· 6 years ago · Dec 18, 2019, 11:26 PM
1[ 2.043775] usb 1-1: SerialNumber: 42
2[ 2.057498] hidraw: raw HID events driver (C) Jiri Kosina
3[ 2.060815] usbcore: registered new interface driver usbhid
4[ 2.060816] usbhid: USB HID core driver
5[ 2.062165] input: QEMU QEMU USB Tablet as /devices/pci0000:00/0000:00:02.1/0000:03:00.0/usb1/1-1/1-1:1.0/0003:0627:0001.0001/input/input5
6[ 2.062364] hid-generic 0003:0627:0001.0001: input,hidraw0: USB HID v0.01 Mouse [QEMU QEMU USB Tablet] on usb-0000:03:00.0-1/input0
7[ 2.131281] PM: Image not found (code -22)
8[ 2.419119] EXT4-fs (vda1): mounted filesystem with ordered data mode. Opts: (null)
9[ 2.630578] SELinux: policy capability network_peer_controls=1
10[ 2.630579] SELinux: policy capability open_perms=1
11[ 2.630580] SELinux: policy capability extended_socket_class=1
12[ 2.630580] SELinux: policy capability always_check_network=0
13[ 2.630581] SELinux: policy capability cgroup_seclabel=1
14[ 2.630581] SELinux: policy capability nnp_nosuid_transition=1
15[ 2.654109] audit: type=1403 audit(1576710982.836:2): auid=4294967295 ses=4294967295 lsm=selinux res=1
16[ 2.657261] systemd[1]: Successfully loaded SELinux policy in 166.436ms.
17[ 2.679901] systemd[1]: Inserted module 'autofs4'
18[ 2.691844] audit: type=1401 audit(1576710982.876:3): op=security_validate_transition seresult=denied oldcontext=system_u:object_r:device_t:s15:c0.c1023 newcontext=system_u:object_r:device_t:s0 taskcontext=system_u:system_r:init_t:s0-s15:c0.c1023 tclass=dir
19[ 2.692859] audit: type=1401 audit(1576710982.876:4): op=security_validate_transition seresult=denied oldcontext=system_u:object_r:devpts_t:s15:c0.c1023 newcontext=system_u:object_r:devpts_t:s0-s15:c0.c1023 taskcontext=system_u:system_r:init_t:s0-s15:c0.c1023 tclass=dir
20[ 2.693026] audit: type=1401 audit(1576710982.876:5): op=security_validate_transition seresult=denied oldcontext=system_u:object_r:tmpfs_t:s15:c0.c1023 newcontext=system_u:object_r:var_run_t:s0-s15:c0.c1023 taskcontext=system_u:system_r:init_t:s0-s15:c0.c1023 tclass=dir
21[ 2.693205] audit: type=1400 audit(1576710982.876:6): avc: denied { create } for pid=1 comm="systemd" name="lock" scontext=system_u:system_r:init_t:s0-s15:c0.c1023 tcontext=system_u:object_r:var_lock_t:s0-s15:c0.c1023 tclass=dir permissive=1
22[ 2.693373] audit: type=1401 audit(1576710982.876:7): op=security_validate_transition seresult=denied oldcontext=system_u:object_r:tmpfs_t:s0 newcontext=system_u:object_r:var_lock_t:s0-s15:c0.c1023 taskcontext=system_u:system_r:init_t:s0-s15:c0.c1023 tclass=dir
23[ 2.695094] audit: type=1401 audit(1576710982.880:8): op=security_validate_transition seresult=denied oldcontext=system_u:object_r:event_device_t:s15:c0.c1023 newcontext=system_u:object_r:random_device_t:s0 taskcontext=system_u:system_r:init_t:s0-s15:c0.c1023 tclass=chr_file
24[ 2.695217] audit: type=1401 audit(1576710982.880:9): op=security_validate_transition seresult=denied oldcontext=system_u:object_r:event_device_t:s15:c0.c1023 newcontext=system_u:object_r:autofs_device_t:s0 taskcontext=system_u:system_r:init_t:s0-s15:c0.c1023 tclass=chr_file
25[ 2.695317] audit: type=1401 audit(1576710982.880:10): op=security_validate_transition seresult=denied oldcontext=system_u:object_r:event_device_t:s15:c0.c1023 newcontext=system_u:object_r:usb_device_t:s0 taskcontext=system_u:system_r:init_t:s0-s15:c0.c1023 tclass=chr_file
26[ 2.748310] systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 53.368ms.
27[ 2.750899] systemd[1]: systemd 244-3 running in system mode. (+PAM +AUDIT +SELINUX +IMA +APPARMOR +SMACK +SYSVINIT +UTMP +LIBCRYPTSETUP +GCRYPT +GNUTLS +ACL +XZ +LZ4 +SECCOMP +BLKID +ELFUTILS +KMOD +IDN2 -IDN +PCRE2 default-hierarchy=hybrid)
28[ 2.750948] systemd[1]: Detected virtualization kvm.
29[ 2.750956] systemd[1]: Detected architecture x86-64.
30[ 2.753334] systemd[1]: Set hostname to <debian>.
31[ 2.872281] systemd[1]: /lib/systemd/system/dbus.socket:5: ListenStream= references a path below legacy directory /var/run/, updating /var/run/dbus/system_bus_socket → /run/dbus/system_bus_socket; please update the unit file accordingly.
32[ 2.911642] systemd[1]: Created slice system-getty.slice.
33[ 2.912113] systemd[1]: Created slice system-serial\x2dgetty.slice.
34[ 2.912306] systemd[1]: Created slice User and Session Slice.
35[ 2.912442] systemd[1]: Started Forward Password Requests to Wall Directory Watch.
36[ 2.913057] systemd[1]: Set up automount Arbitrary Executable File Formats File System Automount Point.
37[ 2.913112] systemd[1]: Reached target Slices.
38[ 2.919759] systemd[1]: Listening on RPCbind Server Activation Socket.
39[ 2.920722] systemd[1]: Listening on Syslog Socket.
40[ 2.921208] systemd[1]: Listening on fsck to fsckd communication Socket.
41[ 2.921355] systemd[1]: Listening on initctl Compatibility Named Pipe.
42[ 2.921833] systemd[1]: Listening on Journal Audit Socket.
43[ 2.922049] systemd[1]: Listening on Journal Socket (/dev/log).
44[ 2.922401] systemd[1]: Listening on Journal Socket.
45[ 2.923151] systemd[1]: Listening on udev Control Socket.
46[ 2.923426] systemd[1]: Listening on udev Kernel Socket.
47[ 2.924666] systemd[1]: Mounting Huge Pages File System...
48[ 2.926701] systemd[1]: Mounting POSIX Message Queue File System...
49[ 2.929730] systemd[1]: Mounting RPC Pipe File System...
50[ 2.932419] systemd[1]: Mounting Kernel Debug File System...
51[ 2.932580] systemd[1]: Condition check resulted in Kernel Module supporting RPCSEC_GSS being skipped.
52[ 2.935641] systemd[1]: Starting Set the console keyboard layout...
53[ 2.938194] systemd[1]: Starting Create list of static device nodes for the current kernel...
54[ 2.939307] systemd[1]: Condition check resulted in Set Up Additional Binary Formats being skipped.
55[ 2.939383] systemd[1]: Condition check resulted in File System Check on Root Device being skipped.
56[ 2.941823] systemd[1]: Starting Journal Service...
57[ 2.945659] systemd[1]: Starting Load Kernel Modules...
58[ 2.948091] systemd[1]: Starting Remount Root and Kernel File Systems...
59[ 2.951041] systemd[1]: Starting udev Coldplug all Devices...
60[ 2.953746] systemd[1]: Mounted Huge Pages File System.
61[ 2.964333] systemd[1]: Mounted POSIX Message Queue File System.
62[ 2.964606] systemd[1]: Mounted Kernel Debug File System.
63[ 2.968113] systemd[1]: Started Create list of static device nodes for the current kernel.
64[ 2.990406] EXT4-fs (vda1): re-mounted. Opts: errors=remount-ro
65[ 2.993127] systemd[1]: Started Remount Root and Kernel File Systems.
66[ 2.993850] systemd[1]: Condition check resulted in Rebuild Hardware Database being skipped.
67[ 2.995186] systemd[1]: Starting Load/Save Random Seed...
68[ 2.996313] systemd[1]: Starting Create System Users...
69[ 3.026085] lp: driver loaded but no devices found
70[ 3.032572] RPC: Registered named UNIX socket transport module.
71[ 3.032573] RPC: Registered udp transport module.
72[ 3.032574] RPC: Registered tcp transport module.
73[ 3.032574] RPC: Registered tcp NFSv4.1 backchannel transport module.
74[ 3.034506] systemd[1]: Mounted RPC Pipe File System.
75[ 3.040238] ppdev: user-space parallel port driver
76[ 3.048424] systemd[1]: Started Load Kernel Modules.
77[ 3.048800] systemd[1]: Condition check resulted in FUSE Control File System being skipped.
78[ 3.048947] systemd[1]: Condition check resulted in Kernel Configuration File System being skipped.
79[ 3.053142] systemd[1]: Starting Apply Kernel Variables...
80[ 3.053904] systemd[1]: Started Load/Save Random Seed.
81[ 3.063571] systemd[1]: Started Create System Users.
82[ 3.065411] systemd[1]: Starting Create Static Device Nodes in /dev...
83[ 3.077140] systemd[1]: Started Apply Kernel Variables.
84[ 3.134170] systemd[1]: Started Create Static Device Nodes in /dev.
85[ 3.135669] systemd[1]: Starting udev Kernel Device Manager...
86[ 3.141845] systemd[1]: Started udev Coldplug all Devices.
87[ 3.143772] systemd[1]: Starting Helper to synchronize boot up for ifupdown...
88[ 3.160901] systemd[1]: Started Helper to synchronize boot up for ifupdown.
89[ 3.195568] systemd[1]: Started Set the console keyboard layout.
90[ 3.196147] systemd[1]: Reached target Local File Systems (Pre).
91[ 3.196165] systemd[1]: Reached target Local File Systems.
92[ 3.196232] systemd[1]: Condition check resulted in Load AppArmor profiles being skipped.
93[ 3.197410] systemd[1]: Starting Set console font and keymap...
94[ 3.198709] systemd[1]: Starting Raise network interfaces...
95[ 3.199945] systemd[1]: Starting Preprocess NFS configuration...
96[ 3.201200] systemd[1]: Starting Tell Plymouth To Write Out Runtime Data...
97[ 3.201355] systemd[1]: Condition check resulted in Mark the need to relabel after reboot being skipped.
98[ 3.201436] systemd[1]: Condition check resulted in Store a System Token in an EFI Variable being skipped.
99[ 3.201492] systemd[1]: Condition check resulted in Commit a transient machine-id on disk being skipped.
100[ 3.215370] systemd[1]: Started Set console font and keymap.
101[ 3.221280] systemd[1]: Received SIGRTMIN+20 from PID 181 (plymouthd).
102[ 3.222126] systemd[1]: plymouth-read-write.service: Succeeded.
103[ 3.222527] systemd[1]: Started Tell Plymouth To Write Out Runtime Data.
104[ 3.227563] systemd[1]: nfs-config.service: Succeeded.
105[ 3.227979] systemd[1]: Started Preprocess NFS configuration.
106[ 3.228170] systemd[1]: Condition check resulted in RPC security service for NFS client and server being skipped.
107[ 3.228189] systemd[1]: Condition check resulted in RPC security service for NFS server being skipped.
108[ 3.228202] systemd[1]: Reached target NFS client services.
109[ 3.294057] systemd[1]: Started udev Kernel Device Manager.
110[ 3.295515] systemd[1]: Starting Show Plymouth Boot Screen...
111[ 3.364601] systemd[1]: plymouth-start.service: Succeeded.
112[ 3.365015] systemd[1]: Started Show Plymouth Boot Screen.
113[ 3.365209] systemd[1]: Condition check resulted in Dispatch Password Requests to Console Directory Watch being skipped.
114[ 3.365583] systemd[1]: Started Forward Password Requests to Plymouth Directory Watch.
115[ 3.365633] systemd[1]: Reached target Local Encrypted Volumes.
116[ 3.475387] systemd[1]: Started Raise network interfaces.
117[ 3.510057] systemd[1]: Found device /dev/disk/by-uuid/a49e6355-ec23-4d52-92b4-a3f49e818ca8.
118[ 3.513738] systemd[1]: Activating swap /dev/disk/by-uuid/a49e6355-ec23-4d52-92b4-a3f49e818ca8...
119[ 3.525077] sr 0:0:0:0: Attached scsi generic sg0 type 5
120[ 3.545925] input: PC Speaker as /devices/platform/pcspkr/input/input6
121[ 3.549047] iTCO_vendor_support: vendor-support=0
122[ 3.550538] iTCO_wdt: Intel TCO WatchDog Timer Driver v1.11
123[ 3.550673] iTCO_wdt: Found a ICH9 TCO device (Version=2, TCOBASE=0x0660)
124[ 3.552913] iTCO_wdt: initialized. heartbeat=30 sec (nowayout=0)
125[ 3.591339] Adding 2094076k swap on /dev/vda5. Priority:-2 extents:1 across:2094076k FS
126[ 3.601384] systemd[1]: Activated swap /dev/disk/by-uuid/a49e6355-ec23-4d52-92b4-a3f49e818ca8.
127[ 3.610641] systemd[1]: Found device /dev/ttyS0.
128[ 3.615477] systemd[1]: Reached target Swap.
129[ 3.746759] pcieport 0000:00:02.6: pciehp: Failed to check link status
130[ 3.755737] cryptd: max_cpu_qlen set to 1000
131[ 3.758767] pcieport 0000:00:02.7: pciehp: Failed to check link status
132[ 3.814411] AVX2 version of gcm_enc/dec engaged.
133[ 3.814412] AES CTR mode by8 optimization enabled
134[ 4.053635] systemd[1]: Started Journal Service.
135[ 4.093757] systemd-journald[254]: Received client request to flush runtime journal.
136[ 5.691327] kauditd_printk_skb: 496 callbacks suppressed
137[ 5.691329] audit: type=1400 audit(1576710985.876:507): avc: denied { nnp_transition } for pid=494 comm="(modprobe)" scontext=system_u:system_r:init_t:s0-s15:c0.c1023 tcontext=system_u:system_r:kmod_t:s0-s15:c0.c1023 tclass=process2 permissive=1
138[ 5.696584] audit: type=1400 audit(1576710985.880:508): avc: denied { dac_read_search } for pid=494 comm="modprobe" capability=2 scontext=system_u:system_r:kmod_t:s0-s15:c0.c1023 tcontext=system_u:system_r:kmod_t:s0-s15:c0.c1023 tclass=capability permissive=1
139[ 5.706319] audit: type=1400 audit(1576710985.888:509): avc: denied { search } for pid=521 comm="systemd-hostnam" name="journal" dev="tmpfs" ino=12340 scontext=system_u:system_r:systemd_hostnamed_t:s0-s15:c0.c1023 tcontext=system_u:object_r:syslogd_runtime_t:s15:c0.c1023 tclass=dir permissive=1
140[ 5.792580] 8139cp 0000:02:01.0 ens1: link up, 100Mbps, full-duplex, lpa 0x05E1
141[ 5.806814] audit: type=1400 audit(1576710985.988:510): avc: denied { connectto } for pid=487 comm="dbus-daemon" path="/run/setrans/.setrans-unix" scontext=system_u:system_r:system_dbusd_t:s0-s15:c0.c1023 tcontext=system_u:system_r:setrans_t:s15:c0.c1023 tclass=unix_stream_socket permissive=1
142[ 6.001294] FS-Cache: Loaded
143[ 6.077447] FS-Cache: Netfs 'nfs' registered for caching
144[ 6.098839] Key type dns_resolver registered
145[ 6.319979] NFS: Registering the id_resolver key type
146[ 6.320003] Key type id_resolver registered
147[ 6.320004] Key type id_legacy registered
148[ 6.344084] audit: type=1400 audit(1576710986.528:511): avc: denied { search } for pid=534 comm="systemd-logind" name="journal" dev="tmpfs" ino=12340 scontext=system_u:system_r:systemd_logind_t:s0-s15:c0.c1023 tcontext=system_u:object_r:syslogd_runtime_t:s15:c0.c1023 tclass=dir permissive=1
149[ 6.368302] audit: type=1400 audit(1576710986.552:512): avc: denied { write } for pid=487 comm="dbus-daemon" name=".setrans-unix" dev="tmpfs" ino=16525 scontext=system_u:system_r:system_dbusd_t:s0-s15:c0.c1023 tcontext=system_u:object_r:setrans_runtime_t:s15:c0.c1023 tclass=sock_file permissive=1
150[ 6.396365] audit: type=1400 audit(1576710986.580:513): avc: denied { write } for pid=181 comm="plymouthd" path="socket:[20156]" dev="sockfs" ino=20156 scontext=system_u:system_r:kernel_t:s15:c0.c1023 tcontext=system_u:system_r:kernel_t:s0-s15:c0.c1023 tclass=unix_stream_socket permissive=1
151[ 6.420150] audit: type=1400 audit(1576710986.600:514): avc: denied { execute } for pid=597 comm="mount.nfs" name="dash" dev="vda1" ino=264044 scontext=system_u:system_r:mount_t:s0-s15:c0.c1023 tcontext=system_u:object_r:shell_exec_t:s0 tclass=file permissive=1
152[ 6.420156] audit: type=1400 audit(1576710986.600:515): avc: denied { map } for pid=597 comm="start-statd" path="/usr/bin/dash" dev="vda1" ino=264044 scontext=system_u:system_r:mount_t:s0-s15:c0.c1023 tcontext=system_u:object_r:shell_exec_t:s0 tclass=file permissive=1
153[ 6.420496] audit: type=1400 audit(1576710986.608:516): avc: denied { create } for pid=597 comm="start-statd" name="rpc.statd.lock" scontext=system_u:system_r:mount_t:s0-s15:c0.c1023 tcontext=system_u:object_r:var_run_t:s0 tclass=file permissive=1
154[ 41.546974] kauditd_printk_skb: 68 callbacks suppressed
155[ 41.546975] audit: type=1400 audit(1576711021.924:585): avc: denied { search } for pid=487 comm="dbus-daemon" name="setrans" dev="tmpfs" ino=16455 scontext=system_u:system_r:system_dbusd_t:s0-s15:c0.c1023 tcontext=system_u:object_r:setrans_runtime_t:s15:c0.c1023 tclass=dir permissive=1
156[ 41.547177] audit: type=1400 audit(1576711021.924:586): avc: denied { write } for pid=487 comm="dbus-daemon" name=".setrans-unix" dev="tmpfs" ino=16525 scontext=system_u:system_r:system_dbusd_t:s0-s15:c0.c1023 tcontext=system_u:object_r:setrans_runtime_t:s15:c0.c1023 tclass=sock_file permissive=1
157[ 41.549254] audit: type=1400 audit(1576711021.924:587): avc: denied { search } for pid=1468 comm="cron" name="setrans" dev="tmpfs" ino=16455 scontext=system_u:system_r:crond_t:s0-s15:c0.c1023 tcontext=system_u:object_r:setrans_runtime_t:s15:c0.c1023 tclass=dir permissive=1
158[ 41.549371] audit: type=1400 audit(1576711021.924:588): avc: denied { write } for pid=1468 comm="cron" name=".setrans-unix" dev="tmpfs" ino=16525 scontext=system_u:system_r:crond_t:s0-s15:c0.c1023 tcontext=system_u:object_r:setrans_runtime_t:s15:c0.c1023 tclass=sock_file permissive=1
159[ 41.549374] audit: type=1400 audit(1576711021.924:589): avc: denied { connectto } for pid=1468 comm="cron" path="/run/setrans/.setrans-unix" scontext=system_u:system_r:crond_t:s0-s15:c0.c1023 tcontext=system_u:system_r:setrans_t:s15:c0.c1023 tclass=unix_stream_socket permissive=1
160[ 120.958021] audit: type=1400 audit(1576711101.513:590): avc: denied { sendto } for pid=254 comm="systemd-journal" path="/run/systemd/notify" scontext=system_u:system_r:syslogd_t:s15:c0.c1023 tcontext=system_u:system_r:init_t:s0-s15:c0.c1023 tclass=unix_dgram_socket permissive=1
161[ 201.869736] audit: type=1400 audit(1576711182.419:591): avc: denied { connectto } for pid=625 comm="Xorg" path="/run/setrans/.setrans-unix" scontext=system_u:system_r:xserver_t:s0-s15:c0.c1023 tcontext=system_u:system_r:setrans_t:s15:c0.c1023 tclass=unix_stream_socket permissive=1
162[ 221.939745] audit: type=1400 audit(1576711202.491:592): avc: denied { search } for pid=623 comm="login" name="setrans" dev="tmpfs" ino=16455 scontext=system_u:system_r:local_login_t:s0-s15:c0.c1023 tcontext=system_u:object_r:setrans_runtime_t:s15:c0.c1023 tclass=dir permissive=1
163[ 221.939956] audit: type=1400 audit(1576711202.491:593): avc: denied { write } for pid=623 comm="login" name=".setrans-unix" dev="tmpfs" ino=16525 scontext=system_u:system_r:local_login_t:s0-s15:c0.c1023 tcontext=system_u:object_r:setrans_runtime_t:s15:c0.c1023 tclass=sock_file permissive=1
164[ 221.939960] audit: type=1400 audit(1576711202.491:594): avc: denied { connectto } for pid=623 comm="login" path="/run/setrans/.setrans-unix" scontext=system_u:system_r:local_login_t:s0-s15:c0.c1023 tcontext=system_u:system_r:setrans_t:s15:c0.c1023 tclass=unix_stream_socket permissive=1
165[ 221.954270] audit: type=1400 audit(1576711202.503:595): avc: denied { rename } for pid=623 comm="login" name="motd.dynamic.new" dev="tmpfs" ino=27954 scontext=system_u:system_r:local_login_t:s0-s15:c0.c1023 tcontext=unconfined_u:object_r:var_run_t:s0 tclass=file permissive=1
166[ 221.954274] audit: type=1400 audit(1576711202.503:596): avc: denied { read } for pid=623 comm="login" name="motd.dynamic" dev="tmpfs" ino=27954 scontext=system_u:system_r:local_login_t:s0-s15:c0.c1023 tcontext=unconfined_u:object_r:var_run_t:s0 tclass=file permissive=1
167[ 221.956067] audit: type=1400 audit(1576711202.503:597): avc: denied { open } for pid=623 comm="login" path="/run/motd.dynamic" dev="tmpfs" ino=27954 scontext=system_u:system_r:local_login_t:s0-s15:c0.c1023 tcontext=unconfined_u:object_r:var_run_t:s0 tclass=file permissive=1
168[ 221.956072] audit: type=1400 audit(1576711202.503:598): avc: denied { getattr } for pid=623 comm="login" path="/run/motd.dynamic" dev="tmpfs" ino=27954 scontext=system_u:system_r:local_login_t:s0-s15:c0.c1023 tcontext=unconfined_u:object_r:var_run_t:s0 tclass=file permissive=1
169[ 221.960800] audit: type=1400 audit(1576711202.511:599): avc: denied { connectto } for pid=487 comm="dbus-daemon" path="/run/setrans/.setrans-unix" scontext=system_u:system_r:system_dbusd_t:s0-s15:c0.c1023 tcontext=system_u:system_r:setrans_t:s15:c0.c1023 tclass=unix_stream_socket permissive=1
170[ 221.979846] audit: type=1400 audit(1576711202.531:600): avc: denied { setopt } for pid=254 comm="systemd-journal" path="/run/systemd/journal/stdout" scontext=system_u:system_r:syslogd_t:s15:c0.c1023 tcontext=system_u:system_r:syslogd_t:s0-s15:c0.c1023 tclass=unix_stream_socket permissive=1
171[ 221.979925] audit: type=1400 audit(1576711202.531:601): avc: denied { shutdown } for pid=254 comm="systemd-journal" path="/run/systemd/journal/stdout" scontext=system_u:system_r:syslogd_t:s15:c0.c1023 tcontext=system_u:system_r:syslogd_t:s0-s15:c0.c1023 tclass=unix_stream_socket permissive=1
172[ 292.354617] kauditd_printk_skb: 6 callbacks suppressed
173[ 292.354619] audit: type=1400 audit(1576711272.903:608): avc: denied { connectto } for pid=625 comm="Xorg" path="/run/setrans/.setrans-unix" scontext=system_u:system_r:xserver_t:s0-s15:c0.c1023 tcontext=system_u:system_r:setrans_t:s15:c0.c1023 tclass=unix_stream_socket permissive=1
174[ 292.416152] audit: type=1400 audit(1576711272.967:609): avc: denied { connectto } for pid=487 comm="dbus-daemon" path="/run/setrans/.setrans-unix" scontext=system_u:system_r:system_dbusd_t:s0-s15:c0.c1023 tcontext=system_u:system_r:setrans_t:s15:c0.c1023 tclass=unix_stream_socket permissive=1
175[ 292.537153] audit: type=1400 audit(1576711273.087:610): avc: denied { connectto } for pid=5593 comm="systemd" path="/run/setrans/.setrans-unix" scontext=unconfined_u:unconfined_r:unconfined_t:s0 tcontext=system_u:system_r:setrans_t:s15:c0.c1023 tclass=unix_stream_socket permissive=1
176[ 292.540846] audit: type=1400 audit(1576711273.091:611): avc: denied { setopt } for pid=254 comm="systemd-journal" path="/run/systemd/journal/stdout" scontext=system_u:system_r:syslogd_t:s15:c0.c1023 tcontext=system_u:system_r:syslogd_t:s0 tclass=unix_stream_socket permissive=1
177[ 292.540851] audit: type=1400 audit(1576711273.091:612): avc: denied { shutdown } for pid=254 comm="systemd-journal" path="/run/systemd/journal/stdout" scontext=system_u:system_r:syslogd_t:s15:c0.c1023 tcontext=system_u:system_r:syslogd_t:s0 tclass=unix_stream_socket permissive=1
178[ 292.541543] audit: type=1400 audit(1576711273.091:613): avc: denied { sendto } for pid=254 comm="systemd-journal" path="/run/systemd/notify" scontext=system_u:system_r:syslogd_t:s15:c0.c1023 tcontext=system_u:system_r:init_t:s0-s15:c0.c1023 tclass=unix_dgram_socket permissive=1
179[ 292.565141] audit: type=1400 audit(1576711273.115:614): avc: denied { connectto } for pid=5591 comm="sddm-helper" path="/run/setrans/.setrans-unix" scontext=system_u:system_r:xdm_t:s0-s15:c0.c1023 tcontext=system_u:system_r:setrans_t:s15:c0.c1023 tclass=unix_stream_socket permissive=1
180[ 292.579138] audit: type=1400 audit(1576711273.127:615): avc: denied { entrypoint } for pid=5605 comm="sddm-helper" path="/usr/bin/gnome-keyring-daemon" dev="vda1" ino=277618 scontext=unconfined_u:unconfined_r:unconfined_t:s0 tcontext=system_u:object_r:gkeyringd_exec_t:s0 tclass=file permissive=1
181[ 292.603740] audit: type=1400 audit(1576711273.151:616): avc: denied { search } for pid=487 comm="dbus-daemon" name="setrans" dev="tmpfs" ino=16455 scontext=system_u:system_r:system_dbusd_t:s0-s15:c0.c1023 tcontext=system_u:object_r:setrans_runtime_t:s15:c0.c1023 tclass=dir permissive=1
182[ 292.603748] audit: type=1400 audit(1576711273.151:617): avc: denied { write } for pid=487 comm="dbus-daemon" name=".setrans-unix" dev="tmpfs" ino=16525 scontext=system_u:system_r:system_dbusd_t:s0-s15:c0.c1023 tcontext=system_u:object_r:setrans_runtime_t:s15:c0.c1023 tclass=sock_file permissive=1
183[ 293.195109] fuse: init (API version 7.31)
184[ 298.256344] kauditd_printk_skb: 16 callbacks suppressed
185[ 298.256347] audit: type=1400 audit(1576711278.806:634): avc: denied { read } for pid=5798 comm="dmesg" name="kmsg" dev="devtmpfs" ino=1034 scontext=unconfined_u:unconfined_r:unconfined_t:s0-s15:c0.c1023 tcontext=system_u:object_r:kmsg_device_t:s15:c0.c1023 tclass=chr_file permissive=1