Skip to content

Instantly share code, notes, and snippets.

@hkoba
Created December 22, 2019 03:24
Show Gist options
  • Save hkoba/62c3a3cf0ef594536bea8b086366b365 to your computer and use it in GitHub Desktop.
Save hkoba/62c3a3cf0ef594536bea8b086366b365 to your computer and use it in GitHub Desktop.
Possible dockerd related SELinux bug. Triggered by mount --rbind /sys /mnt/disk/sys + mount --make-rslave /mnt/disk/sys . This causes massive setroubleshootd + locate load
-- Logs begin at Mon 2019-11-11 11:08:24 JST, end at Sun 2019-12-22 12:19:02 JST. --
Dec 22 12:01:06 chtholly.localdomain kernel: SELinux: Converting 2611 SID table entries...
Dec 22 12:01:06 chtholly.localdomain kernel: SELinux: Context system_u:object_r:container_var_lib_t:s0 became invalid (unmapped).
Dec 22 12:01:06 chtholly.localdomain kernel: SELinux: Context system_u:object_r:container_unit_file_t:s0 became invalid (unmapped).
Dec 22 12:01:06 chtholly.localdomain kernel: SELinux: Context system_u:object_r:container_runtime_exec_t:s0 became invalid (unmapped).
Dec 22 12:01:06 chtholly.localdomain kernel: SELinux: Context system_u:system_r:container_runtime_t:s0 became invalid (unmapped).
Dec 22 12:01:06 chtholly.localdomain kernel: SELinux: Context system_u:object_r:container_var_run_t:s0 became invalid (unmapped).
Dec 22 12:01:06 chtholly.localdomain kernel: SELinux: Context system_u:object_r:container_plugin_var_run_t:s0 became invalid (unmapped).
Dec 22 12:01:06 chtholly.localdomain kernel: SELinux: Context system_u:system_r:container_runtime_t:s0-s0:c0.c1023 became invalid (unmapped).
Dec 22 12:01:06 chtholly.localdomain kernel: SELinux: Context system_u:system_r:spc_t:s0-s0:c0.c1023 became invalid (unmapped).
Dec 22 12:01:06 chtholly.localdomain kernel: SELinux: Context system_u:system_r:container_auth_t:s0-s0:c0.c1023 became invalid (unmapped).
Dec 22 12:01:06 chtholly.localdomain kernel: SELinux: Context system_u:system_r:container_home_t:s0-s0:c0.c1023 became invalid (unmapped).
Dec 22 12:01:06 chtholly.localdomain kernel: SELinux: Context system_u:system_r:container_userns_t:s0-s0:c0.c1023 became invalid (unmapped).
Dec 22 12:01:06 chtholly.localdomain kernel: SELinux: Context system_u:system_r:container_logreader_t:s0-s0:c0.c1023 became invalid (unmapped).
Dec 22 12:01:06 chtholly.localdomain kernel: SELinux: Context system_u:system_r:flatpak_helper_t:s0-s0:c0.c1023 became invalid (unmapped).
Dec 22 12:01:06 chtholly.localdomain kernel: SELinux: Context system_u:system_r:gpg_agent_t:s0-s0:c0.c1023 became invalid (unmapped).
Dec 22 12:01:06 chtholly.localdomain kernel: SELinux: Context system_u:system_r:snappy_t:s0-s0:c0.c1023 became invalid (unmapped).
Dec 22 12:01:06 chtholly.localdomain kernel: SELinux: Context system_u:system_r:snappy_home_t:s0-s0:c0.c1023 became invalid (unmapped).
Dec 22 12:01:06 chtholly.localdomain kernel: SELinux: Context system_u:system_r:snappy_cli_t:s0-s0:c0.c1023 became invalid (unmapped).
Dec 22 12:01:06 chtholly.localdomain kernel: SELinux: Context system_u:system_r:snappy_mount_t:s0-s0:c0.c1023 became invalid (unmapped).
Dec 22 12:01:06 chtholly.localdomain kernel: SELinux: Context system_u:system_r:snappy_confine_t:s0-s0:c0.c1023 became invalid (unmapped).
Dec 22 12:01:06 chtholly.localdomain kernel: SELinux: Context system_u:system_r:snappy_unconfined_snap_t:s0-s0:c0.c1023 became invalid (unmapped).
Dec 22 12:01:06 chtholly.localdomain kernel: SELinux: Context system_u:system_r:speech_dispatcher_t:s0-s0:c0.c1023 became invalid (unmapped).
Dec 22 12:01:06 chtholly.localdomain kernel: SELinux: Context system_u:system_r:speech_dispatcher_home_t:s0-s0:c0.c1023 became invalid (unmapped).
Dec 22 12:01:06 chtholly.localdomain kernel: SELinux: Context system_u:system_r:tabrmd_t:s0-s0:c0.c1023 became invalid (unmapped).
Dec 22 12:01:07 chtholly.localdomain kernel: SELinux: Context system_u:unconfined_r:container_runtime_t:s0-s0:c0.c1023 became invalid (unmapped).
Dec 22 12:01:07 chtholly.localdomain kernel: SELinux: Context system_u:unconfined_r:container_home_t:s0-s0:c0.c1023 became invalid (unmapped).
Dec 22 12:01:07 chtholly.localdomain kernel: SELinux: Context system_u:unconfined_r:container_userns_t:s0-s0:c0.c1023 became invalid (unmapped).
Dec 22 12:01:07 chtholly.localdomain kernel: SELinux: Context system_u:unconfined_r:snappy_home_t:s0-s0:c0.c1023 became invalid (unmapped).
Dec 22 12:01:07 chtholly.localdomain kernel: SELinux: Context system_u:unconfined_r:speech_dispatcher_home_t:s0-s0:c0.c1023 became invalid (unmapped).
Dec 22 12:01:07 chtholly.localdomain kernel: SELinux: Context unconfined_u:system_r:container_runtime_t:s0-s0:c0.c1023 became invalid (unmapped).
Dec 22 12:01:07 chtholly.localdomain kernel: SELinux: Context unconfined_u:system_r:spc_t:s0-s0:c0.c1023 became invalid (unmapped).
Dec 22 12:01:07 chtholly.localdomain kernel: SELinux: Context unconfined_u:system_r:container_auth_t:s0-s0:c0.c1023 became invalid (unmapped).
Dec 22 12:01:07 chtholly.localdomain kernel: SELinux: Context unconfined_u:system_r:container_home_t:s0-s0:c0.c1023 became invalid (unmapped).
Dec 22 12:01:07 chtholly.localdomain kernel: SELinux: Context unconfined_u:system_r:container_userns_t:s0-s0:c0.c1023 became invalid (unmapped).
Dec 22 12:01:07 chtholly.localdomain kernel: SELinux: Context unconfined_u:system_r:container_logreader_t:s0-s0:c0.c1023 became invalid (unmapped).
Dec 22 12:01:07 chtholly.localdomain kernel: SELinux: Context unconfined_u:system_r:flatpak_helper_t:s0-s0:c0.c1023 became invalid (unmapped).
Dec 22 12:01:07 chtholly.localdomain kernel: SELinux: Context unconfined_u:system_r:gpg_agent_t:s0-s0:c0.c1023 became invalid (unmapped).
Dec 22 12:01:07 chtholly.localdomain kernel: SELinux: Context unconfined_u:system_r:snappy_t:s0-s0:c0.c1023 became invalid (unmapped).
Dec 22 12:01:07 chtholly.localdomain kernel: SELinux: Context unconfined_u:system_r:snappy_home_t:s0-s0:c0.c1023 became invalid (unmapped).
Dec 22 12:01:07 chtholly.localdomain kernel: SELinux: Context unconfined_u:system_r:snappy_cli_t:s0-s0:c0.c1023 became invalid (unmapped).
Dec 22 12:01:07 chtholly.localdomain kernel: SELinux: Context unconfined_u:system_r:snappy_mount_t:s0-s0:c0.c1023 became invalid (unmapped).
Dec 22 12:01:07 chtholly.localdomain kernel: SELinux: Context unconfined_u:system_r:snappy_confine_t:s0-s0:c0.c1023 became invalid (unmapped).
Dec 22 12:01:07 chtholly.localdomain kernel: SELinux: Context unconfined_u:system_r:snappy_unconfined_snap_t:s0-s0:c0.c1023 became invalid (unmapped).
Dec 22 12:01:07 chtholly.localdomain kernel: SELinux: Context unconfined_u:system_r:speech_dispatcher_t:s0-s0:c0.c1023 became invalid (unmapped).
Dec 22 12:01:07 chtholly.localdomain kernel: SELinux: Context unconfined_u:system_r:speech_dispatcher_home_t:s0-s0:c0.c1023 became invalid (unmapped).
Dec 22 12:01:07 chtholly.localdomain kernel: SELinux: Context unconfined_u:system_r:tabrmd_t:s0-s0:c0.c1023 became invalid (unmapped).
Dec 22 12:01:07 chtholly.localdomain kernel: SELinux: Context unconfined_u:unconfined_r:container_runtime_t:s0-s0:c0.c1023 became invalid (unmapped).
Dec 22 12:01:07 chtholly.localdomain kernel: SELinux: Context unconfined_u:unconfined_r:container_home_t:s0-s0:c0.c1023 became invalid (unmapped).
Dec 22 12:01:07 chtholly.localdomain kernel: SELinux: Context unconfined_u:unconfined_r:container_userns_t:s0-s0:c0.c1023 became invalid (unmapped).
Dec 22 12:01:07 chtholly.localdomain kernel: SELinux: Context unconfined_u:unconfined_r:snappy_home_t:s0-s0:c0.c1023 became invalid (unmapped).
Dec 22 12:01:07 chtholly.localdomain kernel: SELinux: Context unconfined_u:unconfined_r:speech_dispatcher_home_t:s0-s0:c0.c1023 became invalid (unmapped).
Dec 22 12:01:07 chtholly.localdomain kernel: SELinux: Context system_u:object_r:container_config_t:s0 became invalid (unmapped).
Dec 22 12:01:07 chtholly.localdomain kernel: SELinux: Context unconfined_u:object_r:container_var_lib_t:s0 became invalid (unmapped).
Dec 22 12:01:07 chtholly.localdomain kernel: SELinux: policy capability network_peer_controls=1
Dec 22 12:01:07 chtholly.localdomain kernel: SELinux: policy capability open_perms=1
Dec 22 12:01:07 chtholly.localdomain kernel: SELinux: policy capability extended_socket_class=1
Dec 22 12:01:07 chtholly.localdomain kernel: SELinux: policy capability always_check_network=0
Dec 22 12:01:07 chtholly.localdomain kernel: SELinux: policy capability cgroup_seclabel=1
Dec 22 12:01:07 chtholly.localdomain kernel: SELinux: policy capability nnp_nosuid_transition=1
Dec 22 12:01:07 chtholly.localdomain audit: MAC_POLICY_LOAD auid=1000 ses=3 lsm=selinux res=1
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { write } for pid=2720 comm="dockerd-current" path="socket:[43924]" dev="sockfs" ino=43924 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=unix_stream_socket permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" trawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { create } for pid=2720 comm="dockerd-current" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=unix_stream_socket permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[1611]: AVC avc: denied { read } for pid=1611 comm="docker-containe" path="socket:[43925]" dev="sockfs" ino=43925 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=unix_stream_socket permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" trawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { search } for pid=2720 comm="dockerd-current" name="/" dev="dm-1" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:root_t:s0 tclass=dir permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[1611]: AVC avc: denied { use } for pid=1611 comm="docker-containe" path="socket:[38069]" dev="sockfs" ino=38069 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain kernel: audit_log_start: 58 callbacks suppressed
Dec 22 12:01:08 chtholly.localdomain kernel: audit: audit_backlog=65 > audit_backlog_limit=64
Dec 22 12:01:08 chtholly.localdomain kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64
Dec 22 12:01:08 chtholly.localdomain kernel: audit: backlog limit exceeded
Dec 22 12:01:08 chtholly.localdomain kernel: audit: audit_backlog=65 > audit_backlog_limit=64
Dec 22 12:01:08 chtholly.localdomain kernel: audit: audit_lost=2 audit_rate_limit=0 audit_backlog_limit=64
Dec 22 12:01:08 chtholly.localdomain kernel: audit: backlog limit exceeded
Dec 22 12:01:08 chtholly.localdomain kernel: audit: audit_backlog=65 > audit_backlog_limit=64
Dec 22 12:01:08 chtholly.localdomain kernel: audit: audit_lost=3 audit_rate_limit=0 audit_backlog_limit=64
Dec 22 12:01:08 chtholly.localdomain kernel: audit: backlog limit exceeded
Dec 22 12:01:08 chtholly.localdomain kernel: audit: audit_backlog=65 > audit_backlog_limit=64
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { use } for pid=2720 comm="dockerd-current" path="socket:[44569]" dev="sockfs" ino=44569 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fd permissive=0 srawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[2720]: AVC avc: denied { signal } for pid=2720 comm="dockerd-current" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=process permissive=0 srawcon="system_u:system_r:container_runtime_t:s0" trawcon="system_u:system_r:container_runtime_t:s0"
Dec 22 12:01:08 chtholly.localdomain audit[1289]: USER_AVC pid=1289 uid=81 auid=4294967295 ses=4294967295 subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 msg='avc: received policyload notice (seqno=2)
exe="/usr/bin/dbus-broker" sauid=81 hostname=? addr=? terminal=?'
Dec 22 12:01:08 chtholly.localdomain audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed'
Dec 22 12:01:08 chtholly.localdomain systemd[1]: docker.service: Main process exited, code=exited, status=2/INVALIDARGUMENT
Dec 22 12:01:08 chtholly.localdomain systemd[1]: docker.service: Failed with result 'exit-code'.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment