-
Notifications
You must be signed in to change notification settings - Fork 12
/
Copy pathselinux-lxd.log
43 lines (42 loc) · 3.8 KB
/
selinux-lxd.log
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
----
time->Fri Aug 20 15:32:05 2021
type=AVC msg=audit(1629473525.008:1803): avc: denied { create } for pid=1 comm="systemd" name="unix.socket" scontext=system_u:system_r:init_t:s0 tcontext=system_u:object_r:var_t:s0 tclass=sock_file permissive=1
----
time->Fri Aug 20 15:32:05 2021
type=AVC msg=audit(1629473525.008:1804): avc: denied { write } for pid=1 comm="systemd" name="unix.socket" dev="sda1" ino=530893 scontext=system_u:system_r:init_t:s0 tcontext=system_u:object_r:var_t:s0 tclass=sock_file permissive=1
----
time->Fri Aug 20 15:32:18 2021
type=AVC msg=audit(1629473538.382:99): avc: denied { unlink } for pid=1 comm="systemd" name="unix.socket" dev="sda1" ino=530893 scontext=system_u:system_r:init_t:s0 tcontext=system_u:object_r:var_t:s0 tclass=sock_file permissive=0
----
time->Fri Aug 20 15:32:19 2021
type=AVC msg=audit(1629473539.565:116): avc: denied { getattr } for pid=553 comm="snap" path="/usr/bin/systemctl" dev="sda1" ino=270918 scontext=system_u:system_r:snappy_cli_t:s0 tcontext=system_u:object_r:systemd_systemctl_exec_t:s0 tclass=file permissive=1
----
time->Fri Aug 20 15:32:19 2021
type=AVC msg=audit(1629473539.566:117): avc: denied { execute } for pid=574 comm="snap" name="systemctl" dev="sda1" ino=270918 scontext=system_u:system_r:snappy_cli_t:s0 tcontext=system_u:object_r:systemd_systemctl_exec_t:s0 tclass=file permissive=1
----
time->Fri Aug 20 15:32:19 2021
type=AVC msg=audit(1629473539.566:118): avc: denied { read open } for pid=574 comm="snap" path="/usr/bin/systemctl" dev="sda1" ino=270918 scontext=system_u:system_r:snappy_cli_t:s0 tcontext=system_u:object_r:systemd_systemctl_exec_t:s0 tclass=file permissive=1
----
time->Fri Aug 20 15:32:19 2021
type=AVC msg=audit(1629473539.566:119): avc: denied { execute_no_trans } for pid=574 comm="snap" path="/usr/bin/systemctl" dev="sda1" ino=270918 scontext=system_u:system_r:snappy_cli_t:s0 tcontext=system_u:object_r:systemd_systemctl_exec_t:s0 tclass=file permissive=1
----
time->Fri Aug 20 15:32:19 2021
type=AVC msg=audit(1629473539.567:120): avc: denied { map } for pid=574 comm="systemctl" path="/usr/bin/systemctl" dev="sda1" ino=270918 scontext=system_u:system_r:snappy_cli_t:s0 tcontext=system_u:object_r:systemd_systemctl_exec_t:s0 tclass=file permissive=1
----
time->Fri Aug 20 15:32:19 2021
type=AVC msg=audit(1629473539.657:121): avc: denied { search } for pid=574 comm="systemctl" name="1" dev="proc" ino=13793 scontext=system_u:system_r:snappy_cli_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=dir permissive=1
----
time->Fri Aug 20 15:32:19 2021
type=AVC msg=audit(1629473539.657:122): avc: denied { read } for pid=574 comm="systemctl" name="root" dev="proc" ino=13805 scontext=system_u:system_r:snappy_cli_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=lnk_file permissive=1
----
time->Fri Aug 20 15:32:19 2021
type=AVC msg=audit(1629473539.657:123): avc: denied { read } for pid=574 comm="systemctl" scontext=system_u:system_r:snappy_cli_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=file permissive=1
----
time->Fri Aug 20 15:32:19 2021
type=AVC msg=audit(1629473539.659:124): avc: denied { search } for pid=574 comm="systemctl" name="systemd" dev="tmpfs" ino=2 scontext=system_u:system_r:snappy_cli_t:s0 tcontext=system_u:object_r:init_var_run_t:s0 tclass=dir permissive=1
----
time->Fri Aug 20 15:32:19 2021
type=AVC msg=audit(1629473539.659:125): avc: denied { write } for pid=574 comm="systemctl" name="private" dev="tmpfs" ino=441 scontext=system_u:system_r:snappy_cli_t:s0 tcontext=system_u:object_r:init_var_run_t:s0 tclass=sock_file permissive=1
----
time->Fri Aug 20 15:32:19 2021
type=AVC msg=audit(1629473539.659:126): avc: denied { connectto } for pid=574 comm="systemctl" path="/run/systemd/private" scontext=system_u:system_r:snappy_cli_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=unix_stream_socket permissive=1