1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
Jan 21 23:43:21 sip kernel: [285014.259350] type=1400 audit(1358808201.744:587): avc:  denied  { search } for  pid=3301 comm="su" name="/" dev="tmpfs" ino=1098 ipaddr=178.83.195.87 scontext=staff_u:staff_r:staff_su_t tcontext=system_u:object_r:file_t tclass=dir
Jan 21 23:43:21 sip kernel: [285014.264125] type=1400 audit(1358808201.749:588): avc:  denied  { search } for  pid=3302 comm="unix_chkpwd" name="/" dev="tmpfs" ino=1098 ipaddr=178.83.195.87 scontext=staff_u:staff_r:chkpwd_t tcontext=system_u:object_r:file_t tclass=dir
Jan 21 23:43:29 sip kernel: [285021.562420] type=1400 audit(1358808209.048:589): avc:  denied  { read } for  pid=3301 comm="su" name="utmp" dev="tmpfs" ino=1760 ipaddr=178.83.195.87 scontext=staff_u:staff_r:staff_su_t tcontext=system_u:object_r:file_t tclass=file
Jan 21 23:43:29 sip kernel: [285021.562428] type=1400 audit(1358808209.048:590): avc:  denied  { open } for  pid=3301 comm="su" path="/run/utmp" dev="tmpfs" ino=1760 ipaddr=178.83.195.87 scontext=staff_u:staff_r:staff_su_t tcontext=system_u:object_r:file_t tclass=file
Jan 21 23:43:29 sip kernel: [285021.562444] type=1400 audit(1358808209.048:591): avc:  denied  { lock } for  pid=3301 comm="su" path="/run/utmp" dev="tmpfs" ino=1760 ipaddr=178.83.195.87 scontext=staff_u:staff_r:staff_su_t tcontext=system_u:object_r:file_t tclass=file
Jan 21 23:43:40 sip kernel: [285032.760998] type=1400 audit(1358808220.246:592): avc:  denied  { search } for  pid=3309 comm="newrole" name="/" dev="tmpfs" ino=1098 ipaddr=178.83.195.87 scontext=staff_u:staff_r:newrole_t tcontext=system_u:object_r:file_t tclass=dir
Jan 21 23:43:52 sip kernel: [285045.378731] type=1400 audit(1358808232.864:593): avc:  denied  { connectto } for  pid=3317 comm="asterisk" path="/run/asterisk/asterisk.ctl" ipaddr=178.83.195.87 scontext=staff_u:sysadm_r:sysadm_t tcontext=staff_u:staff_r:staff_t tclass=unix_stream_socket
Jan 21 23:48:41 sip kernel: [285334.172540] type=1400 audit(1358808521.657:596): avc:  denied  { read } for  pid=3320 comm="rc" name="softlevel" dev="tmpfs" ino=1107 ipaddr=178.83.195.87 scontext=staff_u:system_r:initrc_t tcontext=system_u:object_r:file_t tclass=file
Jan 21 23:48:41 sip kernel: [285334.172548] type=1400 audit(1358808521.657:597): avc:  denied  { open } for  pid=3320 comm="rc" path="/run/openrc/softlevel" dev="tmpfs" ino=1107 ipaddr=178.83.195.87 scontext=staff_u:system_r:initrc_t tcontext=system_u:object_r:file_t tclass=file
Jan 21 23:48:41 sip kernel: [285334.173186] type=1400 audit(1358808521.658:598): avc:  denied  { read } for  pid=3320 comm="rc" name="asterisk" dev="tmpfs" ino=169147 ipaddr=178.83.195.87 scontext=staff_u:system_r:initrc_t tcontext=staff_u:object_r:file_t tclass=lnk_file
Jan 21 23:48:41 sip kernel: [285334.173237] type=1400 audit(1358808521.658:599): avc:  denied  { write } for  pid=3320 comm="rc" name="exclusive" dev="tmpfs" ino=3088 ipaddr=178.83.195.87 scontext=staff_u:system_r:initrc_t tcontext=system_u:object_r:file_t tclass=dir
Jan 21 23:48:41 sip kernel: [285334.173243] type=1400 audit(1358808521.658:600): avc:  denied  { add_name } for  pid=3320 comm="rc" name="asterisk" ipaddr=178.83.195.87 scontext=staff_u:system_r:initrc_t tcontext=system_u:object_r:file_t tclass=dir
Jan 21 23:48:41 sip kernel: [285334.173257] type=1400 audit(1358808521.658:601): avc:  denied  { create } for  pid=3320 comm="rc" name="asterisk" ipaddr=178.83.195.87 scontext=staff_u:system_r:initrc_t tcontext=staff_u:object_r:file_t tclass=file
Jan 21 23:48:41 sip kernel: [285334.173272] type=1400 audit(1358808521.658:602): avc:  denied  { write open } for  pid=3320 comm="rc" path="/run/openrc/exclusive/asterisk" dev="tmpfs" ino=175863 ipaddr=178.83.195.87 scontext=staff_u:system_r:initrc_t tcontext=staff_u:object_r:file_t tclass=file
Jan 21 23:48:41 sip kernel: [285334.173281] type=1400 audit(1358808521.658:603): avc:  denied  { lock } for  pid=3320 comm="rc" path="/run/openrc/exclusive/asterisk" dev="tmpfs" ino=175863 ipaddr=178.83.195.87 scontext=staff_u:system_r:initrc_t tcontext=staff_u:object_r:file_t tclass=file
Jan 21 23:50:01 sip kernel: [285414.496437] type=1400 audit(1358808601.981:652): avc:  denied  { search } for  pid=3347 comm="unix_chkpwd" name="/" dev="tmpfs" ino=1098 scontext=system_u:system_r:chkpwd_t tcontext=system_u:object_r:file_t tclass=dir
Jan 21 23:50:01 sip kernel: [285414.496459] type=1400 audit(1358808601.981:653): avc:  denied  { search } for  pid=3347 comm="unix_chkpwd" name="/" dev="tmpfs" ino=1098 scontext=system_u:system_r:chkpwd_t tcontext=system_u:object_r:file_t tclass=dir
Jan 21 23:50:01 sip kernel: [285414.497307] type=1400 audit(1358808601.982:654): avc:  denied  { search } for  pid=3348 comm="cron" name="/" dev="tmpfs" ino=1098 scontext=system_u:system_r:crond_t tcontext=system_u:object_r:file_t tclass=dir
Jan 21 23:50:01 sip kernel: [285414.497327] type=1400 audit(1358808601.982:655): avc:  denied  { search } for  pid=3348 comm="cron" name="/" dev="tmpfs" ino=1098 scontext=system_u:system_r:crond_t tcontext=system_u:object_r:file_t tclass=dir
Jan 21 23:50:19 sip kernel: [285431.995465] type=1400 audit(1358808619.481:656): avc:  denied  { search } for  pid=3359 comm="semanage" name="/" dev="tmpfs" ino=1098 ipaddr=178.83.195.87 scontext=staff_u:sysadm_r:semanage_t tcontext=system_u:object_r:file_t tclass=dir
Jan 21 23:50:19 sip kernel: [285431.995490] type=1400 audit(1358808619.481:657): avc:  denied  { search } for  pid=3359 comm="semanage" name="/" dev="tmpfs" ino=1098 ipaddr=178.83.195.87 scontext=staff_u:sysadm_r:semanage_t tcontext=system_u:object_r:file_t tclass=dir
Jan 21 23:50:19 sip kernel: [285432.035170] type=1400 audit(1358808619.521:659): avc:  denied  { rlimitinh } for  pid=3371 comm="setfiles" ipaddr=178.83.195.87 scontext=staff_u:sysadm_r:semanage_t tcontext=staff_u:sysadm_r:setfiles_t tclass=process
Jan 21 23:50:19 sip kernel: [285432.035177] type=1400 audit(1358808619.521:660): avc:  denied  { siginh } for  pid=3371 comm="setfiles" ipaddr=178.83.195.87 scontext=staff_u:sysadm_r:semanage_t tcontext=staff_u:sysadm_r:setfiles_t tclass=process
Jan 21 23:50:19 sip kernel: [285432.035205] type=1400 audit(1358808619.521:661): avc:  denied  { noatsecure } for  pid=3371 comm="setfiles" ipaddr=178.83.195.87 scontext=staff_u:sysadm_r:semanage_t tcontext=staff_u:sysadm_r:setfiles_t tclass=process
Jan 21 23:50:36 sip kernel: [285448.923514] type=1400 audit(1358808636.409:662): avc:  denied  { rlimitinh } for  pid=3372 comm="semodule" ipaddr=178.83.195.87 scontext=staff_u:sysadm_r:sysadm_t tcontext=staff_u:sysadm_r:semanage_t tclass=process
Jan 21 23:50:36 sip kernel: [285448.923523] type=1400 audit(1358808636.409:663): avc:  denied  { siginh } for  pid=3372 comm="semodule" ipaddr=178.83.195.87 scontext=staff_u:sysadm_r:sysadm_t tcontext=staff_u:sysadm_r:semanage_t tclass=process
Jan 21 23:50:36 sip kernel: [285448.923552] type=1400 audit(1358808636.409:664): avc:  denied  { noatsecure } for  pid=3372 comm="semodule" ipaddr=178.83.195.87 scontext=staff_u:sysadm_r:sysadm_t tcontext=staff_u:sysadm_r:semanage_t tclass=process
Jan 21 23:50:37 sip kernel: [285449.953277] type=1400 audit(1358808637.439:665): avc:  denied  { search } for  pid=3372 comm="semodule" name="/" dev="tmpfs" ino=1098 ipaddr=178.83.195.87 scontext=staff_u:sysadm_r:semanage_t tcontext=system_u:object_r:file_t tclass=dir
Jan 21 23:50:37 sip kernel: [285449.953300] type=1400 audit(1358808637.439:666): avc:  denied  { search } for  pid=3372 comm="semodule" name="/" dev="tmpfs" ino=1098 ipaddr=178.83.195.87 scontext=staff_u:sysadm_r:semanage_t tcontext=system_u:object_r:file_t tclass=dir
Jan 21 23:50:37 sip kernel: [285449.956729] type=1400 audit(1358808637.442:667): avc:  denied  { rlimitinh } for  pid=3373 comm="load_policy" ipaddr=178.83.195.87 scontext=staff_u:sysadm_r:semanage_t tcontext=staff_u:sysadm_r:load_policy_t tclass=process
Jan 21 23:50:37 sip kernel: [285449.956738] type=1400 audit(1358808637.442:668): avc:  denied  { siginh } for  pid=3373 comm="load_policy" ipaddr=178.83.195.87 scontext=staff_u:sysadm_r:semanage_t tcontext=staff_u:sysadm_r:load_policy_t tclass=process
Jan 21 23:50:37 sip kernel: [285449.956754] type=1400 audit(1358808637.442:669): avc:  denied  { noatsecure } for  pid=3373 comm="load_policy" ipaddr=178.83.195.87 scontext=staff_u:sysadm_r:semanage_t tcontext=staff_u:sysadm_r:load_policy_t tclass=process
Jan 21 23:50:37 sip kernel: [285449.986225] type=1400 audit(1358808637.472:671): avc:  denied  { rlimitinh } for  pid=3374 comm="setfiles" ipaddr=178.83.195.87 scontext=staff_u:sysadm_r:semanage_t tcontext=staff_u:sysadm_r:setfiles_t tclass=process

This paste never expires. View raw. Pasted through import.