Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- [meway@meway ~]$ su -c '(ausearch -m avc -ts today; grep avc: /var/log/messages) | audit2why'
- Password:
- type=AVC msg=audit(1319555013.782:445): avc: denied { search } for pid=1108 comm="httpd" name="meway" dev=dm-1 ino=131095 scontext=system_u:system_r:httpd_t:s0 tcontext=unconfined_u:object_r:user_home_dir_t:s0 tclass=dir
- Was caused by:
- Unknown - would be allowed by active policy
- Possible mismatch between this policy and the one under which the audit message was generated.
- Possible mismatch between current in-memory boolean settings vs. permanent ones.
- type=AVC msg=audit(1319555013.786:446): avc: denied { search } for pid=1108 comm="httpd" name="meway" dev=dm-1 ino=131095 scontext=system_u:system_r:httpd_t:s0 tcontext=unconfined_u:object_r:user_home_dir_t:s0 tclass=dir
- Was caused by:
- Unknown - would be allowed by active policy
- Possible mismatch between this policy and the one under which the audit message was generated.
- Possible mismatch between current in-memory boolean settings vs. permanent ones.
- type=AVC msg=audit(1319555115.875:453): avc: denied { search } for pid=1106 comm="httpd" name="meway" dev=dm-1 ino=131095 scontext=system_u:system_r:httpd_t:s0 tcontext=unconfined_u:object_r:user_home_dir_t:s0 tclass=dir
- Was caused by:
- Unknown - would be allowed by active policy
- Possible mismatch between this policy and the one under which the audit message was generated.
- Possible mismatch between current in-memory boolean settings vs. permanent ones.
- type=AVC msg=audit(1319555115.875:454): avc: denied { search } for pid=1106 comm="httpd" name="meway" dev=dm-1 ino=131095 scontext=system_u:system_r:httpd_t:s0 tcontext=unconfined_u:object_r:user_home_dir_t:s0 tclass=dir
- Was caused by:
- Unknown - would be allowed by active policy
- Possible mismatch between this policy and the one under which the audit message was generated.
- Possible mismatch between current in-memory boolean settings vs. permanent ones.
- type=AVC msg=audit(1319555117.755:455): avc: denied { search } for pid=1103 comm="httpd" name="meway" dev=dm-1 ino=131095 scontext=system_u:system_r:httpd_t:s0 tcontext=unconfined_u:object_r:user_home_dir_t:s0 tclass=dir
- Was caused by:
- Unknown - would be allowed by active policy
- Possible mismatch between this policy and the one under which the audit message was generated.
- Possible mismatch between current in-memory boolean settings vs. permanent ones.
- type=AVC msg=audit(1319555117.756:456): avc: denied { search } for pid=1103 comm="httpd" name="meway" dev=dm-1 ino=131095 scontext=system_u:system_r:httpd_t:s0 tcontext=unconfined_u:object_r:user_home_dir_t:s0 tclass=dir
- Was caused by:
- Unknown - would be allowed by active policy
- Possible mismatch between this policy and the one under which the audit message was generated.
- Possible mismatch between current in-memory boolean settings vs. permanent ones.
- type=AVC msg=audit(1319555163.459:460): avc: denied { search } for pid=1104 comm="httpd" name="meway" dev=dm-1 ino=131095 scontext=system_u:system_r:httpd_t:s0 tcontext=unconfined_u:object_r:user_home_dir_t:s0 tclass=dir
- Was caused by:
- Unknown - would be allowed by active policy
- Possible mismatch between this policy and the one under which the audit message was generated.
- Possible mismatch between current in-memory boolean settings vs. permanent ones.
- type=AVC msg=audit(1319555163.460:461): avc: denied { search } for pid=1104 comm="httpd" name="meway" dev=dm-1 ino=131095 scontext=system_u:system_r:httpd_t:s0 tcontext=unconfined_u:object_r:user_home_dir_t:s0 tclass=dir
- Was caused by:
- Unknown - would be allowed by active policy
- Possible mismatch between this policy and the one under which the audit message was generated.
- Possible mismatch between current in-memory boolean settings vs. permanent ones.
- type=AVC msg=audit(1319555175.042:465): avc: denied { search } for pid=1105 comm="httpd" name="meway" dev=dm-1 ino=131095 scontext=system_u:system_r:httpd_t:s0 tcontext=unconfined_u:object_r:user_home_dir_t:s0 tclass=dir
- Was caused by:
- Unknown - would be allowed by active policy
- Possible mismatch between this policy and the one under which the audit message was generated.
- Possible mismatch between current in-memory boolean settings vs. permanent ones.
- type=AVC msg=audit(1319555175.043:466): avc: denied { search } for pid=1105 comm="httpd" name="meway" dev=dm-1 ino=131095 scontext=system_u:system_r:httpd_t:s0 tcontext=unconfined_u:object_r:user_home_dir_t:s0 tclass=dir
- Was caused by:
- Unknown - would be allowed by active policy
- Possible mismatch between this policy and the one under which the audit message was generated.
- Possible mismatch between current in-memory boolean settings vs. permanent ones.
- type=AVC msg=audit(1319555968.352:505): avc: denied { getattr } for pid=1111 comm="httpd" path="/home/meway/tmw-ea/updates/update1a.zip" dev=dm-1 ino=266582 scontext=system_u:system_r:httpd_t:s0 tcontext=system_u:object_r:dosfs_t:s0 tclass=file
- Was caused by:
- Missing type enforcement (TE) allow rule.
- You can use audit2allow to generate a loadable module to allow this access.
- type=AVC msg=audit(1319555968.352:504): avc: denied { getattr } for pid=1111 comm="httpd" path="/home/meway/tmw-ea/updates/resources.xml" dev=dm-1 ino=266584 scontext=system_u:system_r:httpd_t:s0 tcontext=system_u:object_r:dosfs_t:s0 tclass=file
- Was caused by:
- Missing type enforcement (TE) allow rule.
- You can use audit2allow to generate a loadable module to allow this access.
- type=AVC msg=audit(1319555968.352:506): avc: denied { getattr } for pid=1111 comm="httpd" path="/home/meway/tmw-ea/updates/news.txt" dev=dm-1 ino=264577 scontext=system_u:system_r:httpd_t:s0 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=lnk_file
- Was caused by:
- Unknown - would be allowed by active policy
- Possible mismatch between this policy and the one under which the audit message was generated.
- Possible mismatch between current in-memory boolean settings vs. permanent ones.
- type=AVC msg=audit(1319555968.353:507): avc: denied { getattr } for pid=1111 comm="httpd" path="/home/meway/tmw-ea/updates/resources2.txt" dev=dm-1 ino=266583 scontext=system_u:system_r:httpd_t:s0 tcontext=system_u:object_r:dosfs_t:s0 tclass=file
- Was caused by:
- Missing type enforcement (TE) allow rule.
- You can use audit2allow to generate a loadable module to allow this access.
- type=AVC msg=audit(1319555975.213:509): avc: denied { getattr } for pid=1103 comm="httpd" path="/home/meway/tmw-ea/updates/update1a.zip" dev=dm-1 ino=266582 scontext=system_u:system_r:httpd_t:s0 tcontext=system_u:object_r:dosfs_t:s0 tclass=file
- Was caused by:
- Missing type enforcement (TE) allow rule.
- You can use audit2allow to generate a loadable module to allow this access.
- type=AVC msg=audit(1319555975.214:510): avc: denied { getattr } for pid=1103 comm="httpd" path="/home/meway/tmw-ea/updates/news.txt" dev=dm-1 ino=264577 scontext=system_u:system_r:httpd_t:s0 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=lnk_file
- Was caused by:
- Unknown - would be allowed by active policy
- Possible mismatch between this policy and the one under which the audit message was generated.
- Possible mismatch between current in-memory boolean settings vs. permanent ones.
- type=AVC msg=audit(1319555975.214:511): avc: denied { getattr } for pid=1103 comm="httpd" path="/home/meway/tmw-ea/updates/resources2.txt" dev=dm-1 ino=266583 scontext=system_u:system_r:httpd_t:s0 tcontext=system_u:object_r:dosfs_t:s0 tclass=file
- Was caused by:
- Missing type enforcement (TE) allow rule.
- You can use audit2allow to generate a loadable module to allow this access.
- type=AVC msg=audit(1319555976.918:512): avc: denied { getattr } for pid=1104 comm="httpd" path="/home/meway/tmw-ea/updates/resources.xml" dev=dm-1 ino=266584 scontext=system_u:system_r:httpd_t:s0 tcontext=system_u:object_r:dosfs_t:s0 tclass=file
- Was caused by:
- Missing type enforcement (TE) allow rule.
- You can use audit2allow to generate a loadable module to allow this access.
- type=AVC msg=audit(1319555975.213:508): avc: denied { getattr } for pid=1103 comm="httpd" path="/home/meway/tmw-ea/updates/resources.xml" dev=dm-1 ino=266584 scontext=system_u:system_r:httpd_t:s0 tcontext=system_u:object_r:dosfs_t:s0 tclass=file
- Was caused by:
- Missing type enforcement (TE) allow rule.
- You can use audit2allow to generate a loadable module to allow this access.
- type=AVC msg=audit(1319555976.918:513): avc: denied { getattr } for pid=1104 comm="httpd" path="/home/meway/tmw-ea/updates/update1a.zip" dev=dm-1 ino=266582 scontext=system_u:system_r:httpd_t:s0 tcontext=system_u:object_r:dosfs_t:s0 tclass=file
- Was caused by:
- Missing type enforcement (TE) allow rule.
- You can use audit2allow to generate a loadable module to allow this access.
- type=AVC msg=audit(1319555976.918:514): avc: denied { getattr } for pid=1104 comm="httpd" path="/home/meway/tmw-ea/updates/news.txt" dev=dm-1 ino=264577 scontext=system_u:system_r:httpd_t:s0 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=lnk_file
- Was caused by:
- Unknown - would be allowed by active policy
- Possible mismatch between this policy and the one under which the audit message was generated.
- Possible mismatch between current in-memory boolean settings vs. permanent ones.
- type=AVC msg=audit(1319555976.918:515): avc: denied { getattr } for pid=1104 comm="httpd" path="/home/meway/tmw-ea/updates/resources2.txt" dev=dm-1 ino=266583 scontext=system_u:system_r:httpd_t:s0 tcontext=system_u:object_r:dosfs_t:s0 tclass=file
- Was caused by:
- Missing type enforcement (TE) allow rule.
- You can use audit2allow to generate a loadable module to allow this access.
- type=AVC msg=audit(1319556098.909:517): avc: denied { getattr } for pid=1103 comm="httpd" path="/home/meway/tmw-ea/updates/update1a.zip" dev=dm-1 ino=266582 scontext=system_u:system_r:httpd_t:s0 tcontext=system_u:object_r:dosfs_t:s0 tclass=file
- Was caused by:
- Missing type enforcement (TE) allow rule.
- You can use audit2allow to generate a loadable module to allow this access.
- type=AVC msg=audit(1319556098.909:518): avc: denied { getattr } for pid=1103 comm="httpd" path="/home/meway/tmw-ea/updates/news.txt" dev=dm-1 ino=264577 scontext=system_u:system_r:httpd_t:s0 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=lnk_file
- Was caused by:
- Unknown - would be allowed by active policy
- Possible mismatch between this policy and the one under which the audit message was generated.
- Possible mismatch between current in-memory boolean settings vs. permanent ones.
- type=AVC msg=audit(1319556098.909:519): avc: denied { getattr } for pid=1103 comm="httpd" path="/home/meway/tmw-ea/updates/resources2.txt" dev=dm-1 ino=266583 scontext=system_u:system_r:httpd_t:s0 tcontext=system_u:object_r:dosfs_t:s0 tclass=file
- Was caused by:
- Missing type enforcement (TE) allow rule.
- You can use audit2allow to generate a loadable module to allow this access.
- type=AVC msg=audit(1319556098.909:516): avc: denied { getattr } for pid=1103 comm="httpd" path="/home/meway/tmw-ea/updates/resources.xml" dev=dm-1 ino=266584 scontext=system_u:system_r:httpd_t:s0 tcontext=system_u:object_r:dosfs_t:s0 tclass=file
- Was caused by:
- Missing type enforcement (TE) allow rule.
- You can use audit2allow to generate a loadable module to allow this access.
- type=AVC msg=audit(1319556277.740:528): avc: denied { getattr } for pid=7180 comm="httpd" path="/home/meway/tmw-ea/updates/resources.xml" dev=dm-1 ino=266584 scontext=system_u:system_r:httpd_t:s0 tcontext=system_u:object_r:dosfs_t:s0 tclass=file
- Was caused by:
- Missing type enforcement (TE) allow rule.
- You can use audit2allow to generate a loadable module to allow this access.
- type=AVC msg=audit(1319556277.745:529): avc: denied { getattr } for pid=7180 comm="httpd" path="/home/meway/tmw-ea/updates/update1a.zip" dev=dm-1 ino=266582 scontext=system_u:system_r:httpd_t:s0 tcontext=system_u:object_r:dosfs_t:s0 tclass=file
- Was caused by:
- Missing type enforcement (TE) allow rule.
- You can use audit2allow to generate a loadable module to allow this access.
- type=AVC msg=audit(1319556277.746:530): avc: denied { getattr } for pid=7180 comm="httpd" path="/home/meway/tmw-ea/updates/news.txt" dev=dm-1 ino=264577 scontext=system_u:system_r:httpd_t:s0 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=lnk_file
- Was caused by:
- Unknown - would be allowed by active policy
- Possible mismatch between this policy and the one under which the audit message was generated.
- Possible mismatch between current in-memory boolean settings vs. permanent ones.
- type=AVC msg=audit(1319556277.746:531): avc: denied { getattr } for pid=7180 comm="httpd" path="/home/meway/tmw-ea/updates/resources2.txt" dev=dm-1 ino=266583 scontext=system_u:system_r:httpd_t:s0 tcontext=system_u:object_r:dosfs_t:s0 tclass=file
- Was caused by:
- Missing type enforcement (TE) allow rule.
- You can use audit2allow to generate a loadable module to allow this access.
- type=AVC msg=audit(1319556410.895:533): avc: denied { getattr } for pid=7178 comm="httpd" path="/home/meway/tmw-ea/updates/update1a.zip" dev=dm-1 ino=266582 scontext=system_u:system_r:httpd_t:s0 tcontext=system_u:object_r:dosfs_t:s0 tclass=file
- Was caused by:
- Missing type enforcement (TE) allow rule.
- You can use audit2allow to generate a loadable module to allow this access.
- type=AVC msg=audit(1319556410.895:534): avc: denied { getattr } for pid=7178 comm="httpd" path="/home/meway/tmw-ea/updates/news.txt" dev=dm-1 ino=264577 scontext=system_u:system_r:httpd_t:s0 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=lnk_file
- Was caused by:
- Unknown - would be allowed by active policy
- Possible mismatch between this policy and the one under which the audit message was generated.
- Possible mismatch between current in-memory boolean settings vs. permanent ones.
- type=AVC msg=audit(1319556410.896:535): avc: denied { getattr } for pid=7178 comm="httpd" path="/home/meway/tmw-ea/updates/resources2.txt" dev=dm-1 ino=266583 scontext=system_u:system_r:httpd_t:s0 tcontext=system_u:object_r:dosfs_t:s0 tclass=file
- Was caused by:
- Missing type enforcement (TE) allow rule.
- You can use audit2allow to generate a loadable module to allow this access.
- type=AVC msg=audit(1319556410.886:532): avc: denied { getattr } for pid=7178 comm="httpd" path="/home/meway/tmw-ea/updates/resources.xml" dev=dm-1 ino=266584 scontext=system_u:system_r:httpd_t:s0 tcontext=system_u:object_r:dosfs_t:s0 tclass=file
- Was caused by:
- Missing type enforcement (TE) allow rule.
- You can use audit2allow to generate a loadable module to allow this access.
- type=AVC msg=audit(1319556430.185:537): avc: denied { getattr } for pid=7183 comm="httpd" path="/home/meway/tmw-ea/updates/update1a.zip" dev=dm-1 ino=266582 scontext=system_u:system_r:httpd_t:s0 tcontext=system_u:object_r:dosfs_t:s0 tclass=file
- Was caused by:
- Missing type enforcement (TE) allow rule.
- You can use audit2allow to generate a loadable module to allow this access.
- type=AVC msg=audit(1319556430.185:538): avc: denied { getattr } for pid=7183 comm="httpd" path="/home/meway/tmw-ea/updates/news.txt" dev=dm-1 ino=264577 scontext=system_u:system_r:httpd_t:s0 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=lnk_file
- Was caused by:
- Unknown - would be allowed by active policy
- Possible mismatch between this policy and the one under which the audit message was generated.
- Possible mismatch between current in-memory boolean settings vs. permanent ones.
- type=AVC msg=audit(1319556430.185:539): avc: denied { getattr } for pid=7183 comm="httpd" path="/home/meway/tmw-ea/updates/resources2.txt" dev=dm-1 ino=266583 scontext=system_u:system_r:httpd_t:s0 tcontext=system_u:object_r:dosfs_t:s0 tclass=file
- Was caused by:
- Missing type enforcement (TE) allow rule.
- You can use audit2allow to generate a loadable module to allow this access.
- type=AVC msg=audit(1319556430.173:536): avc: denied { getattr } for pid=7183 comm="httpd" path="/home/meway/tmw-ea/updates/resources.xml" dev=dm-1 ino=266584 scontext=system_u:system_r:httpd_t:s0 tcontext=system_u:object_r:dosfs_t:s0 tclass=file
- Was caused by:
- Missing type enforcement (TE) allow rule.
- You can use audit2allow to generate a loadable module to allow this access.
- type=AVC msg=audit(1319556514.379:541): avc: denied { getattr } for pid=7180 comm="httpd" path="/home/meway/tmw-ea/updates/update1a.zip" dev=dm-1 ino=266582 scontext=system_u:system_r:httpd_t:s0 tcontext=system_u:object_r:dosfs_t:s0 tclass=file
- Was caused by:
- Missing type enforcement (TE) allow rule.
- You can use audit2allow to generate a loadable module to allow this access.
- type=AVC msg=audit(1319556514.379:542): avc: denied { getattr } for pid=7180 comm="httpd" path="/home/meway/tmw-ea/updates/news.txt" dev=dm-1 ino=264577 scontext=system_u:system_r:httpd_t:s0 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=lnk_file
- Was caused by:
- Unknown - would be allowed by active policy
- Possible mismatch between this policy and the one under which the audit message was generated.
- Possible mismatch between current in-memory boolean settings vs. permanent ones.
- type=AVC msg=audit(1319556514.379:543): avc: denied { getattr } for pid=7180 comm="httpd" path="/home/meway/tmw-ea/updates/resources2.txt" dev=dm-1 ino=266583 scontext=system_u:system_r:httpd_t:s0 tcontext=system_u:object_r:dosfs_t:s0 tclass=file
- Was caused by:
- Missing type enforcement (TE) allow rule.
- You can use audit2allow to generate a loadable module to allow this access.
- type=AVC msg=audit(1319556514.372:540): avc: denied { getattr } for pid=7180 comm="httpd" path="/home/meway/tmw-ea/updates/resources.xml" dev=dm-1 ino=266584 scontext=system_u:system_r:httpd_t:s0 tcontext=system_u:object_r:dosfs_t:s0 tclass=file
- Was caused by:
- Missing type enforcement (TE) allow rule.
- You can use audit2allow to generate a loadable module to allow this access.
- type=AVC msg=audit(1319557386.087:553): avc: denied { getattr } for pid=7183 comm="httpd" path="/home/meway/tmw-ea/updates/resources2.txt" dev=dm-1 ino=266583 scontext=system_u:system_r:httpd_t:s0 tcontext=system_u:object_r:dosfs_t:s0 tclass=file
- Was caused by:
- Missing type enforcement (TE) allow rule.
- You can use audit2allow to generate a loadable module to allow this access.
- type=AVC msg=audit(1319557386.087:554): avc: denied { getattr } for pid=7183 comm="httpd" path="/home/meway/tmw-ea/updates/resources2.txt" dev=dm-1 ino=266583 scontext=system_u:system_r:httpd_t:s0 tcontext=system_u:object_r:dosfs_t:s0 tclass=file
- Was caused by:
- Missing type enforcement (TE) allow rule.
- You can use audit2allow to generate a loadable module to allow this access.
- type=AVC msg=audit(1319558043.615:578): avc: denied { getattr } for pid=7177 comm="httpd" path="/home/meway/tmw-ea/updates/update1a.zip" dev=dm-1 ino=266582 scontext=system_u:system_r:httpd_t:s0 tcontext=system_u:object_r:dosfs_t:s0 tclass=file
- Was caused by:
- Missing type enforcement (TE) allow rule.
- You can use audit2allow to generate a loadable module to allow this access.
- type=AVC msg=audit(1319558043.609:577): avc: denied { getattr } for pid=7177 comm="httpd" path="/home/meway/tmw-ea/updates/resources.xml" dev=dm-1 ino=266584 scontext=system_u:system_r:httpd_t:s0 tcontext=system_u:object_r:dosfs_t:s0 tclass=file
- Was caused by:
- Missing type enforcement (TE) allow rule.
- You can use audit2allow to generate a loadable module to allow this access.
- type=AVC msg=audit(1319558043.616:579): avc: denied { getattr } for pid=7177 comm="httpd" path="/home/meway/tmw-ea/updates/resources2.txt" dev=dm-1 ino=266583 scontext=system_u:system_r:httpd_t:s0 tcontext=system_u:object_r:dosfs_t:s0 tclass=file
- Was caused by:
- Missing type enforcement (TE) allow rule.
- You can use audit2allow to generate a loadable module to allow this access.
- type=AVC msg=audit(1319558046.177:581): avc: denied { getattr } for pid=7179 comm="httpd" path="/home/meway/tmw-ea/updates/update1a.zip" dev=dm-1 ino=266582 scontext=system_u:system_r:httpd_t:s0 tcontext=system_u:object_r:dosfs_t:s0 tclass=file
- Was caused by:
- Missing type enforcement (TE) allow rule.
- You can use audit2allow to generate a loadable module to allow this access.
- type=AVC msg=audit(1319558046.177:582): avc: denied { getattr } for pid=7179 comm="httpd" path="/home/meway/tmw-ea/updates/resources2.txt" dev=dm-1 ino=266583 scontext=system_u:system_r:httpd_t:s0 tcontext=system_u:object_r:dosfs_t:s0 tclass=file
- Was caused by:
- Missing type enforcement (TE) allow rule.
- You can use audit2allow to generate a loadable module to allow this access.
- type=AVC msg=audit(1319558046.176:580): avc: denied { getattr } for pid=7179 comm="httpd" path="/home/meway/tmw-ea/updates/resources.xml" dev=dm-1 ino=266584 scontext=system_u:system_r:httpd_t:s0 tcontext=system_u:object_r:dosfs_t:s0 tclass=file
- Was caused by:
- Missing type enforcement (TE) allow rule.
- You can use audit2allow to generate a loadable module to allow this access.
Add Comment
Please, Sign In to add comment