RE: Getting the user ID in log messages...
by Levine, Daniel J.
Russell,
Thanks, I managed to figure that out from the "Getting Started with SELinux
HOWTO" from the adding a user section. For a standalone system, I can see
how this is no big deal. Every time I add a user, I add the user to the
/etc/selinux/users file. But suppose I have 100 machines, I would need to
add it to 100 systems. This is why I use NIS to manage my password and
shadow files. I suppose one homegrown solution would be to put
/etc/selinux/users into an NIS map (users.byname) and periodically (every
half-hour perhaps) have a cron job perform a ypcat users.byname >
/etc/selinux/users. Is there a standard map one could use or a PAM module
that's aware of such needs.
Suppose I wasn't using something as old as NIS, like OpenLDAP, is there a
standard mechanism for putting this information into its databases? And if
not, should there be one?
Perhaps my problem is simpler to solve than this. All I really need is the
user ID of the person who logged in to the system. This identifies whose
account was used to perpetrate the illegal access. Could the user ID number
and user name be added to the log messages when violations occur? The id
command seems to have the information it needs, perhaps the SELinux logger
does too? Otherwise, I'd need to do something like I mention above. I'm
not really interested in whether the context has the user name. That was
just a way of using what seemed to be a built-in capability if I had set
things up right. I have no real problem with users running around as
user_u:user_r:user_t in the system. I just need to know which user to start
talking to when I see they are poking around the system.
Daniel J. Levine
Section Supervisor
Johns Hopkins University
Applied Physics Laboratory
443-778-3952 240-228-3952
-----Original Message-----
From: Russell Coker [mailto:russell@coker.com.au]
Sent: Thursday, June 10, 2004 2:10 AM
To: fedora-selinux-list(a)redhat.com
Cc: Levine, Daniel J.
Subject: Re: Getting the user ID in log messages...
On Thu, 10 Jun 2004 01:02, "Levine, Daniel J." <Daniel.Levine(a)jhuapl.edu>
wrote:
> Explanation of log file messages) the example show the following scontext:
>
> scontext: faye:user_r:user_t
>
> This is great, as I would know to contact the user faye and ask about the
> situation. But on my Fedora Core 2 machine, my /var/log/messages
produces:
>
> scontext: user_u:user_r:user_t
In your users file in the SE Linux policy you need the following:
user dan roles user_r;
Then run "make load".
--
http://www.coker.com.au/selinux/ My NSA Security Enhanced Linux packages
http://www.coker.com.au/bonnie++/ Bonnie++ hard drive benchmark
http://www.coker.com.au/postal/ Postal SMTP/POP benchmark
http://www.coker.com.au/~russell/ My home page
20 years
canna .... still wants to access /tmp
by Tom London
Looks like the new policy (selinux-strict-policy-1.13.4-2) removes
access to tmp files in canna.te. But canna (Canna-0.3.7p3-2) still
wants to access /tmp/.
Are there new versions of the canna stuff coming that move the files
from /tmp elsewhere?
tom
Jun 8 09:32:06 dell kernel: audit(1086712326.043:0): avc: denied {
search } for pid=2094 exe=/usr/sbin/cannaserver name=tmp dev=hdb3
ino=278529 scontext=system_u:system_r:canna_t
tcontext=system_u:object_r:tmp_t tclass=dir
Jun 8 09:32:06 dell kernel: audit(1086712326.044:0): avc: denied {
search } for pid=2094 exe=/usr/sbin/cannaserver name=tmp dev=hdb3
ino=278529 scontext=system_u:system_r:canna_t
tcontext=system_u:object_r:tmp_t tclass=dir
Jun 8 09:32:06 dell cannaserver:
Jun 8 09:32:06 dell cannaserver: ERROR:
Jun 8 09:32:06 dell cannaserver: Another 'cannaserver' is detected.
Jun 8 09:32:06 dell cannaserver: If 'cannaserver' is not running,
Jun 8 09:32:06 dell cannaserver: "/tmp/.iroha_unix/IROHA" may remain
accidentally.
Jun 8 09:32:06 dell cannaserver: So, after making sure that
'cannaserver' is not running.
Jun 8 09:32:06 dell cannaserver: Please execute following command.
Jun 8 09:32:06 dell cannaserver:
Jun 8 09:32:06 dell cannaserver: rm
/tmp/.iroha_unix/IROHA Jun 8 09:32:06 dell cannaserver:
20 years
Getting the user ID in log messages...
by Levine, Daniel J.
His guys,
First let me start off by saying that I've been running Fedora Core 2 with
SELinux in permissive mode since a few days after it was released officially
with no real system problems.
That being said, I'm trying to understand how to do things properly to
maintain the integrity of the system and perform the auditing I desire. Is
there a good place to look which documents the SELinux relevant commands?
The Fedora Core 2 SELinux FAQ has some interesting info, but relatively few
commands. A Gentoo related site gave me some command ideas. Perhaps this
is on the documentation CD for Fedora Core 2, which I have yet to download?
I expected to be able to hunt through the man pages starting with man
selinux, but that didn't pan out. I found some other references online
called the Getting Started with SE Linux HOWTO and Gentoo SE Linux HOWTO,
but these offered some commands not available in the Fedora Core 2
implementation. To be more specific, I have been able to type "id" and
"newrole", but not able to type "rlpkg" and "run_init". Re-labeling a file
system is something they do with "cd /etc/security/selinux/src/plicy; make
relabel", but I was unable to find the equivalent.
I have a very specific issue that I'm trying to figure out. For some
reason, when a role violation (perhaps there's a better phrase) occurs and a
log message is produced in /var/log/messages, I would like see a user id and
the context. For example in "Getting Started with SE Linux HOWTO (7.
Explanation of log file messages) the example show the following scontext:
scontext: faye:user_r:user_t
This is great, as I would know to contact the user faye and ask about the
situation. But on my Fedora Core 2 machine, my /var/log/messages produces:
scontext: user_u:user_r:user_t
This is not so useful. As I have no idea who user_u is. I am using NIS for
this system. Typing "id" on my system produces:
uid=706(dan) gid=20(games) groups=20(games),501(test)
context=user_u:user_r:user_t
So I guess everything is consistent with the log entry as far as the system
is concerned. I just don't want a generic user_u to get filled in for
violations. I want the specific user id and name. Perhaps I need to
configure some more stuff for use with NIS?
Daniel J. Levine
Section Supervisor
Johns Hopkins University
Applied Physics Laboratory
443-778-3952 240-228-3952
20 years
Can not access files in own home directory
by David Balazic
Hi!
First, is SELinux supposed to work in Fedora Core 2 or is it in beta(alpha)
phase ?
Because I get a failure right 5 minutes after installation.
I did a SELinux enabled install of FC2 ( Workstation type ).
In firstboot I created a user.
The I tried to log in on VC2 as that user and it gave a SELinux access
denied error.
bash was denied access to /home/me/.bash_profile
The I issued a "ls -a" command and it could only list the file names, but
not the properties,
again, access was denied.
So is SELinux there to be used or to be yet developed ?
Or was this an accidental bug ?
Should I bugzilla it ?
Regards,
David
----------------------------------------------------------------------------
-----------
http://noepatents.org/ Innovation, not litigation !
---
David Balazic mailto:david.balazic@hermes.si
HERMES Softlab http://www.hermes-softlab.com
Zagrebska cesta 104 Phone: +386 2 450 8851
SI-2000 Maribor
Slovenija
----------------------------------------------------------------------------
-----------
"Be excellent to each other." -
Bill S. Preston, Esq. & "Ted" Theodore Logan
----------------------------------------------------------------------------
-----------
20 years
other avc denied messages
by Richard Hally
Attached is a syslog messages file that contains avc denied messages
from running in enforcing mode.
Near the beginning of this file there are avc messages from running 'yum
update' to pickup yesterdays updates. there were no errors reported by
yum/rpm during this update.
Further along in the file are some avc messages that were produced after
rebooting in enforcing mode with the "single" option on the kernel line,
doing a fixfiles relabel and then continuing to runlevel 5.
HTH
Richard Hally
[root@old1 richard]# rpm -q selinux-policy-strict
selinux-policy-strict-1.13.4-2
Jun 9 00:14:45 old1 syslogd 1.4.1: restart.
Jun 9 00:48:15 old1 kernel: audit(1086756495.137:0): avc: denied { search } for pid=8893 exe=/usr/sbin/useradd name=selinux dev=hdc3 ino=1750488 scontext=root:sysadm_r:useradd_t tcontext=system_u:object_r:selinux_config_t tclass=dir
Jun 9 00:48:51 old1 kernel: audit(1086756531.819:0): avc: granted { load_policy } for pid=8902 exe=/usr/sbin/load_policy scontext=root:sysadm_r:load_policy_t tcontext=system_u:object_r:security_t tclass=security
Jun 9 00:48:52 old1 kernel: security: 6 users, 7 roles, 1248 types, 1 bools
Jun 9 00:48:52 old1 kernel: security: 42 classes, 306765 rules
Jun 9 00:49:08 old1 xinetd[2095]: Starting reconfiguration
Jun 9 00:49:08 old1 xinetd: xinetd -HUP succeeded
Jun 9 00:49:13 old1 xinetd[2095]: Swapping defaults
Jun 9 00:49:13 old1 xinetd[2095]: Reconfigured: new=0 old=0 dropped=0 (services)
Jun 9 00:49:53 old1 kernel: audit(1086756592.987:0): avc: granted { load_policy } for pid=8977 exe=/usr/sbin/load_policy scontext=root:sysadm_r:load_policy_t tcontext=system_u:object_r:security_t tclass=security
Jun 9 00:49:53 old1 kernel: security: 6 users, 7 roles, 1257 types, 1 bools
Jun 9 00:49:53 old1 kernel: security: 42 classes, 310475 rules
Jun 9 00:49:53 old1 kernel: security: invalidating context system_u:object_r:netsaint_exec_t
Jun 9 00:49:53 old1 kernel: security: invalidating context system_u:object_r:netsaint_etc_t
Jun 9 00:49:53 old1 kernel: security: invalidating context system_u:object_r:netsaint_log_t
Jun 9 00:49:53 old1 kernel: security: invalidating context system_u:object_r:netsaint_cgi_exec_t
Jun 9 00:49:53 old1 kernel: security: invalidating context system_u:object_r:canna_tmp_t
Jun 9 00:51:25 old1 kernel: audit(1086756685.811:0): avc: denied { search } for pid=8985 exe=/usr/sbin/groupadd name=selinux dev=hdc3 ino=1750488 scontext=root:sysadm_r:groupadd_t tcontext=system_u:object_r:selinux_config_t tclass=dir
Jun 9 00:51:26 old1 kernel: audit(1086756686.216:0): avc: denied { search } for pid=8986 exe=/usr/sbin/groupadd name=selinux dev=hdc3 ino=1750488 scontext=root:sysadm_r:groupadd_t tcontext=system_u:object_r:selinux_config_t tclass=dir
Jun 9 00:51:26 old1 kernel: audit(1086756686.221:0): avc: denied { search } for pid=8987 exe=/usr/sbin/groupadd name=selinux dev=hdc3 ino=1750488 scontext=root:sysadm_r:groupadd_t tcontext=system_u:object_r:selinux_config_t tclass=dir
Jun 9 00:51:26 old1 kernel: audit(1086756686.350:0): avc: denied { search } for pid=8988 exe=/usr/sbin/useradd name=selinux dev=hdc3 ino=1750488 scontext=root:sysadm_r:useradd_t tcontext=system_u:object_r:selinux_config_t tclass=dir
Jun 9 00:54:34 old1 kernel: audit(1086756874.773:0): avc: denied { search } for pid=9388 exe=/usr/sbin/userdel name=selinux dev=hdc3 ino=1750488 scontext=root:sysadm_r:useradd_t tcontext=system_u:object_r:selinux_config_t tclass=dir
Jun 9 00:54:35 old1 kernel: audit(1086756875.387:0): avc: denied { search } for pid=9389 exe=/usr/sbin/useradd name=selinux dev=hdc3 ino=1750488 scontext=root:sysadm_r:useradd_t tcontext=system_u:object_r:selinux_config_t tclass=dir
Jun 9 00:55:50 old1 kernel: audit(1086756950.873:0): avc: denied { search } for pid=9445 exe=/usr/sbin/useradd name=selinux dev=hdc3 ino=1750488 scontext=root:sysadm_r:useradd_t tcontext=system_u:object_r:selinux_config_t tclass=dir
Jun 9 00:56:07 old1 xinetd[2095]: Starting reconfiguration
Jun 9 00:56:07 old1 xinetd: xinetd -HUP succeeded
Jun 9 00:56:10 old1 xinetd[2095]: Swapping defaults
Jun 9 00:56:10 old1 xinetd[2095]: Reconfigured: new=0 old=0 dropped=0 (services)
Jun 9 00:56:49 old1 cups: cupsd -HUP succeeded
Jun 9 00:56:51 old1 kernel: audit(1086757011.394:0): avc: denied { execute } for pid=9481 exe=/bin/bash name=epson dev=hdc3 ino=575379 scontext=system_u:system_r:cupsd_t tcontext=system_u:object_r:lib_t tclass=file
Jun 9 00:56:51 old1 kernel: audit(1086757011.532:0): avc: denied { execute } for pid=9482 exe=/bin/bash name=canon dev=hdc3 ino=575374 scontext=system_u:system_r:cupsd_t tcontext=system_u:object_r:lib_t tclass=file
Jun 9 01:01:48 old1 sshd: sshd -TERM succeeded
Jun 9 01:01:52 old1 sshd: succeeded
Jun 9 01:01:54 old1 bluetooth: hciattach shutdown failed
Jun 9 01:01:54 old1 kernel: Bluetooth: Core ver 2.5
Jun 9 01:01:54 old1 kernel: NET: Registered protocol family 31
Jun 9 01:01:54 old1 kernel: Bluetooth: HCI device and connection manager initialized
Jun 9 01:01:54 old1 kernel: Bluetooth: HCI socket layer initialized
Jun 9 01:01:54 old1 kernel: Bluetooth: L2CAP ver 2.2
Jun 9 01:01:54 old1 kernel: Bluetooth: L2CAP socket layer initialized
Jun 9 01:01:54 old1 kernel: Bluetooth: RFCOMM ver 1.3
Jun 9 01:01:54 old1 kernel: Bluetooth: RFCOMM socket layer initialized
Jun 9 01:01:54 old1 kernel: Bluetooth: RFCOMM TTY layer initialized
Jun 9 01:01:54 old1 bluetooth: sdpd shutdown failed
Jun 9 01:01:54 old1 bluetooth: hcid shutdown failed
Jun 9 01:02:32 old1 su(pam_unix)[8779]: session closed for user root
Jun 9 01:04:26 old1 gpm[2185]: *** info [mice.c(1766)]:
Jun 9 01:04:26 old1 gpm[2185]: imps2: Auto-detected intellimouse PS/2
Jun 9 01:04:35 old1 login(pam_unix)[2397]: session opened for user root by (uid=0)
Jun 9 01:04:35 old1 -- root[2397]: ROOT LOGIN ON tty1
Jun 9 01:04:46 old1 shutdown: shutting down for system reboot
Jun 9 01:04:46 old1 init: Switching to runlevel: 6
Jun 9 01:04:47 old1 login(pam_unix)[2397]: session closed for user root
Jun 9 01:04:48 old1 udev[9806]: removing device node '/udev/vcsa3'
Jun 9 01:04:51 old1 udev[9801]: removing device node '/udev/vcs3'
Jun 9 01:04:51 old1 udev[9807]: removing device node '/udev/vcs4'
Jun 9 01:04:51 old1 udev[9810]: removing device node '/udev/vcsa5'
Jun 9 01:04:51 old1 udev[9818]: removing device node '/udev/vcsa6'
Jun 9 01:04:51 old1 udev[9798]: removing device node '/udev/vcsa2'
Jun 9 01:04:51 old1 udev[9811]: removing device node '/udev/vcs6'
Jun 9 01:04:51 old1 udev[9795]: removing device node '/udev/vcs2'
Jun 9 01:04:51 old1 udev[9809]: removing device node '/udev/vcs5'
Jun 9 01:04:51 old1 udev[9808]: removing device node '/udev/vcsa4'
Jun 9 01:04:54 old1 gdm(pam_unix)[2852]: session closed for user richard
Jun 9 01:04:56 old1 messagebus: messagebus -TERM succeeded
Jun 9 01:04:57 old1 atd: atd shutdown succeeded
Jun 9 01:04:59 old1 privoxy: privoxy shutdown succeeded
Jun 9 01:05:01 old1 cups: cupsd shutdown succeeded
Jun 9 01:05:01 old1 udev[9916]: removing device node '/udev/vcsa7'
Jun 9 01:05:01 old1 udev[9905]: removing device node '/udev/vcs7'
Jun 9 01:05:01 old1 xfs[2287]: terminating
Jun 9 01:05:01 old1 xfs: xfs shutdown succeeded
Jun 9 01:05:02 old1 gpm: gpm shutdown succeeded
Jun 9 01:05:02 old1 sshd: sshd -TERM succeeded
Jun 9 01:05:03 old1 sendmail: sendmail shutdown succeeded
Jun 9 01:05:03 old1 sendmail: sm-client shutdown failed
Jun 9 01:05:04 old1 spamassassin: spamd shutdown succeeded
Jun 9 01:05:05 old1 lisa: lisa shutdown succeeded
Jun 9 01:05:05 old1 smartd[1930]: smartd received signal 15: Terminated
Jun 9 01:05:05 old1 smartd[1930]: smartd is exiting (exit status 0)
Jun 9 01:05:06 old1 smartd: smartd shutdown succeeded
Jun 9 01:05:06 old1 xinetd[2095]: Exiting...
Jun 9 01:05:06 old1 xinetd: xinetd shutdown succeeded
Jun 9 01:05:06 old1 crond: crond shutdown succeeded
Jun 9 01:05:07 old1 apmd[1890]: Exiting
Jun 9 01:05:08 old1 apmd: apmd shutdown succeeded
Jun 9 01:05:08 old1 ntpd: succeeded
Jun 9 01:05:08 old1 ntpd: succeeded
Jun 9 01:05:08 old1 ntpd[2119]: ntpd exiting on signal 15
Jun 9 01:05:08 old1 ntpd: ntpd shutdown succeeded
Jun 9 01:05:09 old1 dd: 1+0 records in
Jun 9 01:05:09 old1 dd: 1+0 records out
Jun 9 01:05:09 old1 random: Saving random seed: succeeded
Jun 9 01:05:09 old1 rpc.statd[1818]: Caught signal 15, un-registering and exiting.
Jun 9 01:05:10 old1 nfslock: rpc.statd shutdown succeeded
Jun 9 01:05:10 old1 portmap: portmap shutdown succeeded
Jun 9 01:05:10 old1 kernel: Kernel logging (proc) stopped.
Jun 9 01:05:10 old1 kernel: Kernel log daemon terminating.
Jun 9 01:05:12 old1 syslog: klogd shutdown succeeded
Jun 9 01:05:12 old1 exiting on signal 15
Jun 9 01:24:45 old1 syslogd 1.4.1: restart.
Jun 9 01:24:45 old1 syslog: syslogd startup succeeded
Jun 9 01:24:45 old1 syslog: klogd startup succeeded
Jun 9 01:24:45 old1 kernel: klogd 1.4.1, log source = /proc/kmsg started.
Jun 9 01:24:45 old1 kernel: Linux version 2.6.6-1.422 (bhcompile(a)porky.devel.redhat.com) (gcc version 3.3.3 20040412 (Red Hat Linux 3.3.3-7)) #1 Fri Jun 4 13:00:45 EDT 2004
Jun 9 01:24:45 old1 kernel: BIOS-provided physical RAM map:
Jun 9 01:24:45 old1 kernel: BIOS-e820: 0000000000000000 - 000000000009fc00 (usable)
Jun 9 01:24:45 old1 kernel: BIOS-e820: 000000000009fc00 - 00000000000a0000 (reserved)
Jun 9 01:24:45 old1 kernel: BIOS-e820: 00000000000e0000 - 0000000000100000 (reserved)
Jun 9 01:24:45 old1 kernel: BIOS-e820: 0000000000100000 - 0000000010000000 (usable)
Jun 9 01:24:45 old1 kernel: BIOS-e820: 00000000fec00000 - 00000000fec01000 (reserved)
Jun 9 01:24:45 old1 kernel: BIOS-e820: 00000000fee00000 - 00000000fee01000 (reserved)
Jun 9 01:24:45 old1 kernel: BIOS-e820: 00000000fffc0000 - 0000000100000000 (reserved)
Jun 9 01:24:45 old1 kernel: 0MB HIGHMEM available.
Jun 9 01:24:45 old1 kernel: 256MB LOWMEM available.
Jun 9 01:24:45 old1 kernel: zapping low mappings.
Jun 9 01:24:45 old1 kernel: On node 0 totalpages: 65536
Jun 9 01:24:45 old1 kernel: DMA zone: 4096 pages, LIFO batch:1
Jun 9 01:24:45 old1 kernel: Normal zone: 61440 pages, LIFO batch:15
Jun 9 01:24:45 old1 kernel: HighMem zone: 0 pages, LIFO batch:1
Jun 9 01:24:45 old1 kernel: DMI 2.1 present.
Jun 9 01:24:45 old1 kernel: ACPI disabled because your bios is from 00 and too old
Jun 9 01:24:45 old1 kernel: You can enable it with acpi=force
Jun 9 01:24:45 old1 kernel: Built 1 zonelists
Jun 9 01:24:45 old1 kernel: Kernel command line: ro root=LABEL=/1 rhgb selinux=1 single
Jun 9 01:24:45 old1 kernel: mapped 4G/4G trampoline to ffff3000.
Jun 9 01:24:45 old1 kernel: Initializing CPU#0
Jun 9 01:24:45 old1 kernel: CPU 0 irqstacks, hard=02346000 soft=02345000
Jun 9 01:24:45 old1 irqbalance: irqbalance startup succeeded
Jun 9 01:24:45 old1 kernel: PID hash table entries: 2048 (order 11: 16384 bytes)
Jun 9 01:24:45 old1 kernel: Detected 501.208 MHz processor.
Jun 9 01:24:45 old1 kernel: Using tsc for high-res timesource
Jun 9 01:24:45 old1 kernel: Console: colour VGA+ 80x25
Jun 9 01:24:45 old1 kernel: Memory: 256464k/262144k available (1548k kernel code, 4952k reserved, 607k data, 144k init, 0k highmem)
Jun 9 01:24:45 old1 kernel: Calibrating delay loop... 991.23 BogoMIPS
Jun 9 01:24:45 old1 kernel: Security Scaffold v1.0.0 initialized
Jun 9 01:24:45 old1 kernel: SELinux: Initializing.
Jun 9 01:24:45 old1 kernel: SELinux: Starting in permissive mode
Jun 9 01:24:45 old1 kernel: There is already a security framework initialized, register_security failed.
Jun 9 01:24:45 old1 kernel: selinux_register_security: Registering secondary module capability
Jun 9 01:24:45 old1 kernel: Capability LSM initialized as secondary
Jun 9 01:24:45 old1 kernel: Dentry cache hash table entries: 32768 (order: 5, 131072 bytes)
Jun 9 01:24:45 old1 kernel: Inode-cache hash table entries: 16384 (order: 4, 65536 bytes)
Jun 9 01:24:45 old1 kernel: Mount-cache hash table entries: 512 (order: 0, 4096 bytes)
Jun 9 01:24:45 old1 kernel: CPU: L1 I cache: 16K, L1 D cache: 16K
Jun 9 01:24:45 old1 kernel: CPU: L2 cache: 512K
Jun 9 01:24:45 old1 kernel: Intel machine check architecture supported.
Jun 9 01:24:45 old1 kernel: Intel machine check reporting enabled on CPU#0.
Jun 9 01:24:45 old1 kernel: CPU: Intel Pentium III (Katmai) stepping 03
Jun 9 01:24:45 old1 kernel: Enabling fast FPU save and restore... done.
Jun 9 01:24:45 old1 kernel: Enabling unmasked SIMD FPU exception support... done.
Jun 9 01:24:45 old1 kernel: Checking 'hlt' instruction... OK.
Jun 9 01:24:45 old1 kernel: checking if image is initramfs...it isn't (no cpio magic); looks like an initrd
Jun 9 01:24:45 old1 kernel: Freeing initrd memory: 187k freed
Jun 9 01:24:45 old1 kernel: NET: Registered protocol family 16
Jun 9 01:24:45 old1 kernel: PCI: PCI BIOS revision 2.10 entry at 0xfdb91, last bus=1
Jun 9 01:24:45 old1 kernel: PCI: Using configuration type 1
Jun 9 01:24:45 old1 kernel: mtrr: v2.0 (20020519)
Jun 9 01:24:45 old1 kernel: ACPI: Subsystem revision 20040326
Jun 9 01:24:45 old1 kernel: ACPI: Interpreter disabled.
Jun 9 01:24:45 old1 kernel: Linux Plug and Play Support v0.97 (c) Adam Belay
Jun 9 01:24:45 old1 kernel: usbcore: registered new driver usbfs
Jun 9 01:24:45 old1 kernel: usbcore: registered new driver hub
Jun 9 01:24:45 old1 kernel: PCI: Probing PCI hardware
Jun 9 01:24:45 old1 kernel: PCI: Probing PCI hardware (bus 00)
Jun 9 01:24:45 old1 kernel: PCI: Using IRQ router PIIX/ICH [8086/7110] at 0000:00:07.0
Jun 9 01:24:45 old1 kernel: vesafb: probe of vesafb0 failed with error -6
Jun 9 01:24:45 old1 kernel: apm: BIOS version 1.2 Flags 0x03 (Driver version 1.16ac)
Jun 9 01:24:45 old1 kernel: audit: initializing netlink socket (disabled)
Jun 9 01:24:45 old1 kernel: audit(1086743191.4294966944:0): initialized
Jun 9 01:24:45 old1 kernel: Total HugeTLB memory allocated, 0
Jun 9 01:24:45 old1 kernel: VFS: Disk quotas dquot_6.5.1
Jun 9 01:24:45 old1 kernel: Dquot-cache hash table entries: 1024 (order 0, 4096 bytes)
Jun 9 01:24:45 old1 kernel: SELinux: Registering netfilter hooks
Jun 9 01:24:45 old1 kernel: Initializing Cryptographic API
Jun 9 01:24:45 old1 kernel: Limiting direct PCI/PCI transfers.
Jun 9 01:24:45 old1 kernel: pci_hotplug: PCI Hot Plug PCI Core version: 0.5
Jun 9 01:24:45 old1 kernel: isapnp: Scanning for PnP cards...
Jun 9 01:24:45 old1 kernel: isapnp: No Plug & Play device found
Jun 9 01:24:45 old1 kernel: Real Time Clock Driver v1.12
Jun 9 01:24:45 old1 kernel: Linux agpgart interface v0.100 (c) Dave Jones
Jun 9 01:24:45 old1 kernel: agpgart: Detected an Intel 440BX Chipset.
Jun 9 01:24:45 old1 kernel: agpgart: Maximum main memory to use for agp memory: 204M
Jun 9 01:24:45 old1 kernel: agpgart: AGP aperture is 64M @ 0xf8000000
Jun 9 01:24:45 old1 kernel: Serial: 8250/16550 driver $Revision: 1.90 $ 8 ports, IRQ sharing enabled
Jun 9 01:24:45 old1 kernel: ttyS0 at I/O 0x3f8 (irq = 4) is a 16550A
Jun 9 01:24:45 old1 kernel: ttyS1 at I/O 0x2f8 (irq = 3) is a 16550A
Jun 9 01:24:45 old1 kernel: RAMDISK driver initialized: 16 RAM disks of 16384K size 1024 blocksize
Jun 9 01:24:45 old1 kernel: Uniform Multi-Platform E-IDE driver Revision: 7.00alpha2
Jun 9 01:24:45 old1 kernel: ide: Assuming 33MHz system bus speed for PIO modes; override with idebus=xx
Jun 9 01:24:45 old1 kernel: PIIX4: IDE controller at PCI slot 0000:00:07.1
Jun 9 01:24:45 old1 kernel: PIIX4: chipset revision 1
Jun 9 01:24:45 old1 portmap: portmap startup succeeded
Jun 9 01:24:45 old1 kernel: PIIX4: not 100%% native mode: will probe irqs later
Jun 9 01:24:45 old1 kernel: ide0: BM-DMA at 0xffa0-0xffa7, BIOS settings: hda:DMA, hdb:pio
Jun 9 01:24:45 old1 kernel: ide1: BM-DMA at 0xffa8-0xffaf, BIOS settings: hdc:DMA, hdd:DMA
Jun 9 01:24:45 old1 kernel: hda: ST313021A, ATA DISK drive
Jun 9 01:24:45 old1 kernel: Using cfq io scheduler
Jun 9 01:24:46 old1 kernel: ide0 at 0x1f0-0x1f7,0x3f6 on irq 14
Jun 9 01:24:46 old1 kernel: hdc: Maxtor 6E040L0, ATA DISK drive
Jun 9 01:24:46 old1 kernel: hdd: SAMSUNG DVD-ROM SD-608, ATAPI CD/DVD-ROM drive
Jun 9 01:24:46 old1 kernel: ide1 at 0x170-0x177,0x376 on irq 15
Jun 9 01:24:46 old1 kernel: hda: max request size: 128KiB
Jun 9 01:24:46 old1 rpc.statd[2093]: Version 1.0.6 Starting
Jun 9 01:24:46 old1 kernel: hda: 25434228 sectors (13022 MB) w/512KiB Cache, CHS=25232/16/63, UDMA(33)
Jun 9 01:24:46 old1 kernel: hda: hda1 hda2 hda3 hda4 < hda5 >
Jun 9 01:24:46 old1 nfslock: rpc.statd startup succeeded
Jun 9 01:24:46 old1 kernel: hdc: max request size: 128KiB
Jun 9 01:24:46 old1 kernel: hdc: 80293248 sectors (41110 MB) w/2048KiB Cache, CHS=65535/16/63, UDMA(33)
Jun 9 01:24:46 old1 kernel: hdc: hdc1 hdc2 hdc3 hdc4 < hdc5 >
Jun 9 01:24:46 old1 kernel: hdd: ATAPI 32X DVD-ROM drive, 512kB Cache, DMA
Jun 9 01:24:46 old1 kernel: Uniform CD-ROM driver Revision: 3.20
Jun 9 01:24:46 old1 kernel: ide-floppy driver 0.99.newide
Jun 9 01:24:46 old1 kernel: usbcore: registered new driver hiddev
Jun 9 01:24:46 old1 kernel: usbcore: registered new driver usbhid
Jun 9 01:24:46 old1 kernel: drivers/usb/input/hid-core.c: v2.0:USB HID core driver
Jun 9 01:24:46 old1 kernel: mice: PS/2 mouse device common for all mice
Jun 9 01:24:46 old1 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12
Jun 9 01:24:46 old1 kernel: input: PS/2 Generic Mouse on isa0060/serio1
Jun 9 01:24:46 old1 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1
Jun 9 01:24:46 old1 kernel: input: AT Translated Set 2 keyboard on isa0060/serio0
Jun 9 01:24:46 old1 kernel: md: md driver 0.90.0 MAX_MD_DEVS=256, MD_SB_DISKS=27
Jun 9 01:24:46 old1 kernel: NET: Registered protocol family 2
Jun 9 01:24:46 old1 kernel: IP: routing cache hash table of 2048 buckets, 16Kbytes
Jun 9 01:24:46 old1 kernel: TCP: Hash tables configured (established 16384 bind 32768)
Jun 9 01:24:46 old1 kernel: Initializing IPsec netlink socket
Jun 9 01:24:46 old1 kernel: NET: Registered protocol family 1
Jun 9 01:24:46 old1 kernel: NET: Registered protocol family 17
Jun 9 01:24:46 old1 kernel: md: Autodetecting RAID arrays.
Jun 9 01:24:46 old1 kernel: md: autorun ...
Jun 9 01:24:46 old1 kernel: md: ... autorun DONE.
Jun 9 01:24:46 old1 kernel: RAMDISK: Compressed image found at block 0
Jun 9 01:24:46 old1 kernel: VFS: Mounted root (ext2 filesystem).
Jun 9 01:24:46 old1 kernel: kjournald starting. Commit interval 5 seconds
Jun 9 01:24:46 old1 kernel: EXT3-fs: mounted filesystem with ordered data mode.
Jun 9 01:24:46 old1 kernel: Freeing unused kernel memory: 144k freed
Jun 9 01:24:46 old1 kernel: security: 6 users, 7 roles, 1257 types, 1 bools
Jun 9 01:24:46 old1 kernel: security: 42 classes, 310475 rules
Jun 9 01:24:46 old1 kernel: SELinux: Completing initialization.
Jun 9 01:24:46 old1 kernel: SELinux: Setting up existing superblocks.
Jun 9 01:24:46 old1 kernel: SELinux: initialized (dev selinuxfs, type selinuxfs), uses genfs_contexts
Jun 9 01:24:46 old1 kernel: SELinux: initialized (dev hdc3, type ext3), uses xattr
Jun 9 01:24:46 old1 kernel: SELinux: initialized (dev ram0, type ext2), uses xattr
Jun 9 01:24:46 old1 kernel: SELinux: initialized (dev mqueue, type mqueue), not configured for labeling
Jun 9 01:24:46 old1 kernel: SELinux: initialized (dev hugetlbfs, type hugetlbfs), not configured for labeling
Jun 9 01:24:46 old1 kernel: SELinux: initialized (dev devpts, type devpts), uses transition SIDs
Jun 9 01:24:46 old1 kernel: SELinux: initialized (dev eventpollfs, type eventpollfs), uses genfs_contexts
Jun 9 01:24:46 old1 kernel: SELinux: initialized (dev pipefs, type pipefs), uses task SIDs
Jun 9 01:24:46 old1 kernel: SELinux: initialized (dev tmpfs, type tmpfs), uses transition SIDs
Jun 9 01:24:46 old1 kernel: SELinux: initialized (dev futexfs, type futexfs), uses genfs_contexts
Jun 9 01:24:46 old1 kernel: SELinux: initialized (dev sockfs, type sockfs), uses task SIDs
Jun 9 01:24:46 old1 kernel: SELinux: initialized (dev proc, type proc), uses genfs_contexts
Jun 9 01:24:46 old1 kernel: SELinux: initialized (dev bdev, type bdev), uses genfs_contexts
Jun 9 01:24:46 old1 kernel: SELinux: initialized (dev rootfs, type rootfs), uses genfs_contexts
Jun 9 01:24:46 old1 kernel: SELinux: initialized (dev sysfs, type sysfs), uses genfs_contexts
Jun 9 01:24:46 old1 kernel: USB Universal Host Controller Interface driver v2.2
Jun 9 01:24:46 old1 kernel: PCI: Found IRQ 9 for device 0000:00:07.2
Jun 9 01:24:46 old1 kernel: PCI: Sharing IRQ 9 with 0000:00:0b.0
Jun 9 01:24:46 old1 kernel: uhci_hcd 0000:00:07.2: UHCI Host Controller
Jun 9 01:24:46 old1 kernel: uhci_hcd 0000:00:07.2: irq 9, io base 0000ef80
Jun 9 01:24:46 old1 kernel: SELinux: initialized (dev usbdevfs, type usbdevfs), uses genfs_contexts
Jun 9 01:24:46 old1 kernel: SELinux: initialized (dev usbfs, type usbfs), uses genfs_contexts
Jun 9 01:24:46 old1 kernel: uhci_hcd 0000:00:07.2: new USB bus registered, assigned bus number 1
Jun 9 01:24:46 old1 kernel: hub 1-0:1.0: USB hub found
Jun 9 01:24:46 old1 kernel: hub 1-0:1.0: 2 ports detected
Jun 9 01:24:46 old1 kernel: EXT3 FS on hdc3, internal journal
Jun 9 01:24:46 old1 kernel: device-mapper: 4.1.0-ioctl (2003-12-10) initialised: dm(a)uk.sistina.com
Jun 9 01:24:46 old1 kernel: cdrom: open failed.
Jun 9 01:24:46 old1 kernel: Adding 524120k swap on /dev/hdc5. Priority:-1 extents:1
Jun 9 01:24:46 old1 kernel: Adding 522072k swap on /dev/hda5. Priority:-2 extents:1
Jun 9 01:24:46 old1 kernel: kjournald starting. Commit interval 5 seconds
Jun 9 01:24:47 old1 kernel: EXT3 FS on hdc2, internal journal
Jun 9 01:24:47 old1 kernel: EXT3-fs: mounted filesystem with ordered data mode.
Jun 9 01:24:47 old1 kernel: SELinux: initialized (dev hdc2, type ext3), uses xattr
Jun 9 01:24:47 old1 kernel: SELinux: initialized (dev tmpfs, type tmpfs), uses transition SIDs
Jun 9 01:24:47 old1 kernel: IA-32 Microcode Update Driver: v1.13 <tigran(a)veritas.com>
Jun 9 01:24:47 old1 kernel: microcode: CPU0 already at revision 0xe (current=0xe)
Jun 9 01:24:47 old1 kernel: microcode: No new microdata for cpu 0
Jun 9 01:24:47 old1 kernel: parport0: PC-style at 0x378 [PCSPP,TRISTATE]
Jun 9 01:24:47 old1 kernel: SCSI subsystem initialized
Jun 9 01:24:47 old1 kernel: inserting floppy driver for 2.6.6-1.422
Jun 9 01:24:47 old1 kernel: Floppy drive(s): fd0 is 1.44M
Jun 9 01:24:47 old1 kernel: FDC 0 is a post-1991 82077
Jun 9 01:24:47 old1 kernel: Linux Tulip driver version 1.1.13 (May 11, 2002)
Jun 9 01:24:47 old1 kernel: PCI: Found IRQ 10 for device 0000:00:12.0
Jun 9 01:24:47 old1 kernel: tulip0: MII transceiver #1 config 1000 status 786d advertising 05e1.
Jun 9 01:24:47 old1 kernel: eth0: ADMtek Comet rev 17 at 0x1285a800, 00:20:78:11:A3:B7, IRQ 10.
Jun 9 01:24:47 old1 kernel: ip_tables: (C) 2000-2002 Netfilter core team
Jun 9 01:24:47 old1 kernel: ip_conntrack version 2.1 (2048 buckets, 16384 max) - 296 bytes per conntrack
Jun 9 01:24:47 old1 kernel: Linux Tulip driver version 1.1.13 (May 11, 2002)
Jun 9 01:24:47 old1 kernel: PCI: Found IRQ 10 for device 0000:00:12.0
Jun 9 01:24:47 old1 kernel: tulip0: MII transceiver #1 config 1000 status 786d advertising 05e1.
Jun 9 01:24:47 old1 kernel: eth0: ADMtek Comet rev 17 at 0x128fb800, 00:20:78:11:A3:B7, IRQ 10.
Jun 9 01:24:47 old1 kernel: eth0: Setting full-duplex based on MII#1 link partner capability of 45e1.
Jun 9 01:24:45 old1 ifup: done.
Jun 9 01:24:45 old1 network: Bringing up interface eth0: succeeded
Jun 9 01:24:52 old1 kernel: SELinux: initialized (dev rpc_pipefs, type rpc_pipefs), uses genfs_contexts
Jun 9 01:24:52 old1 rpcidmapd: rpc.idmapd startup succeeded
Jun 9 01:24:52 old1 random: Initializing random number generator: succeeded
Jun 9 01:24:52 old1 netfs: Mounting other filesystems: succeeded
Jun 9 01:24:52 old1 apmd[2165]: Version 3.0.2 (APM BIOS 1.2, Linux driver 1.16ac)
Jun 9 01:24:52 old1 apmd: apmd startup succeeded
Jun 9 01:24:53 old1 autofs: automount startup succeeded
Jun 9 01:24:53 old1 smartd[2203]: smartd version 5.30 Copyright (C) 2002-4 Bruce Allen
Jun 9 01:24:53 old1 smartd[2203]: Home page is http://smartmontools.sourceforge.net/
Jun 9 01:24:53 old1 smartd[2203]: Opened configuration file /etc/smartd.conf
Jun 9 01:24:53 old1 smartd[2203]: Configuration file /etc/smartd.conf parsed.
Jun 9 01:24:53 old1 smartd[2203]: Device: /dev/hda, opened
Jun 9 01:24:53 old1 smartd[2203]: Device: /dev/hda, not found in smartd database.
Jun 9 01:24:53 old1 smartd[2203]: Device: /dev/hda, is SMART capable. Adding to "monitor" list.
Jun 9 01:24:53 old1 smartd[2203]: Monitoring 1 ATA and 0 SCSI devices
Jun 9 01:24:53 old1 smartd[2205]: smartd has fork()ed into background mode. New PID=2205.
Jun 9 01:24:53 old1 smartd: smartd startup succeeded
Jun 9 01:24:54 old1 apmd[2165]: Charge: * * * (-1% unknown)
Jun 9 01:24:55 old1 kernel: parport0: PC-style at 0x378 [PCSPP,TRISTATE]
Jun 9 01:24:55 old1 kernel: lp0: using parport0 (polling).
Jun 9 01:24:55 old1 kernel: lp0: console ready
Jun 9 01:24:58 old1 kernel: drivers/usb/serial/usb-serial.c: USB Serial support registered for Generic
Jun 9 01:24:58 old1 kernel: usbcore: registered new driver usbserial
Jun 9 01:24:58 old1 kernel: drivers/usb/serial/usb-serial.c: USB Serial Driver core v2.0
Jun 9 01:24:59 old1 cups: cupsd startup succeeded
Jun 9 01:25:00 old1 kernel: NET: Registered protocol family 10
Jun 9 01:25:00 old1 kernel: Disabled Privacy Extensions on device 022deac0(lo)
Jun 9 01:25:00 old1 kernel: IPv6 over IPv4 tunneling driver
Jun 9 01:25:00 old1 sshd: succeeded
Jun 9 01:25:00 old1 xinetd: xinetd startup succeeded
Jun 9 01:25:00 old1 ntpd: succeeded
Jun 9 01:25:00 old1 ntpd: succeeded
Jun 9 01:25:00 old1 xinetd[2392]: xinetd Version 2.3.13 started with libwrap loadavg options compiled in.
Jun 9 01:25:00 old1 xinetd[2392]: Started working: 0 available services
Jun 9 01:25:01 old1 ntpdate[2412]: step time server 209.132.176.4 offset -0.386053 sec
Jun 9 01:25:01 old1 ntpd: succeeded
Jun 9 01:25:01 old1 ntpd[2416]: ntpd 4.2.0(a)1.1161-r Thu Mar 11 11:46:39 EST 2004 (1)
Jun 9 01:25:01 old1 ntpd: ntpd startup succeeded
Jun 9 01:25:01 old1 ntpd[2416]: precision = 2.000 usec
Jun 9 01:25:01 old1 ntpd[2416]: kernel time sync status 0040
Jun 9 01:25:01 old1 ntpd[2416]: frequency initialized 92.348 PPM from /var/lib/ntp/drift
Jun 9 01:25:01 old1 ntpd[2416]: configure: keyword "authenticate" unknown, line ignored
Jun 9 01:25:02 old1 sendmail: sendmail startup succeeded
Jun 9 01:25:02 old1 sendmail: sm-client startup succeeded
Jun 9 01:25:05 old1 udev[2456]: creating device node '/udev/lp0'
Jun 9 01:25:05 old1 kernel: audit(1086758705.111:0): avc: denied { execute } for pid=2463 exe=/bin/bash name=net.agent dev=hdc3 ino=1733450 scontext=system_u:system_r:udev_t tcontext=system_u:object_r:hotplug_etc_t tclass=file
Jun 9 01:25:06 old1 spamassassin: spamd startup succeeded
Jun 9 01:25:07 old1 privoxy: Jun 09 01:25:07 Privoxy(-150888320) Info: loading configuration file '/etc/privoxy/config':
Jun 9 01:25:08 old1 privoxy: privoxy startup succeeded
Jun 9 01:25:08 old1 gpm[2492]: *** info [startup.c(95)]:
Jun 9 01:25:08 old1 gpm[2492]: Started gpm successfully. Entered daemon mode.
Jun 9 01:25:08 old1 gpm[2492]: *** info [mice.c(1766)]:
Jun 9 01:25:08 old1 gpm[2492]: imps2: Auto-detected intellimouse PS/2
Jun 9 01:25:08 old1 gpm: gpm startup succeeded
Jun 9 01:25:09 old1 su(pam_unix)[2507]: session opened for user postgres by (uid=0)
Jun 9 01:25:10 old1 su(pam_unix)[2507]: session closed for user postgres
Jun 9 01:25:10 old1 kernel: audit(1086758710.518:0): avc: denied { write } for pid=2537 exe=/usr/bin/postgres name=data dev=hdc3 ino=2405976 scontext=user_u:user_r:user_t tcontext=system_u:object_r:var_lib_t tclass=dir
Jun 9 01:25:10 old1 kernel: audit(1086758710.518:0): avc: denied { write } for pid=2537 exe=/usr/bin/postgres name=data dev=hdc3 ino=2405976 scontext=user_u:user_r:user_t tcontext=system_u:object_r:var_lib_t tclass=dir
Jun 9 01:25:10 old1 kernel: audit(1086758710.519:0): avc: denied { write } for pid=2537 exe=/usr/bin/postgres name=data dev=hdc3 ino=2405976 scontext=user_u:user_r:user_t tcontext=system_u:object_r:var_lib_t tclass=dir
Jun 9 01:25:10 old1 kernel: audit(1086758710.520:0): avc: denied { write } for pid=2537 exe=/usr/bin/postgres name=data dev=hdc3 ino=2405976 scontext=user_u:user_r:user_t tcontext=system_u:object_r:var_lib_t tclass=dir
Jun 9 01:25:10 old1 last message repeated 2 times
Jun 9 01:25:10 old1 kernel: audit(1086758710.521:0): avc: denied { write } for pid=2537 exe=/usr/bin/postgres name=data dev=hdc3 ino=2405976 scontext=user_u:user_r:user_t tcontext=system_u:object_r:var_lib_t tclass=dir
Jun 9 01:25:10 old1 last message repeated 2 times
Jun 9 01:25:10 old1 kernel: audit(1086758710.522:0): avc: denied { write } for pid=2537 exe=/usr/bin/postgres name=data dev=hdc3 ino=2405976 scontext=user_u:user_r:user_t tcontext=system_u:object_r:var_lib_t tclass=dir
Jun 9 01:25:10 old1 last message repeated 2 times
Jun 9 01:25:10 old1 kernel: audit(1086758710.523:0): avc: denied { write } for pid=2537 exe=/usr/bin/postgres name=data dev=hdc3 ino=2405976 scontext=user_u:user_r:user_t tcontext=system_u:object_r:var_lib_t tclass=dir
Jun 9 01:25:10 old1 last message repeated 4 times
Jun 9 01:25:10 old1 kernel: audit(1086758710.524:0): avc: denied { write } for pid=2537 exe=/usr/bin/postgres name=data dev=hdc3 ino=2405976 scontext=user_u:user_r:user_t tcontext=system_u:object_r:var_lib_t tclass=dir
Jun 9 01:25:10 old1 kernel: audit(1086758710.524:0): avc: denied { write } for pid=2537 exe=/usr/bin/postgres name=data dev=hdc3 ino=2405976 scontext=user_u:user_r:user_t tcontext=system_u:object_r:var_lib_t tclass=dir
Jun 9 01:25:10 old1 kernel: audit(1086758710.525:0): avc: denied { write } for pid=2537 exe=/usr/bin/postgres name=data dev=hdc3 ino=2405976 scontext=user_u:user_r:user_t tcontext=system_u:object_r:var_lib_t tclass=dir
Jun 9 01:25:10 old1 last message repeated 2 times
Jun 9 01:25:10 old1 kernel: audit(1086758710.526:0): avc: denied { write } for pid=2537 exe=/usr/bin/postgres name=data dev=hdc3 ino=2405976 scontext=user_u:user_r:user_t tcontext=system_u:object_r:var_lib_t tclass=dir
Jun 9 01:25:10 old1 kernel: audit(1086758710.526:0): avc: denied { write } for pid=2537 exe=/usr/bin/postgres name=data dev=hdc3 ino=2405976 scontext=user_u:user_r:user_t tcontext=system_u:object_r:var_lib_t tclass=dir
Jun 9 01:25:10 old1 kernel: audit(1086758710.527:0): avc: denied { write } for pid=2537 exe=/usr/bin/postgres name=data dev=hdc3 ino=2405976 scontext=user_u:user_r:user_t tcontext=system_u:object_r:var_lib_t tclass=dir
Jun 9 01:25:10 old1 last message repeated 4 times
Jun 9 01:25:10 old1 kernel: audit(1086758710.528:0): avc: denied { write } for pid=2537 exe=/usr/bin/postgres name=data dev=hdc3 ino=2405976 scontext=user_u:user_r:user_t tcontext=system_u:object_r:var_lib_t tclass=dir
Jun 9 01:25:10 old1 last message repeated 4 times
Jun 9 01:25:10 old1 kernel: audit(1086758710.529:0): avc: denied { write } for pid=2537 exe=/usr/bin/postgres name=data dev=hdc3 ino=2405976 scontext=user_u:user_r:user_t tcontext=system_u:object_r:var_lib_t tclass=dir
Jun 9 01:25:10 old1 last message repeated 4 times
Jun 9 01:25:10 old1 kernel: audit(1086758710.530:0): avc: denied { write } for pid=2537 exe=/usr/bin/postgres name=data dev=hdc3 ino=2405976 scontext=user_u:user_r:user_t tcontext=system_u:object_r:var_lib_t tclass=dir
Jun 9 01:25:10 old1 last message repeated 4 times
Jun 9 01:25:10 old1 kernel: audit(1086758710.531:0): avc: denied { write } for pid=2537 exe=/usr/bin/postgres name=data dev=hdc3 ino=2405976 scontext=user_u:user_r:user_t tcontext=system_u:object_r:var_lib_t tclass=dir
Jun 9 01:25:10 old1 last message repeated 3 times
Jun 9 01:25:10 old1 kernel: audit(1086758710.532:0): avc: denied { write } for pid=2537 exe=/usr/bin/postgres name=data dev=hdc3 ino=2405976 scontext=user_u:user_r:user_t tcontext=system_u:object_r:var_lib_t tclass=dir
Jun 9 01:25:10 old1 last message repeated 4 times
Jun 9 01:25:10 old1 kernel: audit(1086758710.533:0): avc: denied { write } for pid=2537 exe=/usr/bin/postgres name=data dev=hdc3 ino=2405976 scontext=user_u:user_r:user_t tcontext=system_u:object_r:var_lib_t tclass=dir
Jun 9 01:25:10 old1 last message repeated 6 times
Jun 9 01:25:10 old1 kernel: audit(1086758710.534:0): avc: denied { write } for pid=2537 exe=/usr/bin/postgres name=data dev=hdc3 ino=2405976 scontext=user_u:user_r:user_t tcontext=system_u:object_r:var_lib_t tclass=dir
Jun 9 01:25:10 old1 last message repeated 4 times
Jun 9 01:25:10 old1 kernel: audit(1086758710.535:0): avc: denied { write } for pid=2537 exe=/usr/bin/postgres name=data dev=hdc3 ino=2405976 scontext=user_u:user_r:user_t tcontext=system_u:object_r:var_lib_t tclass=dir
Jun 9 01:25:10 old1 kernel: audit(1086758710.535:0): avc: denied { write } for pid=2537 exe=/usr/bin/postgres name=data dev=hdc3 ino=2405976 scontext=user_u:user_r:user_t tcontext=system_u:object_r:var_lib_t tclass=dir
Jun 9 01:25:10 old1 kernel: audit(1086758710.538:0): avc: denied { write } for pid=2537 exe=/usr/bin/postgres name=data dev=hdc3 ino=2405976 scontext=user_u:user_r:user_t tcontext=system_u:object_r:var_lib_t tclass=dir
Jun 9 01:25:10 old1 last message repeated 5 times
Jun 9 01:25:10 old1 kernel: audit(1086758710.539:0): avc: denied { write } for pid=2537 exe=/usr/bin/postgres name=data dev=hdc3 ino=2405976 scontext=user_u:user_r:user_t tcontext=system_u:object_r:var_lib_t tclass=dir
Jun 9 01:25:10 old1 last message repeated 6 times
Jun 9 01:25:10 old1 kernel: audit(1086758710.540:0): avc: denied { write } for pid=2537 exe=/usr/bin/postgres name=data dev=hdc3 ino=2405976 scontext=user_u:user_r:user_t tcontext=system_u:object_r:var_lib_t tclass=dir
Jun 9 01:25:10 old1 last message repeated 3 times
Jun 9 01:25:10 old1 kernel: audit(1086758710.541:0): avc: denied { write } for pid=2537 exe=/usr/bin/postgres name=data dev=hdc3 ino=2405976 scontext=user_u:user_r:user_t tcontext=system_u:object_r:var_lib_t tclass=dir
Jun 9 01:25:10 old1 kernel: audit(1086758710.541:0): avc: denied { write } for pid=2537 exe=/usr/bin/postgres name=data dev=hdc3 ino=2405976 scontext=user_u:user_r:user_t tcontext=system_u:object_r:var_lib_t tclass=dir
Jun 9 01:25:10 old1 kernel: audit(1086758710.542:0): avc: denied { write } for pid=2537 exe=/usr/bin/postgres name=data dev=hdc3 ino=2405976 scontext=user_u:user_r:user_t tcontext=system_u:object_r:var_lib_t tclass=dir
Jun 9 01:25:10 old1 last message repeated 3 times
Jun 9 01:25:10 old1 kernel: audit(1086758710.543:0): avc: denied { write } for pid=2537 exe=/usr/bin/postgres name=data dev=hdc3 ino=2405976 scontext=user_u:user_r:user_t tcontext=system_u:object_r:var_lib_t tclass=dir
Jun 9 01:25:10 old1 last message repeated 4 times
Jun 9 01:25:10 old1 kernel: audit(1086758710.544:0): avc: denied { write } for pid=2537 exe=/usr/bin/postgres name=data dev=hdc3 ino=2405976 scontext=user_u:user_r:user_t tcontext=system_u:object_r:var_lib_t tclass=dir
Jun 9 01:25:10 old1 last message repeated 4 times
Jun 9 01:25:10 old1 kernel: audit(1086758710.545:0): avc: denied { write } for pid=2537 exe=/usr/bin/postgres name=data dev=hdc3 ino=2405976 scontext=user_u:user_r:user_t tcontext=system_u:object_r:var_lib_t tclass=dir
Jun 9 01:25:10 old1 kernel: audit(1086758710.545:0): avc: denied { write } for pid=2537 exe=/usr/bin/postgres name=data dev=hdc3 ino=2405976 scontext=user_u:user_r:user_t tcontext=system_u:object_r:var_lib_t tclass=dir
Jun 9 01:25:11 old1 postgresql: Starting postgresql service: failed
Jun 9 01:25:11 old1 crond: crond startup succeeded
Jun 9 01:25:12 old1 xfs: xfs startup succeeded
Jun 9 01:25:13 old1 lisa: lisa startup succeeded
Jun 9 01:25:13 old1 anacron: anacron startup succeeded
Jun 9 01:25:13 old1 atd: atd startup succeeded
Jun 9 01:25:13 old1 readahead: Starting background readahead:
Jun 9 01:25:14 old1 rc: Starting readahead: succeeded
Jun 9 01:25:15 old1 messagebus: messagebus startup succeeded
Jun 9 01:25:16 old1 udev[2803]: creating device node '/udev/vcsa2'
Jun 9 01:25:16 old1 udev[2806]: creating device node '/udev/vcsa3'
Jun 9 01:25:16 old1 udev[2810]: creating device node '/udev/vcsa4'
Jun 9 01:25:16 old1 udev[2664]: creating device node '/udev/vcs2'
Jun 9 01:25:16 old1 udev[2811]: creating device node '/udev/vcsa5'
Jun 9 01:25:16 old1 udev[2672]: creating device node '/udev/vcs3'
Jun 9 01:25:16 old1 udev[2680]: creating device node '/udev/vcs4'
Jun 9 01:25:16 old1 udev[2688]: creating device node '/udev/vcs5'
Jun 9 01:25:19 old1 udev[2858]: creating device node '/udev/vcs6'
Jun 9 01:25:19 old1 udev[2865]: creating device node '/udev/vcsa6'
Jun 9 01:25:23 old1 udev[2847]: removing device node '/udev/vcs5'
Jun 9 01:25:23 old1 udev[2953]: creating device node '/udev/vcs5'
Jun 9 01:25:24 old1 udev[2911]: removing device node '/udev/vcs3'
Jun 9 01:25:24 old1 udev[2898]: removing device node '/udev/vcsa2'
Jun 9 01:25:24 old1 udev[2959]: creating device node '/udev/vcs3'
Jun 9 01:25:24 old1 udev[2960]: creating device node '/udev/vcsa2'
Jun 9 01:25:25 old1 udev[2917]: removing device node '/udev/vcs6'
Jun 9 01:25:26 old1 udev[2927]: removing device node '/udev/vcs4'
Jun 9 01:25:25 old1 udev[2932]: removing device node '/udev/vcsa4'
Jun 9 01:25:26 old1 udev[2937]: removing device node '/udev/vcsa5'
Jun 9 01:25:26 old1 udev[2922]: removing device node '/udev/vcsa6'
Jun 9 01:25:26 old1 udev[2943]: removing device node '/udev/vcs2'
Jun 9 01:25:26 old1 udev[2969]: creating device node '/udev/vcs6'
Jun 9 01:25:26 old1 udev[2948]: removing device node '/udev/vcsa3'
Jun 9 01:25:26 old1 udev[2970]: creating device node '/udev/vcs4'
Jun 9 01:25:26 old1 udev[2971]: creating device node '/udev/vcsa4'
Jun 9 01:25:26 old1 udev[2972]: creating device node '/udev/vcsa5'
Jun 9 01:25:26 old1 udev[2973]: creating device node '/udev/vcsa6'
Jun 9 01:25:26 old1 udev[2974]: creating device node '/udev/vcs2'
Jun 9 01:25:26 old1 udev[2983]: creating device node '/udev/vcsa3'
Jun 9 01:25:34 old1 udev[3046]: creating device node '/udev/vcs7'
Jun 9 01:25:34 old1 udev[3053]: creating device node '/udev/vcsa7'
Jun 9 01:25:36 old1 udev[3087]: removing device node '/udev/vcs7'
Jun 9 01:25:36 old1 udev[3092]: removing device node '/udev/vcsa7'
Jun 9 01:25:36 old1 udev[3097]: creating device node '/udev/vcs7'
Jun 9 01:25:36 old1 udev[3098]: creating device node '/udev/vcsa7'
Jun 9 01:25:46 old1 kernel: [drm] Initialized r128 2.5.0 20030725 on minor 0:
Jun 9 01:25:46 old1 kernel: agpgart: Found an AGP 1.0 compliant device at 0000:00:00.0.
Jun 9 01:25:46 old1 kernel: agpgart: Putting AGP V2 device at 0000:00:00.0 into 1x mode
Jun 9 01:25:46 old1 kernel: agpgart: Putting AGP V2 device at 0000:01:00.0 into 1x mode
Jun 9 01:25:47 old1 udev[3131]: creating device node '/udev/r128'
Jun 9 01:26:07 old1 gdm(pam_unix)[3039]: session opened for user richard by (uid=0)
Jun 9 01:26:19 old1 udev[3225]: configured rule in '/etc/udev/rules.d//50-udev.rules' at line 15 applied, 'controlC0' becomes 'snd/%k'
Jun 9 01:26:19 old1 udev[3225]: creating device node '/udev/snd/controlC0'
Jun 9 01:26:19 old1 kernel: PCI: Found IRQ 9 for device 0000:00:0b.0
Jun 9 01:26:19 old1 kernel: PCI: Sharing IRQ 9 with 0000:00:07.2
Jun 9 01:26:20 old1 udev[3288]: configured rule in '/etc/udev/rules.d//50-udev.rules' at line 17 applied, 'pcmC0D1p' becomes 'snd/%k'
Jun 9 01:26:20 old1 udev[3288]: creating device node '/udev/snd/pcmC0D1p'
Jun 9 01:26:20 old1 udev[3289]: configured rule in '/etc/udev/rules.d//50-udev.rules' at line 17 applied, 'pcmC0D0p' becomes 'snd/%k'
Jun 9 01:26:20 old1 udev[3289]: creating device node '/udev/snd/pcmC0D0p'
Jun 9 01:26:20 old1 udev[3290]: configured rule in '/etc/udev/rules.d//50-udev.rules' at line 17 applied, 'pcmC0D0c' becomes 'snd/%k'
Jun 9 01:26:20 old1 udev[3290]: creating device node '/udev/snd/pcmC0D0c'
Jun 9 01:26:20 old1 udev[3234]: configured rule in '/etc/udev/rules.d//50-udev.rules' at line 19 applied, 'timer' becomes 'snd/%k'
Jun 9 01:26:20 old1 udev[3234]: creating device node '/udev/snd/timer'
Jun 9 01:26:20 old1 udev[3247]: configured rule in '/etc/udev/rules.d//50-udev.rules' at line 18 applied, 'midiC0D0' becomes 'snd/%k'
Jun 9 01:26:20 old1 udev[3247]: creating device node '/udev/snd/midiC0D0'
Jun 9 01:26:20 old1 udev[3268]: configured rule in '/etc/udev/rules.d//50-udev.rules' at line 17 applied, 'pcmC0D2p' becomes 'snd/%k'
Jun 9 01:26:20 old1 udev[3268]: creating device node '/udev/snd/pcmC0D2p'
Jun 9 01:26:20 old1 udev[3254]: creating device node '/udev/midi'
Jun 9 01:26:20 old1 udev[3261]: creating device node '/udev/dmmidi'
Jun 9 01:26:23 old1 udev[3334]: creating device node '/udev/mixer'
Jun 9 01:27:01 old1 su(pam_unix)[3446]: session opened for user root by richard(uid=500)
Jun 9 01:29:27 old1 ntpd[2416]: synchronized to 209.132.176.4, stratum=1
Jun 9 01:33:44 old1 ntpd[2416]: kernel time sync disabled 0041
Jun 9 01:35:53 old1 ntpd[2416]: kernel time sync enabled 0001
20 years
enforcing mode update errors
by Richard Hally
Below are the error messages from running 'yum update' today while in
enforcing mode.
Perhaps this will be helpful to someone.
warning: /etc/selinux/strict/contexts/files/file_contexts created as
/etc/selinux/strict/contexts/files/file_contexts.rpmnew
selinux-policy-striwarning: /etc/selinux/strict/policy/policy.17 created
as /etc/selinux/strict/policy/policy.17.rpmnew
selinux-policy-strict 100 % done 16/116
Can't open '/etc/selinux/strict/policy/policy.17': Permission denied
warning: /etc/selinux/targeted/contexts/files/file_contexts created as
/etc/selinux/targeted/contexts/files/file_contexts.rpmnew
selinux-policy-targeted 100 % done 17/116
python-tools 100 % done 18/116
apr-devel 100 % done 19/116
dietlibc 100 % done 20/116
selinux-policy-strict-sources 100 % done 21/116
make: Entering directory `/etc/selinux/strict/src/policy'
/usr/sbin/load_policy /etc/selinux/strict/policy/policy.`cat
/selinux/policyvers`
Can't open '/etc/selinux/strict/policy/policy.17': Permission denied
make: *** [tmp/load] Error 2
make: Leaving directory `/etc/selinux/strict/src/policy'
gimp-print-cups 100 % done 22/116
HTH
Richard Hally
20 years
Re: enforcing mode problems
by Tom London
Did you remember to do a 'fixfiles relabel' after installing the new
policy files?
If not, I suggest you reboot single-user mode, and then run 'fixfiles
relabel'. You probably want fixfiles to clean out /tmp, so move/copy
anything you need before running it.
tom
------------------------------------------------------------------------
* /From/: Richard Hally <rhally mindspring com>
* /To/: fedora-selinux-list redhat com
* /Subject/: enforcing mode problems
* /Date/: Tue, 08 Jun 2004 22:43:44 -0400
------------------------------------------------------------------------
when running with the latest "strict" policy in enforcing mode, 'su -'
does not work.
[richard new2 richard]$ su -
Password:
could not open session
(ctrl-alt-f1 to a console, switch to permissive)
[richard new2 richard]$ su -
Password:
[root new2 root]#
It works but does't ask if I want a different context.
When I went to the console it asked if I wanted a different context.
Attached is the syslog messages file.
Please see the attached messages file for other "AVC denied" messages as
well.
HTH
Richard Hally
p.s.
[root new2 root]# rpm -q selinux-policy-strict
selinux-policy-strict-1.13.4-2
20 years
enforcing mode problems
by Richard Hally
when running with the latest "strict" policy in enforcing mode, 'su -'
does not work.
[richard@new2 richard]$ su -
Password:
could not open session
(ctrl-alt-f1 to a console, switch to permissive)
[richard@new2 richard]$ su -
Password:
[root@new2 root]#
It works but does't ask if I want a different context.
When I went to the console it asked if I wanted a different context.
Attached is the syslog messages file.
Please see the attached messages file for other "AVC denied" messages
as well.
HTH
Richard Hally
p.s.
[root@new2 root]# rpm -q selinux-policy-strict
selinux-policy-strict-1.13.4-2
Jun 8 17:25:52 new2 syslogd 1.4.1: restart.
Jun 8 17:30:46 new2 kernel: audit(1086730246.059:0): avc: denied { getattr } for pid=5231 exe=/usr/lib/mozilla-1.6/mozilla-bin path=/var dev=hda2 ino=423489 scontext=richard:staff_r:staff_mozilla_t tcontext=system_u:object_r:var_t tclass=dir
Jun 8 17:30:46 new2 kernel: audit(1086730246.059:0): avc: denied { getattr } for pid=5231 exe=/usr/lib/mozilla-1.6/mozilla-bin path=/var/log dev=hda2 ino=423510 scontext=richard:staff_r:staff_mozilla_t tcontext=system_u:object_r:var_log_t tclass=dir
Jun 8 17:30:46 new2 kernel: audit(1086730246.059:0): avc: denied { search } for pid=5231 exe=/usr/lib/mozilla-1.6/mozilla-bin name=log dev=hda2 ino=423510 scontext=richard:staff_r:staff_mozilla_t tcontext=system_u:object_r:var_log_t tclass=dir
Jun 8 17:30:46 new2 kernel: audit(1086730246.059:0): avc: denied { getattr } for pid=5231 exe=/usr/lib/mozilla-1.6/mozilla-bin path=/var/log/messages.1 dev=hda2 ino=430695 scontext=richard:staff_r:staff_mozilla_t tcontext=system_u:object_r:var_log_t tclass=file
Jun 8 17:39:55 new2 kernel: audit(1086730795.765:0): avc: denied { search } for pid=5352 exe=/bin/su dev=selinuxfs ino=819 scontext=system_u:system_r:system_crond_t tcontext=system_u:object_r:security_t tclass=dir
Jun 8 17:39:55 new2 kernel: audit(1086730795.765:0): avc: denied { read write } for pid=5352 exe=/bin/su name=access dev=selinuxfs ino=6 scontext=system_u:system_r:system_crond_t tcontext=system_u:object_r:security_t tclass=file
Jun 8 17:39:55 new2 kernel: audit(1086730795.765:0): avc: denied { compute_av } for pid=5352 exe=/bin/su scontext=system_u:system_r:system_crond_t tcontext=system_u:object_r:security_t tclass=security
Jun 8 17:39:55 new2 kernel: audit(1086730795.862:0): avc: denied { sys_nice } for pid=5352 exe=/bin/su capability=23 scontext=system_u:system_r:system_crond_t tcontext=system_u:system_r:system_crond_t tclass=capability
Jun 8 17:39:55 new2 su(pam_unix)[5352]: session opened for user cyrus by (uid=0)
Jun 8 17:39:55 new2 kernel: audit(1086730795.862:0): avc: denied { compute_user } for pid=5352 exe=/bin/su scontext=system_u:system_r:system_crond_t tcontext=system_u:object_r:security_t tclass=security
Jun 8 17:39:55 new2 kernel: audit(1086730795.877:0): avc: denied { check_context } for pid=5352 exe=/bin/su scontext=system_u:system_r:system_crond_t tcontext=system_u:object_r:security_t tclass=security
Jun 8 17:39:55 new2 su[5352]: Unable to get valid context for cyrus, No valid tty
Jun 8 17:39:56 new2 kernel: audit(1086730796.124:0): avc: denied { read } for pid=5359 exe=/usr/sbin/logrotate name=config dev=hda2 ino=914871 scontext=system_u:system_r:logrotate_t tcontext=system_u:object_r:selinux_config_t tclass=file
Jun 8 17:39:56 new2 kernel: audit(1086730796.124:0): avc: denied { getattr } for pid=5359 exe=/usr/sbin/logrotate path=/etc/selinux/config dev=hda2 ino=914871 scontext=system_u:system_r:logrotate_t tcontext=system_u:object_r:selinux_config_t tclass=file
Jun 8 17:40:14 new2 kernel: audit(1086730814.726:0): avc: denied { write } for pid=5463 exe=/bin/rm name=etc dev=hda2 ino=863265 scontext=system_u:system_r:system_crond_t tcontext=system_u:object_r:etc_t tclass=dir
Jun 8 17:40:14 new2 kernel: audit(1086730814.726:0): avc: denied { remove_name } for pid=5463 exe=/bin/rm name=prelink.cache dev=hda2 ino=867904 scontext=system_u:system_r:system_crond_t tcontext=system_u:object_r:etc_t tclass=dir
Jun 8 17:42:36 new2 kernel: inode_doinit_with_dentry: context_to_sid(system_u:object_r:at_exec_t) returned 22 for dev=hda2 ino=56182
Jun 8 17:42:36 new2 kernel: audit(1086730956.982:0): avc: denied { getattr } for pid=5465 exe=/usr/sbin/prelink path=/usr/bin/at dev=hda2 ino=56182 scontext=system_u:system_r:prelink_t tcontext=system_u:object_r:unlabeled_t tclass=file
Jun 8 17:42:36 new2 kernel: audit(1086730956.982:0): avc: denied { read } for pid=5465 exe=/usr/sbin/prelink name=at dev=hda2 ino=56182 scontext=system_u:system_r:prelink_t tcontext=system_u:object_r:unlabeled_t tclass=file
Jun 8 17:47:54 new2 kernel: audit(1086731274.451:0): avc: denied { relabelto } for pid=5465 exe=/usr/sbin/prelink name=gaim.#prelink#.YBkHcz dev=hda2 ino=1402109 scontext=system_u:system_r:prelink_t tcontext=root:object_r:bin_t tclass=file
Jun 8 17:53:33 new2 kernel: audit(1086731613.764:0): avc: denied { relabelfrom } for pid=4744 exe=/bin/su name=3 dev=devpts ino=5 scontext=richard:staff_r:staff_t tcontext=root:object_r:sysadm_devpts_t tclass=chr_file
Jun 8 17:53:33 new2 kernel: audit(1086731613.764:0): avc: denied { relabelto } for pid=4744 exe=/bin/su name=3 dev=devpts ino=5 scontext=richard:staff_r:staff_t tcontext=richard:object_r:staff_devpts_t tclass=chr_file
Jun 8 17:53:33 new2 kernel: audit(1086731613.764:0): avc: denied { setexec } for pid=4744 exe=/bin/su scontext=richard:staff_r:staff_t tcontext=richard:staff_r:staff_t tclass=process
Jun 8 17:53:33 new2 su(pam_unix)[4744]: session closed for user root
Jun 8 18:07:31 new2 kernel: audit(1086732451.712:0): avc: denied { relabelto } for pid=5465 exe=/usr/sbin/prelink name=mini-wm.#prelink#.aQ7fcy dev=hda2 ino=59530 scontext=system_u:system_r:prelink_t tcontext=root:object_r:bin_t tclass=file
Jun 8 18:15:13 new2 kernel: audit(1086732913.759:0): avc: denied { getattr } for pid=14286 exe=/usr/bin/slocate path=/initrd/dev/ram dev=ram0 ino=21 scontext=system_u:system_r:locate_t tcontext=root:object_r:file_t tclass=blk_file
Jun 8 18:15:13 new2 kernel: audit(1086732913.759:0): avc: denied { getattr } for pid=14286 exe=/usr/bin/slocate path=/initrd/dev/tty2 dev=ram0 ino=22 scontext=system_u:system_r:locate_t tcontext=root:object_r:file_t tclass=chr_file
Jun 8 18:15:13 new2 kernel: audit(1086732913.759:0): avc: denied { getattr } for pid=14286 exe=/usr/bin/slocate path=/initrd/dev/hda dev=ram0 ino=34 scontext=system_u:system_r:locate_t tcontext=system_u:object_r:file_t tclass=blk_file
Jun 8 18:18:14 new2 kernel: inode_doinit_with_dentry: context_to_sid(system_u:object_r:at_exec_t) returned 22 for dev=hda2 ino=56182
Jun 8 18:19:13 new2 kernel: audit(1086733153.727:0): avc: denied { search } for pid=14291 exe=/bin/su dev=selinuxfs ino=819 scontext=system_u:system_r:system_crond_t tcontext=system_u:object_r:security_t tclass=dir
Jun 8 18:19:13 new2 kernel: audit(1086733153.727:0): avc: denied { read write } for pid=14291 exe=/bin/su name=access dev=selinuxfs ino=6 scontext=system_u:system_r:system_crond_t tcontext=system_u:object_r:security_t tclass=file
Jun 8 18:19:13 new2 kernel: audit(1086733153.727:0): avc: denied { compute_av } for pid=14291 exe=/bin/su scontext=system_u:system_r:system_crond_t tcontext=system_u:object_r:security_t tclass=security
Jun 8 18:19:13 new2 kernel: audit(1086733153.900:0): avc: denied { sys_nice } for pid=14291 exe=/bin/su capability=23 scontext=system_u:system_r:system_crond_t tcontext=system_u:system_r:system_crond_t tclass=capability
Jun 8 18:19:13 new2 su(pam_unix)[14291]: session opened for user news by (uid=0)
Jun 8 18:19:13 new2 kernel: audit(1086733153.941:0): avc: denied { compute_user } for pid=14291 exe=/bin/su scontext=system_u:system_r:system_crond_t tcontext=system_u:object_r:security_t tclass=security
Jun 8 18:19:13 new2 kernel: audit(1086733153.958:0): avc: denied { check_context } for pid=14291 exe=/bin/su scontext=system_u:system_r:system_crond_t tcontext=system_u:object_r:security_t tclass=security
Jun 8 18:19:14 new2 su[14291]: Unable to get valid context for news, No valid tty
Jun 8 18:19:14 new2 kernel: inode_doinit_with_dentry: context_to_sid(system_u:object_r:canna_tmp_t) returned 22 for dev=hda2 ino=1840547
Jun 8 18:19:14 new2 kernel: audit(1086733154.429:0): avc: denied { getattr } for pid=14301 exe=/usr/sbin/tmpwatch path=/tmp/.iroha_unix dev=hda2 ino=1840547 scontext=system_u:system_r:tmpreaper_t tcontext=system_u:object_r:unlabeled_t tclass=dir
Jun 8 18:19:14 new2 kernel: audit(1086733154.429:0): avc: denied { search } for pid=14301 exe=/usr/sbin/tmpwatch name=.iroha_unix dev=hda2 ino=1840547 scontext=system_u:system_r:tmpreaper_t tcontext=system_u:object_r:unlabeled_t tclass=dir
Jun 8 18:19:14 new2 kernel: audit(1086733154.429:0): avc: denied { read } for pid=14301 exe=/usr/sbin/tmpwatch name=.iroha_unix dev=hda2 ino=1840547 scontext=system_u:system_r:tmpreaper_t tcontext=system_u:object_r:unlabeled_t tclass=dir
Jun 8 18:19:14 new2 kernel: audit(1086733154.440:0): avc: denied { setattr } for pid=14301 exe=/usr/sbin/tmpwatch name=.iroha_unix dev=hda2 ino=1840547 scontext=system_u:system_r:tmpreaper_t tcontext=system_u:object_r:unlabeled_t tclass=dir
Jun 8 18:52:53 new2 kernel: audit(1086735173.433:0): avc: denied { read } for pid=14372 exe=/bin/su name=shadow dev=hda2 ino=867624 scontext=richard:staff_r:staff_t tcontext=system_u:object_r:shadow_t tclass=file
Jun 8 18:52:53 new2 kernel: audit(1086735173.433:0): avc: denied { getattr } for pid=14372 exe=/bin/su path=/etc/shadow dev=hda2 ino=867624 scontext=richard:staff_r:staff_t tcontext=system_u:object_r:shadow_t tclass=file
Jun 8 18:52:56 new2 su(pam_unix)[14372]: session opened for user root by richard(uid=500)
Jun 8 18:52:56 new2 kernel: audit(1086735176.074:0): avc: denied { setuid } for pid=14373 exe=/bin/su capability=7 scontext=richard:staff_r:staff_t tcontext=richard:staff_r:staff_t tclass=capability
Jun 8 18:52:56 new2 kernel: audit(1086735176.173:0): avc: denied { write } for pid=14374 exe=/usr/X11R6/bin/xauth name=.xauthMb5o1W dev=hda2 ino=684097 scontext=richard:staff_r:staff_xauth_t tcontext=richard:object_r:staff_home_t tclass=file
Jun 8 18:52:56 new2 kernel: audit(1086735176.173:0): avc: denied { read } for pid=14374 exe=/usr/X11R6/bin/xauth name=.xauthMb5o1W dev=hda2 ino=684097 scontext=richard:staff_r:staff_xauth_t tcontext=richard:object_r:staff_home_t tclass=file
Jun 8 18:52:56 new2 kernel: audit(1086735176.173:0): avc: denied { getattr } for pid=14374 exe=/usr/X11R6/bin/xauth path=/root/.xauthMb5o1W dev=hda2 ino=684097 scontext=richard:staff_r:staff_xauth_t tcontext=richard:object_r:staff_home_t tclass=file
Jun 8 18:52:56 new2 kernel: audit(1086735176.181:0): avc: denied { unlink } for pid=14374 exe=/usr/X11R6/bin/xauth name=.xauthMb5o1W dev=hda2 ino=684097 scontext=richard:staff_r:staff_xauth_t tcontext=richard:object_r:staff_home_t tclass=file
Jun 8 18:52:56 new2 kernel: audit(1086735176.216:0): avc: denied { relabelfrom } for pid=14372 exe=/bin/su name=4 dev=devpts ino=6 scontext=richard:staff_r:staff_t tcontext=richard:object_r:staff_devpts_t tclass=chr_file
Jun 8 18:52:56 new2 kernel: audit(1086735176.216:0): avc: denied { relabelto } for pid=14372 exe=/bin/su name=4 dev=devpts ino=6 scontext=richard:staff_r:staff_t tcontext=root:object_r:sysadm_devpts_t tclass=chr_file
Jun 8 18:52:56 new2 kernel: audit(1086735176.217:0): avc: denied { setexec } for pid=14372 exe=/bin/su scontext=richard:staff_r:staff_t tcontext=richard:staff_r:staff_t tclass=process
Jun 8 18:52:56 new2 kernel: audit(1086735176.234:0): avc: denied { transition } for pid=14375 exe=/bin/su path=/bin/bash dev=hda2 ino=1384545 scontext=richard:staff_r:staff_t tcontext=root:sysadm_r:sysadm_t tclass=process
Jun 8 18:52:56 new2 kernel: audit(1086735176.234:0): avc: denied { siginh } for pid=14375 exe=/bin/bash scontext=richard:staff_r:staff_t tcontext=root:sysadm_r:sysadm_t tclass=process
Jun 8 18:52:56 new2 kernel: audit(1086735176.234:0): avc: denied { rlimitinh } for pid=14375 exe=/bin/bash scontext=richard:staff_r:staff_t tcontext=root:sysadm_r:sysadm_t tclass=process
Jun 8 18:52:56 new2 kernel: audit(1086735176.234:0): avc: denied { noatsecure } for pid=14375 exe=/bin/bash scontext=richard:staff_r:staff_t tcontext=root:sysadm_r:sysadm_t tclass=process
Jun 8 22:18:17 new2 su(pam_unix)[14611]: session opened for user root by richard(uid=0)
Jun 8 22:18:25 new2 su(pam_unix)[14611]: session closed for user root
Jun 8 22:18:28 new2 su(pam_unix)[14372]: session closed for user root
Jun 8 22:18:28 new2 kernel: audit(1086747508.607:0): avc: denied { relabelfrom } for pid=14372 exe=/bin/su name=4 dev=devpts ino=6 scontext=richard:staff_r:staff_t tcontext=root:object_r:sysadm_devpts_t tclass=chr_file
Jun 8 22:18:28 new2 kernel: audit(1086747508.608:0): avc: denied { relabelto } for pid=14372 exe=/bin/su name=4 dev=devpts ino=6 scontext=richard:staff_r:staff_t tcontext=richard:object_r:staff_devpts_t tclass=chr_file
Jun 8 22:18:28 new2 kernel: audit(1086747508.608:0): avc: denied { setexec } for pid=14372 exe=/bin/su scontext=richard:staff_r:staff_t tcontext=richard:staff_r:staff_t tclass=process
Jun 8 22:18:48 new2 su(pam_unix)[14667]: session opened for user root by richard(uid=500)
Jun 8 22:18:48 new2 kernel: audit(1086747528.673:0): avc: denied { relabelfrom } for pid=14667 exe=/bin/su name=5 dev=devpts ino=7 scontext=richard:staff_r:staff_t tcontext=richard:object_r:staff_devpts_t tclass=chr_file
Jun 8 22:18:48 new2 kernel: audit(1086747528.673:0): avc: denied { relabelto } for pid=14667 exe=/bin/su name=5 dev=devpts ino=7 scontext=richard:staff_r:staff_t tcontext=root:object_r:sysadm_devpts_t tclass=chr_file
Jun 8 22:18:48 new2 kernel: audit(1086747528.708:0): avc: denied { transition } for pid=14670 exe=/bin/su path=/bin/bash dev=hda2 ino=1384545 scontext=richard:staff_r:staff_t tcontext=root:sysadm_r:sysadm_t tclass=process
Jun 8 22:18:48 new2 kernel: audit(1086747528.708:0): avc: denied { siginh } for pid=14670 exe=/bin/bash scontext=richard:staff_r:staff_t tcontext=root:sysadm_r:sysadm_t tclass=process
Jun 8 22:18:48 new2 kernel: audit(1086747528.708:0): avc: denied { rlimitinh } for pid=14670 exe=/bin/bash scontext=richard:staff_r:staff_t tcontext=root:sysadm_r:sysadm_t tclass=process
Jun 8 22:18:48 new2 kernel: audit(1086747528.708:0): avc: denied { noatsecure } for pid=14670 exe=/bin/bash scontext=richard:staff_r:staff_t tcontext=root:sysadm_r:sysadm_t tclass=process
Jun 8 22:22:15 new2 su(pam_unix)[14667]: session closed for user root
Jun 8 22:22:15 new2 kernel: audit(1086747735.307:0): avc: denied { relabelfrom } for pid=14667 exe=/bin/su name=5 dev=devpts ino=7 scontext=richard:staff_r:staff_t tcontext=root:object_r:sysadm_devpts_t tclass=chr_file
Jun 8 22:22:39 new2 shutdown: shutting down for system reboot
Jun 8 22:22:39 new2 init: Switching to runlevel: 6
Jun 8 22:22:40 new2 login(pam_unix)[2372]: session closed for user root
Jun 8 22:22:41 new2 kernel: audit(1086747761.697:0): avc: denied { read } for pid=14832 exe=/sbin/restorecon name=config dev=hda2 ino=914871 scontext=system_u:system_r:udev_t tcontext=system_u:object_r:selinux_config_t tclass=file
Jun 8 22:22:41 new2 kernel: audit(1086747761.697:0): avc: denied { getattr } for pid=14832 exe=/sbin/restorecon path=/etc/selinux/config dev=hda2 ino=914871 scontext=system_u:system_r:udev_t tcontext=system_u:object_r:selinux_config_t tclass=file
Jun 8 22:22:41 new2 kernel: audit(1086747761.796:0): avc: denied { search } for pid=14832 exe=/sbin/restorecon name=strict dev=hda2 ino=913074 scontext=system_u:system_r:udev_t tcontext=system_u:object_r:selinux_config_t tclass=dir
Jun 8 22:22:42 new2 udev[14797]: removing device node '/udev/vcsa4'
Jun 8 22:22:42 new2 udev[14794]: removing device node '/udev/vcs3'
Jun 8 22:22:42 new2 udev[14800]: removing device node '/udev/vcs6'
Jun 8 22:22:42 new2 udev[14796]: removing device node '/udev/vcs4'
Jun 8 22:22:42 new2 udev[14792]: removing device node '/udev/vcs2'
Jun 8 22:22:42 new2 udev[14798]: removing device node '/udev/vcs5'
Jun 8 22:22:42 new2 udev[14801]: removing device node '/udev/vcsa6'
Jun 8 22:22:42 new2 udev[14799]: removing device node '/udev/vcsa5'
Jun 8 22:22:42 new2 udev[14795]: removing device node '/udev/vcsa3'
Jun 8 22:22:42 new2 udev[14793]: removing device node '/udev/vcsa2'
Jun 8 22:22:43 new2 gconfd (richard-4527): Exiting
Jun 8 22:22:46 new2 gdm(pam_unix)[4383]: session closed for user richard
Jun 8 22:22:46 new2 messagebus: messagebus -TERM succeeded
Jun 8 22:22:47 new2 atd: atd shutdown succeeded
Jun 8 22:22:48 new2 udev[14877]: removing device node '/udev/vcs1'
Jun 8 22:22:48 new2 udev[14888]: removing device node '/udev/vcsa1'
Jun 8 22:22:48 new2 privoxy: privoxy shutdown succeeded
Jun 8 22:22:48 new2 udev[14904]: creating device node '/udev/vcs1'
Jun 8 22:22:48 new2 udev[14911]: creating device node '/udev/vcsa1'
Jun 8 22:22:49 new2 udev[14941]: removing device node '/udev/vcsa1'
Jun 8 22:22:49 new2 udev[14937]: removing device node '/udev/vcs1'
Jun 8 22:22:49 new2 gpm[2203]: *** info [mice.c(1766)]:
Jun 8 22:22:49 new2 gpm[2203]: imps2: Auto-detected intellimouse PS/2
Jun 8 22:22:50 new2 cups: cupsd shutdown succeeded
Jun 8 22:22:50 new2 xfs[2279]: terminating
Jun 8 22:22:50 new2 udev[14954]: creating device node '/udev/vcs1'
Jun 8 22:22:50 new2 udev[14961]: creating device node '/udev/vcsa1'
Jun 8 22:22:50 new2 xfs: xfs shutdown succeeded
Jun 8 22:22:50 new2 udev[15115]: removing device node '/udev/vcs1'
Jun 8 22:22:50 new2 udev[15110]: removing device node '/udev/vcsa1'
Jun 8 22:22:51 new2 gpm: gpm shutdown succeeded
Jun 8 22:22:51 new2 sshd: sshd -TERM succeeded
Jun 8 22:22:51 new2 sendmail: sendmail shutdown succeeded
Jun 8 22:22:51 new2 sendmail: sm-client shutdown failed
Jun 8 22:22:55 new2 spamassassin: spamd shutdown succeeded
Jun 8 22:22:56 new2 lisa: lisa shutdown succeeded
Jun 8 22:22:56 new2 smartd[1886]: smartd received signal 15: Terminated
Jun 8 22:22:56 new2 smartd[1886]: smartd is exiting (exit status 0)
Jun 8 22:22:56 new2 smartd: smartd shutdown succeeded
Jun 8 22:22:56 new2 xinetd[2118]: Exiting...
Jun 8 22:22:57 new2 xinetd: xinetd shutdown succeeded
Jun 8 22:22:57 new2 acpid: acpid shutdown succeeded
Jun 8 22:22:58 new2 crond: crond shutdown succeeded
Jun 8 22:22:58 new2 ntpd: succeeded
Jun 8 22:22:58 new2 ntpd: succeeded
Jun 8 22:22:58 new2 ntpd[2142]: ntpd exiting on signal 15
Jun 8 22:22:58 new2 ntpd: ntpd shutdown succeeded
Jun 8 22:22:59 new2 dd: 1+0 records in
Jun 8 22:22:59 new2 dd: 1+0 records out
Jun 8 22:22:59 new2 random: Saving random seed: succeeded
Jun 8 22:22:59 new2 rpc.statd[1765]: Caught signal 15, un-registering and exiting.
Jun 8 22:22:59 new2 nfslock: rpc.statd shutdown succeeded
Jun 8 22:22:59 new2 portmap: portmap shutdown succeeded
Jun 8 22:23:00 new2 kernel: Kernel logging (proc) stopped.
Jun 8 22:23:00 new2 kernel: Kernel log daemon terminating.
Jun 8 22:23:00 new2 udev[15782]: removing device node '/udev/vcs1'
Jun 8 22:23:00 new2 udev[15788]: removing device node '/udev/vcsa1'
Jun 8 22:23:01 new2 syslog: klogd shutdown succeeded
Jun 8 22:23:01 new2 exiting on signal 15
Jun 8 22:24:28 new2 syslogd 1.4.1: restart.
Jun 8 22:24:28 new2 syslog: syslogd startup succeeded
Jun 8 22:24:28 new2 kernel: klogd 1.4.1, log source = /proc/kmsg started.
Jun 8 22:24:28 new2 kernel: Linux version 2.6.6-1.422 (bhcompile(a)porky.devel.redhat.com) (gcc version 3.3.3 20040412 (Red Hat Linux 3.3.3-7)) #1 Fri Jun 4 13:00:45 EDT 2004
Jun 8 22:24:28 new2 kernel: BIOS-provided physical RAM map:
Jun 8 22:24:28 new2 kernel: BIOS-e820: 0000000000000000 - 000000000009fc00 (usable)
Jun 8 22:24:28 new2 kernel: BIOS-e820: 000000000009fc00 - 00000000000a0000 (reserved)
Jun 8 22:24:28 new2 kernel: BIOS-e820: 00000000000f0000 - 0000000000100000 (reserved)
Jun 8 22:24:28 new2 kernel: BIOS-e820: 0000000000100000 - 000000000dff0000 (usable)
Jun 8 22:24:28 new2 kernel: BIOS-e820: 000000000dff0000 - 000000000dff3000 (ACPI NVS)
Jun 8 22:24:28 new2 kernel: BIOS-e820: 000000000dff3000 - 000000000e000000 (ACPI data)
Jun 8 22:24:28 new2 kernel: BIOS-e820: 00000000fec00000 - 0000000100000000 (reserved)
Jun 8 22:24:28 new2 kernel: 0MB HIGHMEM available.
Jun 8 22:24:28 new2 kernel: 223MB LOWMEM available.
Jun 8 22:24:28 new2 syslog: klogd startup succeeded
Jun 8 22:24:28 new2 kernel: zapping low mappings.
Jun 8 22:24:28 new2 kernel: On node 0 totalpages: 57328
Jun 8 22:24:28 new2 kernel: DMA zone: 4096 pages, LIFO batch:1
Jun 8 22:24:28 new2 kernel: Normal zone: 53232 pages, LIFO batch:12
Jun 8 22:24:28 new2 kernel: HighMem zone: 0 pages, LIFO batch:1
Jun 8 22:24:28 new2 kernel: DMI 2.2 present.
Jun 8 22:24:28 new2 kernel: ACPI: RSDP (v000 AWARD ) @ 0x000f67f0
Jun 8 22:24:28 new2 kernel: ACPI: RSDT (v001 AWARD AWRDACPI 0x42302e31 AWRD 0x00000000) @ 0x0dff3000
Jun 8 22:24:28 new2 kernel: ACPI: FADT (v001 AWARD AWRDACPI 0x42302e31 AWRD 0x00000000) @ 0x0dff3040
Jun 8 22:24:28 new2 kernel: ACPI: MADT (v001 AWARD AWRDACPI 0x42302e31 AWRD 0x00000000) @ 0x0dff6e80
Jun 8 22:24:28 new2 irqbalance: irqbalance startup succeeded
Jun 8 22:24:28 new2 kernel: ACPI: DSDT (v001 AWARD AWRDACPI 0x00001000 MSFT 0x0100000d) @ 0x00000000
Jun 8 22:24:28 new2 kernel: ACPI: PM-Timer IO Port: 0x1008
Jun 8 22:24:28 new2 kernel: Built 1 zonelists
Jun 8 22:24:28 new2 kernel: Kernel command line: ro root=LABEL=/ rhgb
Jun 8 22:24:28 new2 kernel: mapped 4G/4G trampoline to ffff3000.
Jun 8 22:24:28 new2 kernel: Initializing CPU#0
Jun 8 22:24:28 new2 kernel: CPU 0 irqstacks, hard=02346000 soft=02345000
Jun 8 22:24:28 new2 kernel: PID hash table entries: 1024 (order 10: 8192 bytes)
Jun 8 22:24:28 new2 kernel: Detected 2490.734 MHz processor.
Jun 8 22:24:28 new2 kernel: Using tsc for high-res timesource
Jun 8 22:24:28 new2 portmap: portmap startup succeeded
Jun 8 22:24:28 new2 kernel: Console: colour VGA+ 80x25
Jun 8 22:24:28 new2 kernel: Memory: 223968k/229312k available (1548k kernel code, 4664k reserved, 607k data, 144k init, 0k highmem)
Jun 8 22:24:28 new2 kernel: Calibrating delay loop... 4915.20 BogoMIPS
Jun 8 22:24:28 new2 kernel: Security Scaffold v1.0.0 initialized
Jun 8 22:24:28 new2 kernel: SELinux: Initializing.
Jun 8 22:24:28 new2 kernel: SELinux: Starting in permissive mode
Jun 8 22:24:28 new2 kernel: There is already a security framework initialized, register_security failed.
Jun 8 22:24:28 new2 kernel: selinux_register_security: Registering secondary module capability
Jun 8 22:24:28 new2 kernel: Capability LSM initialized as secondary
Jun 8 22:24:28 new2 kernel: Dentry cache hash table entries: 32768 (order: 5, 131072 bytes)
Jun 8 22:24:28 new2 kernel: Inode-cache hash table entries: 16384 (order: 4, 65536 bytes)
Jun 8 22:24:28 new2 kernel: Mount-cache hash table entries: 512 (order: 0, 4096 bytes)
Jun 8 22:24:28 new2 kernel: CPU: Trace cache: 12K uops, L1 D cache: 8K
Jun 8 22:24:28 new2 kernel: CPU: L2 cache: 512K
Jun 8 22:24:28 new2 kernel: Intel machine check architecture supported.
Jun 8 22:24:28 new2 kernel: Intel machine check reporting enabled on CPU#0.
Jun 8 22:24:28 new2 kernel: CPU0: Intel P4/Xeon Extended MCE MSRs (12) available
Jun 8 22:24:28 new2 kernel: CPU: Intel(R) Pentium(R) 4 CPU 2.50GHz stepping 07
Jun 8 22:24:28 new2 kernel: Enabling fast FPU save and restore... done.
Jun 8 22:24:28 new2 kernel: Enabling unmasked SIMD FPU exception support... done.
Jun 8 22:24:28 new2 kernel: Checking 'hlt' instruction... OK.
Jun 8 22:24:28 new2 kernel: checking if image is initramfs...it isn't (no cpio magic); looks like an initrd
Jun 8 22:24:28 new2 kernel: Freeing initrd memory: 188k freed
Jun 8 22:24:28 new2 kernel: NET: Registered protocol family 16
Jun 8 22:24:28 new2 kernel: PCI: PCI BIOS revision 2.10 entry at 0xfb360, last bus=1
Jun 8 22:24:28 new2 kernel: PCI: Using configuration type 1
Jun 8 22:24:28 new2 kernel: mtrr: v2.0 (20020519)
Jun 8 22:24:28 new2 rpc.statd[1766]: Version 1.0.6 Starting
Jun 8 22:24:28 new2 kernel: ACPI: Subsystem revision 20040326
Jun 8 22:24:28 new2 kernel: ACPI: IRQ9 SCI: Level Trigger.
Jun 8 22:24:28 new2 kernel: ACPI: Interpreter enabled
Jun 8 22:24:28 new2 kernel: ACPI: Using PIC for interrupt routing
Jun 8 22:24:28 new2 nfslock: rpc.statd startup succeeded
Jun 8 22:24:28 new2 kernel: ACPI: PCI Root Bridge [PCI0] (00:00)
Jun 8 22:24:28 new2 kernel: PCI: Probing PCI hardware (bus 00)
Jun 8 22:24:28 new2 kernel: Uncovering SIS962 that hid as a SIS503 (compatible=1)
Jun 8 22:24:28 new2 kernel: Enabling SiS 96x SMBus.
Jun 8 22:24:28 new2 kernel: ACPI: PCI Interrupt Link [LNKA] (IRQs 3 4 5 6 7 9 *10 11 12 14 15)
Jun 8 22:24:28 new2 kernel: ACPI: PCI Interrupt Link [LNKB] (IRQs 3 4 5 6 7 9 10 11 12 14 15) *0, disabled.
Jun 8 22:24:28 new2 kernel: ACPI: PCI Interrupt Link [LNKC] (IRQs 3 4 *5 6 7 9 10 11 12 14 15)
Jun 8 22:24:28 new2 kernel: ACPI: PCI Interrupt Link [LNKD] (IRQs 3 4 5 6 7 9 10 *11 12 14 15)
Jun 8 22:24:28 new2 kernel: ACPI: PCI Interrupt Link [LNKE] (IRQs 3 4 5 6 7 9 *10 11 12 14 15)
Jun 8 22:24:28 new2 kernel: ACPI: PCI Interrupt Link [LNKF] (IRQs 3 4 5 6 7 9 10 *11 12 14 15)
Jun 8 22:24:28 new2 kernel: ACPI: PCI Interrupt Link [LNKG] (IRQs 3 4 5 6 7 *9 10 11 12 14 15)
Jun 8 22:24:28 new2 kernel: ACPI: PCI Interrupt Link [LNKH] (IRQs *3 4 5 6 7 9 10 11 12 14 15)
Jun 8 22:24:28 new2 kernel: Linux Plug and Play Support v0.97 (c) Adam Belay
Jun 8 22:24:28 new2 kernel: usbcore: registered new driver usbfs
Jun 8 22:24:28 new2 kernel: usbcore: registered new driver hub
Jun 8 22:24:28 new2 kernel: ACPI: PCI Interrupt Link [LNKB] enabled at IRQ 11
Jun 8 22:24:28 new2 kernel: ACPI: PCI Interrupt Link [LNKA] enabled at IRQ 10
Jun 8 22:24:28 new2 kernel: ACPI: PCI Interrupt Link [LNKC] enabled at IRQ 5
Jun 8 22:24:28 new2 kernel: ACPI: PCI Interrupt Link [LNKE] enabled at IRQ 10
Jun 8 22:24:28 new2 kernel: ACPI: PCI Interrupt Link [LNKF] enabled at IRQ 11
Jun 8 22:24:28 new2 kernel: ACPI: PCI Interrupt Link [LNKG] enabled at IRQ 9
Jun 8 22:24:28 new2 kernel: ACPI: PCI Interrupt Link [LNKH] enabled at IRQ 3
Jun 8 22:24:28 new2 kernel: ACPI: PCI Interrupt Link [LNKD] enabled at IRQ 11
Jun 8 22:24:28 new2 kernel: PCI: Using ACPI for IRQ routing
Jun 8 22:24:28 new2 kernel: vesafb: probe of vesafb0 failed with error -6
Jun 8 22:24:28 new2 kernel: apm: BIOS version 1.2 Flags 0x07 (Driver version 1.16ac)
Jun 8 22:24:28 new2 kernel: apm: overridden by ACPI.
Jun 8 22:24:28 new2 kernel: audit: initializing netlink socket (disabled)
Jun 8 22:24:28 new2 kernel: audit(1086733422.813:0): initialized
Jun 8 22:24:28 new2 kernel: Total HugeTLB memory allocated, 0
Jun 8 22:24:28 new2 kernel: VFS: Disk quotas dquot_6.5.1
Jun 8 22:24:28 new2 kernel: Dquot-cache hash table entries: 1024 (order 0, 4096 bytes)
Jun 8 22:24:28 new2 kernel: SELinux: Registering netfilter hooks
Jun 8 22:24:28 new2 kernel: Initializing Cryptographic API
Jun 8 22:24:28 new2 kernel: pci_hotplug: PCI Hot Plug PCI Core version: 0.5
Jun 8 22:24:28 new2 kernel: ACPI: Fan [FAN] (on)
Jun 8 22:24:28 new2 kernel: ACPI: Processor [CPU0] (supports C1)
Jun 8 22:24:28 new2 kernel: ACPI: Thermal Zone [THRM] (40 C)
Jun 8 22:24:28 new2 kernel: isapnp: Scanning for PnP cards...
Jun 8 22:24:28 new2 kernel: isapnp: No Plug & Play device found
Jun 8 22:24:28 new2 kernel: Real Time Clock Driver v1.12
Jun 8 22:24:28 new2 kernel: Linux agpgart interface v0.100 (c) Dave Jones
Jun 8 22:24:28 new2 kernel: agpgart: Detected SiS 650 chipset
Jun 8 22:24:28 new2 kernel: agpgart: Maximum main memory to use for agp memory: 176M
Jun 8 22:24:28 new2 kernel: agpgart: AGP aperture is 128M @ 0xd0000000
Jun 8 22:24:28 new2 kernel: Serial: 8250/16550 driver $Revision: 1.90 $ 8 ports, IRQ sharing enabled
Jun 8 22:24:28 new2 kernel: ttyS0 at I/O 0x3f8 (irq = 4) is a 16550A
Jun 8 22:24:28 new2 kernel: RAMDISK driver initialized: 16 RAM disks of 16384K size 1024 blocksize
Jun 8 22:24:28 new2 kernel: Uniform Multi-Platform E-IDE driver Revision: 7.00alpha2
Jun 8 22:24:28 new2 kernel: ide: Assuming 33MHz system bus speed for PIO modes; override with idebus=xx
Jun 8 22:24:28 new2 kernel: SIS5513: IDE controller at PCI slot 0000:00:02.5
Jun 8 22:24:29 new2 kernel: SIS5513: chipset revision 0
Jun 8 22:24:29 new2 kernel: SIS5513: not 100%% native mode: will probe irqs later
Jun 8 22:24:29 new2 kernel: SIS5513: SiS 962/963 MuTIOL IDE UDMA133 controller
Jun 8 22:24:29 new2 kernel: ide0: BM-DMA at 0x4000-0x4007, BIOS settings: hda:DMA, hdb:pio
Jun 8 22:24:29 new2 kernel: ide1: BM-DMA at 0x4008-0x400f, BIOS settings: hdc:DMA, hdd:pio
Jun 8 22:24:29 new2 kernel: hda: WDC WD400EB-11CPF0, ATA DISK drive
Jun 8 22:24:29 new2 kernel: Using cfq io scheduler
Jun 8 22:24:29 new2 kernel: ide0 at 0x1f0-0x1f7,0x3f6 on irq 14
Jun 8 22:24:29 new2 kernel: hdc: SAMSUNG CD-R/RW DRIVE SW-252F, ATAPI CD/DVD-ROM drive
Jun 8 22:24:29 new2 kernel: ide1 at 0x170-0x177,0x376 on irq 15
Jun 8 22:24:29 new2 kernel: hda: max request size: 128KiB
Jun 8 22:24:29 new2 kernel: hda: 78165360 sectors (40020 MB) w/2048KiB Cache, CHS=65535/16/63, UDMA(100)
Jun 8 22:24:29 new2 kernel: hda: hda1 hda2 hda3
Jun 8 22:24:29 new2 kernel: hdc: ATAPI 1X CD-ROM CD-R/RW CD-MRW drive, 2048kB Cache, UDMA(33)
Jun 8 22:24:29 new2 kernel: Uniform CD-ROM driver Revision: 3.20
Jun 8 22:24:29 new2 kernel: ide-floppy driver 0.99.newide
Jun 8 22:24:29 new2 kernel: usbcore: registered new driver hiddev
Jun 8 22:24:29 new2 kernel: usbcore: registered new driver usbhid
Jun 8 22:24:29 new2 kernel: drivers/usb/input/hid-core.c: v2.0:USB HID core driver
Jun 8 22:24:29 new2 kernel: mice: PS/2 mouse device common for all mice
Jun 8 22:24:29 new2 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12
Jun 8 22:24:29 new2 kernel: input: ImPS/2 Generic Wheel Mouse on isa0060/serio1
Jun 8 22:24:29 new2 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1
Jun 8 22:24:29 new2 kernel: input: AT Translated Set 2 keyboard on isa0060/serio0
Jun 8 22:24:29 new2 kernel: md: md driver 0.90.0 MAX_MD_DEVS=256, MD_SB_DISKS=27
Jun 8 22:24:29 new2 kernel: NET: Registered protocol family 2
Jun 8 22:24:29 new2 kernel: IP: routing cache hash table of 2048 buckets, 16Kbytes
Jun 8 22:24:29 new2 kernel: TCP: Hash tables configured (established 16384 bind 32768)
Jun 8 22:24:29 new2 kernel: Initializing IPsec netlink socket
Jun 8 22:24:29 new2 kernel: NET: Registered protocol family 1
Jun 8 22:24:29 new2 kernel: NET: Registered protocol family 17
Jun 8 22:24:29 new2 kernel: ACPI: (supports S0 S3 S4 S5)
Jun 8 22:24:29 new2 kernel: md: Autodetecting RAID arrays.
Jun 8 22:24:29 new2 kernel: md: autorun ...
Jun 8 22:24:29 new2 kernel: md: ... autorun DONE.
Jun 8 22:24:29 new2 kernel: RAMDISK: Compressed image found at block 0
Jun 8 22:24:29 new2 kernel: VFS: Mounted root (ext2 filesystem).
Jun 8 22:24:29 new2 kernel: EXT3-fs: INFO: recovery required on readonly filesystem.
Jun 8 22:24:29 new2 kernel: EXT3-fs: write access will be enabled during recovery.
Jun 8 22:24:29 new2 kernel: kjournald starting. Commit interval 5 seconds
Jun 8 22:24:29 new2 kernel: EXT3-fs: hda2: orphan cleanup on readonly fs
Jun 8 22:24:29 new2 kernel: EXT3-fs: hda2: 4 orphan inodes deleted
Jun 8 22:24:29 new2 kernel: EXT3-fs: recovery complete.
Jun 8 22:24:29 new2 kernel: EXT3-fs: mounted filesystem with ordered data mode.
Jun 8 22:24:29 new2 kernel: Freeing unused kernel memory: 144k freed
Jun 8 22:24:29 new2 kernel: security: 6 users, 7 roles, 1257 types, 1 bools
Jun 8 22:24:29 new2 kernel: security: 42 classes, 310475 rules
Jun 8 22:24:29 new2 kernel: SELinux: Completing initialization.
Jun 8 22:24:29 new2 kernel: SELinux: Setting up existing superblocks.
Jun 8 22:24:29 new2 kernel: SELinux: initialized (dev selinuxfs, type selinuxfs), uses genfs_contexts
Jun 8 22:24:29 new2 kernel: SELinux: initialized (dev hda2, type ext3), uses xattr
Jun 8 22:24:29 new2 kernel: SELinux: initialized (dev ram0, type ext2), uses xattr
Jun 8 22:24:29 new2 kernel: SELinux: initialized (dev mqueue, type mqueue), not configured for labeling
Jun 8 22:24:29 new2 kernel: SELinux: initialized (dev hugetlbfs, type hugetlbfs), not configured for labeling
Jun 8 22:24:29 new2 kernel: SELinux: initialized (dev devpts, type devpts), uses transition SIDs
Jun 8 22:24:29 new2 kernel: SELinux: initialized (dev eventpollfs, type eventpollfs), uses genfs_contexts
Jun 8 22:24:29 new2 kernel: SELinux: initialized (dev pipefs, type pipefs), uses task SIDs
Jun 8 22:24:29 new2 kernel: SELinux: initialized (dev tmpfs, type tmpfs), uses transition SIDs
Jun 8 22:24:29 new2 kernel: SELinux: initialized (dev futexfs, type futexfs), uses genfs_contexts
Jun 8 22:24:29 new2 kernel: SELinux: initialized (dev sockfs, type sockfs), uses task SIDs
Jun 8 22:24:29 new2 kernel: SELinux: initialized (dev proc, type proc), uses genfs_contexts
Jun 8 22:24:29 new2 kernel: SELinux: initialized (dev bdev, type bdev), uses genfs_contexts
Jun 8 22:24:29 new2 kernel: SELinux: initialized (dev rootfs, type rootfs), uses genfs_contexts
Jun 8 22:24:29 new2 kernel: SELinux: initialized (dev sysfs, type sysfs), uses genfs_contexts
Jun 8 22:24:29 new2 kernel: SELinux: initialized (dev ramfs, type ramfs), uses genfs_contexts
Jun 8 22:24:29 new2 kernel: NET: Registered protocol family 10
Jun 8 22:24:29 new2 kernel: Disabled Privacy Extensions on device 022deac0(lo)
Jun 8 22:24:30 new2 kernel: IPv6 over IPv4 tunneling driver
Jun 8 22:24:30 new2 kernel: audit(1086733441.577:0): avc: denied { search } for pid=535 exe=/usr/bin/rhgb name=root dev=hda2 ino=130305 scontext=system_u:system_r:rhgb_t tcontext=root:object_r:staff_home_dir_t tclass=dir
Jun 8 22:24:30 new2 last message repeated 3 times
Jun 8 22:24:30 new2 kernel: audit(1086733441.862:0): avc: denied { search } for pid=535 exe=/usr/bin/rhgb name=root dev=hda2 ino=130305 scontext=system_u:system_r:rhgb_t tcontext=root:object_r:staff_home_dir_t tclass=dir
Jun 8 22:24:30 new2 last message repeated 7 times
Jun 8 22:24:30 new2 kernel: audit(1086733442.319:0): avc: denied { read } for pid=535 exe=/usr/bin/rhgb name=.fonts.cache-1 dev=hda2 ino=603 scontext=system_u:system_r:rhgb_t tcontext=system_u:object_r:default_t tclass=file
Jun 8 22:24:30 new2 kernel: audit(1086733444.130:0): avc: denied { search } for pid=535 exe=/usr/bin/rhgb name=root dev=hda2 ino=130305 scontext=system_u:system_r:rhgb_t tcontext=root:object_r:staff_home_dir_t tclass=dir
Jun 8 22:24:30 new2 kernel: ACPI: Power Button (FF) [PWRF]
Jun 8 22:24:30 new2 kernel: ACPI: Sleep Button (CM) [FUTS]
Jun 8 22:24:30 new2 kernel: ehci_hcd 0000:00:03.3: EHCI Host Controller
Jun 8 22:24:30 new2 kernel: ehci_hcd 0000:00:03.3: irq 3, pci mem 10856000
Jun 8 22:24:30 new2 kernel: SELinux: initialized (dev usbdevfs, type usbdevfs), uses genfs_contexts
Jun 8 22:24:30 new2 kernel: SELinux: initialized (dev usbfs, type usbfs), uses genfs_contexts
Jun 8 22:24:30 new2 kernel: ehci_hcd 0000:00:03.3: new USB bus registered, assigned bus number 1
Jun 8 22:24:30 new2 kernel: ehci_hcd 0000:00:03.3: USB 2.0 enabled, EHCI 1.00, driver 2004-May-10
Jun 8 22:24:30 new2 kernel: hub 1-0:1.0: USB hub found
Jun 8 22:24:30 new2 kernel: hub 1-0:1.0: 6 ports detected
Jun 8 22:24:30 new2 rpcidmapd: rpc.idmapd startup succeeded
Jun 8 22:24:30 new2 kernel: ohci_hcd 0000:00:03.0: OHCI Host Controller
Jun 8 22:24:30 new2 kernel: ohci_hcd 0000:00:03.0: irq 10, pci mem 1085c000
Jun 8 22:24:30 new2 kernel: ohci_hcd 0000:00:03.0: new USB bus registered, assigned bus number 2
Jun 8 22:24:30 new2 random: Initializing random number generator: succeeded
Jun 8 22:24:30 new2 kernel: hub 2-0:1.0: USB hub found
Jun 8 22:24:30 new2 kernel: hub 2-0:1.0: 2 ports detected
Jun 8 22:24:30 new2 kernel: ohci_hcd 0000:00:03.1: OHCI Host Controller
Jun 8 22:24:30 new2 kernel: ohci_hcd 0000:00:03.1: irq 11, pci mem 1085e000
Jun 8 22:24:30 new2 kernel: ohci_hcd 0000:00:03.1: new USB bus registered, assigned bus number 3
Jun 8 22:24:30 new2 kernel: hub 3-0:1.0: USB hub found
Jun 8 22:24:30 new2 kernel: hub 3-0:1.0: 2 ports detected
Jun 8 22:24:30 new2 kernel: ohci_hcd 0000:00:03.2: OHCI Host Controller
Jun 8 22:24:30 new2 kernel: ohci_hcd 0000:00:03.2: irq 9, pci mem 10860000
Jun 8 22:24:30 new2 kernel: ohci_hcd 0000:00:03.2: new USB bus registered, assigned bus number 4
Jun 8 22:24:30 new2 kernel: hub 4-0:1.0: USB hub found
Jun 8 22:24:30 new2 kernel: hub 4-0:1.0: 2 ports detected
Jun 8 22:24:30 new2 kernel: EXT3 FS on hda2, internal journal
Jun 8 22:24:30 new2 kernel: device-mapper: 4.1.0-ioctl (2003-12-10) initialised: dm(a)uk.sistina.com
Jun 8 22:24:30 new2 kernel: audit(1086747848.241:0): avc: denied { search } for pid=921 exe=/sbin/lvm.static dev=devpts ino=1 scontext=system_u:system_r:lvm_t tcontext=system_u:object_r:devpts_t tclass=dir
Jun 8 22:24:30 new2 kernel: audit(1086747848.419:0): avc: denied { read } for pid=930 exe=/sbin/restorecon name=config dev=hda2 ino=914871 scontext=system_u:system_r:udev_t tcontext=system_u:object_r:selinux_config_t tclass=file
Jun 8 22:24:30 new2 kernel: audit(1086747848.419:0): avc: denied { search } for pid=930 exe=/sbin/restorecon name=targeted dev=hda2 ino=913088 scontext=system_u:system_r:udev_t tcontext=system_u:object_r:selinux_config_t tclass=dir
Jun 8 22:24:30 new2 kernel: audit(1086747848.806:0): avc: denied { getattr } for pid=921 exe=/sbin/lvm.static path=/dev/shm dev=hda2 ino=1091316 scontext=system_u:system_r:lvm_t tcontext=system_u:object_r:file_t tclass=dir
Jun 8 22:24:30 new2 kernel: cdrom: open failed.
Jun 8 22:24:30 new2 kernel: Adding 457844k swap on /dev/hda3. Priority:-1 extents:1
Jun 8 22:24:30 new2 kernel: kjournald starting. Commit interval 5 seconds
Jun 8 22:24:30 new2 kernel: EXT3 FS on hda1, internal journal
Jun 8 22:24:30 new2 kernel: EXT3-fs: mounted filesystem with ordered data mode.
Jun 8 22:24:30 new2 kernel: SELinux: initialized (dev hda1, type ext3), uses xattr
Jun 8 22:24:30 new2 kernel: SELinux: initialized (dev tmpfs, type tmpfs), uses transition SIDs
Jun 8 22:24:30 new2 kernel: audit(1086747852.410:0): avc: denied { read } for pid=1237 exe=/sbin/restorecon name=config dev=hda2 ino=914871 scontext=system_u:system_r:udev_t tcontext=system_u:object_r:selinux_config_t tclass=file
Jun 8 22:24:30 new2 kernel: audit(1086747852.437:0): avc: denied { read } for pid=1248 exe=/sbin/restorecon name=config dev=hda2 ino=914871 scontext=system_u:system_r:udev_t tcontext=system_u:object_r:selinux_config_t tclass=file
Jun 8 22:24:30 new2 kernel: IA-32 Microcode Update Driver: v1.13 <tigran(a)veritas.com>
Jun 8 22:24:30 new2 kernel: microcode: No new microdata for cpu 0
Jun 8 22:24:30 new2 kernel: audit(1086747853.880:0): avc: denied { read } for pid=1268 exe=/sbin/restorecon name=config dev=hda2 ino=914871 scontext=system_u:system_r:udev_t tcontext=system_u:object_r:selinux_config_t tclass=file
Jun 8 22:24:30 new2 kernel: audit(1086747853.880:0): avc: denied { search } for pid=1268 exe=/sbin/restorecon name=targeted dev=hda2 ino=913088 scontext=system_u:system_r:udev_t tcontext=system_u:object_r:selinux_config_t tclass=dir
Jun 8 22:24:30 new2 kernel: parport0: PC-style at 0x378 (0x778) [PCSPP,TRISTATE]
Jun 8 22:24:30 new2 kernel: parport0: irq 7 detected
Jun 8 22:24:30 new2 kernel: parport0: Printer, Hewlett-Packard HP LaserJet 6L
Jun 8 22:24:30 new2 kernel: SCSI subsystem initialized
Jun 8 22:24:30 new2 kernel: inserting floppy driver for 2.6.6-1.422
Jun 8 22:24:30 new2 kernel: Floppy drive(s): fd0 is 1.44M
Jun 8 22:24:30 new2 kernel: FDC 0 is a post-1991 82077
Jun 8 22:24:30 new2 rc: Starting pcmcia: succeeded
Jun 8 22:24:30 new2 kernel: audit(1086747859.036:0): avc: denied { read } for pid=1378 exe=/sbin/restorecon name=config dev=hda2 ino=914871 scontext=system_u:system_r:udev_t tcontext=system_u:object_r:selinux_config_t tclass=file
Jun 8 22:24:30 new2 kernel: audit(1086747859.037:0): avc: denied { search } for pid=1378 exe=/sbin/restorecon name=targeted dev=hda2 ino=913088 scontext=system_u:system_r:udev_t tcontext=system_u:object_r:selinux_config_t tclass=dir
Jun 8 22:24:30 new2 kernel: sis900.c: v1.08.07 11/02/2003
Jun 8 22:24:30 new2 kernel: eth0: VIA 6103 PHY transceiver found at address 1.
Jun 8 22:24:30 new2 kernel: eth0: Using transceiver found at address 1 as default
Jun 8 22:24:30 new2 kernel: eth0: SiS 900 PCI Fast Ethernet at 0xe800, IRQ 11, 00:e0:4c:bd:2d:aa.
Jun 8 22:24:30 new2 kernel: ip_tables: (C) 2000-2002 Netfilter core team
Jun 8 22:24:30 new2 kernel: ip_conntrack version 2.1 (1791 buckets, 14328 max) - 296 bytes per conntrack
Jun 8 22:24:30 new2 kernel: sis900.c: v1.08.07 11/02/2003
Jun 8 22:24:30 new2 kernel: eth0: VIA 6103 PHY transceiver found at address 1.
Jun 8 22:24:30 new2 kernel: eth0: Using transceiver found at address 1 as default
Jun 8 22:24:30 new2 kernel: eth0: SiS 900 PCI Fast Ethernet at 0xe800, IRQ 11, 00:e0:4c:bd:2d:aa.
Jun 8 22:24:30 new2 kernel: eth0: Media Link On 100mbps full-duplex
Jun 8 22:24:30 new2 kernel: SELinux: initialized (dev rpc_pipefs, type rpc_pipefs), uses genfs_contexts
Jun 8 22:24:30 new2 netfs: Mounting other filesystems: succeeded
Jun 8 22:24:30 new2 autofs: automount startup succeeded
Jun 8 22:24:28 new2 ifup: done.
Jun 8 22:24:28 new2 network: Bringing up interface eth0: succeeded
Jun 8 22:24:30 new2 smartd[1885]: smartd version 5.30 Copyright (C) 2002-4 Bruce Allen
Jun 8 22:24:30 new2 smartd[1885]: Home page is http://smartmontools.sourceforge.net/
Jun 8 22:24:30 new2 smartd[1885]: Opened configuration file /etc/smartd.conf
Jun 8 22:24:30 new2 smartd[1885]: Configuration file /etc/smartd.conf parsed.
Jun 8 22:24:30 new2 smartd[1885]: Device: /dev/hda, opened
Jun 8 22:24:30 new2 smartd[1885]: Device: /dev/hda, found in smartd database.
Jun 8 22:24:31 new2 smartd[1885]: Device: /dev/hda, is SMART capable. Adding to "monitor" list.
Jun 8 22:24:31 new2 smartd[1885]: Monitoring 1 ATA and 0 SCSI devices
Jun 8 22:24:31 new2 smartd[1887]: smartd has fork()ed into background mode. New PID=1887.
Jun 8 22:24:31 new2 smartd: smartd startup succeeded
Jun 8 22:24:31 new2 acpid: acpid startup succeeded
Jun 8 22:24:33 new2 kernel: audit(1086747873.855:0): avc: denied { execute } for pid=1916 exe=/bin/bash name=epson dev=hda2 ino=116675 scontext=system_u:system_r:cupsd_t tcontext=system_u:object_r:lib_t tclass=file
Jun 8 22:24:33 new2 kernel: audit(1086747873.889:0): avc: denied { execute } for pid=1917 exe=/bin/bash name=canon dev=hda2 ino=602663 scontext=system_u:system_r:cupsd_t tcontext=system_u:object_r:lib_t tclass=file
Jun 8 22:24:34 new2 kernel: parport0: PC-style at 0x378 (0x778) [PCSPP,TRISTATE]
Jun 8 22:24:34 new2 kernel: parport0: irq 7 detected
Jun 8 22:24:34 new2 kernel: parport0: Printer, Hewlett-Packard HP LaserJet 6L
Jun 8 22:24:34 new2 kernel: lp0: using parport0 (polling).
Jun 8 22:24:34 new2 kernel: lp0: console ready
Jun 8 22:24:36 new2 cups: cupsd startup succeeded
Jun 8 22:24:36 new2 sshd: succeeded
Jun 8 22:24:36 new2 xinetd: xinetd startup succeeded
Jun 8 22:24:36 new2 ntpd: succeeded
Jun 8 22:24:36 new2 ntpd: succeeded
Jun 8 22:24:38 new2 xinetd[2119]: xinetd Version 2.3.13 started with libwrap loadavg options compiled in.
Jun 8 22:24:38 new2 xinetd[2119]: Started working: 1 available service
Jun 8 22:24:37 new2 ntpdate[2139]: step time server 209.132.176.4 offset -0.498504 sec
Jun 8 22:24:37 new2 ntpd: succeeded
Jun 8 22:24:37 new2 ntpd[2143]: ntpd 4.2.0(a)1.1161-r Thu Mar 11 11:46:39 EST 2004 (1)
Jun 8 22:24:37 new2 ntpd: ntpd startup succeeded
Jun 8 22:24:37 new2 ntpd[2143]: precision = 1.000 usec
Jun 8 22:24:37 new2 ntpd[2143]: kernel time sync status 0040
Jun 8 22:24:37 new2 ntpd[2143]: frequency initialized 90.442 PPM from /var/lib/ntp/drift
Jun 8 22:24:37 new2 ntpd[2143]: configure: keyword "authenticate" unknown, line ignored
Jun 8 22:24:38 new2 sendmail: sendmail startup succeeded
Jun 8 22:24:38 new2 sendmail: sm-client startup succeeded
Jun 8 22:24:41 new2 spamassassin: spamd startup succeeded
Jun 8 22:24:41 new2 privoxy: Jun 08 22:24:41 Privoxy(-150720384) Info: loading configuration file '/etc/privoxy/config':
Jun 8 22:24:42 new2 privoxy: privoxy startup succeeded
Jun 8 22:24:42 new2 gpm[2204]: *** info [startup.c(95)]:
Jun 8 22:24:42 new2 gpm[2204]: Started gpm successfully. Entered daemon mode.
Jun 8 22:24:42 new2 gpm[2204]: *** info [mice.c(1766)]:
Jun 8 22:24:42 new2 gpm[2204]: imps2: Auto-detected intellimouse PS/2
Jun 8 22:24:42 new2 gpm: gpm startup succeeded
Jun 8 22:24:43 new2 su(pam_unix)[2222]: session opened for user postgres by (uid=0)
Jun 8 22:24:43 new2 su[2222]: Unable to get valid context for postgres, No valid tty
Jun 8 22:24:43 new2 su(pam_unix)[2225]: session opened for user postgres by (uid=0)
Jun 8 22:24:43 new2 su[2225]: Unable to get valid context for postgres, No valid tty
Jun 8 22:24:43 new2 udev[2227]: creating device node '/udev/lp0'
Jun 8 22:24:43 new2 kernel: audit(1086747883.833:0): avc: denied { read } for pid=2231 exe=/sbin/restorecon name=config dev=hda2 ino=914871 scontext=system_u:system_r:udev_t tcontext=system_u:object_r:selinux_config_t tclass=file
Jun 8 22:24:43 new2 kernel: audit(1086747883.833:0): avc: denied { search } for pid=2231 exe=/sbin/restorecon name=targeted dev=hda2 ino=913088 scontext=system_u:system_r:udev_t tcontext=system_u:object_r:selinux_config_t tclass=dir
Jun 8 22:24:44 new2 postgresql: Starting postgresql service: failed
Jun 8 22:24:44 new2 crond: crond startup succeeded
Jun 8 22:24:45 new2 xfs: xfs startup succeeded
Jun 8 22:24:46 new2 lisa: lisa startup succeeded
Jun 8 22:24:46 new2 anacron: anacron startup succeeded
Jun 8 22:24:46 new2 atd: atd startup succeeded
Jun 8 22:24:46 new2 readahead: Starting background readahead:
Jun 8 22:24:46 new2 rc: Starting readahead: succeeded
Jun 8 22:24:48 new2 messagebus: messagebus startup succeeded
Jun 8 22:24:48 new2 mdmpd: Kernel md module does not support events
Jun 8 22:24:48 new2 mdmpd: mdmpd startup failed
Jun 8 22:24:48 new2 mdmpd: mdmpd failed
Jun 8 22:24:48 new2 udev[2363]: removing device node '/udev/vcs8'
Jun 8 22:24:48 new2 kernel: audit(1086747888.939:0): avc: denied { read } for pid=2367 exe=/sbin/restorecon name=config dev=hda2 ino=914871 scontext=system_u:system_r:udev_t tcontext=system_u:object_r:selinux_config_t tclass=file
Jun 8 22:24:48 new2 kernel: audit(1086747888.951:0): avc: denied { use } for pid=2372 exe=/bin/umount path=/dev/ptmx dev=hda2 ino=1064811 scontext=system_u:system_r:mount_t tcontext=system_u:system_r:rhgb_gph_t tclass=fd
Jun 8 22:24:48 new2 kernel: audit(1086747888.951:0): avc: denied { read write } for pid=2372 exe=/bin/umount path=socket:[1428] dev=sockfs ino=1428 scontext=system_u:system_r:mount_t tcontext=system_u:system_r:rhgb_t tclass=unix_stream_socket
Jun 8 22:24:49 new2 udev[2472]: removing device node '/udev/vcsa8'
Jun 8 22:24:49 new2 kernel: audit(1086747889.209:0): avc: denied { read } for pid=2476 exe=/sbin/restorecon name=config dev=hda2 ino=914871 scontext=system_u:system_r:udev_t tcontext=system_u:object_r:selinux_config_t tclass=file
Jun 8 22:24:49 new2 udev[2477]: creating device node '/udev/vcs1'
Jun 8 22:24:49 new2 kernel: audit(1086747889.346:0): avc: denied { read } for pid=2532 exe=/sbin/restorecon name=config dev=hda2 ino=914871 scontext=system_u:system_r:udev_t tcontext=system_u:object_r:selinux_config_t tclass=file
Jun 8 22:24:49 new2 kernel: audit(1086747889.346:0): avc: denied { search } for pid=2532 exe=/sbin/restorecon name=targeted dev=hda2 ino=913088 scontext=system_u:system_r:udev_t tcontext=system_u:object_r:selinux_config_t tclass=dir
Jun 8 22:24:49 new2 udev[2478]: creating device node '/udev/vcs2'
Jun 8 22:24:49 new2 udev[2480]: creating device node '/udev/vcs4'
Jun 8 22:24:49 new2 kernel: audit(1086747889.368:0): avc: denied { read } for pid=2541 exe=/sbin/restorecon name=config dev=hda2 ino=914871 scontext=system_u:system_r:udev_t tcontext=system_u:object_r:selinux_config_t tclass=file
Jun 8 22:24:49 new2 kernel: audit(1086747889.368:0): avc: denied { search } for pid=2541 exe=/sbin/restorecon name=targeted dev=hda2 ino=913088 scontext=system_u:system_r:udev_t tcontext=system_u:object_r:selinux_config_t tclass=dir
Jun 8 22:24:49 new2 kernel: audit(1086747889.427:0): avc: denied { read } for pid=2564 exe=/sbin/restorecon name=config dev=hda2 ino=914871 scontext=system_u:system_r:udev_t tcontext=system_u:object_r:selinux_config_t tclass=file
Jun 8 22:24:49 new2 kernel: audit(1086747889.427:0): avc: denied { search } for pid=2564 exe=/sbin/restorecon name=targeted dev=hda2 ino=913088 scontext=system_u:system_r:udev_t tcontext=system_u:object_r:selinux_config_t tclass=dir
Jun 8 22:24:49 new2 udev[2581]: removing device node '/udev/vcs1'
Jun 8 22:24:49 new2 kernel: audit(1086747889.469:0): avc: denied { read } for pid=2585 exe=/sbin/restorecon name=config dev=hda2 ino=914871 scontext=system_u:system_r:udev_t tcontext=system_u:object_r:selinux_config_t tclass=file
Jun 8 22:24:49 new2 kernel: audit(1086747889.469:0): avc: denied { search } for pid=2585 exe=/sbin/restorecon name=targeted dev=hda2 ino=913088 scontext=system_u:system_r:udev_t tcontext=system_u:object_r:selinux_config_t tclass=dir
Jun 8 22:24:49 new2 udev[2481]: creating device node '/udev/vcs5'
Jun 8 22:24:49 new2 kernel: audit(1086747889.610:0): avc: denied { read } for pid=2640 exe=/sbin/restorecon name=config dev=hda2 ino=914871 scontext=system_u:system_r:udev_t tcontext=system_u:object_r:selinux_config_t tclass=file
Jun 8 22:24:49 new2 kernel: audit(1086747889.610:0): avc: denied { search } for pid=2640 exe=/sbin/restorecon name=targeted dev=hda2 ino=913088 scontext=system_u:system_r:udev_t tcontext=system_u:object_r:selinux_config_t tclass=dir
Jun 8 22:24:49 new2 udev[2577]: creating device node '/udev/vcsa1'
Jun 8 22:24:49 new2 udev[2578]: creating device node '/udev/vcsa2'
Jun 8 22:24:49 new2 udev[2586]: removing device node '/udev/vcs2'
Jun 8 22:24:49 new2 udev[2579]: creating device node '/udev/vcsa3'
Jun 8 22:24:49 new2 udev[2591]: creating device node '/udev/vcs1'
Jun 8 22:24:49 new2 udev[2624]: removing device node '/udev/vcs4'
Jun 8 22:24:49 new2 kernel: audit(1086747889.635:0): avc: denied { read } for pid=2590 exe=/sbin/restorecon name=config dev=hda2 ino=914871 scontext=system_u:system_r:udev_t tcontext=system_u:object_r:selinux_config_t tclass=file
Jun 8 22:24:49 new2 udev[2664]: removing device node '/udev/vcsa1'
Jun 8 22:24:49 new2 udev[2669]: removing device node '/udev/vcsa2'
Jun 8 22:24:49 new2 udev[2622]: creating device node '/udev/vcsa5'
Jun 8 22:24:49 new2 udev[2623]: creating device node '/udev/vcsa6'
Jun 8 22:24:49 new2 udev[2641]: removing device node '/udev/vcs5'
Jun 8 22:24:49 new2 udev[2675]: removing device node '/udev/vcsa3'
Jun 8 22:24:49 new2 udev[2482]: creating device node '/udev/vcs6'
Jun 8 22:24:49 new2 udev[2674]: creating device node '/udev/vcs2'
Jun 8 22:24:49 new2 kernel: audit(1086747889.636:0): avc: denied { search } for pid=2590 exe=/sbin/restorecon name=targeted dev=hda2 ino=913088 scontext=system_u:system_r:udev_t tcontext=system_u:object_r:selinux_config_t tclass=dir
Jun 8 22:24:49 new2 udev[2690]: creating device node '/udev/vcs4'
Jun 8 22:24:50 new2 udev[2708]: creating device node '/udev/vcsa1'
Jun 8 22:24:50 new2 udev[2718]: removing device node '/udev/vcsa5'
Jun 8 22:24:50 new2 udev[2713]: creating device node '/udev/vcsa2'
Jun 8 22:24:50 new2 udev[2731]: removing device node '/udev/vcsa6'
Jun 8 22:24:50 new2 udev[2479]: creating device node '/udev/vcs3'
Jun 8 22:24:50 new2 udev[2736]: creating device node '/udev/vcs5'
Jun 8 22:24:50 new2 udev[2580]: creating device node '/udev/vcsa4'
Jun 8 22:24:50 new2 udev[2737]: creating device node '/udev/vcsa3'
Jun 8 22:24:50 new2 udev[2742]: removing device node '/udev/vcs6'
Jun 8 22:24:50 new2 kernel: audit(1086747889.647:0): avc: denied { read } for pid=2651 exe=/sbin/restorecon name=config dev=hda2 ino=914871 scontext=system_u:system_r:udev_t tcontext=system_u:object_r:selinux_config_t tclass=file
Jun 8 22:24:51 new2 udev[2760]: creating device node '/udev/vcsa5'
Jun 8 22:24:51 new2 udev[2798]: removing device node '/udev/vcs3'
Jun 8 22:24:51 new2 udev[2781]: creating device node '/udev/vcsa6'
Jun 8 22:24:51 new2 udev[2813]: removing device node '/udev/vcsa4'
Jun 8 22:24:51 new2 kernel: audit(1086747889.649:0): avc: denied { search } for pid=2651 exe=/sbin/restorecon name=targeted dev=hda2 ino=913088 scontext=system_u:system_r:udev_t tcontext=system_u:object_r:selinux_config_t tclass=dir
Jun 8 22:24:51 new2 kernel: audit(1086747889.660:0): avc: denied { read } for pid=2655 exe=/sbin/restorecon name=config dev=hda2 ino=914871 scontext=system_u:system_r:udev_t tcontext=system_u:object_r:selinux_config_t tclass=file
Jun 8 22:24:51 new2 kernel: audit(1086747889.661:0): avc: denied { search } for pid=2655 exe=/sbin/restorecon name=targeted dev=hda2 ino=913088 scontext=system_u:system_r:udev_t tcontext=system_u:object_r:selinux_config_t tclass=dir
Jun 8 22:24:51 new2 kernel: audit(1086747889.671:0): avc: denied { read } for pid=2659 exe=/sbin/restorecon name=config dev=hda2 ino=914871 scontext=system_u:system_r:udev_t tcontext=system_u:object_r:selinux_config_t tclass=file
Jun 8 22:24:51 new2 kernel: audit(1086747889.672:0): avc: denied { search } for pid=2659 exe=/sbin/restorecon name=targeted dev=hda2 ino=913088 scontext=system_u:system_r:udev_t tcontext=system_u:object_r:selinux_config_t tclass=dir
Jun 8 22:24:51 new2 kernel: audit(1086747889.682:0): avc: denied { read } for pid=2663 exe=/sbin/restorecon name=config dev=hda2 ino=914871 scontext=system_u:system_r:udev_t tcontext=system_u:object_r:selinux_config_t tclass=file
Jun 8 22:24:51 new2 kernel: audit(1086747889.682:0): avc: denied { search } for pid=2663 exe=/sbin/restorecon name=targeted dev=hda2 ino=913088 scontext=system_u:system_r:udev_t tcontext=system_u:object_r:selinux_config_t tclass=dir
Jun 8 22:24:51 new2 kernel: audit(1086747889.693:0): avc: denied { read } for pid=2668 exe=/sbin/restorecon name=config dev=hda2 ino=914871 scontext=system_u:system_r:udev_t tcontext=system_u:object_r:selinux_config_t tclass=file
Jun 8 22:24:51 new2 kernel: audit(1086747889.694:0): avc: denied { search } for pid=2668 exe=/sbin/restorecon name=targeted dev=hda2 ino=913088 scontext=system_u:system_r:udev_t tcontext=system_u:object_r:selinux_config_t tclass=dir
Jun 8 22:24:51 new2 kernel: audit(1086747889.705:0): avc: denied { read } for pid=2673 exe=/sbin/restorecon name=config dev=hda2 ino=914871 scontext=system_u:system_r:udev_t tcontext=system_u:object_r:selinux_config_t tclass=file
Jun 8 22:24:51 new2 kernel: audit(1086747889.705:0): avc: denied { search } for pid=2673 exe=/sbin/restorecon name=targeted dev=hda2 ino=913088 scontext=system_u:system_r:udev_t tcontext=system_u:object_r:selinux_config_t tclass=dir
Jun 8 22:24:51 new2 kernel: audit(1086747889.729:0): avc: denied { read } for pid=2682 exe=/sbin/restorecon name=config dev=hda2 ino=914871 scontext=system_u:system_r:udev_t tcontext=system_u:object_r:selinux_config_t tclass=file
Jun 8 22:24:51 new2 kernel: audit(1086747889.729:0): avc: denied { search } for pid=2682 exe=/sbin/restorecon name=targeted dev=hda2 ino=913088 scontext=system_u:system_r:udev_t tcontext=system_u:object_r:selinux_config_t tclass=dir
Jun 8 22:24:51 new2 kernel: audit(1086747889.741:0): avc: denied { read } for pid=2686 exe=/sbin/restorecon name=config dev=hda2 ino=914871 scontext=system_u:system_r:udev_t tcontext=system_u:object_r:selinux_config_t tclass=file
Jun 8 22:24:51 new2 kernel: audit(1086747889.742:0): avc: denied { search } for pid=2686 exe=/sbin/restorecon name=targeted dev=hda2 ino=913088 scontext=system_u:system_r:udev_t tcontext=system_u:object_r:selinux_config_t tclass=dir
Jun 8 22:24:51 new2 kernel: audit(1086747889.743:0): avc: denied { read } for pid=2687 exe=/sbin/restorecon name=config dev=hda2 ino=914871 scontext=system_u:system_r:udev_t tcontext=system_u:object_r:selinux_config_t tclass=file
Jun 8 22:24:51 new2 kernel: audit(1086747889.744:0): avc: denied { search } for pid=2687 exe=/sbin/restorecon name=targeted dev=hda2 ino=913088 scontext=system_u:system_r:udev_t tcontext=system_u:object_r:selinux_config_t tclass=dir
Jun 8 22:24:51 new2 kernel: audit(1086747890.186:0): avc: denied { read } for pid=2717 exe=/sbin/restorecon name=config dev=hda2 ino=914871 scontext=system_u:system_r:udev_t tcontext=system_u:object_r:selinux_config_t tclass=file
Jun 8 22:24:51 new2 kernel: audit(1086747890.186:0): avc: denied { search } for pid=2717 exe=/sbin/restorecon name=targeted dev=hda2 ino=913088 scontext=system_u:system_r:udev_t tcontext=system_u:object_r:selinux_config_t tclass=dir
Jun 8 22:24:51 new2 kernel: audit(1086747890.198:0): avc: denied { read } for pid=2722 exe=/sbin/restorecon name=config dev=hda2 ino=914871 scontext=system_u:system_r:udev_t tcontext=system_u:object_r:selinux_config_t tclass=file
Jun 8 22:24:51 new2 kernel: audit(1086747890.198:0): avc: denied { search } for pid=2722 exe=/sbin/restorecon name=targeted dev=hda2 ino=913088 scontext=system_u:system_r:udev_t tcontext=system_u:object_r:selinux_config_t tclass=dir
Jun 8 22:24:51 new2 kernel: audit(1086747890.252:0): avc: denied { read } for pid=2730 exe=/sbin/restorecon name=config dev=hda2 ino=914871 scontext=system_u:system_r:udev_t tcontext=system_u:object_r:selinux_config_t tclass=file
Jun 8 22:24:51 new2 kernel: audit(1086747890.252:0): avc: denied { search } for pid=2730 exe=/sbin/restorecon name=targeted dev=hda2 ino=913088 scontext=system_u:system_r:udev_t tcontext=system_u:object_r:selinux_config_t tclass=dir
Jun 8 22:24:51 new2 kernel: audit(1086747890.264:0): avc: denied { read } for pid=2735 exe=/sbin/restorecon name=config dev=hda2 ino=914871 scontext=system_u:system_r:udev_t tcontext=system_u:object_r:selinux_config_t tclass=file
Jun 8 22:24:51 new2 kernel: audit(1086747890.265:0): avc: denied { search } for pid=2735 exe=/sbin/restorecon name=targeted dev=hda2 ino=913088 scontext=system_u:system_r:udev_t tcontext=system_u:object_r:selinux_config_t tclass=dir
Jun 8 22:24:51 new2 kernel: audit(1086747890.729:0): avc: denied { read } for pid=2741 exe=/sbin/restorecon name=config dev=hda2 ino=914871 scontext=system_u:system_r:udev_t tcontext=system_u:object_r:selinux_config_t tclass=file
Jun 8 22:24:51 new2 kernel: audit(1086747890.730:0): avc: denied { search } for pid=2741 exe=/sbin/restorecon name=targeted dev=hda2 ino=913088 scontext=system_u:system_r:udev_t tcontext=system_u:object_r:selinux_config_t tclass=dir
Jun 8 22:24:51 new2 kernel: audit(1086747890.741:0): avc: denied { read } for pid=2746 exe=/sbin/restorecon name=config dev=hda2 ino=914871 scontext=system_u:system_r:udev_t tcontext=system_u:object_r:selinux_config_t tclass=file
Jun 8 22:24:51 new2 kernel: audit(1086747890.741:0): avc: denied { search } for pid=2746 exe=/sbin/restorecon name=targeted dev=hda2 ino=913088 scontext=system_u:system_r:udev_t tcontext=system_u:object_r:selinux_config_t tclass=dir
Jun 8 22:24:51 new2 kernel: audit(1086747890.861:0): avc: denied { read } for pid=2751 exe=/sbin/restorecon name=config dev=hda2 ino=914871 scontext=system_u:system_r:udev_t tcontext=system_u:object_r:selinux_config_t tclass=file
Jun 8 22:24:51 new2 kernel: audit(1086747890.861:0): avc: denied { search } for pid=2751 exe=/sbin/restorecon name=targeted dev=hda2 ino=913088 scontext=system_u:system_r:udev_t tcontext=system_u:object_r:selinux_config_t tclass=dir
Jun 8 22:24:51 new2 kernel: audit(1086747891.133:0): avc: denied { read } for pid=2755 exe=/sbin/restorecon name=config dev=hda2 ino=914871 scontext=system_u:system_r:udev_t tcontext=system_u:object_r:selinux_config_t tclass=file
Jun 8 22:24:51 new2 kernel: audit(1086747891.133:0): avc: denied { search } for pid=2755 exe=/sbin/restorecon name=targeted dev=hda2 ino=913088 scontext=system_u:system_r:udev_t tcontext=system_u:object_r:selinux_config_t tclass=dir
Jun 8 22:24:51 new2 kernel: audit(1086747891.181:0): avc: denied { read } for pid=2759 exe=/sbin/restorecon name=config dev=hda2 ino=914871 scontext=system_u:system_r:udev_t tcontext=system_u:object_r:selinux_config_t tclass=file
Jun 8 22:24:51 new2 kernel: audit(1086747891.181:0): avc: denied { search } for pid=2759 exe=/sbin/restorecon name=targeted dev=hda2 ino=913088 scontext=system_u:system_r:udev_t tcontext=system_u:object_r:selinux_config_t tclass=dir
Jun 8 22:24:51 new2 kernel: audit(1086747891.297:0): avc: denied { read } for pid=2765 exe=/sbin/restorecon name=config dev=hda2 ino=914871 scontext=system_u:system_r:udev_t tcontext=system_u:object_r:selinux_config_t tclass=file
Jun 8 22:24:51 new2 kernel: audit(1086747891.297:0): avc: denied { search } for pid=2765 exe=/sbin/restorecon name=targeted dev=hda2 ino=913088 scontext=system_u:system_r:udev_t tcontext=system_u:object_r:selinux_config_t tclass=dir
Jun 8 22:24:51 new2 kernel: audit(1086747891.570:0): avc: denied { read } for pid=2797 exe=/sbin/restorecon name=config dev=hda2 ino=914871 scontext=system_u:system_r:udev_t tcontext=system_u:object_r:selinux_config_t tclass=file
Jun 8 22:24:51 new2 kernel: audit(1086747891.571:0): avc: denied { search } for pid=2797 exe=/sbin/restorecon name=targeted dev=hda2 ino=913088 scontext=system_u:system_r:udev_t tcontext=system_u:object_r:selinux_config_t tclass=dir
Jun 8 22:24:51 new2 kernel: audit(1086747891.582:0): avc: denied { read } for pid=2802 exe=/sbin/restorecon name=config dev=hda2 ino=914871 scontext=system_u:system_r:udev_t tcontext=system_u:object_r:selinux_config_t tclass=file
Jun 8 22:24:51 new2 kernel: audit(1086747891.582:0): avc: denied { search } for pid=2802 exe=/sbin/restorecon name=targeted dev=hda2 ino=913088 scontext=system_u:system_r:udev_t tcontext=system_u:object_r:selinux_config_t tclass=dir
Jun 8 22:24:51 new2 kernel: audit(1086747891.670:0): avc: denied { read } for pid=2808 exe=/sbin/restorecon name=config dev=hda2 ino=914871 scontext=system_u:system_r:udev_t tcontext=system_u:object_r:selinux_config_t tclass=file
Jun 8 22:24:51 new2 kernel: audit(1086747891.670:0): avc: denied { search } for pid=2808 exe=/sbin/restorecon name=targeted dev=hda2 ino=913088 scontext=system_u:system_r:udev_t tcontext=system_u:object_r:selinux_config_t tclass=dir
Jun 8 22:24:51 new2 kernel: audit(1086747891.781:0): avc: denied { read } for pid=2812 exe=/sbin/restorecon name=config dev=hda2 ino=914871 scontext=system_u:system_r:udev_t tcontext=system_u:object_r:selinux_config_t tclass=file
Jun 8 22:24:51 new2 kernel: audit(1086747891.781:0): avc: denied { search } for pid=2812 exe=/sbin/restorecon name=targeted dev=hda2 ino=913088 scontext=system_u:system_r:udev_t tcontext=system_u:object_r:selinux_config_t tclass=dir
Jun 8 22:24:51 new2 kernel: audit(1086747891.792:0): avc: denied { read } for pid=2817 exe=/sbin/restorecon name=config dev=hda2 ino=914871 scontext=system_u:system_r:udev_t tcontext=system_u:object_r:selinux_config_t tclass=file
Jun 8 22:24:51 new2 kernel: audit(1086747891.793:0): avc: denied { search } for pid=2817 exe=/sbin/restorecon name=targeted dev=hda2 ino=913088 scontext=system_u:system_r:udev_t tcontext=system_u:object_r:selinux_config_t tclass=dir
Jun 8 22:24:51 new2 kernel: audit(1086747891.856:0): avc: denied { read } for pid=2833 exe=/sbin/restorecon name=config dev=hda2 ino=914871 scontext=system_u:system_r:udev_t tcontext=system_u:object_r:selinux_config_t tclass=file
Jun 8 22:24:51 new2 kernel: audit(1086747891.856:0): avc: denied { search } for pid=2833 exe=/sbin/restorecon name=targeted dev=hda2 ino=913088 scontext=system_u:system_r:udev_t tcontext=system_u:object_r:selinux_config_t tclass=dir
Jun 8 22:24:51 new2 kernel: audit(1086747891.873:0): avc: denied { read } for pid=2838 exe=/sbin/restorecon name=config dev=hda2 ino=914871 scontext=system_u:system_r:udev_t tcontext=system_u:object_r:selinux_config_t tclass=file
Jun 8 22:24:51 new2 kernel: audit(1086747891.873:0): avc: denied { search } for pid=2838 exe=/sbin/restorecon name=targeted dev=hda2 ino=913088 scontext=system_u:system_r:udev_t tcontext=system_u:object_r:selinux_config_t tclass=dir
Jun 8 22:24:51 new2 kernel: audit(1086747891.889:0): avc: denied { read } for pid=2843 exe=/sbin/restorecon name=config dev=hda2 ino=914871 scontext=system_u:system_r:udev_t tcontext=system_u:object_r:selinux_config_t tclass=file
Jun 8 22:24:51 new2 kernel: audit(1086747891.889:0): avc: denied { search } for pid=2843 exe=/sbin/restorecon name=targeted dev=hda2 ino=913088 scontext=system_u:system_r:udev_t tcontext=system_u:object_r:selinux_config_t tclass=dir
Jun 8 22:24:51 new2 udev[2834]: creating device node '/udev/vcs6'
Jun 8 22:24:51 new2 kernel: audit(1086747891.992:0): avc: denied { read } for pid=2848 exe=/sbin/restorecon name=config dev=hda2 ino=914871 scontext=system_u:system_r:udev_t tcontext=system_u:object_r:selinux_config_t tclass=file
Jun 8 22:24:51 new2 kernel: audit(1086747891.992:0): avc: denied { search } for pid=2848 exe=/sbin/restorecon name=targeted dev=hda2 ino=913088 scontext=system_u:system_r:udev_t tcontext=system_u:object_r:selinux_config_t tclass=dir
Jun 8 22:24:52 new2 udev[2839]: creating device node '/udev/vcs3'
Jun 8 22:24:52 new2 kernel: audit(1086747892.010:0): avc: denied { read } for pid=2852 exe=/sbin/restorecon name=config dev=hda2 ino=914871 scontext=system_u:system_r:udev_t tcontext=system_u:object_r:selinux_config_t tclass=file
Jun 8 22:24:52 new2 kernel: audit(1086747892.011:0): avc: denied { search } for pid=2852 exe=/sbin/restorecon name=targeted dev=hda2 ino=913088 scontext=system_u:system_r:udev_t tcontext=system_u:object_r:selinux_config_t tclass=dir
Jun 8 22:24:52 new2 udev[2844]: creating device node '/udev/vcsa4'
Jun 8 22:24:52 new2 kernel: audit(1086747892.033:0): avc: denied { read } for pid=2856 exe=/sbin/restorecon name=config dev=hda2 ino=914871 scontext=system_u:system_r:udev_t tcontext=system_u:object_r:selinux_config_t tclass=file
Jun 8 22:24:52 new2 kernel: audit(1086747892.034:0): avc: denied { search } for pid=2856 exe=/sbin/restorecon name=targeted dev=hda2 ino=913088 scontext=system_u:system_r:udev_t tcontext=system_u:object_r:selinux_config_t tclass=dir
Jun 8 22:24:52 new2 udev[2772]: creating device node '/udev/vcs7'
Jun 8 22:24:52 new2 udev[2861]: removing device node '/udev/vcs7'
Jun 8 22:24:52 new2 udev[2779]: creating device node '/udev/vcsa7'
Jun 8 22:24:52 new2 udev[2871]: removing device node '/udev/vcsa7'
Jun 8 22:24:52 new2 kernel: audit(1086747892.438:0): avc: denied { fowner } for pid=2772 exe=/sbin/udev capability=3 scontext=system_u:system_r:udev_t tcontext=system_u:system_r:udev_t tclass=capability
Jun 8 22:24:52 new2 kernel: audit(1086747892.448:0): avc: denied { read } for pid=2860 exe=/sbin/restorecon name=config dev=hda2 ino=914871 scontext=system_u:system_r:udev_t tcontext=system_u:object_r:selinux_config_t tclass=file
Jun 8 22:24:52 new2 kernel: audit(1086747892.448:0): avc: denied { search } for pid=2860 exe=/sbin/restorecon name=targeted dev=hda2 ino=913088 scontext=system_u:system_r:udev_t tcontext=system_u:object_r:selinux_config_t tclass=dir
Jun 8 22:24:52 new2 kernel: audit(1086747892.459:0): avc: denied { read } for pid=2865 exe=/sbin/restorecon name=config dev=hda2 ino=914871 scontext=system_u:system_r:udev_t tcontext=system_u:object_r:selinux_config_t tclass=file
Jun 8 22:24:52 new2 kernel: audit(1086747892.460:0): avc: denied { search } for pid=2865 exe=/sbin/restorecon name=targeted dev=hda2 ino=913088 scontext=system_u:system_r:udev_t tcontext=system_u:object_r:selinux_config_t tclass=dir
Jun 8 22:24:52 new2 kernel: audit(1086747892.463:0): avc: denied { fowner } for pid=2779 exe=/sbin/udev capability=3 scontext=system_u:system_r:udev_t tcontext=system_u:system_r:udev_t tclass=capability
Jun 8 22:24:52 new2 kernel: audit(1086747892.472:0): avc: denied { read } for pid=2870 exe=/sbin/restorecon name=config dev=hda2 ino=914871 scontext=system_u:system_r:udev_t tcontext=system_u:object_r:selinux_config_t tclass=file
Jun 8 22:24:52 new2 kernel: audit(1086747892.473:0): avc: denied { search } for pid=2870 exe=/sbin/restorecon name=targeted dev=hda2 ino=913088 scontext=system_u:system_r:udev_t tcontext=system_u:object_r:selinux_config_t tclass=dir
Jun 8 22:24:52 new2 kernel: audit(1086747892.484:0): avc: denied { read } for pid=2875 exe=/sbin/restorecon name=config dev=hda2 ino=914871 scontext=system_u:system_r:udev_t tcontext=system_u:object_r:selinux_config_t tclass=file
Jun 8 22:24:52 new2 udev[2866]: creating device node '/udev/vcs7'
Jun 8 22:24:52 new2 udev[2876]: creating device node '/udev/vcsa7'
Jun 8 22:24:52 new2 kernel: audit(1086747892.484:0): avc: denied { search } for pid=2875 exe=/sbin/restorecon name=targeted dev=hda2 ino=913088 scontext=system_u:system_r:udev_t tcontext=system_u:object_r:selinux_config_t tclass=dir
Jun 8 22:24:53 new2 kernel: audit(1086747892.822:0): avc: denied { read } for pid=2880 exe=/sbin/restorecon name=config dev=hda2 ino=914871 scontext=system_u:system_r:udev_t tcontext=system_u:object_r:selinux_config_t tclass=file
Jun 8 22:24:53 new2 kernel: audit(1086747892.823:0): avc: denied { search } for pid=2880 exe=/sbin/restorecon name=targeted dev=hda2 ino=913088 scontext=system_u:system_r:udev_t tcontext=system_u:object_r:selinux_config_t tclass=dir
Jun 8 22:24:53 new2 kernel: audit(1086747892.892:0): avc: denied { read } for pid=2884 exe=/sbin/restorecon name=config dev=hda2 ino=914871 scontext=system_u:system_r:udev_t tcontext=system_u:object_r:selinux_config_t tclass=file
Jun 8 22:24:53 new2 kernel: audit(1086747892.892:0): avc: denied { search } for pid=2884 exe=/sbin/restorecon name=targeted dev=hda2 ino=913088 scontext=system_u:system_r:udev_t tcontext=system_u:object_r:selinux_config_t tclass=dir
Jun 8 22:25:14 new2 gdm(pam_unix)[2761]: session opened for user richard by (uid=0)
Jun 8 22:25:15 new2 kernel: audit(1086747915.533:0): avc: denied { setrlimit } for pid=2955 exe=/usr/bin/ssh-agent scontext=richard:staff_r:staff_t tcontext=richard:staff_r:staff_t tclass=process
Jun 8 22:25:23 new2 kernel: intel8x0_measure_ac97_clock: measured 49355 usecs
Jun 8 22:25:23 new2 kernel: intel8x0: clocking to 48000
Jun 8 22:25:23 new2 udev[3022]: configured rule in '/etc/udev/rules.d//50-udev.rules' at line 17 applied, 'pcmC0D0p' becomes 'snd/%k'
Jun 8 22:25:23 new2 udev[3022]: creating device node '/udev/snd/pcmC0D0p'
Jun 8 22:25:23 new2 kernel: audit(1086747923.901:0): avc: denied { read } for pid=3028 exe=/sbin/restorecon name=config dev=hda2 ino=914871 scontext=system_u:system_r:udev_t tcontext=system_u:object_r:selinux_config_t tclass=file
Jun 8 22:25:23 new2 kernel: audit(1086747923.901:0): avc: denied { search } for pid=3028 exe=/sbin/restorecon name=targeted dev=hda2 ino=913088 scontext=system_u:system_r:udev_t tcontext=system_u:object_r:selinux_config_t tclass=dir
Jun 8 22:25:24 new2 udev[3037]: creating device node '/udev/mixer'
Jun 8 22:25:24 new2 kernel: audit(1086747924.182:0): avc: denied { read } for pid=3048 exe=/sbin/restorecon name=config dev=hda2 ino=914871 scontext=system_u:system_r:udev_t tcontext=system_u:object_r:selinux_config_t tclass=file
Jun 8 22:25:24 new2 kernel: audit(1086747924.183:0): avc: denied { search } for pid=3048 exe=/sbin/restorecon name=targeted dev=hda2 ino=913088 scontext=system_u:system_r:udev_t tcontext=system_u:object_r:selinux_config_t tclass=dir
Jun 8 22:25:24 new2 udev[2993]: configured rule in '/etc/udev/rules.d//50-udev.rules' at line 15 applied, 'controlC0' becomes 'snd/%k'
Jun 8 22:25:24 new2 udev[2993]: creating device node '/udev/snd/controlC0'
Jun 8 22:25:24 new2 kernel: audit(1086747924.500:0): avc: denied { read } for pid=3052 exe=/sbin/restorecon name=config dev=hda2 ino=914871 scontext=system_u:system_r:udev_t tcontext=system_u:object_r:selinux_config_t tclass=file
Jun 8 22:25:24 new2 kernel: audit(1086747924.500:0): avc: denied { search } for pid=3052 exe=/sbin/restorecon name=targeted dev=hda2 ino=913088 scontext=system_u:system_r:udev_t tcontext=system_u:object_r:selinux_config_t tclass=dir
Jun 8 22:25:24 new2 udev[3000]: configured rule in '/etc/udev/rules.d//50-udev.rules' at line 19 applied, 'timer' becomes 'snd/%k'
Jun 8 22:25:24 new2 udev[3000]: creating device node '/udev/snd/timer'
Jun 8 22:25:24 new2 kernel: audit(1086747924.598:0): avc: denied { read } for pid=3056 exe=/sbin/restorecon name=config dev=hda2 ino=914871 scontext=system_u:system_r:udev_t tcontext=system_u:object_r:selinux_config_t tclass=file
Jun 8 22:25:24 new2 kernel: audit(1086747924.598:0): avc: denied { search } for pid=3056 exe=/sbin/restorecon name=targeted dev=hda2 ino=913088 scontext=system_u:system_r:udev_t tcontext=system_u:object_r:selinux_config_t tclass=dir
Jun 8 22:25:24 new2 udev[3009]: configured rule in '/etc/udev/rules.d//50-udev.rules' at line 17 applied, 'pcmC0D1c' becomes 'snd/%k'
Jun 8 22:25:24 new2 udev[3009]: creating device node '/udev/snd/pcmC0D1c'
Jun 8 22:25:24 new2 kernel: audit(1086747924.841:0): avc: denied { read } for pid=3060 exe=/sbin/restorecon name=config dev=hda2 ino=914871 scontext=system_u:system_r:udev_t tcontext=system_u:object_r:selinux_config_t tclass=file
Jun 8 22:25:24 new2 kernel: audit(1086747924.841:0): avc: denied { search } for pid=3060 exe=/sbin/restorecon name=targeted dev=hda2 ino=913088 scontext=system_u:system_r:udev_t tcontext=system_u:object_r:selinux_config_t tclass=dir
Jun 8 22:25:24 new2 udev[3023]: configured rule in '/etc/udev/rules.d//50-udev.rules' at line 17 applied, 'pcmC0D0c' becomes 'snd/%k'
Jun 8 22:25:24 new2 udev[3023]: creating device node '/udev/snd/pcmC0D0c'
Jun 8 22:25:24 new2 kernel: audit(1086747924.905:0): avc: denied { read } for pid=3064 exe=/sbin/restorecon name=config dev=hda2 ino=914871 scontext=system_u:system_r:udev_t tcontext=system_u:object_r:selinux_config_t tclass=file
Jun 8 22:25:24 new2 kernel: audit(1086747924.905:0): avc: denied { search } for pid=3064 exe=/sbin/restorecon name=targeted dev=hda2 ino=913088 scontext=system_u:system_r:udev_t tcontext=system_u:object_r:selinux_config_t tclass=dir
Jun 8 22:25:31 new2 kernel: audit(1086747931.981:0): avc: denied { getattr } for pid=3118 exe=/usr/libexec/gnome-vfs-daemon path=/initrd dev=ram0 ino=2 scontext=richard:staff_r:staff_t tcontext=system_u:object_r:file_t tclass=dir
Jun 8 22:25:32 new2 kernel: audit(1086747932.884:0): avc: denied { getattr } for pid=3129 exe=/usr/bin/nautilus path=/initrd dev=ram0 ino=2 scontext=richard:staff_r:staff_t tcontext=system_u:object_r:file_t tclass=dir
Jun 8 22:25:33 new2 kernel: audit(1086747933.022:0): avc: denied { getattr } for pid=3130 exe=/usr/bin/nautilus path=/initrd dev=ram0 ino=2 scontext=richard:staff_r:staff_t tcontext=system_u:object_r:file_t tclass=dir
Jun 8 22:25:58 new2 kernel: audit(1086747958.306:0): avc: denied { read } for pid=3168 exe=/bin/su name=shadow dev=hda2 ino=867624 scontext=richard:staff_r:staff_t tcontext=system_u:object_r:shadow_t tclass=file
Jun 8 22:25:58 new2 last message repeated 3 times
Jun 8 22:26:01 new2 kernel: audit(1086747961.248:0): avc: denied { read } for pid=3168 exe=/bin/su name=shadow dev=hda2 ino=867624 scontext=richard:staff_r:staff_t tcontext=system_u:object_r:shadow_t tclass=file
Jun 8 22:26:01 new2 last message repeated 3 times
Jun 8 22:26:01 new2 kernel: audit(1086747961.256:0): avc: denied { dac_override } for pid=3168 exe=/bin/su capability=1 scontext=richard:staff_r:staff_t tcontext=richard:staff_r:staff_t tclass=capability
Jun 8 22:26:01 new2 kernel: audit(1086747961.256:0): avc: denied { dac_read_search } for pid=3168 exe=/bin/su capability=2 scontext=richard:staff_r:staff_t tcontext=richard:staff_r:staff_t tclass=capability
Jun 8 22:26:01 new2 kernel: audit(1086747961.318:0): avc: denied { setuid } for pid=3170 exe=/bin/su capability=7 scontext=richard:staff_r:staff_t tcontext=richard:staff_r:staff_t tclass=capability
Jun 8 22:26:01 new2 kernel: audit(1086747961.356:0): avc: denied { setuid } for pid=3171 exe=/bin/su capability=7 scontext=richard:staff_r:staff_t tcontext=richard:staff_r:staff_t tclass=capability
Jun 8 22:26:01 new2 kernel: audit(1086747961.365:0): avc: denied { read } for pid=3171 exe=/usr/X11R6/bin/xauth name=.xauthvDHBZv dev=hda2 ino=684106 scontext=richard:staff_r:staff_xauth_t tcontext=richard:object_r:staff_home_t tclass=file
Jun 8 22:26:01 new2 kernel: audit(1086747961.399:0): avc: denied { relabelfrom } for pid=3168 exe=/bin/su name=1 dev=devpts ino=3 scontext=richard:staff_r:staff_t tcontext=richard:object_r:staff_devpts_t tclass=chr_file
Jun 8 22:26:01 new2 kernel: audit(1086747961.399:0): avc: denied { dac_override } for pid=3168 exe=/bin/su capability=1 scontext=richard:staff_r:staff_t tcontext=richard:staff_r:staff_t tclass=capability
Jun 8 22:26:01 new2 kernel: audit(1086747961.399:0): avc: denied { dac_read_search } for pid=3168 exe=/bin/su capability=2 scontext=richard:staff_r:staff_t tcontext=richard:staff_r:staff_t tclass=capability
Jun 8 22:26:01 new2 kernel: audit(1086747961.399:0): avc: denied { setexec } for pid=3168 exe=/bin/su scontext=richard:staff_r:staff_t tcontext=richard:staff_r:staff_t tclass=process
Jun 8 22:26:01 new2 kernel: audit(1086747961.399:0): avc: denied { dac_override } for pid=3168 exe=/bin/su capability=1 scontext=richard:staff_r:staff_t tcontext=richard:staff_r:staff_t tclass=capability
Jun 8 22:26:01 new2 kernel: audit(1086747961.399:0): avc: denied { dac_read_search } for pid=3168 exe=/bin/su capability=2 scontext=richard:staff_r:staff_t tcontext=richard:staff_r:staff_t tclass=capability
Jun 8 22:26:59 new2 gpm[2204]: *** info [mice.c(1766)]:
Jun 8 22:26:59 new2 gpm[2204]: imps2: Auto-detected intellimouse PS/2
Jun 8 22:27:10 new2 login(pam_unix)[2373]: session opened for user root by (uid=0)
Jun 8 22:27:10 new2 -- root[2373]: ROOT LOGIN ON tty1
Jun 8 22:27:35 new2 kernel: audit(1086748055.368:0): avc: granted { setenforce } for pid=3216 exe=/usr/bin/setenforce scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security
Jun 8 22:27:48 new2 kernel: audit(1086748068.957:0): avc: denied { read } for pid=3219 exe=/bin/su name=shadow dev=hda2 ino=867624 scontext=richard:staff_r:staff_t tcontext=system_u:object_r:shadow_t tclass=file
Jun 8 22:27:48 new2 kernel: audit(1086748068.958:0): avc: denied { getattr } for pid=3219 exe=/bin/su path=/etc/shadow dev=hda2 ino=867624 scontext=richard:staff_r:staff_t tcontext=system_u:object_r:shadow_t tclass=file
Jun 8 22:27:52 new2 su(pam_unix)[3219]: session opened for user root by richard(uid=500)
Jun 8 22:27:52 new2 kernel: audit(1086748072.836:0): avc: denied { setuid } for pid=3220 exe=/bin/su capability=7 scontext=richard:staff_r:staff_t tcontext=richard:staff_r:staff_t tclass=capability
Jun 8 22:27:53 new2 kernel: audit(1086748073.019:0): avc: denied { write } for pid=3221 exe=/usr/X11R6/bin/xauth name=.xauthogcM82 dev=hda2 ino=684140 scontext=richard:staff_r:staff_xauth_t tcontext=richard:object_r:staff_home_t tclass=file
Jun 8 22:27:53 new2 kernel: audit(1086748073.019:0): avc: denied { read } for pid=3221 exe=/usr/X11R6/bin/xauth name=.xauthogcM82 dev=hda2 ino=684140 scontext=richard:staff_r:staff_xauth_t tcontext=richard:object_r:staff_home_t tclass=file
Jun 8 22:27:53 new2 kernel: audit(1086748073.019:0): avc: denied { getattr } for pid=3221 exe=/usr/X11R6/bin/xauth path=/root/.xauthogcM82 dev=hda2 ino=684140 scontext=richard:staff_r:staff_xauth_t tcontext=richard:object_r:staff_home_t tclass=file
Jun 8 22:27:53 new2 kernel: audit(1086748073.027:0): avc: denied { unlink } for pid=3221 exe=/usr/X11R6/bin/xauth name=.xauthogcM82 dev=hda2 ino=684140 scontext=richard:staff_r:staff_xauth_t tcontext=richard:object_r:staff_home_t tclass=file
Jun 8 22:27:53 new2 kernel: audit(1086748073.062:0): avc: denied { relabelfrom } for pid=3219 exe=/bin/su name=1 dev=devpts ino=3 scontext=richard:staff_r:staff_t tcontext=richard:object_r:staff_devpts_t tclass=chr_file
Jun 8 22:27:53 new2 kernel: audit(1086748073.062:0): avc: denied { relabelto } for pid=3219 exe=/bin/su name=1 dev=devpts ino=3 scontext=richard:staff_r:staff_t tcontext=root:object_r:sysadm_devpts_t tclass=chr_file
Jun 8 22:27:53 new2 kernel: audit(1086748073.062:0): avc: denied { setexec } for pid=3219 exe=/bin/su scontext=richard:staff_r:staff_t tcontext=richard:staff_r:staff_t tclass=process
Jun 8 22:27:53 new2 kernel: audit(1086748073.064:0): avc: denied { transition } for pid=3222 exe=/bin/su path=/bin/bash dev=hda2 ino=1384545 scontext=richard:staff_r:staff_t tcontext=root:sysadm_r:sysadm_t tclass=process
Jun 8 22:27:53 new2 kernel: audit(1086748073.064:0): avc: denied { siginh } for pid=3222 exe=/bin/bash scontext=richard:staff_r:staff_t tcontext=root:sysadm_r:sysadm_t tclass=process
Jun 8 22:27:53 new2 kernel: audit(1086748073.064:0): avc: denied { rlimitinh } for pid=3222 exe=/bin/bash scontext=richard:staff_r:staff_t tcontext=root:sysadm_r:sysadm_t tclass=process
Jun 8 22:27:53 new2 kernel: audit(1086748073.064:0): avc: denied { noatsecure } for pid=3222 exe=/bin/bash scontext=richard:staff_r:staff_t tcontext=root:sysadm_r:sysadm_t tclass=process
Jun 8 22:28:30 new2 kernel: audit(1086748110.529:0): avc: denied { getattr } for pid=3255 exe=/usr/lib/mozilla-1.6/mozilla-bin path=/initrd dev=ram0 ino=2 scontext=richard:staff_r:staff_mozilla_t tcontext=system_u:object_r:file_t tclass=dir
Jun 8 22:29:00 new2 ntpd[2143]: synchronized to 209.132.176.4, stratum=1
Jun 8 22:29:00 new2 ntpd[2143]: kernel time sync disabled 0041
Jun 8 22:32:26 new2 gpm[2204]: *** info [mice.c(1766)]:
Jun 8 22:32:26 new2 gpm[2204]: imps2: Auto-detected intellimouse PS/2
Jun 8 22:37:34 new2 ntpd[2143]: kernel time sync enabled 0001
20 years
context for /var/log/cron.*
by Tom London
I noticed that the contexts for the logrotated cron log files are
'restored' by fixfiles/restorecon from system_u:object_r:crond_log_t to
system_u:object_r:var_log_t .
Would it make sense to change crond.fc from:
/var/log/cron -- system_u:object_r:crond_log_t
to something like:
/var/log/cron.* -- system_u:object_r:crond_log_t
tom
20 years