Apr 24 18:55:48 andrzej-VirtualBox kernel: [ 0.020090] Security Framework initialized Apr 24 18:55:48 andrzej-VirtualBox kernel: [ 0.020149] AppArmor: AppArmor initialized Apr 24 18:55:48 andrzej-VirtualBox kernel: [ 0.586711] AppArmor: AppArmor Filesystem Enabled Apr 24 18:55:48 andrzej-VirtualBox kernel: [ 0.628344] type=2000 audit(1303664135.624:1): initialized Apr 24 18:55:48 andrzej-VirtualBox kernel: [ 10.049941] type=1400 audit(1303664145.774:2): apparmor="STATUS" operation="profile_load" name="/sbin/dhclient3" pid=399 comm="apparmor_parser" Apr 24 18:55:48 andrzej-VirtualBox kernel: [ 10.050273] type=1400 audit(1303664145.774:3): apparmor="STATUS" operation="profile_load" name="/usr/lib/NetworkManager/nm-dhcp-client.action" pid=399 comm="apparmor_parser" Apr 24 18:55:48 andrzej-VirtualBox kernel: [ 10.050470] type=1400 audit(1303664145.774:4): apparmor="STATUS" operation="profile_load" name="/usr/lib/connman/scripts/dhclient-script" pid=399 comm="apparmor_parser" Apr 24 18:55:49 andrzej-VirtualBox kernel: [ 13.990994] type=1400 audit(1303664149.714:5): apparmor="STATUS" operation="profile_replace" name="/sbin/dhclient3" pid=646 comm="apparmor_parser" Apr 24 18:55:49 andrzej-VirtualBox kernel: [ 13.991374] type=1400 audit(1303664149.714:6): apparmor="STATUS" operation="profile_replace" name="/usr/lib/NetworkManager/nm-dhcp-client.action" pid=646 comm="apparmor_parser" Apr 24 18:55:49 andrzej-VirtualBox kernel: [ 13.997309] type=1400 audit(1303664149.722:7): apparmor="STATUS" operation="profile_replace" name="/usr/lib/connman/scripts/dhclient-script" pid=646 comm="apparmor_parser" Apr 24 18:55:50 andrzej-VirtualBox kernel: [ 14.451999] type=1400 audit(1303664150.174:8): apparmor="STATUS" operation="profile_load" name="/usr/bin/evince" pid=649 comm="apparmor_parser" Apr 24 18:55:50 andrzej-VirtualBox kernel: [ 14.509945] type=1400 audit(1303664150.234:9): apparmor="STATUS" operation="profile_load" name="/usr/bin/evince-previewer" pid=649 comm="apparmor_parser" Apr 24 18:55:50 andrzej-VirtualBox kernel: [ 14.530513] type=1400 audit(1303664150.254:10): apparmor="STATUS" operation="profile_load" name="/usr/bin/evince-thumbnailer" pid=649 comm="apparmor_parser" Apr 24 18:55:50 andrzej-VirtualBox kernel: [ 15.114821] type=1400 audit(1303664150.838:11): apparmor="STATUS" operation="profile_load" name="/usr/lib/cups/backend/cups-pdf" pid=690 comm="apparmor_parser" Apr 24 18:55:50 andrzej-VirtualBox kernel: [ 15.115744] type=1400 audit(1303664150.838:12): apparmor="STATUS" operation="profile_load" name="/usr/sbin/cupsd" pid=690 comm="apparmor_parser" Apr 24 18:55:51 andrzej-VirtualBox kernel: [ 15.290090] type=1400 audit(1303664151.014:13): apparmor="STATUS" operation="profile_load" name="/usr/sbin/tcpdump" pid=720 comm="apparmor_parser" Apr 24 19:54:56 andrzej-VirtualBox kernel: [ 3560.495996] SGI XFS with ACLs, security attributes, realtime, large block/inode numbers, no debug enabled Apr 24 19:55:11 andrzej-VirtualBox kernel: [ 3575.994504] type=1400 audit(1303667711.717:14): apparmor="STATUS" operation="profile_replace" name="/sbin/dhclient3" pid=21805 comm="apparmor_parser" Apr 24 19:55:11 andrzej-VirtualBox kernel: [ 3575.994746] type=1400 audit(1303667711.717:15): apparmor="STATUS" operation="profile_replace" name="/usr/lib/NetworkManager/nm-dhcp-client.action" pid=21805 comm="apparmor_parser" Apr 24 19:55:11 andrzej-VirtualBox kernel: [ 3575.995056] type=1400 audit(1303667711.717:16): apparmor="STATUS" operation="profile_replace" name="/usr/lib/connman/scripts/dhclient-script" pid=21805 comm="apparmor_parser" Apr 24 19:55:17 andrzej-VirtualBox kernel: [ 3581.903998] type=1400 audit(1303667717.625:17): apparmor="STATUS" operation="profile_replace" name="/sbin/dhclient3" pid=21898 comm="apparmor_parser" Apr 24 19:55:17 andrzej-VirtualBox kernel: [ 3581.905598] type=1400 audit(1303667717.629:18): apparmor="STATUS" operation="profile_replace" name="/usr/lib/NetworkManager/nm-dhcp-client.action" pid=21898 comm="apparmor_parser" Apr 24 19:55:17 andrzej-VirtualBox kernel: [ 3581.905845] type=1400 audit(1303667717.629:19): apparmor="STATUS" operation="profile_replace" name="/usr/lib/connman/scripts/dhclient-script" pid=21898 comm="apparmor_parser" Apr 24 19:55:24 andrzej-VirtualBox kernel: [ 3588.867667] type=1400 audit(1303667724.589:20): apparmor="STATUS" operation="profile_replace" name="/usr/bin/evince" pid=21899 comm="apparmor_parser" Apr 24 19:55:24 andrzej-VirtualBox kernel: [ 3588.953426] type=1400 audit(1303667724.677:21): apparmor="STATUS" operation="profile_replace" name="/usr/bin/evince-previewer" pid=21899 comm="apparmor_parser" Apr 24 19:55:24 andrzej-VirtualBox kernel: [ 3588.955811] type=1400 audit(1303667724.677:22): apparmor="STATUS" operation="profile_replace" name="/usr/bin/evince-thumbnailer" pid=21899 comm="apparmor_parser" Apr 24 19:55:25 andrzej-VirtualBox kernel: [ 3589.739959] type=1400 audit(1303667725.461:23): apparmor="STATUS" operation="profile_replace" name="/usr/lib/cups/backend/cups-pdf" pid=21901 comm="apparmor_parser" Apr 24 19:55:25 andrzej-VirtualBox kernel: [ 3589.741110] type=1400 audit(1303667725.465:24): apparmor="STATUS" operation="profile_replace" name="/usr/sbin/cupsd" pid=21901 comm="apparmor_parser" Apr 24 19:55:25 andrzej-VirtualBox kernel: [ 3589.878167] type=1400 audit(1303667725.601:25): apparmor="STATUS" operation="profile_replace" name="/usr/sbin/tcpdump" pid=21902 comm="apparmor_parser" Apr 24 19:55:26 andrzej-VirtualBox kernel: [ 3590.703994] type=1400 audit(1303667726.425:26): apparmor="STATUS" operation="profile_replace" name="/sbin/dhclient3" pid=21938 comm="apparmor_parser" Apr 24 19:55:26 andrzej-VirtualBox kernel: [ 3590.705195] type=1400 audit(1303667726.429:27): apparmor="STATUS" operation="profile_replace" name="/usr/lib/NetworkManager/nm-dhcp-client.action" pid=21938 comm="apparmor_parser" Apr 24 19:55:26 andrzej-VirtualBox kernel: [ 3590.705393] type=1400 audit(1303667726.429:28): apparmor="STATUS" operation="profile_replace" name="/usr/lib/connman/scripts/dhclient-script" pid=21938 comm="apparmor_parser" Apr 24 19:55:33 andrzej-VirtualBox kernel: [ 3597.559300] type=1400 audit(1303667733.281:29): apparmor="STATUS" operation="profile_replace" name="/usr/bin/evince" pid=21939 comm="apparmor_parser" Apr 24 19:55:33 andrzej-VirtualBox kernel: [ 3597.563528] type=1400 audit(1303667733.285:30): apparmor="STATUS" operation="profile_replace" name="/usr/bin/evince-previewer" pid=21939 comm="apparmor_parser" Apr 24 19:55:33 andrzej-VirtualBox kernel: [ 3597.566030] type=1400 audit(1303667733.289:31): apparmor="STATUS" operation="profile_replace" name="/usr/bin/evince-thumbnailer" pid=21939 comm="apparmor_parser" Apr 24 19:55:33 andrzej-VirtualBox kernel: [ 3598.030889] type=1400 audit(1303667733.753:32): apparmor="STATUS" operation="profile_replace" name="/usr/lib/cups/backend/cups-pdf" pid=21941 comm="apparmor_parser" Apr 24 19:55:33 andrzej-VirtualBox kernel: [ 3598.031583] type=1400 audit(1303667733.753:33): apparmor="STATUS" operation="profile_replace" name="/usr/sbin/cupsd" pid=21941 comm="apparmor_parser" Apr 24 19:55:33 andrzej-VirtualBox kernel: [ 3598.166493] type=1400 audit(1303667733.889:34): apparmor="STATUS" operation="profile_replace" name="/usr/sbin/tcpdump" pid=21942 comm="apparmor_parser" Apr 24 19:56:01 andrzej-VirtualBox kernel: [ 3626.219994] type=1400 audit(1303667761.941:35): apparmor="STATUS" operation="profile_replace" name="/usr/lib/cups/backend/cups-pdf" pid=22323 comm="apparmor_parser" Apr 24 19:56:01 andrzej-VirtualBox kernel: [ 3626.221934] type=1400 audit(1303667761.945:36): apparmor="STATUS" operation="profile_replace" name="/usr/sbin/cupsd" pid=22323 comm="apparmor_parser" Apr 24 19:56:02 andrzej-VirtualBox kernel: [ 3626.372758] type=1400 audit(1303667762.093:37): apparmor="STATUS" operation="profile_replace" name="/usr/lib/cups/backend/cups-pdf" pid=22334 comm="apparmor_parser" Apr 24 19:56:02 andrzej-VirtualBox kernel: [ 3626.373348] type=1400 audit(1303667762.097:38): apparmor="STATUS" operation="profile_replace" name="/usr/sbin/cupsd" pid=22334 comm="apparmor_parser" Apr 24 19:56:21 andrzej-VirtualBox kernel: [ 3646.190640] type=1400 audit(1303667781.913:39): apparmor="STATUS" operation="profile_replace" name="/usr/bin/evince" pid=22425 comm="apparmor_parser" Apr 24 19:56:21 andrzej-VirtualBox kernel: [ 3646.194264] type=1400 audit(1303667781.917:40): apparmor="STATUS" operation="profile_replace" name="/usr/bin/evince-previewer" pid=22425 comm="apparmor_parser" Apr 24 19:56:21 andrzej-VirtualBox kernel: [ 3646.195985] type=1400 audit(1303667781.917:41): apparmor="STATUS" operation="profile_replace" name="/usr/bin/evince-thumbnailer" pid=22425 comm="apparmor_parser" Apr 24 20:02:51 andrzej-VirtualBox kernel: [ 0.012056] Security Framework initialized Apr 24 20:02:51 andrzej-VirtualBox kernel: [ 0.012114] AppArmor: AppArmor initialized Apr 24 20:02:51 andrzej-VirtualBox kernel: [ 0.579024] AppArmor: AppArmor Filesystem Enabled Apr 24 20:02:51 andrzej-VirtualBox kernel: [ 0.619738] type=2000 audit(1303668153.616:1): initialized Apr 24 20:02:53 andrzej-VirtualBox kernel: [ 19.392351] type=1400 audit(1303668173.462:2): apparmor="STATUS" operation="profile_load" name="/sbin/dhclient3" pid=461 comm="apparmor_parser" Apr 24 20:02:53 andrzej-VirtualBox kernel: [ 19.392717] type=1400 audit(1303668173.462:3): apparmor="STATUS" operation="profile_load" name="/usr/lib/NetworkManager/nm-dhcp-client.action" pid=461 comm="apparmor_parser" Apr 24 20:02:53 andrzej-VirtualBox kernel: [ 19.393001] type=1400 audit(1303668173.462:4): apparmor="STATUS" operation="profile_load" name="/usr/lib/connman/scripts/dhclient-script" pid=461 comm="apparmor_parser" Apr 24 20:02:53 andrzej-VirtualBox kernel: [ 19.395575] type=1400 audit(1303668173.462:5): apparmor="STATUS" operation="profile_replace" name="/sbin/dhclient3" pid=486 comm="apparmor_parser" Apr 24 20:02:53 andrzej-VirtualBox kernel: [ 19.398246] type=1400 audit(1303668173.466:6): apparmor="STATUS" operation="profile_replace" name="/usr/lib/NetworkManager/nm-dhcp-client.action" pid=486 comm="apparmor_parser" Apr 24 20:02:53 andrzej-VirtualBox kernel: [ 19.398450] type=1400 audit(1303668173.466:7): apparmor="STATUS" operation="profile_replace" name="/usr/lib/connman/scripts/dhclient-script" pid=486 comm="apparmor_parser" Apr 24 20:02:55 andrzej-VirtualBox kernel: [ 21.291378] type=1400 audit(1303668175.358:8): apparmor="STATUS" operation="profile_replace" name="/sbin/dhclient3" pid=659 comm="apparmor_parser" Apr 24 20:02:55 andrzej-VirtualBox kernel: [ 21.291755] type=1400 audit(1303668175.358:9): apparmor="STATUS" operation="profile_replace" name="/usr/lib/NetworkManager/nm-dhcp-client.action" pid=659 comm="apparmor_parser" Apr 24 20:02:55 andrzej-VirtualBox kernel: [ 21.292016] type=1400 audit(1303668175.358:10): apparmor="STATUS" operation="profile_replace" name="/usr/lib/connman/scripts/dhclient-script" pid=659 comm="apparmor_parser" Apr 24 20:02:55 andrzej-VirtualBox kernel: [ 21.499908] type=1400 audit(1303668175.566:11): apparmor="STATUS" operation="profile_load" name="/usr/bin/evince" pid=661 comm="apparmor_parser" Apr 24 20:10:30 andrzej-VirtualBox kernel: [ 0.012058] Security Framework initialized Apr 24 20:10:30 andrzej-VirtualBox kernel: [ 0.012115] AppArmor: AppArmor initialized Apr 24 20:10:30 andrzej-VirtualBox kernel: [ 0.582271] AppArmor: AppArmor Filesystem Enabled Apr 24 20:10:30 andrzej-VirtualBox kernel: [ 0.623208] type=2000 audit(1303668609.620:1): initialized Apr 24 20:10:30 andrzej-VirtualBox kernel: [ 18.723999] type=1400 audit(1303668627.783:2): apparmor="STATUS" operation="profile_load" name="/sbin/dhclient3" pid=380 comm="apparmor_parser" Apr 24 20:10:30 andrzej-VirtualBox kernel: [ 18.866660] type=1400 audit(1303668627.931:3): apparmor="STATUS" operation="profile_load" name="/usr/lib/NetworkManager/nm-dhcp-client.action" pid=380 comm="apparmor_parser" Apr 24 20:10:30 andrzej-VirtualBox kernel: [ 18.866871] type=1400 audit(1303668627.931:4): apparmor="STATUS" operation="profile_load" name="/usr/lib/connman/scripts/dhclient-script" pid=380 comm="apparmor_parser" Apr 24 20:10:31 andrzej-VirtualBox kernel: [ 22.498580] type=1400 audit(1303668631.559:5): apparmor="STATUS" operation="profile_replace" name="/sbin/dhclient3" pid=649 comm="apparmor_parser" Apr 24 20:10:31 andrzej-VirtualBox kernel: [ 22.499000] type=1400 audit(1303668631.559:6): apparmor="STATUS" operation="profile_replace" name="/usr/lib/NetworkManager/nm-dhcp-client.action" pid=649 comm="apparmor_parser" Apr 24 20:10:31 andrzej-VirtualBox kernel: [ 22.499260] type=1400 audit(1303668631.559:7): apparmor="STATUS" operation="profile_replace" name="/usr/lib/connman/scripts/dhclient-script" pid=649 comm="apparmor_parser" Apr 24 20:10:31 andrzej-VirtualBox kernel: [ 22.792000] type=1400 audit(1303668631.855:8): apparmor="STATUS" operation="profile_load" name="/usr/bin/evince" pid=656 comm="apparmor_parser" Apr 24 20:10:31 andrzej-VirtualBox kernel: [ 22.823742] type=1400 audit(1303668631.887:9): apparmor="STATUS" operation="profile_load" name="/usr/bin/evince-previewer" pid=656 comm="apparmor_parser" Apr 24 20:10:31 andrzej-VirtualBox kernel: [ 22.875997] type=1400 audit(1303668631.935:10): apparmor="STATUS" operation="profile_load" name="/usr/lib/cups/backend/cups-pdf" pid=670 comm="apparmor_parser" Apr 24 20:10:31 andrzej-VirtualBox kernel: [ 22.877797] type=1400 audit(1303668631.939:11): apparmor="STATUS" operation="profile_load" name="/usr/sbin/cupsd" pid=670 comm="apparmor_parser" Apr 25 07:17:18 andrzej-VirtualBox kernel: [ 0.012070] Security Framework initialized Apr 25 07:17:18 andrzej-VirtualBox kernel: [ 0.012131] AppArmor: AppArmor initialized Apr 25 07:17:18 andrzej-VirtualBox kernel: [ 0.671471] AppArmor: AppArmor Filesystem Enabled Apr 25 07:17:18 andrzej-VirtualBox kernel: [ 0.712366] type=2000 audit(1303708601.708:1): initialized Apr 25 07:17:18 andrzej-VirtualBox kernel: [ 34.293147] type=1400 audit(1303708635.839:2): apparmor="STATUS" operation="profile_load" name="/sbin/dhclient3" pid=399 comm="apparmor_parser" Apr 25 07:17:18 andrzej-VirtualBox kernel: [ 34.293598] type=1400 audit(1303708635.839:3): apparmor="STATUS" operation="profile_load" name="/usr/lib/NetworkManager/nm-dhcp-client.action" pid=399 comm="apparmor_parser" Apr 25 07:17:18 andrzej-VirtualBox kernel: [ 34.293866] type=1400 audit(1303708635.839:4): apparmor="STATUS" operation="profile_load" name="/usr/lib/connman/scripts/dhclient-script" pid=399 comm="apparmor_parser" Apr 25 07:17:19 andrzej-VirtualBox kernel: [ 38.083999] type=1400 audit(1303708639.627:5): apparmor="STATUS" operation="profile_replace" name="/sbin/dhclient3" pid=653 comm="apparmor_parser" Apr 25 07:17:19 andrzej-VirtualBox kernel: [ 38.119838] type=1400 audit(1303708639.663:6): apparmor="STATUS" operation="profile_replace" name="/usr/lib/NetworkManager/nm-dhcp-client.action" pid=653 comm="apparmor_parser" Apr 25 07:17:19 andrzej-VirtualBox kernel: [ 38.119996] type=1400 audit(1303708639.663:7): apparmor="STATUS" operation="profile_replace" name="/usr/lib/connman/scripts/dhclient-script" pid=653 comm="apparmor_parser" Apr 25 07:17:19 andrzej-VirtualBox kernel: [ 38.382479] type=1400 audit(1303708639.927:8): apparmor="STATUS" operation="profile_load" name="/usr/bin/evince" pid=661 comm="apparmor_parser" Apr 25 07:17:19 andrzej-VirtualBox kernel: [ 38.382646] type=1400 audit(1303708639.927:9): apparmor="STATUS" operation="profile_load" name="/usr/lib/cups/backend/cups-pdf" pid=667 comm="apparmor_parser" Apr 25 07:17:19 andrzej-VirtualBox kernel: [ 38.383107] type=1400 audit(1303708639.927:10): apparmor="STATUS" operation="profile_load" name="/usr/sbin/cupsd" pid=667 comm="apparmor_parser" Apr 25 07:17:20 andrzej-VirtualBox kernel: [ 38.521595] type=1400 audit(1303708640.067:11): apparmor="STATUS" operation="profile_load" name="/usr/bin/evince-previewer" pid=661 comm="apparmor_parser" Apr 25 17:38:47 andrzej-VirtualBox kernel: [ 0.016057] Security Framework initialized Apr 25 17:38:47 andrzej-VirtualBox kernel: [ 0.016115] AppArmor: AppArmor initialized Apr 25 17:38:47 andrzej-VirtualBox kernel: [ 0.579301] AppArmor: AppArmor Filesystem Enabled Apr 25 17:38:47 andrzej-VirtualBox kernel: [ 0.620270] type=2000 audit(1303745905.616:1): initialized Apr 25 17:38:47 andrzej-VirtualBox kernel: [ 19.398212] type=1400 audit(1303745924.452:2): apparmor="STATUS" operation="profile_load" name="/sbin/dhclient3" pid=409 comm="apparmor_parser" Apr 25 17:38:47 andrzej-VirtualBox kernel: [ 19.398565] type=1400 audit(1303745924.452:3): apparmor="STATUS" operation="profile_load" name="/usr/lib/NetworkManager/nm-dhcp-client.action" pid=409 comm="apparmor_parser" Apr 25 17:38:47 andrzej-VirtualBox kernel: [ 19.399038] type=1400 audit(1303745924.452:4): apparmor="STATUS" operation="profile_load" name="/usr/lib/connman/scripts/dhclient-script" pid=409 comm="apparmor_parser" Apr 25 17:38:48 andrzej-VirtualBox kernel: [ 23.101828] type=1400 audit(1303745928.156:5): apparmor="STATUS" operation="profile_replace" name="/sbin/dhclient3" pid=659 comm="apparmor_parser" Apr 25 17:38:48 andrzej-VirtualBox kernel: [ 23.102279] type=1400 audit(1303745928.156:6): apparmor="STATUS" operation="profile_replace" name="/usr/lib/NetworkManager/nm-dhcp-client.action" pid=659 comm="apparmor_parser" Apr 25 17:38:48 andrzej-VirtualBox kernel: [ 23.102540] type=1400 audit(1303745928.156:7): apparmor="STATUS" operation="profile_replace" name="/usr/lib/connman/scripts/dhclient-script" pid=659 comm="apparmor_parser" Apr 25 17:38:48 andrzej-VirtualBox kernel: [ 23.237530] type=1400 audit(1303745928.292:8): apparmor="STATUS" operation="profile_load" name="/usr/lib/cups/backend/cups-pdf" pid=667 comm="apparmor_parser" Apr 25 17:38:48 andrzej-VirtualBox kernel: [ 23.238023] type=1400 audit(1303745928.292:9): apparmor="STATUS" operation="profile_load" name="/usr/sbin/cupsd" pid=667 comm="apparmor_parser" Apr 25 17:38:48 andrzej-VirtualBox kernel: [ 23.451999] type=1400 audit(1303745928.504:10): apparmor="STATUS" operation="profile_load" name="/usr/bin/evince" pid=669 comm="apparmor_parser" Apr 25 17:38:48 andrzej-VirtualBox kernel: [ 23.510835] type=1400 audit(1303745928.564:11): apparmor="STATUS" operation="profile_load" name="/usr/bin/evince-previewer" pid=669 comm="apparmor_parser" Apr 25 17:44:34 andrzej-VirtualBox kernel: [ 375.396784] SGI XFS with ACLs, security attributes, realtime, large block/inode numbers, no debug enabled Apr 25 17:49:25 andrzej-VirtualBox kernel: [ 0.000000] Kernel command line: BOOT_IMAGE=/boot/vmlinuz-2.6.35-28-generic root=UUID=52893ead-089a-40dd-81d7-3560d9db5475 ro quiet splash security=selinux selinux=1 Apr 25 17:49:25 andrzej-VirtualBox kernel: [ 0.016058] Security Framework initialized Apr 25 17:49:25 andrzej-VirtualBox kernel: [ 0.016068] SELinux: Initializing. Apr 25 17:49:25 andrzej-VirtualBox kernel: [ 0.016096] SELinux: Starting in permissive mode Apr 25 17:49:25 andrzej-VirtualBox kernel: [ 0.016123] AppArmor: AppArmor disabled by boot time parameter Apr 25 17:49:25 andrzej-VirtualBox kernel: [ 0.626595] type=2000 audit(1303746549.624:1): initialized Apr 25 17:49:25 andrzej-VirtualBox kernel: [ 0.668137] SELinux: Registering netfilter hooks Apr 25 17:49:25 andrzej-VirtualBox kernel: [ 5.404000] SELinux: 2048 avtab hash slots, 25782 rules. Apr 25 17:49:25 andrzej-VirtualBox kernel: [ 5.415372] SELinux: 2048 avtab hash slots, 25782 rules. Apr 25 17:49:25 andrzej-VirtualBox kernel: [ 5.415780] SELinux: 6 users, 7 roles, 1215 types, 34 bools, 1 sens, 256 cats Apr 25 17:49:25 andrzej-VirtualBox kernel: [ 5.415795] SELinux: 77 classes, 25782 rules Apr 25 17:49:25 andrzej-VirtualBox kernel: [ 5.419166] SELinux: Permission module_request in class system not defined in policy. Apr 25 17:49:25 andrzej-VirtualBox kernel: [ 5.419458] SELinux: the above unknown classes and permissions will be allowed Apr 25 17:49:25 andrzej-VirtualBox kernel: [ 5.419513] SELinux: Completing initialization. Apr 25 17:49:25 andrzej-VirtualBox kernel: [ 5.419555] SELinux: Setting up existing superblocks. Apr 25 17:49:25 andrzej-VirtualBox kernel: [ 5.419605] SELinux: initialized (dev sysfs, type sysfs), uses genfs_contexts Apr 25 17:49:25 andrzej-VirtualBox kernel: [ 5.419672] SELinux: initialized (dev rootfs, type rootfs), uses genfs_contexts Apr 25 17:49:25 andrzej-VirtualBox kernel: [ 5.419960] SELinux: initialized (dev bdev, type bdev), uses genfs_contexts Apr 25 17:49:25 andrzej-VirtualBox kernel: [ 5.420612] SELinux: initialized (dev proc, type proc), uses genfs_contexts Apr 25 17:49:25 andrzej-VirtualBox kernel: [ 5.420678] SELinux: initialized (dev tmpfs, type tmpfs), uses transition SIDs Apr 25 17:49:25 andrzej-VirtualBox kernel: [ 5.420738] SELinux: initialized (dev devtmpfs, type devtmpfs), uses transition SIDs Apr 25 17:49:25 andrzej-VirtualBox kernel: [ 5.421710] SELinux: initialized (dev sockfs, type sockfs), uses task SIDs Apr 25 17:49:25 andrzej-VirtualBox kernel: [ 5.421760] SELinux: initialized (dev debugfs, type debugfs), uses genfs_contexts Apr 25 17:49:25 andrzej-VirtualBox kernel: [ 5.423986] SELinux: initialized (dev pipefs, type pipefs), uses task SIDs Apr 25 17:49:25 andrzej-VirtualBox kernel: [ 5.424528] SELinux: initialized (dev anon_inodefs, type anon_inodefs), uses genfs_contexts Apr 25 17:49:25 andrzej-VirtualBox kernel: [ 5.424563] SELinux: initialized (dev devpts, type devpts), uses transition SIDs Apr 25 17:49:25 andrzej-VirtualBox kernel: [ 5.424635] SELinux: initialized (dev hugetlbfs, type hugetlbfs), uses genfs_contexts Apr 25 17:49:25 andrzej-VirtualBox kernel: [ 5.424672] SELinux: initialized (dev mqueue, type mqueue), uses transition SIDs Apr 25 17:49:25 andrzej-VirtualBox kernel: [ 5.424704] SELinux: initialized (dev selinuxfs, type selinuxfs), uses genfs_contexts Apr 25 17:49:25 andrzej-VirtualBox kernel: [ 5.424761] SELinux: initialized (dev sysfs, type sysfs), uses genfs_contexts Apr 25 17:49:25 andrzej-VirtualBox kernel: [ 5.425515] SELinux: initialized (dev fusectl, type fusectl), uses genfs_contexts Apr 25 17:49:25 andrzej-VirtualBox kernel: [ 5.425557] SELinux: initialized (dev sda1, type ext4), uses xattr Apr 25 17:49:25 andrzej-VirtualBox kernel: [ 5.429294] type=1403 audit(1303746555.456:2): policy loaded auid=4294967295 ses=4294967295 Apr 25 17:49:25 andrzej-VirtualBox kernel: [ 6.334405] type=1400 audit(1303746556.359:3): avc: denied { read write } for pid=253 comm="hwclock" path="/dev/null" dev=devtmpfs ino=4041 scontext=system_u:system_r:hwclock_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=chr_file Apr 25 17:49:25 andrzej-VirtualBox kernel: [ 7.199242] type=1400 audit(1303746557.221:4): avc: denied { associate } for pid=262 comm="cp" name="/" dev=devpts ino=1 scontext=system_u:object_r:lib_t:s0 tcontext=system_u:object_r:devpts_t:s0 tclass=filesystem Apr 25 17:49:25 andrzej-VirtualBox kernel: [ 7.396806] SELinux: initialized (dev securityfs, type securityfs), uses genfs_contexts Apr 25 17:49:25 andrzej-VirtualBox kernel: [ 7.412570] SELinux: initialized (dev tmpfs, type tmpfs), uses transition SIDs Apr 25 17:49:25 andrzej-VirtualBox kernel: [ 7.427438] SELinux: initialized (dev tmpfs, type tmpfs), uses transition SIDs Apr 25 17:49:25 andrzej-VirtualBox kernel: [ 7.544001] SELinux: initialized (dev tmpfs, type tmpfs), uses transition SIDs Apr 25 17:49:29 andrzej-VirtualBox kernel: [ 19.067292] type=1400 audit(1303746569.093:5): avc: denied { setattr } for pid=713 comm="cupsd" name="certs" dev=tmpfs ino=9233 scontext=system_u:system_r:cupsd_t:s0 tcontext=system_u:object_r:var_run_t:s0 tclass=dir Apr 25 17:49:30 andrzej-VirtualBox kernel: [ 20.099971] type=1400 audit(1303746570.121:6): avc: denied { search } for pid=724 comm="NetworkManager" scontext=system_u:system_r:NetworkManager_t:s0 tcontext=system_u:object_r:sysctl_net_t:s0 tclass=dir Apr 25 17:49:30 andrzej-VirtualBox kernel: [ 20.100001] type=1400 audit(1303746570.121:7): avc: denied { read } for pid=724 comm="NetworkManager" scontext=system_u:system_r:NetworkManager_t:s0 tcontext=system_u:object_r:sysctl_net_t:s0 tclass=file Apr 25 17:49:30 andrzej-VirtualBox kernel: [ 20.135514] type=1400 audit(1303746570.157:8): avc: denied { write } for pid=724 comm="NetworkManager" scontext=system_u:system_r:NetworkManager_t:s0 tcontext=system_u:object_r:sysctl_net_t:s0 tclass=file Apr 25 17:49:32 andrzej-VirtualBox kernel: [ 22.577681] type=1400 audit(1303746572.601:9): avc: denied { setfscreate } for pid=926 comm="mv" scontext=system_u:system_r:NetworkManager_t:s0 tcontext=system_u:system_r:NetworkManager_t:s0 tclass=process Apr 25 17:49:32 andrzej-VirtualBox kernel: [ 22.582186] type=1400 audit(1303746572.605:10): avc: denied { relabelfrom } for pid=926 comm="mv" name="ifstate" dev=tmpfs ino=9853 scontext=system_u:system_r:NetworkManager_t:s0 tcontext=system_u:object_r:network_var_run_t:s0 tclass=file Apr 25 17:49:32 andrzej-VirtualBox kernel: [ 22.582226] type=1400 audit(1303746572.605:11): avc: denied { relabelto } for pid=926 comm="mv" name="ifstate" dev=tmpfs ino=9853 scontext=system_u:system_r:NetworkManager_t:s0 tcontext=system_u:object_r:NetworkManager_tmp_t:s0 tclass=file Apr 25 17:49:35 andrzej-VirtualBox kernel: [ 25.405681] type=1400 audit(1303746575.429:12): avc: denied { connectto } for pid=984 comm="initctl" path=002F636F6D2F7562756E74752F75707374617274 scontext=system_u:system_r:NetworkManager_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=unix_stream_socket Apr 25 17:49:37 andrzej-VirtualBox kernel: [ 26.995871] SELinux: initialized (dev binfmt_misc, type binfmt_misc), uses genfs_contexts Apr 25 17:49:39 andrzej-VirtualBox kernel: [ 29.466790] type=1400 audit(1303746579.489:13): avc: denied { append } for pid=1125 comm="blockdev" path="/var/log/pm-powersave.log" dev=sda1 ino=136052 scontext=system_u:system_r:fsadm_t:s0 tcontext=system_u:object_r:hald_log_t:s0 tclass=file Apr 25 17:49:39 andrzej-VirtualBox kernel: [ 29.466840] type=1400 audit(1303746579.489:14): avc: denied { read } for pid=1125 comm="blockdev" path="/var/run/pm-utils/locks/pm-powersave.lock" dev=tmpfs ino=10358 scontext=system_u:system_r:fsadm_t:s0 tcontext=system_u:object_r:initrc_var_run_t:s0 tclass=file Apr 25 17:49:39 andrzej-VirtualBox kernel: [ 29.698375] type=1400 audit(1303746579.721:15): avc: denied { getattr } for pid=1143 comm="udev-acl.ck" name="rfkill" dev=devtmpfs ino=20 scontext=system_u:system_r:consolekit_t:s0 tcontext=system_u:object_r:device_t:s0 tclass=chr_file Apr 25 17:49:39 andrzej-VirtualBox kernel: [ 29.698406] type=1400 audit(1303746579.721:16): avc: denied { setattr } for pid=1143 comm="udev-acl.ck" name="rfkill" dev=devtmpfs ino=20 scontext=system_u:system_r:consolekit_t:s0 tcontext=system_u:object_r:device_t:s0 tclass=chr_file Apr 25 17:49:45 andrzej-VirtualBox kernel: [ 35.166730] type=1400 audit(1303746585.190:17): avc: denied { getattr } for pid=1205 comm="pm-is-supported" path="/dev/snapshot" dev=devtmpfs ino=4123 scontext=system_u:system_r:devicekit_power_t:s0 tcontext=system_u:object_r:apm_bios_t:s0 tclass=chr_file Apr 25 17:49:45 andrzej-VirtualBox kernel: [ 35.340000] type=1400 audit(1303746585.362:18): avc: denied { search } for pid=1204 comm="polkitd" name="root" dev=sda1 ino=1703937 scontext=system_u:system_r:policykit_t:s0 tcontext=unconfined_u:object_r:user_home_dir_t:s0 tclass=dir Apr 25 17:49:45 andrzej-VirtualBox kernel: [ 35.341880] type=1400 audit(1303746585.366:19): avc: denied { search } for pid=1204 comm="polkitd" name=".config" dev=sda1 ino=1712382 scontext=system_u:system_r:policykit_t:s0 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=dir Apr 25 17:49:45 andrzej-VirtualBox kernel: [ 35.530908] type=1400 audit(1303746585.554:20): avc: denied { search } for pid=1204 comm="polkitd" name="1198" dev=proc ino=11097 scontext=system_u:system_r:policykit_t:s0 tcontext=system_u:system_r:xdm_t:s0-s0:c0.c255 tclass=dir Apr 25 17:49:45 andrzej-VirtualBox kernel: [ 35.531048] type=1400 audit(1303746585.554:21): avc: denied { read } for pid=1204 comm="polkitd" name="status" dev=proc ino=11180 scontext=system_u:system_r:policykit_t:s0 tcontext=system_u:system_r:xdm_t:s0-s0:c0.c255 tclass=file Apr 25 17:49:45 andrzej-VirtualBox kernel: [ 35.531077] type=1400 audit(1303746585.554:22): avc: denied { open } for pid=1204 comm="polkitd" name="status" dev=proc ino=11180 scontext=system_u:system_r:policykit_t:s0 tcontext=system_u:system_r:xdm_t:s0-s0:c0.c255 tclass=file Apr 25 17:49:45 andrzej-VirtualBox kernel: [ 35.531122] type=1400 audit(1303746585.554:23): avc: denied { getattr } for pid=1204 comm="polkitd" path="/proc/1198/status" dev=proc ino=11180 scontext=system_u:system_r:policykit_t:s0 tcontext=system_u:system_r:xdm_t:s0-s0:c0.c255 tclass=file Apr 25 17:49:45 andrzej-VirtualBox kernel: [ 35.771359] type=1400 audit(1303746585.793:24): avc: denied { setsched } for pid=1200 comm="rtkit-daemon" scontext=system_u:system_r:rtkit_daemon_t:s0 tcontext=system_u:system_r:xdm_t:s0-s0:c0.c255 tclass=process Apr 25 17:49:45 andrzej-VirtualBox kernel: [ 35.808429] type=1400 audit(1303746585.833:25): avc: denied { search } for pid=1224 comm="pm-powersave" name="log" dev=sda1 ino=131080 scontext=system_u:system_r:devicekit_power_t:s0 tcontext=system_u:object_r:var_log_t:s0 tclass=dir Apr 25 17:49:45 andrzej-VirtualBox kernel: [ 35.808462] type=1400 audit(1303746585.833:26): avc: denied { getattr } for pid=1224 comm="pm-powersave" path="/var/log/pm-powersave.log" dev=sda1 ino=136052 scontext=system_u:system_r:devicekit_power_t:s0 tcontext=system_u:object_r:hald_log_t:s0 tclass=file Apr 25 17:49:57 andrzej-VirtualBox kernel: [ 47.927721] SELinux: initialized (dev ecryptfs, type ecryptfs), uses genfs_contexts Apr 25 17:49:58 andrzej-VirtualBox kernel: [ 48.544606] type=1400 audit(1303746598.568:69): avc: denied { connectto } for pid=1314 comm="ck-get-x11-serv" path=002F746D702F2E5831312D756E69782F5830 scontext=system_u:system_r:consolekit_t:s0 tcontext=system_u:system_r:xserver_t:s0-s0:c0.c255 tclass=unix_stream_socket Apr 25 17:49:58 andrzej-VirtualBox kernel: [ 48.547509] type=1400 audit(1303746598.572:70): avc: denied { search } for pid=1314 comm="ck-get-x11-serv" name="gdm" dev=tmpfs ino=9508 scontext=system_u:system_r:consolekit_t:s0 tcontext=system_u:object_r:xdm_var_run_t:s0 tclass=dir Apr 25 17:49:59 andrzej-VirtualBox kernel: [ 49.511748] type=1401 audit(1303746599.536:71): security_compute_sid: invalid context unconfined_u:unconfined_r:xserver_t:s0-s0:c0.c255 for scontext=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c255 tcontext=system_u:object_r:xserver_exec_t:s0 tclass=process Apr 25 17:50:01 andrzej-VirtualBox kernel: [ 51.809352] SELinux: initialized (dev fuse, type fuse), uses genfs_contexts Apr 25 17:50:02 andrzej-VirtualBox kernel: [ 52.402375] type=1400 audit(1303746602.426:72): avc: denied { getsched } for pid=1200 comm="rtkit-daemon" scontext=system_u:system_r:rtkit_daemon_t:s0 tcontext=system_u:system_r:xdm_t:s0-s0:c0.c255 tclass=process Apr 25 17:50:02 andrzej-VirtualBox kernel: [ 52.535231] type=1400 audit(1303746602.558:73): avc: denied { setsched } for pid=1200 comm="rtkit-daemon" scontext=system_u:system_r:rtkit_daemon_t:s0 tcontext=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c255 tclass=process Apr 25 17:50:03 andrzej-VirtualBox kernel: [ 53.145824] type=1400 audit(1303746603.170:74): avc: denied { getsched } for pid=1200 comm="rtkit-daemon" scontext=system_u:system_r:rtkit_daemon_t:s0 tcontext=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c255 tclass=process Apr 25 17:50:05 andrzej-VirtualBox kernel: [ 55.138946] type=1401 audit(1303746605.163:75): security_compute_sid: invalid context unconfined_u:unconfined_r:xserver_t:s0-s0:c0.c255 for scontext=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c255 tcontext=system_u:object_r:xserver_exec_t:s0 tclass=process Apr 25 17:50:06 andrzej-VirtualBox kernel: [ 56.452566] type=1400 audit(1303746606.480:76): avc: denied { rmdir } for pid=1484 comm="udisks-daemon" name="VBOXADDITIONS_4.0.6_71344" dev=sda1 ino=526216 scontext=system_u:system_r:devicekit_disk_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=dir Apr 25 17:50:16 andrzej-VirtualBox kernel: [ 66.258528] SELinux: initialized (dev sr0, type iso9660), uses genfs_contexts Apr 25 18:17:01 andrzej-VirtualBox kernel: [ 1671.516001] type=1400 audit(1303748221.539:77): avc: denied { open } for pid=1987 comm="cron" name="shadow" dev=sda1 ino=1054283 scontext=system_u:system_r:crond_t:s0 tcontext=system_u:object_r:shadow_t:s0 tclass=file Apr 25 18:17:01 andrzej-VirtualBox kernel: [ 1671.521777] type=1400 audit(1303748221.547:78): avc: denied { transition } for pid=1988 comm="cron" path="/bin/dash" dev=sda1 ino=262172 scontext=system_u:system_r:crond_t:s0 tcontext=system_u:system_r:initrc_t:s0-s0:c0.c255 tclass=process Apr 25 18:18:58 andrzej-VirtualBox kernel: [ 1788.077799] type=1400 audit(1303748338.101:79): avc: denied { connectto } for pid=2000 comm="shutdown" path=002F636F6D2F7562756E74752F75707374617274 scontext=system_u:system_r:consolekit_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=unix_stream_socket Apr 25 18:18:58 andrzej-VirtualBox kernel: [ 1788.091123] type=1400 audit(1303748338.113:80): avc: denied { write } for pid=2000 comm="shutdown" name="wtmp" dev=sda1 ino=138143 scontext=system_u:system_r:consolekit_t:s0 tcontext=system_u:object_r:wtmp_t:s0 tclass=file Apr 25 18:18:58 andrzej-VirtualBox kernel: [ 1788.091149] type=1400 audit(1303748338.113:81): avc: denied { open } for pid=2000 comm="shutdown" name="wtmp" dev=sda1 ino=138143 scontext=system_u:system_r:consolekit_t:s0 tcontext=system_u:object_r:wtmp_t:s0 tclass=file Apr 25 18:18:58 andrzej-VirtualBox kernel: [ 1788.091203] type=1400 audit(1303748338.113:82): avc: denied { lock } for pid=2000 comm="shutdown" path="/var/log/wtmp" dev=sda1 ino=138143 scontext=system_u:system_r:consolekit_t:s0 tcontext=system_u:object_r:wtmp_t:s0 tclass=file Apr 25 18:19:36 andrzej-VirtualBox kernel: [ 0.000000] Kernel command line: BOOT_IMAGE=/boot/vmlinuz-2.6.35-28-generic root=UUID=52893ead-089a-40dd-81d7-3560d9db5475 ro quiet splash security=selinux selinux=1 Apr 25 18:19:36 andrzej-VirtualBox kernel: [ 0.020089] Security Framework initialized Apr 25 18:19:36 andrzej-VirtualBox kernel: [ 0.020109] SELinux: Initializing. Apr 25 18:19:36 andrzej-VirtualBox kernel: [ 0.020137] SELinux: Starting in permissive mode Apr 25 18:19:36 andrzej-VirtualBox kernel: [ 0.020165] AppArmor: AppArmor disabled by boot time parameter Apr 25 18:19:36 andrzej-VirtualBox kernel: [ 0.613963] type=2000 audit(1303748353.608:1): initialized Apr 25 18:19:36 andrzej-VirtualBox kernel: [ 0.650657] SELinux: Registering netfilter hooks Apr 25 18:19:36 andrzej-VirtualBox kernel: [ 5.223908] SELinux: 2048 avtab hash slots, 25782 rules. Apr 25 18:19:36 andrzej-VirtualBox kernel: [ 5.231962] SELinux: 2048 avtab hash slots, 25782 rules. Apr 25 18:19:36 andrzej-VirtualBox kernel: [ 5.234172] SELinux: 6 users, 7 roles, 1215 types, 34 bools, 1 sens, 256 cats Apr 25 18:19:36 andrzej-VirtualBox kernel: [ 5.234233] SELinux: 77 classes, 25782 rules Apr 25 18:19:36 andrzej-VirtualBox kernel: [ 5.239384] SELinux: Permission module_request in class system not defined in policy. Apr 25 18:19:36 andrzej-VirtualBox kernel: [ 5.239659] SELinux: the above unknown classes and permissions will be allowed Apr 25 18:19:36 andrzej-VirtualBox kernel: [ 5.239676] SELinux: Completing initialization. Apr 25 18:19:36 andrzej-VirtualBox kernel: [ 5.239681] SELinux: Setting up existing superblocks. Apr 25 18:19:36 andrzej-VirtualBox kernel: [ 5.239718] SELinux: initialized (dev sysfs, type sysfs), uses genfs_contexts Apr 25 18:19:36 andrzej-VirtualBox kernel: [ 5.239748] SELinux: initialized (dev rootfs, type rootfs), uses genfs_contexts Apr 25 18:19:36 andrzej-VirtualBox kernel: [ 5.240268] SELinux: initialized (dev bdev, type bdev), uses genfs_contexts Apr 25 18:19:36 andrzej-VirtualBox kernel: [ 5.240311] SELinux: initialized (dev proc, type proc), uses genfs_contexts Apr 25 18:19:36 andrzej-VirtualBox kernel: [ 5.240394] SELinux: initialized (dev tmpfs, type tmpfs), uses transition SIDs Apr 25 18:19:36 andrzej-VirtualBox kernel: [ 5.240429] SELinux: initialized (dev devtmpfs, type devtmpfs), uses transition SIDs Apr 25 18:19:36 andrzej-VirtualBox kernel: [ 5.241276] SELinux: initialized (dev sockfs, type sockfs), uses task SIDs Apr 25 18:19:36 andrzej-VirtualBox kernel: [ 5.241328] SELinux: initialized (dev debugfs, type debugfs), uses genfs_contexts Apr 25 18:19:36 andrzej-VirtualBox kernel: [ 5.243998] SELinux: initialized (dev pipefs, type pipefs), uses task SIDs Apr 25 18:19:36 andrzej-VirtualBox kernel: [ 5.244637] SELinux: initialized (dev anon_inodefs, type anon_inodefs), uses genfs_contexts Apr 25 18:19:36 andrzej-VirtualBox kernel: [ 5.244665] SELinux: initialized (dev devpts, type devpts), uses transition SIDs Apr 25 18:19:36 andrzej-VirtualBox kernel: [ 5.244731] SELinux: initialized (dev hugetlbfs, type hugetlbfs), uses genfs_contexts Apr 25 18:19:36 andrzej-VirtualBox kernel: [ 5.244761] SELinux: initialized (dev mqueue, type mqueue), uses transition SIDs Apr 25 18:19:36 andrzej-VirtualBox kernel: [ 5.244787] SELinux: initialized (dev selinuxfs, type selinuxfs), uses genfs_contexts Apr 25 18:19:36 andrzej-VirtualBox kernel: [ 5.244838] SELinux: initialized (dev sysfs, type sysfs), uses genfs_contexts Apr 25 18:19:36 andrzej-VirtualBox kernel: [ 5.245517] SELinux: initialized (dev fusectl, type fusectl), uses genfs_contexts Apr 25 18:19:36 andrzej-VirtualBox kernel: [ 5.245551] SELinux: initialized (dev sda1, type ext4), uses xattr Apr 25 18:19:36 andrzej-VirtualBox kernel: [ 5.249604] type=1403 audit(1303748358.316:2): policy loaded auid=4294967295 ses=4294967295 Apr 25 18:19:36 andrzej-VirtualBox kernel: [ 6.343694] type=1400 audit(1303748359.412:3): avc: denied { read write } for pid=249 comm="hwclock" path="/dev/null" dev=devtmpfs ino=4041 scontext=system_u:system_r:hwclock_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=chr_file Apr 25 18:19:36 andrzej-VirtualBox kernel: [ 16.818949] type=1400 audit(1303748369.882:4): avc: denied { associate } for pid=257 comm="cp" name="/" dev=devpts ino=1 scontext=system_u:object_r:lib_t:s0 tcontext=system_u:object_r:devpts_t:s0 tclass=filesystem Apr 25 18:19:36 andrzej-VirtualBox kernel: [ 16.851824] SELinux: initialized (dev securityfs, type securityfs), uses genfs_contexts Apr 25 18:19:36 andrzej-VirtualBox kernel: [ 16.867352] SELinux: initialized (dev tmpfs, type tmpfs), uses transition SIDs Apr 25 18:19:36 andrzej-VirtualBox kernel: [ 16.882307] SELinux: initialized (dev tmpfs, type tmpfs), uses transition SIDs Apr 25 18:19:36 andrzej-VirtualBox kernel: [ 17.037078] SELinux: initialized (dev tmpfs, type tmpfs), uses transition SIDs Apr 25 18:19:36 andrzej-VirtualBox kernel: [ 23.826773] type=1400 audit(1303748376.890:5): avc: denied { search } for pid=659 comm="NetworkManager" scontext=system_u:system_r:NetworkManager_t:s0 tcontext=system_u:object_r:sysctl_net_t:s0 tclass=dir Apr 25 18:19:36 andrzej-VirtualBox kernel: [ 23.826968] type=1400 audit(1303748376.890:6): avc: denied { read } for pid=659 comm="NetworkManager" scontext=system_u:system_r:NetworkManager_t:s0 tcontext=system_u:object_r:sysctl_net_t:s0 tclass=file Apr 25 18:19:36 andrzej-VirtualBox kernel: [ 23.925027] type=1400 audit(1303748376.994:7): avc: denied { write } for pid=659 comm="NetworkManager" scontext=system_u:system_r:NetworkManager_t:s0 tcontext=system_u:object_r:sysctl_net_t:s0 tclass=file Apr 25 18:19:37 andrzej-VirtualBox kernel: [ 24.019859] type=1400 audit(1303748377.082:8): avc: denied { append } for pid=691 comm="ifup" name="ifstate" dev=tmpfs ino=8954 scontext=system_u:system_r:NetworkManager_t:s0 tcontext=system_u:object_r:initrc_var_run_t:s0 tclass=file Apr 25 18:19:38 andrzej-VirtualBox kernel: [ 25.033378] type=1400 audit(1303748378.098:9): avc: denied { setattr } for pid=741 comm="cupsd" name="certs" dev=tmpfs ino=9397 scontext=system_u:system_r:cupsd_t:s0 tcontext=system_u:object_r:var_run_t:s0 tclass=dir Apr 25 18:19:39 andrzej-VirtualBox kernel: [ 26.275983] type=1400 audit(1303748379.342:10): avc: denied { setfscreate } for pid=890 comm="mv" scontext=system_u:system_r:NetworkManager_t:s0 tcontext=system_u:system_r:NetworkManager_t:s0 tclass=process Apr 25 18:19:39 andrzej-VirtualBox kernel: [ 26.284505] type=1400 audit(1303748379.350:11): avc: denied { relabelfrom } for pid=890 comm="mv" name="ifstate" dev=tmpfs ino=9695 scontext=system_u:system_r:NetworkManager_t:s0 tcontext=system_u:object_r:network_var_run_t:s0 tclass=file Apr 25 18:19:39 andrzej-VirtualBox kernel: [ 26.286252] type=1400 audit(1303748379.350:12): avc: denied { relabelto } for pid=890 comm="mv" name="ifstate" dev=tmpfs ino=9695 scontext=system_u:system_r:NetworkManager_t:s0 tcontext=system_u:object_r:NetworkManager_tmp_t:s0 tclass=file Apr 25 18:19:43 andrzej-VirtualBox kernel: [ 30.636552] SELinux: initialized (dev binfmt_misc, type binfmt_misc), uses genfs_contexts Apr 25 18:19:44 andrzej-VirtualBox kernel: [ 31.047197] type=1400 audit(1303748384.110:13): avc: denied { getattr } for pid=1185 comm="udev-acl.ck" name="rfkill" dev=devtmpfs ino=20 scontext=system_u:system_r:consolekit_t:s0 tcontext=system_u:object_r:device_t:s0 tclass=chr_file Apr 25 18:19:44 andrzej-VirtualBox kernel: [ 31.047232] type=1400 audit(1303748384.110:14): avc: denied { setattr } for pid=1185 comm="udev-acl.ck" name="rfkill" dev=devtmpfs ino=20 scontext=system_u:system_r:consolekit_t:s0 tcontext=system_u:object_r:device_t:s0 tclass=chr_file Apr 25 18:19:45 andrzej-VirtualBox kernel: [ 32.139630] type=1400 audit(1303748385.203:15): avc: denied { append } for pid=1240 comm="blockdev" path="/var/log/pm-powersave.log" dev=sda1 ino=136052 scontext=system_u:system_r:fsadm_t:s0 tcontext=system_u:object_r:hald_log_t:s0 tclass=file Apr 25 18:19:45 andrzej-VirtualBox kernel: [ 32.139723] type=1400 audit(1303748385.203:16): avc: denied { read } for pid=1240 comm="blockdev" path="/var/run/pm-utils/locks/pm-powersave.lock" dev=tmpfs ino=10662 scontext=system_u:system_r:fsadm_t:s0 tcontext=system_u:object_r:initrc_var_run_t:s0 tclass=file Apr 25 18:19:46 andrzej-VirtualBox kernel: [ 33.020570] type=1400 audit(1303748386.087:17): avc: denied { connectto } for pid=1282 comm="initctl" path=002F636F6D2F7562756E74752F75707374617274 scontext=system_u:system_r:NetworkManager_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=unix_stream_socket Apr 25 18:19:46 andrzej-VirtualBox kernel: [ 34.259139] type=1400 audit(1303748386.628:18): avc: denied { getattr } for pid=1306 comm="pm-is-supported" path="/dev/snapshot" dev=devtmpfs ino=4123 scontext=system_u:system_r:devicekit_power_t:s0 tcontext=system_u:object_r:apm_bios_t:s0 tclass=chr_file Apr 25 18:19:46 andrzej-VirtualBox kernel: [ 34.571998] type=1400 audit(1303748386.940:19): avc: denied { search } for pid=1316 comm="polkitd" name="root" dev=sda1 ino=1703937 scontext=system_u:system_r:policykit_t:s0 tcontext=unconfined_u:object_r:user_home_dir_t:s0 tclass=dir Apr 25 18:19:46 andrzej-VirtualBox kernel: [ 34.585438] type=1400 audit(1303748386.956:20): avc: denied { search } for pid=1316 comm="polkitd" name=".config" dev=sda1 ino=1712382 scontext=system_u:system_r:policykit_t:s0 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=dir Apr 25 18:19:47 andrzej-VirtualBox kernel: [ 34.677455] type=1400 audit(1303748387.048:21): avc: denied { search } for pid=1316 comm="polkitd" name="1305" dev=proc ino=11245 scontext=system_u:system_r:policykit_t:s0 tcontext=system_u:system_r:xdm_t:s0-s0:c0.c255 tclass=dir Apr 25 18:19:47 andrzej-VirtualBox kernel: [ 34.677546] type=1400 audit(1303748387.048:22): avc: denied { read } for pid=1316 comm="polkitd" name="status" dev=proc ino=11305 scontext=system_u:system_r:policykit_t:s0 tcontext=system_u:system_r:xdm_t:s0-s0:c0.c255 tclass=file Apr 25 18:19:48 andrzej-VirtualBox kernel: [ 36.080131] type=1400 audit(1303748388.448:44): avc: denied { getattr } for pid=1367 comm="journal-commit" path="/bin/mount" dev=sda1 ino=262148 scontext=system_u:system_r:devicekit_power_t:s0 tcontext=system_u:object_r:mount_exec_t:s0 tclass=file Apr 25 18:19:48 andrzej-VirtualBox kernel: [ 36.091994] type=1400 audit(1303748388.460:45): avc: denied { execute } for pid=1369 comm="journal-commit" name="mount" dev=sda1 ino=262148 scontext=system_u:system_r:devicekit_power_t:s0 tcontext=system_u:object_r:mount_exec_t:s0 tclass=file Apr 25 18:19:48 andrzej-VirtualBox kernel: [ 36.092167] type=1400 audit(1303748388.464:46): avc: denied { read open } for pid=1369 comm="journal-commit" name="mount" dev=sda1 ino=262148 scontext=system_u:system_r:devicekit_power_t:s0 tcontext=system_u:object_r:mount_exec_t:s0 tclass=file Apr 25 18:19:48 andrzej-VirtualBox kernel: [ 36.092954] type=1400 audit(1303748388.464:47): avc: denied { execute_no_trans } for pid=1369 comm="journal-commit" path="/bin/mount" dev=sda1 ino=262148 scontext=system_u:system_r:devicekit_power_t:s0 tcontext=system_u:object_r:mount_exec_t:s0 tclass=file Apr 25 18:19:48 andrzej-VirtualBox kernel: [ 36.114994] type=1400 audit(1303748388.484:48): avc: denied { read } for pid=1369 comm="mount" name="sda1" dev=devtmpfs ino=5809 scontext=system_u:system_r:devicekit_power_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file Apr 25 18:19:48 andrzej-VirtualBox kernel: [ 36.115042] type=1400 audit(1303748388.484:49): avc: denied { open } for pid=1369 comm="mount" name="sda1" dev=devtmpfs ino=5809 scontext=system_u:system_r:devicekit_power_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file Apr 25 18:19:48 andrzej-VirtualBox kernel: [ 36.123870] type=1400 audit(1303748388.492:50): avc: denied { remount } for pid=1369 comm="mount" scontext=system_u:system_r:devicekit_power_t:s0 tcontext=system_u:object_r:fs_t:s0 tclass=filesystem Apr 25 18:19:48 andrzej-VirtualBox kernel: [ 36.195999] type=1400 audit(1303748388.564:51): avc: denied { setsched } for pid=1369 comm="mount" scontext=system_u:system_r:devicekit_power_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process Apr 25 18:19:48 andrzej-VirtualBox kernel: [ 36.196795] type=1400 audit(1303748388.568:52): avc: denied { getattr } for pid=1369 comm="mount" path="/etc/mtab" dev=sda1 ino=1055240 scontext=system_u:system_r:devicekit_power_t:s0 tcontext=system_u:object_r:etc_runtime_t:s0 tclass=file Apr 25 18:19:48 andrzej-VirtualBox kernel: [ 36.196826] type=1400 audit(1303748388.568:53): avc: denied { read write } for pid=1369 comm="mount" name="mtab" dev=sda1 ino=1055240 scontext=system_u:system_r:devicekit_power_t:s0 tcontext=system_u:object_r:etc_runtime_t:s0 tclass=file Apr 25 18:19:57 andrzej-VirtualBox kernel: [ 44.877471] SELinux: initialized (dev ecryptfs, type ecryptfs), uses genfs_contexts Apr 25 18:19:57 andrzej-VirtualBox kernel: [ 45.241738] type=1400 audit(1303748397.611:70): avc: denied { getattr } for pid=1419 comm="udev-acl.ck" name="rfkill" dev=devtmpfs ino=20 scontext=system_u:system_r:consolekit_t:s0 tcontext=system_u:object_r:device_t:s0 tclass=chr_file Apr 25 18:19:57 andrzej-VirtualBox kernel: [ 45.241769] type=1400 audit(1303748397.611:71): avc: denied { setattr } for pid=1419 comm="udev-acl.ck" name="rfkill" dev=devtmpfs ino=20 scontext=system_u:system_r:consolekit_t:s0 tcontext=system_u:object_r:device_t:s0 tclass=chr_file Apr 25 18:19:57 andrzej-VirtualBox kernel: [ 45.322715] type=1400 audit(1303748397.691:72): avc: denied { connectto } for pid=1421 comm="ck-get-x11-serv" path=002F746D702F2E5831312D756E69782F5830 scontext=system_u:system_r:consolekit_t:s0 tcontext=system_u:system_r:xserver_t:s0-s0:c0.c255 tclass=unix_stream_socket Apr 25 18:19:57 andrzej-VirtualBox kernel: [ 45.323259] type=1400 audit(1303748397.691:73): avc: denied { search } for pid=1421 comm="ck-get-x11-serv" name="gdm" dev=tmpfs ino=9499 scontext=system_u:system_r:consolekit_t:s0 tcontext=system_u:object_r:xdm_var_run_t:s0 tclass=dir Apr 25 18:19:58 andrzej-VirtualBox kernel: [ 45.979998] type=1401 audit(1303748398.347:74): security_compute_sid: invalid context unconfined_u:unconfined_r:xserver_t:s0-s0:c0.c255 for scontext=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c255 tcontext=system_u:object_r:xserver_exec_t:s0 tclass=process Apr 25 18:20:00 andrzej-VirtualBox kernel: [ 47.825301] SELinux: initialized (dev fuse, type fuse), uses genfs_contexts Apr 25 18:20:00 andrzej-VirtualBox kernel: [ 48.219055] type=1400 audit(1303748400.588:75): avc: denied { getsched } for pid=1308 comm="rtkit-daemon" scontext=system_u:system_r:rtkit_daemon_t:s0 tcontext=system_u:system_r:xdm_t:s0-s0:c0.c255 tclass=process Apr 25 18:20:00 andrzej-VirtualBox kernel: [ 48.315084] type=1400 audit(1303748400.684:76): avc: denied { setsched } for pid=1308 comm="rtkit-daemon" scontext=system_u:system_r:rtkit_daemon_t:s0 tcontext=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c255 tclass=process Apr 25 18:20:01 andrzej-VirtualBox kernel: [ 48.766654] type=1400 audit(1303748401.136:77): avc: denied { getsched } for pid=1308 comm="rtkit-daemon" scontext=system_u:system_r:rtkit_daemon_t:s0 tcontext=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c255 tclass=process Apr 25 18:20:03 andrzej-VirtualBox kernel: [ 51.038095] type=1401 audit(1303748403.409:78): security_compute_sid: invalid context unconfined_u:unconfined_r:xserver_t:s0-s0:c0.c255 for scontext=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c255 tcontext=system_u:object_r:xserver_exec_t:s0 tclass=process Apr 25 18:20:12 andrzej-VirtualBox kernel: [ 60.570987] SELinux: initialized (dev sr0, type iso9660), uses genfs_contexts Apr 25 18:39:31 andrzej-VirtualBox kernel: [ 1218.767502] type=1400 audit(1303749571.137:79): avc: denied { connectto } for pid=1902 comm="shutdown" path=002F636F6D2F7562756E74752F75707374617274 scontext=system_u:system_r:consolekit_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=unix_stream_socket Apr 25 18:39:31 andrzej-VirtualBox kernel: [ 1218.787271] type=1400 audit(1303749571.157:80): avc: denied { write } for pid=1902 comm="shutdown" name="wtmp" dev=sda1 ino=138143 scontext=system_u:system_r:consolekit_t:s0 tcontext=system_u:object_r:wtmp_t:s0 tclass=file Apr 25 18:39:31 andrzej-VirtualBox kernel: [ 1218.787298] type=1400 audit(1303749571.157:81): avc: denied { open } for pid=1902 comm="shutdown" name="wtmp" dev=sda1 ino=138143 scontext=system_u:system_r:consolekit_t:s0 tcontext=system_u:object_r:wtmp_t:s0 tclass=file Apr 25 18:39:31 andrzej-VirtualBox kernel: [ 1218.787522] type=1400 audit(1303749571.157:82): avc: denied { lock } for pid=1902 comm="shutdown" path="/var/log/wtmp" dev=sda1 ino=138143 scontext=system_u:system_r:consolekit_t:s0 tcontext=system_u:object_r:wtmp_t:s0 tclass=file Apr 25 18:40:11 andrzej-VirtualBox kernel: [ 0.000000] Kernel command line: BOOT_IMAGE=/boot/vmlinuz-2.6.35-28-generic root=UUID=52893ead-089a-40dd-81d7-3560d9db5475 ro quiet splash security=selinux selinux=1 Apr 25 18:40:11 andrzej-VirtualBox kernel: [ 0.016057] Security Framework initialized Apr 25 18:40:11 andrzej-VirtualBox kernel: [ 0.016066] SELinux: Initializing. Apr 25 18:40:11 andrzej-VirtualBox kernel: [ 0.016094] SELinux: Starting in permissive mode Apr 25 18:40:11 andrzej-VirtualBox kernel: [ 0.016121] AppArmor: AppArmor disabled by boot time parameter Apr 25 18:40:11 andrzej-VirtualBox kernel: [ 0.601076] type=2000 audit(1303749587.596:1): initialized Apr 25 18:40:11 andrzej-VirtualBox kernel: [ 0.635780] SELinux: Registering netfilter hooks Apr 25 18:40:11 andrzej-VirtualBox kernel: [ 5.338369] SELinux: 2048 avtab hash slots, 25782 rules. Apr 25 18:40:11 andrzej-VirtualBox kernel: [ 5.339984] SELinux: 2048 avtab hash slots, 25782 rules. Apr 25 18:40:11 andrzej-VirtualBox kernel: [ 5.343865] SELinux: 6 users, 7 roles, 1215 types, 34 bools, 1 sens, 256 cats Apr 25 18:40:11 andrzej-VirtualBox kernel: [ 5.345756] SELinux: 77 classes, 25782 rules Apr 25 18:40:11 andrzej-VirtualBox kernel: [ 5.347947] SELinux: Permission module_request in class system not defined in policy. Apr 25 18:40:11 andrzej-VirtualBox kernel: [ 5.349132] SELinux: the above unknown classes and permissions will be allowed Apr 25 18:40:11 andrzej-VirtualBox kernel: [ 5.349194] SELinux: Completing initialization. Apr 25 18:40:11 andrzej-VirtualBox kernel: [ 5.349239] SELinux: Setting up existing superblocks. Apr 25 18:40:11 andrzej-VirtualBox kernel: [ 5.349290] SELinux: initialized (dev sysfs, type sysfs), uses genfs_contexts Apr 25 18:40:11 andrzej-VirtualBox kernel: [ 5.349336] SELinux: initialized (dev rootfs, type rootfs), uses genfs_contexts Apr 25 18:40:11 andrzej-VirtualBox kernel: [ 5.350755] SELinux: initialized (dev bdev, type bdev), uses genfs_contexts Apr 25 18:40:11 andrzej-VirtualBox kernel: [ 5.350791] SELinux: initialized (dev proc, type proc), uses genfs_contexts Apr 25 18:40:11 andrzej-VirtualBox kernel: [ 5.350832] SELinux: initialized (dev tmpfs, type tmpfs), uses transition SIDs Apr 25 18:40:11 andrzej-VirtualBox kernel: [ 5.350858] SELinux: initialized (dev devtmpfs, type devtmpfs), uses transition SIDs Apr 25 18:40:11 andrzej-VirtualBox kernel: [ 5.351744] SELinux: initialized (dev sockfs, type sockfs), uses task SIDs Apr 25 18:40:11 andrzej-VirtualBox kernel: [ 5.351803] SELinux: initialized (dev debugfs, type debugfs), uses genfs_contexts Apr 25 18:40:11 andrzej-VirtualBox kernel: [ 5.354635] SELinux: initialized (dev pipefs, type pipefs), uses task SIDs Apr 25 18:40:11 andrzej-VirtualBox kernel: [ 5.354685] SELinux: initialized (dev anon_inodefs, type anon_inodefs), uses genfs_contexts Apr 25 18:40:11 andrzej-VirtualBox kernel: [ 5.354723] SELinux: initialized (dev devpts, type devpts), uses transition SIDs Apr 25 18:40:11 andrzej-VirtualBox kernel: [ 5.354790] SELinux: initialized (dev hugetlbfs, type hugetlbfs), uses genfs_contexts Apr 25 18:40:11 andrzej-VirtualBox kernel: [ 5.355028] SELinux: initialized (dev mqueue, type mqueue), uses transition SIDs Apr 25 18:40:11 andrzej-VirtualBox kernel: [ 5.355065] SELinux: initialized (dev selinuxfs, type selinuxfs), uses genfs_contexts Apr 25 18:40:11 andrzej-VirtualBox kernel: [ 5.355126] SELinux: initialized (dev sysfs, type sysfs), uses genfs_contexts Apr 25 18:40:11 andrzej-VirtualBox kernel: [ 5.355800] SELinux: initialized (dev fusectl, type fusectl), uses genfs_contexts Apr 25 18:40:11 andrzej-VirtualBox kernel: [ 5.355841] SELinux: initialized (dev sda1, type ext4), uses xattr Apr 25 18:40:11 andrzej-VirtualBox kernel: [ 5.359723] type=1403 audit(1303749592.296:2): policy loaded auid=4294967295 ses=4294967295 Apr 25 18:40:11 andrzej-VirtualBox kernel: [ 6.330767] type=1400 audit(1303749593.267:3): avc: denied { read write } for pid=249 comm="hwclock" path="/dev/null" dev=devtmpfs ino=4041 scontext=system_u:system_r:hwclock_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=chr_file Apr 25 18:40:11 andrzej-VirtualBox kernel: [ 17.665832] type=1400 audit(1303749604.604:4): avc: denied { associate } for pid=257 comm="cp" name="/" dev=devpts ino=1 scontext=system_u:object_r:lib_t:s0 tcontext=system_u:object_r:devpts_t:s0 tclass=filesystem Apr 25 18:40:11 andrzej-VirtualBox kernel: [ 17.715225] SELinux: initialized (dev securityfs, type securityfs), uses genfs_contexts Apr 25 18:40:11 andrzej-VirtualBox kernel: [ 17.732720] SELinux: initialized (dev tmpfs, type tmpfs), uses transition SIDs Apr 25 18:40:11 andrzej-VirtualBox kernel: [ 17.747516] SELinux: initialized (dev tmpfs, type tmpfs), uses transition SIDs Apr 25 18:40:11 andrzej-VirtualBox kernel: [ 17.907279] SELinux: initialized (dev tmpfs, type tmpfs), uses transition SIDs Apr 25 18:40:12 andrzej-VirtualBox kernel: [ 25.219590] type=1400 audit(1303749612.156:5): avc: denied { search } for pid=656 comm="NetworkManager" scontext=system_u:system_r:NetworkManager_t:s0 tcontext=system_u:object_r:sysctl_net_t:s0 tclass=dir Apr 25 18:40:12 andrzej-VirtualBox kernel: [ 25.219730] type=1400 audit(1303749612.156:6): avc: denied { read } for pid=656 comm="NetworkManager" scontext=system_u:system_r:NetworkManager_t:s0 tcontext=system_u:object_r:sysctl_net_t:s0 tclass=file Apr 25 18:40:12 andrzej-VirtualBox kernel: [ 25.309298] type=1400 audit(1303749612.248:7): avc: denied { write } for pid=656 comm="NetworkManager" scontext=system_u:system_r:NetworkManager_t:s0 tcontext=system_u:object_r:sysctl_net_t:s0 tclass=file Apr 25 18:40:12 andrzej-VirtualBox kernel: [ 25.460000] type=1400 audit(1303749612.396:8): avc: denied { append } for pid=684 comm="ifup" name="ifstate" dev=tmpfs ino=8948 scontext=system_u:system_r:NetworkManager_t:s0 tcontext=system_u:object_r:initrc_var_run_t:s0 tclass=file Apr 25 18:40:13 andrzej-VirtualBox kernel: [ 26.559719] type=1400 audit(1303749613.496:9): avc: denied { setattr } for pid=742 comm="cupsd" name="certs" dev=tmpfs ino=9404 scontext=system_u:system_r:cupsd_t:s0 tcontext=system_u:object_r:var_run_t:s0 tclass=dir Apr 25 18:40:14 andrzej-VirtualBox kernel: [ 27.719997] type=1400 audit(1303749614.656:10): avc: denied { setfscreate } for pid=890 comm="mv" scontext=system_u:system_r:NetworkManager_t:s0 tcontext=system_u:system_r:NetworkManager_t:s0 tclass=process Apr 25 18:40:14 andrzej-VirtualBox kernel: [ 27.728461] type=1400 audit(1303749614.668:11): avc: denied { relabelfrom } for pid=890 comm="mv" name="ifstate" dev=tmpfs ino=9695 scontext=system_u:system_r:NetworkManager_t:s0 tcontext=system_u:object_r:network_var_run_t:s0 tclass=file Apr 25 18:40:14 andrzej-VirtualBox kernel: [ 27.728500] type=1400 audit(1303749614.668:12): avc: denied { relabelto } for pid=890 comm="mv" name="ifstate" dev=tmpfs ino=9695 scontext=system_u:system_r:NetworkManager_t:s0 tcontext=system_u:object_r:NetworkManager_tmp_t:s0 tclass=file Apr 25 18:40:19 andrzej-VirtualBox kernel: [ 32.104860] SELinux: initialized (dev binfmt_misc, type binfmt_misc), uses genfs_contexts Apr 25 18:40:19 andrzej-VirtualBox kernel: [ 32.548407] type=1400 audit(1303749619.484:13): avc: denied { getattr } for pid=1188 comm="udev-acl.ck" name="rfkill" dev=devtmpfs ino=20 scontext=system_u:system_r:consolekit_t:s0 tcontext=system_u:object_r:device_t:s0 tclass=chr_file Apr 25 18:40:19 andrzej-VirtualBox kernel: [ 32.548456] type=1400 audit(1303749619.484:14): avc: denied { setattr } for pid=1188 comm="udev-acl.ck" name="rfkill" dev=devtmpfs ino=20 scontext=system_u:system_r:consolekit_t:s0 tcontext=system_u:object_r:device_t:s0 tclass=chr_file Apr 25 18:40:20 andrzej-VirtualBox kernel: [ 33.691462] type=1400 audit(1303749620.625:15): avc: denied { append } for pid=1244 comm="blockdev" path="/var/log/pm-powersave.log" dev=sda1 ino=136052 scontext=system_u:system_r:fsadm_t:s0 tcontext=system_u:object_r:hald_log_t:s0 tclass=file Apr 25 18:40:20 andrzej-VirtualBox kernel: [ 33.691542] type=1400 audit(1303749620.625:16): avc: denied { read } for pid=1244 comm="blockdev" path="/var/run/pm-utils/locks/pm-powersave.lock" dev=tmpfs ino=10787 scontext=system_u:system_r:fsadm_t:s0 tcontext=system_u:object_r:initrc_var_run_t:s0 tclass=file Apr 25 18:40:20 andrzej-VirtualBox kernel: [ 33.791065] type=1400 audit(1303749620.725:17): avc: denied { connectto } for pid=1251 comm="initctl" path=002F636F6D2F7562756E74752F75707374617274 scontext=system_u:system_r:NetworkManager_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=unix_stream_socket Apr 25 18:40:22 andrzej-VirtualBox kernel: [ 35.968942] type=1400 audit(1303749622.216:18): avc: denied { getattr } for pid=1311 comm="pm-is-supported" path="/dev/snapshot" dev=devtmpfs ino=4123 scontext=system_u:system_r:devicekit_power_t:s0 tcontext=system_u:object_r:apm_bios_t:s0 tclass=chr_file Apr 25 18:40:22 andrzej-VirtualBox kernel: [ 36.239955] type=1400 audit(1303749622.484:19): avc: denied { search } for pid=1318 comm="polkitd" name="root" dev=sda1 ino=1703937 scontext=system_u:system_r:policykit_t:s0 tcontext=unconfined_u:object_r:user_home_dir_t:s0 tclass=dir Apr 25 18:40:22 andrzej-VirtualBox kernel: [ 36.240661] type=1400 audit(1303749622.488:20): avc: denied { search } for pid=1318 comm="polkitd" name=".config" dev=sda1 ino=1712382 scontext=system_u:system_r:policykit_t:s0 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=dir Apr 25 18:40:22 andrzej-VirtualBox kernel: [ 36.330366] type=1400 audit(1303749622.576:21): avc: denied { search } for pid=1318 comm="polkitd" name="1308" dev=proc ino=11386 scontext=system_u:system_r:policykit_t:s0 tcontext=system_u:system_r:xdm_t:s0-s0:c0.c255 tclass=dir Apr 25 18:40:22 andrzej-VirtualBox kernel: [ 36.330462] type=1400 audit(1303749622.576:22): avc: denied { read } for pid=1318 comm="polkitd" name="status" dev=proc ino=11459 scontext=system_u:system_r:policykit_t:s0 tcontext=system_u:system_r:xdm_t:s0-s0:c0.c255 tclass=file Apr 25 18:40:23 andrzej-VirtualBox kernel: [ 37.562636] type=1400 audit(1303749623.808:37): avc: denied { search } for pid=1359 comm="udevadm" name="contexts" dev=sda1 ino=1191849 scontext=system_u:system_r:devicekit_power_t:s0 tcontext=system_u:object_r:default_context_t:s0 tclass=dir Apr 25 18:40:23 andrzej-VirtualBox kernel: [ 37.562702] type=1400 audit(1303749623.808:38): avc: denied { search } for pid=1359 comm="udevadm" name="files" dev=sda1 ino=1319078 scontext=system_u:system_r:devicekit_power_t:s0 tcontext=system_u:object_r:file_context_t:s0 tclass=dir Apr 25 18:40:23 andrzej-VirtualBox kernel: [ 37.562866] type=1400 audit(1303749623.808:39): avc: denied { read } for pid=1359 comm="udevadm" name="file_contexts" dev=sda1 ino=1319091 scontext=system_u:system_r:devicekit_power_t:s0 tcontext=system_u:object_r:file_context_t:s0 tclass=file Apr 25 18:40:23 andrzej-VirtualBox kernel: [ 37.562889] type=1400 audit(1303749623.808:40): avc: denied { open } for pid=1359 comm="udevadm" name="file_contexts" dev=sda1 ino=1319091 scontext=system_u:system_r:devicekit_power_t:s0 tcontext=system_u:object_r:file_context_t:s0 tclass=file Apr 25 18:40:23 andrzej-VirtualBox kernel: [ 37.562948] type=1400 audit(1303749623.808:41): avc: denied { getattr } for pid=1359 comm="udevadm" path="/etc/selinux/ubuntu/contexts/files/file_contexts" dev=sda1 ino=1319091 scontext=system_u:system_r:devicekit_power_t:s0 tcontext=system_u:object_r:file_context_t:s0 tclass=file Apr 25 18:40:23 andrzej-VirtualBox kernel: [ 37.614432] type=1400 audit(1303749623.860:42): avc: denied { read } for pid=1361 comm="hdparm" path="/var/run/pm-utils/locks/pm-powersave.lock" dev=tmpfs ino=11601 scontext=system_u:system_r:fsadm_t:s0 tcontext=system_u:object_r:devicekit_var_run_t:s0 tclass=file Apr 25 18:40:23 andrzej-VirtualBox kernel: [ 37.688756] type=1400 audit(1303749623.936:43): avc: denied { connectto } for pid=1364 comm="start" path=002F636F6D2F7562756E74752F75707374617274 scontext=system_u:system_r:devicekit_power_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=unix_stream_socket Apr 25 18:40:24 andrzej-VirtualBox kernel: [ 37.848000] type=1400 audit(1303749624.092:44): avc: denied { getattr } for pid=1371 comm="journal-commit" path="/bin/mount" dev=sda1 ino=262148 scontext=system_u:system_r:devicekit_power_t:s0 tcontext=system_u:object_r:mount_exec_t:s0 tclass=file Apr 25 18:40:24 andrzej-VirtualBox kernel: [ 37.862747] type=1400 audit(1303749624.108:45): avc: denied { execute } for pid=1372 comm="journal-commit" name="mount" dev=sda1 ino=262148 scontext=system_u:system_r:devicekit_power_t:s0 tcontext=system_u:object_r:mount_exec_t:s0 tclass=file Apr 25 18:40:24 andrzej-VirtualBox kernel: [ 37.862792] type=1400 audit(1303749624.108:46): avc: denied { read open } for pid=1372 comm="journal-commit" name="mount" dev=sda1 ino=262148 scontext=system_u:system_r:devicekit_power_t:s0 tcontext=system_u:object_r:mount_exec_t:s0 tclass=file Apr 25 18:40:34 andrzej-VirtualBox kernel: [ 48.174431] SELinux: initialized (dev ecryptfs, type ecryptfs), uses genfs_contexts Apr 25 18:40:34 andrzej-VirtualBox kernel: [ 48.575997] type=1400 audit(1303749634.819:70): avc: denied { getattr } for pid=1422 comm="udev-acl.ck" name="rfkill" dev=devtmpfs ino=20 scontext=system_u:system_r:consolekit_t:s0 tcontext=system_u:object_r:device_t:s0 tclass=chr_file Apr 25 18:40:34 andrzej-VirtualBox kernel: [ 48.576994] type=1400 audit(1303749634.823:71): avc: denied { setattr } for pid=1422 comm="udev-acl.ck" name="rfkill" dev=devtmpfs ino=20 scontext=system_u:system_r:consolekit_t:s0 tcontext=system_u:object_r:device_t:s0 tclass=chr_file Apr 25 18:40:34 andrzej-VirtualBox kernel: [ 48.662242] type=1400 audit(1303749634.907:72): avc: denied { connectto } for pid=1424 comm="ck-get-x11-serv" path=002F746D702F2E5831312D756E69782F5830 scontext=system_u:system_r:consolekit_t:s0 tcontext=system_u:system_r:xserver_t:s0-s0:c0.c255 tclass=unix_stream_socket Apr 25 18:40:34 andrzej-VirtualBox kernel: [ 48.662827] type=1400 audit(1303749634.907:73): avc: denied { search } for pid=1424 comm="ck-get-x11-serv" name="gdm" dev=tmpfs ino=9511 scontext=system_u:system_r:consolekit_t:s0 tcontext=system_u:object_r:xdm_var_run_t:s0 tclass=dir Apr 25 18:40:35 andrzej-VirtualBox kernel: [ 49.357787] type=1401 audit(1303749635.604:74): security_compute_sid: invalid context unconfined_u:unconfined_r:xserver_t:s0-s0:c0.c255 for scontext=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c255 tcontext=system_u:object_r:xserver_exec_t:s0 tclass=process Apr 25 18:40:37 andrzej-VirtualBox kernel: [ 51.126012] SELinux: initialized (dev fuse, type fuse), uses genfs_contexts Apr 25 18:40:37 andrzej-VirtualBox kernel: [ 51.562750] type=1400 audit(1303749637.809:75): avc: denied { getsched } for pid=1310 comm="rtkit-daemon" scontext=system_u:system_r:rtkit_daemon_t:s0 tcontext=system_u:system_r:xdm_t:s0-s0:c0.c255 tclass=process Apr 25 18:40:37 andrzej-VirtualBox kernel: [ 51.644002] type=1400 audit(1303749637.889:76): avc: denied { setsched } for pid=1310 comm="rtkit-daemon" scontext=system_u:system_r:rtkit_daemon_t:s0 tcontext=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c255 tclass=process Apr 25 18:40:38 andrzej-VirtualBox kernel: [ 52.070378] type=1400 audit(1303749638.317:77): avc: denied { getsched } for pid=1310 comm="rtkit-daemon" scontext=system_u:system_r:rtkit_daemon_t:s0 tcontext=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c255 tclass=process Apr 25 18:40:40 andrzej-VirtualBox kernel: [ 54.334314] type=1401 audit(1303749640.582:78): security_compute_sid: invalid context unconfined_u:unconfined_r:xserver_t:s0-s0:c0.c255 for scontext=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c255 tcontext=system_u:object_r:xserver_exec_t:s0 tclass=process Apr 25 18:40:51 andrzej-VirtualBox kernel: [ 65.041032] SELinux: initialized (dev sr0, type iso9660), uses genfs_contexts Apr 25 19:17:01 andrzej-VirtualBox kernel: [ 2235.152002] type=1400 audit(1303751821.396:79): avc: denied { open } for pid=9835 comm="cron" name="shadow" dev=sda1 ino=1054283 scontext=system_u:system_r:crond_t:s0 tcontext=system_u:object_r:shadow_t:s0 tclass=file Apr 25 19:17:01 andrzej-VirtualBox kernel: [ 2235.190763] type=1400 audit(1303751821.436:80): avc: denied { transition } for pid=9837 comm="cron" path="/bin/dash" dev=sda1 ino=262172 scontext=system_u:system_r:crond_t:s0 tcontext=system_u:system_r:initrc_t:s0-s0:c0.c255 tclass=process Apr 25 20:17:01 andrzej-VirtualBox kernel: [ 5835.649043] type=1400 audit(1303755421.895:81): avc: denied { open } for pid=11837 comm="cron" name="shadow" dev=sda1 ino=1054283 scontext=system_u:system_r:crond_t:s0 tcontext=system_u:object_r:shadow_t:s0 tclass=file Apr 25 20:17:02 andrzej-VirtualBox kernel: [ 5835.777274] type=1400 audit(1303755422.023:82): avc: denied { transition } for pid=11839 comm="cron" path="/bin/dash" dev=sda1 ino=262172 scontext=system_u:system_r:crond_t:s0 tcontext=system_u:system_r:initrc_t:s0-s0:c0.c255 tclass=process Apr 25 23:08:42 andrzej-VirtualBox kernel: [12376.639999] SGI XFS with ACLs, security attributes, realtime, large block/inode numbers, no debug enabled Apr 25 23:17:01 andrzej-VirtualBox kernel: [12875.831973] type=1400 audit(1303766221.957:83): avc: denied { open } for pid=32214 comm="cron" name="shadow" dev=sda1 ino=1054283 scontext=system_u:system_r:crond_t:s0 tcontext=system_u:object_r:shadow_t:s0 tclass=file Apr 25 23:17:02 andrzej-VirtualBox kernel: [12875.882060] type=1400 audit(1303766222.009:84): avc: denied { transition } for pid=32216 comm="cron" path="/bin/dash" dev=sda1 ino=262172 scontext=system_u:system_r:crond_t:s0 tcontext=system_u:system_r:initrc_t:s0-s0:c0.c255 tclass=process