminal=?' >---- >time->Sun Jun 17 15:28:24 2012 >type=USER_AVC msg=audit(1339968504.051:313): pid=0 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.88 spid=687 tpid=2011 scontext=system_u:system_r:modemmanager_t:s0-s0:c0.c1023 tcontext=user_u:user_r:policykit_grant_t:s0 tclass=dbus exe="/usr/bin/dbus-daemon" sauid=81 hostname=? addr=? terminal=?' >---- >time->Sun Jun 17 15:28:22 2012 >type=SYSCALL msg=audit(1339968502.392:301): arch=c000003e syscall=2 success=yes exit=3 a0=41e416 a1=0 a2=6 a3=18 items=0 ppid=2228 pid=2361 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="ksysguardd" exe="/usr/bin/ksysguardd" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968502.392:301): avc: denied { open } for pid=2361 comm="ksysguardd" name="dev" dev="proc" ino=4026531972 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:proc_net_t:s0 tclass=file >type=AVC msg=audit(1339968502.392:301): avc: denied { read } for pid=2361 comm="ksysguardd" name="dev" dev="proc" ino=4026531972 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:proc_net_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:22 2012 >type=SYSCALL msg=audit(1339968502.392:302): arch=c000003e syscall=257 success=yes exit=3 a0=ffffffffffffff9c a1=41ec12 a2=90800 a3=0 items=0 ppid=2228 pid=2361 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="ksysguardd" exe="/usr/bin/ksysguardd" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968502.392:302): avc: denied { read } for pid=2361 comm="ksysguardd" name="/" dev="proc" ino=1 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:proc_t:s0 tclass=dir >---- >time->Sun Jun 17 15:28:22 2012 >type=SYSCALL msg=audit(1339968502.393:303): arch=c000003e syscall=2 success=yes exit=4 a0=41f605 a1=0 a2=e02dc0 a3=10 items=0 ppid=2228 pid=2361 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="ksysguardd" exe="/usr/bin/ksysguardd" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968502.393:303): avc: denied { open } for pid=2361 comm="ksysguardd" name="mdstat" dev="proc" ino=4026531970 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:proc_mdstat_t:s0 tclass=file >type=AVC msg=audit(1339968502.393:303): avc: denied { read } for pid=2361 comm="ksysguardd" name="mdstat" dev="proc" ino=4026531970 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:proc_mdstat_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:23 2012 >type=SYSCALL msg=audit(1339968503.693:305): arch=c000003e syscall=2 success=yes exit=6 a0=1df5550 a1=0 a2=0 a3=6f6363612f6c6f72 items=0 ppid=2411 pid=2412 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="mission-control" exe="/usr/libexec/mission-control-5" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968503.693:305): avc: denied { open } for pid=2412 comm="mission-control" name="accounts.cfg" dev="sdb2" ino=8070 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:telepathy_mission_control_home_t:s0 tclass=file >type=AVC msg=audit(1339968503.693:305): avc: denied { read } for pid=2412 comm="mission-control" name="accounts.cfg" dev="sdb2" ino=8070 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:telepathy_mission_control_home_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:23 2012 >type=SYSCALL msg=audit(1339968503.693:306): arch=c000003e syscall=5 success=yes exit=0 a0=6 a1=7fff0ee9bc00 a2=7fff0ee9bc00 a3=6f6363612f6c6f72 items=0 ppid=2411 pid=2412 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="mission-control" exe="/usr/libexec/mission-control-5" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968503.693:306): avc: denied { getattr } for pid=2412 comm="mission-control" path="/home/christine/.mission-control/accounts/accounts.cfg" dev="sdb2" ino=8070 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:telepathy_mission_control_home_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:23 2012 >type=SYSCALL msg=audit(1339968503.698:307): arch=c000003e syscall=62 success=yes exit=0 a0=96b a1=9 a2=1 a3=0 items=0 ppid=1 pid=1895 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968503.698:307): avc: denied { sigkill } for pid=1895 comm="dbus-daemon" scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:user_r:policykit_grant_t:s0 tclass=process >---- >time->Sun Jun 17 15:28:23 2012 >type=SYSCALL msg=audit(1339968503.648:304): arch=c000003e syscall=59 success=yes exit=0 a0=12127b0 a1=120e080 a2=121a800 a3=7f6a6b6a2ad0 items=0 ppid=2411 pid=2412 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="mission-control" exe="/usr/libexec/mission-control-5" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968503.648:304): avc: denied { execute_no_trans } for pid=2412 comm="dbus-daemon" path="/usr/libexec/mission-control-5" dev="sdb5" ino=59048 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:telepathy_mission_control_exec_t:s0 tclass=file >type=AVC msg=audit(1339968503.648:304): avc: denied { read open } for pid=2412 comm="dbus-daemon" name="mission-control-5" dev="sdb5" ino=59048 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:telepathy_mission_control_exec_t:s0 tclass=file >type=AVC msg=audit(1339968503.648:304): avc: denied { execute } for pid=2412 comm="dbus-daemon" name="mission-control-5" dev="sdb5" ino=59048 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:telepathy_mission_control_exec_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:23 2012 >type=SYSCALL msg=audit(1339968503.704:308): arch=c000003e syscall=144 success=yes exit=0 a0=96c a1=0 a2=7fff0ee9c960 a3=1 items=0 ppid=1 pid=2412 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="mission-control" exe="/usr/libexec/mission-control-5" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968503.704:308): avc: denied { setsched } for pid=2412 comm="mission-control" scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:user_r:policykit_grant_t:s0 tclass=process >---- >time->Sun Jun 17 15:28:23 2012 >type=SYSCALL msg=audit(1339968503.709:309): arch=c000003e syscall=2 success=yes exit=7 a0=3cbe04263e a1=0 a2=1b6 a3=238 items=0 ppid=1 pid=2412 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="mission-control" exe="/usr/libexec/mission-control-5" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968503.709:309): avc: denied { read } for pid=2412 comm="mission-control" name="tmp" dev="sdb5" ino=150 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:tmp_t:s0 tclass=dir >---- >time->Sun Jun 17 15:28:23 2012 >type=SYSCALL msg=audit(1339968503.925:310): arch=c000003e syscall=83 success=yes exit=0 a0=1e48be0 a1=1c0 a2=2 a3=1a items=0 ppid=1 pid=2412 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="mission-control" exe="/usr/libexec/mission-control-5" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968503.925:310): avc: denied { create } for pid=2412 comm="mission-control" name="dconf" scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:user_tmp_t:s0 tclass=dir >type=AVC msg=audit(1339968503.925:310): avc: denied { add_name } for pid=2412 comm="mission-control" name="dconf" scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:user_tmp_t:s0 tclass=dir >type=AVC msg=audit(1339968503.925:310): avc: denied { write } for pid=2412 comm="mission-control" name="christine" dev="tmpfs" ino=51951 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:user_tmp_t:s0 tclass=dir >---- >time->Sun Jun 17 15:28:23 2012 >type=SYSCALL msg=audit(1339968503.925:311): arch=c000003e syscall=2 success=yes exit=7 a0=1e48670 a1=42 a2=180 a3=7fff0ee9c6f0 items=0 ppid=1 pid=2412 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="mission-control" exe="/usr/libexec/mission-control-5" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968503.925:311): avc: denied { create } for pid=2412 comm="mission-control" name="user" scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:user_tmp_t:s0 tclass=file >type=AVC msg=audit(1339968503.925:311): avc: denied { add_name } for pid=2412 comm="mission-control" name="user" scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:user_tmp_t:s0 tclass=dir >---- >time->Sun Jun 17 15:28:24 2012 >type=SYSCALL msg=audit(1339968504.516:314): arch=c000003e syscall=87 success=yes exit=0 a0=1f492a8 a1=38 a2=1f49290 a3=1 items=0 ppid=1 pid=2228 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="plasma-desktop" exe="/usr/bin/plasma-desktop" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968504.516:314): avc: denied { unlink } for pid=2228 comm="plasma-desktop" name="plasma-desktopsc2228.slave-socket" dev="sdb5" ino=398114 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:user_tmp_t:s0 tclass=file >type=AVC msg=audit(1339968504.516:314): avc: denied { remove_name } for pid=2228 comm="plasma-desktop" name="plasma-desktopsc2228.slave-socket" dev="sdb5" ino=398114 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:user_tmp_t:s0 tclass=dir >---- >time->Sun Jun 17 15:28:24 2012 >type=SYSCALL msg=audit(1339968504.516:315): arch=c000003e syscall=49 success=yes exit=0 a0=11 a1=7ffffc194ff8 a2=3b a3=c8 items=0 ppid=1 pid=2228 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="plasma-desktop" exe="/usr/bin/plasma-desktop" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968504.516:315): avc: denied { create } for pid=2228 comm="plasma-desktop" name="plasma-desktopsc2228.slave-socket" scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:user_tmp_t:s0 tclass=sock_file >---- >time->Sun Jun 17 15:28:24 2012 >type=SYSCALL msg=audit(1339968504.519:316): arch=c000003e syscall=87 success=yes exit=0 a0=263fc98 a1=7ffffc194fa0 a2=263fc80 a3=c8 items=0 ppid=1 pid=2228 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="plasma-desktop" exe="/usr/bin/plasma-desktop" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968504.519:316): avc: denied { unlink } for pid=2228 comm="plasma-desktop" name="plasma-desktopsc2228.slave-socket" dev="sdb5" ino=398114 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:user_tmp_t:s0 tclass=sock_file >---- >time->Sun Jun 17 15:28:24 2012 >type=SYSCALL msg=audit(1339968504.659:317): arch=c000003e syscall=42 success=yes exit=0 a0=6 a1=7fffca0ba708 a2=3b a3=c8 items=0 ppid=2000 pid=2448 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="kio_http" exe="/usr/bin/kdeinit4" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968504.659:317): avc: denied { write } for pid=2448 comm="kio_http" name="plasma-desktophc2228.slave-socket" dev="sdb5" ino=398114 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:user_tmp_t:s0 tclass=sock_file >---- >time->Sun Jun 17 15:28:25 2012 >type=SYSCALL msg=audit(1339968505.814:319): arch=c000003e syscall=137 success=yes exit=0 a0=2c96e68 a1=7ffffc193f90 a2=2c96e68 a3=44 items=0 ppid=1 pid=2228 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="plasma-desktop" exe="/usr/bin/plasma-desktop" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968505.814:319): avc: denied { getattr } for pid=2228 comm="plasma-desktop" name="/" dev="0:41" ino=2 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:nfs_t:s0 tclass=filesystem >---- >time->Sun Jun 17 15:28:25 2012 >type=SYSCALL msg=audit(1339968505.650:318): arch=c000003e syscall=42 success=no exit=-115 a0=9 a1=7fffca0ba630 a2=10 a3=8 items=0 ppid=2000 pid=2448 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="kio_http" exe="/usr/bin/kdeinit4" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968505.650:318): avc: denied { name_connect } for pid=2448 comm="kio_http" dest=80 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:http_port_t:s0 tclass=tcp_socket >---- >time->Sun Jun 17 15:28:26 2012 >type=SYSCALL msg=audit(1339968506.198:320): arch=c000003e syscall=21 success=yes exit=0 a0=b00ab0 a1=4 a2=b00acd a3=1e items=0 ppid=2508 pid=2510 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="kaccess" exe="/usr/bin/kaccess" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968506.198:320): avc: denied { read } for pid=2510 comm="kaccess" name=".ICEauthority" dev="sdb2" ino=8002 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:iceauth_home_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:26 2012 >type=SYSCALL msg=audit(1339968506.198:321): arch=c000003e syscall=2 success=yes exit=9 a0=b00ab0 a1=0 a2=1b6 a3=238 items=0 ppid=2508 pid=2510 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="kaccess" exe="/usr/bin/kaccess" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968506.198:321): avc: denied { open } for pid=2510 comm="kaccess" name=".ICEauthority" dev="sdb2" ino=8002 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:iceauth_home_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:26 2012 >type=SYSCALL msg=audit(1339968506.198:322): arch=c000003e syscall=5 success=yes exit=0 a0=9 a1=7fff41792130 a2=7fff41792130 a3=238 items=0 ppid=2508 pid=2510 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="kaccess" exe="/usr/bin/kaccess" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968506.198:322): avc: denied { getattr } for pid=2510 comm="kaccess" path="/home/christine/.ICEauthority" dev="sdb2" ino=8002 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:iceauth_home_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:26 2012 >type=SYSCALL msg=audit(1339968506.472:323): arch=c000003e syscall=4 success=yes exit=0 a0=1fc4460 a1=7fffeaa4a600 a2=7fffeaa4a600 a3=c items=0 ppid=2527 pid=2528 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="sh" exe="/usr/bin/bash" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968506.472:323): avc: denied { getattr } for pid=2528 comm="sh" path="/usr/bin/bash" dev="sdb5" ino=8880 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:shell_exec_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:29 2012 >type=USER_AVC msg=audit(1339968509.736:348): pid=0 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.RealtimeKit1 member=MakeThreadHighPriority dest=org.freedesktop.RealtimeKit1 spid=2665 tpid=1470 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:system_r:rtkit_daemon_t:s0 tclass=dbus exe="/usr/bin/dbus-daemon" sauid=81 hostname=? addr=? terminal=?' >---- >time->Sun Jun 17 15:28:29 2012 >type=USER_AVC msg=audit(1339968509.749:350): pid=0 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.97 spid=1470 tpid=2665 scontext=system_u:system_r:rtkit_daemon_t:s0 tcontext=user_u:user_r:policykit_grant_t:s0 tclass=dbus exe="/usr/bin/dbus-daemon" sauid=81 hostname=? addr=? terminal=?' >---- >time->Sun Jun 17 15:28:27 2012 >type=SYSCALL msg=audit(1339968507.328:324): arch=c000003e syscall=2 success=yes exit=11 a0=14f1d78 a1=800c2 a2=180 a3=68 items=0 ppid=2543 pid=2548 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="nepomukservices" exe="/usr/bin/nepomukservicestub" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968507.328:324): avc: denied { add_name } for pid=2548 comm="nepomukservices" name="virtuoso_hX2548.ini" scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:tmp_t:s0 tclass=dir >type=AVC msg=audit(1339968507.328:324): avc: denied { write } for pid=2548 comm="nepomukservices" name="tmp" dev="sdb5" ino=150 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:tmp_t:s0 tclass=dir >---- >time->Sun Jun 17 15:28:27 2012 >type=SYSCALL msg=audit(1339968507.329:325): arch=c000003e syscall=4 success=yes exit=0 a0=14f22a8 a1=7fff041bb4f0 a2=7fff041bb4f0 a3=4a items=0 ppid=2543 pid=2548 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="nepomukservices" exe="/usr/bin/nepomukservicestub" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968507.329:325): avc: denied { getattr } for pid=2548 comm="nepomukservices" path="/tmp/virt_1111" dev="sdb5" ino=20359 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:user_tmp_t:s0 tclass=sock_file >---- >time->Sun Jun 17 15:28:27 2012 >type=SYSCALL msg=audit(1339968507.330:326): arch=c000003e syscall=4 success=yes exit=0 a0=14f23c8 a1=7fff041bb4f0 a2=7fff041bb4f0 a3=4a items=0 ppid=2543 pid=2548 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="nepomukservices" exe="/usr/bin/nepomukservicestub" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968507.330:326): avc: denied { getattr } for pid=2548 comm="nepomukservices" path="/tmp/virt_1114" dev="sdb5" ino=58968 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=staff_u:object_r:user_tmp_t:s0 tclass=sock_file >---- >time->Sun Jun 17 15:28:27 2012 >type=SYSCALL msg=audit(1339968507.331:327): arch=c000003e syscall=72 success=yes exit=0 a0=c a1=7 a2=7fff041bb440 a3=6e0069002e0038 items=0 ppid=2543 pid=2548 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="nepomukservices" exe="/usr/bin/nepomukservicestub" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968507.331:327): avc: denied { lock } for pid=2548 comm="nepomukservices" path="/tmp/virtuoso_hX2548.ini" dev="sdb5" ino=60794 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:tmp_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:27 2012 >type=SYSCALL msg=audit(1339968507.344:328): arch=c000003e syscall=2 success=yes exit=3 a0=2221af6 a1=441 a2=1b6 a3=238 items=0 ppid=2548 pid=2571 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="virtuoso-t" exe="/usr/bin/virtuoso-t" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968507.344:328): avc: denied { append } for pid=2571 comm="virtuoso-t" name="soprano-virtuoso.log" dev="sdb2" ino=1790578 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:config_home_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:28 2012 >type=SYSCALL msg=audit(1339968508.226:330): arch=c000003e syscall=257 success=yes exit=8 a0=ffffffffffffff9c a1=1db4018 a2=90800 a3=0 items=0 ppid=2000 pid=2604 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="kio_http_cache_" exe="/usr/libexec/kde4/kio_http_cache_cleaner" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968508.226:330): avc: denied { read } for pid=2604 comm="kio_http_cache_" name="http" dev="sdb5" ino=395572 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:user_tmp_t:s0 tclass=dir >---- >time->Sun Jun 17 15:28:28 2012 >type=SYSCALL msg=audit(1339968508.120:329): arch=c000003e syscall=82 success=yes exit=0 a0=2890ce8 a1=2890b78 a2=2890cd0 a3=110 items=0 ppid=2000 pid=2448 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="kio_http" exe="/usr/bin/kdeinit4" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968508.120:329): avc: denied { rename } for pid=2448 comm="kio_http" name="a20acaabb2f0005a786e30393560627183056168.kn2448" dev="sdb5" ino=395580 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:user_tmp_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:29 2012 >type=SYSCALL msg=audit(1339968509.362:332): arch=c000003e syscall=30 success=yes exit=140570052534272 a0=540079 a1=0 a2=0 a3=88 items=0 ppid=1 pid=2228 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="plasma-desktop" exe="/usr/bin/plasma-desktop" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968509.362:332): avc: denied { read write } for pid=2228 comm="plasma-desktop" key=0 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:user_r:policykit_grant_t:s0 tclass=shm >type=AVC msg=audit(1339968509.362:332): avc: denied { unix_read unix_write } for pid=2228 comm="plasma-desktop" key=0 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:user_r:policykit_grant_t:s0 tclass=shm >---- >time->Sun Jun 17 15:28:29 2012 >type=SYSCALL msg=audit(1339968509.365:333): arch=c000003e syscall=31 success=yes exit=0 a0=540079 a1=0 a2=0 a3=0 items=0 ppid=1 pid=2228 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="plasma-desktop" exe="/usr/bin/plasma-desktop" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968509.365:333): avc: denied { destroy } for pid=2228 comm="plasma-desktop" key=0 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:user_r:policykit_grant_t:s0 tclass=shm >---- >time->Sun Jun 17 15:28:29 2012 >type=SYSCALL msg=audit(1339968509.449:334): arch=c000003e syscall=42 success=yes exit=0 a0=11 a1=7fff4fe9d420 a2=6e a3=316c4228e3 items=0 ppid=2542 pid=2546 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="krunner" exe="/usr/bin/krunner" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968509.449:334): avc: denied { write } for pid=2546 comm="krunner" name="socket" dev="tmpfs" ino=52495 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:var_run_t:s0 tclass=sock_file >---- >time->Sun Jun 17 15:28:29 2012 >type=SYSCALL msg=audit(1339968509.690:335): arch=c000003e syscall=21 success=yes exit=0 a0=1a2ef88 a1=2 a2=1a2ef88 a3=6e items=0 ppid=2542 pid=2546 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="krunner" exe="/usr/bin/krunner" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968509.690:335): avc: denied { write } for pid=2546 comm="krunner" name="Documents" dev="sdb2" ino=6927 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:user_home_t:s0 tclass=dir >---- >time->Sun Jun 17 15:28:29 2012 >type=SYSCALL msg=audit(1339968509.357:331): arch=c000003e syscall=29 success=yes exit=5505145 a0=0 a1=1d970 a2=3ff a3=88 items=0 ppid=1 pid=2228 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="plasma-desktop" exe="/usr/bin/plasma-desktop" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968509.357:331): avc: denied { create } for pid=2228 comm="plasma-desktop" key=0 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:user_r:policykit_grant_t:s0 tclass=shm >---- >time->Sun Jun 17 15:28:29 2012 >type=SYSCALL msg=audit(1339968509.691:336): arch=c000003e syscall=21 success=yes exit=0 a0=1a2f2d8 a1=2 a2=1a2f2d8 a3=83 items=0 ppid=2542 pid=2546 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="krunner" exe="/usr/bin/krunner" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968509.691:336): avc: denied { write } for pid=2546 comm="krunner" name="config" dev="sdb2" ino=147604 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:config_home_t:s0 tclass=dir >---- >time->Sun Jun 17 15:28:29 2012 >type=SYSCALL msg=audit(1339968509.699:337): arch=c000003e syscall=2 success=yes exit=14 a0=1a43a50 a1=80142 a2=180 a3=3c23e4947c items=0 ppid=2633 pid=2634 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="kmix" exe="/usr/bin/kmix" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968509.699:337): avc: denied { open } for pid=2634 comm="kmix" name=".pulse-cookie" dev="sdb2" ino=8025 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:pulseaudio_home_t:s0 tclass=file >type=AVC msg=audit(1339968509.699:337): avc: denied { read write } for pid=2634 comm="kmix" name=".pulse-cookie" dev="sdb2" ino=8025 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:pulseaudio_home_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:29 2012 >type=SYSCALL msg=audit(1339968509.699:338): arch=c000003e syscall=72 success=yes exit=0 a0=e a1=7 a2=7fffcded0840 a3=3c23e4947c items=0 ppid=2633 pid=2634 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="kmix" exe="/usr/bin/kmix" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968509.699:338): avc: denied { lock } for pid=2634 comm="kmix" path="/home/christine/.pulse-cookie" dev="sdb2" ino=8025 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:pulseaudio_home_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:29 2012 >type=SYSCALL msg=audit(1339968509.701:339): arch=c000003e syscall=257 success=yes exit=13 a0=ffffffffffffff9c a1=3c23e50b76 a2=90800 a3=0 items=0 ppid=2633 pid=2634 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="kmix" exe="/usr/bin/kmix" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968509.701:339): avc: denied { read } for pid=2634 comm="kmix" name="/" dev="tmpfs" ino=9239 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >---- >time->Sun Jun 17 15:28:29 2012 >type=SYSCALL msg=audit(1339968509.701:340): arch=c000003e syscall=137 success=yes exit=0 a0=3caa005630 a1=7fffcded0530 a2=5 a3=0 items=0 ppid=2633 pid=2634 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="kmix" exe="/usr/bin/kmix" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968509.701:340): avc: denied { getattr } for pid=2634 comm="kmix" name="/" dev="tmpfs" ino=9239 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >---- >time->Sun Jun 17 15:28:29 2012 >type=SYSCALL msg=audit(1339968509.701:341): arch=c000003e syscall=2 success=yes exit=13 a0=7fffcded09d0 a1=a00c2 a2=100 a3=3c23e50af5 items=0 ppid=2633 pid=2634 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="kmix" exe="/usr/bin/kmix" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968509.701:341): avc: denied { open } for pid=2634 comm="kmix" name="pulse-shm-1339458644" dev="tmpfs" ino=54224 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:tmpfs_t:s0 tclass=file >type=AVC msg=audit(1339968509.701:341): avc: denied { create } for pid=2634 comm="kmix" name="pulse-shm-1339458644" scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:tmpfs_t:s0 tclass=file >type=AVC msg=audit(1339968509.701:341): avc: denied { add_name } for pid=2634 comm="kmix" name="pulse-shm-1339458644" scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >type=AVC msg=audit(1339968509.701:341): avc: denied { write } for pid=2634 comm="kmix" name="/" dev="tmpfs" ino=9239 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >---- >time->Sun Jun 17 15:28:29 2012 >type=SYSCALL msg=audit(1339968509.702:342): arch=c000003e syscall=2 success=yes exit=13 a0=1a85470 a1=a0100 a2=11 a3=3c23e49eb1 items=0 ppid=2633 pid=2634 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="kmix" exe="/usr/bin/kmix" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968509.702:342): avc: denied { read } for pid=2634 comm="kmix" name=".pulse" dev="sdb2" ino=8012 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:pulseaudio_home_t:s0 tclass=dir >---- >time->Sun Jun 17 15:28:29 2012 >type=SYSCALL msg=audit(1339968509.702:343): arch=c000003e syscall=93 success=yes exit=0 a0=d a1=3e9 a2=3e9 a3=3c23e49eb1 items=0 ppid=2633 pid=2634 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="kmix" exe="/usr/bin/kmix" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968509.702:343): avc: denied { setattr } for pid=2634 comm="kmix" name=".pulse" dev="sdb2" ino=8012 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:pulseaudio_home_t:s0 tclass=dir >---- >time->Sun Jun 17 15:28:29 2012 >type=SYSCALL msg=audit(1339968509.703:344): arch=c000003e syscall=89 success=yes exit=23 a0=1a854e0 a1=1a85470 a2=63 a3=64 items=0 ppid=2633 pid=2634 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="kmix" exe="/usr/bin/kmix" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968509.703:344): avc: denied { read } for pid=2634 comm="kmix" name="ce6be20d359c6b6435e92c550000000c-runtime" dev="sdb2" ino=1790535 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:pulseaudio_home_t:s0 tclass=lnk_file >---- >time->Sun Jun 17 15:28:29 2012 >type=SYSCALL msg=audit(1339968509.707:345): arch=c000003e syscall=59 success=yes exit=0 a0=1b67200 a1=7fffcded09d0 a2=18e4120 a3=14 items=0 ppid=2634 pid=2662 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="pulseaudio" exe="/usr/bin/pulseaudio" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968509.707:345): avc: denied { execute_no_trans } for pid=2662 comm="kmix" path="/usr/bin/pulseaudio" dev="sdb5" ino=49200 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:pulseaudio_exec_t:s0 tclass=file >type=AVC msg=audit(1339968509.707:345): avc: denied { read open } for pid=2662 comm="kmix" name="pulseaudio" dev="sdb5" ino=49200 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:pulseaudio_exec_t:s0 tclass=file >type=AVC msg=audit(1339968509.707:345): avc: denied { execute } for pid=2662 comm="kmix" name="pulseaudio" dev="sdb5" ino=49200 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:pulseaudio_exec_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:29 2012 >type=SYSCALL msg=audit(1339968509.714:346): arch=c000003e syscall=6 success=yes exit=0 a0=1007200 a1=7fffdc0c7840 a2=7fffdc0c7840 a3=1000 items=0 ppid=2634 pid=2662 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="pulseaudio" exe="/usr/bin/pulseaudio" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968509.714:346): avc: denied { getattr } for pid=2662 comm="pulseaudio" path="/usr/bin/pulseaudio" dev="sdb5" ino=49200 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:pulseaudio_exec_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:29 2012 >type=SYSCALL msg=audit(1339968509.730:347): arch=c000003e syscall=160 success=yes exit=0 a0=7 a1=7fff5bb1bd20 a2=411674 a3=17 items=0 ppid=2664 pid=2665 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="pulseaudio" exe="/usr/bin/pulseaudio" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968509.730:347): avc: denied { setrlimit } for pid=2665 comm="pulseaudio" scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:user_r:policykit_grant_t:s0 tclass=process >---- >time->Sun Jun 17 15:28:29 2012 >type=SYSCALL msg=audit(1339968509.748:349): arch=c000003e syscall=144 success=yes exit=0 a0=a69 a1=40000000 a2=7fff0ef43a00 a3=0 items=0 ppid=1 pid=1470 auid=4294967295 uid=172 gid=172 euid=172 suid=172 fsuid=172 egid=172 sgid=172 fsgid=172 tty=(none) ses=4294967295 comm="rtkit-daemon" exe="/usr/libexec/rtkit-daemon" subj=system_u:system_r:rtkit_daemon_t:s0 key=(null) >type=AVC msg=audit(1339968509.748:349): avc: denied { setsched } for pid=1470 comm="rtkit-daemon" scontext=system_u:system_r:rtkit_daemon_t:s0 tcontext=user_u:user_r:policykit_grant_t:s0 tclass=process >---- >time->Sun Jun 17 15:28:29 2012 >type=SYSCALL msg=audit(1339968509.775:351): arch=c000003e syscall=2 success=yes exit=9 a0=7fff5bb1b990 a1=a0000 a2=0 a3=0 items=0 ppid=2664 pid=2665 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="pulseaudio" exe="/usr/bin/pulseaudio" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968509.775:351): avc: denied { open } for pid=2665 comm="pulseaudio" name="pulse-shm-1339458644" dev="tmpfs" ino=54224 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:tmpfs_t:s0 tclass=file >type=AVC msg=audit(1339968509.775:351): avc: denied { read } for pid=2665 comm="pulseaudio" name="pulse-shm-1339458644" dev="tmpfs" ino=54224 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:tmpfs_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:29 2012 >type=SYSCALL msg=audit(1339968509.775:352): arch=c000003e syscall=5 success=yes exit=0 a0=9 a1=7fff5bb1ba30 a2=7fff5bb1ba30 a3=0 items=0 ppid=2664 pid=2665 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="pulseaudio" exe="/usr/bin/pulseaudio" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968509.775:352): avc: denied { getattr } for pid=2665 comm="pulseaudio" path="/dev/shm/pulse-shm-1339458644" dev="tmpfs" ino=54224 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:tmpfs_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:29 2012 >type=SYSCALL msg=audit(1339968509.775:353): arch=c000003e syscall=62 success=yes exit=0 a0=a4a a1=0 a2=beefcafe a3=1 items=0 ppid=2664 pid=2665 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="pulseaudio" exe="/usr/bin/pulseaudio" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968509.775:353): avc: denied { signull } for pid=2665 comm="pulseaudio" scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:user_r:policykit_grant_t:s0 tclass=process >---- >time->Sun Jun 17 15:28:29 2012 >type=SYSCALL msg=audit(1339968509.775:354): arch=c000003e syscall=2 success=yes exit=8 a0=7fff5bb1bb80 a1=a00c2 a2=100 a3=3c246736ad items=0 ppid=2664 pid=2665 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="pulseaudio" exe="/usr/bin/pulseaudio" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968509.775:354): avc: denied { write } for pid=2665 comm="pulseaudio" name="pulse-shm-1436954107" dev="tmpfs" ino=56936 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:tmpfs_t:s0 tclass=file >type=AVC msg=audit(1339968509.775:354): avc: denied { create } for pid=2665 comm="pulseaudio" name="pulse-shm-1436954107" scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:tmpfs_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:29 2012 >type=SYSCALL msg=audit(1339968509.802:355): arch=c000003e syscall=5 success=yes exit=0 a0=b a1=7fff5bb1b150 a2=7fff5bb1b150 a3=762d656369766564 items=0 ppid=2664 pid=2665 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="pulseaudio" exe="/usr/bin/pulseaudio" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968509.802:355): avc: denied { getattr } for pid=2665 comm="pulseaudio" path="/home/christine/.pulse/ce6be20d359c6b6435e92c550000000c-device-volumes.tdb" dev="sdb2" ino=1790536 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:pulseaudio_home_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:29 2012 >type=SYSCALL msg=audit(1339968509.835:356): arch=c000003e syscall=21 success=yes exit=0 a0=facc40 a1=6 a2=facc52 a3=7f99149fbd55 items=0 ppid=2664 pid=2665 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="pulseaudio" exe="/usr/bin/pulseaudio" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968509.835:356): avc: denied { read write } for pid=2665 comm="pulseaudio" name="controlC0" dev="devtmpfs" ino=9176 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:sound_device_t:s0 tclass=chr_file >---- >time->Sun Jun 17 15:28:29 2012 >type=SYSCALL msg=audit(1339968509.835:357): arch=c000003e syscall=138 success=yes exit=0 a0=10 a1=7fff5bb1b070 a2=fffffffffff4ac44 a3=8028 items=0 ppid=2664 pid=2665 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="pulseaudio" exe="/usr/bin/pulseaudio" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968509.835:357): avc: denied { getattr } for pid=2665 comm="pulseaudio" name="/" dev="proc" ino=1 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:proc_t:s0 tclass=filesystem >---- >time->Sun Jun 17 15:28:29 2012 >type=SYSCALL msg=audit(1339968509.846:358): arch=c000003e syscall=2 success=yes exit=16 a0=7fff5bb1ae90 a1=80000 a2=7fff5bb1aea2 a3=37fd0a724f items=0 ppid=2664 pid=2665 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="pulseaudio" exe="/usr/bin/pulseaudio" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968509.846:358): avc: denied { open } for pid=2665 comm="pulseaudio" name="controlC0" dev="devtmpfs" ino=9176 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:sound_device_t:s0 tclass=chr_file >---- >time->Sun Jun 17 15:28:29 2012 >type=SYSCALL msg=audit(1339968509.846:359): arch=c000003e syscall=16 success=yes exit=0 a0=10 a1=81785501 a2=7fff5bb1acf0 a3=37fd0a724f items=0 ppid=2664 pid=2665 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="pulseaudio" exe="/usr/bin/pulseaudio" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968509.846:359): avc: denied { ioctl } for pid=2665 comm="pulseaudio" path="/dev/snd/controlC0" dev="devtmpfs" ino=9176 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:sound_device_t:s0 tclass=chr_file >---- >time->Sun Jun 17 15:28:29 2012 >type=SYSCALL msg=audit(1339968509.849:360): arch=c000003e syscall=2 success=yes exit=17 a0=7fff5bb16790 a1=80000 a2=1b6 a3=238 items=0 ppid=2664 pid=2665 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="pulseaudio" exe="/usr/bin/pulseaudio" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968509.849:360): avc: denied { open } for pid=2665 comm="pulseaudio" name="+sound:card0" dev="tmpfs" ino=12333 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:udev_var_run_t:s0 tclass=file >type=AVC msg=audit(1339968509.849:360): avc: denied { read } for pid=2665 comm="pulseaudio" name="+sound:card0" dev="tmpfs" ino=12333 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:udev_var_run_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:29 2012 >type=SYSCALL msg=audit(1339968509.849:361): arch=c000003e syscall=5 success=yes exit=0 a0=11 a1=7fff5bb16610 a2=7fff5bb16610 a3=0 items=0 ppid=2664 pid=2665 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="pulseaudio" exe="/usr/bin/pulseaudio" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968509.849:361): avc: denied { getattr } for pid=2665 comm="pulseaudio" path="/run/udev/data/+sound:card0" dev="tmpfs" ino=12333 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:udev_var_run_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:29 2012 >type=SYSCALL msg=audit(1339968509.851:362): arch=c000003e syscall=4 success=yes exit=0 a0=fe92f0 a1=7fff5bb1ace0 a2=7fff5bb1ace0 a3=1a items=0 ppid=2664 pid=2665 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="pulseaudio" exe="/usr/bin/pulseaudio" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968509.851:362): avc: denied { getattr } for pid=2665 comm="pulseaudio" path="/usr/share/alsa/alsa.conf" dev="sdb5" ino=16700 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:alsa_etc_rw_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:29 2012 >type=SYSCALL msg=audit(1339968509.851:363): arch=c000003e syscall=2 success=yes exit=17 a0=fe92f0 a1=0 a2=1b6 a3=238 items=0 ppid=2664 pid=2665 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="pulseaudio" exe="/usr/bin/pulseaudio" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968509.851:363): avc: denied { open } for pid=2665 comm="pulseaudio" name="alsa.conf" dev="sdb5" ino=16700 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:alsa_etc_rw_t:s0 tclass=file >type=AVC msg=audit(1339968509.851:363): avc: denied { read } for pid=2665 comm="pulseaudio" name="alsa.conf" dev="sdb5" ino=16700 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:alsa_etc_rw_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:29 2012 >type=SYSCALL msg=audit(1339968509.962:364): arch=c000003e syscall=4 success=yes exit=0 a0=1a80958 a1=7fff4fe9cc20 a2=7fff4fe9cc20 a3=a4 items=0 ppid=2542 pid=2546 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="krunner" exe="/usr/bin/krunner" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968509.962:364): avc: denied { getattr } for pid=2546 comm="krunner" path="/home/christine/.kde/share/config/kdeglobals" dev="sdb2" ino=1812174 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:config_home_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:29 2012 >type=SYSCALL msg=audit(1339968509.963:365): arch=c000003e syscall=2 success=yes exit=22 a0=1aa8fc8 a1=80000 a2=1b6 a3=a4 items=0 ppid=2542 pid=2546 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="krunner" exe="/usr/bin/krunner" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968509.963:365): avc: denied { open } for pid=2546 comm="krunner" name="kdeglobals" dev="sdb2" ino=1812174 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:config_home_t:s0 tclass=file >type=AVC msg=audit(1339968509.963:365): avc: denied { read } for pid=2546 comm="krunner" name="kdeglobals" dev="sdb2" ino=1812174 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:config_home_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:31 2012 >type=SYSCALL msg=audit(1339968511.294:381): arch=c000003e syscall=72 success=yes exit=0 a0=1f a1=7 a2=7fd8fdba3710 a3=3c items=0 ppid=1 pid=2473 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="plasma-desktop" exe="/usr/bin/plasma-desktop" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968511.294:381): avc: denied { lock } for pid=2473 comm="plasma-desktop" path="/home/christine/.config/Trolltech.conf" dev="sdb2" ino=147592 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:config_home_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:32 2012 >type=SYSCALL msg=audit(1339968512.345:384): arch=c000003e syscall=49 success=yes exit=0 a0=8 a1=2d14c40 a2=6e a3=7fffb3e2b460 items=0 ppid=2548 pid=2571 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="virtuoso-t" exe="/usr/bin/virtuoso-t" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968512.345:384): avc: denied { create } for pid=2571 comm="virtuoso-t" name="virt_1125" scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:tmp_t:s0 tclass=sock_file >---- >time->Sun Jun 17 15:28:32 2012 >type=SYSCALL msg=audit(1339968512.346:385): arch=c000003e syscall=42 success=yes exit=0 a0=9 a1=2cc4340 a2=6e a3=4 items=0 ppid=2548 pid=2571 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="virtuoso-t" exe="/usr/bin/virtuoso-t" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968512.346:385): avc: denied { write } for pid=2571 comm="virtuoso-t" name="virt_1125" dev="sdb5" ino=60795 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:tmp_t:s0 tclass=sock_file >---- >time->Sun Jun 17 15:28:30 2012 >type=SYSCALL msg=audit(1339968510.106:367): arch=c000003e syscall=2 success=yes exit=30 a0=10222f0 a1=80142 a2=180 a3=3c23e4947c items=0 ppid=2664 pid=2665 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="pulseaudio" exe="/usr/bin/pulseaudio" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968510.106:367): avc: denied { open } for pid=2665 comm="pulseaudio" name=".esd_auth" dev="sdb2" ino=8024 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:user_home_t:s0 tclass=file >type=AVC msg=audit(1339968510.106:367): avc: denied { read write } for pid=2665 comm="pulseaudio" name=".esd_auth" dev="sdb2" ino=8024 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:user_home_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:30 2012 >type=SYSCALL msg=audit(1339968510.106:368): arch=c000003e syscall=72 success=yes exit=0 a0=1e a1=7 a2=7fff5bb1b120 a3=3c23e4947c items=0 ppid=2664 pid=2665 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="pulseaudio" exe="/usr/bin/pulseaudio" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968510.106:368): avc: denied { lock } for pid=2665 comm="pulseaudio" path="/home/christine/.esd_auth" dev="sdb2" ino=8024 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:user_home_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:30 2012 >type=SYSCALL msg=audit(1339968510.106:369): arch=c000003e syscall=93 success=yes exit=0 a0=1e a1=3e9 a2=3e9 a3=16 items=0 ppid=2664 pid=2665 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="pulseaudio" exe="/usr/bin/pulseaudio" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968510.106:369): avc: denied { setattr } for pid=2665 comm="pulseaudio" name=".esd-1001" dev="sdb5" ino=395563 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:user_tmp_t:s0 tclass=dir >---- >time->Sun Jun 17 15:28:30 2012 >type=SYSCALL msg=audit(1339968510.125:370): arch=c000003e syscall=90 success=yes exit=0 a0=10222f0 a1=1ff a2=17 a3=7fff5bb1b1cc items=0 ppid=2664 pid=2665 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="pulseaudio" exe="/usr/bin/pulseaudio" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968510.125:370): avc: denied { setattr } for pid=2665 comm="pulseaudio" name="socket" dev="sdb5" ino=415612 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:user_tmp_t:s0 tclass=sock_file >---- >time->Sun Jun 17 15:28:30 2012 >type=SYSCALL msg=audit(1339968510.157:371): arch=c000003e syscall=4 success=yes exit=0 a0=2830b18 a1=7fffca0bb0f0 a2=7fffca0bb0f0 a3=2 items=0 ppid=2000 pid=2675 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="kio_trash" exe="/usr/bin/kdeinit4" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968510.157:371): avc: denied { getattr } for pid=2675 comm="kio_trash" path="/usr/bin/kdeinit4" dev="sdb5" ino=47307 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:31 2012 >type=SYSCALL msg=audit(1339968511.700:382): arch=c000003e syscall=4 success=yes exit=0 a0=2343e00 a1=7fffb3e2a4e0 a2=7fffb3e2a4e0 a3=1610 items=0 ppid=2548 pid=2571 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="virtuoso-t" exe="/usr/bin/virtuoso-t" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968511.700:382): avc: denied { getattr } for pid=2571 comm="virtuoso-t" path="/tmp/virtuoso_hX2548.ini" dev="sdb5" ino=60794 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:tmp_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:30 2012 >type=SYSCALL msg=audit(1339968510.019:366): arch=c000003e syscall=89 success=yes exit=22 a0=196d778 a1=7fff4fe9c5b0 a2=3ff a3=aa items=0 ppid=1 pid=2546 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="krunner" exe="/usr/bin/krunner" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968510.019:366): avc: denied { read } for pid=2546 comm="krunner" name="socket-children-of-fedora" dev="sdb2" ino=1789945 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:config_home_t:s0 tclass=lnk_file >---- >time->Sun Jun 17 15:28:30 2012 >type=SYSCALL msg=audit(1339968510.158:372): arch=c000003e syscall=21 success=yes exit=0 a0=1962ff8 a1=2 a2=1962ff8 a3=a4 items=0 ppid=1 pid=2546 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="krunner" exe="/usr/bin/krunner" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968510.158:372): avc: denied { write } for pid=2546 comm="krunner" name="kioslaverc" dev="sdb2" ino=147628 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:config_home_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:30 2012 >type=SYSCALL msg=audit(1339968510.175:373): arch=c000003e syscall=257 success=yes exit=7 a0=ffffffffffffff9c a1=283a8b8 a2=90800 a3=0 items=0 ppid=2000 pid=2675 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="kio_trash" exe="/usr/bin/kdeinit4" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968510.175:373): avc: denied { read } for pid=2675 comm="kio_trash" name="Trash" dev="sdb2" ino=147703 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:data_home_t:s0 tclass=dir >---- >time->Sun Jun 17 15:28:30 2012 >type=SYSCALL msg=audit(1339968510.177:374): arch=c000003e syscall=87 success=yes exit=0 a0=7fffcded0a70 a1=7fffcded0b06 a2=0 a3=3c23e50af5 items=0 ppid=2633 pid=2634 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="kmix" exe="/usr/bin/kmix" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968510.177:374): avc: denied { unlink } for pid=2634 comm="kmix" name="pulse-shm-1339458644" dev="tmpfs" ino=54224 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:tmpfs_t:s0 tclass=file >type=AVC msg=audit(1339968510.177:374): avc: denied { remove_name } for pid=2634 comm="kmix" name="pulse-shm-1339458644" dev="tmpfs" ino=54224 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >---- >time->Sun Jun 17 15:28:30 2012 >type=SYSCALL msg=audit(1339968510.179:375): arch=c000003e syscall=2 success=yes exit=8 a0=2139c28 a1=c1 a2=1a4 a3=cb items=0 ppid=1 pid=2070 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="kglobalaccel" exe="/usr/bin/kglobalaccel" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968510.179:375): avc: denied { create } for pid=2070 comm="kglobalaccel" name="kglobalshortcutsrc.lock" scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:config_home_t:s0 tclass=file >type=AVC msg=audit(1339968510.179:375): avc: denied { add_name } for pid=2070 comm="kglobalaccel" name="kglobalshortcutsrc.lock" scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:config_home_t:s0 tclass=dir >---- >time->Sun Jun 17 15:28:30 2012 >type=SYSCALL msg=audit(1339968510.182:376): arch=c000003e syscall=93 success=yes exit=0 a0=9 a1=3e9 a2=3e9 a3=bc items=0 ppid=1 pid=2070 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="kglobalaccel" exe="/usr/bin/kglobalaccel" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968510.182:376): avc: denied { setattr } for pid=2070 comm="kglobalaccel" name="kglobalshortcutsrcCj2070.new" dev="sdb2" ino=1893328 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:config_home_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:30 2012 >type=SYSCALL msg=audit(1339968510.183:377): arch=c000003e syscall=82 success=yes exit=0 a0=20fdda8 a1=20fdcd8 a2=20fdda8 a3=da items=0 ppid=1 pid=2070 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="kglobalaccel" exe="/usr/bin/kglobalaccel" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968510.183:377): avc: denied { unlink } for pid=2070 comm="kglobalaccel" name="kglobalshortcutsrc" dev="sdb2" ino=1893322 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:config_home_t:s0 tclass=file >type=AVC msg=audit(1339968510.183:377): avc: denied { rename } for pid=2070 comm="kglobalaccel" name="kglobalshortcutsrcCj2070.new" dev="sdb2" ino=1893328 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:config_home_t:s0 tclass=file >type=AVC msg=audit(1339968510.183:377): avc: denied { remove_name } for pid=2070 comm="kglobalaccel" name="kglobalshortcutsrcCj2070.new" dev="sdb2" ino=1893328 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:config_home_t:s0 tclass=dir >---- >time->Sun Jun 17 15:28:30 2012 >type=SYSCALL msg=audit(1339968510.194:378): arch=c000003e syscall=137 success=yes exit=0 a0=1936bb8 a1=7fff4fe9c2e0 a2=1936bb8 a3=44 items=0 ppid=1 pid=2546 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="krunner" exe="/usr/bin/krunner" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968510.194:378): avc: denied { getattr } for pid=2546 comm="krunner" name="/" dev="0:41" ino=2 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:nfs_t:s0 tclass=filesystem >---- >time->Sun Jun 17 15:28:30 2012 >type=SYSCALL msg=audit(1339968510.231:379): arch=c000003e syscall=21 success=yes exit=0 a0=1aedaa8 a1=4 a2=1aedaa8 a3=80 items=0 ppid=2633 pid=2634 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="kmix" exe="/usr/bin/kmix" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968510.231:379): avc: denied { read } for pid=2634 comm="kmix" name="apps" dev="sdb2" ino=147600 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:config_home_t:s0 tclass=dir >---- >time->Sun Jun 17 15:28:31 2012 >type=SYSCALL msg=audit(1339968511.118:380): arch=c000003e syscall=59 success=yes exit=0 a0=2811618 a1=2820ce0 a2=27f39b0 a3=20 items=0 ppid=2000 pid=2721 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="nepomukservices" exe="/usr/bin/nepomukservicestub" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968511.118:380): avc: denied { execute_no_trans } for pid=2721 comm="nepomukservices" path="/usr/bin/nepomukservicestub" dev="sdb5" ino=59034 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=file >type=AVC msg=audit(1339968511.118:380): avc: denied { read open } for pid=2721 comm="nepomukservices" name="nepomukservicestub" dev="sdb5" ino=59034 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=file >type=AVC msg=audit(1339968511.118:380): avc: denied { execute } for pid=2721 comm="nepomukservices" name="nepomukservicestub" dev="sdb5" ino=59034 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:32 2012 >type=SYSCALL msg=audit(1339968512.015:383): arch=c000003e syscall=2 success=yes exit=8 a0=85ef35 a1=441 a2=1b6 a3=238 items=0 ppid=2548 pid=2571 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="virtuoso-t" exe="/usr/bin/virtuoso-t" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968512.015:383): avc: denied { append } for pid=2571 comm="virtuoso-t" name="checkpoint_in_progress" dev="sdb2" ino=1893329 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:config_home_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:37 2012 >type=USER_AVC msg=audit(1339968517.160:390): pid=0 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.PackageKit member=GetTransactionList dest=org.freedesktop.PackageKit spid=2011 tpid=1793 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:system_r:rpm_t:s0-s0:c0.c1023 tclass=dbus exe="/usr/bin/dbus-daemon" sauid=81 hostname=? addr=? terminal=?' >---- >time->Sun Jun 17 15:28:38 2012 >type=USER_AVC msg=audit(1339968518.174:419): pid=0 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 msg='avc: denied { send_msg } for msgtype=method_call interface=org.fedoraproject.SetroubleshootdIface member=check_for_new dest=org.fedoraproject.Setroubleshootd spid=2995 tpid=803 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:system_r:setroubleshootd_t:s0-s0:c0.c1023 tclass=dbus exe="/usr/bin/dbus-daemon" sauid=81 hostname=? addr=? terminal=?' >---- >time->Sun Jun 17 15:28:38 2012 >type=USER_AVC msg=audit(1339968518.424:422): pid=0 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.109 spid=803 tpid=2995 scontext=system_u:system_r:setroubleshootd_t:s0-s0:c0.c1023 tcontext=user_u:user_r:policykit_grant_t:s0 tclass=dbus exe="/usr/bin/dbus-daemon" sauid=81 hostname=? addr=? terminal=?' >---- >time->Sun Jun 17 15:28:36 2012 >type=SYSCALL msg=audit(1339968516.629:387): arch=c000003e syscall=254 success=yes exit=2 a0=e a1=d8b2d8 a2=26c0 a3=a0 items=0 ppid=2543 pid=2941 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="nepomukservices" exe="/usr/bin/nepomukservicestub" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968516.629:387): avc: denied { read } for pid=2941 comm="nepomukservices" name="sale.pic" dev="sdb2" ino=6904 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:user_home_t:s0 tclass=dir >---- >time->Sun Jun 17 15:28:36 2012 >type=SYSCALL msg=audit(1339968516.773:388): arch=c000003e syscall=254 success=yes exit=8 a0=e a1=d8b1b8 a2=27c8 a3=a0 items=0 ppid=2543 pid=2941 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="nepomukservices" exe="/usr/bin/nepomukservicestub" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968516.773:388): avc: denied { read } for pid=2941 comm="nepomukservices" name="Music" dev="sdb2" ino=7995 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:audio_home_t:s0 tclass=dir >---- >time->Sun Jun 17 15:28:36 2012 >type=SYSCALL msg=audit(1339968516.619:386): arch=c000003e syscall=254 success=yes exit=1 a0=e a1=d92e58 a2=26c0 a3=7fffab517940 items=0 ppid=2543 pid=2941 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="nepomukservices" exe="/usr/bin/nepomukservicestub" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968516.619:386): avc: denied { read } for pid=2941 comm="nepomukservices" name="christine" dev="sdb2" ino=6423 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:user_home_dir_t:s0 tclass=dir >---- >time->Sun Jun 17 15:28:37 2012 >type=SYSCALL msg=audit(1339968517.023:389): arch=c000003e syscall=254 success=yes exit=12 a0=e a1=dd4888 a2=26c0 a3=a0 items=0 ppid=2543 pid=2941 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="nepomukservices" exe="/usr/bin/nepomukservicestub" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968517.023:389): avc: denied { read } for pid=2941 comm="nepomukservices" name="" dev="0:40" ino=2 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:nfs_t:s0 tclass=dir >---- >time->Sun Jun 17 15:28:37 2012 >type=SYSCALL msg=audit(1339968517.164:391): arch=c000003e syscall=2 success=yes exit=5 a0=3cab803ee0 a1=0 a2=1b6 a3=238 items=0 ppid=2000 pid=2976 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="abrt-applet" exe="/usr/bin/abrt-applet" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968517.164:391): avc: denied { open } for pid=2976 comm="abrt-applet" name="abrt.conf" dev="sdb5" ino=20057 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:abrt_etc_t:s0 tclass=file >type=AVC msg=audit(1339968517.164:391): avc: denied { read } for pid=2976 comm="abrt-applet" name="abrt.conf" dev="sdb5" ino=20057 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:abrt_etc_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:37 2012 >type=SYSCALL msg=audit(1339968517.164:392): arch=c000003e syscall=5 success=yes exit=0 a0=5 a1=7fff47e379a0 a2=7fff47e379a0 a3=0 items=0 ppid=2000 pid=2976 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="abrt-applet" exe="/usr/bin/abrt-applet" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968517.164:392): avc: denied { getattr } for pid=2976 comm="abrt-applet" path="/etc/abrt/abrt.conf" dev="sdb5" ino=20057 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:abrt_etc_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:37 2012 >type=SYSCALL msg=audit(1339968517.172:393): arch=c000003e syscall=16 success=no exit=-25 a0=3 a1=5401 a2=7ffff364dfb0 a3=5 items=0 ppid=2000 pid=2978 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="start-pulseaudi" exe="/usr/bin/bash" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968517.172:393): avc: denied { ioctl } for pid=2978 comm="start-pulseaudi" path="/usr/bin/start-pulseaudio-kde" dev="sdb5" ino=44204 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:37 2012 >type=SYSCALL msg=audit(1339968517.175:394): arch=c000003e syscall=59 success=yes exit=0 a0=116f9e0 a1=116f4b0 a2=116fae0 a3=18 items=0 ppid=2979 pid=2981 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="pulseaudio" exe="/usr/bin/pulseaudio" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968517.175:394): avc: denied { execute_no_trans } for pid=2981 comm="start-pulseaudi" path="/usr/bin/pulseaudio" dev="sdb5" ino=49200 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:pulseaudio_exec_t:s0 tclass=file >type=AVC msg=audit(1339968517.175:394): avc: denied { read open } for pid=2981 comm="start-pulseaudi" name="pulseaudio" dev="sdb5" ino=49200 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:pulseaudio_exec_t:s0 tclass=file >type=AVC msg=audit(1339968517.175:394): avc: denied { execute } for pid=2981 comm="start-pulseaudi" name="pulseaudio" dev="sdb5" ino=49200 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:pulseaudio_exec_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:37 2012 >type=SYSCALL msg=audit(1339968517.184:395): arch=c000003e syscall=6 success=yes exit=0 a0=edc1f0 a1=7fff41e77830 a2=7fff41e77830 a3=1000 items=0 ppid=2979 pid=2981 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="pulseaudio" exe="/usr/bin/pulseaudio" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968517.184:395): avc: denied { getattr } for pid=2981 comm="pulseaudio" path="/usr/bin/pulseaudio" dev="sdb5" ino=49200 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:pulseaudio_exec_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:37 2012 >type=SYSCALL msg=audit(1339968517.201:396): arch=c000003e syscall=257 success=yes exit=7 a0=ffffffffffffff9c a1=1c85ab0 a2=90800 a3=0 items=0 ppid=2000 pid=2976 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="abrt-applet" exe="/usr/bin/abrt-applet" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968517.201:396): avc: denied { read } for pid=2976 comm="abrt-applet" name="abrt" dev="sdb5" ino=22049 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:abrt_var_cache_t:s0 tclass=dir >---- >time->Sun Jun 17 15:28:37 2012 >type=SYSCALL msg=audit(1339968517.214:397): arch=c000003e syscall=21 success=yes exit=0 a0=22dcb08 a1=1 a2=100 a3=bf items=0 ppid=2000 pid=2003 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="klauncher" exe="/usr/libexec/kde4/klauncher" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968517.214:397): avc: denied { execute } for pid=2003 comm="klauncher" name="printer-applet.py" dev="sdb5" ino=52165 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:37 2012 >type=SYSCALL msg=audit(1339968517.217:398): arch=c000003e syscall=89 success=yes exit=23 a0=7f7c2c000910 a1=7f7c2c0009a0 a2=63 a3=64 items=0 ppid=2979 pid=2987 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="autospawn" exe="/usr/bin/pulseaudio" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968517.217:398): avc: denied { read } for pid=2987 comm="autospawn" name="ce6be20d359c6b6435e92c550000000c-runtime" dev="sdb2" ino=1790535 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:pulseaudio_home_t:s0 tclass=lnk_file >---- >time->Sun Jun 17 15:28:37 2012 >type=SYSCALL msg=audit(1339968517.220:399): arch=c000003e syscall=59 success=yes exit=0 a0=27f3718 a1=27a0790 a2=27f39b0 a3=20 items=0 ppid=2000 pid=2989 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="printer-applet" exe="/usr/bin/env" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968517.220:399): avc: denied { execute_no_trans } for pid=2989 comm="printer-applet" path="/usr/share/kde4/apps/printer-applet/printer-applet.py" dev="sdb5" ino=52165 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:37 2012 >type=SYSCALL msg=audit(1339968517.278:400): arch=c000003e syscall=4 success=yes exit=0 a0=bf5c68 a1=7fffab220240 a2=7fffab220240 a3=bf5a28 items=0 ppid=2998 pid=2999 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="zeitgeist-daemo" exe="/usr/bin/zeitgeist-daemon" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968517.278:400): avc: denied { getattr } for pid=2999 comm="zeitgeist-daemo" path="/home/christine/.local/share/zeitgeist/activity.sqlite" dev="sdb2" ino=1790540 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:data_home_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:37 2012 >type=SYSCALL msg=audit(1339968517.278:401): arch=c000003e syscall=2 success=yes exit=8 a0=bf5c68 a1=42 a2=1a4 a3=18 items=0 ppid=2998 pid=2999 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="zeitgeist-daemo" exe="/usr/bin/zeitgeist-daemon" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968517.278:401): avc: denied { open } for pid=2999 comm="zeitgeist-daemo" name="activity.sqlite" dev="sdb2" ino=1790540 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:data_home_t:s0 tclass=file >type=AVC msg=audit(1339968517.278:401): avc: denied { read write } for pid=2999 comm="zeitgeist-daemo" name="activity.sqlite" dev="sdb2" ino=1790540 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:data_home_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:37 2012 >type=SYSCALL msg=audit(1339968517.279:402): arch=c000003e syscall=72 success=yes exit=0 a0=8 a1=6 a2=7fffab21fe00 a3=1 items=0 ppid=2998 pid=2999 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="zeitgeist-daemo" exe="/usr/bin/zeitgeist-daemon" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968517.279:402): avc: denied { lock } for pid=2999 comm="zeitgeist-daemo" path="/home/christine/.local/share/zeitgeist/activity.sqlite" dev="sdb2" ino=1790540 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:data_home_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:37 2012 >type=SYSCALL msg=audit(1339968517.280:403): arch=c000003e syscall=93 success=yes exit=0 a0=9 a1=3e9 a2=3e9 a3=7469657a2f657261 items=0 ppid=2998 pid=2999 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="zeitgeist-daemo" exe="/usr/bin/zeitgeist-daemon" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968517.280:403): avc: denied { setattr } for pid=2999 comm="zeitgeist-daemo" name="activity.sqlite-wal" dev="sdb2" ino=1790547 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:data_home_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:37 2012 >type=SYSCALL msg=audit(1339968517.290:404): arch=c000003e syscall=42 success=yes exit=0 a0=5 a1=7fff58d18b30 a2=17 a3=0 items=0 ppid=2985 pid=3002 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="polkit-kde-auth" exe="/usr/libexec/kde4/polkit-kde-authentication-agent-1" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968517.290:404): avc: denied { connectto } for pid=3002 comm="polkit-kde-auth" path=002F746D702F646275732D504A67433746416B5357 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:user_r:policykit_grant_t:s0 tclass=unix_stream_socket >---- >time->Sun Jun 17 15:28:37 2012 >type=SYSCALL msg=audit(1339968517.313:405): arch=c000003e syscall=21 success=yes exit=0 a0=8f07d8 a1=4 a2=8f0701 a3=2 items=0 ppid=2985 pid=3002 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="polkit-kde-auth" exe="/usr/libexec/kde4/polkit-kde-authentication-agent-1" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968517.313:405): avc: denied { read } for pid=3002 comm="polkit-kde-auth" name="libexec" dev="sdb5" ino=166 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=dir >---- >time->Sun Jun 17 15:28:37 2012 >type=SYSCALL msg=audit(1339968517.529:406): arch=c000003e syscall=4 success=yes exit=0 a0=98bd08 a1=7fff58d177b0 a2=7fff58d177b0 a3=2 items=0 ppid=2985 pid=3002 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="polkit-kde-auth" exe="/usr/libexec/kde4/polkit-kde-authentication-agent-1" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968517.529:406): avc: denied { getattr } for pid=3002 comm="polkit-kde-auth" path="/usr/share/config/kdebugrc" dev="sdb5" ino=9272 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:config_usr_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:37 2012 >type=SYSCALL msg=audit(1339968517.529:407): arch=c000003e syscall=2 success=yes exit=8 a0=98bd08 a1=80000 a2=1b6 a3=2 items=0 ppid=2985 pid=3002 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="polkit-kde-auth" exe="/usr/libexec/kde4/polkit-kde-authentication-agent-1" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968517.529:407): avc: denied { open } for pid=3002 comm="polkit-kde-auth" name="kdebugrc" dev="sdb5" ino=9272 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:config_usr_t:s0 tclass=file >type=AVC msg=audit(1339968517.529:407): avc: denied { read } for pid=3002 comm="polkit-kde-auth" name="kdebugrc" dev="sdb5" ino=9272 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:config_usr_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:37 2012 >type=SYSCALL msg=audit(1339968517.756:408): arch=c000003e syscall=4 success=yes exit=0 a0=a77100 a1=7fffc4e26860 a2=7fffc4e26860 a3=7268432f65766972 items=0 ppid=2000 pid=2984 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="zeitgeist-datah" exe="/usr/bin/zeitgeist-datahub" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968517.756:408): avc: denied { getattr } for pid=2984 comm="zeitgeist-datah" path=2F6E66732F636872697374696E652F436872697374696E6520323031322F6A6F75726E616C2E6F6473 dev="0:40" ino=1335364 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:nfs_t:s0 tclass=file >type=AVC msg=audit(1339968517.756:408): avc: denied { read } for pid=2984 comm="zeitgeist-datah" name=536861726564204472697665 dev="sdb2" ino=98579 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=staff_u:object_r:user_home_t:s0 tclass=lnk_file >---- >time->Sun Jun 17 15:28:37 2012 >type=SYSCALL msg=audit(1339968517.879:409): arch=c000003e syscall=2 success=yes exit=24 a0=3ca9577f1e a1=2 a2=0 a3=7fff9ab11c40 items=0 ppid=1 pid=2011 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="kded4" exe="/usr/bin/kded4" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968517.879:409): avc: denied { open } for pid=2011 comm="kded4" name="ptmx" dev="devtmpfs" ino=8193 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:ptmx_t:s0 tclass=chr_file >type=AVC msg=audit(1339968517.879:409): avc: denied { read write } for pid=2011 comm="kded4" name="ptmx" dev="devtmpfs" ino=8193 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:ptmx_t:s0 tclass=chr_file >---- >time->Sun Jun 17 15:28:37 2012 >type=SYSCALL msg=audit(1339968517.879:410): arch=c000003e syscall=137 success=yes exit=0 a0=3ca957712a a1=7fff9ab11e10 a2=18 a3=7fff9ab11c40 items=0 ppid=1 pid=2011 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="kded4" exe="/usr/bin/kded4" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968517.879:410): avc: denied { getattr } for pid=2011 comm="kded4" name="/" dev="devpts" ino=1 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:devpts_t:s0 tclass=filesystem >---- >time->Sun Jun 17 15:28:37 2012 >type=SYSCALL msg=audit(1339968517.879:411): arch=c000003e syscall=16 success=yes exit=0 a0=18 a1=5401 a2=7fff9ab10c80 a3=7fff9ab11c40 items=0 ppid=1 pid=2011 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="kded4" exe="/usr/bin/kded4" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968517.879:411): avc: denied { ioctl } for pid=2011 comm="kded4" path="/dev/ptmx" dev="devtmpfs" ino=8193 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:ptmx_t:s0 tclass=chr_file >---- >time->Sun Jun 17 15:28:37 2012 >type=SYSCALL msg=audit(1339968517.879:412): arch=c000003e syscall=4 success=yes exit=0 a0=7fff9ab10e70 a1=7fff9ab10de0 a2=7fff9ab10de0 a3=7fff9ab11c40 items=0 ppid=1 pid=2011 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="kded4" exe="/usr/bin/kded4" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968517.879:412): avc: denied { getattr } for pid=2011 comm="kded4" path="/dev/pts/3" dev="devpts" ino=6 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:devpts_t:s0 tclass=chr_file >---- >time->Sun Jun 17 15:28:37 2012 >type=SYSCALL msg=audit(1339968517.880:413): arch=c000003e syscall=2 success=yes exit=25 a0=7fff9ab11ee0 a1=102 a2=ff6 a3=7fff9ab11c40 items=0 ppid=1 pid=2011 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="kded4" exe="/usr/bin/kded4" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968517.880:413): avc: denied { open } for pid=2011 comm="kded4" name="3" dev="devpts" ino=6 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:devpts_t:s0 tclass=chr_file >type=AVC msg=audit(1339968517.880:413): avc: denied { read write } for pid=2011 comm="kded4" name="3" dev="devpts" ino=6 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:devpts_t:s0 tclass=chr_file >---- >time->Sun Jun 17 15:28:37 2012 >type=SYSCALL msg=audit(1339968517.928:414): arch=c000003e syscall=5 success=yes exit=0 a0=0 a1=7fffc5828330 a2=7fffc5828330 a3=4 items=0 ppid=2011 pid=3051 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=22 sgid=22 fsgid=22 tty=(none) ses=10 comm="utempter" exe="/usr/libexec/utempter/utempter" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968517.928:414): avc: denied { getattr } for pid=3051 comm="utempter" path="/dev/ptmx" dev="devtmpfs" ino=8193 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:ptmx_t:s0 tclass=chr_file >---- >time->Sun Jun 17 15:28:37 2012 >type=SYSCALL msg=audit(1339968517.939:415): arch=c000003e syscall=2 success=yes exit=3 a0=3ca9577f02 a1=80000 a2=3ca9577f02 a3=f items=0 ppid=2011 pid=3051 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=22 sgid=22 fsgid=22 tty=(none) ses=10 comm="utempter" exe="/usr/libexec/utempter/utempter" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968517.939:415): avc: denied { open } for pid=3051 comm="utempter" name="utmp" dev="tmpfs" ino=12527 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:initrc_var_run_t:s0 tclass=file >type=AVC msg=audit(1339968517.939:415): avc: denied { read } for pid=3051 comm="utempter" name="utmp" dev="tmpfs" ino=12527 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:initrc_var_run_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:37 2012 >type=SYSCALL msg=audit(1339968517.940:416): arch=c000003e syscall=2 success=yes exit=4 a0=3ca9577f02 a1=80002 a2=3ca9577f02 a3=f items=0 ppid=2011 pid=3051 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=22 sgid=22 fsgid=22 tty=(none) ses=10 comm="utempter" exe="/usr/libexec/utempter/utempter" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968517.940:416): avc: denied { write } for pid=3051 comm="utempter" name="utmp" dev="tmpfs" ino=12527 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:initrc_var_run_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:37 2012 >type=SYSCALL msg=audit(1339968517.940:417): arch=c000003e syscall=72 success=yes exit=0 a0=3 a1=7 a2=7fffc5827e40 a3=8 items=0 ppid=2011 pid=3051 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=22 sgid=22 fsgid=22 tty=(none) ses=10 comm="utempter" exe="/usr/libexec/utempter/utempter" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968517.940:417): avc: denied { lock } for pid=3051 comm="utempter" path="/run/utmp" dev="tmpfs" ino=12527 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:initrc_var_run_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:37 2012 >type=SYSCALL msg=audit(1339968517.940:418): arch=c000003e syscall=2 success=yes exit=3 a0=400c96 a1=1 a2=2 a3=8 items=0 ppid=2011 pid=3051 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=22 sgid=22 fsgid=22 tty=(none) ses=10 comm="utempter" exe="/usr/libexec/utempter/utempter" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968517.940:418): avc: denied { open } for pid=3051 comm="utempter" name="wtmp" dev="sdb5" ino=21137 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:wtmp_t:s0 tclass=file >type=AVC msg=audit(1339968517.940:418): avc: denied { write } for pid=3051 comm="utempter" name="wtmp" dev="sdb5" ino=21137 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:wtmp_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:37 2012 >type=SYSCALL msg=audit(1339968517.983:420): arch=c000003e syscall=4 success=yes exit=0 a0=a4cdb0 a1=7fffc4e26860 a2=7fffc4e26860 a3=444550504f52432f items=0 ppid=2000 pid=2984 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="zeitgeist-datah" exe="/usr/bin/zeitgeist-datahub" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968517.983:420): avc: denied { getattr } for pid=2984 comm="zeitgeist-datah" path="/home/christine/Pictures/CROPPED-tom.jpeg" dev="sdb2" ino=1711940 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:mozilla_home_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:38 2012 >type=SYSCALL msg=audit(1339968518.196:421): arch=c000003e syscall=269 success=yes exit=0 a0=ffffffffffffff9c a1=1afa460 a2=4 a3=8 items=0 ppid=2000 pid=3056 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="firefox" exe="/usr/bin/bash" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968518.196:421): avc: denied { read } for pid=3056 comm="firefox" name="firefox" dev="sdb5" ino=268096 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:mozilla_exec_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:38 2012 >type=SYSCALL msg=audit(1339968518.776:423): arch=c000003e syscall=42 success=yes exit=0 a0=28 a1=7f9f2c00ae60 a2=6e a3=4 items=0 ppid=2543 pid=3088 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="nepomukservices" exe="/usr/bin/nepomukservicestub" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968518.776:423): avc: denied { write } for pid=3088 comm="nepomukservices" name="virt_1125" dev="sdb5" ino=60795 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:tmp_t:s0 tclass=sock_file >---- >time->Sun Jun 17 15:28:39 2012 >type=SYSCALL msg=audit(1339968519.029:425): arch=c000003e syscall=5 success=yes exit=0 a0=9 a1=7fff58d18540 a2=7fff58d18540 a3=0 items=0 ppid=2985 pid=3002 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="polkit-kde-auth" exe="/usr/libexec/kde4/polkit-kde-authentication-agent-1" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968519.029:425): avc: denied { getattr } for pid=3002 comm="polkit-kde-auth" path="/proc/1/cgroup" dev="proc" ino=1440 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:39 2012 >type=SYSCALL msg=audit(1339968519.586:426): arch=c000003e syscall=4 success=yes exit=0 a0=7fb2fa905777 a1=7fff4c313900 a2=7fff4c313900 a3=0 items=0 ppid=2000 pid=2989 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="python" exe="/usr/bin/python2.7" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968519.586:426): avc: denied { getattr } for pid=2989 comm="python" path="/run/cups/cups.sock" dev="tmpfs" ino=11485 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:cupsd_var_run_t:s0 tclass=sock_file >---- >time->Sun Jun 17 15:28:39 2012 >type=SYSCALL msg=audit(1339968519.592:427): arch=c000003e syscall=42 success=yes exit=0 a0=c a1=1599068 a2=1a a3=7fff4c315254 items=0 ppid=2000 pid=2989 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="python" exe="/usr/bin/python2.7" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968519.592:427): avc: denied { connectto } for pid=2989 comm="python" path="/run/cups/cups.sock" scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:system_r:cupsd_t:s0-s0:c0.c1023 tclass=unix_stream_socket >type=AVC msg=audit(1339968519.592:427): avc: denied { write } for pid=2989 comm="python" name="cups.sock" dev="tmpfs" ino=11485 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:cupsd_var_run_t:s0 tclass=sock_file >---- >time->Sun Jun 17 15:28:39 2012 >type=SYSCALL msg=audit(1339968519.027:424): arch=c000003e syscall=2 success=yes exit=9 a0=a5ebf0 a1=80000 a2=1b6 a3=238 items=0 ppid=2985 pid=3002 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="polkit-kde-auth" exe="/usr/libexec/kde4/polkit-kde-authentication-agent-1" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968519.027:424): avc: denied { open } for pid=3002 comm="polkit-kde-auth" name="cgroup" dev="proc" ino=1440 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=file >type=AVC msg=audit(1339968519.027:424): avc: denied { read } for pid=3002 comm="polkit-kde-auth" name="cgroup" dev="proc" ino=1440 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=file >type=AVC msg=audit(1339968519.027:424): avc: denied { search } for pid=3002 comm="polkit-kde-auth" name="1" dev="proc" ino=7232 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=dir >---- >time->Sun Jun 17 15:28:39 2012 >type=SYSCALL msg=audit(1339968519.716:428): arch=c000003e syscall=269 success=yes exit=0 a0=ffffffffffffff9c a1=1a58540 a2=1 a3=8 items=0 ppid=2000 pid=3056 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="run-mozilla.sh" exe="/usr/bin/bash" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968519.716:428): avc: denied { execute } for pid=3056 comm="run-mozilla.sh" name="firefox" dev="sdb5" ino=268096 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:mozilla_exec_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:39 2012 >type=SYSCALL msg=audit(1339968519.723:429): arch=c000003e syscall=59 success=yes exit=0 a0=1a5c340 a1=1a5d040 a2=1a5e5b0 a3=8 items=0 ppid=2000 pid=3056 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="firefox" exe="/usr/lib64/firefox/firefox" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968519.723:429): avc: denied { execute_no_trans } for pid=3056 comm="run-mozilla.sh" path="/usr/lib64/firefox/firefox" dev="sdb5" ino=268096 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:mozilla_exec_t:s0 tclass=file >type=AVC msg=audit(1339968519.723:429): avc: denied { open } for pid=3056 comm="run-mozilla.sh" name="firefox" dev="sdb5" ino=268096 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:mozilla_exec_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:39 2012 >type=SYSCALL msg=audit(1339968519.089:430): arch=c000003e syscall=2 success=yes exit=16 a0=daa890 a1=0 a2=0 a3=7ffffa293170 items=0 ppid=1 pid=2220 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="knotify4" exe="/usr/bin/knotify4" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968519.089:430): avc: denied { open } for pid=2220 comm="knotify4" name="registry.x86_64.bin" dev="sdb2" ino=1812087 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:gstreamer_home_t:s0 tclass=file >type=AVC msg=audit(1339968519.089:430): avc: denied { read } for pid=2220 comm="knotify4" name="registry.x86_64.bin" dev="sdb2" ino=1812087 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:gstreamer_home_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:39 2012 >type=SYSCALL msg=audit(1339968519.767:431): arch=c000003e syscall=5 success=yes exit=0 a0=10 a1=7ffffa2932e0 a2=7ffffa2932e0 a3=7ffffa293170 items=0 ppid=1 pid=2220 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="knotify4" exe="/usr/bin/knotify4" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968519.767:431): avc: denied { getattr } for pid=2220 comm="knotify4" path="/home/christine/.gstreamer-0.10/registry.x86_64.bin" dev="sdb2" ino=1812087 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:gstreamer_home_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:39 2012 >type=SYSCALL msg=audit(1339968519.920:432): arch=c000003e syscall=9 success=yes exit=140218608627712 a0=0 a1=10000 a2=5 a3=1 items=0 ppid=1 pid=2220 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="knotify4" exe="/usr/bin/knotify4" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968519.920:432): avc: denied { execute } for pid=2220 comm="knotify4" path=2F72756E2F757365722F636872697374696E652F2E6F72632F6F7263657865632E766C6E6E5646202864656C6574656429 dev="tmpfs" ino=57919 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:user_tmp_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:40 2012 >type=SYSCALL msg=audit(1339968520.383:434): arch=c000003e syscall=21 success=yes exit=0 a0=7fff7433ff7b a1=4 a2=3 a3=ffffffffffffff87 items=0 ppid=2000 pid=2117 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="ksmserver" exe="/usr/bin/ksmserver" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968520.383:434): avc: denied { read } for pid=2117 comm="ksmserver" name=".XauthnoPOMa" dev="sdb5" ino=60793 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:initrc_tmp_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:40 2012 >type=SYSCALL msg=audit(1339968520.389:435): arch=c000003e syscall=2 success=yes exit=38 a0=7fff7433ff7b a1=0 a2=1b6 a3=238 items=0 ppid=2000 pid=2117 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="ksmserver" exe="/usr/bin/ksmserver" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968520.389:435): avc: denied { open } for pid=2117 comm="ksmserver" name=".XauthnoPOMa" dev="sdb5" ino=60793 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:initrc_tmp_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:40 2012 >type=SYSCALL msg=audit(1339968520.389:436): arch=c000003e syscall=5 success=yes exit=0 a0=26 a1=7fff7433c2a0 a2=7fff7433c2a0 a3=238 items=0 ppid=2000 pid=2117 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="ksmserver" exe="/usr/bin/ksmserver" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968520.389:436): avc: denied { getattr } for pid=2117 comm="ksmserver" path="/tmp/.XauthnoPOMa" dev="sdb5" ino=60793 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:initrc_tmp_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:40 2012 >type=SYSCALL msg=audit(1339968520.773:437): arch=c000003e syscall=2 success=yes exit=4 a0=7fd05d51b8d8 a1=0 a2=0 a3=7fffe10b6ed0 items=0 ppid=2000 pid=3067 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="thunderbird" exe="/usr/lib64/thunderbird/thunderbird" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968520.773:437): avc: denied { open } for pid=3067 comm="thunderbird" name="InstallTime20120605144135" dev="sdb2" ino=1802431 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:mozilla_home_t:s0 tclass=file >type=AVC msg=audit(1339968520.773:437): avc: denied { read } for pid=3067 comm="thunderbird" name="InstallTime20120605144135" dev="sdb2" ino=1802431 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:mozilla_home_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:40 2012 >type=SYSCALL msg=audit(1339968520.871:438): arch=c000003e syscall=2 success=yes exit=6 a0=7fd05d5a0b08 a1=241 a2=1b6 a3=7fffe10b6f40 items=0 ppid=2000 pid=3067 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="thunderbird" exe="/usr/lib64/thunderbird/thunderbird" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968520.871:438): avc: denied { write } for pid=3067 comm="thunderbird" name=".parentlock" dev="sdb2" ino=6885 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:mozilla_home_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:40 2012 >type=SYSCALL msg=audit(1339968520.871:439): arch=c000003e syscall=72 success=yes exit=0 a0=6 a1=5 a2=7fffe10b71d8 a3=7fffe10b6f40 items=0 ppid=2000 pid=3067 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="thunderbird" exe="/usr/lib64/thunderbird/thunderbird" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968520.871:439): avc: denied { lock } for pid=3067 comm="thunderbird" path="/home/christine/.thunderbird/npns2oi1.default/.parentlock" dev="sdb2" ino=6885 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:mozilla_home_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:40 2012 >type=SYSCALL msg=audit(1339968520.922:440): arch=c000003e syscall=2 success=yes exit=5 a0=7fd05d51a1a0 a1=2 a2=7fd059a38b18 a3=7fffe10b6b50 items=0 ppid=3067 pid=3157 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="thunderbird" exe="/usr/lib64/thunderbird/thunderbird" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968520.922:440): avc: denied { open } for pid=3157 comm="thunderbird" name="card0" dev="devtmpfs" ino=8281 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:dri_device_t:s0 tclass=chr_file >---- >time->Sun Jun 17 15:28:40 2012 >type=SYSCALL msg=audit(1339968520.935:441): arch=c000003e syscall=89 success=yes exit=19 a0=7fd05d59fc88 a1=7fffe10b6e38 a2=3ff a3=7fffe10b6900 items=0 ppid=2000 pid=3067 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="thunderbird" exe="/usr/lib64/thunderbird/thunderbird" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968520.935:441): avc: denied { read } for pid=3067 comm="thunderbird" name="lock" dev="sdb2" ino=1880279 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:mozilla_home_t:s0 tclass=lnk_file >---- >time->Sun Jun 17 15:28:40 2012 >type=SYSCALL msg=audit(1339968520.936:442): arch=c000003e syscall=87 success=yes exit=0 a0=7fd05d59fc88 a1=8441d743 a2=7fffe10b6e45 a3=7fffe10b6900 items=0 ppid=2000 pid=3067 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="thunderbird" exe="/usr/lib64/thunderbird/thunderbird" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968520.936:442): avc: denied { unlink } for pid=3067 comm="thunderbird" name="lock" dev="sdb2" ino=1880279 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:mozilla_home_t:s0 tclass=lnk_file >type=AVC msg=audit(1339968520.936:442): avc: denied { remove_name } for pid=3067 comm="thunderbird" name="lock" dev="sdb2" ino=1880279 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:mozilla_home_t:s0 tclass=dir >type=AVC msg=audit(1339968520.936:442): avc: denied { write } for pid=3067 comm="thunderbird" name="npns2oi1.default" dev="sdb2" ino=6690 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:mozilla_home_t:s0 tclass=dir >---- >time->Sun Jun 17 15:28:40 2012 >type=SYSCALL msg=audit(1339968520.959:443): arch=c000003e syscall=88 success=yes exit=0 a0=7fd05d5b23e0 a1=7fd05d59fc88 a2=7fffe10b6e45 a3=7fffe10b6900 items=0 ppid=2000 pid=3067 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="thunderbird" exe="/usr/lib64/thunderbird/thunderbird" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968520.959:443): avc: denied { create } for pid=3067 comm="thunderbird" name="lock" scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:mozilla_home_t:s0 tclass=lnk_file >type=AVC msg=audit(1339968520.959:443): avc: denied { add_name } for pid=3067 comm="thunderbird" name="lock" scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:mozilla_home_t:s0 tclass=dir >---- >time->Sun Jun 17 15:28:40 2012 >type=SYSCALL msg=audit(1339968520.147:433): arch=c000003e syscall=4 success=yes exit=0 a0=7f99100010a0 a1=7f9915e3faa0 a2=7f9915e3faa0 a3=1a items=0 ppid=1 pid=2674 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="alsa-sink" exe="/usr/bin/pulseaudio" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968520.147:433): avc: denied { getattr } for pid=2674 comm="alsa-sink" path="/usr/share/alsa/alsa.conf" dev="sdb5" ino=16700 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:alsa_etc_rw_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:41 2012 >type=SYSCALL msg=audit(1339968521.603:444): arch=c000003e syscall=6 success=yes exit=0 a0=7fff58c83868 a1=7fff58c826a0 a2=7fff58c826a0 a3=7fff58c82500 items=0 ppid=2000 pid=3056 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="firefox" exe="/usr/lib64/firefox/firefox" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968521.603:444): avc: denied { getattr } for pid=3056 comm="firefox" path="/usr/lib64/firefox/firefox" dev="sdb5" ino=268096 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:mozilla_exec_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:42 2012 >type=SYSCALL msg=audit(1339968522.201:446): arch=c000003e syscall=87 success=yes exit=0 a0=7f0e7b7228f8 a1=7fff58c847a0 a2=7fff58c847a0 a3=0 items=0 ppid=2000 pid=3056 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="firefox" exe="/usr/lib64/firefox/firefox" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968522.201:446): avc: denied { unlink } for pid=3056 comm="firefox" name="startupCache.8.little" dev="sdb2" ino=1880331 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:mozilla_home_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:42 2012 >type=SYSCALL msg=audit(1339968522.201:447): arch=c000003e syscall=84 success=yes exit=0 a0=7f0e7b743008 a1=0 a2=7f0e7b8d6040 a3=7fff58c84630 items=0 ppid=2000 pid=3056 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="firefox" exe="/usr/lib64/firefox/firefox" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968522.201:447): avc: denied { rmdir } for pid=3056 comm="firefox" name="startupCache" dev="sdb2" ino=1802477 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:mozilla_home_t:s0 tclass=dir >---- >time->Sun Jun 17 15:28:42 2012 >type=SYSCALL msg=audit(1339968522.766:448): arch=c000003e syscall=2 success=yes exit=21 a0=7fd04e360e28 a1=2c1 a2=1a0 a3=3cbdc2cdd1 items=0 ppid=2000 pid=3067 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="thunderbird" exe="/usr/lib64/thunderbird/thunderbird" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968522.766:448): avc: denied { create } for pid=3067 comm="thunderbird" name="prefs-1.js" scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:mozilla_home_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:42 2012 >type=SYSCALL msg=audit(1339968522.171:445): arch=c000003e syscall=257 success=yes exit=7 a0=ffffffffffffff9c a1=7f0e7b743008 a2=90800 a3=0 items=0 ppid=2000 pid=3056 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="firefox" exe="/usr/lib64/firefox/firefox" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968522.171:445): avc: denied { read } for pid=3056 comm="firefox" name="startupCache" dev="sdb2" ino=1802477 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:mozilla_home_t:s0 tclass=dir >---- >time->Sun Jun 17 15:28:42 2012 >type=SYSCALL msg=audit(1339968522.874:449): arch=c000003e syscall=82 success=yes exit=0 a0=7fd04e360e28 a1=7fffe10b4878 a2=0 a3=7fffe10b45e0 items=0 ppid=2000 pid=3067 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="thunderbird" exe="/usr/lib64/thunderbird/thunderbird" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968522.874:449): avc: denied { rename } for pid=3067 comm="thunderbird" name="prefs-1.js" dev="sdb2" ino=1893350 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:mozilla_home_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:45 2012 >type=USER_END msg=audit(1339968525.117:465): pid=0 uid=0 auid=1001 ses=10 subj=system_u:system_r:initrc_t:s0 msg='op=PAM:session_close acct="christine" exe="/usr/bin/kdm" hostname=? addr=? terminal=:1 res=success' >---- >time->Sun Jun 17 15:28:45 2012 >type=CRED_DISP msg=audit(1339968525.118:466): pid=0 uid=0 auid=1001 ses=10 subj=system_u:system_r:initrc_t:s0 msg='op=PAM:setcred acct="christine" exe="/usr/bin/kdm" hostname=? addr=? terminal=:1 res=success' >---- >time->Sun Jun 17 15:28:45 2012 >type=SYSCALL msg=audit(1339968525.046:460): arch=c000003e syscall=2 success=yes exit=3 a0=400c96 a1=1 a2=2 a3=8 items=0 ppid=2011 pid=3325 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=22 sgid=22 fsgid=22 tty=(none) ses=10 comm="utempter" exe="/usr/libexec/utempter/utempter" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968525.046:460): avc: denied { open } for pid=3325 comm="utempter" name="wtmp" dev="sdb5" ino=21137 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:wtmp_t:s0 tclass=file >type=AVC msg=audit(1339968525.046:460): avc: denied { write } for pid=3325 comm="utempter" name="wtmp" dev="sdb5" ino=21137 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:wtmp_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:45 2012 >type=SYSCALL msg=audit(1339968525.047:461): arch=c000003e syscall=87 success=yes exit=0 a0=7fff9ab14ee0 a1=7fff9ab14f76 a2=0 a3=3c23e50af5 items=0 ppid=1 pid=2011 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="kded4" exe="/usr/bin/kded4" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968525.047:461): avc: denied { remove_name } for pid=2011 comm="kded4" name="pulse-shm-2844890466" dev="tmpfs" ino=57801 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >type=AVC msg=audit(1339968525.047:461): avc: denied { write } for pid=2011 comm="kded4" name="/" dev="tmpfs" ino=9239 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >---- >time->Sun Jun 17 15:28:43 2012 >type=SYSCALL msg=audit(1339968523.399:451): arch=c000003e syscall=2 success=yes exit=14 a0=7f0e706fcb50 a1=0 a2=0 a3=7fff58c836b0 items=0 ppid=2000 pid=3056 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="firefox" exe="/usr/lib64/firefox/firefox" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968523.399:451): avc: denied { open } for pid=3056 comm="firefox" name="DejaVuSans.ttf" dev="sdb5" ino=38495 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:fonts_t:s0 tclass=file >type=AVC msg=audit(1339968523.399:451): avc: denied { read } for pid=3056 comm="firefox" name="DejaVuSans.ttf" dev="sdb5" ino=38495 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:fonts_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:45 2012 >type=SYSCALL msg=audit(1339968525.092:462): arch=c000003e syscall=42 success=yes exit=0 a0=3 a1=7fffb93dce20 a2=14 a3=7fffb93dce23 items=0 ppid=1867 pid=3333 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="xprop" exe="/usr/bin/xprop" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968525.092:462): avc: denied { connectto } for pid=3333 comm="xprop" path=002F746D702F2E5831312D756E69782F5831 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:system_r:xserver_t:s0 tclass=unix_stream_socket >---- >time->Sun Jun 17 15:28:43 2012 >type=SYSCALL msg=audit(1339968523.399:452): arch=c000003e syscall=5 success=yes exit=0 a0=e a1=7fff58c83920 a2=7fff58c83920 a3=7fff58c836b0 items=0 ppid=2000 pid=3056 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="firefox" exe="/usr/lib64/firefox/firefox" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968523.399:452): avc: denied { getattr } for pid=3056 comm="firefox" path="/usr/share/fonts/dejavu/DejaVuSans.ttf" dev="sdb5" ino=38495 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:fonts_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:44 2012 >type=SYSCALL msg=audit(1339968524.283:453): arch=c000003e syscall=4 success=yes exit=0 a0=3947e68 a1=7ffffc194250 a2=7ffffc194250 a3=c2 items=0 ppid=1 pid=2228 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="plasma-desktop" exe="/usr/bin/plasma-desktop" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968524.283:453): avc: denied { getattr } for pid=2228 comm="plasma-desktop" path="/dev/sdb5" dev="devtmpfs" ino=1176 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file >---- >time->Sun Jun 17 15:28:44 2012 >type=SYSCALL msg=audit(1339968524.789:454): arch=c000003e syscall=87 success=yes exit=0 a0=15d2702 a1=1 a2=0 a3=0 items=0 ppid=2000 pid=2117 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="ksmserver" exe="/usr/bin/ksmserver" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968524.789:454): avc: denied { unlink } for pid=2117 comm="ksmserver" name="2117" dev="sdb5" ino=263149 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:xdm_tmp_t:s0 tclass=sock_file >type=AVC msg=audit(1339968524.789:454): avc: denied { remove_name } for pid=2117 comm="ksmserver" name="2117" dev="sdb5" ino=263149 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=dir >type=AVC msg=audit(1339968524.789:454): avc: denied { write } for pid=2117 comm="ksmserver" name=".ICE-unix" dev="sdb5" ino=262443 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=dir >---- >time->Sun Jun 17 15:28:44 2012 >type=SYSCALL msg=audit(1339968524.789:455): arch=c000003e syscall=87 success=yes exit=0 a0=16c0048 a1=1 a2=16c0048 a3=81 items=0 ppid=2000 pid=2117 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="ksmserver" exe="/usr/bin/ksmserver" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968524.789:455): avc: denied { unlink } for pid=2117 comm="ksmserver" name="KSMserver__1" dev="sdb5" ino=396208 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:user_tmp_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:44 2012 >type=SYSCALL msg=audit(1339968524.936:456): arch=c000003e syscall=2 success=yes exit=5 a0=41e416 a1=0 a2=3ca97b0778 a3=0 items=0 ppid=2228 pid=2361 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="ksysguardd" exe="/usr/bin/ksysguardd" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968524.936:456): avc: denied { open } for pid=2361 comm="ksysguardd" name="dev" dev="proc" ino=4026531972 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:proc_net_t:s0 tclass=file >type=AVC msg=audit(1339968524.936:456): avc: denied { read } for pid=2361 comm="ksysguardd" name="dev" dev="proc" ino=4026531972 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:proc_net_t:s0 tclass=file >---- >time->Sun Jun 17 15:28:44 2012 >type=ANOM_ABEND msg=audit(1339968524.979:457): auid=1001 uid=1001 gid=1001 ses=10 subj=user_u:user_r:policykit_grant_t:s0 pid=2941 comm="nepomukservices" reason="memory violation" sig=11 >---- >time->Sun Jun 17 15:28:44 2012 >type=ANOM_ABEND msg=audit(1339968524.982:458): auid=1001 uid=1001 gid=1001 ses=10 subj=user_u:user_r:policykit_grant_t:s0 pid=2548 comm="nepomukservices" reason="memory violation" sig=11 >---- >time->Sun Jun 17 15:28:45 2012 >type=SYSCALL msg=audit(1339968525.045:459): arch=c000003e syscall=4 success=yes exit=0 a0=3ca97b5c80 a1=7fff527c95e0 a2=7fff527c95e0 a3=7fff527c9330 items=0 ppid=2011 pid=3325 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=22 sgid=22 fsgid=22 tty=(none) ses=10 comm="utempter" exe="/usr/libexec/utempter/utempter" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968525.045:459): avc: denied { getattr } for pid=3325 comm="utempter" path="/dev/pts/3" dev="devpts" ino=6 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:devpts_t:s0 tclass=chr_file >---- >time->Sun Jun 17 15:28:45 2012 >type=SYSCALL msg=audit(1339968525.112:463): arch=c000003e syscall=87 success=yes exit=0 a0=140d040 a1=ffffffff a2=3ca97b0728 a3=10 items=0 ppid=1 pid=1864 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="gnome-keyring-d" exe="/usr/bin/gnome-keyring-daemon" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968525.112:463): avc: denied { unlink } for pid=1864 comm="gnome-keyring-d" name="control" dev="sdb2" ino=1893288 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:cache_home_t:s0 tclass=sock_file >type=AVC msg=audit(1339968525.112:463): avc: denied { remove_name } for pid=1864 comm="gnome-keyring-d" name="control" dev="sdb2" ino=1893288 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:cache_home_t:s0 tclass=dir >type=AVC msg=audit(1339968525.112:463): avc: denied { write } for pid=1864 comm="gnome-keyring-d" name="keyring-Rh76TX" dev="sdb2" ino=1893287 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:cache_home_t:s0 tclass=dir >---- >time->Sun Jun 17 15:28:45 2012 >type=SYSCALL msg=audit(1339968525.112:464): arch=c000003e syscall=84 success=yes exit=0 a0=140ce00 a1=0 a2=3ca97b0728 a3=10 items=0 ppid=1 pid=1864 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="gnome-keyring-d" exe="/usr/bin/gnome-keyring-daemon" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968525.112:464): avc: denied { rmdir } for pid=1864 comm="gnome-keyring-d" name="keyring-Rh76TX" dev="sdb2" ino=1893287 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:cache_home_t:s0 tclass=dir >---- >time->Sun Jun 17 15:28:45 2012 >type=SYSCALL msg=audit(1339968525.121:467): arch=c000003e syscall=16 success=yes exit=0 a0=25 a1=4122 a2=fb9f20 a3=0 items=0 ppid=1 pid=2674 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="alsa-sink" exe="/usr/bin/pulseaudio" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968525.121:467): avc: denied { ioctl } for pid=2674 comm="alsa-sink" path="/dev/snd/pcmC0D0p" dev="devtmpfs" ino=9174 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:sound_device_t:s0 tclass=chr_file >---- >time->Sun Jun 17 15:28:45 2012 >type=SYSCALL msg=audit(1339968525.126:468): arch=c000003e syscall=62 success=yes exit=0 a0=767 a1=f a2=0 a3=0 items=0 ppid=1 pid=1893 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="dbus-launch" exe="/usr/bin/dbus-launch" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968525.126:468): avc: denied { signal } for pid=1893 comm="dbus-launch" scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:user_r:policykit_grant_t:s0 tclass=process >---- >time->Sun Jun 17 15:28:43 2012 >type=SYSCALL msg=audit(1339968523.178:450): arch=c000003e syscall=83 success=yes exit=0 a0=7f0e7187ff18 a1=1ff a2=1ff a3=7fff58c844f0 items=0 ppid=2000 pid=3056 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="firefox" exe="/usr/lib64/firefox/firefox" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968523.178:450): avc: denied { create } for pid=3056 comm="firefox" name="startupCache" scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:mozilla_home_t:s0 tclass=dir >---- >time->Sun Jun 17 15:28:45 2012 >type=SYSCALL msg=audit(1339968525.375:469): arch=c000003e syscall=87 success=yes exit=0 a0=2d14c42 a1=11012e0 a2=200 a3=8 items=0 ppid=2548 pid=2571 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="virtuoso-t" exe="/usr/bin/virtuoso-t" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968525.375:469): avc: denied { unlink } for pid=2571 comm="virtuoso-t" name="virt_1125" dev="sdb5" ino=60795 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:tmp_t:s0 tclass=sock_file >type=AVC msg=audit(1339968525.375:469): avc: denied { remove_name } for pid=2571 comm="virtuoso-t" name="virt_1125" dev="sdb5" ino=60795 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:tmp_t:s0 tclass=dir >---- >time->Sun Jun 17 15:28:51 2012 >type=USER_AUTH msg=audit(1339968531.628:470): pid=0 uid=0 auid=1000 ses=9 subj=staff_u:unconfined_r:unconfined_t:s0 msg='op=PAM:unix_chkpwd acct="bodhi" exe="/usr/sbin/unix_chkpwd" hostname=? addr=? terminal=? res=success' >---- >time->Sun Jun 17 15:28:53 2012 >type=SYSCALL msg=audit(1339968533.382:471): arch=c000003e syscall=87 success=yes exit=0 a0=7f4ab70d2300 a1=7f4ab70d2004 a2=7f4ab8919730 a3=0 items=0 ppid=1 pid=1928 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=99 fsgid=1001 tty=(none) ses=10 comm="ssh-agent" exe="/usr/bin/ssh-agent" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968533.382:471): avc: denied { unlink } for pid=1928 comm="ssh-agent" name="agent.1867" dev="sdb5" ino=60792 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:tmp_t:s0 tclass=sock_file >type=AVC msg=audit(1339968533.382:471): avc: denied { remove_name } for pid=1928 comm="ssh-agent" name="agent.1867" dev="sdb5" ino=60792 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:tmp_t:s0 tclass=dir >type=AVC msg=audit(1339968533.382:471): avc: denied { write } for pid=1928 comm="ssh-agent" name="ssh-HiwDkcRR1867" dev="sdb5" ino=65601 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:tmp_t:s0 tclass=dir >---- >time->Sun Jun 17 15:28:53 2012 >type=SYSCALL msg=audit(1339968533.382:472): arch=c000003e syscall=84 success=yes exit=0 a0=7f4ab70d3300 a1=7f4ab70d2004 a2=7f4ab8919730 a3=0 items=0 ppid=1 pid=1928 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=99 fsgid=1001 tty=(none) ses=10 comm="ssh-agent" exe="/usr/bin/ssh-agent" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968533.382:472): avc: denied { rmdir } for pid=1928 comm="ssh-agent" name="ssh-HiwDkcRR1867" dev="sdb5" ino=65601 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:tmp_t:s0 tclass=dir >type=AVC msg=audit(1339968533.382:472): avc: denied { remove_name } for pid=1928 comm="ssh-agent" name="ssh-HiwDkcRR1867" dev="sdb5" ino=65601 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:tmp_t:s0 tclass=dir >type=AVC msg=audit(1339968533.382:472): avc: denied { write } for pid=1928 comm="ssh-agent" name="tmp" dev="sdb5" ino=150 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:tmp_t:s0 tclass=dir >---- >time->Sun Jun 17 15:28:57 2012 >type=USER_AUTH msg=audit(1339968537.799:473): pid=0 uid=0 auid=1000 ses=9 subj=staff_u:unconfined_r:policykit_auth_t:s0 msg='op=PAM:authentication acct="bodhi" exe="/usr/libexec/polkit-1/polkit-agent-helper-1" hostname=? addr=? terminal=? res=success' >---- >time->Sun Jun 17 15:28:57 2012 >type=USER_ACCT msg=audit(1339968537.805:474): pid=0 uid=0 auid=1000 ses=9 subj=staff_u:unconfined_r:policykit_auth_t:s0 msg='op=PAM:accounting acct="bodhi" exe="/usr/libexec/polkit-1/polkit-agent-helper-1" hostname=? addr=? terminal=? res=success' >---- >time->Sun Jun 17 15:29:05 2012 >type=SYSCALL msg=audit(1339968545.159:475): arch=c000003e syscall=87 success=yes exit=0 a0=1022360 a1=2 a2=0 a3=0 items=0 ppid=1 pid=2665 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="pulseaudio" exe="/usr/bin/pulseaudio" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968545.159:475): avc: denied { unlink } for pid=2665 comm="pulseaudio" name="socket" dev="sdb5" ino=415612 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:user_tmp_t:s0 tclass=sock_file >type=AVC msg=audit(1339968545.159:475): avc: denied { remove_name } for pid=2665 comm="pulseaudio" name="socket" dev="sdb5" ino=415612 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:user_tmp_t:s0 tclass=dir >type=AVC msg=audit(1339968545.159:475): avc: denied { write } for pid=2665 comm="pulseaudio" name=".esd-1001" dev="sdb5" ino=395563 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:user_tmp_t:s0 tclass=dir >---- >time->Sun Jun 17 15:29:05 2012 >type=SYSCALL msg=audit(1339968545.168:476): arch=c000003e syscall=87 success=yes exit=0 a0=7fff5bb1bc10 a1=7fff5bb1bca6 a2=0 a3=3c246736ad items=0 ppid=1 pid=2665 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="pulseaudio" exe="/usr/bin/pulseaudio" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968545.168:476): avc: denied { unlink } for pid=2665 comm="pulseaudio" name="pulse-shm-1436954107" dev="tmpfs" ino=56936 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:tmpfs_t:s0 tclass=file >type=AVC msg=audit(1339968545.168:476): avc: denied { remove_name } for pid=2665 comm="pulseaudio" name="pulse-shm-1436954107" dev="tmpfs" ino=56936 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >type=AVC msg=audit(1339968545.168:476): avc: denied { write } for pid=2665 comm="pulseaudio" name="/" dev="tmpfs" ino=9239 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >---- >time->Sun Jun 17 15:29:05 2012 >type=SYSCALL msg=audit(1339968545.168:477): arch=c000003e syscall=2 success=yes exit=4 a0=108e330 a1=a0100 a2=11 a3=3c23e49eb1 items=0 ppid=1 pid=2665 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="pulseaudio" exe="/usr/bin/pulseaudio" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968545.168:477): avc: denied { read } for pid=2665 comm="pulseaudio" name=".pulse" dev="sdb2" ino=8012 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:pulseaudio_home_t:s0 tclass=dir >---- >time->Sun Jun 17 15:29:05 2012 >type=SYSCALL msg=audit(1339968545.168:478): arch=c000003e syscall=93 success=yes exit=0 a0=4 a1=3e9 a2=3e9 a3=3c23e49eb1 items=0 ppid=1 pid=2665 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="pulseaudio" exe="/usr/bin/pulseaudio" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968545.168:478): avc: denied { setattr } for pid=2665 comm="pulseaudio" name=".pulse" dev="sdb2" ino=8012 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:pulseaudio_home_t:s0 tclass=dir >---- >time->Sun Jun 17 15:29:05 2012 >type=SYSCALL msg=audit(1339968545.168:479): arch=c000003e syscall=2 success=yes exit=4 a0=108e330 a1=a0102 a2=180 a3=3c23e4947c items=0 ppid=1 pid=2665 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="pulseaudio" exe="/usr/bin/pulseaudio" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968545.168:479): avc: denied { open } for pid=2665 comm="pulseaudio" name="pid" dev="sdb5" ino=423826 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:user_tmp_t:s0 tclass=file >---- >time->Sun Jun 17 15:29:05 2012 >type=SYSCALL msg=audit(1339968545.169:480): arch=c000003e syscall=87 success=yes exit=0 a0=108e330 a1=0 a2=a69 a3=0 items=0 ppid=1 pid=2665 auid=1001 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=10 comm="pulseaudio" exe="/usr/bin/pulseaudio" subj=user_u:user_r:policykit_grant_t:s0 key=(null) >type=AVC msg=audit(1339968545.169:480): avc: denied { unlink } for pid=2665 comm="pulseaudio" name="pid" dev="sdb5" ino=423826 scontext=user_u:user_r:policykit_grant_t:s0 tcontext=user_u:object_r:user_tmp_t:s0 tclass=file
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 832860
: 592499