Created
December 22, 2019 03:24
-
-
Save hkoba/62c3a3cf0ef594536bea8b086366b365 to your computer and use it in GitHub Desktop.
Possible dockerd related SELinux bug. Triggered by mount --rbind /sys /mnt/disk/sys + mount --make-rslave /mnt/disk/sys . This causes massive setroubleshootd + locate load
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
-- Logs begin at Mon 2019-11-11 11:08:24 JST, end at Sun 2019-12-22 12:19:02 JST. -- | |
Dec 22 12:01:06 chtholly.localdomain kernel: SELinux: Converting 2611 SID table entries... | |
Dec 22 12:01:06 chtholly.localdomain kernel: SELinux: Context system_u:object_r:container_var_lib_t:s0 became invalid (unmapped). | |
Dec 22 12:01:06 chtholly.localdomain kernel: SELinux: Context system_u:object_r:container_unit_file_t:s0 became invalid (unmapped). | |
Dec 22 12:01:06 chtholly.localdomain kernel: SELinux: Context system_u:object_r:container_runtime_exec_t:s0 became invalid (unmapped). | |
Dec 22 12:01:06 chtholly.localdomain kernel: SELinux: Context system_u:system_r:container_runtime_t:s0 became invalid (unmapped). | |
Dec 22 12:01:06 chtholly.localdomain kernel: SELinux: Context system_u:object_r:container_var_run_t:s0 became invalid (unmapped). | |
Dec 22 12:01:06 chtholly.localdomain kernel: SELinux: Context system_u:object_r:container_plugin_var_run_t:s0 became invalid (unmapped). | |
Dec 22 12:01:06 chtholly.localdomain kernel: SELinux: Context system_u:system_r:container_runtime_t:s0-s0:c0.c1023 became invalid (unmapped). | |
Dec 22 12:01:06 chtholly.localdomain kernel: SELinux: Context system_u:system_r:spc_t:s0-s0:c0.c1023 became invalid (unmapped). | |
Dec 22 12:01:06 chtholly.localdomain kernel: SELinux: Context system_u:system_r:container_auth_t:s0-s0:c0.c1023 became invalid (unmapped). | |
Dec 22 12:01:06 chtholly.localdomain kernel: SELinux: Context system_u:system_r:container_home_t:s0-s0:c0.c1023 became invalid (unmapped). | |
Dec 22 12:01:06 chtholly.localdomain kernel: SELinux: Context system_u:system_r:container_userns_t:s0-s0:c0.c1023 became invalid (unmapped). | |
Dec 22 12:01:06 chtholly.localdomain kernel: SELinux: Context system_u:system_r:container_logreader_t:s0-s0:c0.c1023 became invalid (unmapped). | |
Dec 22 12:01:06 chtholly.localdomain kernel: SELinux: Context system_u:system_r:flatpak_helper_t:s0-s0:c0.c1023 became invalid (unmapped). | |
Dec 22 12:01:06 chtholly.localdomain kernel: SELinux: Context system_u:system_r:gpg_agent_t:s0-s0:c0.c1023 became invalid (unmapped). | |
Dec 22 12:01:06 chtholly.localdomain kernel: SELinux: Context system_u:system_r:snappy_t:s0-s0:c0.c1023 became invalid (unmapped). | |
Dec 22 12:01:06 chtholly.localdomain kernel: SELinux: Context system_u:system_r:snappy_home_t:s0-s0:c0.c1023 became invalid (unmapped). | |
Dec 22 12:01:06 chtholly.localdomain kernel: SELinux: Context system_u:system_r:snappy_cli_t:s0-s0:c0.c1023 became invalid (unmapped). | |
Dec 22 12:01:06 chtholly.localdomain kernel: SELinux: Context system_u:system_r:snappy_mount_t:s0-s0:c0.c1023 became invalid (unmapped). | |
Dec 22 12:01:06 chtholly.localdomain kernel: SELinux: Context system_u:system_r:snappy_confine_t:s0-s0:c0.c1023 became invalid (unmapped). | |
Dec 22 12:01:06 chtholly.localdomain kernel: SELinux: Context system_u:system_r:snappy_unconfined_snap_t:s0-s0:c0.c1023 became invalid (unmapped). | |
Dec 22 12:01:06 chtholly.localdomain kernel: SELinux: Context system_u:system_r:speech_dispatcher_t:s0-s0:c0.c1023 became invalid (unmapped). | |
Dec 22 12:01:06 chtholly.localdomain kernel: SELinux: Context system_u:system_r:speech_dispatcher_home_t:s0-s0:c0.c1023 became invalid (unmapped). | |
Dec 22 12:01:06 chtholly.localdomain kernel: SELinux: Context system_u:system_r:tabrmd_t:s0-s0:c0.c1023 became invalid (unmapped). | |
Dec 22 12:01:07 chtholly.localdomain kernel: SELinux: Context system_u:unconfined_r:container_runtime_t:s0-s0:c0.c1023 became invalid (unmapped). | |
Dec 22 12:01:07 chtholly.localdomain kernel: SELinux: Context system_u:unconfined_r:container_home_t:s0-s0:c0.c1023 became invalid (unmapped). | |
Dec 22 12:01:07 chtholly.localdomain kernel: SELinux: Context system_u:unconfined_r:container_userns_t:s0-s0:c0.c1023 became invalid (unmapped). | |
Dec 22 12:01:07 chtholly.localdomain kernel: SELinux: Context system_u:unconfined_r:snappy_home_t:s0-s0:c0.c1023 became invalid (unmapped). | |
Dec 22 12:01:07 chtholly.localdomain kernel: SELinux: Context system_u:unconfined_r:speech_dispatcher_home_t:s0-s0:c0.c1023 became invalid (unmapped). | |
Dec 22 12:01:07 chtholly.localdomain kernel: SELinux: Context unconfined_u:system_r:container_runtime_t:s0-s0:c0.c1023 became invalid (unmapped). | |
Dec 22 12:01:07 chtholly.localdomain kernel: SELinux: Context unconfined_u:system_r:spc_t:s0-s0:c0.c1023 became invalid (unmapped). | |
Dec 22 12:01:07 chtholly.localdomain kernel: SELinux: Context unconfined_u:system_r:container_auth_t:s0-s0:c0.c1023 became invalid (unmapped). | |
Dec 22 12:01:07 chtholly.localdomain kernel: SELinux: Context unconfined_u:system_r:container_home_t:s0-s0:c0.c1023 became invalid (unmapped). | |
Dec 22 12:01:07 chtholly.localdomain kernel: SELinux: Context unconfined_u:system_r:container_userns_t:s0-s0:c0.c1023 became invalid (unmapped). | |
Dec 22 12:01:07 chtholly.localdomain kernel: SELinux: Context unconfined_u:system_r:container_logreader_t:s0-s0:c0.c1023 became invalid (unmapped). | |
Dec 22 12:01:07 chtholly.localdomain kernel: SELinux: Context unconfined_u:system_r:flatpak_helper_t:s0-s0:c0.c1023 became invalid (unmapped). | |
Dec 22 12:01:07 chtholly.localdomain kernel: SELinux: Context unconfined_u:system_r:gpg_agent_t:s0-s0:c0.c1023 became invalid (unmapped). | |
Dec 22 12:01:07 chtholly.localdomain kernel: SELinux: Context unconfined_u:system_r:snappy_t:s0-s0:c0.c1023 became invalid (unmapped). | |
Dec 22 12:01:07 chtholly.localdomain kernel: SELinux: Context unconfined_u:system_r:snappy_home_t:s0-s0:c0.c1023 became invalid (unmapped). | |
Dec 22 12:01:07 chtholly.localdomain kernel: SELinux: Context unconfined_u:system_r:snappy_cli_t:s0-s0:c0.c1023 became invalid (unmapped). | |
Dec 22 12:01:07 chtholly.localdomain kernel: SELinux: Context unconfined_u:system_r:snappy_mount_t:s0-s0:c0.c1023 became invalid (unmapped). | |
Dec 22 12:01:07 chtholly.localdomain kernel: SELinux: Context unconfined_u:system_r:snappy_confine_t:s0-s0:c0.c1023 became invalid (unmapped). | |
Dec 22 12:01:07 chtholly.localdomain kernel: SELinux: Context unconfined_u:system_r:snappy_unconfined_snap_t:s0-s0:c0.c1023 became invalid (unmapped). | |
Dec 22 12:01:07 chtholly.localdomain kernel: SELinux: Context unconfined_u:system_r:speech_dispatcher_t:s0-s0:c0.c1023 became invalid (unmapped). | |
Dec 22 12:01:07 chtholly.localdomain kernel: SELinux: Context unconfined_u:system_r:speech_dispatcher_home_t:s0-s0:c0.c1023 became invalid (unmapped). | |
Dec 22 12:01:07 chtholly.localdomain kernel: SELinux: Context unconfined_u:system_r:tabrmd_t:s0-s0:c0.c1023 became invalid (unmapped). | |
Dec 22 12:01:07 chtholly.localdomain kernel: SELinux: Context unconfined_u:unconfined_r:container_runtime_t:s0-s0:c0.c1023 became invalid (unmapped). | |
Dec 22 12:01:07 chtholly.localdomain kernel: SELinux: Context unconfined_u:unconfined_r:container_home_t:s0-s0:c0.c1023 became invalid (unmapped). | |
Dec 22 12:01:07 chtholly.localdomain kernel: SELinux: Context unconfined_u:unconfined_r:container_userns_t:s0-s0:c0.c1023 became invalid (unmapped). | |
Dec 22 12:01:07 chtholly.localdomain kernel: SELinux: Context unconfined_u:unconfined_r:snappy_home_t:s0-s0:c0.c1023 became invalid (unmapped). | |
Dec 22 12:01:07 chtholly.localdomain kernel: SELinux: Context unconfined_u:unconfined_r:speech_dispatcher_home_t:s0-s0:c0.c1023 became invalid (unmapped). | |
Dec 22 12:01:07 chtholly.localdomain kernel: SELinux: Context system_u:object_r:container_config_t:s0 became invalid (unmapped). | |
Dec 22 12:01:07 chtholly.localdomain kernel: SELinux: Context unconfined_u:object_r:container_var_lib_t:s0 became invalid (unmapped). | |
Dec 22 12:01:07 chtholly.localdomain kernel: SELinux: policy capability network_peer_controls=1 | |
Dec 22 12:01:07 chtholly.localdomain kernel: SELinux: policy capability open_perms=1 | |
Dec 22 12:01:07 chtholly.localdomain kernel: SELinux: policy capability extended_socket_class=1 | |
Dec 22 12:01:07 chtholly.localdomain kernel: SELinux: policy capability always_check_network=0 | |
Dec 22 12:01:07 chtholly.localdomain kernel: SELinux: policy capability cgroup_seclabel=1 | |
Dec 22 12:01:07 chtholly.localdomain kernel: SELinux: policy capability nnp_nosuid_transition=1 | |
Dec 22 12:01:07 chtholly.localdomain audit: MAC_POLICY_LOAD auid=1000 ses=3 lsm=selinux res=1 | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { write } for pid=2720 comm="dockerd-current" path="socket:[43924]" dev="sockfs" ino=43924 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=unix_stream_socket permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" trawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { create } for pid=2720 comm="dockerd-current" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=unix_stream_socket permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[1611]: AVC avc: denied { read } for pid=1611 comm="docker-containe" path="socket:[43925]" dev="sockfs" ino=43925 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=unix_stream_socket permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" trawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { search } for pid=2720 comm="dockerd-current" name="/" dev="dm-1" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:root_t:s0 tclass=dir permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[1611]: AVC avc: denied { use } for pid=1611 comm="docker-containe" path="socket:[38069]" dev="sockfs" ino=38069 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain kernel: audit_log_start: 58 callbacks suppressed | |
Dec 22 12:01:08 chtholly.localdomain kernel: audit: audit_backlog=65 > audit_backlog_limit=64 | |
Dec 22 12:01:08 chtholly.localdomain kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 | |
Dec 22 12:01:08 chtholly.localdomain kernel: audit: backlog limit exceeded | |
Dec 22 12:01:08 chtholly.localdomain kernel: audit: audit_backlog=65 > audit_backlog_limit=64 | |
Dec 22 12:01:08 chtholly.localdomain kernel: audit: audit_lost=2 audit_rate_limit=0 audit_backlog_limit=64 | |
Dec 22 12:01:08 chtholly.localdomain kernel: audit: backlog limit exceeded | |
Dec 22 12:01:08 chtholly.localdomain kernel: audit: audit_backlog=65 > audit_backlog_limit=64 | |
Dec 22 12:01:08 chtholly.localdomain kernel: audit: audit_lost=3 audit_rate_limit=0 audit_backlog_limit=64 | |
Dec 22 12:01:08 chtholly.localdomain kernel: audit: backlog limit exceeded | |
Dec 22 12:01:08 chtholly.localdomain kernel: audit: audit_backlog=65 > audit_backlog_limit=64 | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { signal } for pid=2720 comm="dockerd-current" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=process permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" trawcon="system_u:system_r:container_runtime_t:s0" | |
Dec 22 12:01:08 chtholly.localdomain audit[1289]: USER_AVC pid=1289 uid=81 auid=4294967295 ses=4294967295 subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 msg='avc: received policyload notice (seqno=2) | |
exe="/usr/bin/dbus-broker" sauid=81 hostname=? addr=? terminal=?' | |
Dec 22 12:01:08 chtholly.localdomain audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' | |
Dec 22 12:01:08 chtholly.localdomain systemd[1]: docker.service: Main process exited, code=exited, status=2/INVALIDARGUMENT | |
Dec 22 12:01:08 chtholly.localdomain systemd[1]: docker.service: Failed with result 'exit-code'. |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment