Jul 5 13:28:09 kiki kernel: [ 0.004067] Security Framework initialized Jul 5 13:28:09 kiki kernel: [ 0.004092] AppArmor: AppArmor initialized Jul 5 13:28:09 kiki kernel: [ 0.360528] EVM: security.selinux Jul 5 13:28:09 kiki kernel: [ 0.360531] EVM: security.SMACK64 Jul 5 13:28:09 kiki kernel: [ 0.360533] EVM: security.ima Jul 5 13:28:09 kiki kernel: [ 0.360535] EVM: security.capability Jul 5 13:28:09 kiki kernel: [ 0.393425] AppArmor: AppArmor Filesystem Enabled Jul 5 13:28:09 kiki kernel: [ 1.079662] type=2000 audit(1436120858.076:1): initialized Jul 5 13:28:09 kiki kernel: [ 1.730039] AppArmor: AppArmor sha1 policy hashing enabled Jul 5 13:28:09 kiki kernel: [ 31.400514] type=1400 audit(1436120889.164:2): apparmor="STATUS" operation="profile_load" profile="unconfined" name="/sbin/dhclient" pid=1212 comm="apparmor_parser" Jul 5 13:28:09 kiki kernel: [ 31.400527] type=1400 audit(1436120889.164:3): apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/lib/NetworkManager/nm-dhcp-client.action" pid=1212 comm="apparmor_parser" Jul 5 13:28:09 kiki kernel: [ 31.400533] type=1400 audit(1436120889.164:4): apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/lib/connman/scripts/dhclient-script" pid=1212 comm="apparmor_parser" Jul 5 13:28:09 kiki kernel: [ 31.400561] type=1400 audit(1436120889.164:5): apparmor="STATUS" operation="profile_replace" profile="unconfined" name="/sbin/dhclient" pid=1211 comm="apparmor_parser" Jul 5 13:28:09 kiki kernel: [ 31.400577] type=1400 audit(1436120889.164:6): apparmor="STATUS" operation="profile_replace" profile="unconfined" name="/usr/lib/NetworkManager/nm-dhcp-client.action" pid=1211 comm="apparmor_parser" Jul 5 13:28:09 kiki kernel: [ 31.400583] type=1400 audit(1436120889.164:7): apparmor="STATUS" operation="profile_replace" profile="unconfined" name="/usr/lib/connman/scripts/dhclient-script" pid=1211 comm="apparmor_parser" Jul 5 13:28:09 kiki kernel: [ 31.401115] type=1400 audit(1436120889.164:8): apparmor="STATUS" operation="profile_replace" profile="unconfined" name="/usr/lib/NetworkManager/nm-dhcp-client.action" pid=1212 comm="apparmor_parser" Jul 5 13:28:09 kiki kernel: [ 31.401124] type=1400 audit(1436120889.164:9): apparmor="STATUS" operation="profile_replace" profile="unconfined" name="/usr/lib/connman/scripts/dhclient-script" pid=1212 comm="apparmor_parser" Jul 5 13:28:09 kiki kernel: [ 31.401204] type=1400 audit(1436120889.164:10): apparmor="STATUS" operation="profile_replace" profile="unconfined" name="/usr/lib/NetworkManager/nm-dhcp-client.action" pid=1211 comm="apparmor_parser" Jul 5 13:28:09 kiki kernel: [ 31.401210] type=1400 audit(1436120889.164:11): apparmor="STATUS" operation="profile_replace" profile="unconfined" name="/usr/lib/connman/scripts/dhclient-script" pid=1211 comm="apparmor_parser" Jul 5 13:28:20 kiki kernel: [ 42.887894] type=1400 audit(1436120900.648:23): apparmor="STATUS" operation="profile_replace" profile="unconfined" name="/sbin/dhclient" pid=1754 comm="apparmor_parser" Jul 5 13:28:20 kiki kernel: [ 42.887903] type=1400 audit(1436120900.648:24): apparmor="STATUS" operation="profile_replace" profile="unconfined" name="/usr/lib/NetworkManager/nm-dhcp-client.action" pid=1754 comm="apparmor_parser" Jul 5 13:28:20 kiki kernel: [ 42.887909] type=1400 audit(1436120900.648:25): apparmor="STATUS" operation="profile_replace" profile="unconfined" name="/usr/lib/connman/scripts/dhclient-script" pid=1754 comm="apparmor_parser" Jul 5 13:28:20 kiki kernel: [ 42.892544] type=1400 audit(1436120900.656:26): apparmor="STATUS" operation="profile_replace" profile="unconfined" name="/usr/lib/cups/backend/cups-pdf" pid=1756 comm="apparmor_parser" Jul 5 13:28:20 kiki kernel: [ 42.892556] type=1400 audit(1436120900.656:27): apparmor="STATUS" operation="profile_replace" profile="unconfined" name="/usr/sbin/cupsd" pid=1756 comm="apparmor_parser" Jul 5 13:28:20 kiki kernel: [ 42.892578] type=1400 audit(1436120900.656:28): apparmor="STATUS" operation="profile_replace" profile="unconfined" name="/usr/lib/NetworkManager/nm-dhcp-client.action" pid=1754 comm="apparmor_parser" Jul 5 13:28:20 kiki kernel: [ 42.892591] type=1400 audit(1436120900.656:29): apparmor="STATUS" operation="profile_replace" profile="unconfined" name="/usr/lib/connman/scripts/dhclient-script" pid=1754 comm="apparmor_parser" Jul 5 13:28:20 kiki kernel: [ 42.892901] type=1400 audit(1436120900.656:30): apparmor="STATUS" operation="profile_replace" profile="unconfined" name="/usr/lib/connman/scripts/dhclient-script" pid=1754 comm="apparmor_parser" Jul 5 13:28:20 kiki kernel: [ 42.893122] type=1400 audit(1436120900.656:31): apparmor="STATUS" operation="profile_replace" profile="unconfined" name="/usr/sbin/cupsd" pid=1756 comm="apparmor_parser" Jul 5 13:28:20 kiki kernel: [ 43.176769] type=1400 audit(1436120900.940:32): apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/sbin/tcpdump" pid=1759 comm="apparmor_parser" Jul 5 13:26:59 kiki kernel: [ 65.764572] type=1400 audit(1436120819.037:37): apparmor="STATUS" operation="profile_replace" profile="unconfined" name="/usr/lib/cups/backend/cups-pdf" pid=2596 comm="apparmor_parser" Jul 5 13:26:59 kiki kernel: [ 65.764582] type=1400 audit(1436120819.037:38): apparmor="STATUS" operation="profile_replace" profile="unconfined" name="/usr/sbin/cupsd" pid=2596 comm="apparmor_parser" Jul 5 13:26:59 kiki kernel: [ 65.765147] type=1400 audit(1436120819.037:39): apparmor="STATUS" operation="profile_replace" profile="unconfined" name="/usr/sbin/cupsd" pid=2596 comm="apparmor_parser" Jul 5 13:44:40 kiki kernel: [ 0.004066] Security Framework initialized Jul 5 13:44:40 kiki kernel: [ 0.004091] AppArmor: AppArmor initialized Jul 5 13:44:40 kiki kernel: [ 0.360536] EVM: security.selinux Jul 5 13:44:40 kiki kernel: [ 0.360540] EVM: security.SMACK64 Jul 5 13:44:40 kiki kernel: [ 0.360542] EVM: security.ima Jul 5 13:44:40 kiki kernel: [ 0.360544] EVM: security.capability Jul 5 13:44:40 kiki kernel: [ 0.393212] AppArmor: AppArmor Filesystem Enabled Jul 5 13:44:40 kiki kernel: [ 1.078000] type=2000 audit(1436121842.076:1): initialized Jul 5 13:44:40 kiki kernel: [ 1.823094] AppArmor: AppArmor sha1 policy hashing enabled Jul 5 13:44:40 kiki kernel: [ 32.837050] type=1400 audit(1436121874.432:2): apparmor="STATUS" operation="profile_load" profile="unconfined" name="/sbin/dhclient" pid=1116 comm="apparmor_parser" Jul 5 13:44:40 kiki kernel: [ 32.837059] type=1400 audit(1436121874.432:3): apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/lib/NetworkManager/nm-dhcp-client.action" pid=1116 comm="apparmor_parser" Jul 5 13:44:40 kiki kernel: [ 32.837065] type=1400 audit(1436121874.432:4): apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/lib/connman/scripts/dhclient-script" pid=1116 comm="apparmor_parser" Jul 5 13:44:40 kiki kernel: [ 32.837640] type=1400 audit(1436121874.432:5): apparmor="STATUS" operation="profile_replace" profile="unconfined" name="/usr/lib/NetworkManager/nm-dhcp-client.action" pid=1116 comm="apparmor_parser" Jul 5 13:44:40 kiki kernel: [ 32.837647] type=1400 audit(1436121874.432:6): apparmor="STATUS" operation="profile_replace" profile="unconfined" name="/usr/lib/connman/scripts/dhclient-script" pid=1116 comm="apparmor_parser" Jul 5 13:44:40 kiki kernel: [ 32.837950] type=1400 audit(1436121874.432:7): apparmor="STATUS" operation="profile_replace" profile="unconfined" name="/usr/lib/connman/scripts/dhclient-script" pid=1116 comm="apparmor_parser" Jul 5 13:44:40 kiki kernel: [ 32.840280] type=1400 audit(1436121874.436:8): apparmor="STATUS" operation="profile_replace" profile="unconfined" name="/sbin/dhclient" pid=1115 comm="apparmor_parser" Jul 5 13:44:40 kiki kernel: [ 32.840288] type=1400 audit(1436121874.436:9): apparmor="STATUS" operation="profile_replace" profile="unconfined" name="/usr/lib/NetworkManager/nm-dhcp-client.action" pid=1115 comm="apparmor_parser" Jul 5 13:44:40 kiki kernel: [ 32.840293] type=1400 audit(1436121874.436:10): apparmor="STATUS" operation="profile_replace" profile="unconfined" name="/usr/lib/connman/scripts/dhclient-script" pid=1115 comm="apparmor_parser" Jul 5 13:44:40 kiki kernel: [ 32.840543] type=1400 audit(1436121874.436:11): apparmor="STATUS" operation="profile_replace" profile="unconfined" name="/sbin/dhclient" pid=1138 comm="apparmor_parser" Jul 5 13:44:40 kiki kernel: [ 38.520868] type=1400 audit(1436121880.116:20): apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/sbin/cups-browsed" pid=1699 comm="apparmor_parser" Jul 5 13:44:40 kiki kernel: [ 38.521568] type=1400 audit(1436121880.116:21): apparmor="STATUS" operation="profile_replace" profile="unconfined" name="/sbin/dhclient" pid=1698 comm="apparmor_parser" Jul 5 13:44:40 kiki kernel: [ 38.521584] type=1400 audit(1436121880.116:22): apparmor="STATUS" operation="profile_replace" profile="unconfined" name="/usr/lib/NetworkManager/nm-dhcp-client.action" pid=1698 comm="apparmor_parser" Jul 5 13:44:40 kiki kernel: [ 38.521591] type=1400 audit(1436121880.116:23): apparmor="STATUS" operation="profile_replace" profile="unconfined" name="/usr/lib/connman/scripts/dhclient-script" pid=1698 comm="apparmor_parser" Jul 5 13:44:40 kiki kernel: [ 38.522175] type=1400 audit(1436121880.116:24): apparmor="STATUS" operation="profile_replace" profile="unconfined" name="/usr/lib/NetworkManager/nm-dhcp-client.action" pid=1698 comm="apparmor_parser" Jul 5 13:44:40 kiki kernel: [ 38.522180] type=1400 audit(1436121880.116:25): apparmor="STATUS" operation="profile_replace" profile="unconfined" name="/usr/lib/connman/scripts/dhclient-script" pid=1698 comm="apparmor_parser" Jul 5 13:44:40 kiki kernel: [ 38.522484] type=1400 audit(1436121880.116:26): apparmor="STATUS" operation="profile_replace" profile="unconfined" name="/usr/lib/connman/scripts/dhclient-script" pid=1698 comm="apparmor_parser" Jul 5 13:44:40 kiki kernel: [ 38.522700] type=1400 audit(1436121880.116:27): apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/lib/cups/backend/cups-pdf" pid=1700 comm="apparmor_parser" Jul 5 13:44:40 kiki kernel: [ 38.522714] type=1400 audit(1436121880.116:28): apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/sbin/cupsd" pid=1700 comm="apparmor_parser" Jul 5 13:44:40 kiki kernel: [ 38.523005] type=1400 audit(1436121880.116:29): apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/sbin/mysqld" pid=1701 comm="apparmor_parser" Jul 5 13:45:10 kiki kernel: [ 68.791709] type=1400 audit(1436121910.385:37): apparmor="STATUS" operation="profile_replace" profile="unconfined" name="/usr/lib/cups/backend/cups-pdf" pid=2721 comm="apparmor_parser" Jul 5 13:45:10 kiki kernel: [ 68.791721] type=1400 audit(1436121910.385:38): apparmor="STATUS" operation="profile_replace" profile="unconfined" name="/usr/sbin/cupsd" pid=2721 comm="apparmor_parser" Jul 5 13:45:10 kiki kernel: [ 68.792358] type=1400 audit(1436121910.389:39): apparmor="STATUS" operation="profile_replace" profile="unconfined" name="/usr/sbin/cupsd" pid=2721 comm="apparmor_parser" Jul 5 13:48:15 kiki kernel: [ 254.269728] type=1400 audit(1436122095.865:40): apparmor="DENIED" operation="file_lock" profile="/usr/sbin/cupsd" name="/run/utmp" pid=2722 comm="cupsd" requested_mask="k" denied_mask="k" fsuid=0 ouid=0 Jul 5 13:48:20 kiki kernel: [ 258.899555] type=1400 audit(1436122100.492:41): apparmor="DENIED" operation="open" profile="/usr/sbin/cupsd" name="/var/lib/samba/private/secrets.tdb" pid=2722 comm="cupsd" requested_mask="rwc" denied_mask="rwc" fsuid=0 ouid=0 Jul 5 13:48:20 kiki kernel: [ 258.899677] type=1400 audit(1436122100.492:42): apparmor="DENIED" operation="open" profile="/usr/sbin/cupsd" name="/var/lib/samba/private/passdb.tdb" pid=2722 comm="cupsd" requested_mask="rwc" denied_mask="rwc" fsuid=0 ouid=0 Jul 5 13:48:20 kiki kernel: [ 258.899756] type=1400 audit(1436122100.492:43): apparmor="DENIED" operation="open" profile="/usr/sbin/cupsd" name="/var/lib/samba/private/passdb.tdb" pid=2722 comm="cupsd" requested_mask="rwc" denied_mask="rwc" fsuid=0 ouid=0 Jul 5 13:48:20 kiki kernel: [ 258.899896] type=1400 audit(1436122100.492:44): apparmor="DENIED" operation="open" profile="/usr/sbin/cupsd" name="/var/lib/samba/private/passdb.tdb" pid=2722 comm="cupsd" requested_mask="rwc" denied_mask="rwc" fsuid=0 ouid=0 Jul 5 13:48:22 kiki kernel: [ 261.356791] type=1400 audit(1436122102.953:45): apparmor="DENIED" operation="open" profile="/usr/sbin/cupsd" name="/var/lib/samba/private/secrets.tdb" pid=2722 comm="cupsd" requested_mask="rwc" denied_mask="rwc" fsuid=0 ouid=0 Jul 5 13:48:22 kiki kernel: [ 261.356930] type=1400 audit(1436122102.953:46): apparmor="DENIED" operation="open" profile="/usr/sbin/cupsd" name="/var/lib/samba/private/passdb.tdb" pid=2722 comm="cupsd" requested_mask="rwc" denied_mask="rwc" fsuid=0 ouid=0 Jul 5 13:48:22 kiki kernel: [ 261.357029] type=1400 audit(1436122102.953:47): apparmor="DENIED" operation="open" profile="/usr/sbin/cupsd" name="/var/lib/samba/private/passdb.tdb" pid=2722 comm="cupsd" requested_mask="rwc" denied_mask="rwc" fsuid=0 ouid=0 Jul 5 13:48:22 kiki kernel: [ 261.357190] type=1400 audit(1436122102.953:48): apparmor="DENIED" operation="open" profile="/usr/sbin/cupsd" name="/var/lib/samba/private/passdb.tdb" pid=2722 comm="cupsd" requested_mask="rwc" denied_mask="rwc" fsuid=0 ouid=0 Jul 5 13:48:26 kiki kernel: [ 264.922074] type=1400 audit(1436122106.515:49): apparmor="DENIED" operation="open" profile="/usr/sbin/cupsd" name="/var/lib/samba/private/secrets.tdb" pid=2722 comm="cupsd" requested_mask="rwc" denied_mask="rwc" fsuid=0 ouid=0 Jul 5 13:48:26 kiki kernel: [ 264.922232] type=1400 audit(1436122106.515:50): apparmor="DENIED" operation="open" profile="/usr/sbin/cupsd" name="/var/lib/samba/private/passdb.tdb" pid=2722 comm="cupsd" requested_mask="rwc" denied_mask="rwc" fsuid=0 ouid=0 Jul 5 13:48:26 kiki kernel: [ 264.922337] type=1400 audit(1436122106.515:51): apparmor="DENIED" operation="open" profile="/usr/sbin/cupsd" name="/var/lib/samba/private/passdb.tdb" pid=2722 comm="cupsd" requested_mask="rwc" denied_mask="rwc" fsuid=0 ouid=0 Jul 5 13:48:26 kiki kernel: [ 264.922512] type=1400 audit(1436122106.515:52): apparmor="DENIED" operation="open" profile="/usr/sbin/cupsd" name="/var/lib/samba/private/passdb.tdb" pid=2722 comm="cupsd" requested_mask="rwc" denied_mask="rwc" fsuid=0 ouid=0 Jul 5 13:48:28 kiki kernel: [ 266.786923] type=1400 audit(1436122108.379:53): apparmor="DENIED" operation="open" profile="/usr/sbin/cupsd" name="/var/lib/samba/private/secrets.tdb" pid=2722 comm="cupsd" requested_mask="rwc" denied_mask="rwc" fsuid=0 ouid=0 Jul 5 13:48:28 kiki kernel: [ 266.787089] type=1400 audit(1436122108.379:54): apparmor="DENIED" operation="open" profile="/usr/sbin/cupsd" name="/var/lib/samba/private/passdb.tdb" pid=2722 comm="cupsd" requested_mask="rwc" denied_mask="rwc" fsuid=0 ouid=0 Jul 5 13:48:28 kiki kernel: [ 266.787198] type=1400 audit(1436122108.379:55): apparmor="DENIED" operation="open" profile="/usr/sbin/cupsd" name="/var/lib/samba/private/passdb.tdb" pid=2722 comm="cupsd" requested_mask="rwc" denied_mask="rwc" fsuid=0 ouid=0 Jul 5 13:48:28 kiki kernel: [ 266.787383] type=1400 audit(1436122108.379:56): apparmor="DENIED" operation="open" profile="/usr/sbin/cupsd" name="/var/lib/samba/private/passdb.tdb" pid=2722 comm="cupsd" requested_mask="rwc" denied_mask="rwc" fsuid=0 ouid=0 Jul 5 13:48:31 kiki kernel: [ 269.460676] type=1400 audit(1436122111.057:57): apparmor="DENIED" operation="open" profile="/usr/sbin/cupsd" name="/var/lib/samba/private/secrets.tdb" pid=2722 comm="cupsd" requested_mask="rwc" denied_mask="rwc" fsuid=0 ouid=0 Jul 5 13:48:31 kiki kernel: [ 269.460799] type=1400 audit(1436122111.057:58): apparmor="DENIED" operation="open" profile="/usr/sbin/cupsd" name="/var/lib/samba/private/passdb.tdb" pid=2722 comm="cupsd" requested_mask="rwc" denied_mask="rwc" fsuid=0 ouid=0 Jul 5 13:48:32 kiki kernel: [ 271.043524] type=1400 audit(1436122112.634:61): apparmor="DENIED" operation="open" profile="/usr/sbin/cupsd" name="/var/lib/samba/private/secrets.tdb" pid=2722 comm="cupsd" requested_mask="rwc" denied_mask="rwc" fsuid=0 ouid=0 Jul 5 13:48:32 kiki kernel: [ 271.043760] type=1400 audit(1436122112.634:62): apparmor="DENIED" operation="open" profile="/usr/sbin/cupsd" name="/var/lib/samba/private/passdb.tdb" pid=2722 comm="cupsd" requested_mask="rwc" denied_mask="rwc" fsuid=0 ouid=0 Jul 5 13:48:32 kiki kernel: [ 271.043942] type=1400 audit(1436122112.634:63): apparmor="DENIED" operation="open" profile="/usr/sbin/cupsd" name="/var/lib/samba/private/passdb.tdb" pid=2722 comm="cupsd" requested_mask="rwc" denied_mask="rwc" fsuid=0 ouid=0 Jul 5 13:48:32 kiki kernel: [ 271.044276] type=1400 audit(1436122112.638:64): apparmor="DENIED" operation="open" profile="/usr/sbin/cupsd" name="/var/lib/samba/private/passdb.tdb" pid=2722 comm="cupsd" requested_mask="rwc" denied_mask="rwc" fsuid=0 ouid=0 Jul 5 13:49:36 kiki kernel: [ 334.845164] type=1400 audit(1436122176.437:65): apparmor="DENIED" operation="open" profile="/usr/sbin/cupsd" name="/var/lib/samba/private/secrets.tdb" pid=2722 comm="cupsd" requested_mask="rwc" denied_mask="rwc" fsuid=0 ouid=0 Jul 5 13:49:36 kiki kernel: [ 334.845409] type=1400 audit(1436122176.437:66): apparmor="DENIED" operation="open" profile="/usr/sbin/cupsd" name="/var/lib/samba/private/passdb.tdb" pid=2722 comm="cupsd" requested_mask="rwc" denied_mask="rwc" fsuid=0 ouid=0 Jul 5 13:49:36 kiki kernel: [ 334.845589] type=1400 audit(1436122176.437:67): apparmor="DENIED" operation="open" profile="/usr/sbin/cupsd" name="/var/lib/samba/private/passdb.tdb" pid=2722 comm="cupsd" requested_mask="rwc" denied_mask="rwc" fsuid=0 ouid=0 Jul 5 13:49:36 kiki kernel: [ 334.845955] type=1400 audit(1436122176.437:68): apparmor="DENIED" operation="open" profile="/usr/sbin/cupsd" name="/var/lib/samba/private/passdb.tdb" pid=2722 comm="cupsd" requested_mask="rwc" denied_mask="rwc" fsuid=0 ouid=0 Jul 5 13:55:04 kiki kernel: [ 663.213870] type=1400 audit(1436122504.806:69): apparmor="STATUS" operation="profile_replace" profile="unconfined" name="/sbin/dhclient" pid=5677 comm="apparmor_parser" Jul 5 13:55:04 kiki kernel: [ 663.214382] type=1400 audit(1436122504.806:70): apparmor="STATUS" operation="profile_replace" profile="unconfined" name="/usr/lib/NetworkManager/nm-dhcp-client.action" pid=5677 comm="apparmor_parser" Jul 5 13:55:04 kiki kernel: [ 663.214767] type=1400 audit(1436122504.806:71): apparmor="STATUS" operation="profile_replace" profile="unconfined" name="/usr/lib/connman/scripts/dhclient-script" pid=5677 comm="apparmor_parser" Jul 5 13:55:16 kiki kernel: [ 674.767825] type=1400 audit(1436122516.358:72): apparmor="STATUS" operation="profile_replace" profile="unconfined" name="/usr/sbin/cups-browsed" pid=5815 comm="apparmor_parser" Jul 5 13:55:16 kiki kernel: [ 674.775761] type=1400 audit(1436122516.366:73): apparmor="STATUS" operation="profile_replace" profile="unconfined" name="/usr/sbin/mysqld" pid=5817 comm="apparmor_parser" Jul 5 13:55:16 kiki kernel: [ 674.934104] type=1400 audit(1436122516.526:74): apparmor="STATUS" operation="profile_replace" profile="unconfined" name="/sbin/dhclient" pid=5814 comm="apparmor_parser" Jul 5 13:55:16 kiki kernel: [ 674.934602] type=1400 audit(1436122516.526:75): apparmor="STATUS" operation="profile_replace" profile="unconfined" name="/usr/lib/NetworkManager/nm-dhcp-client.action" pid=5814 comm="apparmor_parser" Jul 5 13:55:16 kiki kernel: [ 674.934976] type=1400 audit(1436122516.526:76): apparmor="STATUS" operation="profile_replace" profile="unconfined" name="/usr/lib/connman/scripts/dhclient-script" pid=5814 comm="apparmor_parser" Jul 5 13:55:16 kiki kernel: [ 674.992439] type=1400 audit(1436122516.586:77): apparmor="STATUS" operation="profile_replace" profile="unconfined" name="/usr/sbin/tcpdump" pid=5819 comm="apparmor_parser" Jul 5 13:55:16 kiki kernel: [ 675.250031] type=1400 audit(1436122516.842:78): apparmor="STATUS" operation="profile_replace" profile="unconfined" name="/usr/lib/cups/backend/cups-pdf" pid=5816 comm="apparmor_parser" Jul 5 13:55:16 kiki kernel: [ 675.250650] type=1400 audit(1436122516.842:79): apparmor="STATUS" operation="profile_replace" profile="unconfined" name="/usr/sbin/cupsd" pid=5816 comm="apparmor_parser" Jul 5 13:55:17 kiki kernel: [ 675.601900] type=1400 audit(1436122517.194:80): apparmor="STATUS" operation="profile_replace" profile="unconfined" name="/usr/sbin/cups-browsed" pid=5883 comm="apparmor_parser" Jul 5 13:55:17 kiki kernel: [ 675.608223] type=1400 audit(1436122517.202:81): apparmor="STATUS" operation="profile_replace" profile="unconfined" name="/usr/sbin/mysqld" pid=5885 comm="apparmor_parser" Jul 5 14:00:02 kiki kernel: [ 961.221679] type=1400 audit(1436122802.814:88): apparmor="STATUS" operation="profile_replace" profile="unconfined" name="/usr/lib/cups/backend/cups-pdf" pid=6547 comm="apparmor_parser" Jul 5 14:00:02 kiki kernel: [ 961.222153] type=1400 audit(1436122802.814:89): apparmor="STATUS" operation="profile_replace" profile="unconfined" name="/usr/sbin/cupsd" pid=6547 comm="apparmor_parser" Jul 5 14:00:10 kiki kernel: [ 968.632068] type=1400 audit(1436122810.226:90): apparmor="STATUS" operation="profile_replace" profile="unconfined" name="/usr/lib/cups/backend/cups-pdf" pid=6592 comm="apparmor_parser" Jul 5 14:00:10 kiki kernel: [ 968.632659] type=1400 audit(1436122810.226:91): apparmor="STATUS" operation="profile_replace" profile="unconfined" name="/usr/sbin/cupsd" pid=6592 comm="apparmor_parser" Jul 5 14:00:22 kiki kernel: [ 980.861543] type=1400 audit(1436122822.454:92): apparmor="DENIED" operation="file_lock" profile="/usr/sbin/cupsd" name="/var/lib/samba/private/secrets.tdb" pid=6593 comm="cupsd" requested_mask="k" denied_mask="k" fsuid=0 ouid=0 Jul 5 14:00:22 kiki kernel: [ 980.861667] type=1400 audit(1436122822.454:93): apparmor="DENIED" operation="file_lock" profile="/usr/sbin/cupsd" name="/var/lib/samba/private/passdb.tdb" pid=6593 comm="cupsd" requested_mask="k" denied_mask="k" fsuid=0 ouid=0 Jul 5 14:00:22 kiki kernel: [ 980.861753] type=1400 audit(1436122822.454:94): apparmor="DENIED" operation="file_lock" profile="/usr/sbin/cupsd" name="/var/lib/samba/private/passdb.tdb" pid=6593 comm="cupsd" requested_mask="k" denied_mask="k" fsuid=0 ouid=0 Jul 5 14:00:22 kiki kernel: [ 980.861895] type=1400 audit(1436122822.454:95): apparmor="DENIED" operation="file_lock" profile="/usr/sbin/cupsd" name="/var/lib/samba/private/passdb.tdb" pid=6593 comm="cupsd" requested_mask="k" denied_mask="k" fsuid=0 ouid=0 Jul 5 14:00:37 kiki kernel: [ 996.284165] type=1400 audit(1436122837.878:96): apparmor="STATUS" operation="profile_replace" profile="unconfined" name="/usr/lib/cups/backend/cups-pdf" pid=6660 comm="apparmor_parser" Jul 5 14:00:37 kiki kernel: [ 996.284688] type=1400 audit(1436122837.878:97): apparmor="STATUS" operation="profile_replace" profile="unconfined" name="/usr/sbin/cupsd" pid=6660 comm="apparmor_parser" Jul 5 14:00:41 kiki kernel: [ 999.950506] type=1400 audit(1436122841.542:98): apparmor="STATUS" operation="profile_replace" profile="unconfined" name="/usr/lib/cups/backend/cups-pdf" pid=6675 comm="apparmor_parser" Jul 5 14:00:41 kiki kernel: [ 999.951082] type=1400 audit(1436122841.542:99): apparmor="STATUS" operation="profile_replace" profile="unconfined" name="/usr/sbin/cupsd" pid=6675 comm="apparmor_parser" Jul 5 14:00:52 kiki kernel: [ 1011.127855] type=1400 audit(1436122852.718:100): apparmor="DENIED" operation="open" profile="/usr/sbin/cupsd" name="/var/cache/samba/gencache.tdb" pid=6676 comm="cupsd" requested_mask="rwc" denied_mask="rwc" fsuid=0 ouid=0 Jul 5 14:00:52 kiki kernel: [ 1011.127882] type=1400 audit(1436122852.718:101): apparmor="DENIED" operation="open" profile="/usr/sbin/cupsd" name="/var/cache/samba/gencache.tdb" pid=6676 comm="cupsd" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Jul 5 14:00:52 kiki kernel: [ 1011.128177] type=1400 audit(1436122852.722:102): apparmor="DENIED" operation="open" profile="/usr/sbin/cupsd" name="/var/cache/samba/gencache.tdb" pid=6676 comm="cupsd" requested_mask="rwc" denied_mask="rwc" fsuid=0 ouid=0 Jul 5 14:00:52 kiki kernel: [ 1011.128195] type=1400 audit(1436122852.722:103): apparmor="DENIED" operation="open" profile="/usr/sbin/cupsd" name="/var/cache/samba/gencache.tdb" pid=6676 comm="cupsd" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Jul 5 14:01:05 kiki kernel: [ 1023.928734] type=1400 audit(1436122865.522:104): apparmor="STATUS" operation="profile_replace" profile="unconfined" name="/usr/lib/cups/backend/cups-pdf" pid=6744 comm="apparmor_parser" Jul 5 14:01:05 kiki kernel: [ 1023.929241] type=1400 audit(1436122865.522:105): apparmor="STATUS" operation="profile_replace" profile="unconfined" name="/usr/sbin/cupsd" pid=6744 comm="apparmor_parser" Jul 5 14:01:08 kiki kernel: [ 1027.046510] type=1400 audit(1436122868.638:106): apparmor="DENIED" operation="file_lock" profile="/usr/sbin/cupsd" name="/var/cache/samba/gencache.tdb" pid=6676 comm="cupsd" requested_mask="k" denied_mask="k" fsuid=0 ouid=0 Jul 5 14:01:23 kiki kernel: [ 1041.649013] type=1400 audit(1436122883.242:107): apparmor="STATUS" operation="profile_replace" profile="unconfined" name="/usr/lib/cups/backend/cups-pdf" pid=6799 comm="apparmor_parser" Jul 5 14:01:23 kiki kernel: [ 1041.649489] type=1400 audit(1436122883.242:108): apparmor="STATUS" operation="profile_replace" profile="unconfined" name="/usr/sbin/cupsd" pid=6799 comm="apparmor_parser" Jul 5 14:01:26 kiki kernel: [ 1044.558874] type=1400 audit(1436122886.150:109): apparmor="STATUS" operation="profile_replace" profile="unconfined" name="/usr/lib/cups/backend/cups-pdf" pid=6814 comm="apparmor_parser" Jul 5 14:01:26 kiki kernel: [ 1044.559522] type=1400 audit(1436122886.150:110): apparmor="STATUS" operation="profile_replace" profile="unconfined" name="/usr/sbin/cupsd" pid=6814 comm="apparmor_parser" Jul 5 14:05:28 kiki kernel: [ 1286.977698] type=1400 audit(1436123128.570:111): apparmor="STATUS" operation="profile_replace" profile="unconfined" name="/usr/lib/cups/backend/cups-pdf" pid=7094 comm="apparmor_parser" Jul 5 14:05:28 kiki kernel: [ 1286.977728] type=1400 audit(1436123128.570:112): apparmor="STATUS" operation="profile_replace" profile="unconfined" name="/usr/sbin/cupsd" pid=7094 comm="apparmor_parser" Jul 5 14:05:28 kiki kernel: [ 1286.979075] type=1400 audit(1436123128.570:113): apparmor="STATUS" operation="profile_replace" profile="unconfined" name="/usr/sbin/cupsd" pid=7094 comm="apparmor_parser" Jul 5 15:29:34 kiki kernel: [ 6332.766142] type=1400 audit(1436128174.358:114): apparmor="STATUS" operation="profile_replace" profile="unconfined" name="/usr/lib/cups/backend/cups-pdf" pid=9780 comm="apparmor_parser" Jul 5 15:29:34 kiki kernel: [ 6332.766171] type=1400 audit(1436128174.358:115): apparmor="STATUS" operation="profile_replace" profile="unconfined" name="/usr/sbin/cupsd" pid=9780 comm="apparmor_parser" Jul 5 15:29:34 kiki kernel: [ 6332.767521] type=1400 audit(1436128174.358:116): apparmor="STATUS" operation="profile_replace" profile="unconfined" name="/usr/sbin/cupsd" pid=9780 comm="apparmor_parser" Jul 5 15:30:38 kiki kernel: [ 6396.732412] type=1400 audit(1436128238.326:117): apparmor="STATUS" operation="profile_replace" profile="unconfined" name="/usr/lib/cups/backend/cups-pdf" pid=9902 comm="apparmor_parser" Jul 5 15:30:38 kiki kernel: [ 6396.732438] type=1400 audit(1436128238.326:118): apparmor="STATUS" operation="profile_replace" profile="unconfined" name="/usr/sbin/cupsd" pid=9902 comm="apparmor_parser" Jul 5 15:30:38 kiki kernel: [ 6396.733794] type=1400 audit(1436128238.326:119): apparmor="STATUS" operation="profile_replace" profile="unconfined" name="/usr/sbin/cupsd" pid=9902 comm="apparmor_parser" Jul 5 15:30:43 kiki kernel: [ 6402.384487] type=1400 audit(1436128243.978:120): apparmor="STATUS" operation="profile_replace" profile="unconfined" name="/usr/sbin/cups-browsed" pid=9942 comm="apparmor_parser"